Field | Value | Copy |
---|---|---|
{{ row[0] }} | {{ row[1] }} | |
Nothing to show yet. |
X.509 certificates are structured digital documents that identify a subject and its issuer, list a serial number, and define when the credential is valid. People often call them TLS or SSL certificates, and you may need to convert PEM to DER when exporting assets or preparing artifacts for automated deployments across environments in varied tooling.
You enter a certificate as text or by dropping a file, then select the target format to convert or inspect. Inputs accept PEM blocks, base64 strings, or common certificate files, while outputs include PEM with wrapped lines, raw DER bytes, or a compact summary of key fields shown as a table and downloadable JSON payload.
For example, you might export a server certificate as a .der file, convert it to readable PEM, and review the subject name alongside the validity period before installing it on staging or production. Check the issuer and serial as well, and avoid sharing materials obtained from unknown or untrusted sources. Open converted files only when you trust the origin.
When pasting base64, you can switch strict parsing on to fail fast if stray characters appear, which helps catch copy errors early and keeps the result predictable. If you paste a PEM chain, only the first certificate is shown for inspection and conversion, so verify each part separately to ensure nothing is missed during review.
The converter detects input as PEM, base64, or binary by pattern and length, then decodes to a byte array and parses the structure as an X.509 certificate. It extracts the subject common name, issuer common name, serial number, and the “Not Before” and “Not After” timestamps. A derived value reports days remaining by comparing the expiration to the current clock. You can emit a PEM block with configurable line wrapping or a binary DER stream, or skip conversion and view a concise summary as a table and JSON payload. Processing is deterministic for identical inputs.
Symbol | Meaning | Unit/Datatype | Source |
---|---|---|---|
tnotAfter | Certificate expiration timestamp | ms since epoch | Derived from input |
tnow | Current time at evaluation | ms since epoch | Client clock |
days | Remaining validity days, rounded up | integer | Computed |
Parameter | Meaning | Unit/Datatype | Typical Range | Sensitivity | Notes |
---|---|---|---|---|---|
outputFormat | Target encoding | enum | pem · der · info | High | Controls conversion vs summary. |
pemWrap | PEM body line width | integer | ≥ 16 | Low | Default 64 characters. |
strictB64 | Base64 strictness toggle | boolean | on · off | Medium | Rejects non‑base64 characters when enabled. |
Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
---|---|---|---|---|---|---|
Input text | string | — | — | /-----BEGIN [^-]+-----[\s\S]*?-----END [^-]+-----/i |
Parse or conversion error. | Paste PEM, base64, or raw… |
Base64 detection | regex | — | — | ^[A-Za-z0-9+/=\s]+$ & length % 4 = 0 |
Strict parsing error. | — |
PEM wrap | number | 16 | — | step = 1 | — | — |
Output format | select | — | — | pem · der · info | — | — |
File input | file | — | — | .pem .crt .cer .der .txt | — | — |
Input | Accepted Families | Output | Encoding/Precision | Rounding |
---|---|---|---|---|
Certificate text | PEM block; base64 blob | PEM | Wrapped lines, header/footer | — |
Certificate bytes | DER file or binary paste | DER | Binary stream | — |
Any of the above | PEM · base64 · DER | Info (table/JSON) | JSON fields: inputs, detected, parsed | Days rounded up (ceiling) |
YYYY‑MM‑DD HH:mm:ss
, derived from ISO strings.Processing occurs in your browser. Files are processed locally; nothing is uploaded. No data is transmitted or stored server‑side.
Decoding, parsing, and encoding are linear in input size. Large byte arrays are chunked in 32 768‑byte blocks during string conversion to keep memory stable.
.der
certificate (~1.6 KiB). Action: set Output format to PEM and PEM wrap to 64. Result: a PEM block with headers and wrapped body, plus a summary with CN, issuer, validity, and computed days remaining.
X.509 public‑key certificates and their PEM and DER encodings are widely used conventions for distributing certificate data across tooling and platforms.
Files are processed locally in your browser; nothing is uploaded. No data is transmitted or stored server‑side.
Follow these steps to convert or inspect a certificate.
You now have a converted file or a concise summary ready for audits, tickets, or deployment notes.
No. Processing happens in your browser. Files are handled locally, and nothing is transmitted or retained by a server.
No sign‑in required.Inputs: PEM text, base64 blobs, or .cer/.crt/.der files. Outputs: PEM text, DER bytes, or an info summary as table and JSON.
PEM wrap width is configurable.No. It parses and converts only. The summary lists key fields but does not verify trust, chain order, or revocation.
Review trust with your PKI tooling.The input may be malformed, not a certificate, or encoded incorrectly. Enable strict base64 to catch stray characters, or try a clean PEM export.
Check BEGIN/END lines and padding.Validity timestamps are derived from ISO strings and shown as YYYY‑MM‑DD HH:mm:ss
in UTC for consistency.
No. The converter targets certificates. Private keys and certificate signing requests are not parsed.
Use dedicated tooling for keys or CSRs.When a chain is pasted, only the first item is shown and converted. Process each certificate individually if you need separate outputs.
Order and trust are not evaluated.DER is binary. Use the download button to save a correct file. Copying as text may corrupt bytes.
Prefer download for byte‑exact outputs.There is no account requirement or sign‑in. You can convert and inspect certificates directly in the browser.
Functionality is client‑side.