// convert the .pfx file to pem format
// 1. Create pem file
// in command line, input the following:
// D:/OpenSSL/bin>openssl pkcs12 -in nitacheng-new.pfx -out nitacheng-new.pem -nodes
// Enter Import Password:
// MAC verified OK
// 2. Create .cer and .key file
// a) Create two blank documents with the extensions .cer and .key.
// b) Start 'WordPad' and open the .pem file you created in step 2.
// c) Open the blank .cer and .key files in "Notepad".
// d) Locate the section of the file that begins with
// '-----BEGIN RSA PRIVATE KEY-----' in 'WordPad'.
// e) Copy that line and everything under it up to and including
// '-----END RSA PRIVATE KEY-----'
// f) Paste that text into your .key file and save it.
// g) Locate the section of the file that begins with
// '-----BEGIN CERTIFICATE-----' in 'WordPad'.
// h) Copy that line and everything under it up to and including
// '-----END CERTIFICATE-----'.
// i) Paste that text into your .cer file and save it.
// j) Close 'WordPad' and both instances of 'Notepad'.
// 1. Create pem file
// in command line, input the following:
// D:/OpenSSL/bin>openssl pkcs12 -in nitacheng-new.pfx -out nitacheng-new.pem -nodes
// Enter Import Password:
// MAC verified OK
// 2. Create .cer and .key file
// a) Create two blank documents with the extensions .cer and .key.
// b) Start 'WordPad' and open the .pem file you created in step 2.
// c) Open the blank .cer and .key files in "Notepad".
// d) Locate the section of the file that begins with
// '-----BEGIN RSA PRIVATE KEY-----' in 'WordPad'.
// e) Copy that line and everything under it up to and including
// '-----END RSA PRIVATE KEY-----'
// f) Paste that text into your .key file and save it.
// g) Locate the section of the file that begins with
// '-----BEGIN CERTIFICATE-----' in 'WordPad'.
// h) Copy that line and everything under it up to and including
// '-----END CERTIFICATE-----'.
// i) Paste that text into your .cer file and save it.
// j) Close 'WordPad' and both instances of 'Notepad'.