Certificate tools

Please select the function you wish to perform on the menu to the left. Below is a detailed description of each page. If you wish to bookmark an individual page, just use the link to the left.

Certificate
Decodes an X.509 certificate into the individual parts that such a certificate consist of (Windows file type cer).
CSR
Decodes a Certificate Signing Request into the individual parts that it contains. You can also create a CSR for this function.
Split PKCS#7
Shows the individual certificates of a PKCS#7 file (Windows filetype crt).
Create PKCS#7
Combine a number of ordinary X.509 certificates to a PKCS#7 file.
DER to PEM
Converts a binary DER file to text (the large block of random looking text needed on the other parts of this page).
Parse ASN.1
Shows the ASN.1 sequences that one of the above blocks of text actually is created from. It's highly technical and may be difficult to understand.
Show CRL
Decode a file containing a Certificate Revocation List.
RSA private key
SECURITY RISK! Displays the individual parts of a RSA private key.
PKCS#12
SECURITY RISK! Displays the individual sections of a PKCS#12 file (Windows filetype pfx).
Debug
Allows you to open a SSL connection back to your server and show some detailed debug information about the connection.

Security risks

Two of the options above allows you to transfer a private key across the Internet without any protection at all. This is a serious security risk and you must assume that the private key has been compromised if you use the options above. If by nobody else, then by the author of this page, as I will keep a copy of your private key just to discourage you from using these functions.

Please note that if you use a live certificate with the dangerous functions above, then your CA requires you to revoke the key immediately. If you don't, you may loose a number of priviledges associated with the certificate, ask your CA for more.

I'm providing the dangerous functions above for educational purposes only. Your security is not my problem.