| OLD | NEW | 
|---|
|  | (Empty) | 
| 1 # WoSign Certificates |  | 
| 2 |  | 
| 3 This directory contains the set of known active and legacy root certificates |  | 
| 4 operated by WoSign CA Limited, including those of its wholly owned subisiary |  | 
| 5 StartCom. |  | 
| 6 |  | 
| 7 Trust in these root certificates is being phased out, as described at |  | 
| 8 <https://security.googleblog.com/2016/10/distrusting-wosign-and-startcom.html> |  | 
| 9 |  | 
| 10 ## Roots |  | 
| 11 |  | 
| 12 The files in this directory are organized by the SHA-256 hash of the |  | 
| 13 certificate file, while the policies are based on the SHA-256 hash of |  | 
| 14 the subjectPublicKeyInfo contained within the certificate. |  | 
| 15 |  | 
| 16 The following command can be used to extract the key hashes: |  | 
| 17 |  | 
| 18 `` for f in *.pem; do openssl x509 -noout -pubkey -in "${f}" | openssl asn1parse
     -inform pem -out /tmp/pubkey.out -noout; digest=`cat /tmp/pubkey.out | openssl 
    dgst -sha256 -c | sed s/:/,0x/g `; echo "0x${digest} ${f##*/}"; done | sort `` |  | 
| 19 |  | 
| OLD | NEW | 
|---|