Note: (In case you don't have keytools, go to /usr/java/server-jdk/jre/bin/keytool or use ps aux |grep java to see where java is installed)
keytool -printcert -v -file certificate.crt
keytool -list -v -keystore keystore.jks
keytool -list -v -keystore keystore.jks -alias alias_certificate
keytool -import -trustcacerts -file certificate.crt -alias alias-cert -keystore keystore.jks
keytool -import -trustcacerts -file certificate.crt -noprompt -alias alias-cert -keystore keystore.jks
You can add the option -storepass at the end, and then the key to add the password directly, or without it so it ask you later to write it.
keytool -export -alias alias-cert -file certificate.crt -keystore keytools.jks
Search the alias before.
keytool -export -alias alias-cert -keystore keystrore.jks -rfc -file certificate.crt -storepass clave
keytool -v -importkeystore -srckeystore keystore.jks -srcalias alias-cert -destkeystore myp12file.p12 -deststoretype PKCS12
openssl pkcs12 -in myp12file.p12 -out private.key
openssl pkcs12 -info -in archivo.pfx
openssl req -text -noout -verify -in CSR.csr
openssl rsa -in privateKey.key -check
openssl x509 -noout -text -in certificate.crt
openssl pkcs12 -info -in keyStore.p12
openssl x509 -noout -modulus -in /etc/ssl/ca/certs/ca.crt | openssl md5
openssl rsa -noout -modulus -in /etc/ssl/ca/private/ca.key | openssl md5
openssl req -noout -modulus -in CSR.csr | openssl md5
openssl s_client -showcerts -connect google.com:443 </dev/null 2>/dev/null|openssl x509 -outform PEM >certificate.crt
openssl x509 -noout -fingerprint -md5 -inform pem -in certificate.crt
openssl pkcs12 -export -out archivo.pfx -inkey private.key -in certificate.crt
openssl pkcs12 -export -out archivo.pfx -inkey private.key -in certificate.crt -in intermediate.crt -in rootca.crt
openssl crl2pkcs7 -nocrl -certfile CHAINED.pem | openssl pkcs7 -print_certs -text -noout
openssl crl2pkcs7 -nocrl -certfile cabundle.ca | openssl pkcs7 -print_certs -text -noout
openssl x509 -in broken.pem -out correct.pem