<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: phil_r</title><link>https://news.ycombinator.com/user?id=phil_r</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 13 Apr 2026 08:19:22 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=phil_r" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by phil_r in "Ask HN: What Are You Working On? (April 2026)"]]></title><description><![CDATA[
<p>I built a desktop X.509 certificate decoder, and a user recently asked for a CLI version that outputs JSON — so I ended up building x509dump.<p>It’s a command-line tool for decoding certificates and CSRs into structured JSON rather than OpenSSL-style text output.<p>It decodes the underlying ASN.1/DER structure so fields and extensions are fully expanded, making the output easier to work with programmatically.<p>I’m planning to expand it to support more PKI artefacts (e.g. CRLs, Keys) over time.<p>I’m also planning to handle less well-formed inputs (e.g. missing PEM headers/footers, whitespace, or extra surrounding text), which tends to come up in real-world data.<p>It’s free to download — would be great to get feedback if anyone tries it.<p><a href="https://www.redkestrel.co.uk/products/x509dump" rel="nofollow">https://www.redkestrel.co.uk/products/x509dump</a></p>
]]></description><pubDate>Mon, 13 Apr 2026 02:05:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47746705</link><dc:creator>phil_r</dc:creator><comments>https://news.ycombinator.com/item?id=47746705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47746705</guid></item></channel></rss>