Certificate format

PEM Sample Files

PEM (.pem) files store base64-encoded certificate or key material. Use sample PEM files to test parser recognition and safe certificate handling in TLS-related workflows.

7 files All to 1MB SHA256 verified Manifest included
Quick facts
CategoryCertificate
Total Files7
Extension.pem
MIMEapplication/pem-certificate-chain
ManifestJSON
Request Related Coverage
Files first

Start with one representative file.

Starter file

pem_ca_chain_bundle_sample.pem · 2.7 KB

Download

CA Chain PEM

PEM chain bundle for trust-store and certificate-chain validation.

pem_ca_chain_bundle_sample.pem · 2.7 KB
Download Fixture

Server Fullchain PEM

PEM fullchain fixture for TLS bundle loading and leaf-chain validation.

pem_fullchain_server_bundle_sample.pem · 4.2 KB
Download Fixture
Filename Size MIME Download
.pem Pack Realistic SHA256 c5ea8207b7bf...
2.7 KB application/pem-certificate-chain Download
.pem Pack Realistic SHA256 fac5be54309b...
3.2 KB application/pem-certificate-chain Download
.pem Pack Realistic SHA256 6227dbc67782...
4.2 KB application/pem-certificate-chain Download
.pem SHA256 a4e55525d782...
1.0 MB application/pem-certificate-chain Download
.pem SHA256 60f65cb938b6...
200.0 KB application/pem-certificate-chain Download
.pem SHA256 59774141e85e...
500.0 KB application/pem-certificate-chain Download
.pem SHA256 d34ab335f7a6...
50.0 KB application/pem-certificate-chain Download
Use cases

Pick the next task, not just the next file.

Use the file table first, then branch into compare or FAQ only if the task needs more context.

Compare and decide

Keep the next decision one step away.

FAQ and reference

Keep the operational details quiet.

Checksum Verification

Use checksums to confirm file integrity after download.

shasum -a 256 your_file_name_here
# Compare output with SHA256 values listed above.
Where is the machine-readable manifest?

Use the manifest when you need stable names, SHA256 values, and URLs for automation.

Validation Methodology
  • Validate certificate chains, key handling, and parser behavior before any deployment use.
  • Test encrypted versus unencrypted private-key handling in your loaders.
  • Confirm trust-store import logic and CSR metadata inspection paths.
Fixture Matrix

Use the curated PEM matrix to choose the right clean, edge-case, and broken fixtures for this format.

Open Matrix