For more information about commands, add them later. Time is tight. Sorry.
One-way Verification Successful:
1. production server certificate:
Key tool-validity 365-genkey-v-alias server-keyalg RSA-keystore D: \ SSL \ BKS \ Server. jks-dname "cn = 10.100.100.24, ou = sengled, O = sengled, L = Haidian, St = Beijing, c = cn"-storepass 123456-keypass 123456
2. Export the certificate
Keytool-exportcert-v-alias server-keystore D: \ SSL \ BKS \ Server. jks-storepass 123456-RFC-file D: \ SSL \ BKS \ Server. Cert
3. Produce client certificates available for Android
Keytool-importcert-keystore D: \ SSL \ BKS \ Client. BKS-file D: \ SSL \ BKS \ Server. cert-storetype BKS-provider Org. bouncycastle. JCE. provider. bouncycastleprovider-storepass 123456
4. Two different client certificates for the same server are successfully authenticated:
Two-way (Android) Verification Successful
Keytool-validity 365-genkey-v-alias server-keyalg RSA-keystore D: \ SSL \ Server. keystore-dname "cn = 10.100.100.24, ou = sengled, O = sengled, L = Haidian, St = Beijing, c = cn"-storepass 123456-keypass 123456
Key tool-validity 365-genkeypair-v-alias client-BKS-keyalg RSA-storetype BKS-keystore D: \ SSL \ client-bks.bks-dname "cn = client, ou = sengled, O = sengled, L = Haidian, St = Beijing, c = cn "-storepass 123456-keypass 123456
Keytool-export-v-alias client-BKS-keystore D: \ SSL \ client-bks.bks-storetype BKS-storepass 123456-RFC-file D: \ SSL \ client-bks.crt
Keytool-export-v-alias server-keystore D: \ SSL \ Server. keystore-storepass 123456-RFC-file D: \ SSL \ Server. CRT
Keytool-importcert-keystore D: \ SSL \ client-bks-trust.bks-file D: \ SSL \ Server. CRT-storetype BKS-provider org. bouncycastle. JCE. provider. bouncycastleprovider-storepass 123456
Keytool-import-v-alias client-BKS-file D: \ SSL \ client-bks.crt-keystore D: \ SSL \ Server. keystore-storepass 123456
IOS: two-way Verification Successful
Keytool-validity 365-genkeypair-v-alias client-Ios-keyalg RSA-storetype PKCS12-keystore D: \ SSL \ client-ios.p12-dname "cn = client-Ios, ou = sengled, O = sengled, L = Haidian, St = Beijing, c = cn "-storepass 123456-keypass 123456
Keytool-export-v-alias client-Ios-keystore D: \ SSL \ client-ios.p12-storetype PKCS12-storepass 123456-RFC-file D: \ SSL \ client-ios.cer-provider Org. bouncycastle. JCE. provider. bouncycastleprovider-storepass 123456
Keytool-export-v-alias server-keystore D: \ SSL \ Server. keystore-storepass 123456-RFC-file D: \ SSL \ server-ios.cer
Keytool-import-v-alias server-file D: \ SSL \ server-ios.cer-keystore D: \ SSL \ client-ios.truststore-storepass 123456
Keytool-import-v-alias client-Ios-file D: \ SSL \ client-ios.cer-keystore D: \ SSL \ Server. keystore-storepass 123456
V,
IOS-jks: two-way success
Key tool-validity 365-genkey-v-alias server-keyalg RSA-keystore D: \ SSL \ iOS-jks \ Server. keystore-dname "cn = 10.100.100.24, ou = sengled, O = sengled, L = Haidian, St = Beijing, c = cn"-storepass 123456-keypass 123456
Keytool-validity 365-genkeypair-v-alias client-keyalg RSA-storetype PKCS12-keystore D: \ SSL \ iOS-jks \ Client. p12-dname "cn = client, ou = sengled, O = sengled, L = Haidian, St = Beijing, c = cn"-storepass 123456-keypass 123456
Keytool-export-v-alias client-keystore D: \ SSL \ iOS-jks \ Client. p12-storetype PKCS12-storepass 123456-RFC-file D: \ SSL \ iOS-jks \ Client. cer-provider Org. bouncycastle. JCE. provider. bouncycastleprovider-storepass 123456
Keytool-export-v-alias server-keystore D: \ SSL \ iOS-jks \ Server. keystore-storepass 123456-RFC-file D: \ SSL \ iOS-jks \ Server. CER
Keytool-import-v-alias server-file D: \ SSL \ iOS-jks \ Server. cer-keystore D: \ SSL \ iOS-jks \ Client. truststore-storepass 123456
Keytool-import-v-alias client-file D: \ SSL \ iOS-jks \ Client. cer-keystore D: \ SSL \ iOS-jks \ Server. keystore-storepass 123456
Keytool command for SSL clearance (III)