⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1730.txt

📁 <VC++网络游戏建摸与实现>源代码
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Network Working Group                                         M. CrispinRequest for Comments: 1730                      University of WashingtonCategory: Standards Track                                  December 1994              INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4Status of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Abstract   The Internet Message Access Protocol, Version 4 (IMAP4) allows a   client to access and manipulate electronic mail messages on a server.   IMAP4 permits manipulation of remote message folders, called   "mailboxes", in a way that is functionally equivalent to local   mailboxes.  IMAP4 also provides the capability for an offline client   to resynchronize with the server (see also [IMAP-DISC]).   IMAP4 includes operations for creating, deleting, and renaming   mailboxes; checking for new messages; permanently removing messages;   setting and clearing flags; RFC 822 and MIME parsing; searching; and   selective fetching of message attributes, texts, and portions   thereof.  Messages in IMAP4 are accessed by the use of numbers.   These numbers are either message sequence numbers (relative position   from 1 to the number of messages in the mailbox) or unique   identifiers (immutable, strictly ascending values assigned to each   message, but which are not necessarily contiguous).   IMAP4 supports a single server.  A mechanism for supporting multiple   IMAP4 servers is discussed in [IMSP].   IMAP4 does not specify a means of posting mail; this function is   handled by a mail transfer protocol such as [SMTP].   IMAP4 is designed to be upwards compatible from the [IMAP2] protocol.   Compatibility issues are discussed in [IMAP-COMPAT].Crispin                                                         [Page i]RFC 1730                         IMAP4                     December 1994Table of ContentsIMAP4 Protocol Specification ......................................    11.      Organization of this Document .............................    11.1.    How to Read This Document .................................    11.2.    Conventions Used in this Document .........................    12.      Protocol Overview .........................................    12.1.    Link Level ................................................    12.2.    Commands and Responses ....................................    12.2.1.  Client Protocol Sender and Server Protocol Receiver .......    22.2.2.  Server Protocol Sender and Client Protocol Receiver .......    23.      State and Flow Diagram ....................................    43.1.    Non-Authenticated State ...................................    43.2.    Authenticated State .......................................    43.3.    Selected State ............................................    43.4.    Logout State ..............................................    44.      Data Formats ..............................................    64.1.    Atom ......................................................    64.2.    Number ....................................................    64.3.    String ....................................................    64.3.1.  8-bit and Binary Strings ..................................    74.4.    Parenthesized List ........................................    74.5.    NIL .......................................................    75.      Operational Considerations ................................    85.1.    Mailbox Naming ............................................    85.2.    Mailbox Size and Message Status Updates ...................    85.3.    Response when no Command in Progress ......................    85.4.    Autologout Timer ..........................................    95.5.    Multiple Commands in Progress .............................    96.      Client Commands ...........................................   106.1.    Client Commands - Any State ...............................   106.1.1.  CAPABILITY Command ........................................   106.1.2.  NOOP Command ..............................................   116.1.3.  LOGOUT Command ............................................   116.2.    Client Commands - Non-Authenticated State .................   126.2.1.  AUTHENTICATE Command ......................................   126.2.2.  LOGIN Command .............................................   146.3.    Client Commands - Authenticated State .....................   146.3.1.  SELECT Command ............................................   156.3.2.  EXAMINE Command ...........................................   166.3.3.  CREATE Command ............................................   176.3.4.  DELETE Command ............................................   186.3.5.  RENAME Command ............................................   18Crispin                                                        [Page ii]RFC 1730                         IMAP4                     December 19946.3.6.  SUBSCRIBE Command .........................................   196.3.7.  UNSUBSCRIBE Command .......................................   196.3.8.  LIST Command ..............................................   206.3.9.  LSUB Command ..............................................   226.3.10. APPEND Command ............................................   226.4.    Client Commands - Selected State ..........................   236.4.1.  CHECK Command .............................................   236.4.2.  CLOSE Command .............................................   246.4.3.  EXPUNGE Command ...........................................   256.4.4.  SEARCH Command ............................................   256.4.5.  FETCH Command .............................................   296.4.6.  PARTIAL Command ...........................................   326.4.7.  STORE Command .............................................   336.4.8.  COPY Command ..............................................   346.4.9.  UID Command ...............................................   356.5.    Client Commands - Experimental/Expansion ..................   376.5.1.  X<atom> Command ...........................................   377.      Server Responses ..........................................   387.1.    Server Responses - Status Responses .......................   397.1.1.  OK Response ...............................................   407.1.2.  NO Response ...............................................   407.1.3.  BAD Response ..............................................   417.1.4.  PREAUTH Response ..........................................   417.1.5.  BYE Response ..............................................   417.2.    Server Responses - Server and Mailbox Status ..............   427.2.1.  CAPABILITY Response .......................................   427.2.2.  LIST Response .............................................   437.2.3.  LSUB Response .............................................   447.2.4.  SEARCH Response ...........................................   447.2.5.  FLAGS Response ............................................   447.3.    Server Responses - Message Status .........................   457.3.1.  EXISTS Response ...........................................   457.3.2.  RECENT Response ...........................................   457.3.3.  EXPUNGE Response ..........................................   457.3.4.  FETCH Response ............................................   467.3.5.  Obsolete Responses ........................................   517.4.    Server Responses - Command Continuation Request ...........   518.      Sample IMAP4 session ......................................   529.      Formal Syntax .............................................   5310.     Author's Note .............................................   6411.     Security Considerations ...................................   6412.     Author's Address ..........................................   64Appendices ........................................................   65A.      Obsolete Commands .........................................   65A.6.3.OBS.1.    FIND ALL.MAILBOXES Command ........................   65A.6.3.OBS.2.    FIND MAILBOXES Command ............................   65A.6.3.OBS.3.    SUBSCRIBE MAILBOX Command .........................   66A.6.3.OBS.4.    UNSUBSCRIBE MAILBOX Command .......................   66Crispin                                                       [Page iii]RFC 1730                         IMAP4                     December 1994B.      Obsolete Responses ........................................   68B.7.2.OBS.1.    MAILBOX Response ..................................   68B.7.3.OBS.1.    COPY Response .....................................   68B.7.3.OBS.2.    STORE Response ....................................   69C.      References ................................................   70E.      IMAP4 Keyword Index .......................................   71Crispin                                                        [Page iv]RFC 1730                         IMAP4                     December 1994IMAP4 Protocol Specification1.      Organization of this Document1.1.    How to Read This Document   This document is written from the point of view of the implementor of   an IMAP4 client or server.  Beyond the protocol overview in section   2, it is not optimized for someone trying to understand the operation   of the protocol.  The material in sections 3 through 5 provides the   general context and definitions with which IMAP4 operates.   Sections 6, 7, and 9 describe the IMAP commands, responses, and   syntax, respectively.  The relationships among these are such that it   is almost impossible to understand any of them separately.  In   particular, one should not attempt to deduce command syntax from the   command section alone; one should instead refer to the formal syntax   section.1.2.    Conventions Used in this Document   In examples, "C:" and "S:" indicate lines sent by the client and   server respectively.2.      Protocol Overview2.1.    Link Level   The IMAP4 protocol assumes a reliable data stream such as provided by   TCP.  When TCP is used, an IMAP4 server listens on port 143.2.2.    Commands and Responses   An IMAP4 session consists of the establishment of a client/server   connection, an initial greeting from the server, and client/server   interactions.  These client/server interactions consist of a client   command, server data, and a server completion result response.   All interactions transmitted by client and server are in the form of   lines; that is, strings that end with a CRLF.  The protocol receiver   of an IMAP4 client or server is either reading a line, or is reading   a sequence of octets with a known count followed by a line.Crispin                                                         [Page 1]RFC 1730                         IMAP4                     December 19942.2.1.  Client Protocol Sender and Server Protocol Receiver   The client command begins an operation.  Each client command is   prefixed with a identifier (typically a short alphanumeric string,   e.g. A0001, A0002, etc.) called a "tag".  A different tag is   generated by the client for each command.   There are two cases in which a line from the client does not   represent a complete command.  In one case, a command argument is   quoted with an octet count (see the description of literal in String   under Data Formats); in the other case, the command arguments require   server feedback (see the AUTHENTICATE command).  In either case, the   server sends a command continuation request response if it is ready   for the octets (if appropriate) and the remainder of the command.   This response is prefixed with the token "+".        Note: If, instead, the server detected an error in the        command, it sends a BAD completion response with tag        matching the command (as described below) to reject the        command and prevent the client from sending any more of the        command.        It is also possible for the server to send a completion        response for some other command (if multiple commands are        in progress), or untagged data.  In either case, the        command continuation request is still pending; the client        takes the appropriate action for the response, and reads        another response from the server.   The protocol receiver of an IMAP4 server reads a command line from   the client, parses the command and its arguments, and transmits   server data and a server command completion result response.2.2.2.  Server Protocol Sender and Client Protocol Receiver   Data transmitted by the server to the client and status responses   that do not indicate command completion are prefixed with the token   "*", and are called untagged responses.   Server data may be sent as a result of a client command, or may be   sent unilaterally by the server.  There is no syntactic difference   between server data that resulted from a specific command and server   data that were sent unilaterally.   The server completion result response indicates the success or   failure of the operation.  It is tagged with the same tag as the   client command which began the operation.  Thus, if more than oneCrispin                                                         [Page 2]RFC 1730                         IMAP4                     December 1994   command is in progress, the tag in a server completion response   identifies the command to which the response applies.  There are   three possible server completion responses: OK (indicating success),   NO (indicating failure), or BAD (indicating protocol error such as   unrecognized command or command syntax error).   The protocol receiver of an IMAP4 client reads a response line from   the server.  It then takes action on the response based upon the   first token of the response, which may be a tag, a "*", or a "+".  As   described above.   A client MUST be prepared to accept any server response at all times.   This includes server data that it may not have requested.  Server   data SHOULD be recorded, so that the client can reference its   recorded copy rather than sending a command to the server to request   the data.  In the case of certain server data, recording the data is   mandatory.   This topic is discussed in greater detail in the Server Responses   section.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -