1 .\" Copyright (c) 1990 The Regents of the University of California.
2 .\" All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" from: @(#)tftp.1 5.4 (Berkeley) 4/22/91
33 .\" $Id: tftp.1,v 1.11 2000/07/30 23:57:10 dholland Exp $
37 .Os "Linux NetKit (0.17)"
40 .Nd trivial file transfer program
46 is the user interface to the Internet
48 (Trivial File Transfer Protocol),
49 which allows users to transfer files to and from a remote machine.
52 may be specified on the command line, in which case
56 as the default host for future transfers (see the
62 is running, it issues the prompt
64 and recognizes the following commands:
66 .Bl -tag -width verbose -compact
67 .It Cm \&? Ar command-name ...
68 Print help information.
71 Shorthand for "mode ascii"
74 Shorthand for "mode binary"
76 .It Cm connect Ar host-name Op Ar port
87 does not maintain connections betweeen transfers; thus, the
89 command does not actually create a connection,
90 but merely remembers what host is to be used for transfers.
91 You do not have to use the
93 command; the remote host can be specified as part of the
99 .It Cm get Ar filename
100 .It Cm get Ar remotename localname
101 .It Cm get Ar file1 file2 ... fileN
102 Get a file or set of files from the specified
105 can be in one of two forms:
106 a filename on the remote host, if the host has already been specified,
107 or a string of the form
109 to specify both a host and filename at the same time.
110 If the latter form is used,
111 the last hostname specified becomes the default for future transfers.
113 .It Cm mode Ar transfer-mode
114 Set the mode for transfers;
124 .It Cm put Ar localfile remotefile
125 .It Cm put Ar file1 file2 ... fileN remote-directory
126 Put a file or set of files to the specified
127 remote file or directory.
129 can be in one of two forms:
130 a filename on the remote host, if the host has already been specified,
131 or a string of the form
133 to specify both a host and filename at the same time.
134 If the latter form is used,
135 the hostname specified becomes the default for future transfers.
136 If the remote-directory form is used, the remote host is
144 An end of file also exits.
146 .It Cm rexmt Ar retransmission-timeout
147 Set the per-packet retransmission timeout, in seconds.
152 .It Cm timeout Ar total-transmission-timeout
153 Set the total transmission timeout, in seconds.
156 Toggle packet tracing.
163 Because there is no user-login or validation within
166 protocol, the remote site will probably have some
167 sort of file-access restrictions in place. The
168 exact methods are specific to each site and therefore
169 difficult to document here.