[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.145.75.30: ~ $
<?xml version="1.0" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>tsget</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<link rev="made" href="mailto:root@localhost" />
</head>

<body style="background-color: white">



<ul id="index">
  <li><a href="#NAME">NAME</a></li>
  <li><a href="#SYNOPSIS">SYNOPSIS</a></li>
  <li><a href="#DESCRIPTION">DESCRIPTION</a></li>
  <li><a href="#OPTIONS">OPTIONS</a></li>
  <li><a href="#ENVIRONMENT-VARIABLES">ENVIRONMENT VARIABLES</a></li>
  <li><a href="#EXAMPLES">EXAMPLES</a></li>
  <li><a href="#SEE-ALSO">SEE ALSO</a></li>
  <li><a href="#COPYRIGHT">COPYRIGHT</a></li>
</ul>

<h1 id="NAME">NAME</h1>

<p>openssl-tsget, tsget - Time Stamping HTTP/HTTPS client</p>

<h1 id="SYNOPSIS">SYNOPSIS</h1>

<p><b>tsget</b> <b>-h</b> server_url [<b>-e</b> extension] [<b>-o</b> output] [<b>-v</b>] [<b>-d</b>] [<b>-k</b> private_key.pem] [<b>-p</b> key_password] [<b>-c</b> client_cert.pem] [<b>-C</b> CA_certs.pem] [<b>-P</b> CA_path] [<b>-r</b> file:file...] [<b>-g</b> EGD_socket] [request]...</p>

<h1 id="DESCRIPTION">DESCRIPTION</h1>

<p>The <b>tsget</b> command can be used for sending a timestamp request, as specified in <b>RFC 3161</b>, to a timestamp server over HTTP or HTTPS and storing the timestamp response in a file. This tool cannot be used for creating the requests and verifying responses, you can use the OpenSSL <b>ts(1)</b> command to do that. <b>tsget</b> can send several requests to the server without closing the TCP connection if more than one requests are specified on the command line.</p>

<p>The tool sends the following HTTP request for each timestamp request:</p>

<pre><code>        POST url HTTP/1.1
        User-Agent: OpenTSA tsget.pl/&lt;version&gt;
        Host: &lt;host&gt;:&lt;port&gt;
        Pragma: no-cache
        Content-Type: application/timestamp-query
        Accept: application/timestamp-reply
        Content-Length: length of body

        ...binary request specified by the user...</code></pre>

<p><b>tsget</b> expects a response of type application/timestamp-reply, which is written to a file without any interpretation.</p>

<h1 id="OPTIONS">OPTIONS</h1>

<dl>

<dt id="h-server_url"><b>-h</b> server_url</dt>
<dd>

<p>The URL of the HTTP/HTTPS server listening for timestamp requests.</p>

</dd>
<dt id="e-extension"><b>-e</b> extension</dt>
<dd>

<p>If the <b>-o</b> option is not given this argument specifies the extension of the output files. The base name of the output file will be the same as those of the input files. Default extension is &#39;.tsr&#39;. (Optional)</p>

</dd>
<dt id="o-output"><b>-o</b> output</dt>
<dd>

<p>This option can be specified only when just one request is sent to the server. The timestamp response will be written to the given output file. &#39;-&#39; means standard output. In case of multiple timestamp requests or the absence of this argument the names of the output files will be derived from the names of the input files and the default or specified extension argument. (Optional)</p>

</dd>
<dt id="v"><b>-v</b></dt>
<dd>

<p>The name of the currently processed request is printed on standard error. (Optional)</p>

</dd>
<dt id="d"><b>-d</b></dt>
<dd>

<p>Switches on verbose mode for the underlying <b>curl</b> library. You can see detailed debug messages for the connection. (Optional)</p>

</dd>
<dt id="k-private_key.pem"><b>-k</b> private_key.pem</dt>
<dd>

<p>(HTTPS) In case of certificate-based client authentication over HTTPS &lt;private_key.pem&gt; must contain the private key of the user. The private key file can optionally be protected by a passphrase. The <b>-c</b> option must also be specified. (Optional)</p>

</dd>
<dt id="p-key_password"><b>-p</b> key_password</dt>
<dd>

<p>(HTTPS) Specifies the passphrase for the private key specified by the <b>-k</b> argument. If this option is omitted and the key is passphrase protected <b>tsget</b> will ask for it. (Optional)</p>

</dd>
<dt id="c-client_cert.pem"><b>-c</b> client_cert.pem</dt>
<dd>

<p>(HTTPS) In case of certificate-based client authentication over HTTPS &lt;client_cert.pem&gt; must contain the X.509 certificate of the user. The <b>-k</b> option must also be specified. If this option is not specified no certificate-based client authentication will take place. (Optional)</p>

</dd>
<dt id="C-CA_certs.pem"><b>-C</b> CA_certs.pem</dt>
<dd>

<p>(HTTPS) The trusted CA certificate store. The certificate chain of the peer&#39;s certificate must include one of the CA certificates specified in this file. Either option <b>-C</b> or option <b>-P</b> must be given in case of HTTPS. (Optional)</p>

</dd>
<dt id="P-CA_path"><b>-P</b> CA_path</dt>
<dd>

<p>(HTTPS) The path containing the trusted CA certificates to verify the peer&#39;s certificate. The directory must be prepared with the <b>c_rehash</b> OpenSSL utility. Either option <b>-C</b> or option <b>-P</b> must be given in case of HTTPS. (Optional)</p>

</dd>
<dt id="rand-file:file"><b>-rand</b> file:file...</dt>
<dd>

<p>The files containing random data for seeding the random number generator. Multiple files can be specified, the separator is <b>;</b> for MS-Windows, <b>,</b> for VMS and <b>:</b> for all other platforms. (Optional)</p>

</dd>
<dt id="g-EGD_socket"><b>-g</b> EGD_socket</dt>
<dd>

<p>The name of an EGD socket to get random data from. (Optional)</p>

</dd>
<dt id="request">[request]...</dt>
<dd>

<p>List of files containing <b>RFC 3161</b> DER-encoded timestamp requests. If no requests are specified only one request will be sent to the server and it will be read from the standard input. (Optional)</p>

</dd>
</dl>

<h1 id="ENVIRONMENT-VARIABLES">ENVIRONMENT VARIABLES</h1>

<p>The <b>TSGET</b> environment variable can optionally contain default arguments. The content of this variable is added to the list of command line arguments.</p>

<h1 id="EXAMPLES">EXAMPLES</h1>

<p>The examples below presume that <b>file1.tsq</b> and <b>file2.tsq</b> contain valid timestamp requests, tsa.opentsa.org listens at port 8080 for HTTP requests and at port 8443 for HTTPS requests, the TSA service is available at the /tsa absolute path.</p>

<p>Get a timestamp response for file1.tsq over HTTP, output is written to file1.tsr:</p>

<pre><code>  tsget -h http://tsa.opentsa.org:8080/tsa file1.tsq</code></pre>

<p>Get a timestamp response for file1.tsq and file2.tsq over HTTP showing progress, output is written to file1.reply and file2.reply respectively:</p>

<pre><code>  tsget -h http://tsa.opentsa.org:8080/tsa -v -e .reply \
        file1.tsq file2.tsq</code></pre>

<p>Create a timestamp request, write it to file3.tsq, send it to the server and write the response to file3.tsr:</p>

<pre><code>  openssl ts -query -data file3.txt -cert | tee file3.tsq \
        | tsget -h http://tsa.opentsa.org:8080/tsa \
        -o file3.tsr</code></pre>

<p>Get a timestamp response for file1.tsq over HTTPS without client authentication:</p>

<pre><code>  tsget -h https://tsa.opentsa.org:8443/tsa \
        -C cacerts.pem file1.tsq</code></pre>

<p>Get a timestamp response for file1.tsq over HTTPS with certificate-based client authentication (it will ask for the passphrase if client_key.pem is protected):</p>

<pre><code>  tsget -h https://tsa.opentsa.org:8443/tsa -C cacerts.pem \
        -k client_key.pem -c client_cert.pem file1.tsq</code></pre>

<p>You can shorten the previous command line if you make use of the <b>TSGET</b> environment variable. The following commands do the same as the previous example:</p>

<pre><code>  TSGET=&#39;-h https://tsa.opentsa.org:8443/tsa -C cacerts.pem \
        -k client_key.pem -c client_cert.pem&#39;
  export TSGET
  tsget file1.tsq</code></pre>

<h1 id="SEE-ALSO">SEE ALSO</h1>

<p><a href="../man1/openssl.html">openssl(1)</a>, <a href="../man1/ts.html">ts(1)</a>, <a href="../man1/curl.html">curl(1)</a>, <b>RFC 3161</b></p>

<h1 id="COPYRIGHT">COPYRIGHT</h1>

<p>Copyright 2006-2020 The OpenSSL Project Authors. All Rights Reserved.</p>

<p>Licensed under the OpenSSL license (the &quot;License&quot;). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <a href="https://www.openssl.org/source/license.html">https://www.openssl.org/source/license.html</a>.</p>


</body>

</html>



Filemanager

Name Type Size Permission Actions
CA.pl.html File 9.34 KB 0644
asn1parse.html File 8.22 KB 0644
c_rehash.html File 5.68 KB 0644
ca.html File 30.91 KB 0644
ciphers.html File 35.11 KB 0644
cms.html File 29.84 KB 0644
crl.html File 4.7 KB 0644
crl2pkcs7.html File 4.21 KB 0644
dgst.html File 8.82 KB 0644
dhparam.html File 6.21 KB 0644
dsa.html File 7.03 KB 0644
dsaparam.html File 4.9 KB 0644
ec.html File 7.88 KB 0644
ecparam.html File 7.13 KB 0644
enc.html File 16.6 KB 0644
engine.html File 4.27 KB 0644
errstr.html File 1.88 KB 0644
gendsa.html File 4.03 KB 0644
genpkey.html File 13.78 KB 0644
genrsa.html File 5.15 KB 0644
list.html File 3.4 KB 0644
nseq.html File 3.26 KB 0644
ocsp.html File 20.86 KB 0644
openssl-asn1parse.html File 8.22 KB 0644
openssl-c_rehash.html File 5.68 KB 0644
openssl-ca.html File 30.91 KB 0644
openssl-ciphers.html File 35.11 KB 0644
openssl-cms.html File 29.84 KB 0644
openssl-crl.html File 4.7 KB 0644
openssl-crl2pkcs7.html File 4.21 KB 0644
openssl-dgst.html File 8.82 KB 0644
openssl-dhparam.html File 6.21 KB 0644
openssl-dsa.html File 7.03 KB 0644
openssl-dsaparam.html File 4.9 KB 0644
openssl-ec.html File 7.88 KB 0644
openssl-ecparam.html File 7.13 KB 0644
openssl-enc.html File 16.6 KB 0644
openssl-engine.html File 4.27 KB 0644
openssl-errstr.html File 1.88 KB 0644
openssl-gendsa.html File 4.03 KB 0644
openssl-genpkey.html File 13.78 KB 0644
openssl-genrsa.html File 5.15 KB 0644
openssl-list.html File 3.4 KB 0644
openssl-nseq.html File 3.26 KB 0644
openssl-ocsp.html File 20.86 KB 0644
openssl-passwd.html File 4.26 KB 0644
openssl-pkcs12.html File 15.5 KB 0644
openssl-pkcs7.html File 4.21 KB 0644
openssl-pkcs8.html File 13.2 KB 0644
openssl-pkey.html File 6.19 KB 0644
openssl-pkeyparam.html File 3.38 KB 0644
openssl-pkeyutl.html File 13.81 KB 0644
openssl-prime.html File 2.31 KB 0644
openssl-rand.html File 3.86 KB 0644
openssl-rehash.html File 5.68 KB 0644
openssl-req.html File 28.08 KB 0644
openssl-rsa.html File 7.74 KB 0644
openssl-rsautl.html File 7.86 KB 0644
openssl-s_client.html File 34.65 KB 0644
openssl-s_server.html File 32.71 KB 0644
openssl-s_time.html File 9.5 KB 0644
openssl-sess_id.html File 5.98 KB 0644
openssl-smime.html File 20.73 KB 0644
openssl-speed.html File 3.96 KB 0644
openssl-spkac.html File 5.62 KB 0644
openssl-srp.html File 2.69 KB 0644
openssl-storeutl.html File 4.63 KB 0644
openssl-ts.html File 26.59 KB 0644
openssl-tsget.html File 8.28 KB 0644
openssl-verify.html File 31.84 KB 0644
openssl-version.html File 2.34 KB 0644
openssl-x509.html File 36.53 KB 0644
openssl.html File 21.01 KB 0644
passwd.html File 4.26 KB 0644
pkcs12.html File 15.5 KB 0644
pkcs7.html File 4.21 KB 0644
pkcs8.html File 13.2 KB 0644
pkey.html File 6.19 KB 0644
pkeyparam.html File 3.38 KB 0644
pkeyutl.html File 13.81 KB 0644
prime.html File 2.31 KB 0644
rand.html File 3.86 KB 0644
rehash.html File 5.68 KB 0644
req.html File 28.08 KB 0644
rsa.html File 7.74 KB 0644
rsautl.html File 7.86 KB 0644
s_client.html File 34.65 KB 0644
s_server.html File 32.71 KB 0644
s_time.html File 9.5 KB 0644
sess_id.html File 5.98 KB 0644
smime.html File 20.73 KB 0644
speed.html File 3.96 KB 0644
spkac.html File 5.62 KB 0644
srp.html File 2.69 KB 0644
storeutl.html File 4.63 KB 0644
ts.html File 26.59 KB 0644
tsget.html File 8.28 KB 0644
verify.html File 31.84 KB 0644
version.html File 2.34 KB 0644
x509.html File 36.53 KB 0644