| OLD | NEW |
| (Empty) |
| 1 # WoSign Certificates | |
| 2 | |
| 3 This directory contains the set of known active and legacy root certificates | |
| 4 operated by WoSign CA Limited, including those of its wholly owned subisiary | |
| 5 StartCom. | |
| 6 | |
| 7 Trust in these root certificates is being phased out, as described at | |
| 8 <https://security.googleblog.com/2016/10/distrusting-wosign-and-startcom.html> | |
| 9 | |
| 10 ## Roots | |
| 11 | |
| 12 The files in this directory are organized by the SHA-256 hash of the | |
| 13 certificate file, while the policies are based on the SHA-256 hash of | |
| 14 the subjectPublicKeyInfo contained within the certificate. | |
| 15 | |
| 16 The following command can be used to extract the key hashes: | |
| 17 | |
| 18 `` for f in *.pem; do openssl x509 -noout -pubkey -in "${f}" | openssl asn1parse
-inform pem -out /tmp/pubkey.out -noout; digest=`cat /tmp/pubkey.out | openssl
dgst -sha256 -c | sed s/:/,0x/g `; echo "0x${digest} ${f##*/}"; done | sort `` | |
| 19 | |
| OLD | NEW |