Plan and review TLS / HTTPS hygiene with a practical checklist, copy-ready OpenSSL commands for your hostname, and a shortcut to Qualys SSL Labs for deep testing. Web pages cannot read arbitrary sites’ certificate chains — this tool stays local like our APK Analyzer and APK String Extractor: nothing is sent to DroidXP.
Browsers do not expose peer certificates to JavaScript for third-party hosts. Use the checklist and OpenSSL on your machine, or SSL Labs, for real inspection.
Used for OpenSSL -servername (SNI) and the SSL Labs link.
On Windows, use WSL, Git Bash, or install OpenSSL; PowerShell alternatives vary by version.
It is a planning aid: a checklist you can tick through, OpenSSL commands parameterized by hostname and port, and links to established external testers. It is not an automated scanner run by DroidXP — your browser cannot fetch another site’s TLS certificate chain through standard web APIs, and we do not proxy your traffic through our servers.
openssl s_client on your laptop/server) shows PEM, dates, and chain details when pointed at HOST:PORT.
Checklist state and hostname/port are saved with localStorage in your browser only. DroidXP does not receive your hostname or checklist. SSL Labs and Mozilla links open third-party sites under their terms.
No. This page does not initiate connections to your hostname from DroidXP infrastructure. You run OpenSSL or SSL Labs from your own environment.
Standard JavaScript in a web page cannot read the TLS peer certificate for arbitrary third-party origins. That limitation protects users from fingerprinting; server-side or CLI tools are the right place for chain inspection.
Qualys SSL Labs hosts a widely used public test that grades TLS configuration. It is a third-party service — subject to their rate limits and terms; results are not from DroidXP.
They only open a TLS client to the host/port you entered — typical for admins. Run from a trusted machine; avoid pasting secrets into shared terminals. Adjust for your OS (Windows may need WSL or a packaged OpenSSL).
Set the Port field. OpenSSL and SSL Labs may need manual adjustment for some setups; SSL Labs defaults to 443 unless you use their advanced options elsewhere.
Self-signed certs still need manual trust configuration. The checklist applies, but browsers will warn until your CA/trust store is updated appropriately — not something this page can fix automatically.
Confirm SAN coverage for every name users hit. Wildcards do not cover all subdomains in every scenario — verify against your CA’s rules and your DNS layout.
Clipboard data can be read by other apps on some systems. Clear sensitive commands after use on shared machines.
The Hash Generator computes digests of bytes. This page is about TLS deployment review — complementary, not the same.
Use it as a starting checklist only. Compliance programs require evidence, scope, and often auditor-reviewed controls — not a browser checklist alone.
In your browser’s localStorage for this origin. Clearing site data or another browser profile removes it — it is not synced to DroidXP.