| Index: net/data/ssl/wosign/README.md
 | 
| diff --git a/net/data/ssl/wosign/README.md b/net/data/ssl/wosign/README.md
 | 
| new file mode 100644
 | 
| index 0000000000000000000000000000000000000000..2c53dafbdf1d9cc21f3debbd9b06f6b99bc52c15
 | 
| --- /dev/null
 | 
| +++ b/net/data/ssl/wosign/README.md
 | 
| @@ -0,0 +1,19 @@
 | 
| +# WoSign Certificates
 | 
| +
 | 
| +This directory contains the set of known active and legacy root certificates
 | 
| +operated by WoSign CA Limited, including those of its wholly owned subisiary
 | 
| +StartCom.
 | 
| +
 | 
| +Trust in these root certificates is being phased out, as described at
 | 
| +<https://security.googleblog.com/2016/10/distrusting-wosign-and-startcom.html>
 | 
| +
 | 
| +## Roots
 | 
| +
 | 
| +The files in this directory are organized by the SHA-256 hash of the
 | 
| +certificate file, while the policies are based on the SHA-256 hash of
 | 
| +the subjectPublicKeyInfo contained within the certificate.
 | 
| +
 | 
| +The following command can be used to extract the key hashes:
 | 
| +
 | 
| +`` for f in *.pem; do openssl x509 -noout -pubkey -in "${f}" | openssl asn1parse -inform pem -out /tmp/pubkey.out -noout; digest=`cat /tmp/pubkey.out | openssl dgst -sha256 -c | sed s/:/,0x/g `; echo "0x${digest} ${f##*/}"; done | sort ``
 | 
| +
 | 
| 
 |