tree: 4ff30e334dfe36043ce59d58820c6ccc7a4d44e5 [path history] [tgz]
  1. 4b22d5a6aec99f3cdb79aa5ec06838479cd5ecba7164f7f22dc1d65f63d85708.pem
  2. 7d8ce822222b90c0b14342c7a8145d1f24351f4d1a1fe0edfd312ee73fb00149.pem
  3. 8b45da1c06f791eb0cabf26be588f5fb23165c2e614bf885562d0dce50b29b02.pem
  4. BUILD.gn
  5. c766a9bef2d4071c863a31aa4920e813b2d198608cb7b7cfe21143b836df09ea.pem
  6. c7ba6567de93a798ae1faa791e712d378fae1f93c4397fea441bb7cbe6fd5995.pem
  7. d487a56f83b07482e85e963394c1ecc2c9e51d0903ee946b02c301581ed99e16.pem
  8. d6f034bd94aa233f0297eca4245b283973e447aa590f310c77f48fdf83112254.pem
  9. e17890ee09a3fbf4f48b9c414a17d637b7a50647e9bc752322727fcc1742a911.pem
  10. README.md
  11. wosign_domains.gperf
net/data/ssl/wosign/README.md

WoSign Certificates

This directory contains the set of known active and legacy root certificates operated by WoSign CA Limited, including those of its wholly owned subisiary StartCom.

Trust in these root certificates is being phased out, as described at https://security.googleblog.com/2016/10/distrusting-wosign-and-startcom.html

Roots

The files in this directory are organized by the SHA-256 hash of the certificate file, while the policies are based on the SHA-256 hash of the subjectPublicKeyInfo contained within the certificate.

The following command can be used to extract the key hashes:

for f in *.pem; do openssl x509 -noout -pubkey -in "${f}" | openssl asn1parse -inform pem -out /tmp/pubkey.out -noout; digest=`cat /tmp/pubkey.out | openssl dgst -sha256 -c | sed s/:/,0x/g `; echo "0x${digest} ${f##*/}"; done | sort