OSS Nokalva Home Page
>
Resources
>
ASN1.IO
> PKI-Inspector (beta)
×
The following license will be emailed to you
No promo exists.
Buy
Sign Up for FREE
•
FREE promo license
questionnaire
One minute
▼Input
pin
Step 1: Schema provides structure and semantics for the data. If you know the schema, please provide it here. If you also know the type, either select one of the "Popular types", or select a type from the Decode results. You can also provide a partial schema, i.e., for the payload embedded in your PKI data by checking the checkbox. If the type is unknown, try one from the "Autodetect" or no schema.
Schema:
No schema
Enter schema manually
Upload schema (.asn)
CMS(RFC5652) - Digest [CryptographicMessageSyntax-2010.ContentInfo]
OCSP(RFC6960) - Request [OCSP-2013-08.OCSPRequest]
OCSP(RFC6960) - Response [OCSP-2013-08.OCSPResponse]
PKCS#1 - RSA Private Key [PKCS-1.RSAPrivateKey]
PKCS#10 - CSR [PKCS-10.CertificationRequest]
PKCS#12 - PFX [PKCS-12.PFX]
PKCS#7 - CMS [PKCS-7.ContentInfo]
PKCS#8 - Key [AsymmetricKeyPackageModuleV1.OneAsymmetricKey]
PKIX (X.509,RFC5280,RFC5911) - Self signed certificate [PKIX1Explicit-2009.Certificate]
CMPs (detect type)
CMS (RFC5652) (detect type)
PKCS (detect type)
PKIX - Certificate, CRL Profile (X.509,RFC5280,RFC5911) (detect type)
try them all - PKCS, CMS, PKIX, etc_ (detect type)
Step 2: Provide your data for the above schema/type (if any). You can also select one of the Samples data to see how the inspector works.
Data:
Enter manually (HEX or Base64)
Upload (.der, .pem, .cer, .crl, .csr, .crt, .key, .p12, .p7b, .p7m, .p7r, .p7s, .pfx, .spc, .p8, .p10, .p7c)
CMS(RFC5652) - Digest [CryptographicMessageSyntax-2010.ContentInfo].pem
OCSP(RFC6960) - Request [OCSP-2013-08.OCSPRequest].der
OCSP(RFC6960) - Response [OCSP-2013-08.OCSPResponse].der
PKCS#1 - RSA Private Key [PKCS-1.RSAPrivateKey].pem
PKCS#10 - CSR [PKCS-10.CertificationRequest].pem
PKCS#12 - PFX [PKCS-12.PFX].p12
PKCS#7 - CMS [PKCS-7.ContentInfo].p7b
PKCS#8 - Key [AsymmetricKeyPackageModuleV1.OneAsymmetricKey].der
PKIX (X.509,RFC5280,RFC5911) - Self signed certificate [PKIX1Explicit-2009.Certificate]_.pem
-----BEGIN CERTIFICATE----- MIIErjCCA5agAwIBAgIUe/En7HI0dnFgCnVWmyjnkOYK7OkwDQYJKoZIhvcNAQEL BQAwgZIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApOZXcgSmVyc2V5MREwDwYDVQQH DAhTb21lcnNldDEaMBgGA1UECgwRT1NTIE5va2FsdmEsIEluYy4xDDAKBgNVBAsM A1ImRDEUMBIGA1UEAwwLd3d3Lm9zcy5jb20xGzAZBgkqhkiG9w0BCQEWDGluZm9A b3NzLmNvbTAeFw0yMTExMjUwNzExMjFaFw0yMjExMjUwNzExMjFaMIGSMQswCQYD VQQGEwJVUzETMBEGA1UECAwKTmV3IEplcnNleTERMA8GA1UEBwwIU29tZXJzZXQx GjAYBgNVBAoMEU9TUyBOb2thbHZhLCBJbmMuMQwwCgYDVQQLDANSJkQxFDASBgNV BAMMC3d3dy5vc3MuY29tMRswGQYJKoZIhvcNAQkBFgxpbmZvQG9zcy5jb20wggEi MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDA9x3cZTstWhdx7isWvl4iGyOK m6D91pdOklnhVmVHT7Y6ah9+JCwU+SGHUiy2zHlTRUMkRvET1PU1PcY2AR4AcnCr 5QO9y1c1mD6TGTFr1568978rLrXBT5wuvHHs6MGM0OfLGttSfVjODuScxjde9MeM zSXqPhzncb67OagNYLv3D8hFOJAmLmlwVOuUNofmWMddbXVSEAzpNkPrihX9itxI HDGmVso3qQFZFBccrzooP7rJQgBD1Gidsv4tl5p1NxFtsxkL6k8EWWBHWub17apB f3fuLu5dJs/Dc3l4GzMf8Bd7cgZC7aaIIYzjZ0I2thrSIzRrt1UV6Off4Ee9AgMB AAGjgfkwgfYwVwYDVR0RBFAwToIHYXNuMS5pb4ERbWFya2V0aW5nQG9zcy5jb22B D3N1cHBvcnRAb3NzLmNvbYEMam9ic0Bvc3MuY29tgRF3ZWJtYXN0ZXJAb3NzLmNv bTApBglghkgBhvhCAQ0EHBYaVGhpcyBpcyBhIERFTU8gY2VydGlmaWNhdGUwCwYD VR0PBAQDAgbAMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHBzOi8vd3d3Lm9zcy5jb20v c3VwcG9ydC9vc3NjYS5jcmwwGwYDVR0eBBQwEqEQMA6BDGpvYnNAb3NzLmNvbTAO BgMqAwQBAf8EBAECAwQwDQYJKoZIhvcNAQELBQADggEBAA5Mb8yRsV3ZYGy8f4VJ RC++dXbLetrErl9UvMYGTxlZ25WNTSEkqgRRWVy0if6mNSc/3Kv26nmAr5467szw XK2+M3K0cY4KBfXhZOFaobnAcbrMbr3B0pDV4QCfIqwHfubUvAAGWNicFhIxassm hkxlsUQRowsSPWRw0g/I96NmI95KOqmuRIokk4ZV+xWdenLqKNgjEanSgZ1s6eJ4 t3OXRmLqrn2rlSZb9UOLMg5n3FwuGpiXQb7ZkFHSikzVUJgOESwC/jchyB4ICpZt vymmKABciNDYMWW8YFm7yRBLTUYxLopcXUtwHAhlJ0YthASSJx35lfUniKVEzG4C rzo= -----END CERTIFICATE-----
Options:
Max characters to display for values
Truncates long values to the specified number of characters (0 for no truncation).
Display constructed strings (BER encoded, over 1000 bytes fragments) as
fragmented
merged
Allow errors for encapsulated data
OCTET STRING and BIT STRING are parsed to detect embedded encodings even when there are parsing errors.
BIT STRING(s) display format
length-dependent
binary
hexadecimal
OCTET STRING(s) display format
ASCII
hexadecimal
Show missing OPTIONALs
OPTIONAL fields defined in the schema, but absent in the data.
Output