1. Convert the JKS format certificate into a PFX format Keytool-importkeystore-srckeystore D:\server.jks-destkeystore D:\server.pfx-srcstoretype JKS- Deststoretype PKCS12 2. Converts a PFX format certificate to JKS format keytool-importkeystore-srckeystore/users/214310912070314.pfx-destkeystore/users/ 214310912070314.jks-srcstoretype Pkcs12-deststoretype JKs 3. Converts the PEM/KEY/CRT format certificate to the PFX format OpenSSL pkcs12-export-out server.pfx-inkey server.key-in server.crt 4. Convert PFX to pem/key/crt OpenSSL pkcs12-in server.pfx-nodes-out server.pem OpenSSL rsa-in server.pem-out server.key OpenSSL x509-in server.pem-out server.crt OpenSSL x509-in cert.crt-outform der-out cert.der OpenSSL x509-outform der-in cer Tificate.pem-out Certificate.der 5. Export an android BKS format certificate keytool-importcert-v-trustcacerts-alias location 1 \-file Location 2 \-ke for two-way authentication Ystore location 3-storetype BKS \-providerclass org.bouncycastle.jce.provider.BouncyCastleProvider \-providerpath Location 4- Storepass position 5 Position 1: It's a random alias location. 2:cer or CRT certificate full address location 3: The location of the BKs file after the build, it is recommended to write full address location 4: Above download JCE Provider package Location5: Post-generated certificate password keytool-importcert-v-trustcacerts-alias server \-FILE/USERS/CA/SERVER/SERVER.CRT \-keystore/users/ca/s Erver/server.bks-storetype bks \-providerclass org.bouncycastle.jce.provider.BouncyCastleProvider \-providerpath/ Users/bcprov-ext-jdk15on-158.jar-storepass Server