| Index: net/data/ssl/wosign/README.md
|
| diff --git a/net/data/ssl/wosign/README.md b/net/data/ssl/wosign/README.md
|
| deleted file mode 100644
|
| index 2c53dafbdf1d9cc21f3debbd9b06f6b99bc52c15..0000000000000000000000000000000000000000
|
| --- a/net/data/ssl/wosign/README.md
|
| +++ /dev/null
|
| @@ -1,19 +0,0 @@
|
| -# WoSign Certificates
|
| -
|
| -This directory contains the set of known active and legacy root certificates
|
| -operated by WoSign CA Limited, including those of its wholly owned subisiary
|
| -StartCom.
|
| -
|
| -Trust in these root certificates is being phased out, as described at
|
| -<https://security.googleblog.com/2016/10/distrusting-wosign-and-startcom.html>
|
| -
|
| -## Roots
|
| -
|
| -The files in this directory are organized by the SHA-256 hash of the
|
| -certificate file, while the policies are based on the SHA-256 hash of
|
| -the subjectPublicKeyInfo contained within the certificate.
|
| -
|
| -The following command can be used to extract the key hashes:
|
| -
|
| -`` for f in *.pem; do openssl x509 -noout -pubkey -in "${f}" | openssl asn1parse -inform pem -out /tmp/pubkey.out -noout; digest=`cat /tmp/pubkey.out | openssl dgst -sha256 -c | sed s/:/,0x/g `; echo "0x${digest} ${f##*/}"; done | sort ``
|
| -
|
|
|