<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-08" category="std" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-08"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <abstract>
      <?line 169?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50% while also significantly reducing memory and code size compared to ASN.1.  The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re-encoding for the signature to be verified. The document also specifies C509 Certificate Signing Requests, C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 173?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc. The use of CBOR also reduces code complexity, code size, memory usage, and CPU usage.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates, and is designed to render a compact encoding of certificates used in constrained environments.</t>
      <t>The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
        </li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document also specifies C509 Certificate Signing Requests <xref target="CSR"/>, COSE headers for use of the C509 certificates with COSE <xref target="cose"/>, and a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This specification makes use of the terminology in <xref target="RFC2986"/>, <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers or complemented with CBOR OID and PEN encodings <xref target="RFC9090"/>, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>
        <ul spacing="normal">
          <li>
            <t>version. The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type"/>.</t>
          </li>
          <li>
            <t>serialNumber. The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
          </li>
          <li>
            <t>signature. The 'signature' field is always the same as the 'signatureAlgorithm' field and therefore omitted from the CBOR encoding.</t>
          </li>
          <li>
            <t>issuer. In the general case, the sequence of 'RelativeDistinguishedName' is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as either  </t>
            <ul spacing="normal">
              <li>
                <t>a (CBOR int, CBOR text string) pair, or</t>
              </li>
              <li>
                <t>a (unwrapped CBOR OID, CBOR bytes) pair, or</t>
              </li>
              <li>
                <t>a (CBOR PEN, CBOR bytes) pair.</t>
              </li>
            </ul>
            <t>
The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded 'common name' it is encoded as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>If the text string has an even length <contact fullname="≥"/> 2 and contains only the symbols '0'–'9' or 'a'–'f', it is encoded as a CBOR byte string, prefixed with an initial byte set to '00'.</t>
              </li>
              <li>
                <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where 'H' is one of the symbols '0'–'9' or 'A'–'F' it is encoded as a CBOR byte string prefixed with an initial byte set to '01', for a total length of 9. An EUI-64 mapped from a 48-bit MAC address (i.e., of the form "HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string prefixed with an initial byte set to '01', for a total length of 7.</t>
              </li>
              <li>
                <t>Otherwise it is encoded as a CBOR text string.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>validity. The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as CBOR null.</t>
          </li>
          <li>
            <t>subject. The 'subject' is encoded exactly like issuer.</t>
          </li>
          <li>
            <t>subjectPublicKeyInfo.  The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
          </li>
          <li>
            <t>issuerUniqueID. Not supported.</t>
          </li>
          <li>
            <t>subjectUniqueID. Not supported.</t>
          </li>
          <li>
            <t>extensions. The 'extensions' field is encoded as a CBOR array where each extension is encoded as either  </t>
            <ul spacing="normal">
              <li>
                <t>a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type, or</t>
              </li>
              <li>
                <t>an unwrapped CBOR OID tag <xref target="RFC9090"/> followed by an optional CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string, or</t>
              </li>
              <li>
                <t>a CBOR PEN tag <xref target="RFC9090"/> followed by an optional CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
        <ul spacing="normal">
          <li>
            <t>signatureAlgorithm. The 'signatureAlgorithm' field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          </li>
          <li>
            <t>signatureValue. In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
          </li>
        </ul>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <artwork type="CDDL" align="center"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes ) //
            ( attributeType: pen, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid /
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true,
              extensionValue: bytes ) //
            ( extensionID: pen, ? critical: true,
              extensionValue: bytes )
]]></artwork>
        </figure>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstraß form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER encoded certificate with an uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shorter INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>This section details the encoding of the 'extensions' field. The 'extensions' field is encoded as a CBOR array where each extensionID is encoded either as a CBOR int or as an unwrapped CBOR OID tag. If 'extensionID' is encoded an int (see <xref target="extype"/>), the sign is used to encode if the extension is critical and the 'critical' field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>
        <t>The 'extnValue' OCTET STRING value field is encoded as the CBOR byte string 'extensionValue' except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>
        <t>A note on extension ID naming: in existing OID databases most IDs can be found in versions with and without an 'id-pe' or 'id-ce' prefix. We have excluded the prefix for the commonly used extensions defined in <xref target="RFC5280"/> and included them for extensions defined elsewhere.</t>
        <t>CBOR encoding of the following extension values is fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyUsage = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyConstraints = [
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>), unwrapped CBOR OID tags <xref target="RFC9090"/>, or CBOR PEN tags <xref target="RFC9090"/>, where each int or OID / PEN tag encodes a key usage purpose. If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyPurposeId = int / ~oid / pen
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ ~oid, bytes ] is used to contain the pair ( hwType, hwSerialNum ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier / null,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid,
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contain general names registered in <xref target="GN"/> the extension value can be CBOR encoded. C509 uses the same additions and restrictions as defined in <xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>. Note that the minimum and maximum fields are not used and therefore omitted.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralSubtrees = [ + GeneralName ]
   NameConstraints = [
     permittedSubtrees: GeneralSubtrees / null,
     excludedSubtrees: GeneralSubtrees / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = [+Attributes]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources (id-pe-autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources v2 (id-pe-autonomousSysIds-v2). Encoded exactly like autonomousSysIds.</t>
          </li>
          <li>
            <t>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous Address, the Address is encoded as an uint with the the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2^64 - 1 corresponding to the cbor integer max value.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Address = bytes / uint,
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</t>
          </li>
          <li>
            <t>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as a CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature (0), nonRepudiation (1), keyEncipherment (2) and keyAgreement (4) asserted is encoded as the two CBOR ints 2, 23 (2^0 + 2^1 + 2^2 + 2^4 = 23).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 23, 8, [ 3, 6 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-parameters">
        <name>COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, and c5t, and c5u, defined in <xref target="iana-header"/> are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cose-c509-cert media type, see <xref target="c509-cert"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD8 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <t>The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="CDDL"><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></sourcecode>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>
        <table anchor="iana-header">
          <name>COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">TBD1</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">TBD2</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">TBD3</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">TBD4</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing a ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
      <section anchor="private-key-structures">
        <name>Private Key Structures</name>
        <t>Certificate management also makes use of data structures including private keys, see e.g. <xref target="RFC7468"/>. This section defines the following CBOR encoded structures:</t>
        <sourcecode type="CDDL"><![CDATA[
C509PrivateKey = [
   subjectPrivateKeyAlgorithm: AlgorithmIdentifier,
   subjectPrivateKey: any,
]
]]></sourcecode>
        <t>The C509PrivateKey item is served with the application/cose-c509-privkey media type, see <xref target="c509-privkey"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD12 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <sourcecode type="CDDL"><![CDATA[
C509PEM = [
   C509PrivateKey,
   COSE_C509 / null,
]
]]></sourcecode>
        <t>The C509PEM item is served with the application/cose-c509-pem media type, see <xref target="c509-pem"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD13 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <t>Editor's note: Include further details for encoding of subjectPrivateKey.</t>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate Signing Request</name>
      <t>This section defines the format of a C509 Certificate Signing Request (CSR), also known as a C509 Certificate Request, based on and compatible with RFC 2986 <xref target="RFC2986"/>, and reusing the formatting of C509 certificates defined in <xref target="certificate"/>. The media type is application/cose-c509-pkcs10, see <xref target="c509-pkcs10"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD9 is composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value, see <xref target="RFC9277"/>.</t>
      <t>Different types of C509 Certificate Requests are defined, see <xref target="csr-type"/>, all using the same CBOR encoding and differing only in what is being signed and what type of C509 certificate is being requested:</t>
      <ul spacing="normal">
        <li>
          <t>The C509 Certificate Request can either be an invertible CBOR re-encoding of a DER encoded RFC 2986 certification request, or it can be natively signed where the signature is calculated over the CBOR encoding instead of the DER encoding.</t>
        </li>
        <li>
          <t>The requested C509 certificate in the C509 Certificate Request can either be of type 0 or of type 1, see <xref target="type"/>.</t>
        </li>
      </ul>
      <t>Combining these options enables the four instances of c509CertificateRequestType defined in <xref target="csr-type"/>. An implementation MAY only support c509CertificateRequestType = 0. The most common variants are expected to be:</t>
      <ul spacing="normal">
        <li>
          <t>c509CertificateRequestType = 0. This type indicates that the C509 Certificate Request is natively signed, and that the requested certificate format is C509 Type 0. This encoding removes the need for ASN.1 and DER parsing and re-encoding in the requesting party.</t>
        </li>
        <li>
          <t>c509CertificateRequestType = 3. This type indicates that the C509 Certificate Request is CBOR re-encoded RFC 2986 certification requests, and that the requested certificate formate is C509 Type 1. This encoding is backwards compatible with legacy RFC 2986 certification requests and X.509 certificates, but enables a reduced transport overhead.</t>
        </li>
      </ul>
      <t>subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, e.g., as defined in <xref target="RFC6955"/>. In the latter case, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier distributed out-of-band. Both kinds are listed in the C509 Signature Algorithms Registry, see <xref target="sigalg"/>. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used with a signature algorithm in certificate requests.</t>
      <t>Certificate request attributes, i.e. attributes for use with certificate requests providing additional information about the subject of the certificate, are defined in <xref section="5.4" sectionFormat="of" target="RFC2985"/>. The attribute extensionRequest is supported with a dedicated element. Other certificate request attributes are included using the same Extensions structure as in extensionsRequest, both extensions and attributes are listed in the C509 Extensions Registry, see <xref target="fig-extype"/>. The only other certificate request attribute specified in this document is challengePassword which is defined for utf8String values and encoded as CBOR text string, except if the text string contains only the symbols '0'–'9' or 'a'–'f', in which case it is encoded as a CBOR byte string.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateRequest.</name>
        <artwork type="CDDL" align="center"><![CDATA[
C509CertificateRequest = [
   TBSCertificateRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateRequest = (
   c509CertificateRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest: Extensions,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
)

challengePassword: tstr / bstr
]]></artwork>
      </figure>
      <t>After verifying the subjectSignatureValue, the CA MAY transform the C509CertificateRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and code.</t>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certificate Signing Request (CSR)) format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>.</t>
      <t>When a certificate request is received, the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession corresponding to the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with the CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 CSR, the CA transforms it into a DER encoded RFC 2986 CertificationRequestInfo and use that with existing processes and code to produce an RFC 5280 DER encoded X.509 certificate. The DER encoded X.509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in <xref target="fig-size-COSE"/> and <xref target="fig-size-TLS"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artwork align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X.509 and C509 are Certificate messages. X.509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artwork align="center"><![CDATA[
+-------------------+-------+----------------+------+---------------+
|                   | X.509 | X.509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+----------------+------+---------------+
| RFC 7925 Cert (1) |   327 |            324 |  151 |           167 |
+-------------------+-------+----------------+------+---------------+
| RPKI Cert (1)     | 20991 |           9134 | 8660 |          5668 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (2)   |  2204 |           1455 | 1414 |          1063 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (4)   |  5190 |           3244 | 3958 |          2845 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Bag (8)     | 11578 |           3979 | 8882 |          3519 |
+-------------------+-------+----------------+------+---------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "CBOR Encoded X.509 (C509) Parameters". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="csr-type">
        <name>C509 Certificate Request Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-csr-types">
          <name>C509 Certificate Request Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate Request.                 |
|       | Requested certificate is C509 Type 0.                     |
+-------+-----------------------------------------------------------+
|     1 | Natively Signed C509 Certificate Request.                 |
|       | Requested certificate is C509 Type 1.                     |
+-------+-----------------------------------------------------------+
|     2 | CBOR re-encoding of RFC 2986 certification request.       |
|       | Requested certificate is C509 Type 0.                     |
+-------+-----------------------------------------------------------+
|     3 | CBOR re-encoding of RFC 2986 certification request.       |
|       | Requested certificate is C509 Type 1.                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="atttype">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:            Postal Address                           |
|       | Identifiers:     postalAddress                            |
|       | OID:             2.5.4.16                                 |
|       | DER:             06 03 55 04 10                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08 00      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. The registry also contains CSR attributes for use in Certificate Requests, see <xref target="CSR"/>. For values in the interval [1, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions and CSR Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestampList           |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     id-pe-autonomousSysIds                   |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     id-pe-autonomousSysIds-v2                |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            Biometric Information                    |
|       | Identifiers:     id-pe-biometricInfo                      |
|       | OID:             1.3.6.1.5.5.7.1.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 02            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    37 | Name:            Precertificate Signing Certificate       |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.4                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 04      |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    38 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    39 | Name:            Qualified Certificate Statements         |
|       | Identifiers:     id-pe-qcStatements                       |
|       | OID:             1.3.6.1.5.5.7.1.3                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 03            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    40 | Name:            S/MIME Capabilities                      |
|       | Identifiers:     smimeCapabilities                        |
|       | OID:             1.2.840.113549.1.9.15                    |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 0F         |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    41 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|   255 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        CSR Attribute                            |
|       | extensionValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
|    15 | Name:            CMC Certification Authority            |
|       | Identifiers:     id-kp-cmcCA                            |
|       | OID:             1.3.6.1.5.5.7.3.27                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1B          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    16 | Name:            CMC Registration Authority             |
|       | Identifiers:     id-kp-cmcRA                            |
|       | OID:             1.3.6.1.5.5.7.3.28                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1C          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    17 | Name:            CMC Archive Server                     |
|       | Identifiers:     id-kp-cmcArchive                       |
|       | OID:             1.3.6.1.5.5.7.3.29                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1D          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    18 | Name:            CMC Key Generation Authority           |
|       | Identifiers:     id-kp-cmKGA                            |
|       | OID:             1.3.6.1.5.5.7.3.32                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 20          |
|       | Comments:        RFC 9480                               |
+-------+---------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -3 | Name:            otherName with BundleEID                 |
|       | Comments:        id-on-bundleEID                          |
|       |                  (1.3.6.1.5.5.7.8.11)                     |
|       |                  06 08 2B 06 01 05 05 07 08 0B            |
|       | Value:           eid-structure from RFC 9171              |
+-------+-----------------------------------------------------------+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleName                 |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        SHA-256 with HMAC-SHA256                     |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    15 | Name:        SHA-384 with HMAC-SHA384                     |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    16 | Name:        SHA-512 with HMAC-SHA512                     |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    45 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". T The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    28 | Name:        EC Public Key (Weierstraß) with              |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
        <section anchor="suitability-of-different-public-key-algorithms-for-use-within-iot-scenarios">
          <name>Suitability of different public key algorithms for use within IoT scenarios</name>
          <t>The public key algorithms registry <xref target="pkalg"/> specify a number of algorithms, not all which are suitable for usage with constrained devices. RSA requires large keys and large signature sizes compared to elliptic curve cryptography (ECC), which together with resource-efficient implementations of named elliptic curves (Montgomery, Edwards and Weierstraß curves), make them suitable candidates for IoT public key usage. These curves are represented by ids 1–11 and 24–28 in <xref target="pkalg"/>.</t>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading with this document as reference.</t>
      </section>
      <section anchor="c509-cert">
        <name>Media Type application/cose-c509-cert</name>
        <t>When the application/cose-c509-cert media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-cert</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <ul spacing="normal">
          <li>
            <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
          </li>
          <li>
            <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
          </li>
        </ul>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD8</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-pkcs10">
        <name>Media Type application/cose-c509-pkcs10</name>
        <t>When the application/cose-c509-pkcs10 media type is used, the data is a C509CertificateRequest structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-pkcs10</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD9</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-privkey">
        <name>Media Type application/cose-c509-privkey</name>
        <t>When the application/cose-c509-privkey media type is used, the data is a C509PrivateKey structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-privkey</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD12</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-pem">
        <name>Media Type application/cose-c509-pem</name>
        <t>When the application/cose-c509-pem media type is used, the data is a C509PEM structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-pem</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD13</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to add the media types "application/cose-c509-cert", "application/cose-c509-pkcs10", "application/cose-c509-privkey" and "application/cose-c509-pem" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters".</t>
        <figure anchor="fig-format-ids">
          <name>CoAP Content-Format IDs</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="160" width="592" viewBox="0 0 592 160" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,144" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,144" fill="none" stroke="black"/>
                <path d="M 360,32 L 360,144" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,144" fill="none" stroke="black"/>
                <path d="M 584,32 L 584,144" fill="none" stroke="black"/>
                <path d="M 8,32 L 584,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 584,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 584,66" fill="none" stroke="black"/>
                <path d="M 8,144 L 584,144" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Media</text>
                  <text x="84" y="52">Type</text>
                  <text x="316" y="52">Encoding</text>
                  <text x="380" y="52">ID</text>
                  <text x="472" y="52">Reference</text>
                  <text x="124" y="84">application/cose-c509-cert</text>
                  <text x="288" y="84">-</text>
                  <text x="396" y="84">TBD6</text>
                  <text x="460" y="84">[[this</text>
                  <text x="532" y="84">document]]</text>
                  <text x="132" y="100">application/cose-c509-pkcs10</text>
                  <text x="288" y="100">-</text>
                  <text x="396" y="100">TBD7</text>
                  <text x="460" y="100">[[this</text>
                  <text x="532" y="100">document]]</text>
                  <text x="136" y="116">application/cose-c509-privkey</text>
                  <text x="288" y="116">-</text>
                  <text x="392" y="116">TBD10</text>
                  <text x="460" y="116">[[this</text>
                  <text x="532" y="116">document]]</text>
                  <text x="120" y="132">application/cose-c509-pem</text>
                  <text x="288" y="132">-</text>
                  <text x="392" y="132">TBD11</text>
                  <text x="460" y="132">[[this</text>
                  <text x="532" y="132">document]]</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+--------------------------------+----------+-------+-------------------+
| Media Type                     | Encoding | ID    | Reference         |
+================================+==========+=======+===================+
| application/cose-c509-cert     | -        |  TBD6 | [[this document]] |
| application/cose-c509-pkcs10   | -        |  TBD7 | [[this document]] |
| application/cose-c509-privkey  | -        | TBD10 | [[this document]] |
| application/cose-c509-pem      | -        | TBD11 | [[this document]] |
+--------------------------------+----------+-------+-------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as as X.509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>
        <t>Editor's Note: The TLS registrations should be discussed and approved by the TLS WG at a later stage. The TLS WG might e.g. want a separate draft in the TLS WG.</t>
        <artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
      </section>
      <section anchor="tags">
        <name>CBOR Tags Registry</name>
        <t>This document registers the following entries in the "CBOR Tags" registry under the "Concise Binary Object Representation (CBOR) Tags" heading.</t>
        <artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2985" target="https://www.rfc-editor.org/info/rfc2985" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2985.xml">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4108" target="https://www.rfc-editor.org/info/rfc4108" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090" target="https://www.rfc-editor.org/info/rfc9090" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9090.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9277" target="https://www.rfc-editor.org/info/rfc9277" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9277.xml">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9360" target="https://www.rfc-editor.org/info/rfc9360" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9360.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6487" target="https://www.rfc-editor.org/info/rfc6487" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955" target="https://www.rfc-editor.org/info/rfc6955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6955.xml">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7468" target="https://www.rfc-editor.org/info/rfc7468" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7468.xml">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932" target="https://www.rfc-editor.org/info/rfc7932" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603" target="https://www.rfc-editor.org/info/rfc8603" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879" target="https://www.rfc-editor.org/info/rfc8879" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148" target="https://www.rfc-editor.org/info/rfc9148" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9148.xml">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9190.xml">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191" target="https://www.rfc-editor.org/info/rfc9191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9191.xml">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" target="https://datatracker.ietf.org/doc/html/draft-ietf-lake-edhoc-23" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="22" month="January" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-23"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-tls13-iot-profile-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="22" month="October" year="2023"/>
            <abstract>
              <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for Internet of Things devices. It also updates RFC 7925 with regards to the X.509 certificate profile.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-08"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-ctls-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>This document specifies a "compact" version of TLS 1.3 and DTLS 1.3. It saves bandwidth by trimming obsolete material, tighter encoding, a template-based specialization technique, and alternative cryptographic techniques. cTLS is not directly interoperable with TLS 1.3 or DTLS 1.3 since the over-the-wire framing is different. A single server can, however, offer cTLS alongside TLS or DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-09"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="https://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
        <reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
            <author initials="E." surname="Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
        </reference>
      </references>
    </references>
    <?line 2041?>

<section anchor="appA">
      <name>Example C509 Certificates</name>
      <section anchor="example-rfc-7925-profiled-x509-certificate">
        <name>Example RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,                   / version and certificate type /
  h'01f50d',           / serialNumber /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  h'010123456789AB',   / subject, EUI-64 /
  1,                   / subjectPublicKeyAlgorithm /
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,                   / single extension:
                         non-critical keyUsage
                         digitalSignature /
  0,                   / signatureAlgorithm /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 139 bytes. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
47 01 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16
]]></artwork>
        </section>
        <section anchor="example-natively-signed-c509-certificate">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType, encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1672531200,
  1767225600,
  h'010123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'6FC903015259A38C0800A3D0B2969CA21977E8ED6EC344964D
    4E1C6B37C8FB541274C3BB81B2F53073C5F101A5AC2A928865
    83B6A2679B6E682D2A26945ED0B2'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 139 bytes.</t>
          <artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
47 01 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 6F C9 03 01 52 59 A3 8C 08 00 A3 D0 B2 96 9C A2 19 77 E8 ED 6E
C3 44 96 4D 4E 1C 6B 37 C8 FB 54 12 74 C3 BB 81 B2 F5 30 73 C5 F1 01
A5 AC 2A 92 88 65 83 B6 A2 67 9B 6E 68 2D 2A 26 94 5E D0 B2
]]></artwork>
        </section>
        <section anchor="c509-for-diffie-hellman-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate the common key usage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used to sign certificate requests.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example IEEE 802.1AR profiled X.509 Certificate</name>
        <t>An example of an IEEE 802.1AR profiled X.509 certificate (Secure Device Identifier, DevID) is provided in Appendix C.2 of <xref target="RFC9148"/>. The certificate is shown below including details of the hardwareModuleName type of otherName in subjectAltName, see <xref target="ext-encoding"/>.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 9112578475118446130 (0x7e7661d7b54e4632)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: C=US, ST=CA, O=Example Inc, OU=certification, CN=802.1AR CA
        Validity
            Not Before: Jan 31 11:29:16 2019 GMT
            Not After : Dec 31 23:59:59 9999 GMT
        Subject: C=US, ST=CA, L=LA, O=example Inc, OU=IoT/serialNumber=Wt1234
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:c8:b4:21:f1:1c:25:e4:7e:3a:c5:71:23:bf:2d:
                    9f:dc:49:4f:02:8b:c3:51:cc:80:c0:3f:15:0b:f5:
                    0c:ff:95:8d:75:41:9d:81:a6:a2:45:df:fa:e7:90:
                    be:95:cf:75:f6:02:f9:15:26:18:f8:16:a2:b2:3b:
                    56:38:e5:9f:d9
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Subject Key Identifier:
                96:60:0D:87:16:BF:7F:D0:E7:52:D0:AC:76:07:77:AD:66:5D:02:A0
            X509v3 Authority Key Identifier:
                68:D1:65:51:F9:51:BF:C8:2A:43:1D:0D:9F:08:BC:2D:20:5B:11:60
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Subject Alternative Name:
                otherName:
                    type-id: 1.3.6.1.5.5.7.8.4 (id-on-hardwareModuleName)
                    value:
                        hwType: 1.3.6.1.4.1.6175.10.1
                        hwSerialNum: 01:02:03:04
    Signature Algorithm: ecdsa-with-SHA256
    Signature Value:
        30:46:02:21:00:c0:d8:19:96:d2:50:7d:69:3f:3c:48:ea:a5:
        ee:94:91:bd:a6:db:21:40:99:d9:81:17:c6:3b:36:13:74:cd:
        86:02:21:00:a7:74:98:9f:4c:32:1a:5c:f2:5d:83:2a:4d:33:
        6a:08:ad:67:df:20:f1:50:64:21:18:8a:0a:de:6d:34:92:36
]]></artwork>
        <t>The DER encoding of the certificate is 577 bytes:</t>
        <artwork><![CDATA[
30 82 02 3D 30 82 01 E2 A0 03 02 01 02 02 08 7E 76 61 D7 B5 4E 46 32
30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 5D 31 0B 30 09 06 03 55 04 06
13 02 55 53 31 0B 30 09 06 03 55 04 08 0C 02 43 41 31 14 30 12 06 03
55 04 0A 0C 0B 45 78 61 6D 70 6C 65 20 49 6E 63 31 16 30 14 06 03 55
04 0B 0C 0D 63 65 72 74 69 66 69 63 61 74 69 6F 6E 31 13 30 11 06 03
55 04 03 0C 0A 38 30 32 2E 31 41 52 20 43 41 30 20 17 0D 31 39 30 31
33 31 31 31 32 39 31 36 5A 18 0F 39 39 39 39 31 32 33 31 32 33 35 39
35 39 5A 30 5C 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0B 30 09 06
03 55 04 08 0C 02 43 41 31 0B 30 09 06 03 55 04 07 0C 02 4C 41 31 14
30 12 06 03 55 04 0A 0C 0B 65 78 61 6D 70 6C 65 20 49 6E 63 31 0C 30
0A 06 03 55 04 0B 0C 03 49 6F 54 31 0F 30 0D 06 03 55 04 05 13 06 57
74 31 32 33 34 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48
CE 3D 03 01 07 03 42 00 04 C8 B4 21 F1 1C 25 E4 7E 3A C5 71 23 BF 2D
9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C FF 95 8D 75 41 9D 81
A6 A2 45 DF FA E7 90 BE 95 CF 75 F6 02 F9 15 26 18 F8 16 A2 B2 3B 56
38 E5 9F D9 A3 81 8A 30 81 87 30 09 06 03 55 1D 13 04 02 30 00 30 1D
06 03 55 1D 0E 04 16 04 14 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07
77 AD 66 5D 02 A0 30 1F 06 03 55 1D 23 04 18 30 16 80 14 68 D1 65 51
F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20 5B 11 60 30 0E 06 03 55 1D 0F
01 01 FF 04 04 03 02 05 A0 30 2A 06 03 55 1D 11 04 23 30 21 A0 1F 06
08 2B 06 01 05 05 07 08 04 A0 13 30 11 06 09 2B 06 01 04 01 B4 3B 0A
01 04 04 01 02 03 04 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 30
46 02 21 00 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 02 21 00 A7 74 98 9F 4C 32 1A
5C F2 5D 83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34
92 36
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

 1,
 h'7E7661D7B54E4632',
 [
  -4, "US",
   6, "CA",
   8, "Example Inc",
   9, "certification",
   1, "802.1AR CA"
 ],
 1548934156,
 null,
 [
  -4, "US",
   6, "CA",
   5, "LA",
   8, "example Inc",
   9, "IoT",
  -3, "Wt1234"
 ],
 1,
 h'03C8B421F11C25E47E3AC57123BF2D9FDC494F028BC351CC80C03F150BF50CFF95',
 [
   4, -2,
   1, h'96600D8716BF7FD0E752D0AC760777AD665D02A0',
   7, h'68D16551F951BFC82A431D0D9F08BC2D205B1160',
  -2, 5,
  3, [-1, [h'2B06010401B01F0A01', h'01020304']]   / subjectAltName w. hardwareModuleName /
 ],
 0,
 h'C0D81996D2507D693F3C48EAA5EE9491BDA6DB214099D98117C63B361374CD86A7
   74989F4C321A5CF25D832A4D336A08AD67DF20F1506421188A0ADE6D349236'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 275 bytes:</t>
          <artwork><![CDATA[
01 48 7E 76 61 D7 B5 4E 46 32 8A 23 62 55 53 06 62 43 41 08 6B 45 78
61 6D 70 6C 65 20 49 6E 63 09 6D 63 65 72 74 69 66 69 63 61 74 69 6F
6E 01 6A 38 30 32 2E 31 41 52 20 43 41 1A 5C 52 DC 0C F6 8C 23 62 55
53 06 62 43 41 05 62 4C 41 08 6B 65 78 61 6D 70 6C 65 20 49 6E 63 09
63 49 6F 54 22 66 57 74 31 32 33 34 01 58 21 03 C8 B4 21 F1 1C 25 E4
7E 3A C5 71 23 BF 2D 9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C
FF 95 8A 04 21 01 54 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07 77 AD
66 5D 02 A0 07 54 68 D1 65 51 F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20
5B 11 60 21 05 03 82 20 82 49 2B 06 01 04 01 B0 1F 0A 01 44 01 02 03
04 00 58 40 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 A7 74 98 9F 4C 32 1A 5C F2 5D
83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34 92 36
]]></artwork>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y923bjRpIo+s6vyCWvfSS1SRYB3rmPzxlebY3rohFV7Z7j
9vQCSVDCFAmwAVIqdbl6zet+ng+Yp/0L+wfmT+ZLTkRkJpAAEheppCqVx3K5
igKBQGZEZNwzslarVfbOfmMP2NF49OaCTd2lt7JX7E/1dqPPxra/d9bO0trb
ATsZJy+dHlVW3tK1tvD4yrfW+5pj79e1pRfYteXC82s2h1ZbwkO1Rq9iLRa+
fTNgKUiVirPzB2zvH4K92Wj0G2YFrg9YsF9VgsNi6wSB47n7ux286Wx6OasA
XMe9GrADvK9X2TkD9g1bWi47BDazfN+6YyfOmlmbDbuDcTLPZ9dWcM2ubd+u
MLb3lgP8Aj4Gnr/37XUQ/n63VX+FO1f2bn89YGblxnYP9gAuXvneYScx9mbx
r/Zyz+bOlQsjYpa7QiT6d7s9jPgIQdCoj37y/Hd4w/f4MF7fWs4GriO2/gHx
Vvf8K7xu+Ut43dH1fr8LBi9e4G14ybmx6/K2F3jhxcL3bgP7BQJ4gQ9eOfvr
w0KArN1evcDxEe4lmo8qFeuwv/Z8nAX+1MS/jDkuzPkf6+zctw//+R/slbXf
B4Hnht9zKv+jd+1m3gIDG7Cp7yzxKhuOwi9sPtV/hYfrW/HUP9jixvrS2+pH
832dze0NINT2E8P4/j//jw/ETn1bNIIrDx6rB+KxEkOY19mF9Tcr8fr5tXXt
rOLf0KsvzuZTzWsDur/uw/3/4Dvw/kzs//Cf/+dqc3BXKbTbm/R3ea/8V3ii
fu3RA3nvfFVns4N/uLaTr3xlAdu4qS/pna/t94eAM3LyvVt6rL7mj/2Di3fS
ciEcVyqu5wMHAC8PKvDoxWxsGkZ/ID72e+3oY0d8bBmNnvjYNnsN8bHTa8qr
PaPbkh87hryh122Z8mO/JV/Rb7TN8GNf3ts3u135sdlp0NDm0/H3fJUI+Tjd
bBxY00s2Pvg3NhvjCveufGt3fVdl8z1wlOWvArYGUTNdw3pzbHcfu4sjrMpu
bL8O0oRAW/6VDWJOrvXAXl7R+oYPRu3GrO9Wa7pxBasXRBBIRpCU7jqJxE6r
JyfQ6bclErumKXHUbXXCj30zvKHfDHHUanVCJDaa8mOvG2GuEaLLaHWjj73w
Y4RPo2/gx7PahERWbWO9s2v26hrErnr5sLdq+01gNGuOt6/tfG/tbOzYHfBt
bQl/wUTh8ng4ql2+nA+0uFtaC8DLYUv4W1iwyB3Xrvn2Xw+Ob2+BGEENlNWB
Pr1QCTsevhiRJPXZDAFU2dFIPM4ulMeJtPtrm50FwcFylzbJ+leWa13RDcxb
s/PDYuMsN3e1S9RkoEdjGvSPto9qjBn1br1zRGPIFcfJkSms8I8HGJ3ZMA2J
lzEo2gcjBrV0LeAa7DPiBt4a6k0tosx689PQ9AoMAYmls+l0Wus1zLoxvNBj
KpCrGJjPtvlCFJdewIN/gQdrZsPo1a/3242KJgQdygDCxUtvaW0ICVt773s7
b+PA16DbbYu59v4WjIHgv/7t3+f28uDbbGLfOICzsxWgytnfEWiYjmMHuNjl
tONvETOhARXj6MwNAPJhbyMlphuwWED3iRHyXz0XlCGYLldAW0C/gsTh4QoI
xuhFcPn7+athzX57Nh7rsXh7e1u/CrYWSvwXMIPti9sdcJi7h8m9OOw2nrUK
XiBRXjTMF/Pvz+tGC0WdEQo7gVR8D6P3sPMfz1QGYeeAzuWdwiZGMQYQnDKp
mb3wD5YfsQdZvLUz71I/q5XnEEMYjbrRaHRf9Lu9WrPWNPq1frPb79a6fzFa
6uhfOlfX+1sb/xbG9MQBAw1QHuP0cN0AenxgDCTP5TUsiKCewQVH850P39t+
lY2vrW39CAy+l0BA5KPXHsIEEBykJDm+ZOxtd/DZZ3PUTEs7AKXlLR0Yz5nU
J0B+ZIdLG/jB224PLo4R8BtxBbwX9Je3YWbLrJdYmbM6rshgcVfS+Eh8fw7m
qLWzVs7W2fvW3guKjTQpHTd3Ib+OwRN5lSUb4bv61o7LPLTqzzfWHdotwtzK
lz91NkIMum5K8vARzM9B7jRq7c6wkLc6DbP34vXZ/LI+P6+Lh/ymOrwLIo4N
QgBpQ7Q9txy/9pMDrs+P9l1tCjILJG1wTYJ3vrwGCRywtwFK2YkTLH0bWOKl
d2X54C9sYyZKFsvhgJDP5jubWIaLcj4AMUgY141Dq7GMyJ4Cyiz/XWi6J75+
WQfetl39l0Mgtwf8GLzLYCu44Y8WOIwb+0Z/w0WdTSwYrSrjYFFtBMFqtRqz
FgGw3HJfqcBqDJi0HFiAGFgDfpjFGYVcXEQtrDq+zlWHqw6L2Wa+HRw2e7xJ
/Q6VAfismw2qwqRDzB+MvyE47HbgreKrN8hBcGERcJEBRhdD65gWMHq9sRcB
w+yAWIuNzW6B5iQd8Ak0BatcrQhtwk5AFZ1NTkG2vJ4Pq+wCJG9VkcRVekFS
4TK9TSAMOpjLT0BMdM1X4E8DNkRcgE2mYnZhwEEddpXGGUcBuvjglcBau4PP
AczNt1cHUJ14a+D8zZbIwKnJAazi2CAUeGCFs3bjf7Dba7gDUBZ4jAwgvMvd
g/ggwPjOrb31QE/gxGnU9BpCqc8nNJy/Bu3FEhSD74CFDlww47itDYp4stsB
/MKm98FdK0DYEt94chR+y786AjrA+JbXwH8wcNfbM2G2hUjEAUodgg9Z9DoY
FMCHKSKrrjgvhSzM5xrycZL1QosMaWkHe6ADv+UNOJrXtgWOM1yy+EWwxlXk
UqyD84i4AfHPuH6p85W1dVarjV2pfIM6z/cAySRGPnzj4K8fK5U3ri1V2PIa
lwcoO0G1lQ3mwx2FWYQMQomHGsy3ImSfANOe5mhWdgJa/pTBsg65BkcM9Axi
C3nH3/AO3hBjoA8fhC/68WMVHneJ/TwKPNlEJA/8xC2A5aYgmD4oSxykte3e
OGBp8fVBcNBJ+/ixzl7SilZxCZMHaUVAiWTAzbCCSVHjGnA9t6aChq/33tLb
BCAWgGMs0NrDc3SX+HvQPfv4MfxswOdbjIaRnEazE94JqhopiIYh8OAKzFZA
DIIBnUABOGat0YTwXPi61WA1WEGMlGQNzMkdsMU/gZAQ7wB/MXwH4nkDc3LB
aAN8gRGMSze+3g4uiApBEtvH5RmAkguYuAoD2V/7NsByUJ3B9EgILO72/DdY
QzasHcSDg5T32I21cVBJAkmJlzbkkVurFYjjgDMpijc+XPSgI5QgVa82CXLA
CPiiuuPit85eeb6QBMt97F7f3sFL4HXCfrI4Dnx7jU+sQLv6FkpjKcowakni
DBTTgZYvjfjg+zhkHOQhAE8KWbNIZr6z7R1JSiHzHXA87vjqST8KS8AFvAUB
GsLWHnANy4iY1mLAV27g0NrcgSDxQIz84N3aN2h44uhwzDAei21VLIRCKVQ0
Y89domkyclx8iwiXXsQwxE5Qbp5yUmC4BkjBBTtnCBW3tF7jrMNl5DVwwTvX
u6XxksjBlbmwXXvtwGoDXAPvbsk8XtmcB1GiK4YuaQUUcVW2g6nypXvYUiS3
KhkYljwsFKBGldn7JZetAhck/GmtysGTwkDcbOz3QIdqpEGqUq8QZYVePX/L
fwVRSbAc1PXAw5YQocQ6pDSQRuBjoaYPdRKC4Ne2SNIrfrnOh7U4OBtYTZ5L
CP3H+ZvXHPAWHt/At0C693tacM4eVhWz61f1iJoLTjx6ItRXSGIPHsSYQqeF
yLrhDlkdhC4uNM49gpsFiJg+ryooQ/IhcOvK9QKUcSBJOVVg8e8RFUCyFS0b
nKgN0OkXGOv1AWgtTSbBbhMc6gRI7/JRvLTcqwPi5GQ8mbyUrNYxUEiB6Lxx
VmTT3YLZDgO23yN7BpEG556alLESwdxhGp6fBXyQyAc4ozrZIAidz02iFvGg
maEkN6HX2dtbLjHkWoXxwLuBZ+m3te9tSezh4EidHQKuEVH51lBd7q9rIPwO
tmI6khdQVcQxF6bX4J+Cjgf4oNaBRPvQeyS8galPb0LvHbQMC0OPqAoWSHu8
dWv9K0pceLvgtdBQDVBcAJCVs17bJMvwLr4Ew7lWcWmq3AKGgA3+Lehp+FRl
B/j7FBUtriJGE4OviD/dw2YDX8WwcYKW+ylfUHtAfPTFnn8RsVxkUGPGKGB/
/vnPvyTHtrV28MWHP3/EL3bgaKVGT8sObSX0quNfkvsLlOESAAfJzS4hboiP
31v4HcAJgB6KAKyqLMrfwi90WyYaDD+hmhGuICPcoFVBKtxj4F6G9jZf/neC
TUKbehd6uACX+8gAFjhxOMqw5+E2HoDF8YRGNrdi4BNejfkSHz6oITc5CXQs
5NQaTVh9HCcxGyt0HYRoF7rX2u1AidOk1JsXJMkVOwZxi8KpSlKsykIjCKPc
OI6kmVJlE8VQanXxCtm74p62iVemkx/e4GOasDZ+LYIsqAURmFFvqvfKSDaS
To878XHhBOpz2hi5xGUuuiNmQ2uOxxx01jA3qonEKELLebsc52i3fwgDZziq
iF5icQlXFYxrLlukp8qltca3BfWl902rLMaaMW7kv2BAmTCZMOuqIoz44UMU
u+Rin7uHOjsK0YuokAqXHFfMGorlHDN2YF4xD4GWHki1LNO/jmGFB8cFVAqF
jqFcRZZuHcFTt2gQ+47l7vkLVqga4Q2RVAisbdLdRiRw2U2zRLMfZnUr9PHC
JsoRfgaVCrjAQ1QRN/h+1MwES3VUC83XuGsVW/s+qhIh0bwFaSMctOc7V2BY
bPIBA77NOnsd9645cuNUj/Rj5EzDTIEaywPafyseOEgHJsBT24N5glMM7wiH
RKgkC9QQ9AORCrdxg8C1hT1HcQTCOT4p3VHSY3CbFQQYr91zo1UYlGS4wbd3
oe+5sJbvbikTmYz6hDpCOCU8lEBRwSTuAF+FyEoKZZjditIYwhbCARHHiJAF
UU4R0uTmuAVvUSfBvcJA8oXD+d4S5gesJUxphDFR8qtAKKniTSEvyiOUa04Q
HCSWKV5yl1qOcp7hK3AxL73gDii+rScDhPeNrqDoml+ECkcEWGgKwqsgZkth
n0gqdBTWe0iVYGljMiXh4aMIhPTjCQ+U+aGdL200WG3JdyCZfB4jOJWWDFd2
GOh5LexcTH6gk+ASA3IZiNGVWw/59ejV2/nlUZX/y16/oc8XUxjLxXSCn+c/
DF++DD/IO+Y/vHn7chJ9ip4cv3n1avp6wh+Gqyxx6dXwn4840o7enF+evXk9
fHlEbmKcoGE8De1Sf4fh8xUuZ1ANS99ZcNYfjc+Z0eLyC0saZKgFixN4XMHl
r6IlwX/l63a3sy2fTGB05qwd5ohQ/4D1fI3OLLKs5LK4+bgF8yNQqYr+reN6
G++K5DQfTL/XCY1JKVmVyFOmmUlGqAjd+jaoABIVwp6sciQlzNnNLVrRdDNZ
oRObj8hBb4esEFlexm3wEADH4dxecsnUqptCEOInE6enjglZKrWuPnyj8ONH
iS8OUVmPFE3guUhufqtBVJ1CkGEMjzyZDegejF+A0MIJ7ih+ibKBwkLSLoiH
f6Rtg29JGEMxotBwEM7+mmuUuHmYtqbTZo6SMo3bOjJur7efYuYTOe8pBYdR
D4o8AhYxjkD+6Qac5hUYV7IyZkmVMTvPISMD9ZazDT02y4/EBD715mxC1wBZ
G2sJHECoBp4HmzH0ACl8KvWWvIeX3eHj8Irz6etwkIG01/shQjEQ467A6lFU
tVS/qzoa7AvHFRZQYCuOKr7Wc0lrlI9EJXTTzgOJGOrfK9slZ3h38HcYLVZk
JiydK4/ScaEfuHauavgCTiFhMKbVI9dNtoPRRWmkJ0wuK982qnKTjptaQYHx
48YNG7jEjRbu8vJvNW8gJ7hI199nIGEMykvyKn4JgyEuXnj7a5EmStJOygCM
sK2ubSnb9twql5ZEwK5gyC56z8pSlUm9mspSPPIIILC0Ix1vjelaNNq2VBkQ
3ewRBYGeWIcBXBLydPptoc1PT6PgGmW8CdhGLObo4VBrLeyNd1sVVjQ6NsAr
9kb4+qiPeFCE5x9IsstXCEKTw8AftTiGw8dF7mXp+YBNWEf06jno8unr8RS/
nU8vJRjVTEbZ/g17JcKXMy5rPnwjwm01Lnw+8sXA+UzKI24lO35cbPHhbxyq
NxITxlulg0YBuShIiDHctA6IFiTCRqWDIUQeLEnZUapvpYacVWZQeEnjBIEr
9QcWRlJxpsfit2M+W2S3BCmOlwBFUYeXYPMdc1SALOVQ+LP6O8lqdYBMfBJk
TKDZmGEu1rEIEsUkirzw5tBQLrTq194GSIE8wad/02QnmnGx71jjlAuPmGAL
xRg8h3hVQWfAMSKzFC4Q7f5AlQ7W5vVhu8CSTMK0eumYnb2+nH4PL+DR1BTy
Bdcf3FsfzThh1hxcMe0F/HPYspO/wwcKYgLyo4HN1Teh63yH6RdaKI33jQYP
ap7sI7Jwt4o8RnpIahnXviJ8y4ymyDJ5W2cPXM8nKsWonKX8XeEoscbDhS0m
F907lDpKPiTWXPx9PD6dsh9oGOhsIaaFTJIKESV0VST+eBgV+e74wt7QvCZo
PrqAweDaXr2GoR0naCC4g5f9h2kYLr3g1+EexDmIXAqeyOwmWC0WKJrMd3A7
XcS9gygjaElgoV8ejplj380bmTqUKb4/vJCYElfoWDvE/gBQTuRKFtFrJa59
SkFpVLHhzQl+BEupKoPAuGkj/QCveJq+Tt9WpyEgz1iLwNvgQPlakIJBjIud
REISUcQX2amYEuekCHUkLUL8AX/h7KPyEGE8ywoALMPBbPCeK2l49n+iZeWQ
EY7a7+1+3ZvveXGaXAy8LgquUZKIf8uZP0L5FEvW2ZAnhJUlAGLsbNiWzwCz
FskzHrWMJRtQDby9nNV6EVVFZU6IBpJM3JVd2JTOl4OHgaqw+D3AoPj0iocw
PIbxDS4FVYMFjKi6Xa/GRJsAoHI04bbbUtEb1hIN5+OzMxyqd4tC7C6JRlEJ
c3D3/h0tFQ7+2gKs8+wTMzmqFZIBC9iYAXkvCXVwHdRq1kZeQKiL7U6+Q4Sz
hO+EtvrZmtHr0osyIqn4jo8SNwcJxgipcIwZE8+lTQ7HmOqMrzuumAKqq/8D
vpG71SExeJbSRT/NlZP98OHDf/2v//0RdLkpUCPGRwgnFr/bLrAw47hx/F//
9u/H/WPUaccW/bI+rqaHYUULUby4Cr4mWBXvpQ9EdVBKhg5pB0xx3Ggc17PG
HiHOZdO3Z7VOSy5jzOqxox9+qOn+HImw2fEPJHi9qDxHP68h/TLTYDc9rbKz
MgBLoizBwxpagXoYR5+izmI6Wy72SAVZrNWrLWAMr4ZjWfXBTvjq0E97NqvN
puG0Tz/D4LucVm9Q2N9i1joLZQoZ62gdYmmLs78T6hwWyoiU8DExIP4+xEKd
45i3HgFNKAh75y2vazyjg9WQL8htP/k7/nOqpoytq5jf5EamjnDYSVqev5mf
/Ylc/ypaNDuMwniuGAXcDuNcicCKpd6AEiSWi4gASWNE3LjgFoezJwc+dKK1
FZhRBIcAmc1Buz/oNEA4j+P2UkLaYCk1t7jC2sotVt4jSNW7XgmD2fcOV/w9
dxjPMxutPo4aXnNJmEDCoO/qiyfgu++5/YOFYngPJyZXr0d9+DHMJvxp99v9
/++InbhUleD4PKaEQJIcSsTElDi3+Q4UqZIWH/8tZjrZ7y3yoTfOO1vaZsqT
vMDuR/sOC8RFeeNxaATyvQrAX35oQ7rLzYHQsgOlssXYX6CxlkOT4Tj5HsXA
FObE7p21uUI7wiMX0xJOabje0pYOMakSBaJaPIw8wzy5cOc6TeQA5DBz1zlx
tTBWq8IoTgz9mI3OLtn88uLs9fc53oIOtiawawEttsJqUuCi7vmb7XswbTKW
qFxDmlHqNYKPolq4AFSFALo22pfK05urmr0Mp1CNxwmAtZOTRJDrg0+BiqjE
MRkJ//ABaBYGK4SnxbnrreuArXw2odWlLDaF6fJuoSoaXOkiJnIcXdB4xknz
m8sxsvrD5/RWNxN2cdK4hceEWatyErCh5DHxxN7eUtwNDDReD+uFMEuxbC70
hedFwSEwZ2DBoEdzHDKCGmiI2eqILvePeOW4yNbwEkjAIOtzGyXGtvgjnL6h
dSPF2v6WSomiJaJ3YdaOH1DEGZnBZCfxmBUo8Hf23VuMPp1WlbdFqysEH3Fj
ig2FnRoyVKiT9EMSas4ROYrQS0qOGJzI6J0JHR/LrBDvqmuSF19EDwvVthKZ
rnDdhZFPnoUQ6aFEnQm+mcdJA7E/ZO/b1h4jgWScSUQVr1cwrLe7/Z2ybOPh
i1BDJOMYqdhECWWUXuAA7lnom9icaS3oVFDshpIKKFTAqhnLhfM88cLPpZeK
netYIoBGl1uTEQZkLkfzsRqzxLdNxxPc15JUdToUPEzd8dh0FOAsW4/KY8YK
hTjnjePRzBCt8ZkqhYGpWeNwtjbFAdDpjYUI0UElv11mu7FC94bTf4h1HXID
YLT1hJeaRoru1fCflZBNRl1BesR/T05MjVrFvzqF9fD36IchvirJx79jP1Ok
Kjb5Kl7SknaA2rla+aVS+Z9cFIaJC+kZSvpR8wIScTJnIGY/F1MZVOIvhaGc
4Hs1cegBhfDoS30ceKCmtNUvlJkMKApCF6Qb+Fr6fwNGzkbiO/IFla+EqaUA
yrTEB0xj8GsfERiFbyIpP1D0k44WRa85rVQy8AFIllF1LFXaEgOAvZIdz/2F
veBe9Ase36xUsu/9TokovQC45h+UC8Az0S9A63hAj5M4ukbsNuBvPmUvXoQb
EfEn9ezfPWeVfpjvcSl+ekc1JvqHQSw5NDPy6mFW6CfCTNJoh3tQJb6gwbD4
K+XPz1HCWg46Um7ynYAoxTzh9AkvED2IetElRGbIPGcTgcrwipgQmtUaXMQe
5EP6f5m0O6mzEGd15ScJORPPMdiE5QeCVuVY5cOAfZNMKvJNvt8d0WdZkqKK
86OP+JzlUweBGqzxK/e7oyUWR/jwFSZPp3keHK9q1QjED9/E1BhCKgD14Ru4
tDsswDyuJZ5FRXsxHyob6AJ2EvM/hS0dZoSpmFkk28LsgIiTKTGspMmNJr4m
Rwdv23qrw+YQIPvwMo7TpIEcGnco8m+98lk8HmJnf/6ZiZeANpFfRu9TLrI/
/1KX8djwazAuOu12s6s6FZEnEd2kTjlFA6wvdgKK2ofBZjmo+FRLz67OyZes
6VEoCSrwJxsEBVY2/+d/8CDqSTyWcFrlt24t2uhKFUFK8Q83osIcuaj7wm4f
9SYvi8LuO+im8CrULLMiNQx66UHUjnjLvQ0avfG+YVbx7yYPwsGnVmIA0fvO
kuUyamo58gKUqSibRJGRkHfjuEAixspTCEwcJbS/LDbmtS0Gu16pxkdYZIyz
ktNpyiqAeElyLJdGCQuqP1yt2F1t6Xk+3ERVN+jt8pK2zV09vfB14oLzCNnS
kWUePGBNAyFtzGqJDOEj5MAVMREuukwxwW3fsOaLD07MgyrR4A0ZNQA7axUS
E50f3M/qRcPDV6ovCYPa/B3JvgBxd6zQPUyQSFGzH76JefqJOsiVvbecTZBy
f2TgJe6dP1aUDbxkNeosatViDnjob+s9bKLksQIwXgLgaqN0VW16WbQecKQ4
ViKBUqWHcliJW4UTD3lrLO+29TEYkeAIE9I0EIRMG7fLPRymufFhUQOoBsje
jC+nD/X6j+M2yjEMZWnv9uG+eWVkUSyJSqi4Jx14W/WmqswvY3p1c8fxzQtd
cWKxiFK6OgTpCzopvCl68EDFomnptrRc2u7A7wDcDFEQoE+rEBW4B3xeBxtF
OnidW/rEVVgkuKDSwK0HGvRsEhb6r2lPHNwvqq4CKfhXUSW8y45BymPlFGY8
HexweSzSgbQzj9Y8IHRzoA2cGPyhL0PsxvGk4DqmlqIyMTLc3AjeliBpnrM3
gX0rasZTDUrirm2EJ1GiSwEPjFyFhKBaNDbndgfvtRA5CifCHsEUUXj1NBFb
DEMp2ix7yq8H2zkGDpwC7q6xcBjJ72O/xyxsGDsOmaK37CSM4wq59qP4PRY6
c4Jkmb8mzUntF3gTL76kRBGkrCdPxhexjyWKpkQZ40e+i1vETJWtRLz+VY5X
NqogdoloJjS7LjjCkcgfJm8uiRXRP+sVSFq+NXZHF+TvgKFPoN95DJaMzDD2
LViJZEtMvK3luPw26asJVkp/dYoP/5KcwMgKsBOj3F63x22/eEm5csqVxnJ4
DENYWxtuFbrJmX3HamAeOuGd6M3xLPrO2l+/tN0I5HFY1x0VKOngGWL3YGmY
+fBSz2SQfJRAQC7pY6jj1I/j7pMZID4SwQNiL9j0PcYWnb0k9IFHHDAmITxp
x712FvIGwUvp+1J8QZYQDlJZ9zCTH6Olnzsv1SeUizeQhsX0x7dkVehNlMTe
A8+PZc4S3ypWkrB+EMqLMM8my+Ys8it47w+xbSA0ahNZrzDJBHM957eerfQZ
q2yRET6YCAJh0ANvmUaonN/Bi99TWMf8Q/xZDO2oF5JEOuO0RXNfcOOJIPdQ
Xvk0BjxLQINRHlJL4b7KEY0RNEtS6lFqx2HU34kXqkn9CF/g76ch6cR1tSMU
xeYTRaeyPpaH7X37CsvYfWkbfP8aFEjchuUWoDBjVJ/zHmzPey4AaU5FtwOF
V/GCwpvq+OQiwVHxicYnn07PYh3Z6vWcYtCaGIgjtt6p8Y/0JPBOAaSgakrX
kiSOYL3lxcd2bfmrWxjOKwyu2PQ6WR9PGzfoCubBFjaIcJ4MpWYat9w3WfGu
PniJp1p55xfqAKTucRf77Y4joN9q3n0sHZoqVxl//lloUR5m/PMvqsOjVnwS
AU/Y9e0l1SVc34YxdXYa7alJZ49FG2aMkLyRcaY48iKWjFn7GaJGVD6JYPuJ
+jtVxYrQr3JZSduw0wQIHlz+Ngb1F8VglCz4Xfwhng9ICScyUTSLmdsu0VrO
XlGxuqr4MsjAx5kKm5Ub6PjiJbZz5NF+ZOpzvu/uZHnxUr3OL0fCJ+s56jWk
FuCngPClqsgD7R0JIXZwHQzNXdiBd/CXdmSpizDLp0uvfF2gH6NQWyQgZGYI
7x7rcCfYSw8pZYLMwJijnjqI6JO1+A1+Kc8zWgpmsM4segGMUzv+5AiH1JkT
uwecKf18hsslVcha8lv8kl/kzEM17kCxGG9iPjT9AJfcIhyayQH3YADaLGER
7Fc2vC4jBqWEgc6Gso6jTNmGaOOVyavJ5EFSvWRRh6NjQgUDvPCOMobKRAaq
oQXGpe/IbCE9n8atYnh9q4Gf4kdpnuhoLYRTjNJTHUdqaJwx43kSZDjezLlk
82cy4BAOIxlykDZx+CTazU70ZGQm4xbuNX6t8iFG+bkM5q4b/q6mm7fISI5I
ssSeTbhv5bg5XEzYgovsSgEhFkoNdXzRi/VWfpnoypCeCb2z2AsGiUBMzD0L
ET0OMTeICQbdfaUqHbhbp7J+bryHz+BFfhAo1TocOwGcKKkdeZFzErj4ztK+
sNfS3ydTivbvuBiB4b4rbdFJiIW3l7NwJ1JpbniDscekdT8+F6ZU3EwPN3Ny
l/2fDtaGZnymKaVLSsTzf7qXRMzz7TOqBaIbooHBWpcVMSw9alX6CZb5q/yW
y0G6SrJwnKZXLLiUGhum6VFI6ob0C9MHlkinx4IjaN+mwkqUgRJuTXhrbIPV
YzpvlP48yG3sfHemcGUC0eVA2bKeym2K5A911agbDdGFS+5ljzY6UPbYcZ0t
uAN0coH1nj4rCfjYathr9prqeEbIBdAMexB4mdb66ziiI9rusIkIwpcQBimQ
MeEk4+6lbs/UlxNyh9BPi3Zthhoz/DL6TlGduP6iZ7BvIncqlBx+VBcn04/L
iAp+yAfUW5Wa36K7HK/tyTI5ojeXrU76+Vtcab+kS194+UupIqWfvyXnU6yr
eSaakKzfRr+m0D+cM2l/BVRWsLNroEU819t6BzAYgrMVohoXob9yEhHZ+1qU
w7lOcB5Iyv4kCcTzYmKDUVR/jc/y9w3nji7jphLWkzmgGwdmQU9kkQ8n+Ma/
sKjr9Xcy5PnzIeyFybXjXLVOhTEYe/QXWeSVh+AbMwvHtRszxxiM3Ur1ymfn
abo5O9xcO9p4y3cqzXAZzIezs08lHt/Td84Ta5lZ80AmPE9k9i5ZlkxFF6ep
cm1RYeCtYzenX8LZRR0SUSAnxobFAcl8bCBdkOhV1MbMcaUsVsNhVdn4LfYA
tZN+D6RQ9jSLXYggPoJinpYTqMr8uJowvrYU/SPqOMSliLHl87QuolGkF5iy
L69grXAooHb3WJNx2Kz4dmnarcCb7lJNsnhZBCkQ3depJ5OL3yFMqvINw76W
Gz7oE9GoQZPPRa75L50WqzGDpbaEUAZ3gT6BSAgi2m/yhLJ4ichmwtI8yFLg
OBuDyA5xyEk7AsryzMepcjtnse8Y+zm8XXwg8RCygBAH6H7F3vMiBij2yPja
w8OIuExJAQrFSvgIX990PyxqPtRqClxK0McERiSHVJmRI4PSN5MUmos9BIrB
j3Wvwd7a7mJBjPn4kls0N/JMrmpk0whTB2+KVTiUlk8vvSs06nVBA3XJi94p
coA5MY2ts9k4ch8tP3IgVfx9Gs4g3jYpXlPiAoNpaq2jiH+suw+2w7aCzLrt
zHrSrOAAkYeoQzXx4cxDD2GDmBP1ssKcC/ETlc8znCGMIrs8ne6IKoYjL0IZ
wjo+CKlGMweZYGEqlOPdmzOqsXjBjuzwzItnKOovUkq0Tz2qWKrKJKNsw4de
AqWYhlFtUjLNzU6UJPNpWKGSShprDJRQDRGcWqvKakadvy5WoxQWIvAzOPgx
ViG92UkDOA8euLB3h5Uj+vkbvAQU8OLsYElRJ8UT85QmBteHV2CH84utU9xX
ZFPZT9EYzSozmwDnXxpAJ/NfDPrbpL9bgAKzeaobv5IAVhtEgAh5t6Oj79Sz
W/nVN+P5ubyas4W5lzIalPjNn39mzSrrYPWvZlD69FjYZjeW2OIMVAdVljeY
pn4wageIIwXUEdWTHVJijReQUd+4ZMM02VmDx9Ao6LTwbuI7H0VrH8qA8bKY
W6mzdQMPUcXZr8pJXGW9qoK/Kn6IjZ0jFRYgdUD9gZqmsvNwC4LchIXxzr2k
7M73MOYomz0u24sq/LUUEb/2Xn44VOP+s2O5Vo33ZZXpLWeLZ/KiJfC+vbCu
qvAPndaCH/b41yGVTcSDReFxUWQX+tup3mHk6yuFvunefaJ/GSkImP1f6Ino
9BvlWfr6T9jPF6elHHMQO4xInnkgwqV3PD60F4c0xhutX72geSKDUZtPsthE
seLbizNuw6o9IpQh0nYxauK7UjbARrvMXvBzo7GZOL6UbW2QJmIHNY9ghd9R
DQWCiFtmY294jsEbfHttJk/MUOggRlbjnIHRjyGd5gHfKwcV8b7fCfKZ3W74
1qOtdYXHN5CDcMQuR5Me7xdJPdH5ykCfhqbKF6F1xdrtbr+PyEFcutZeRUN4
k7KrMWqkpZmWNDYR3zouCDuQJ7j8oE7O0ibNInDfpbYfit1QycsJzTiM9Vml
TXXRONSVxis8Q15z3N1BuIF8valbZoWhhXWcvIKYewngB1BHZuxv7Ea/iucX
h+U7W4RM6S3AVcDBrhNsGbUZFkKBIruxtSgEWRp/ypColUps8CI4Sw7tUpyP
E9ibdU0UEKqrKczJC3hM9j2Gqco9DIcdbsuO9oXTVg8+EctdXuNpD1LjUz0u
fKh569pC9CECr24rTxj5lcc2f2UvLTBE4F+eg6R8+69MTSH9CvfCvOEqcLYB
/0Qc8Svu5z64JNhRz1hX2p6JAsSSgzDTICQALk1yQOw5iGYIAm75AU9y/5XR
P4ThJDvyRw/80Rb8c/Ad+BsEFN93Ibw4VTip6i09usTAcOeWohXCTVtaXXTE
8FCu7458tsH/cJdWFHJNNRqnRozI5tKcDWvBj985q+PUukBJjBKMKrrpDk2/
eCKTL6ZDO1hXPFhs+XzHB7b4ukHMYcJtHp55E9t+iYUr8jRfGmWs/TQ1gFVO
y1H23wvQuDeHC3I6uoV3FWh1ejz5GtukEO2EVvZRaw/W0wswIKiYEM5HxJHl
5qnwi3tscg2fCfcNx+QdCeH4S0nZ0aTK6DvEEWYsM1Se+PrZaT3D/FJqT0/z
6StJ7Dg1iJbRWpfR/ywqAph7kg9uziKdvX1+ZGt+KbJNVw5M4JjCvnhsNt/Q
EHZZkNuTaGuDZu9pSFB9C/jE0Qrswzd4skJqC5QqXWh0oQ7JhXYCwDDEgqKP
N3vmMZrkc+L+anREDlfG8cM4sKkYtuaPN+nnubzoSBbFg9HqyDi/KP3vP8q+
D5IpyRjXM++7ZWA04kxLlx6Pb3EoaTak4we/BCMqR23xlQLsNEmfUJZF2ViP
5xBvgV+TURz0jx/pWB2+64icRVFumuqlHD7h8+GJqmQpzXQzIEtDWNHYsLnw
1J74ntiQd6Nh4MryJeNjXHwv7fVke5fHOGEHv0x0Df+D2FApUKBBk9giWw4l
snatgZORvxipFtLJ4wN48x8M0WC7VClkDj4N3pLnwyU6g4gRkCEeX0ghT/GT
lWLn91DjFWIdedBWDtjvmDhvi/a6iRaoseOg7Pc77jhRAyjioGJ4TiBki9I4
XMQ1MvGMOb84S8iwtXgyomG8Y7hUdvzcYSKOGEPIIvc8VSnWwd9VXy76Ru15
+6lcRDQ/ARHJpub5Cyu4B6LsOKaMJKZQaGQeFLWxr6zlXdFoaDC6k9PoLFGx
ACxxeMaKHydLfCoPWQXcCsWuSSyEveQjKRG2HBHHSXhuLfoS/Hjwe+EPnrmR
PFRDngOYrIzBk1P67bZy5glIoD0dwxB2JFeFVHhUCba8431liY1oTxNOVjQD
QGXi2LUf7M0GnKawN8B1eCQ3mDqyShcFXuS019kIz6x458h+qeLoAlV6RZH3
EF0BcBUWGPl3UkTJVmZqfY8sBGrXO/WmPFZnfl7rNRq1dmeIwU2qpBbbjqww
Ro+/UWqId4ej2JLwSnXkwbBT7DBkzjD1uDspLiuVMqKxhlI6I0+t4maIBqaI
aYoEsDydSn9Mqay8kWeLqyePJE5tiIqm2vWWqJeCpdCWxkzUyjwMfSvLOtrG
LJAEa5ves5J9puq85a9uSur0qWGu3PSbsCiUPf9R1I8fMheF4yNbFLlK3WuO
xYzxF2k4TXlHkr+wcY3MW3GckC7yiqcV31sSP2sLDQF55Pu5FQR4MFh0pI4k
EHFF1Npb7s+K775N5j6qMvTu5DTGLt+xO3ZSTYlG18D8leI2ZpKJtN3MJDGV
wEQ86fqETc2igel6mykaMcrRfrYuY+LtqWZjmcolu9tYivkGDA8Nxp5h8I++
exOiYn5RpnmTGGhRDydq16YcRqjIrji9RVuEIZmCpF+pCY5cvhryAW0w7Kn4
nIppEgkxqpANi2fih8iHTRQocr6iYB93cFd25JafR7k2OnhMEQhYLY6mcKVy
xqUl5qevrvfwPjRHwgOgfd7uRYgiaf/hBIR9wm0PJasHg3HihzdSbQK+TNTQ
KjcLA0McFR8VWAeecCMP7lItkBoPq7JLCYhAjL+isSVvkkkAmXgdytRMUUDh
NDrZPdUPqSW3NhHM8x/H82+MhryfWpnw09DFzj3qfq8WKOnMNlU3clkelQcb
4ZF0nDdgDrQb0dIKdLKHljZY8rI/B8dQNk6qZJTTyYAC7TxpsXG2Tuiz7eKc
w5eBzPWkTDxtZVbUkqkqW8W7OOdNbB68QJtGirywt97ZjMy76NAsceaswC9h
TDZnyDhliN1aQWSYV1VeSc4uxBO+XeJDpM1kUZI4yEAM1dbY23QgI2WFkTEX
h+2u5rg1AFO7dXzeNjZnvI3keMP1pgw0JFpsuQjEBoKpUxZVXENaIBthjdt+
uLYdcUa3lGGiVRi+jArJv2Ev+TLHEhZnJUiFDY5W9q4W2PuPutO3xKrmZ75K
AywmL+IJdzoUEdeEb4VWFDnboZiDrxEomgiOy3fx0r5drCLMEYX8/Bm+ZKuh
95lO5PPgj/TsFVLiIZAqFTbWHRaj4t7lXXgqJy4/0ZCV3Mz5RagTQn0QkHnC
Bb82ipOpAUShAXceNMI/CNQJq8dhutGhCfnnMpOdkr5FHqUUToIEI0/ZpUAM
97xxGB2uQPk9hY81hyVGBw0tsU21aBYnz5HmA4inswRX4kOKPIoO1eLt0DD5
7GGuj1coXr6cv5jwg+BN9WDpa8BYcG3RkQuMdn0dXJs3RpQr0IK3qh1hZABZ
HnQhuZzvCVAbmHmyYS+sAJsLRU+eciePQcY08p62xFOjP15Vw18sNcjC3t/i
RvYUCmkHwx53sPs6YRQXpNyu7Lz0fjofvgYXhKqBruC+W2oUhsLBivQbP96Z
4VpHRMNb7gAzW8AA+goigEHCBIuLRMO41Y0FpvtVmCHHAjsZX1Di+uoYKbxo
xY5mR1G5wSqAjeO+C8IiFimFYTR8qrgGqB5bHCyNp13DxQ16nMuDPBn+EB52
LEdSZdfeLeqSKtvaVnAQ24BQql/dcRfI4VyzuROC1rWvwC6kmAwZYeL8bK6V
eEQFw3gHV+p3JaoyEz2mBJ1lED+ar0A1EZM+1kgMKYdzhw0Jxa30fUwRoN+N
2ImF43XsEp5WmaHjJHYFhXkIFfFx45B5g2cls+XGobxzbIRhkEiWDy6kAwpY
dgP9sjz7cXoD61FZnaIv5HTyw5uxXKipsqzECgWgPG0RrlEVObQweSctWIS1
vVeDf/BBfkgMRiqEypSPv1jZAo40CywyuQXJORVIK05loDZuWv7NFkVv2rYm
Aa9SjS3Va95jhLeqoD7mux3GgHhTwrAAhids5GHUdGN4NC2mVMNDARIH1kbF
Z9oMJa+GI/0bFYglE1p0rDkIeHKIUKPgKQSI+zU4JOjSUzh7deBpLXosCvyE
3TjEYb9RdTRcEKUeqSPbaPsbRZDodF8SBXyPG6e7zFTS0b+0EIVxbS2v5UoI
jzVUJHZYdYTRoSXtmxgBX24cLj7wyAV47QZmBCOjXYQJu3ZrvZM8wwPaIYlp
i5jY5VBPN8mToid+UHE4uCRa7cQBskwKE6En2A+Xl+dzHSed3N7e1h17v657
PldZew9WXXjplAehxtLyEfOXUoH6gEZnPVMLHtxSQws62gKpxNJUYlOfEzEj
DMLfOKtD3N4P6GxmmIB4LzfqxCMhC8WAOvLo3L3ji2mq4dS09RlljXCCRqLz
J2coxKcYgjhYo2nKLjMXWNe1JG9B3NKsN+vcSI+CripfbYC0G2YYojuhuwL9
R7xpmmqVROXbWrmfb7M+V35N7gvM+PlVWfixsq9HGUOaW1ETx84RME6ZHGvT
6IafjeZjjYG3veXrQH3zmMqrsMid44F+TKPflJ9hCK3HwkPeCFqnIS3op210
2/Jzs998nDHoYmGhUggjYWS64FomDUX56+R4SdPgQ7C2wh13fJfUSXRSXkrg
nBaF0dQB6qb7rWZa6oXkdf0S+FWYhvLfb+XK/ZWJasdx/PKjjSVcCojRkO2b
ZsTynOAmFkAyo23Erhud7mOO5fzHs2gcHC9mo9+Pv7NvIO+xXqfTUK+3O53e
I45FLAtlMcK7TLPRis+/1cY1YbSM2HWj0Wk+1VhaYixtox+bP5IIB9Hst3vq
dbPXaj/6WEbWFTvpSRoZRrvbi4+l30Wm7fV6pnq9CYN+tLFkig60x+8lOUgf
wlP3FR1KAIbbI348VCsatQb15KoOn4iu4KNhO3gtkKIzGzAEe6CuNalYV2Av
a+i5fVSM+9D+zTjwMnS40OS8EgaIfAMd4SSqVERUgxwsHh6gwqNM9z6g1P6K
wiayGUW0SVp0iaCQjdykzJ187rDy+30neEexsUQ1i+37nh+IqLmoKS4+GSqn
4EPawNUof2jB2+ET33NKdYUSKzeHDdrslOdwbMpURw6qDIYkQpwiEB/GHLfW
iiIe5GhbWEiGB61QnImCYjRz7KevWJgb23pnEYm4Z0jBDySba28kMqINC2G6
1LfW+4jMGKWmpuV3WTlwNYIgfO2RzTcZYOl2tPdauD10IrF0TDDaTnEIeHhl
4/YKWYJCHYjIDJO9injoRIZ46Gg7XnMZOzBLBnA/RqUTSggsHaF15Dwx4kHt
XckTPhu+HqZXDNbly5rPMK/MA30YbrvhTVnsW9GSxXfo7StRcoZfXIsTCI5o
tU1jgckT5MFTtbqfW/RY8oc1w2I33fGF3BwlO8fveCc58ueVkdXlFtEdKk/c
8m7forct24Qrg1Rc43jSPFm+ZbsYYYrqhHj7WCDGDdWo0L5hWmIUTOPbEGiL
nuinTndigH/P4/WUYJIRRqBrlT/Dk974zJUnnNTIjcIAyF7UM1obwP7qTumB
kypkCpvj8GMxksEwmaSOYpg8SHdHcxc+OfnBKh7AI1++46t2Y9EyB2YXXXTD
2HZYdhrWUmEsm1OrTsEWbEQv+g5QaJPHoZd0ALrwjMU7OaIBIgyQSEaS1dpR
rAyD5jQ5kMAgzra2u48iEpGyCoNCtjwXM+p5cGs7VxhlsK5Q+e0T8lcZOMBb
i1UqjjvYi6MpyDfEt16Do6iGBHnRQ4AsrC7+gyxhxrTIH0WXeC4KqU06DJH9
+eea2cJdm3/+hXu8Fri+VPogZTAeDkBhk5tsCO0OgGi3IxhmCkY6fpMND8/W
AYj4TwizmYAodpAmC/QuqQBYFryASKEql0qF5A1Glbg0WdHhDqEcueOWywrE
hhbg0SdKGR6T3hy2bhAxrXgzrgJREaDs4+IICyWRDG2GrSd5OzFsXxGhVtTv
iPcg3FiTQ5J1OUSUbKCMjmugMEOGLz46m17OYGAo7I7o1Ud8oclrkUyNsU0B
1CQMQpk8kV3di5jE3UDvLJb1kXU/aHBzRMe31t3vBwzu7/iP/PchP9JxRafj
tTSp5opJNY4ZNbJGiLPiTTMayyPhhfwsdIw1hebhS9Ux6fDyKGPROSK8/F96
IfqlXHgGW2bRb0q2hDXenyBfYsB/lzO/y5mvQM7IWjjNWGTY4Vd5U3LfdGIP
QMaMHgm7Ulp9thkZn2NGZob8za/5rz9sRp+FRs3POaMnppFOL0lFka2b4mqg
nI5S+jIqSsna7x+ikyJgn0kJ8Yb0sZbyb84mVSwoqmJQjjzFEuoJt5KE57Q9
rq5qPJamEs7Xhw8f/ut//e+PHz9ipL/To+GEeyap5kxst38b2I+j3p6JdovO
XL7vz1Not609UF8xBYd0Ezb5yx1LJGcUvuXA0K3dhO387JryazaUN9guTf0x
6ma912rUDaPZbvXrRh3+LxwLrJg4lEaHwdo0hwwkZ6uHf8+6rDFhDQOvNwwt
FLnk4qDK/DyFvk7QaMx3PfITNvLHkkMjvneSC55lnp2VSyOz3q636s30U3lQ
tDRqsnabNVr4oRyU50IjU0ej+cF3C+mTnFGKRgGHUmVBgSFcgkat+40ln0Z5
wJ4jjZpaGlGzfplwKzmjNI2Ulv8FMyqkUbsMXsrSKA/Yc6RRSy/rsC/VXZmx
5Mo6giKEXUkoGTTq3G8s+TTKA/YcadTW0eilt+Q1nsVjyaHRRkDhRJK/wac8
KBk06pbBS1ka5QF7jjTqaGXdnpJZaFVjCmeZqZnyZR1CeeNLGJxU2G07D0oG
jXpl8FKWRnnAniONunoa+ba9L2F8F9AIoYTGN/+1CEoGjfpl8FKWRnnAniON
ejoavfGvLNf5m1UYm8ylkadA4YvIK4aSQSOjUQIvZWk0LAnludCoX0QjsO/e
gstfPKNcGlkbBCIodciBkkUjvd+aBSWfRqOSUJ4JjQxtnOESw23lxpJDo/1D
oGTRyLwXlHwajUtCeS400sYZRtioAzXRGLT+lZdthefSaCGgFAEpRaNiB6k8
jWYloTwXGmnjDOce2GQbGOPqU2JBO4JSDKQUjYqN79I0ypWbz5FG2jjD97Qz
rThcl08j2t9WAkipWNAjyjrzK7MZDG2c4YznBXJD3qkZpWjkPARKFo2Kg6rl
afS12QzaOMP3UZ+L8AjEwhml11EIJR9IKRoVB1XL0+hrsxm0cYbJ6wLa6GaU
otGqiDY6KFk0Kg7YlafRtCSU50IjbZzhPLAPK8+92xaPJc9meAiUrJjqI9p1
ra/NZiiOMyiH1ObOKNeHzQNSKhb0iHZd52ujkTbOcOYu66WC37k0+teD7wTi
FIM3a4Dp+TuPK6iXSki8gEZGvVnv1A20v+tNw6h3GvyM3NyxaGk0QmsBPxjk
JRmsZ7JmlzXHrGHSRYM9SxqZ2jgD0ahM8PuhNMqGkvqZp6PnWXi5P6XTFv2n
U9pkz5PS2mgFUbpMuvChlB5HSUT2MBqlLfpPp1GTPU8aaaMVEw/3u9AuU8/F
TVjZY8mzDglKCKTKVhkp3VwaNer9utlsAV36ZqPRbDTqBv5fN5O2SCGNhpjb
6JvM7LAefGiymYnWfIfoZfTTUJ4LjbSesIgofWIWikeU7llHlhVRekQLPjdb
8hxppPWEy4SBUjNK0ahcgRIrRaNcqzsNJd/L+soyhabWE760N/buGrePFtQG
5Wc4JJSiAqMSNDIfMVNofGUVYKbWE55QO1RMSryKjgQTSiq2xvL10XZVbkGW
qQB7xIhS8yurLjK1nvABC+xWpcaSQ6NDKRCsgEZZNkNK+H2azSCLkp8jjbSe
8Fs37DC6ylVO+TRSoOQuqPtWjeuzHZ9SNW5qoTwTGjW1nnCMRnmGWWka5Vp3
96WRvoKrxDrKpFGPNRppKF+eRro9UXimBDXcU7dEKbuQyu2B0pxywT58Iw63
uOcWKA2s57UXKjw2QTxWuDcKXBLnYfuiLmMjxWPzwnM2xvML3TEv6ORqzluT
Z47gaX4fC/ZbGb/vt/o0SSj3W4Wc/JAV/4j7rbRRq7k4ygdPWi0dodfsEyEo
ACQXRgkL1ARpXGiClrNADZDEnyNfFkGJi4RBiN0yeHnyHUFI4bfUV+ceM0pR
+p19VwpIOUoXpt3KU/pzVFNFUELVKCn9Y3m8PP2+IrGmhxsQ5rz1m94oLrOm
AUiBc1mK0oXJu9KU/iw1WcVrugxennx30sgKnCV1bqPuU/vMSGd+hSRCKQGk
HKULa/bLU/pz7MTMofSoPF6efI/T+OIlm8iTDtGWOPf0Q8rfh3bxUgWSBaMc
pZuFIdfylP680jtF6XF5vDz5TinVbj/3Ns4S+98VzShN6QhKLpBylC4s1yxN
6dwY8OegdHm8PPl+q+Fhf+1RO8UC6zuX0paEUmRllqL041lk5heW3sPyeHny
XVvkAmJwosgIz6U0TLGcmVmK0o9nkaUy1llQnojS0wgv8zt3b73PhvLke7+i
NX2mtA0eLpfJQGW5NY1ANA9roWRWgbThv662GEsDRUvpnlIF0qY/XTVPkIby
1Gs6woue4p9hB5nsXqb2NHS2drC3tjv20ol2JedS+kF4ya33MQwDlreJ+dZ8
KFnx7Hi9z6TDupRwwF/NNJSn8rIIu+o5ixK3KmrZI1NaX5Ei/ekoW6s0+8qa
UZY/HQLJgFFOehdvjC4fOfkc1Q7F/nQZvDx5XQueqAs2QmHgJJ/SDkEpDhCU
86cL+xSU97LyzPjPQOmz8nh58uoYGsJ9Yx7aCqYyQMpZZIXlMeUp/YXj3q/L
4+XJa2zIzcMCGzqQsySNNPWECKUYSDlKF26tK297f+Fo6Hl5vDx5pY6gdDHj
laD0PWOqmZQuLB0tT+nPUfFWSOlSeHnyep+ZbwfX2KEVw6JlZ5Si9FpAKQJS
itLF2/zKU/oLS+9Zebw8edXQmXvtLBw6l1os7xIz0uyLJijDIiClKF1cIlma
0p+lQjLPIiuPl8ekdG4lQkHcpJyXVRQ3uW/kJEvLPjhyMsqC8rReVlHc5LEp
ra1EODtnFzY/Oyy/U0H+ml7VdnbN2WEV4GjjLd+V0faFlM6Mij6Y0t0sKE+1
ps8LMSKhPCaltZUIw/njUdo67D3X23oHYN3gbKWDdy9KZ/rVD6Z0LwvKU0VD
5wqq8qE8JqX1/UvUNX2TE2i455qu6WHdi9JmFqkfSmljnAXlt7WmtTGy2Jr+
REon17SG2vejdFYs88GUnmRB+W2taW2MbOR4W3vvO8uYTVYwowxKLyQsBFWM
l2JKl8HuvaS3mQXliSh9DyiPSWl9jMy31RNaMPmChfXpo8O+WC5L43N9Yi6r
lYby26K0vq/LeH7OXntsTEd6lpyRdk2/c97XvGWwq7neMhPYPdZ0q4cfC6Fk
7ZRKrelmQ/yqg/LborQ2RiY7WMVT1NQDhKaunVGG9P7rUvNcNl4KpXdm/PvB
0ruZBeU3RemWvhLhxauzV1M2tnbhudvFM0pHTrbO1i6GUUjp9Jk52kVdZk1n
7aybaaH8tiitjZFdvpyzmW3h7sdP9qf3m2DNQZWCUmyRZYVFH2x7f25/+h5Q
Ho/SZltf731tbfAsa5udW0Fw6/lZ28fzq4AllAIg917T+jDZp6zprhZKitK4
37HUAWb5VcDl8fJ0e275vtjYjltl0ytupYxN9iGH5YYlzsp23PH5p5yQm4L4
vDblfr3n5/533yWbYrISZy6Fa/SpTyUcunflBpVf1VuYZtNAyd6TUS+oFyqU
xq1oT0YjE9Zj6d0nP5VQtM0BfnJWnO9PJn88LZhRRm+32g2HYmc3bSmgkdms
Gy1q55Zdds1K0KjDOl3WM/BEBx6kamjAPUcaaTN/sa6yKqXeJCiVSyO1q2wu
pcrTqGxlZEkaFVRePxcaaXN2Z+7KuXFWB1AHKoXOUmupoOJCQilYS+VpVHY/
UUkaacA9Rxpps23hfiKVQlONtMvfT3RTuzo4K3uD56Pkz6gcjfI3hBbSqB2n
UfFZu8+FRtqYukySsfMfz9jJBfytU0asaB2tasudyIjWrCC7C999fHXt1pAU
lPK++vSJsidPvi9PR6MTpfr/NBrLfWmkS1zfj0ZZ8u7BNHqSGOmT77O6sLce
Bq7PXvH22egeo4N54SWO3lJnlPpR3QuxyyNrRvmU9oMdvrm2dPLxUiwxO9w6
zDHjCyndFRLTMCPrMGXKP0dKay34x6G0/fZsnHeUiRZKHqXtg7PMPrP3PpTO
1o8Po3QS3nOktNYPeExKv7Lcw9qijoCfuqbtQ95hIvehdLY/8TBKJ+E9R0pr
vYnHofT8VW1y/i2lP4pmVI7Sqx3mP8pAKaJ0tlfyMEon4T1HSmt9kkelNG70
RuotH1xzpFAad9Nn4qU8pbPL/h9G6SS850hpbW7qUSkNENYOPDfCiAEA0c2o
NKV3ixy8lKd0dj+Lh1E670SH50JpbQXg41F6XkJ4l6d08FjSO3v/zcMonYT3
HCmdEa14PEoXC+/7UPqRpHd2u5uHUToJ73lRWpdvXu5iuWZdVrdkijlMAoen
JMYyzOf/dN8Mcx7A3xPMvyeYP0XkPbcEszb0EQ2Oejv64M86S6VaUytmdILz
r3tY58Cn8FfujEoHInPylw8LRCZTmM9LcOYkL2FB+Oy1R4QpGEshjQ4uwaky
8aEASiGNHnk7RDKF+bxopFNuu7/GlJtGoZTUbZrtx4pqOxveV7XlwPtdsz2O
ZvsNKanCze95i+uplRTtHSk3lnwBaK1o50g1to8kF0qJvSMlxlJaAPK9IxlQ
vrwAzFFS46FIbxUxTgkaLS0BCswJSw/1fjR61Kwz0ugZK6mcChtsZYim3Xan
D3hpZ5RBoz3AkqCqTP1NC6WYRo+adUYaPfesc0a/9SHoBjqxx8s/zrfUOioE
dT8aZcUnH0yjdhaUZ0KjjMoArNp4ZbnO2g6yj/JlpWjkgx4qAHVPfZSR1n8w
jYZZUFI0upjhQX69wgbPnyOnL7rkvuG9fXLHUkijgGDlgronjTKMhgfTqHxX
ny9EI32OFtcROrbrgpBIyXVUAOqeNMpQSA+mUfmODkijntErPPzgSR1bx4o5
tmkH4X6n88Wa0Mdc2+mPbx90Rl8GxN+d2/+eYdtHWAqpw/PKnJyQXpKf7A4X
bgkqMbiiDUESRN7BDqW2A3XztwOV3wzUztwMVCgs22avqIfxY4jK3CAFppnn
uCx8OkUhKw9ZpMre7Wq0uPzhA9OPcUXWzIpPPCw+24yFJ54bXbSBCaTLeONg
LiMvP1yCLkuC8lh0ydDuD6aLqYfxHOiiNf7GoIfDhj954yimC0DKBXQvujym
2Yd0aephPAe66Lf4bC1ngyp6D94O7e/hbT5Ok+MopIuNkM4jQLk4LaRLRhXc
g+nS0sN4DnTRbhkpGbwrQZd06C6Ig70XXTJ6HD6YLj09jIcGhB6TLtp2R5Sc
eBQ5hpAeT45ldCR8MF36ehjPYL3og3Q/2v7C9r0At1i9PrtUbYAsfGS0GwNf
pPbj+Thb+5eki5ktxUrQpRuni5kUYqwEXVrtdlG3+Meki9ZOTtLlx4l200xp
uvy4ytwjcw+6ZFbePowu7UwYz4EuWjt5Pv9BrpH8cZTwX5bg28+v7c1GD/B+
dnLxdtz7yDG1KVhxoNQoDJQ+Jl30h2oDXYRfmT+O+9BFD/B+dNE7MA+mS0cP
4znQRX8E9sFdbcAiQ6TisYuZ4yiky4Ig5QC6n//ywFaWGXQx7+O/9I1u0RkV
j0kXfQL11ThR1RgdjZmBjyy/crscx5JfeTgtXi8PbF2WtV5GehgZCR9dZ5DE
OB6PLvrjpYEuF2oUWEuWknS5eES66B2YB9NlrIfxHOii3YCBdBn6y2s8czBH
z5SjiwSUNZf70EXvwDyYLhM9jOdAF62/j3TB8P73tmvnrJhSdPnx+8dbLxln
sj9YvzT0MPT6pfWZ/Ept28R3h3TPxHgSsmRClJN0QzSPpUK/f/3xfolQPaTP
lAJVX/41Zzp/Q2W8cX64z8+jlvHWtJ4M4ZfOP7119tfCgJ6eTTRjyZEDINM8
V9jMuoe1UFI/J3GxhiU5+i5JuVAy5VovpyQn1fXXhikBfxyolQRb+95WGtMJ
1/dRS3Jq2ihAgkbz7X739nLWe2U5m4X3PjaWQhplP1wOuyka9Us0skr95NGo
nwUlRSOSTGV+HpdG2ghagkbXlr+6BdHyylsdNrZ6xHEJGmU/XA67KRq1HptG
rSwoKRr9zP7uOasqW9zhGd6/6MfBoTxmGa82+hzRqODnsYpenx9etLzrr5c9
0yyBmM+Aly+zpvVVCqvX8zLc8lvGizbKtnJ8e4n16/c50v6J8FKOQOyx8aKN
phxcB+sxZR/ByPP7Anj5QvyijWY4dGBdie1rnwEvXN6WgvLkDSe5DwIu2SrP
ZGafBS+ojUpCebry5is35szHHKeSbjzm6vk5JsPNFcZlrrcxbz5wrqzN1X1r
m3VQH8OhD9/muMvNYQWcuQAjhQXh66xoEugmu2AdRl+C9+uta/Bn52HlN3Zp
UR745KrpaLS/oQrq31BcgbOWluGL1/BjxRVqZjulCy/mw/l8WDv/cTw3ajfG
X9rCb/1hWEvnjTNjpcG1ZdTwwZofWBHXVwtlW+wHofwEQGBMsCT9ux3SVw8j
H0otDaYElFjkNnV0TtnmYtFKBGCv3758mflUHpRYBJhvfsk7hid0+RrZ+mfi
ucd7dghKmWCPqFFrmoOSpuPJfJjHaVl4iXGdvVwBtxHbAZR8ICUo3Wi02nh4
ZVkoMUoPF0FR5YceSorSfVkVIyk9nrLmRByEmQVFT+k6Xt+hNQfaLdJFJEkj
KE/qyycobebW6ZSkdD6Q8pTOrCFPQnkiSg9l3CZN6ZL16MXkjY3lSaMTCUo3
e3mVDCUpnQ/kPpTOOYPii1O6TIXIF6R0Kt6SoHTbKHsISw6l84Hch9I5HPPF
KV2mZv4LUjqVdYpT+sepkVHskZpRjNLOqqYQG+yzd3Y2oBxKq4HyTlYePQ3l
qSmdjrp3ymXlvyClU7HCJKVzdex9KJ0NqDylyx4g9EUoXWY/35ejdLpWeboC
g9zI2N2Qh5ckpQWgKv8M7JMJN5fSRgOPiy/eq/85KN0mAjeR0p0265Y74OO5
tFpJS+9Vq5Ujr7NnlKY0AIronAO1BKXzFrMGyuehdLkDPp4LpVPSW7pWJL9/
eDUc57lJ2VEcC6X39bm3Q9ENj9eut9ZSfM6Dkiu9zbIe35eQ3sZQDyVG6fO8
2G0VT8yz34NkJ+Rnx6V+nMwozAnUqbLAtnmhZL/drrML+68HJ3YyeCYU3146
O9oTsjssNs6SBXtrD/9MnDVQsfaDvdlsLZe9s+/qj811qSiOdPNiXJflspXk
Ong85DoNqPJcl7e/4YtzXZna89+5Dt+croWXLmeM67Lcx5JcB4+HXKcBVZ7r
8tTtF+e6MpX1v3MdvtlM2VI5eZK0cszLk8DdJZMT98lNZDVEy+G6x8tNjIpy
E6Oi3MS9fh6X0ilbKofSaYWUR2m4+ykoXapj+Jei9PgZUzplv+RQOq0E8igN
dz8FpTM9pedA6ckzpnRmlns+L5GKyqS0H1gB2A27ICBfWAFaAKWQ0pmBhkxK
ixlU2avvZzUjNivQuNZm/9J2r+Dad6xp5lK6ZRRReoi3NVvZenoI/DKLZak7
DQELngf3moe++QESmVA4Ow0NtFMAljHMG1c2FAPtn8cZi2WKRBzcan5VsSAz
VdunWwGZ2bWvZgXADFIrgK7FVgDQ/vmsAPMZrYDisSgroPl1rYBUFaduBWRm
Hb+aFQAzSK0AuhZbAZ3WM1oBzWe0AorHoqyA1te1AlLdtjQrIDulm5cPiADV
CtLC5XN8efuSv3jkZKqH8kwo3UxVXWkpfe98gIbSj5HNzSuw++KUnumhPBNK
t1LZ3B+AxC/Yy1eFR7QmZ5SktLW5ql0HQW2zDWrXVnAdOFdVeX27D6+xXEon
tBr838G8ny4W/xkozaX/KEOr9bHvHTa2MJ4lpVMRyD+90hsZhXhJUPovQNG/
vN+WOaAqk9KNeqsOdDa7+HdbRCuy+lh/BkrLaAVq9QbrzvBvMEeiUEVDA+W5
UDoVgURK/8ury/vjJYvS20Ik34vSrWdL6enzpnQ6g/pK5LHmr4rLIrIjkFtT
FFxt7wclJb2NdgerNPpd1NeNHEX9mSspySEYz7DTPYyq12TdMl0Iv0jVlW6v
HN/IFsQ2zGm3qZU8xZlnw7Btjn7j3O7dA/bNaaF+4cNAft/WlrWt7XltbNNz
ZNHif8xzL3UuUEkpxHJEqx9YhXvItFAKwz2loDxRcmclwypWZBivu3TdUPaT
5SR3VNF6oHO9OAsgB2jG8sQbT1T+O/nJRtLBMvrP/zjlyjWwlztwXH0jiZjE
foRwClVeyJw7pSJS036EnDO4k1BipHbh42p88G9s9p0y/JM4dPCs6t3TXFIb
zYzdZBTQUrcqZMbBomfo8JJGbuPY7LoSD4QpCKpSbJMdZdwEHnvnercuA612
zrNdlhs4HEFVkJrOFkvOb4zHZjvNLpgSbNfstb5mtuPDpx5FRtMEF6AZtSfK
ZbtGEdu1Mf7SywvikoGf0SQ5b0afge0oxURsF9JXhfLEW3JKsF3bNL5mtuPD
V9mu/ZnZrkSROvvsbAdoEWwX0leF8qQ9UP7EN3ecvAJT88rb2v5dRp+y5IyS
ccY/ld59UmIvQVEzU5bDdU+1l6Az1YNgOfxyr5/HpXQqS/Qn3N5Rjs4FlC69
+6QEpQt29yehfB5Kz/Qg2LOkdPqUF7kT7OTyFnsbreDCreWvAi3F8yj9+04w
DuW5UDrtItFOsJM8+upn9PtOMD2U50LpVKXj7/nAEMpvKh+YPnvg93xgCOU3
lQ9Mn2bwez4whPKbygem954UOveZiIn9LHzLcXeetzkPw555U/raQgRF08vE
C0UUmqiCmjgq4t5uljWUG2hoFQUa+mhPmDkFk7zxDz7Qk9yaHVl9rEDDk26n
eXTm1QTX8hDztTGvfnr3Yt6sQxe+APOOWNbPc2TelN386MzbNszfMvPqp3c/
5m0+G+bNbun8HJk35Qo8EvPOLs5F6qzEz9fHvEXTy2Nes262YTB10+TBCxML
pQrjZCnmbRcx71CUO2WOpTukCiiDtWcYruiZZPBmzOk5Mm/Ku3kk5g225q40
9359zFs0vXzmVev6mo0so6GAeUuWEuQwb6yIz2Rmbif958W8urI+KrOLV/Xp
i+iKyvq+YfODs7cWzgbPJvTWbOWsqbIt7HzxDgAq/eXXnk+dnHF9OC478y5Z
AAAt3/GCSgVLw/TPhYVhHz7wGsGPLNjZS2d9h6WBh+3C9vH10RNV5np7qla7
vXaW11Q1F9BYN7YYhXUlzlFaei6uW8cFkqzsG2dpB3Uqw/Jly4+N5cPNMCbe
IZ//GpVmBs7f4CYkLLxmxfYeszcbZ4ctP5a0DKgQy7vyrd01SIrpeHxaFeOC
qzaV09FIfHGqR81er50ldRBxtruNjTxE1XVUKUfrK/GKQM18VWVChEarCCZx
L7x9a72zseRuG2FlCTc7KwuPrkAEIW0UYhC+qC4SyCdeiUj1beRm5IkVW9yB
6AmY8V//9u+GQe82W/AZRCfQOqRcnReEvplP2Q+2hUWakfRQi0GXXmDLWlAn
IGLYlO0B/FoBYp9qBuHVvsNLHz98cCzXql0TVGARuBHvONK/6yjiqqhWlNeH
vqF1SaWuWDSKM1Gq6U4Q3ulRWFNKpAN+DtjKWx6QVpj29mWNJ5/vK3vlWOzy
bmcza7fbiCOKX+Aka0tYgbUl1knCrOXnj5Wfrm0+xZwHtgR2j2Dh/bC0VlV6
BOhoUT0pIfovtMbDo+bq7IzXW+4kMtgR0fcIHwnsPWLuaHkNS+KoymcWIPZh
MthIB4eC1GfL8LRlYAm8u66U7kYHj9Cr1t5m490iupQhf/hwMRt3es3ex48D
WP54ySUVq8y4UpkfFvvoqzgCKhXRl2cVTQak7esXw0rlDZHL2sS+oXlWKn9g
Y8tlC8Atj+jBhHe+d+Os4DUeWx98WpSOi2ft8LpWa+Ed9mF1LZ3/ubUt4g9R
ver5K3qGfiE+CrEGdyjICurR++PYxo8SwwDG4i9UwXDC7m0QikAWuH0hyn1h
GVKldBZhqOYZR4viDubJy3UBIwsH5O8doFmeQ568YW6TqIhOPB/HbsDKF8IQ
jO7nn2Pr4JdfkCNwdN4Obhd6IgmfiEUKKLhGrUiCXVB/kAZZqQwj7gg4llCn
0G0Rcw1Y+jYbhKl3x2UPLmp8jJZGCmsIAcY+860rWtBOdM6SdvjD1coR3KYw
zQAZbYIScsnL2DcOvMmlMzpRxtKQ+WAJyh/YK+sKBC7XaCfB6YBdjiY9/GLm
gIi28eRZbG1FX9VxFfCHlsACXnDN1ngXLRYscKe7OHaB94FC/xdgwHI2zBJH
JQH7YAm2BbIOh6Nh+wED2Xr1D469X9c9/4pTk5ifFtIAcPnq1ZvXuAyxHn0p
lJQrv+bIoeOLBxzvP31fqYyvLffKpnf7IBds+O5sOocvSknK3btlYDSkrOS/
FUpL8VAJeQl3R8fI2xdc7SjC87PKOD7se0s5+ub3FZ9e8bTaFfIyQd/Pvtb1
S72ft9J/Swu91Dr3nRs0PeVC578Wr3TxWLmlfg53A73Q8flSS5yP96GWzO+r
/Nnrdf1aN8zfF7uyCsAVlQvd3hYvcri95AKfvvpiK9ve/r6q/7ut6uZ/o1U9
9obnyF+4ibM2o3EkQjj8Kz7EzGDOiq/AiBsCdpQd8ziqZn3LjeWc77mmFdtb
MwXLURQ40sxPGzYKL1353mGHD0YhxYvp/HJ92LCpe+P4nkvxYHYy9i6m8T3H
sf2uzLKCm6tKYez32/RH3TOYxFBEsDZszUKZ8yvjZ8X+Gm1UVuPShVtb0x91
z+CYciJbfAC1aHi4ujD9nRIxFHHP9fo0kLr3hSSsyjgkXPCN+0IC1ZWeHUIy
MiA9HhfosgF8cdYwciszAmm2B44IxFb+y5fzmAd1SQtWWfX7TfARg/lqQFQq
2yChazF6eydjZkda0Po47aVvucHOA0Z5ad3BxVDdnQCQUzaVwjcI47R8Uz82
A0iqDgx9YxwNTQgezbUiBYFjisXTRP4GdSiZB71et//xY52rJpyzvaZ1LyYV
wAJnt9Ydaa2A7zuvssWB1CAqsihnwls8oHByQHzAqFFJT6YXNTvWr0AZTZV5
OwtEKV37Cxo+/7dRr5v/YrZqxv/D9YWDPQM0Icm/JwId7ASQcHBvfeBae5UM
g5xiBBFw4vnHAXvt7UFdIDYROerufzAvrr3DZoXYXDnB8kB5LpwRQPW9G54k
2Isnf/qeAWdZbGNhCDrYywyD/HLrXF2DGVAH0t1aGFWH0aOtBINd+dZ6L1HM
b6+Xbhjwbc5vKbEpGwakDoFH6bik/B6SJsz16RKCOWLw25zf0g0DQEpg+Voq
iqHmK/85mb0snVa8B15UTJMlgLx1aV3FBQH8fi9J4EQtLI5CiBl5Gs9dOmAQ
jsgelhmbC5mNskSmBoCcCihSDGjZ5FOSrLxEAF7CPqWtRMQmn9JWgtjkcjJC
RTlBP+hsb28HShKo3E+Yw/4VBOsW1p6zBNt56PIcB7A7ZRVQPI0TEinQQwkN
CZQbKjuUGcvj0CjGsnCFLazlO2Be0BUWJllTqyoAFgaxNeRqT96FJ0J0+2Yb
80VowkuprDwIolLcDAgiHYEPfPyYfERVKyDXQu3zZme78/nLBKcqLxhUEDFI
X/4Jf/4IS4qcgCY7abw3T8Mv5raPvVZek5syYIbZMzt9vMdYtxsr5b50Yx/N
Abbh7WdBcEB449ffIUr2GCQfD6PhgPcE+uIuvIA/oDjYyAaDA9jgH0HdMIM1
GgP6w8yG2WTfv7pMPTBco3bQPtCJPTDn5RQ0pIZRM5u1Vrs2m9Vm01qnW+v1
a8NR8l51pZ6BJzWIvV23jAeJ6prYA9FDNfhqwE6w7eTC2Z+m7todFoPURfxp
tAYLY2Aag441WPQHHXvQXgya8Kc5aDUG6/ZgsRqsGwPTHnT6egjN9cDoIISm
NQBobXPQtger1qAFnxsIvGEM+suBCXBWGRB6A/hjLQbWctCyB0ZrsOoNOstB
oz/oNQf2CgH27YG9HpgtPYRWb7DsDHqdgbEcLFuDRmfQbg26xqDbHdidQcMc
dBqDZmOwagzahh7Cujvo9gemNVia8HjqluH8tcFrl6LOGambXp/NL9n47cUf
pwPecyO840+w/G6akYsexAchvkbCvyXfOAV64lw5e1hV4aKhO+65hAADLcIG
EAt4GmjUhMkuBsZq0OkNWv2B3UScw7f9FaKr0Rx0lbEYzUEP+KQzWJtI2Z45
aHUHq9VgZQ3sLtILpK1tDdrtQaM9aC4HBtyjPN5vKK9uIyHWncGqg+wB9Fob
yACL1qDXGizXgwXwG7ylEz2+BGr2BnYLmQSYE5gE3mX06Y896C2QxN3VwGoP
LBsZGEZldOJCGE09MG+ZLR1PkUi3Ft6NHZOOoDGaBiylO0qex6A0G1RMaADX
YrVXzwADnFmNqPsxbxjOm8Cs29gsCPffWLLyC1sJVVo9eB1rrqIzrLFwrAMv
xcJd/GyK3ZZYBMbvWbLGgrVN1upg00uzUem2aCNmk8EHs4EXW9R93LBxFxy+
F8A2qSG1ofwd+1NpW8rNnfybGdzcpF4jTWr0z98FqyUxTgDIIZhyDPgB5tXG
Dzj+jvxAV/C93Qp+AJT26SsDW7jiG/vxkjrZiElgTy2pSyBWNuGBDy1e/Nli
CwOPIe1YbNFnHZu1F6y5wOG1GkipxYqtYXZ2BdRVc43kgJubFj4IaG+DE9DC
JpTtBsIB4P0lDnXNh90DLmLWkrVspOCqV+ksscS6B4t+hc/2bWavsdwaR9jB
WRhLtqQi7XYLd9N2u8zu4Iw6hNgVzN2orLug+3FqS+IHCya1Fp2p8O9FxCTG
Cr9CEkiOgrn3iMRx3mNp3kMU9RFF2OKcxmCi3sP5AvngLcaq0unhPXaT6sZh
7nwAwHs2UgdWQafD1iYiB1ZHq8tWK7aymN1lgAd4nW3BICuNNmsucftoDxDS
UF7UhsmydYetOoKgawPxuWixXost1+jedQB4B6RApdtjdgtRDYQDVANko09/
bNZbIPa64P21mWUjcWEMSSnwzTfZJlgYk+LCgnyCUFqcJF3YUylAyOdO21gO
uae36OuD04GeBgFcOdaV6wVYS8djIQkJ84JbrOTWU1YBH5pLP/oErZ9et2We
Dl5UQDoaVY02e8FuuHlGvnAq/vACnrs+bpBBdlyNPReQ9caNN7rvSLG2jqrh
fQ6ZY3SH0ema7aZhNhpVFZLr7bntxW/qwl2gjNI3cXtLDqlhmM1Wu9Pt9Ycj
GtoLWbZaZdO3Z7VOi4PTzzpZ4RqqRQnfHBmm0RmO+p1pe9QcNZutxqw9mswa
5rTTb86Mjmk0h41W22xPJ61Wq90g/TPCmuCxOZlNmr1mDweWMwRgFTUarzc3
6Mf13NoShgeU2WDRI+n+7NtX3AaIlD7OqZE1CnFTEgOTVtNsjIxJp9fqT5uN
vmn0J81Go9mdGs2e0enMzHajZ7a6k8lkOO12xuMpDWg6bLcb7ebYaPSm/cak
3TZmnUkHyNWZGcPRqNVrjWejaQcIPDa6vWlrOKbHmk2jNR0affhv2ht1Gt3J
sD2cNkeTodE5rqS1M1a2ykWVWHyxaNIpri0DdAXX0BTE2SXLnZVqUkoBRIWj
Fi6vAFC/4HGzDx+AceB2uJX27cu3UvGoOsiGUWmRYpmBuptUOiNVITOdQq4Y
Q9ZpslGDjXE7Nf3aR4E9QolbAUnJt9aAMwLKsAMyu8/Ab4AXtXskHU3gPtJa
Q3ykM2XtEWuOhNaCYYwmbAZaa4pgmzOptYZca1XaUzaRWmvEtdYY68lnE6G1
+LtgJPA6ADjhIn/EjAnjIn8aivyJFPnTSOTPFJE/mVQmQzYFkT/GkvfpkIwC
EPljEvlTFPkTkvSzDptIST8zYAxsRJJ+PGOjaYVL+jGoxB6btthwLCQ9ABSS
fsp6I5L0EzZss+EUEQKvzpH0A/ba2js39uaOjGY7XZnDGXDp+cAlO88lpnPl
M4HyTEzCZ4l05DieFYS1XQVpsLR3PJG2jOsQDDlXYxZpnI8prIQnQ2bz6Clv
3RoueYogfpJOaVRjCiKlBeJCPy7dtXKcxOUTSOBorJ3ZuN9oNgx4rj9s9saN
XqMxbE4aI7Pf6Y+HIOa63WlvOulMx81Wq99pTQhua2qMO6Nmd9ybjdotw+y2
xs3RqGeMzFm72eg2x+0ZvBmE1tgc9s1er9Omx3rNUWdodrr9UWfa6ZkTE37p
t2DE8L7jRxNrCdnT+I3Lns6MjfvCcEeDGwYDYmZM2w8b+HkCcEzW7yCcoYmS
AIzmKQgJkFXTyriJ74JvWxMgK+6hARQ1u2zcY7MRGtngUwFy4LYRtbYDUDAF
EGmAtHEb5RAMBsXJGLfn9E3W69HOMbi/g68D/PRHiASQizALuMeEkcDspnxg
adlD4gLXfPogVrH7ZH+LdeD2jeMdAhASJKpAcGw2B8pw8MoKDPp7brQrImUI
1NkwLZrwvZbUgekBsFvKm8jEz7V1YytvgE/DK9+mjSBMZoOsJUhH4tq9B+II
LBxFCLETCqQD/y6tgJg9aQhFcALZcxo5Rkk9GTRoMbtInp1S9oq6QN9iCD6U
qyh+hQVNOSJexjEXBSdtPEOlbvKY6Py8BgKh1u4MYagW5gBQCtKun3Ce+NvO
cnxR5U7ZOfhIOz9UzIpigqCe0DBKlcePuHWH13DYkbOhhHorlRH5BNRdG2v8
uTkdDkH24hYGLUadsGyQbkBvwr0SdIjiF4J94oX/3DKKHuabaGKU4KUXFDbu
N9omphb5rpvkmNSspcQLtgIHj2HNk2y6IeRORVAi81mFEsheqH9uAIbnc+zy
zuA739t7S28TsI3zDtA9+eHNOCE7+VQ0bsGgYuAGqbKNkU8rSVAAAZXacNoa
T0YNsIqN1mQ6G3dByZm99mwy7s7a487EmLTMcb/daXVnjY4xGjZAP01moB57
8D8ojuMQcFQfipAn4w6op5bRBl066bT6LbM/ajdNszmZdeHfEVyYdEaNaaMH
8JuN0XjYGjeG41kfnuiOUspI/UX6SokXdo2eYRiz5qw/mvSNUd+czTq9bnfW
7HVGk9FsPB12AbbZ6c0m3ZkJWrMznRrdSb8Pdn5n0jpOpeok+59Np2C3Ncy6
MbzITWYM3ZAZcI+dm/ukujBPKClvswltqlM2rFbx0tmE1KvYdkMMNdztbLD0
3rOxlBO4CIxWTyyCfG9+uTmQNFzZe8vZhE3lry0fd8PZr7zVYWNTGpecbvia
+JWuwMsF/oebPe/qz428uFQFNn6KnEzfMMw28F23bRi9VqtjgBaEB7p2t9Mx
Vt1Fu2W3Ok3z03M1372dV9n88rvxsMrefBdygruEX99+F2EXBl3FNIok8n0T
Oxg3NQZmf4AmCFiKuYmdib2k4GRz0O7DH9aHn4zEjjr+l9+9pFnYiVmceZcv
1KjJdz/t0fb9KlI/yx6G3E0Dw+/GcmC2McDetTGVs2xjAgWQtFhj7kYLob8e
rJaYOGitMbbfWwyWTQzsL5eDXmOwbAwwN9TGFMO6nTGG5WC9HvTbg95q0G0P
WpR66BkDqzOwzEGrPVitB2vKL/QbeggLGx9frvHxNWU31n18qdkZGL3BuofJ
KQC1MDEpoIXQ7mD6yW4PcDr9L5P6GVkBkD8s49sH6aGOh4PZ8OV8qntc8hgx
Vyj20jD6HUyTNCaDXhfxMpoNurPBpDGYdjFvBx+G40EXkNjFzNlwgsme9gRx
OmzoXsuLN7EKqujFnd5gYgw6lPaZ9fFvePe4NzCHg1ZzYExwTP3ZoNEbjMYD
czIwG4P2aABruqN9cZQpYzKAVpwyq9JjU3fp7EAMo8mXh0qQy7bPAwC8D0Pq
BaE017MVCv2asxokDvbr1VtgK69qnltLa4r06sUfqtPKjiNe315SkbB8Twv+
7xjddt1o1NOcGj01l0JrwDAHZ2K+r9G6b2IxuvWP8WEmso0gDVY9zNYBD64o
gdhdYU4ZREQTZEgP03mWIiVsWNetQd/ABDRIg9UC4bQag34fFimKCKOLOV9M
VcNKbw66IM0UMdVTXm118dt+Dxd4a4lJT8MatJeUx1xhitm0Bq0VZhXDxzsW
8qIFI+yiCAJ2BAkJY+6QtATB0oMbrMHKHnTgQQAO4qVktjFhU7TBhyV3f6DN
M5rYOiLMOU5NOkA2kWrsYUiu22Edg026bNRG97fVYU2zkjwfSm1HoWQe2xNU
iI0RBfj68cxjp2LQbfBru5l9G/joY7xNZCGTecyKuG1It40w3tDt4YA7E2wa
3Bmjq41xCwozdOhFRkdpZNSk/FGLGhmOsRER3IMBD/LpO32MReLfTYQprswQ
FMKhHKhhxEfSJDhDkcZtmhjGgJtbFHtQ06nw2aDmp5gS7fPMZqVJIxR/TLpu
YB6zPcS+lHjCb1/5Y8hUbPihDdcr9Dc+giQY55CAZZOgkkMCPbSuvG0cUqqi
yThLSnVKUKoxpjzjMA6BU4pyi0CLdovuVM8+Du9siwxvu4tJ7QhLLV0KuOiA
llavkjiHRU0Bj3sYazYNjPcYY+zON23h8mliCAXzsCYo4xkzJ5X+jE3GOPjW
DN/SG2HoqG2w8RjzquMGRbzaOE0MyI3ZbMb6bdab4JlrLQqX94zKkEJHwO2T
GZtRcLzfYKMp3jme4Z0zyrfO+gjK7CDzzHrI+fDUyMRgG4hZYNFpm+F4eEjM
YL2hqD3odZMkNiaEq5ZY2jyra0wq6g3Y77OFb8G/KWbWIaIANLgI0+/OMKYF
o4W1AB+GYxQvDaBOlw0nuNbahPkhBz6Lvd2ktxs9UdLQoyXc6bEJHSndNiow
WUAjvGVMJAN2xSFNcIJAxBHFCIHB2iNcszwbjgNWxz+r8Mgl4DyW8m6LIZnD
OEIMvMckOQCkH4oxV/Sn2/bw5mEjLjf6yp0t/Bu4CKjTGFbElZYUyDT9MoJX
SbtX1LQ7sNakh9FNoMuE8ivdiYiwNscIZzrEtAf4xH2gnYFRWGCzyahi0tHb
4MwAn+BRgF027lC8lgQIxj4nOJLwRcMuXuz3EPMgDWDRGcMKCCJM6kww8InU
meBK7Pz/3V1bbxxHdn7vX9HQi4CAkut+CZCH7q7u3SQOYljOk+GHnr6sGNOk
IUpr7AL57/m+0zOcGXJE0XaMAAsT8lyqq06d+61qGm6EpI/kZFAH4gPAgogS
aA2GxH5LTy2B2CezmeTcHP6D1d1Ze3j/OvaMmEtsvesZMbMs8T2ciDfuqn71
X++kUlIHvN5XTep0xd+oewggtw8zPjyLhbePNT4+BsSvqvoHfKy9S5kJoYA3
t59ubr60osfrr09WXy6tjhhW3ryxeLPFr4f1ZJ/Kdql1Rg9ad8b3Lva26XzE
uHYwJQ+lc9kNyqS2s153XVKdsoP2qh286oYh+wNmasD5xhz29/51DkGpkqIO
7RCHovroTVFNF4OKMTYlBF+UaZQUfOrIR0IqOrACnb1uhy6ZxlldFMBQWN8U
o3yrddgewVpAAV5gZ9+/wZLfv39tWsXStVOaGTvVKP36aitaGWWVe/3DD/VJ
M8E+QVP/8vZSauerDU1K0NRhJzrnUIxXsbCcZTuX+qbxfZ9d1m1pQmmNdirn
kpPWsQu2tUHb6LqSQhNlky6nPLjOGt34bjC+JIs9FmtDoxJQEstgFLEbQBKd
UqOa0odiXTY2/N7yk4FRuuSPQru5zzqalH+o13DwUaD4wsERgeIIe4evesaN
gAyHF3l1FcYrqUk977rphk4VDVgn5jmwlnQAsnoMpJfX3RHgL/o9KlfhxLkx
RuyiqNRTD4bFrK2aZi86H9Ul56P+lc5HtXc+pPRmxDT6X2HXa7Hr1aldx4f+
zGzXLzPb1YPZNptNtXKD3dYj8NSIbpZY7mp0RwtabbeUb2XBP9ocXrKC9cEK
Vr/DCtaXreDRCLLvYbxfbmBv6r4r75r6z9999827SzlxivEvv/zy9nDYdj/y
fvnw1+UDe1tueJZlO0t2Zgt/Wu6PN8+ZC8WhSyHqev3h/uNjk6qNulyY3ken
rt75+uG1Hy80xWpxweNaj5qthKCpSQj0QabK7jh+l9hwyaAosCy7Tk97Zy/0
L7JtcWRUpnYvCp/0FlHE82Ejh2kpsoepDiu9c1CWKmgS/WNEA0wHJbBQCZjl
US/sSaRqZcJYf2HC09kU9SQ1kjT4bqqJfbH2SV/v1pIbD8HnpVZdGVxZc+jl
jSeRqnk8GP+GWSK0CzisLoSgF1Gd9sOOWYBjDF+dhqAcNnMqKthFNh4EIXqP
Cgg4GIAv1lOSVZdI9iUMPyZZxQkXmXB63GbNCaWPgoMz6RsuT15tk7PjQgbs
R66Cxpc2LlcXuPpS1ArVZ5d6musZKnHmC72rs6UcTSv5BEyiR+4XRJ8DO4zZ
/LqQc7A1SJZZ6wS/d0daYxJoRTdJQ7Mg368Vdr0GSuVspCsagEEkA/GWd+x4
hthCp+mVzbXQbOtIpcc+ZmmVnoE3Q+oQwxLSrzPtJrawm9m4vCWz1vmgIvB6
Q9F61sRsRPk/ih6xIpET2ey7ABhFWqiFCp9dK4mNwhAcgDRnrg4phsnLAhvn
mc/7pJez6HfaGusVm5WBGawy79jK7Gy1AmxPooA6QXrEiZnMmjRwYrZu+OVs
8n2oKWG54b3D1cvYqX6GnTCJmmijtz8jU3GwPM63qzy+5QLO4WFTuPgD61pd
6g5/jBzj98g5pt6EEw5BcrUPku1J2mX3JIQ+qOV43qGupUM9Sr4pmr1SAnNa
YVHwapIjEPA6opM/RXMA1sUfsME9Sts3t+zYpo8t7/3Dg9N4ijc89bxmcHDh
ZPyD1j1VudtU+0WfA7X6LKgbPJvj+gVQv2B3HtTXs6BWG6huOqep6BAn1tnZ
/V62pAa4elM+SmQZ4hmmfW6FDLxxePo8oUWPaTnMcEq1aKsHbJzx7YtQQSAh
j95K/npbPYikazkGc3AnyEXh87BtV9aDTzbrJirFXGDp/Xir9kiA8nnCgRXJ
ulHW8sMX7oUIVw8rVhdWNMJI7rM8T4N4MjkQ+6vQ+BmOql7MURLOKEH7qSBT
/CvRKo9TjVuhYv9rceMJnsW9h22KWcjntn+rJAc/8JYvLCdZJTlFyip+5Sfq
eWxnlkMy2wEkqCYvZkKRrBXb8AJPlcB+OQGPDoOtd3hqJfDEpxyYmeSIDpYA
QhZZbrsXHojNE3NefuU8+883banY3WzFN3vIna2J8MDujJkGAvPDn3FTBQQC
cizKsyswTFM9RVoNSpnjyDjXi2hpsOWUxD+c2XgJGRwTm6ARMoAZlARNJhPD
dM+Eb9MoDDxJG6eilcESi7jQ0NvjjqdxYL6nHb0CTBJYbaISxqZgDXcSmQLg
TXJhLonnKKEWnIGJDEDLvvAkEmZzvnJyaIrnl0Z6C0AyvtKiQOBLzGJzedpn
oisC0QAhdnJWCsNAO+xdLdU0nuK5fsDz7ime0+MzSNgdYrpJVzmSmjD9dFHk
mNkuyMmiQMxj3clyOS98AqzSTQ30kbRE9PR5UqUNdwEU5VlO7p2cQQL88Nnw
LGSEXbWRr534AwjqEYnMspxbKkjTMglWF+HPyJNdi+hJcMXihcciMclO0VlO
hdlHgUz1qw5iwYOCME6Q6JUkBrFAIyhqsAf8NIAxRmpgUARw0rNdCR4+mcXO
ImwfZapV9DCYZwIDy6mzea3gUx0X8vwqyMk0RN8QsVWUJ2iapCEWzADk73bk
hyCJIB5vU/SoudCOXujm3QEh88hPgFV4ep7y/ocfxNoC1/+XjLC+YiOgi0Oj
e6uzSX3vlG0b1Sbb2OxDtEP3+qr6vjrN1b5hSra7ufs0rzcjWxT+9XZ6K1/o
sy/4ed13Xd01b+yr6ocruJXZ58Q2d7wOJrL5nq8fzX9MBb9hJvjdeFsPH0be
ZTHdfRmA+9vrt9PDl/f3N2+nu5+25WW7Ngfbd6UkV7qi22wb3Q3OmqKbaHQs
gfnN0lvrfaPMkLqh9U1JObuuONcbtSFE0rqN73ob+6ZvWxW96rNje2TrnB+a
ko3TKsUc9PBastLMtnaqxbhYko2lHYyzg03eFpeCGrxtbW773JqGDzD7az67
oaua353mV15hi0wdM/0NDH2PBQ3zvMDh96/ef/z48z9/9dX04ca+ZbcyOY3z
fHXEI7AIapFYbzFsS7TX9cmT7oVPctEgWeugUnBJ6RQG4JUnLF5vgMms95iW
Gzif9Zt3mKDeQM8nozH4brr/+Wz0AUhzHDON/PL+RaB+FJTts/taXW3ZfpBp
CL7LzgxFx2iVMdp5p8G4VmXnA8TEuqIhMda2QxlUZwajVNt1rh90cL3dMv9Q
XBnPZrW92/8PsyfwnWuyLWZQxXVOx1CG1oFzui7aFjhztsTSK9WHpks6OvCf
S01KzoaQZBqTh8E31qmQGuNUF7JXBszXAzrjmzb2xXRtN4QU+q6PrR9yaJ3V
TVYRbN28PkDju9I5m83QY7EWG3Wt9n1uCnbaB61sHNoCfnaxdI2ONrvWeIwd
QhdV3zWnezU2Pdprn7LudI7t0KreFqu6NnR4WhXIk+2iB4519NaGbDXEBRtN
2hRXTC5Jl62TqoHiKDp0LgAI7SA7Pg4dOKp3ffR9h931IFnsh16ZNKTegxSA
h8dcGmzutczyA3WAog5oS7CQ+SFi4NCHzmQIIZuEIetDB104xFZ3RUXjdQMK
DjHGkDs1uKjL0LPRs/WdCljFJ++GxqrWJAP66WLbNjchBN0Xr6zGFK1uklGm
V6Xxrc9D9k797hM3Ee7IIbH5ufzst1/Kzn68u7u5/535Wfe78rMg6HP5WVjr
3cFBlyzehUsLxPkYAxMucDISvTfJd7hKLftz5/ti+Hj8aeBVkpL7cGsnrr/a
tydM4TRXeJ68e5qWVY/zF8eUYmRkwkg4V3GUCGeh8/Gku+c8wzhKhlEion1w
ZSUQ0oyTEQIxdStRsbGXcsETH2eSZVs67NMufNZJqUPOXHF+cbUJlYRb+8BM
sjkX88UPtzKcZUV3XBSI/WwoeAwCOU88wlY9gi2eAPYoJtynmZTgZEuzui1/
VPGmAUm2bn039skVFARv9yWc2P3S0Z8kuJ+v6m1jtDzCSLja57MENkKl6Eab
LQwzl1LhD5dV6EOXlmXXjJUY4OyKi4emLXV4K4Hi6WB+taX1dfUoQflAJkSe
zu2xyhA9H7LYds+chNxsLFExwSq+cpDILbjjxoP7fEFiu0tDsjBmqTYybTy2
McAzScAtCDfmkcxWl2VW72V2q9Xx7XoezEuEsH/NA3sMAxYtCdnEhCy+QnSE
IJYZ2B3zpJOp3Y7BBm/UmFiemRcBbyFuta2CYnyFiBfAg5qIN8aZsZCVCzAQ
RK1SukNAwkBl5B8gB2YQqCDcFb3EcG6lo8+9IMjEusSJlrDTMTLBctiLnhmB
YxUeVU7kKN7qsWw1YzjPTAfsRAcGScQw3TxzNoCNvWPmLNVH66mOJrn0ArG3
nxlfIZxGsL1apo8RAY6rZJATo1PEYPPMpAbGjwuBQRAbVyIfcwJUtzBWnCVD
hEgME2LaLLeSYGuL3AiCSI8Fabn6JQqqoeviRGTuLKNE4H/SJETEoqnCfhH/
gzpMlAvpncRy8xZ1SywHzR8kWuOHWqpukvrPi8ycK47JlPQ0SrYCS2Riw4hi
3GpIeIH5QVzEpaAjVMokNYYkdASfMOmfuHEtZQyWXWdSwTiqEWAGhACivKSS
TSC9gECEuFgrydHKZCuiKHE7WtJbyXPXQDLCeOATkxCNgZ84UeYgK1gFvJQk
iY8gfBqp2eZM7IG73LoPg4GxNUvlYKX+91IOwb+QAsA8y4UuVqivma0gdba/
8aHPS++TGg/ljUUfyxvz/DRxJr20+3T8kx69lybiq8ep9hck4p9UBaozME4a
6MZNkZ4DsyXu9/cDHazDqKgeR0mGgl5m+kLi/txmPdiO6ss2yx4Gi/6P9uRu
IbmvgHf2nGTqgz3HpCSY/HSsdLoNG7tH6e9q3TSGlN903CfB7XqCkGeT4FIP
qJ633RfN3x9r0J/JoetDG6n53O6qQxqdaU2r9ulgM34WG8c0+vLAD9UZNs7T
6JdY4uKuq9Nd7xNkz8CwJdYfe1PVb6XIKWzVb6VIvVFE+Ll64OdHqfYnBdEL
7bRQDs6zvxirMxEcxIERM2dEJ++kWhykIApLhK92mxBtPbC7c6W01SzdPree
zIPXUb/Y66jIQr9i/MW6bHVal6UOH6mfWaSPTGLOklRNkr/ewZBFpsthyMgP
gZNA80NRu/nEdQkvrENI+SEeXjg6Oas55sdfVoeoz+sQ1W+pQzg6P+PE5CyN
haqez4+zqO/FNWJzD1e3Us6BjdZsDiApp7naZfKVF5+BajyLczhyL7y6zBH/
y8TQD/4GXDUMXrL4gQ+p4aliElkmD7yIiylg3oCg6bzFcZ8+BrMxtBTfA44H
/MAVbslIk7oy817No9wTZuhpLHIDHDsM/BdLEfVJKaL6raWI+qQUUR1RbXgt
2RdLEXAL4QtltQ/lgB/IDpwHGPplFUtqBcP54GpKeZWsG+gMA37wM/sqEkkG
fxKgwq8zSVpJ5pPa0kSsstdBPqTUi58M5QaegY+RRDa9uH+TdDDwrriFxAUS
tDilVB2LeOOZs4FwIEQQnH8+kK+eBvLHoEBg0+ItwCayW0uqTYvUG0YJgcFR
euUNbUnuRHQTudHLrXVbhK4FUUHKLdzyTm7IE/fMSOxA/lzrDI61lPdFOmkw
D+RolIvf+MJTlMYolWYjJQ0rDCCVUS8BCwCL4JNAQmA8MMZuvEQmh3vMcp3U
1Sbp3vPSVePFVds9NB4lKbDtKtARbsZMx5hcxGhilEYWJ8VCuZvISZcnODlJ
pdnIC0hZEvTSoGeSiaFHlKqVZSywCrsiQGDvZiK5k/SJGsnDYAuQOKxI8QGH
B9bU08bDmagD0lbpRzHCYBsHzoJ8ekercJfmeIARpXkI6hGPUDRGQg5Jz5MU
jTz9dlg68A+UMx6Hgp2kFcZuvugolzKO9MBnWyGKceJ4s6tsomjvJH7ntYWG
O4JQ4PEgsRVhg9ssoscb2VfSMS7VIsy21dLwySoXQ65yOJvNQyL+ShqSVjGp
dPJnBlOLIaIQKIHEW0eRFTXIpaX3CKQB+1HcFjLMRp1JKqzkKE3tCtuh5NjN
CEgmMgnbFESNQJ+TNPLJLGmiSeq4Zv6Hr2A1ofG+S1H1NrdO9U8rVqwoNR+u
/353Ox7LStPdx4/383izPNSU3n0cP6zXy81cf7dM72/vbu7+cr3cn9SX8kmd
QaoM94cnPuIBKTV8WH6+u+ePAPztq4eS1HHe/W0Ppzg/Hkh+U//JbIWqoLTn
lRaBr61PSWe+lkMThKHc/cS7xbvtB2e2+wb4ezzHQxj/9PY8ufvqmPzWvba8
V6pNpoSUh6a0g++Ma2MclOlcU/poQm8xLKiim8RkNj+2xRo529z7QeXc+sHF
JjYueW903xP92gy561XpmsGHHHQXleMFVmpgZlz3XvGnIHi0ocFw7bDFQbda
meBCanxXBu8a1XRNzhkbV6kDqCb6UlSTu2GwAC01g+Whg5LaENtSBqnAhT4D
/iF2Tciu77qiVMBsxcTcYmXTxz4MvUqh9SZi65rHjGMXTWtd6NtO9ymmNqmh
a3vdt21RwTmfSpcARmsaFYxv8U63yQI5ucez3Ai+yt6mpmcBKLvGNNpa1jJs
W0zXDQ34shtSl4A+pRubMJRXkNmgi+4Nzy4bbCLmkrxVGogvJrmhywn7SBZb
Sb3WzvTJt7YZCoAtBV+FZnDasJbIckQDZAwmm67BRDm21riBVYs+DRAJNxgL
3DrfKdv0JTWYqQOcHvjhf40WkTlUwqR6SC4yck7kcBzlUR3xAu/fr9d/Mff6
jXHmrBBYn1YC1zksSquoI6uB+9PLp1W+s3rC8wL2w1Wt60OhsH5cKXz67KFe
eFYwfPFysj0pG8qaUgE2HkyiQ/JgYZsgIa1h3a3vSmhKboMtrQ0h2ENBV1Z+
IpxbMffRh/uzTCwzk2ROdyp6DU4xKavYqjYmF4wZbPA+NhDG8voPqWLqqP2j
ql7qIKfJm673kFIHhte6G7TqSpv14CFTNthsjG2wQGqcLj3kcuhLr4c+q2FP
hbZrDBAIBHU68zo63UGjAAbfBm8bCKFzgCq1TdNje6Y0g4H0dn3ATvJ2QOv/
soZpIH+Pdtr4XmWFSWyfdXFDKf0wDMpij1nUWQ4KZAkOUpYg3SYNPofShdYk
aNGy3ymv6IGSKsqAV6BQlXd9r1Njeg/107mu88BMa4dGQ9HpYnoo5Qx16ocU
sN+TCqax1OLaKYfRqoW6ACGhZqCUGj2wAtwo11kPbTJorYIGvEHxoiO2dfRQ
DwYan5rL2iGDPUvslc+OJEi9w79eQY1EFU2M4F8/EN0AC6q0KcGrxqcmG8sy
NPRsawY1+KaDuvTJFZZF2xxB/pAMFWoGk0FTdhEGAOrLOuwIit/BwDnqz6Qw
MCdlc8IegLLcYbgFkaFk4wCCDTbDAkJtgY4mK8WbC7sInmAZl8ovgYIgUlvy
0IIJQAtSqOAZU+wASuiuSU0s0LDD0IL2DQS1hznpAEQJNARDg6VLq7pIhECt
gmddk3wB5zgoWxtZMG41LJHyELmCPQWYLixVGnAscQGK8ZQhiKxZku7dAKM2
dFYPJYIzFcv9JnjobWC8N7DpbSRGFKaGBSUUToEdeGAOxjcTRR2QAupABJNT
Wfumx149FDuYWSdgB6+Lt7oD0kz53dc4GuePVeW6mX68vfvlZpnlFwPv+WtY
2w/5LfO/vLq9e/U/2xKjODD32+8PyfVu4+2P9Z8X/NNef/jx/d3N36/qboSP
uNzWLT2+29ur+ttP9/f1n+8+3d8sf7uq//MG7ui/3eHJ+3veq9Qut/89/gQX
59/H+dOP8MBuxg/X9dfXn+7/Oo4fxqv66/HT9qNrX3+6nXc347xcbU1Cyz1i
h2/Gm7ufdte311f1d+/hK93X38gvyHHq/7ie3o/LTf0t//9hls/efVzW8bZ+
hx0sGwD/dv1T/Q4DxhnAfLjml9cwBLLI/fKh/u6XZaHvuN1j+u1yu2CSD5+u
f5RL3ng94iI/2SN3WW+/eiTF8Nvtl+jld/zg/O2vvH64iGv7zSY+9H65+ZlP
SJH9T9cf//xp97b6X7dg4avQcgIA

-->

</rfc>
