<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-10" category="std" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-10"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <abstract>
      <?line 169?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50% while also significantly reducing memory and code size compared to ASN.1.  The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re-encoding for the signature to be verified. The document also specifies C509 Certificate Signing Requests, C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 173?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc. The use of CBOR also reduces code complexity, code size, memory usage, and CPU usage.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates, and is designed to render a compact encoding of certificates used in constrained environments.</t>
      <t>The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
        </li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document also specifies C509 Certificate Signing Requests <xref target="CSR"/>, COSE headers for use of the C509 certificates with COSE <xref target="cose"/>, and a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This specification makes use of the terminology in <xref target="RFC2986"/>, <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers or complemented with CBOR OID and PEN encodings <xref target="RFC9090"/>, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>
        <ul spacing="normal">
          <li>
            <t>version. The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type"/>.</t>
          </li>
          <li>
            <t>serialNumber. The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
          </li>
          <li>
            <t>signature. The 'signature' field is always the same as the 'signatureAlgorithm' field and therefore omitted from the CBOR encoding.</t>
          </li>
          <li>
            <t>issuer. In the general case, the sequence of 'RelativeDistinguishedName' is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as either  </t>
            <ul spacing="normal">
              <li>
                <t>a (CBOR int, CBOR text string) pair, or</t>
              </li>
              <li>
                <t>a (unwrapped CBOR OID, CBOR bytes) pair, or</t>
              </li>
              <li>
                <t>a (CBOR PEN, CBOR bytes) pair.</t>
              </li>
            </ul>
            <t>
The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded 'common name' it is encoded as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>If the text string has an even length <contact fullname="≥"/> 2 and contains only the symbols '0'–'9' or 'a'–'f', it is encoded as a CBOR byte string, prefixed with an initial byte set to '00'.</t>
              </li>
              <li>
                <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where 'H' is one of the symbols '0'–'9' or 'A'–'F' it is encoded as a CBOR byte string prefixed with an initial byte set to '01', for a total length of 9. An EUI-64 mapped from a 48-bit MAC address (i.e., of the form "HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string prefixed with an initial byte set to '01', for a total length of 7.</t>
              </li>
              <li>
                <t>Otherwise it is encoded as a CBOR text string.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>validity. The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as CBOR null.</t>
          </li>
          <li>
            <t>subject. The 'subject' is encoded exactly like issuer.</t>
          </li>
          <li>
            <t>subjectPublicKeyInfo.  The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
          </li>
          <li>
            <t>issuerUniqueID. Not supported.</t>
          </li>
          <li>
            <t>subjectUniqueID. Not supported.</t>
          </li>
          <li>
            <t>extensions. The 'extensions' field is encoded as a CBOR array where each extension is encoded as either  </t>
            <ul spacing="normal">
              <li>
                <t>a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type, or</t>
              </li>
              <li>
                <t>an unwrapped CBOR OID tag <xref target="RFC9090"/> followed by an optional CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string, or</t>
              </li>
              <li>
                <t>a CBOR PEN tag <xref target="RFC9090"/> followed by an optional CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
        <ul spacing="normal">
          <li>
            <t>signatureAlgorithm. The 'signatureAlgorithm' field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          </li>
          <li>
            <t>signatureValue. In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
          </li>
        </ul>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <artwork type="CDDL" align="center"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes ) //
            ( attributeType: pen, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid /
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true,
              extensionValue: bytes ) //
            ( extensionID: pen, ? critical: true,
              extensionValue: bytes )
]]></artwork>
        </figure>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstraß form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER encoded certificate with an uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shorter INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>This section details the encoding of the 'extensions' field. The 'extensions' field is encoded as a CBOR array where each extensionID is encoded either as a CBOR int or as an unwrapped CBOR OID tag. If 'extensionID' is encoded an int (see <xref target="extype"/>), the sign is used to encode if the extension is critical and the 'critical' field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>
        <t>The 'extnValue' OCTET STRING value field is encoded as the CBOR byte string 'extensionValue' except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>
        <t>A note on extension ID naming: in existing OID databases most IDs can be found in versions with and without an 'id-pe' or 'id-ce' prefix. We have excluded the prefix for the commonly used extensions defined in <xref target="RFC5280"/> and included them for extensions defined elsewhere.</t>
        <t>CBOR encoding of the following extension values is fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyUsage = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyConstraints = [
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>), unwrapped CBOR OID tags <xref target="RFC9090"/>, or CBOR PEN tags <xref target="RFC9090"/>, where each int or OID / PEN tag encodes a key usage purpose. If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyPurposeId = int / ~oid / pen
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ ~oid, bytes ] is used to contain the pair ( hwType, hwSerialNum ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier / null,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid,
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contain general names registered in <xref target="GN"/> the extension value can be CBOR encoded. C509 uses the same additions and restrictions as defined in <xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>. Note that the minimum and maximum fields are not used and therefore omitted.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralSubtrees = [ + GeneralName ]
   NameConstraints = [
     permittedSubtrees: GeneralSubtrees / null,
     excludedSubtrees: GeneralSubtrees / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = [+Attributes]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources (id-pe-autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources v2 (id-pe-autonomousSysIds-v2). Encoded exactly like autonomousSysIds.</t>
          </li>
          <li>
            <t>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous Address, the Address is encoded as an uint with the the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2^64 - 1 corresponding to the cbor integer max value.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Address = bytes / uint,
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</t>
          </li>
          <li>
            <t>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as a CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature (0), nonRepudiation (1), keyEncipherment (2) and keyAgreement (4) asserted is encoded as the two CBOR ints 2, 23 (2^0 + 2^1 + 2^2 + 2^4 = 23).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 23, 8, [ 3, 6 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-parameters">
        <name>COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, and c5t, and c5u, defined in <xref target="iana-header"/> are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cose-c509-cert media type, see <xref target="c509-cert"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD8 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <t>The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="CDDL"><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></sourcecode>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>
        <table anchor="iana-header">
          <name>COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">TBD1</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">TBD2</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">TBD3</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">TBD4</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing a ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
      <section anchor="private-key-structures">
        <name>Private Key Structures</name>
        <t>Certificate management also makes use of data structures including private keys, see e.g. <xref target="RFC7468"/>. This section defines the following CBOR encoded structures:</t>
        <sourcecode type="CDDL"><![CDATA[
C509PrivateKey = [
   subjectPrivateKeyAlgorithm: AlgorithmIdentifier,
   subjectPrivateKey: any,
]
]]></sourcecode>
        <t>The C509PrivateKey item is served with the application/cose-c509-privkey media type, see <xref target="c509-privkey"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD12 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <sourcecode type="CDDL"><![CDATA[
C509PEM = [
   C509PrivateKey,
   COSE_C509 / null,
]
]]></sourcecode>
        <t>The C509PEM item is served with the application/cose-c509-pem media type, see <xref target="c509-pem"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD13 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <t>Editor's note: Include further details for encoding of subjectPrivateKey.</t>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate Signing Request</name>
      <t>This section defines the format of a C509 Certificate Signing Request (CSR), also known as a C509 Certificate Request, based on and compatible with RFC 2986 <xref target="RFC2986"/>, and reusing the formatting of C509 certificates defined in <xref target="certificate"/>. The media type is application/cose-c509-pkcs10, see <xref target="c509-pkcs10"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD9 is composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value, see <xref target="RFC9277"/>.</t>
      <t>Different types of C509 Certificate Requests are defined, see <xref target="csr-type"/>, all using the same CBOR encoding and differing only in what is being signed and what type of C509 certificate is being requested:</t>
      <ul spacing="normal">
        <li>
          <t>The C509 Certificate Request can either be an invertible CBOR re-encoding of a DER encoded RFC 2986 certification request, or it can be natively signed where the signature is calculated over the CBOR encoding instead of the DER encoding.</t>
        </li>
        <li>
          <t>The requested C509 certificate in the C509 Certificate Request can either be of type 0 or of type 1, see <xref target="type"/>.</t>
        </li>
      </ul>
      <t>Combining these options enables the four instances of c509CertificateRequestType defined in <xref target="csr-type"/>. An implementation MAY only support c509CertificateRequestType = 0. The most common variants are expected to be:</t>
      <ul spacing="normal">
        <li>
          <t>c509CertificateRequestType = 0. This type indicates that the C509 Certificate Request is natively signed, and that the requested certificate format is C509 Type 0. This encoding removes the need for ASN.1 and DER parsing and re-encoding in the requesting party.</t>
        </li>
        <li>
          <t>c509CertificateRequestType = 3. This type indicates that the C509 Certificate Request is CBOR re-encoded RFC 2986 certification requests, and that the requested certificate formate is C509 Type 1. This encoding is backwards compatible with legacy RFC 2986 certification requests and X.509 certificates, but enables a reduced transport overhead.</t>
        </li>
      </ul>
      <t>subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, e.g., as defined in <xref target="RFC6955"/>. In the latter case, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier distributed out-of-band. Both kinds are listed in the C509 Signature Algorithms Registry, see <xref target="sigalg"/>. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used with a signature algorithm in certificate requests.</t>
      <t>Certificate request attributes, i.e. attributes for use with certificate requests providing additional information about the subject of the certificate, are defined in <xref section="5.4" sectionFormat="of" target="RFC2985"/>. The attribute extensionRequest is supported with a dedicated element. Other certificate request attributes are included using the same Extensions structure as in extensionsRequest, both extensions and attributes are listed in the C509 Extensions Registry, see <xref target="fig-extype"/>. The only other certificate request attribute specified in this document is challengePassword which is defined for utf8String values and encoded as CBOR text string, except if the text string contains only the symbols '0'–'9' or 'a'–'f', in which case it is encoded as a CBOR byte string.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateRequest.</name>
        <artwork type="CDDL" align="center"><![CDATA[
C509CertificateRequest = [
   TBSCertificateRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateRequest = (
   c509CertificateRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest: Extensions,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
)

challengePassword: tstr / bstr
]]></artwork>
      </figure>
      <t>After verifying the subjectSignatureValue, the CA MAY transform the C509CertificateRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and code.</t>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certificate Signing Request (CSR)) format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>.</t>
      <t>When a certificate request is received, the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession corresponding to the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with the CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 CSR, the CA transforms it into a DER encoded RFC 2986 CertificationRequestInfo and use that with existing processes and code to produce an RFC 5280 DER encoded X.509 certificate. The DER encoded X.509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in <xref target="fig-size-COSE"/> and <xref target="fig-size-TLS"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artwork align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X.509 and C509 are Certificate messages. X.509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artwork align="center"><![CDATA[
+-------------------+-------+----------------+------+---------------+
|                   | X.509 | X.509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+----------------+------+---------------+
| RFC 7925 Cert (1) |   327 |            324 |  151 |           167 |
+-------------------+-------+----------------+------+---------------+
| RPKI Cert (1)     | 20991 |           9134 | 8660 |          5668 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (2)   |  2204 |           1455 | 1414 |          1063 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (4)   |  5190 |           3244 | 3958 |          2845 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Bag (8)     | 11578 |           3979 | 8882 |          3519 |
+-------------------+-------+----------------+------+---------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "CBOR Encoded X.509 (C509) Parameters". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="csr-type">
        <name>C509 Certificate Request Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-csr-types">
          <name>C509 Certificate Request Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate Request.                 |
|       | Requested certificate is C509 Type 0.                     |
+-------+-----------------------------------------------------------+
|     1 | Natively Signed C509 Certificate Request.                 |
|       | Requested certificate is C509 Type 1.                     |
+-------+-----------------------------------------------------------+
|     2 | CBOR re-encoding of RFC 2986 certification request.       |
|       | Requested certificate is C509 Type 0.                     |
+-------+-----------------------------------------------------------+
|     3 | CBOR re-encoding of RFC 2986 certification request.       |
|       | Requested certificate is C509 Type 1.                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="atttype">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:            Postal Address                           |
|       | Identifiers:     postalAddress                            |
|       | OID:             2.5.4.16                                 |
|       | DER:             06 03 55 04 10                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08 00      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. The registry also contains CSR attributes for use in Certificate Requests, see <xref target="CSR"/>. For values in the interval [1, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions and CSR Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestampList           |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     id-pe-autonomousSysIds                   |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     id-pe-autonomousSysIds-v2                |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            Biometric Information                    |
|       | Identifiers:     id-pe-biometricInfo                      |
|       | OID:             1.3.6.1.5.5.7.1.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 02            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    37 | Name:            Precertificate Signing Certificate       |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.4                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 04      |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    38 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    39 | Name:            Qualified Certificate Statements         |
|       | Identifiers:     id-pe-qcStatements                       |
|       | OID:             1.3.6.1.5.5.7.1.3                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 03            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    40 | Name:            S/MIME Capabilities                      |
|       | Identifiers:     smimeCapabilities                        |
|       | OID:             1.2.840.113549.1.9.15                    |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 0F         |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    41 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|   255 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        CSR Attribute                            |
|       | extensionValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
|    15 | Name:            CMC Certification Authority            |
|       | Identifiers:     id-kp-cmcCA                            |
|       | OID:             1.3.6.1.5.5.7.3.27                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1B          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    16 | Name:            CMC Registration Authority             |
|       | Identifiers:     id-kp-cmcRA                            |
|       | OID:             1.3.6.1.5.5.7.3.28                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1C          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    17 | Name:            CMC Archive Server                     |
|       | Identifiers:     id-kp-cmcArchive                       |
|       | OID:             1.3.6.1.5.5.7.3.29                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1D          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    18 | Name:            CMC Key Generation Authority           |
|       | Identifiers:     id-kp-cmKGA                            |
|       | OID:             1.3.6.1.5.5.7.3.32                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 20          |
|       | Comments:        RFC 9480                               |
+-------+---------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -3 | Name:            otherName with BundleEID                 |
|       | Comments:        id-on-bundleEID                          |
|       |                  (1.3.6.1.5.5.7.8.11)                     |
|       |                  06 08 2B 06 01 05 05 07 08 0B            |
|       | Value:           eid-structure from RFC 9171              |
+-------+-----------------------------------------------------------+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleName                 |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        SHA-256 with HMAC-SHA256                     |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    15 | Name:        SHA-384 with HMAC-SHA384                     |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    16 | Name:        SHA-512 with HMAC-SHA512                     |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    45 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". T The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    28 | Name:        EC Public Key (Weierstraß) with              |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
        <section anchor="suitability-of-different-public-key-algorithms-for-use-within-iot-scenarios">
          <name>Suitability of different public key algorithms for use within IoT scenarios</name>
          <t>The public key algorithms registry <xref target="pkalg"/> specify a number of algorithms, not all which are suitable for usage with constrained devices. RSA requires large keys and large signature sizes compared to elliptic curve cryptography (ECC), which together with resource-efficient implementations of named elliptic curves (Montgomery, Edwards and Weierstraß curves), make them suitable candidates for IoT public key usage. These curves are represented by ids 1–11 and 24–28 in <xref target="pkalg"/>.</t>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading with this document as reference.</t>
      </section>
      <section anchor="c509-cert">
        <name>Media Type application/cose-c509-cert</name>
        <t>When the application/cose-c509-cert media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-cert</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <ul spacing="normal">
          <li>
            <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
          </li>
          <li>
            <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
          </li>
        </ul>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD8</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-pkcs10">
        <name>Media Type application/cose-c509-pkcs10</name>
        <t>When the application/cose-c509-pkcs10 media type is used, the data is a C509CertificateRequest structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-pkcs10</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD9</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-privkey">
        <name>Media Type application/cose-c509-privkey</name>
        <t>When the application/cose-c509-privkey media type is used, the data is a C509PrivateKey structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-privkey</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD12</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-pem">
        <name>Media Type application/cose-c509-pem</name>
        <t>When the application/cose-c509-pem media type is used, the data is a C509PEM structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-pem</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD13</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to add the media types "application/cose-c509-cert", "application/cose-c509-pkcs10", "application/cose-c509-privkey" and "application/cose-c509-pem" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters".</t>
        <figure anchor="fig-format-ids">
          <name>CoAP Content-Format IDs</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="160" width="592" viewBox="0 0 592 160" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,144" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,144" fill="none" stroke="black"/>
                <path d="M 360,32 L 360,144" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,144" fill="none" stroke="black"/>
                <path d="M 584,32 L 584,144" fill="none" stroke="black"/>
                <path d="M 8,32 L 584,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 584,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 584,66" fill="none" stroke="black"/>
                <path d="M 8,144 L 584,144" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Media</text>
                  <text x="84" y="52">Type</text>
                  <text x="316" y="52">Encoding</text>
                  <text x="380" y="52">ID</text>
                  <text x="472" y="52">Reference</text>
                  <text x="124" y="84">application/cose-c509-cert</text>
                  <text x="288" y="84">-</text>
                  <text x="396" y="84">TBD6</text>
                  <text x="460" y="84">[[this</text>
                  <text x="532" y="84">document]]</text>
                  <text x="132" y="100">application/cose-c509-pkcs10</text>
                  <text x="288" y="100">-</text>
                  <text x="396" y="100">TBD7</text>
                  <text x="460" y="100">[[this</text>
                  <text x="532" y="100">document]]</text>
                  <text x="136" y="116">application/cose-c509-privkey</text>
                  <text x="288" y="116">-</text>
                  <text x="392" y="116">TBD10</text>
                  <text x="460" y="116">[[this</text>
                  <text x="532" y="116">document]]</text>
                  <text x="120" y="132">application/cose-c509-pem</text>
                  <text x="288" y="132">-</text>
                  <text x="392" y="132">TBD11</text>
                  <text x="460" y="132">[[this</text>
                  <text x="532" y="132">document]]</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+--------------------------------+----------+-------+-------------------+
| Media Type                     | Encoding | ID    | Reference         |
+================================+==========+=======+===================+
| application/cose-c509-cert     | -        |  TBD6 | [[this document]] |
| application/cose-c509-pkcs10   | -        |  TBD7 | [[this document]] |
| application/cose-c509-privkey  | -        | TBD10 | [[this document]] |
| application/cose-c509-pem      | -        | TBD11 | [[this document]] |
+--------------------------------+----------+-------+-------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as as X.509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>
        <t>Editor's Note: The TLS registrations should be discussed and approved by the TLS WG at a later stage. The TLS WG might e.g. want a separate draft in the TLS WG.</t>
        <artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
      </section>
      <section anchor="tags">
        <name>CBOR Tags Registry</name>
        <t>This document registers the following entries in the "CBOR Tags" registry under the "Concise Binary Object Representation (CBOR) Tags" heading.</t>
        <artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2985" target="https://www.rfc-editor.org/info/rfc2985" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2985.xml">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4108" target="https://www.rfc-editor.org/info/rfc4108" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090" target="https://www.rfc-editor.org/info/rfc9090" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9090.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9277" target="https://www.rfc-editor.org/info/rfc9277" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9277.xml">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9360" target="https://www.rfc-editor.org/info/rfc9360" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9360.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6487" target="https://www.rfc-editor.org/info/rfc6487" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955" target="https://www.rfc-editor.org/info/rfc6955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6955.xml">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7468" target="https://www.rfc-editor.org/info/rfc7468" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7468.xml">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932" target="https://www.rfc-editor.org/info/rfc7932" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603" target="https://www.rfc-editor.org/info/rfc8603" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879" target="https://www.rfc-editor.org/info/rfc8879" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148" target="https://www.rfc-editor.org/info/rfc9148" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9148.xml">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9190.xml">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191" target="https://www.rfc-editor.org/info/rfc9191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9191.xml">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" target="https://datatracker.ietf.org/doc/html/draft-ietf-lake-edhoc-23" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="22" month="January" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-23"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-tls13-iot-profile-09" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-uta-tls13-iot-profile.xml">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for Internet of Things devices. It also updates RFC 7925 with regards to the X.509 certificate profile. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/thomas-fossati/draft-tls13-iot.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-09"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-ctls-10" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="17" month="April" year="2024"/>
            <abstract>
              <t>This document specifies a "compact" version of TLS 1.3 and DTLS 1.3. It saves bandwidth by trimming obsolete material, tighter encoding, a template-based specialization technique, and alternative cryptographic techniques. cTLS is not directly interoperable with TLS 1.3 or DTLS 1.3 since the over-the-wire framing is different. A single server can, however, offer cTLS alongside TLS or DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-10"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="https://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
        <reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
            <author initials="E." surname="Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
        </reference>
      </references>
    </references>
    <?line 2041?>

<section anchor="appA">
      <name>Example C509 Certificates</name>
      <section anchor="example-rfc-7925-profiled-x509-certificate">
        <name>Example RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,                   / version and certificate type /
  h'01f50d',           / serialNumber /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  h'010123456789AB',   / subject, EUI-64 /
  1,                   / subjectPublicKeyAlgorithm /
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,                   / single extension:
                         non-critical keyUsage
                         digitalSignature /
  0,                   / signatureAlgorithm /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 139 bytes. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
47 01 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16
]]></artwork>
        </section>
        <section anchor="example-natively-signed-c509-certificate">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType, encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1672531200,
  1767225600,
  h'010123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'6FC903015259A38C0800A3D0B2969CA21977E8ED6EC344964D
    4E1C6B37C8FB541274C3BB81B2F53073C5F101A5AC2A928865
    83B6A2679B6E682D2A26945ED0B2'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 139 bytes.</t>
          <artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
47 01 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 6F C9 03 01 52 59 A3 8C 08 00 A3 D0 B2 96 9C A2 19 77 E8 ED 6E
C3 44 96 4D 4E 1C 6B 37 C8 FB 54 12 74 C3 BB 81 B2 F5 30 73 C5 F1 01
A5 AC 2A 92 88 65 83 B6 A2 67 9B 6E 68 2D 2A 26 94 5E D0 B2
]]></artwork>
        </section>
        <section anchor="c509-for-diffie-hellman-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate the common key usage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used to sign certificate requests.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example IEEE 802.1AR profiled X.509 Certificate</name>
        <t>An example of an IEEE 802.1AR profiled X.509 certificate (Secure Device Identifier, DevID) is provided in Appendix C.2 of <xref target="RFC9148"/>. The certificate is shown below including details of the hardwareModuleName type of otherName in subjectAltName, see <xref target="ext-encoding"/>.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 9112578475118446130 (0x7e7661d7b54e4632)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: C=US, ST=CA, O=Example Inc, OU=certification, CN=802.1AR CA
        Validity
            Not Before: Jan 31 11:29:16 2019 GMT
            Not After : Dec 31 23:59:59 9999 GMT
        Subject: C=US, ST=CA, L=LA, O=example Inc, OU=IoT/serialNumber=Wt1234
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:c8:b4:21:f1:1c:25:e4:7e:3a:c5:71:23:bf:2d:
                    9f:dc:49:4f:02:8b:c3:51:cc:80:c0:3f:15:0b:f5:
                    0c:ff:95:8d:75:41:9d:81:a6:a2:45:df:fa:e7:90:
                    be:95:cf:75:f6:02:f9:15:26:18:f8:16:a2:b2:3b:
                    56:38:e5:9f:d9
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Subject Key Identifier:
                96:60:0D:87:16:BF:7F:D0:E7:52:D0:AC:76:07:77:AD:66:5D:02:A0
            X509v3 Authority Key Identifier:
                68:D1:65:51:F9:51:BF:C8:2A:43:1D:0D:9F:08:BC:2D:20:5B:11:60
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Subject Alternative Name:
                otherName:
                    type-id: 1.3.6.1.5.5.7.8.4 (id-on-hardwareModuleName)
                    value:
                        hwType: 1.3.6.1.4.1.6175.10.1
                        hwSerialNum: 01:02:03:04
    Signature Algorithm: ecdsa-with-SHA256
    Signature Value:
        30:46:02:21:00:c0:d8:19:96:d2:50:7d:69:3f:3c:48:ea:a5:
        ee:94:91:bd:a6:db:21:40:99:d9:81:17:c6:3b:36:13:74:cd:
        86:02:21:00:a7:74:98:9f:4c:32:1a:5c:f2:5d:83:2a:4d:33:
        6a:08:ad:67:df:20:f1:50:64:21:18:8a:0a:de:6d:34:92:36
]]></artwork>
        <t>The DER encoding of the certificate is 577 bytes:</t>
        <artwork><![CDATA[
30 82 02 3D 30 82 01 E2 A0 03 02 01 02 02 08 7E 76 61 D7 B5 4E 46 32
30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 5D 31 0B 30 09 06 03 55 04 06
13 02 55 53 31 0B 30 09 06 03 55 04 08 0C 02 43 41 31 14 30 12 06 03
55 04 0A 0C 0B 45 78 61 6D 70 6C 65 20 49 6E 63 31 16 30 14 06 03 55
04 0B 0C 0D 63 65 72 74 69 66 69 63 61 74 69 6F 6E 31 13 30 11 06 03
55 04 03 0C 0A 38 30 32 2E 31 41 52 20 43 41 30 20 17 0D 31 39 30 31
33 31 31 31 32 39 31 36 5A 18 0F 39 39 39 39 31 32 33 31 32 33 35 39
35 39 5A 30 5C 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0B 30 09 06
03 55 04 08 0C 02 43 41 31 0B 30 09 06 03 55 04 07 0C 02 4C 41 31 14
30 12 06 03 55 04 0A 0C 0B 65 78 61 6D 70 6C 65 20 49 6E 63 31 0C 30
0A 06 03 55 04 0B 0C 03 49 6F 54 31 0F 30 0D 06 03 55 04 05 13 06 57
74 31 32 33 34 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48
CE 3D 03 01 07 03 42 00 04 C8 B4 21 F1 1C 25 E4 7E 3A C5 71 23 BF 2D
9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C FF 95 8D 75 41 9D 81
A6 A2 45 DF FA E7 90 BE 95 CF 75 F6 02 F9 15 26 18 F8 16 A2 B2 3B 56
38 E5 9F D9 A3 81 8A 30 81 87 30 09 06 03 55 1D 13 04 02 30 00 30 1D
06 03 55 1D 0E 04 16 04 14 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07
77 AD 66 5D 02 A0 30 1F 06 03 55 1D 23 04 18 30 16 80 14 68 D1 65 51
F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20 5B 11 60 30 0E 06 03 55 1D 0F
01 01 FF 04 04 03 02 05 A0 30 2A 06 03 55 1D 11 04 23 30 21 A0 1F 06
08 2B 06 01 05 05 07 08 04 A0 13 30 11 06 09 2B 06 01 04 01 B4 3B 0A
01 04 04 01 02 03 04 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 30
46 02 21 00 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 02 21 00 A7 74 98 9F 4C 32 1A
5C F2 5D 83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34
92 36
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

 1,
 h'7E7661D7B54E4632',
 [
  -4, "US",
   6, "CA",
   8, "Example Inc",
   9, "certification",
   1, "802.1AR CA"
 ],
 1548934156,
 null,
 [
  -4, "US",
   6, "CA",
   5, "LA",
   8, "example Inc",
   9, "IoT",
  -3, "Wt1234"
 ],
 1,
 h'03C8B421F11C25E47E3AC57123BF2D9FDC494F028BC351CC80C03F150BF50CFF95',
 [
   4, -2,
   1, h'96600D8716BF7FD0E752D0AC760777AD665D02A0',
   7, h'68D16551F951BFC82A431D0D9F08BC2D205B1160',
  -2, 5,
  3, [-1, [h'2B06010401B01F0A01', h'01020304']]   / subjectAltName w. hardwareModuleName /
 ],
 0,
 h'C0D81996D2507D693F3C48EAA5EE9491BDA6DB214099D98117C63B361374CD86A7
   74989F4C321A5CF25D832A4D336A08AD67DF20F1506421188A0ADE6D349236'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 275 bytes:</t>
          <artwork><![CDATA[
01 48 7E 76 61 D7 B5 4E 46 32 8A 23 62 55 53 06 62 43 41 08 6B 45 78
61 6D 70 6C 65 20 49 6E 63 09 6D 63 65 72 74 69 66 69 63 61 74 69 6F
6E 01 6A 38 30 32 2E 31 41 52 20 43 41 1A 5C 52 DC 0C F6 8C 23 62 55
53 06 62 43 41 05 62 4C 41 08 6B 65 78 61 6D 70 6C 65 20 49 6E 63 09
63 49 6F 54 22 66 57 74 31 32 33 34 01 58 21 03 C8 B4 21 F1 1C 25 E4
7E 3A C5 71 23 BF 2D 9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C
FF 95 8A 04 21 01 54 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07 77 AD
66 5D 02 A0 07 54 68 D1 65 51 F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20
5B 11 60 21 05 03 82 20 82 49 2B 06 01 04 01 B0 1F 0A 01 44 01 02 03
04 00 58 40 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 A7 74 98 9F 4C 32 1A 5C F2 5D
83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34 92 36
]]></artwork>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y923bjRpIo+s6vyCWvfSS1SRYB3rmPzxlebY3rohFV7Z7j
9vQCSVDCFAmwAVIqdbl6zet+ng+Yp/0L+wfmT+ZLTkRkJpAAEheppCqVx3K5
igKBQGZEZNwzslarVfbOfmMP2NF49OaCTd2lt7JX7E/1dqPPxra/d9bO0trb
ATsZJy+dHlVW3tK1tvD4yrfW+5pj79e1pRfYteXC82s2h1ZbwkM1o1GxFgvf
vhmwFKRKxdn5A7b3D8HebDT6DbMC1wcs2K8qwWGxdYLA8dz93Q7edDa9nFUA
ruNeDdgB3ter7JwB+4YtLZcdAptZvm/dsRNnzazNht3BOJnns2sruGbXtm9X
GNt7ywF+AR8Dz9/79joIf7/bqr/CnSt7t78eMLNyY7sHewAXr3zvsJMYe7P4
V3u5Z3PnyoURMctdIRL9u90eRnyEIGjURz95/ju84Xt8GK9vLWcD1xFb/4B4
q3v+FV63/CW87uh6v98Fgxcv8Da85NzYdXnbC7zwYuF7t4H9AgG8wAevnP31
YSFA1m6vXuD4CPcSzUeVinXYX3s+zgJ/auJfxhwX5vyPdXbu24f//A/2ytrv
g8Bzw+85lf/Ru3Yzb4GBDdjUd5Z4lQ1H4Rc2n+q/wsP1rXjqH2xxY33pbfWj
+b7O5vYGEGr7iWF8/5//xwdip74tGsGVB4/VA/FYiSHM6+zC+puVeP382rp2
VvFv6NUXZ/Op5rUB3V/34f5/8B14fyb2f/jP/3O1ObirFNrtTfq7vFf+KzxR
v/bogbx3vqqz2cE/XNvJV76ygG3c1Jf0ztf2+0PAGTn53i09Vl/zx/7BxTtp
uRCOKxXX84EDgJcHFXj0YjY2DaM/EB/7vXb0sSM+toxGT3xsm72G+NjpNeXV
ntFtyY8dQ97Q67ZM+bHfkq/oN9pm+LEv7+2b3a782Ow0aGjz6fh7vkqEfJxu
Ng6s6SUbH/wbm41xhXtXvrW7vquy+R44yvJXAVuDqJmuYb05truP3cURVmU3
tl8HaUKgLf/KBjEn13pgL69ofcMHo3Zj1nerNd24gtULIggkI0hKd51EYqfV
kxPo9NsSiV3TlDjqtjrhx74Z3tBvhjhqtTohEhtN+bHXjTDXCNFltLrRx174
McKn0Tfw41ltQiKrtrHe2TV7dQ1iV7182Fu1/SYwmjXH29d2vrd2NnbsDvi2
toS/YKJweTwc1S5fzgda3C2tBeDlsCX8LSxY5I5r13z7rwfHt7dAjKAGyupA
n16ohB0PX4xIkvpshgCq7GgkHmcXyuNE2v21zc6C4GC5S5tk/SvLta7oBuat
2flhsXGWm7vaJWoy0KMxDfpH20c1xox6t945ojHkiuPkyBRW+McDjM5smIbE
yxgU7YMRg1q6FnAN9hlxA28N9aYWUWa9+WloegWGgMTS2XQ6rfUaZt0YXugx
FchVDMxn23whiksv4MG/wIM1s2H06tf77UZFE4IOZQDh4qW3tDaEhK29972d
t3Hga9DttsVce38LxkDwX//273N7efBtNrFvHMDZ2QpQ5ezvCDRMx7EDXOxy
2vG3iJnQgIpxdOYGAPmwt5ES0w1YLKD7xAj5r54LyhBMlyugLaBfQeLwcAUE
Y/QiuPz9/NWwZr89G4/1WLy9va1fBVsLJf4LmMH2xe0OOMzdw+ReHHYbz1oF
L5AoLxrmi/n353WjhaLOCIWdQCq+h9F72PmPZyqDsHNA5/JOYROjGAMITpnU
zF74B8uP2IMs3tqZd6mf1cpziCGMRt1oNLov+t1erVlrGv1av9ntd2vdvxgt
dfQvnavr/a2NfwtjeuKAgQYoj3F6uG4APT4wBpLn8hoWRFDP4IKj+c6H722/
ysbX1rZ+BAbfSyAg8tFrD2ECCA5SkhxfMva2O/jsszlqpqUdgNLylg6M50zq
EyA/ssOlDfzgbbcHF8cI+I24At4L+svbMLNl1kuszFkdV2SwuCtpfCS+Pwdz
1NpZK2fr7H1r7wXFRpqUjpu7kF/H4Im8ypKN8F19a8dlHlr15xvrDu0WYW7l
y586GyEGXTclefgI5ucgdxq1dmdYyFudhtl78fpsflmfn9fFQ35THd4FEccG
IYC0IdqeW45f+8kB1+dH+642BZkFkja4JsE7X16DBA7Y2wCl7MQJlr4NLPHS
u7J88Be2MRMli+VwQMhn851NLMNFOR+AGCSM68ah1VhGZE8BZZb/LjTdE1+/
rANv267+yyGQ2wN+DN5lsBXc8EcLHMaNfaO/4aLOJhaMVpVxsKg2gmC1Wo1Z
iwBYbrmvVGA1BkxaDixADKwBP8zijEIuLqIWVh1f56rDVYfFbDPfDg6bPd6k
fofKAHzWzQZVYdIh5g/G3xAcdjvwVvHVG+QguLAIuMgAo4uhdUwLGL3e2IuA
YXZArMXGZrdAc5IO+ASaglWuVoQ2YSegis4mpyBbXs+HVXYBkreqSOIqvSCp
cJneJhAGHczlJyAmuuYr8KcBGyIuwCZTMbsw4KAOu0rjjKMAXXzwSmCt3cHn
AObm26sDqE68NXD+Zktk4NTkAFZxbBAKPLDCWbvxP9jtNdwBKAs8RgYQ3uXu
QXwQYHzn1t56oCdw4jRqeg2h1OcTGs5fg/ZiCYrBd8BCBy6YcdzWBkU82e0A
fmHT++CuFSBsiW88OQq/5V8dAR1gfMtr4D8YuOvtmTDbQiTiAKUOwYcseh0M
CuDDFJFVV5yXQhbmcw35OMl6oUWGtLSDPdCB3/IGHM1r2wLHGS5Z/CJY4ypy
KdbBeUTcgPhnXL/U+craOqvVxq5UvkGd53uAZBIjH75x8NePlcob15YqbHmN
ywOUnaDaygbz4Y7CLEIGocRDDeZbEbJPgGlPczQrOwEtf8pgWYdcgyMGegax
hbzjb3gHb4gx0IcPwhf9+LEKj7vEfh4Fnmwikgd+4hbAclMQTB+UJQ7S2nZv
HLC0+PogOOikffxYZy9pRau4hMmDtCKgRDLgZljBpKhxDbieW1NBw9d7b+lt
AhALwDEWaO3hObpL/D3onn38GH424PMtRsNITqPZCe8EVY0URMMQeHAFZisg
BsGATqAAHLPWaEJ4LnzdarAarCBGSrIG5uQO2OKfQEiId4C/GL4D8byBOblg
tAG+wAjGpRtfbwcXRIUgie3j8gxAyQVMXIWB7K99G2A5qM5geiQEFnd7/hus
IRvWDuLBQcp77MbaOKgkgaTESxvyyK3VCsRxwJkUxRsfLnrQEUqQqlebBDlg
BHxR3XHxW2evPF9IguU+dq9v7+Al8DphP1kcB769xidWoF19C6WxFGUYtSRx
BorpQMuXRnzwfRwyDvIQgCeFrFkkM9/Z9o4kpZD5Djged3z1pB+FJeAC3oIA
DWFrD7iGZURMazHgKzdwaG3uQJB4IEZ+8G7tGzQ8cXQ4ZhiPxbYqFkKhFCqa
secu0TQZOS6+RYRLL2IYYicoN085KTBcA6Tggp0zhIpbWq9x1uEy8hq44J3r
3dJ4SeTgylzYrr12YLUBroF3t2Qer2zOgyjRFUOXtAKKuCrbwVT50j1sKZJb
lQwMSx4WClCjyuz9kstWgQsS/rRW5eBJYSBuNvZ7oEM10iBVqVeIskKvnr/l
v4KoJFgO6nrgYUuIUGIdUhpII/CxUNOHOglB8GtbJOkVv1znw1ocnA2sJs8l
hP7j/M1rDngLj2/gWyDd+z0tOGcPq4rZ9at6RM0FJx49EeorJLEHD2JModNC
ZN1wh6wOQhcXGucewc0CREyfVxWUIfkQuHXlegHKOJCknCqw+PeICiDZipYN
TtQG6PQLjPX6ALSWJpNgtwkOdQKkd/koXlru1QFxcjKeTF5KVusYKKRAdN44
K7LpbsFshwHb75E9g0iDc09NyliJYO4wDc/PAj5I5AOcUZ1sEITO5yZRi3jQ
zFCSm9Dr7O0tlxhyrcJ44N3As/Tb2ve2JPZwcKTODgHXiKh8a6gu99c1EH4H
WzEdyQuoKuKYC9Nr8E9BxwN8UOtAon3oPRLewNSnN6H3DlqGhaFHVAULpD3e
urX+FSUuvF3wWmioBiguAMjKWa9tkmV4F1+C4VyruDRVbgFDwAb/FvQ0fKqy
A/x9iooWVxGjicFXxJ/uYbOBr2LYOEHL/ZQvqD0gPvpiz7+IWC4yqDFjFLA/
//znX5Jj21o7+OLDnz/iFztwtFKjp2WHthJ61fEvyf0FynAJgIPkZpcQN8TH
7y38DuAEQA9FAFZVFuVv4Re6LRMNhp9QzQhXkBFu0KogFe4xcC9De5sv/zvB
JqFNvQs9XIDLfWQAC5w4HGXY83AbD8DieEIjm1sx8AmvxnyJDx/UkJucBDoW
cmqNJqw+jpOYjRW6DkK0C91r7XagxGlS6s0LkuSKHYO4ReFUJSlWZaERhFFu
HEfSTKmyiWIotbp4hexdcU/bxCvTyQ9v8DFNWBu/FkEW1IIIzKg31XtlJBtJ
p8ed+LhwAvU5bYxc4jIX3RGzoTXHYw46a5gb1URiFKHlvF2Oc7TbP4SBMxxV
RC+xuISrCsY1ly3SU+XSWuPbgvrS+6ZVFmPNGDfyXzCgTJhMmHVVEUb88CGK
XXKxz91DnR2F6EVUSIVLjitmDcVyjhk7MK+Yh0BLD6Ralulfx7DCg+MCKoVC
x1CuIku3juCpWzSIfcdy9/wFK1SN8IZIKgTWNuluIxK47KZZotkPs7oV+nhh
E+UIP4NKBVzgIaqIG3w/amaCpTqqheZr3LWKrX0fVYmQaN6CtBEO2vOdKzAs
NvmAAd9mnb2Oe9ccuXGqR/oxcqZhpkCN5QHtvxUPHKQDE+Cp7cE8wSmGd4RD
IlSSBWoI+oFIhdu4QeDawp6jOALhHJ+U7ijpMbjNCgKM1+650SoMSjLc4Nu7
0PdcWMt3t5SJTEZ9Qh0hnBIeSqCoYBJ3gK9CZCWFMsxuRWkMYQvhgIhjRMiC
KKcIaXJz3IK3qJPgXmEg+cLhfG8J8wPWEqY0wpgo+VUglFTxppAX5RHKNScI
DhLLFC+5Sy1HOc/wFbiYl15wBxTf1pMBwvtGV1B0zS9ChSMCLDQF4VUQs6Ww
TyQVOgrrPaRKsLQxmZLw8FEEQvrxhAfK/NDOlzYarLbkO5BMPo8RnEpLhis7
DPS8FnYuJj/QSXCJAbkMxOjKrYf8evTq7fzyqMr/Za/f0OeLKYzlYjrBz/Mf
hi9fhh/kHfMf3rx9OYk+RU+O37x6NX094Q/DVZa49Gr4z0ccaUdvzi/P3rwe
vjwiNzFO0DCehnapv8Pw+QqXM6iGpe8sOOuPxufMaHH5hSUNMtSCxQk8ruDy
V9GS4L/ydbvb2ZZPJjA6c9YOc0Sof8B6vkZnFllWclncfNyC+RGoVEX/1nG9
jXdFcpoPpt/rhMaklKxK5CnTzCQjVIRufRtUAIkKYU9WOZIS5uzmFq1oupms
0InNR+Sgt0NWiCwv4zZ4CIDjcG4vuWRq1U0hCPGTidNTx4QslVpXH75R+PGj
xBeHqKxHiibwXCQ3v9Ugqk4hyDCGR57MBnQPxi9AaOEEdxS/RNlAYSFpF8TD
P9K2wbckjKEYUWg4CGd/zTVK3DxMW9NpM0dJmcZtHRm319tPMfOJnPeUgsOo
B0UeAYsYRyD/dANO8wqMK1kZs6TKmJ3nkJGBesvZhh6b5UdiAp96czaha4Cs
jbUEDiBUA8+DzRh6gBQ+lXpL3sPL7vBxeMX59HU4yEDa6/0QoRiIcVdg9Siq
WqrfVR0N9oXjCgsosBVHFV/ruaQ1ykeiErpp54FEDPXvle2SM7w7+DuMFisy
E5bOlUfpuNAPXDtXNXwBp5AwGNPqkesm28HoojTSEyaXlW8bVblJx02toMD4
ceOGDVziRgt3efm3mjeQE1yk6+8zkDAG5SV5Fb+EwRAXL7z9tUgTJWknZQBG
2FbXtpRte26VS0siYFcwZBe9Z2WpyqReTWUpHnkEEFjakY63xnQtGm1bqgyI
bvaIgkBPrMMALgl5Ov220Oanp1FwjTLeBGwjFnP0cKi1FvbGu60KKxodG+AV
eyN8fdRHPCjC8w8k2eUrBKHJYeCPWhzD4eMi97L0fMAmrCN69Rx0+fT1eIrf
zqeXEoxqJqNs/4a9EuHLGZc1H74R4bYaFz4f+WLgfCblEbeSHT8utvjwNw7V
G4kJ463SQaOAXBQkxBhuWgdECxJho9LBECIPlqTsKNW3UkPOKjMovKRxgsCV
+gMLI6k402Px2zGfLbJbghTHS4CiqMNLsPmOOSpAlnIo/Fn9nWS1OkAmPgky
JtBszDAX61gEiWISRV54c2goF1r1a28DpECe4NO/abITzbjYd6xxyoVHTLCF
YgyeQ7yqoDPgGJFZCheIdn+gSgdr8/qwXWBJJmFavXTMzl5fTr+HF/Boagr5
gusP7q2PZpwwaw6umPYC/jls2cnf4QMFMQH50cDm6pvQdb7D9AstlMb7RoMH
NU/2EVm4W0UeIz0ktYxrXxG+ZUZTZJm8rbMHrucTlWJUzlL+rnCUWOPhwhaT
i+4dSh0lHxJrLv4+Hp9O2Q80DHS2ENNCJkmFiBK6KhJ/PIyKfHd8YW9oXhM0
H13AYHBtr17D0I4TNBDcwcv+wzQMl17w63AP4hxELgVPZHYTrBYLFE3mO7id
LuLeQZQRtCSw0C8Px8yx7+aNTB3KFN8fXkhMiSt0rB1ifwAoJ3Ili+i1Etc+
paA0qtjw5gQ/gqVUlUFg3LSRfoBXPE1fp2+r0xCQZ6xF4G1woHwtSMEgxsVO
IiGJKOKL7FRMiXNShDqSFiH+gL9w9lF5iDCeZQUAluFgNnjPlTQ8+z/RsnLI
CEft93a/7s33vDhNLgZeFwXXKEnEv+XMH6F8iiXrbMgTwsoSADF2NmzLZ4BZ
i+QZj1rGkg2oBt5ezmq9iKqiMidEA0km7soubErny8HDQFVY/B5gUHx6xUMY
HsP4BpeCqsECRlTdrldjok0AUDmacNttqegNa4mG8/HZGQ7Vu0UhdpdEo6iE
Obh7/46WCgd/bQHWefaJmRzVCsmABWzMgLyXhDq4Dmo1ayMvINTFdiffIcJZ
wndCW/1szeh16UUZkVR8x0eJm4MEY4RUOMaMiefSJodjTHXG1x1XTAHV1f8B
38jd6pAYPEvpop/mysl++PDhv/7X//4IutwUqBHjI4QTi99tF1iYcdw4/q9/
+/fj/jHqtGOLflkfV9PDsKKFKF5cBV8TrIr30geiOiglQ4e0A6Y4bjSO61lj
jxDnsunbs1qnJZcxZvXY0Q8/1HR/jkTY7PgHErxeVJ6jn9eQfplpsJueVtlZ
GYAlUZbgYQ2tQD2Mo09RZzGdLRd7pIIs1urVFjCGV8OxrPpgJ3x16Kc9m9Vm
03Dap59h8F1Oqzco7G8xa52FMoWMdbQOsbTF2d8JdQ4LZURK+JgYEH8fYqHO
ccxbj4AmFIS985bXNZ7RwWrIF+S2n/wd/zlVU8bWVcxvciNTRzjsJC3P38zP
/kSufxUtmh1GYTxXjAJuh3GuRGDFUm9ACRLLRUSApDEiblxwi8PZkwMfOtHa
CswogkOAzOag3R90GiCcx3F7KSFtsJSaW1xhbeUWK+8RpOpdr4TB7HuHK/6e
O4znmY1WH0cNr7kkTCBh0Hf1xRPw3ffc/sFCMbyHE5Or16M+/BhmE/60++3+
/3fETlyqSnB8HlNCIEkOJWJiSpzbfAeKVEmLj/8WM53s9xb50BvnnS1tM+VJ
XmD3o32HBeKivPE4NAL5XgXgLz+0Id3l5kBo2YFS2WLsL9BYy6HJcJx8j2Jg
CnNi987aXKEd4ZGLaQmnNFxvaUuHmFSJAlEtHkaeYZ5cuHOdJnIAcpi565y4
WhirVWEUJ4Z+zEZnl2x+eXH2+vscb0EHWxPYtYAWW2E1KXBR9/zN9j2YNhlL
VK4hzSj1GsFHUS1cAKpCAF0b7Uvl6c1VzV6GU6jG4wTA2slJIsj1wadARVTi
mIyEf/gANAuDFcLT4tz11nXAVj6b0OpSFpvCdHm3UBUNrnQREzmOLmg846T5
zeUYWf3hc3qrmwm7OGncwmPCrFU5CdhQ8ph4Ym9vKe4GBhqvh/VCmKVYNhf6
wvOi4BCYM7Bg0KM5DhlBDTTEbHVEl/tHvHJcZGt4CSRgkPW5jRJjW/wRTt/Q
upFibX9LpUTREtG7MGvHDyjijMxgspN4zAoU+Dv77i1Gn06rytui1RWCj7gx
xYbCTg0ZKtRJ+iEJNeeIHEXoJSVHDE5k9M6Ejo9lVoh31TXJiy+ih4VqW4lM
V7juwsgnz0KI9FCizgTfzOOkgdgfsvdta4+RQDLOJKKK1ysY1tvd/k5ZtvHw
RaghknGMVGyihDJKL3AA9yz0TWzOtBZ0Kih2Q0kFFCpg1YzlwnmeeOHn0kvF
znUsEUCjy63JCAMyl6P5WI1Z4tum4wnua0mqOh0KHqbueGw6CnCWrUflMWOF
QpzzxvFoZojW+EyVwsDUrHE4W5viAOj0xkKE6KCS3y6z3Vihe8PpP8S6DrkB
MNp6wktNI0X3avjPSsgmo64gPeK/JyemRq3iX53Cevh79MMQX5Xk49+xnylS
FZt8FS9pSTtA7Vyt/FKp/E8uCsPEhfQMJf2oeQGJOJkzELOfi6kMKvGXwlBO
8L2aOPSAQnj0pT4OPFBT2uoXykwGFAWhC9INfC39vwEjZyPxHfmCylfC1FIA
ZVriA6Yx+LWPCIzCN5GUHyj6SUeLotecVioZ+AAky6g6liptiQHAXsmO5/7C
XnAv+gWPb1Yq2fd+p0SUXgBc8w/KBeCZ6BegdTygx0kcXSN2G/A3n7IXL8KN
iPiTevbvnrNKP8z3uBQ/vaMaE/3DIJYcmhl59TAr9BNhJmm0wz2oEl/QYFj8
lfLn5yhhLQcdKTf5TkCUYp5w+oQXiB5EvegSIjNknrOJQGV4RUwIzWoNLmIP
8iH9v0zandRZiLO68pOEnInnGGzC8gNBq3Ks8mHAvkkmFfkm3++O6LMsSVHF
+dFHfM7yqYNADdb4lfvd0RKLI3z4CpOn0zwPjle1agTih29iagwhFYD68A1c
2h0WYB7XEs+ior2YD5UNdAE7ifmfwpYOM8JUzCySbWF2QMTJlBhW0uRGE1+T
o4O3bb3VYXMIkH14Gcdp0kAOjTsU+bde+SweD7GzP//MxEtAm8gvo/cpF9mf
f6nLeGz4NRgXnXa72VWdisiTiG5Sp5yiAdYXOwFF7cNgsxxUfKqlZ1fn5EvW
9CiUBBX4kw2CAiub//M/eBD1JB5LOK3yW7cWbXSliiCl+IcbUWGOXNR9YbeP
epOXRWH3HXRTeBVqllmRGga99CBqR7zl3gaN3njfMKv4d5MH4eBTKzGA6H1n
yXIZNbUceQHKVJRNoshIyLtxXCARY+UpBCaOEtpfFhvz2haDXa9U4yMsMsZZ
yek0ZRVAvCQ5lkujhAXVH65W7K629DwfbqKqG/R2eUnb5q6eXvg6ccF5hGzp
yDIPHrCmgZA2ZrVEhvARcuCKmAgXXaaY4LZvWPPFByfmQZVo8IaMGoCdtQqJ
ic4P7mf1ouHhK9WXhEFt/o5kX4C4O1boHiZIpKjZD9/EPP1EHeTK3lvOJki5
PzLwEvfOHyvKBl6yGnUWtWoxBzz0t/UeNlHyWAEYLwFwtVG6qja9LFoPOFIc
K5FAqdJDOazErcKJh7w1lnfb+hiMSHCECWkaCEKmjdvlHg7T3PiwqAFUA2Rv
xpfTh3r9x3Eb5RiGsrR3+3DfvDKyKJZEJVTckw68rXpTVeaXMb26ueP45oWu
OLFYRCldHYL0BZ0U3hQ9eKBi0bR0W1oubXfgdwBuhigI0KdViArcAz6vg40i
HbzOLX3iKiwSXFBp4NYDDXo2CQv917QnDu4XVVeBFPyrqBLeZccg5bFyCjOe
Dna4PBbpQNqZR2seELo50AZODP7QlyF243hScB1TS1GZGBlubgRvS5A0z9mb
wL4VNeOpBiVx1zbCkyjRpYAHRq5CQlAtGptzu4P3WogchRNhj2CKKLx6mogt
hqEUbZY95deD7RwDB04Bd9dYOIzk97HfYxY2jB2HTNFbdhLGcYVc+1H8Hgud
OUGyzF+T5qT2C7yJF19SoghS1pMn44vYxxJFU6KM8SPfxS1ipspWIl7/Kscr
G1UQu0Q0E5pdFxzhSOQPkzeXxIron/UKJC3fGrujC/J3wNAn0O88BktGZhj7
FqxEsiUm3tZyXH6b9NUEK6W/OsWHf0lOYGQF2IlRbq/b47ZfvKRcOeVKYzk8
hiGsrQ23Ct3kzL5jNTAPnfBO9OZ4Fn1n7a9f2m4E8jis644KlHTwDLF7sDTM
fHipZzJIPkogIJf0MdRx6sdx98kMEB+J4AGxF2z6HmOLzl4S+sAjDhiTEJ60
4147C3mD4KX0fSm+IEsIB6mse5jJj9HSz52X6hPKxRtIw2L641uyKvQmSmLv
gefHMmeJbxUrSVg/COVFmGeTZXMW+RW894fYNhAatYmsV5hkgrme81vPVvqM
VbbICB9MBIEw6IG3TCNUzu/gxe8prGP+If4shnbUC0kinXHaorkvuPFEkHso
r3waA54loMEoD6mlcF/liMYImiUp9Si14zDq78QL1aR+hC/w99OQdOK62hGK
YvOJolNZH8vD9r59hWXsvrQNvn8NCiRuw3ILUJgxqs95D7bnPReANKei24HC
q3hB4U11fHKR4Kj4ROOTT6dnsY5s9XpOMWhNDMQRW+/U+Ed6EninAFJQNaVr
SRJHsN7y4mO7tvzVLQznFQZXbHqdrI+njRt0BfNgCxtEOE+GUjONW+6brHhX
H7zEU6288wt1AFL3uIv9dscR0G817z6WDk2Vq4w//yy0KA8z/vkX1eFRKz6J
gCfs+vaS6hKub8OYOjuN9tSks8eiDTNGSN7IOFMceRFLxqz9DFEjKp9EsP1E
/Z2qYkXoV7mspG3YaQIEDy5/G4P6i2IwShb8Lv4QzwekhBOZKJrFzG2XaC1n
r6hYXVV8GWTg40yFzcoNdHzxEts58mg/MvU533d3srx4qV7nlyPhk/Uc9RpS
C/BTQPhSVeSB9o6EEDu4DobmLuzAO/hLO7LURZjl06VXvi7Qj1GoLRIQMjOE
d491uBPspYeUMkFmYMxRTx1E9Mla/Aa/lOcZLQUzWGcWvQDGqR1/coRD6syJ
3QPOlH4+w+WSKmQt+S1+yS9y5qEad6BYjDcxH5p+gEtuEQ7N5IB7MABtlrAI
9isbXpcRg1LCQGdDWcdRpmxDtPHK5NVk8iCpXrKow9ExoYIBXnhHGUNlIgPV
0ALj0ndktpCeT+NWMby+1cBP8aM0T3S0FsIpRumpjiM1NM6Y8TwJMhxv5lyy
+TMZcAiHkQw5SJs4fBLtZid6MjKTcQv3Gr9W+RCj/FwGc9cNf1fTzVtkJEck
WWLPJty3ctwcLiZswUV2pYAQC6WGOr7oxXorv0x0ZUjPhN5Z7AWDRCAm5p6F
iB6HmBvEBIPuvlKVDtytU1k/N97DZ/AiPwiUah2OnQBOlNSOvMg5CVx8Z2lf
2Gvp75MpRft3XIzAcN+VtugkxMLby1m4E6k0N7zB2GPSuh+fC1MqbqaHmzm5
y/5PB2tDMz7TlNIlJeL5P91LIub59hnVAtEN0cBgrcuKGJYetSr9BMv8VX7L
5SBdJVk4TtMrFlxKjQ3T9CgkdUP6hekDS6TTY8ERtG9TYSXKQAm3Jrw1tsHq
MZ03Sn8e5DZ2vjtTuDKB6HKgbFlP5TZF8oe6atSNhujCJfeyRxsdKHvsuM4W
3AE6ucB6T5+VBHxsNew1e011PCPkAmiGPQi8TGv9dRzREW132EQE4UsIgxTI
mHCScfdSt2fqywm5Q+inRbs2Q40Zfhl9p6hOXH/RM9g3kTsVSg4/qouT6cdl
RAU/5APqrUrNb9Fdjtf2ZJkc0ZvLVif9/C2utF/SpS+8/KVUkdLP35LzKdbV
PBNNSNZvo19T6B/OmbS/Aior2Nk10CKe6229AxgMwdkKUY2L0F85iYjsfS3K
4VwnOA8kZX+SBOJ5MbHBKKq/xmf5+4ZzR5dxUwnryRzQjQOzoCeyyIcTfONf
WNT1+jsZ8vz5EPbC5NpxrlqnwhiMPfqLLPLKQ/CNmYXj2o2ZYwzGbqV65bPz
NN2cHW6uHW285TuVZrgM5sPZ2acSj+/pO+eJtcyseSATnicye5csS6aii9NU
ubaoMPDWsZvTL+Hsog6JKJATY8PigGQ+NpAuSPQqamPmuFIWq+Gwqmz8FnuA
2km/B1Ioe5rFLkQQH0ExT8sJVGV+XE0YX1uK/hF1HOJSxNjyeVoX0SjSC0zZ
l1ewVjgUULt7rMk4bFZ8uzTtVuBNd6kmWbwsghSI7uvUk8nF7xAmVfmGYV/L
DR/0iWjUoMnnItf8l06L1ZjBUltCKIO7QJ9AJAQR7Td5Qlm8RGQzYWkeZClw
nI1BZIc45KQdAWV55uNUuZ2z2HeM/RzeLj6QeAhZQIgDdL9i73kRAxR7ZHzt
4WFEXKakAIViJXyEr2+6HxY1H2o1BS4l6GMCI5JDqszIkUHpm0kKzcUeAsXg
x7rXYG9td7Egxnx8yS2aG3kmVzWyaYSpgzfFKhxKy6eX3hUa9bqggbrkRe8U
OcCcmMbW2WwcuY+WHzmQKv4+DWcQb5sUrylxgcE0tdZRxD/W3QfbYVtBZt12
Zj1pVnCAyEPUoZr4cOahh7BBzIl6WWHOhfiJyucZzhBGkV2eTndEFcORF6EM
YR0fhFSjmYNMsDAVyvHuzRnVWLxgR3Z45sUzFPUXKSXapx5VLFVlklG24UMv
gVJMw6g2KZnmZidKkvk0rFBJJY01BkqohghOrVVlNaPOXxerUQoLEfgZHPwY
q5De7KQBnAcPXNi7w8oR/fwNXgIKeHF2sKSok+KJeUoTg+vDK7DD+cXWKe4r
sqnsp2iMZpWZTYDzLw2gk/kvBv1t0t8tQIHZPNWNX0kAqw0iQIS829HRd+rZ
rfzqm/H8XF7N2cLcSxkNSvzmzz+zZpV1sPpXMyh9eixssxtLbHEGqoMqyxtM
Uz8YtQPEkQLqiOrJDimxxgvIqG9csmGa7KzBY2gUdFp4N/Gdj6K1D2XAeFnM
rdTZuoGHqOLsV+UkrrJeVcFfFT/Exs6RCguQOqD+QE1T2Xm4BUFuwsJ4515S
dud7GHOUzR6X7UUV/lqKiF97Lz8cqnH/2bFcq8b7ssr0lrPFM3nREnjfXlhX
VfiHTmvBD3v865DKJuLBovC4KLIL/e1U7zDy9ZVC33TvPtG/jBQEzP4v9ER0
+o3yLH39J+zni9NSjjmIHUYkzzwQ4dI7Hh/ai0Ma443Wr17QPJHBqM0nWWyi
WPHtxRm3YdUeEcoQabsYNfFdKRtgo11mL/i50dhMHF/KtjZIE7GDmkewwu+o
hgJBxC2zsTc8x+ANvr02kydmKHQQI6txzsDox5BO84DvlYOKeN/vBPnMbjd8
69HWusLjG8hBOGKXo0mP94uknuh8ZaBPQ1Pli9C6Yu12t99H5CAuXWuvoiG8
SdnVGDXS0kxLGpuIbx0XhB3IE1x+UCdnaZNmEbjvUtsPxW6o5OWEZhzG+qzS
prpoHOpK4xWeIa857u4g3EC+3tQts8LQwjpOXkHMvQTwA6gjM/Y3dqNfxfOL
w/KdLUKm9BbgKuBg1wm2jNoMC6FAkd3YWhSCLI0/ZUjUSiU2eBGcJYd2Kc7H
CezNuiYKCNXVFObkBTwm+x7DVOUehsMOt2VH+8JpqwefiOUur/G0B6nxqR4X
PtS8dW0h+hCBV7eVJ4z8ymObv7KXFhgi8C/PQVK+/VemppB+hXth3nAVONuA
fyKO+BX3cx9cEuyoZ6wrbc9EAWLJQZhpEBIAlyY5IPYcRDMEAbf8gCe5/8ro
H8Jwkh35owf+aAv+OfgO/A0Ciu+7EF6cKpxU9ZYeXWJguHNL0Qrhpi2tLjpi
eCjXd0c+2+B/uEsrCrmmGo1TI0Zkc2nOhrXgx++c1XFqXaAkRglGFd10h6Zf
PJHJF9OhHawrHiy2fL7jA1t83SDmMOE2D8+8iW2/xMIVeZovjTLWfpoawCqn
5Sj77wVo3JvDBTkd3cK7CrQ6PZ58jW1SiHZCK/uotQfr6QUYEFRMCOcj4shy
81T4xT02uYbPhPuGY/KOhHD8paTsaFJl9B3iCDOWGSpPfP3stJ5hfim1p6f5
9JUkdpwaRMtorcvofxYVAcw9yQc3Z5HO3j4/sjW/FNmmKwcmcExhXzw2m29o
CLssyO1JtLVBs/c0JKi+BXziaAX24Rs8WSG1BUqVLjS6UIfkQjsBYBhiQdHH
mz3zGE3yOXF/NToihyvj+GEc2FQMW/PHm/TzXF50JIviwWh1ZJxflP73H2Xf
B8mUZIzrmffdMjAacaalS4/HtziUNBvS8YNfghGVo7b4SgF2mqRPKMuibKzH
c4i3wK/JKA76x490rA7fdUTOoig3TfVSDp/w+fBEVbKUZroZkKUhrGhs2Fx4
ak98T2zIu9EwcGX5kvExLr6X9nqyvctjnLCDXya6hv9BbKgUKNCgSWyRLYcS
WbvWwMnIX4xUC+nk8QG8+Q+GaLBdqhQyB58Gb8nz4RKdQcQIyBCPL6SQp/jJ
SrHze6jxCrGOPGgrB+x3TJy3RXvdRAvU2HFQ9vsdd5yoARRxUDE8JxCyRWkc
LuIamXjGnF+cJWTYWjwZ0TDeMVwqO37uMBFHjCFkkXueqhTr4O+qLxd9o/a8
/VQuIpqfgIhkU/P8hRXcA1F2HFNGElMoNDIPitrYV9byrmg0NBjdyWl0lqhY
AJY4PGPFj5MlPpWHrAJuhWLXJBbCXvKRlAhbjojjJDy3Fn0Jfjz4vfAHz9xI
HqohzwFMVsbgySn9dls58wQk0J6OYQg7kqtCKjyqBFve8b6yxEa0pwknK5oB
oDJx7NoP9mYDTlPYG+A6PJIbTB1ZpYsCL3La62yEZ1a8c2S/VHF0gSq9osh7
iK4AuAoLjPw7KaJkKzO1vkcWArXrnXpTHqszP6/1Go1auzPE4CZVUottR1YY
o8ffKDXEu8NRbEl4pTryYNgpdhgyZ5h63J0Ul5VKGdFYQymdkadWcTNEA1PE
NEUCWJ5OpT+mVFbeyLPF1ZNHEqc2REVT7XpL1EvBUmhLYyZqZR6GvpVlHW1j
FkiCtU3vWck+U3Xe8lc3JXX61DBXbvpNWBTKnv8o6scPmYvC8ZEtilyl7jXH
Ysb4izScprwjyV/YuEbmrThOSBd5xdOK7y2Jn7WFhoA88v3cCgI8GCw6UkcS
iLgiau0t92fFd98mcx9VGXp3chpjl+/YHTuppkSja2D+SnEbM8lE2m5mkphK
YCKedH3CpmbRwHS9zRSNGOVoP1uXMfH2VLOxTOWS3W0sxXwDhocGY88w+Eff
vQlRMb8o07xJDLSohxO1a1MOI1RkV5zeoi3CkExB0q/UBEcuXw35gDYY9lR8
TsU0iYQYVciGxTPxQ+TDJgoUOV9RsI87uCs7csvPo1wbHTymCASsFkdTuFI5
49IS89NX13t4H5oj4QHQPm/3IkSRtP9wAsI+4baHktWDwTjxwxupNgFfJmpo
lZuFgSGOio8KrANPuJEHd6kWSI2HVdmlBEQgxl/R2JI3ySSATLwOZWqmKKBw
Gp3snuqH1JJbmwjm+Y/j+TdGQ95PrUz4aehi5x51v1cLlHRmm6obuSyPyoON
8Eg6zhswB9qNaGkFOtlDSxssedmfg2MoGydVMsrpZECBdp602DhbJ/TZdnHO
4ctA5npSJp62MitqyVSVreJdnPMmNg9eoE0jRV7YW+9sRuZddGiWOHNW4Jcw
JpszZJwyxG6tIDLMqyqvJGcX4gnfLvEh0mayKEkcZCCGamvsbTqQkbLCyJiL
w3ZXc9wagKndOj5vG5sz3kZyvOF6UwYaEi22XARiA8HUKYsqriEtkI2wxm0/
XNuOOKNbyjDRKgxfRoXk37CXfJljCYuzEqTCBkcre1cL7P1H3elbYlXzM1+l
ARaTF/GEOx2KiGvCt0IripztUMzB1wgUTQTH5bt4ad8uVhHmiEJ+/gxfstXQ
+0wn8nnwR3r2CinxEEiVChvrDotRce/yLjyVE5efaMhKbub8ItQJoT4IyDzh
gl8bxcnUAKLQgDsPGuEfBOqE1eMw3ejQhPxzmclOSd8ij1IKJ0GCkafsUiCG
e944jA5XoPyewseawxKjg4aW2KZaNIuT50jzAcTTWYIr8SFFHkWHavF2aJh8
9jDXxysUL1/OX0z4QfCmerD0NWAsuLboyAVGu74Ors0bI8oVaMFb1Y4wMoAs
D7qQXM73BKgNzDzZsBdWgM2FoidPuZPHIGMaeU9b4qnRH6+q4S+WGmRh729x
I3sKhbSDYY872H2dMIoLUm5Xdl56P50PX4MLQtVAV3DfLTUKQ+FgRfqNH+/M
cK0jouEtd4CZLWAAfQURwCBhgsVFomHc6sYC0/0qzJBjgZ2MLyhxfXWMFF60
Ykezo6jcYBXAxnHfBWERi5TCMBo+VVwDVI8tDpbG067h4gY9zuVBngx/CA87
liOpsmvvFnVJlW1tKziIbUAo1a/uuAvkcK7Z3AlB69pXYBdSTIaMMHF+NtdK
PKKCYbyDK/W7ElWZiR5Tgs4yiB/NV6CaiEkfaySGlMO5w4aE4lb6PqYI0O9G
7MTC8Tp2CU+rzNBxEruCwjyEivi4cci8wbOS2XLjUN45NsIwSCTLBxfSAQUs
u4F+WZ79OL2B9aisTtEXcjr54c1YLtRUWVZihQJQnrYI16iKHFqYvJMWLMLa
3qvBP/ggPyQGIxVCZcrHX6xsAUeaBRaZ3ILknAqkFacyUBs3Lf9mi6I3bVuT
gFepxpbqNe8xwltVUB/z3Q5jQLwpYVgAwxM28jBqujE8mhZTquGhAIkDa6Pi
M22GklfDkf6NCsSSCS061hwEPDlEqFHwFALE/RocEnTpKZy9OvC0Fj0WBX7C
bhzisN+oOhouiFKP1JFttP2NIkh0ui+JAr7HjdNdZirp6F9aiMK4tpbXciWE
xxoqEjusOsLo0JL2TYyALzcOFx945AK8dgMzgpHRLsKEXbu13kme4QHtkMS0
RUzscqinm+RJ0RM/qDgcXBKtduIAWSaFidAT7IfLy/O5jpNObm9v6469X9c9
n6usvQerLrx0yoNQY2n5iPlLqUB9QKOznqkFD26poQUdbYFUYmkqsanPiZgR
BuFvnNUhbu8HdDYzTEC8lxt14pGQhWJAHXl07t7xxTTVcGra+oyyRjhBI9H5
kzMU4lMMQRys0TRll5kLrOtakrcgbmnWm3VupEdBV5WvNkDaDTMM0Z3QXYH+
I940TbVKovJtrdzPt1mfK78m9wVm/PyqLPxY2dejjCHNraiJY+cIGKdMjrVp
dMPPRvOxxsDb3vJ1oL55TOVVWOTO8UA/ptFvys8whNZj4SFvBK3TkBb00za6
bfm52W8+zhh0sbBQKYSRMDJdcC2ThqL8dXK8pGnwIVhb4Y47vkvqJDopLyVw
TovCaOoAddP9VjMt9ULyun4J/CpMQ/nvt3Ll/spEteM4fvnRxhIuBcRoyPZN
M2J5TnATCyCZ0TZi141O9zHHcv7jWTQOjhez0e/H39k3kPdYr9NpqNfbnU7v
EcciloWyGOFdptloxeffauOaMFpG7LrR6DSfaiwtMZa20Y/NH0mEg2j22z31
utlrtR99LCPrip30JI0Mo93txcfS7yLT9no9U73ehEE/2lgyRQfa4/eSHKQP
4an7ig4lAMPtET8eqhWNWoN6clWHT0RX8NGwHbwWSNGZDRiCPVDXmlSsK7CX
NfTcPirGfWj/Zhx4GTpcaHJeCQNEvoGOcBJVKiKqQQ4WDw9Q4VGmex9Qan9F
YRPZjCLaJC26RFDIRm5S5k4+d1j5/b4TvKPYWKKaxfZ9zw9E1FzUFBefDJVT
8CFt4GqUP7Tg7fCJ7zmlukKJlZvDBm12ynM4NmWqIwdVBkMSIU4RiA9jjltr
RREPcrQtLCTDg1YozkRBMZo59tNXLMyNbb2ziETcM6TgB5LNtTcSGdGGhTBd
6lvrfURmjFJT0/K7rBy4GkEQvvbI5psMsHQ72nst3B46kVg6JhhtpzgEPLyy
cXuFLEGhDkRkhsleRTx0IkM8dLQdr7mMHZglA7gfo9IJJQSWjtA6cp4Y8aD2
ruQJnw1fD9MrBuvyZc1nmFfmgT4Mt93wpiz2rWjJ4jv09pUoOcMvrsUJBEe0
2qaxwOQJ8uCpWt3PLXos+cOaYbGb7vhCbo6SneN3vJMc+fPKyOpyi+gOlSdu
ebdv0duWbcKVQSqucTxpnizfsl2MMEV1Qrx9LBDjhmpUaN8wLTEKpvFtCLRF
T/RTpzsxwL/n8XpKMMkII9C1yp/hSW985soTTmrkRmEAZC/qGa0NYH91p/TA
SRUyhc1x+LEYyWCYTFJHMUwepLujuQufnPxgFQ/gkS/f8VW7sWiZA7OLLrph
bDssOw1rqTCWzalVp2ALNqIXfQcotMnj0Es6AF14xuKdHNEAEQZIJCPJau0o
VoZBc5ocSGAQZ1vb3UcRiUhZhUEhW56LGfU8uLWdK4wyWFeo/PYJ+asMHOCt
xSoVxx3sxdEU5BviW6/BUVRDgrzoIUAWVhf/QZYwY1rkj6JLPBeF1CYdhsj+
/HPNbOGuzT//wj1eC1xfKn2QMhgPB6CwyU02hHYHQLTbEQwzBSMdv8mGh2fr
AET8J4TZTEAUO0iTBXqXVAAsC15ApFCVS6VC8gajSlyarOhwh1CO3HHLZQVi
Qwvw6BOlDI9Jbw5bN4iYVrwZV4GoCFD2cXGEhZJIhjbD1pO8nRi2r4hQK+p3
xHsQbqzJIcm6HCJKNlBGxzVQmCHDFx+dTS9nMDAUdkf06iO+0OS1SKbG2KYA
ahIGoUyeyK7uRUzibqB3Fsv6yLofNLg5ouNb6+73Awb3d/xH/vuQH+m4otPx
WppUc8WkGseMGlkjxFnxphmN5ZHwQn4WOsaaQvPwpeqYdHh5lLHoHBFe/i+9
EP1SLjyDLbPoNyVbwhrvT5AvMeC/y5nf5cxXIGdkLZxmLDLs8Ku8KblvOrEH
IGNGj4RdKa0+24yMzzEjM0P+5tf81x82o89Co+bnnNET00inl6SiyNZNcTVQ
TkcpfRkVpWTt9w/RSRGwz6SEeEP6WEv5N2eTKhYUVTEoR55iCfWEW0nCc9oe
V1c1HktTCefrw4cP//W//vfHjx8x0t/p0XDCPZNUcya2278N7MdRb89Eu0Vn
Lt/35ym029YeqK+YgkO6CZv85Y4lkjMK33Jg6NZuwnZ+dk35NRvKG2yXpv4Y
dbPeazXqhtFst/p1ow7/F44FVkwcSqPDYG2aQwaSs9XDv2dd1piwhoHXG4YW
ilxycVBlfp5CXydoNOa7HvkJG/ljyaER3zvJBc8yz87KpZFZb9db9Wb6qTwo
Who1WbvNGi38UA7Kc6GRqaPR/OC7hfRJzihFo4BDqbKgwBAuQaPW/caST6M8
YM+RRk0tjahZv0y4lZxRmkZKy/+CGRXSqF0GL2VplAfsOdKopZd12JfqrsxY
cmUdQRHCriSUDBp17jeWfBrlAXuONGrraPTSW/Iaz+Kx5NBoI6BwIsnf4FMe
lAwadcvgpSyN8oA9Rxp1tLJuT8kstKoxhbPM1Ez5sg6hvPElDE4q7LadByWD
Rr0yeClLozxgz5FGXT2NfNvelzC+C2iEUELjm/9aBCWDRv0yeClLozxgz5FG
PR2N3vhXluv8zSqMTebSyFOg8EXkFUPJoJHRKIGXsjQaloTyXGjUL6IR2Hdv
weUvnlEujawNAhGUOuRAyaKR3m/NgpJPo1FJKM+ERoY2znCJ4bZyY8mh0f4h
ULJoZN4LSj6NxiWhPBcaaeMMI2zUgZpoDFr/ysu2wnNptBBQioCUolGxg1Se
RrOSUJ4LjbRxhnMPbLINjHH1KbGgHUEpBlKKRsXGd2ka5crN50gjbZzhe9qZ
Vhyuy6cR7W8rAaRULOgRZZ35ldkMhjbOcMbzArkh79SMUjRyHgIli0bFQdXy
NPrabAZtnOH7qM9FeARi4YzS6yiEkg+kFI2Kg6rlafS12QzaOMPkdQFtdDNK
0WhVRBsdlCwaFQfsytNoWhLKc6GRNs5wHtiHlefebYvHkmczPARKVkz1Ee26
1tdmMxTHGZRDanNnlOvD5gEpFQt6RLuu87XRSBtnOHOX9VLB71wa/evBdwJx
isGbNcD0/J3HFdRLJSReQCOj3qx36gba3/WmYdQ7DX5Gbu5YtDQaobWAHwzy
kgzWM1mzy5pj1jDposGeJY1MbZyBaFQm+P1QGmVDSf3M09HzLLzcn9Jpi/7T
KW2y50lpbbSCKF0mXfhQSo+jJCJ7GI3SFv2n06jJnieNtNGKiYf7XWiXqefi
JqzsseRZhwQlBFJlq4yUbi6NGvV+3Wy2gC59s9FoNhp1A/+vm0lbpJBGQ8xt
9E1mdlgPPjTZzERrvkP0MvppKM+FRlpPWESUPjELxSNK96wjy4ooPaIFn5st
eY400nrCZcJAqRmlaFSuQImVolGu1Z2Gku9lfWWZQlPrCV/aG3t3jdtHC2qD
8jMcEkpRgVEJGpmPmCk0vrIKMFPrCU+oHSomJV5FR4IJJRVbY/n6aLsqtyDL
VIA9YkSp+ZVVF5laT/iABXarUmPJodGhFAhWQKMsmyEl/D7NZpBFyc+RRlpP
+K0bdhhd5SqnfBopUHIX1H2rxvXZjk+pGje1UJ4JjZpaTzhGozzDrDSNcq27
+9JIX8FVYh1l0qjHGo00lC9PI92eKDxTghruqVuilF1I5fZAaU65YB++EYdb
3HMLlAbW89oLFR6bIB4r3BsFLonzsH1Rl7GR4rF54Tkb4/mF7pgXdHI1563J
M0fwNL+PBfutjN/3W32aJJT7rUJOfsiKf8T9Vtqo1Vwc5YMnrZaO0Gv2iRAU
AJILo4QFaoI0LjRBy1mgBkjiz5Evi6DERcIgxG4ZvDz5jiCk8Fvqq3OPGaUo
/c6+KwWkHKUL027lKf05qqkiKKFqlJT+sTxenn5fkVjTww0Ic976TW8Ul1nT
AKTAuSxF6cLkXWlKf5aarOI1XQYvT747aWQFzpI6t1H3qX1mpDO/QhKhlABS
jtKFNfvlKf05dmLmUHpUHi9PvsdpfPGSTeRJh2hLnHv6IeXvQ7t4qQLJglGO
0s3CkGt5Sn9e6Z2i9Lg8Xp58p5Rqt597G2eJ/e+KZpSmdAQlF0g5SheWa5am
dG4M+HNQujxenny/1fCwv/aonWKB9Z1LaUtCKbIyS1H68Swy8wtL72F5vDz5
ri1yATE4UWSE51IapljOzCxF6cezyFIZ6ywoT0TpaYSX+Z27t95nQ3nyvV/R
mj5T2gYPl8tkoLLcmkYgmoe1UDKrQNrwX1dbjKWBoqV0T6kCadOfrponSEN5
6jUd4UVP8c+wg0x2L1N7GjpbO9hb2x176US7knMp/SC85Nb7GIYBy9vEfGs+
lKx4drzeZ9JhXUo44K9mGspTeVmEXfWcRYlbFbXskSmtr0iR/nSUrVWafWXN
KMufDoFkwCgnvYs3RpePnHyOaodif7oMXp68rgVP1AUboTBwkk9ph6AUBwjK
+dOFfQrKe1l5ZvxnoPRZebw8eXUMDeG+MQ9tBVMZIOUsssLymPKU/sJx79fl
8fLkNTbk5mGBDR3IWZJGmnpChFIMpBylC7fWlbe9v3A09Lw8Xp68UkdQupjx
SlD6njHVTEoXlo6Wp/TnqHgrpHQpvDx5vc/Mt4Nr7NCKYdGyM0pRei2gFAEp
RenibX7lKf2FpfesPF6evGrozL12Fg6dSy2Wd4kZafZFE5RhEZBSlC4ukSxN
6c9SIZlnkZXHy2NSOrcSoSBuUs7LKoqb3DdykqVlHxw5GWVBeVovqyhu8tiU
1lYinJ2zC5ufHZbfqSB/Ta9qO7vm7LAKcLTxlu/KaPtCSmdGRR9M6W4WlKda
0+eFGJFQHpPS2kqE4fzxKG0d9p7rbb0DsG5wttLBuxelM/3qB1O6lwXlqaKh
cwVV+VAek9L6/iXqmr7JCTTcc03X9LDuRWkzi9QPpbQxzoLy21rT2hhZbE1/
IqWTa1pD7ftROiuW+WBKT7Kg/LbWtDZGNnK8rb33nWXMJiuYUQalFxIWgirG
SzGly2D3XtLbzILyRJS+B5THpLQ+Rubb6gktmHzBwvr00WFfLJel8bk+MZfV
SkP5bVFa39dlPD9nrz02piM9S85Iu6bfOe9r3jLY1VxvmQnsHmu61cOPhVCy
dkql1nSzIX7VQfltUVobI5MdrOIpauoBQlPXzihDev91qXkuGy+F0jsz/v1g
6d3MgvKbonRLX4nw4tXZqykbW7vw3O3iGaUjJ1tnaxfDKKR0+swc7aIus6az
dtbNtFB+W5TWxsguX87ZzLZw9+Mn+9P7TbDmoEpBKbbIssKiD7a9P7c/fQ8o
j0dps62v9762NniWtc3OrSC49fys7eP5VcASSgGQe69pfZjsU9Z0VwslRWnc
71jqALP8KuDyeHm6Pbd8X2xsx62y6RW3UsYm+5DDcsMSZ2U77vj8U07ITUF8
Xptyv97zc/+775JNMVmJM5fCNfrUpxIO3btyg8qv6i1Ms2mgZO/JqBfUCxVK
41a0J6ORCeux9O6Tn0oo2uYAPzkrzvcnkz+eFswoo7db7YZDsbObthTQyGzW
jRa1c8suu2YlaNRhnS7rGXiiAw9SNTTgniONtJm/WFdZlVJvEpTKpZHaVTaX
UuVpVLYysiSNCiqvnwuNtDm7M3fl3DirA6gDlUJnqbVUUHEhoRSspfI0Kruf
qCSNNOCeI4202bZwP5FKoalG2uXvJ7qpXR2clb3B81HyZ1SORvkbQgtp1I7T
qPis3edCI21MXSbJ2PmPZ+zkAv7WKSNWtI5WteVOZERrVpDdhe8+vrp2a0gK
SnlfffpE2ZMn35eno9GJUv1/Go3lvjTSJa7vR6MsefdgGj1JjPTJ91ld2FsP
A9dnr3j7bHSP0cG88BJHb6kzSv2o7oXY5ZE1o3xK+8EO31xbOvl4KZaYHW4d
5pjxhZTuColpmJF1mDLlnyOltRb841Dafns2zjvKRAslj9L2wVlmn9l7H0pn
68eHUToJ7zlSWusHPCalX1nuYW1RR8BPXdP2Ie8wkftQOtufeBilk/CeI6W1
3sTjUHr+qjY5/5bSH0UzKkfp1Q7zH2WgFFE62yt5GKWT8J4jpbU+yaNSGjd6
I/WWD645UiiNu+kz8VKe0tll/w+jdBLec6S0Njf1qJQGCGsHnhthxACA6GZU
mtK7RQ5eylM6u5/Fwyidd6LDc6G0tgLw8Sg9LyG8y1M6eCzpnb3/5mGUTsJ7
jpTOiFY8HqWLhfd9KP1I0ju73c3DKJ2E97worcs3L3exXLMuq1syxRwmgcNT
EmMZ5vN/um+GOQ/g7wnm3xPMnyLynluCWRv6iAZHvR198GedpVKtqRUzOsH5
1z2sc+BT+Ct3RqUDkTn5y4cFIpMpzOclOHOSl7AgfPbaI8IUjKWQRgeX4FSZ
+FAApZBGj7wdIpnCfF400im33V9jyk2jUErqNs32Y0W1nQ3vq9py4P2u2R5H
s/2GlFTh5ve8xfXUSor2jpQbS74AtFa0c6Qa20eSC6XE3pESYyktAPnekQwo
X14A5iip8VCkt4oYpwSNlpYABeaEpYd6Pxo9atYZafSMlVROhQ22MkTTbrvT
B7y0M8qg0R5gSVBVpv6mhVJMo0fNOiONnnvWOaPf+hB0A53Y4+Uf51tqHRWC
uh+NsuKTD6ZROwvKM6FRRmUAVm28slxnbQfZR/myUjTyQQ8VgLqnPspI6z+Y
RsMsKCkaXczwIL9eYYPnz5HTF11y3/DePrljKaRRQLByQd2TRhlGw4NpVL6r
zxeikT5Hi+sIHdt1QUik5DoqAHVPGmUopAfTqHxHB6RRz+gVHn7wpI6tY8Uc
27SDcL/T+WJN6GOu7fTHtw86oy8D4u/O7X/PsO0jLIXU4XllTk5IL8lPdocL
twSVGFzRhiAJIu9gh1Lbgbr524HKbwZqZ24GKhSWbbNX1MP4MURlbpAC08xz
XBY+naKQlYcsUmXvdjVaXP7wgenHuCJrZsUnHhafbcbCE8+NLtrABNJlvHEw
l5GXHy5BlyVBeSy6ZGj3B9PF1MN4DnTRGn9j0MNhw5+8cRTTBSDlAroXXR7T
7EO6NPUwngNd9Ft8tpazQRW9B2+H9vfwNh+nyXEU0sVGSOcRoFycFtIlowru
wXRp6WE8B7pot4yUDN6VoEs6dBfEwd6LLhk9Dh9Ml54exkMDQo9JF227I0pO
PIocQ0iPJ8cyOhI+mC59PYxnsF70QbofbX9h+16AW6xen12qNkAWPjLajYEv
UvvxfJyt/UvSxcyWYiXo0o3TxUwKMVaCLq12u6hb/GPSRWsnJ+ny40S7aaY0
XX5cZe6RuQddMitvH0aXdiaM50AXrZ08n/8g10j+OEr4L0vw7efX9majB3g/
O7l4O+595JjaFKw4UGoUBkofky76Q7WBLsKvzB/HfeiiB3g/uugdmAfTpaOH
8Rzooj8C++CuNmCRIVLx2MXMcRTSZUGQcgDdz395YCvLDLqY9/Ff+ka36IyK
x6SLPoH6apyoaoyOxszAR5ZfuV2OY8mvPJwWr5cHti7LWi8jPYyMhI+uM0hi
HI9HF/3x0kCXCzUKrCVLSbpcPCJd9A7Mg+ky1sN4DnTRbsBAugz95TWeOZij
Z8rRRQLKmst96KJ3YB5Ml4kexnOgi9bfR7pgeP9727VzVkwpuvz4/eOtl4wz
2R+sXxp6GHr90vpMfqW2beK7Q7pnYjwJWTIhykm6IZrHUqHfv/54v0SoHtJn
SoGqL/+aM52/oTLeOD/c5+dRy3hrWk+G8Evnn946+2thQE/PJpqx5MgBkGme
K2xm3cNaKKmfk7hYw5IcfZekXCiZcq2XU5KT6vprw5SAPw7USoKtfW8rjemE
6/uoJTk1bRQgQaP5dr97eznrvbKczcJ7HxtLIY2yHy6H3RSN+iUaWaV+8mjU
z4KSohFJpjI/j0sjbQQtQaNry1/dgmh55a0OG1s94rgEjbIfLofdFI1aj02j
VhaUFI1+Zn/3nFWVLe7wDO9f9OPgUB6zjFcbfY5oVPDzWEWvzw8vWt7118ue
aZZAzGfAy5dZ0/oqhdXreRlu+S3jRRtlWzm+vcT69fscaf9EeClHIPbYeNFG
Uw6ug/WYso9g5Pl9Abx8IX7RRjMcOrCuxPa1z4AXLm9LQXnyhpPcBwGXbJVn
MrPPghfURiWhPF1585Ubc+ZjjlNJNx5z9fwck+HmCuMy19uYNx84V9bm6r61
zTqoj+HQh29z3OXmsALOXICRwoLwdVY0CXSTXbAOoy/B+/XWNfiz87DyG7u0
KA98ctV0NNrfUAX1byiuwFlLy/DFa/ix4go1s53ShRfz4Xw+rJ3/OJ4btRvj
L23ht/4wrKXzxpmx0uDaMmr4YM0PrIjrq4WyLfaDUH4CIDAmWJL+3Q7pq4eR
D6WWBlMCSixymzo6p2xzsWglArDXb1++zHwqD0osAsw3v+QdwxO6fI1s/TPx
3OM9OwSlTLBH1Kg1zUFJ0/FkPszjtCy8xLjOXq6A24jtAEo+kBKUbjRabTy8
siyUGKWHi6Co8kMPJUXpvqyKkZQeT1lzIg7CzIKip3Qdr+/QmgPtFukikqQR
lCf15ROUNnPrdEpSOh9IeUpn1pAnoTwRpYcybpOmdMl69GLyxsbypNGJBKWb
vbxKhpKUzgdyH0rnnEHxxSldpkLkC1I6FW9JULptlD2EJYfS+UDuQ+kcjvni
lC5TM/8FKZ3KOsUp/ePUyCj2SM0oRmlnVVOIDfbZOzsbUA6l1UB5JyuPnoby
1JROR9075bLyX5DSqVhhktK5OvY+lM4GVJ7SZQ8Q+iKULrOf78tROl2rPF2B
QW5k7G7Iw0uS0gJQlX8G9smEm0tpo4HHxRfv1f8clG4TgZtI6U6bdcsd8PFc
Wq2kpfeq1cqR19kzSlMaAEV0zoFagtJ5i1kD5fNQutwBH8+F0inpLV0rkt8/
vBqO89yk7CiOhdL7+tzboeiGx2vXW2spPudByZXeZlmP70tIb2OohxKj9Hle
7LaKJ+bZ70GyE/Kz41I/TmYU5gTqVFlg27xQst9u19mF/deDEzsZPBOKby+d
He0J2R0WG2fJgr21h38mzhqoWPvB3my2lsve2Xf1x+a6VBRHunkxrsty2Upy
HTwecp0GVHmuy9vf8MW5rkzt+e9ch29O18JLlzPGdVnuY0mug8dDrtOAKs91
eer2i3Ndmcr637kO32ymbKmcPElaOeblSeDuksmJ++Qmshqi5XDd4+UmRkW5
iVFRbuJeP49L6ZQtlUPptELKozTc/RSULtUx/EtRevyMKZ2yX3IonVYCeZSG
u5+C0pme0nOg9OQZUzozyz2fl0hFZVLaD6wA7IZdEJAvrAAtgFJI6cxAQyal
xQyq7NX3s5oRmxVoXGuzf2m7V3DtO9Y0cyndMoooPcTbmq1sPT0EfpnFstSd
hoAFz4N7zUPf/ACJTCicnYYG2ikAyxjmjSsbioH2z+OMxTJFIg5uNb+qWJCZ
qu3TrYDM7NpXswJgBqkVQNdiKwBo/3xWgPmMVkDxWJQV0Py6VkCqilO3AjKz
jl/NCoAZpFYAXYutgE7rGa2A5jNaAcVjUVZA6+taAaluW5oVkJ3SzcsHRIBq
BWnh8jm+vH3JXzxyMtVDeSaUbqaqrrSUvnc+QEPpx8jm5hXYfXFKz/RQngml
W6ls7g9A4hfs5avCI1qTM0pS2tpc1a6DoLbZBrVrK7gOnKuqvL7dh9dYLqUT
Wg3+72DeTxeL/wyU5tJ/lKHV+tj3DhtbGM+S0qkI5J9e6Y2MQrwkKP0XoOhf
3m/LHFCVSelGvVUHOptd/LstohVZfaw/A6VltAK1eoN1Z/g3mCNRqKKhgfJc
KJ2KQCKl/+XV5f3xkkXpbSGS70Xp1rOl9PR5UzqdQX0l8ljzV8VlEdkRyK0p
Cq6294OSkt5Gu4NVGv0u6utGjqL+zJWU5BCMZ9jpHkbVa7JumS6EX6TqSrdX
jm9kC2Ib5rTb1Eqe4syzYdg2R79xbvfuAfvmtFC/8GEgv29ry9rW9rw2tuk5
smjxP+a5lzoXqKQUYjmi1Q+swj1kWiiF4Z5SUJ4oubOSYRUrMozXXbpuKPvJ
cpI7qmg90LlenAWQAzRjeeKNJyr/nfxkI+lgGf3nf5xy5RrYyx04rr6RRExi
P0I4hSovZM6dUhGpaT9CzhncSSgxUrvwcTU++Dc2+04Z/kkcOnhW9e5pLqmN
ZsZuMgpoqVsVMuNg0TN0eEkjt3Fsdl2JB8IUBFUptsmOMm4Cj71zvVuXgVY7
59kuyw0cjqAqSE1niyXnN8Zjs51mF0wJtmv2Wl8z2/HhU48io2mCC9CM2hPl
sl2jiO3aGH/p5QVxycDPaJKcN6PPwHaUYiK2C+mrQnniLTkl2K5tGl8z2/Hh
q2zX/sxsV6JInX12tgO0CLYL6atCedIeKH/imztOXoGpeeVtbf8uo09ZckbJ
OOOfSu8+KbGXoKiZKcvhuqfaS9CZ6kGwHH6518/jUjqVJfoTbu8oR+cCSpfe
fVKC0gW7+5NQPg+lZ3oQ7FlSOn3Ki9wJdnJ5i72NVnDh1vJXgZbieZT+fScY
h/JcKJ12kWgn2EkeffUz+n0nmB7Kc6F0qtLx93xgCOU3lQ9Mnz3wez4whPKb
ygemTzP4PR8YQvlN5QPTe08KnftMxMR+Fr7luDvP25yHYc+8KX1tIYKi6WXi
hSIKTVRBTRwVcW83yxrKDTS0igINfbQnzJyCSd74Bx/oSW7Njqw+VqDhSbfT
PDrzaoJreYj52phXP717MW/WoQtfgHlHLOvnOTJvym5+dOZtG+ZvmXn107sf
8zafDfNmt3R+jsybcgUeiXlnF+cidVbi5+tj3qLp5TGvWTfbMJi6afLghYmF
UoVxshTztouYdyjKnTLH0h1SBZTB2jMMV/RMMngz5vQcmTfl3TwS8wZbc1ea
e78+5i2aXj7zqnV9zUaW0VDAvCVLCXKYN1bEZzIzt5P+82JeXVkfldnFq/r0
RXRFZX3fsPnB2VsLZ4NnE3prtnLWVNkWdr54BwCV/vJrz6dOzrg+HJedeZcs
AICW73hBpYKlYfrnwsKwDx94jeBHFuzspbO+w9LAw3Zh+/j66Ikqc709Vavd
XjvLa6qaC2isG1uMwroS5ygtPRfXreMCSVb2jbO0gzqVYfmy5cfG8uFmGBPv
kM9/jUozA+dvcBMSFl6zYnuP2ZuNs8OWH0taBlSI5V351u4aJMV0PD6tinHB
VZvK6WgkvjjVo2av186SOog4293GRh6i6jqqlKP1lXhFoGa+qjIhQqNVBJO4
F96+td7ZWHK3jbCyhJudlYVHVyCCkDYKMQhfVBcJ5BOvRKT6NnIz8sSKLe5A
9ATM+K9/+3fDoHebLfgMohNoHVKuzgtC38yn7AfbwiLNSHqoxaBLL7BlLagT
EDFsyvYAfq0AsU81g/Bq3+Gljx8+OJZr1a4JKrAI3Ih3HOnfdRRxVVQryutD
39C6pFJXLBrFmSjVdCcI7/QorCkl0gE/B2zlLQ9IK0x7+7LGk8/3lb1yLHZ5
t7OZtdttxBHFL3CStSWswNoS6yRh1vLzx8pP1zafYs4DWwK7R7Dwflhaqyo9
AnS0qJ6UEP0XWuPhUXN1dsbrLXcSGeyI6HuEjwT2HjF3tLyGJXFU5TMLEPsw
GWykg0NB6rNleNoysATeXVdKd6ODR+hVa2+z8W4RXcqQP3y4mI07vWbv48cB
LH+85JKKVWZcqcwPi330VRwBlYroy7OKJgPS9vWLYaXyhshlbWLf0DwrlT+w
seWyBeCWR/Rgwjvfu3FW8BqPrQ8+LUrHxbN2eF2rtfAO+7C6ls7/3NoW8Yeo
XvX8FT1DvxAfhViDOxRkBfXo/XFs40eJYQBj8ReqYDhh9zYIRSAL3L4Q5b6w
DKlSOoswVPOMo0VxB/Pk5bqAkYUD8vcO0CzPIU/eMLdJVEQnno9jN2DlC2EI
Rvfzz7F18MsvyBE4Om8Htws9kYRPxCIFFFyjViTBLqg/SIOsVIYRdwQcS6hT
6LaIuQYsfZsNwtS747IHFzU+RksjhTWEAGOf+dYVLWgnOmdJO/zhauUIblOY
ZoCMNkEJueRl7BsH3uTSGZ0oY2nIfLAE5Q/slXUFApdrtJPgdMAuR5MefjFz
QETbePIstrair+q4CvhDS2ABL7hma7yLFgsWuNNdHLvA+0Ch/wswYDkbZomj
koB9sATbAlmHw9Gw/YCBbL36B8fer+uef8WpScxPC2kAuHz16s1rXIZYj74U
SsqVX3Pk0PHFA473n76vVMbXlntl07t9kAs2fHc2ncMXpSTl7t0yMBpSVvLf
CqWleKiEvIS7o2Pk7QuudhTh+VllHB/2vaUcffP7ik+veFrtCnmZoO9nX+v6
pd7PW+m/pYVeap37zg2annKh81+LV7p4rNxSP4e7gV7o+HypJc7H+1BL5vdV
/uz1un6tG+bvi11ZBeCKyoVub4sXOdxecoFPX32xlW1vf1/V/91WdfO/0aoe
e8Nz5C/cxFmb0TgSIRz+FR9iZjBnxVdgxA0BO8qOeRxVs77lxnLO91zTiu2t
mYLlKAocaeanDRuFl65877DDB6OQ4sV0frk+bNjUvXF8z6V4MDsZexfT+J7j
2H5XZlnBzVWlMPb7bfqj7hlMYigiWBu2ZqHM+ZXxs2J/jTYqq3Hpwq2t6Y+6
Z3BMOZEtPoBaNDxcXZj+TokYirjnen0aSN37QhJWZRwSLvjGfSGB6krPDiEZ
GZAejwt02QC+OGsYuZUZgTTbA0cEYiv/5ct5zIO6pAWrrPr9JviIwXw1ICqV
bZDQtRi9vZMxsyMtaH2c9tK33GDnAaO8tO7gYqjuTgDIKZtK4RuEcVq+qR+b
ASRVB4a+MY6GJgSP5lqRgsAxxeJpIn+DOpTMg16v2//4sc5VE87ZXtO6F5MK
YIGzW+uOtFbA951X2eJAahAVWZQz4S0eUDg5ID5g1KikJ9OLmh3rV6CMpsq8
nQWilK79BQ2f/9uo181/MVs14//h+sLBngGakOTfE4EOdgJIOLi3PnCtvUqG
QU4xggg48fzjgL329qAuEJuIHHX3P5gX195hs0JsrpxgeaA8F84IoPreDU8S
7MWTP33PgLMstrEwBB3sZYZBfrl1rq7BDKgD6W4tjKrD6NFWgsGufGu9lyjm
t9dLNwz4Nue3lNiUDQNSh8CjdFxSfg9JE+b6dAnBHDH4bc5v6YYBICWwfC0V
xVDzlf+czF6WTiveAy8qpskSQN66tK7iggB+v5ckcKIWFkchxIw8jecuHTAI
R2QPy4zNhcxGWSJTA0BOBRQpBrRs8ilJVl4iAC9hn9JWImKTT2krQWxyORmh
opygH3S2t7cDJQlU7ifMYf8KgnULa89Zgu08dHmOA9idsgoonsYJiRTooYSG
BMoNlR3KjOVxaBRjWbjCFtbyHTAv6AoLk6ypVRUAC4PYGnK1J+/CEyG6fbON
+SI04aVUVh4EUSluBgSRjsAHPn5MPqKqFZBrofZ5s7Pd+fxlglOVFwwqiBik
L/+EP3+EJUVOQJOdNN6bp+EXc9vHXiuvyU0ZMMPsmZ0+3mOs242Vcl+6sY/m
ANvw9rMgOCC88evvECV7DJKPh9FwwHsCfXEXXsAfUBxsZIPBAWzwj6BumMEa
jQH9YWbDbLLvX12mHhiuUTtoH+jEHpjzcgoaUsOomc1aq12bzWqzaa3TrfX6
teEoea+6Us/AkxrE3q5bxoNEdU3sgeihGnw1YCfYdnLh7E9Td+0Oi0HqIv40
WoOFMTCNQccaLPqDjj1oLwZN+NMctBqDdXuwWA3WjYFpDzp9PYTmemB0EELT
GgC0tjlo24NVa9CCzw0E3jAG/eXABDirDAi9AfyxFgNrOWjZA6M1WPUGneWg
0R/0mgN7hQD79sBeD8yWHkKrN1h2Br3OwFgOlq1BozNotwZdY9DtDuzOoGEO
Oo1BszFYNQZtQw9h3R10+wPTGixNeDx1y3D+2uC1S1HnjNRNr8/ml2z89uKP
0wHvuRHe8SdYfjfNyEUP4oMQXyPh35JvnAI9ca6cPayqcNHQHfdcQoCBFmED
iAU8DTRqwmQXA2M16PQGrf7AbiLO4dv+CtHVaA66yliM5qAHfNIZrE2kbM8c
tLqD1WqwsgZ2F+kF0ta2Bu32oNEeNJcDA+5RHu83lFe3kRDrzmDVQfYAeq0N
ZIBFa9BrDZbrwQL4Dd7SiR5fAjV7A7uFTALMCUwC7zL69Mce9BZI4u5qYLUH
lo0MDKMyOnEhjKYemLfMlo6nSKRbC+/GjklH0BhNA5bSHSXPY1CaDSomNIBr
sdqrZ4ABzqxG1P2YNwznTWDWbWwWhPtvLFn5ha2EKq0evI41V9EZ1lg41oGX
YuEufjbFbkssAuP3LFljwdoma3Ww6aXZqHRbtBGzyeCD2cCLLeo+bti4Cw7f
C2Cb1JDaUP6O/am0LeXmTv7NDG5uUq+RJjX65++C1ZIYJwDkEEw5BvwA82rj
Bxx/R36gK/jebgU/AEr79JWBLVzxjf14SZ1sxCSwp5bUJRArm/DAhxYv/myx
hYHHkHYstuizjs3aC9Zc4PBaDaTUYsXWMDu7AuqquUZywM1NCx8EtLfBCWhh
E8p2A+EA8P4Sh7rmw+4BFzFryVo2UnDVq3SWWGLdg0W/wmf7NrPXWG6NI+zg
LIwlW1KRdruFu2m7XWZ3cEYdQuwK5m5U1l3Q/Ti1JfGDBZNai85U+PciYhJj
hV8hCSRHwdx7ROI477E07yGK+ogibHFOYzBR7+F8gXzwFmNV6fTwHrtJdeMw
dz4A4D0bqQOroNNhaxORA6uj1WWrFVtZzO4ywAO8zrZgkJVGmzWXuH20Bwhp
KC9qw2TZusNWHUHQtYH4XLRYr8WWa3TvOgC8A1Kg0u0xu4WoBsIBqgGy0ac/
NustEHtd8P7azLKRuDCGpBT45ptsEyyMSXFhQT5BKC1Oki7sqRQg5HOnbSyH
3NNb9PXB6UBPgwCuHOvK9QKspeOxkISEecEtVnLrKauAD82lH32C1k+v2zJP
By8qIB2NqkabvWA33DwjXzgVf3gBz10fN8ggO67GngvIeuPGG913pFhbR9Xw
PofMMbrD6HTNdtMwG42qCsn19tz24jd14S5QRumbuL0lh9QwzGar3en2+sMR
De2FLFutsunbs1qnxcHpZ52scA3VooRvjgzT6AxH/c60PWqOms1WY9YeTWYN
c9rpN2dGxzSaw0arbbank1ar1W6Q/hlhTfDYnMwmzV6zhwPLGQKwihqN15sb
9ON6bm0JwwPKbLDokXR/9u0rbgNESh/n1MgahbgpiYFJq2k2Rsak02v1p81G
3zT6k2aj0exOjWbP6HRmZrvRM1vdyWQynHY74/GUBjQdttuNdnNsNHrTfmPS
bhuzzqQD5OrMjOFo1Oq1xrPRtAMEHhvd3rQ1HNNjzabRmg6NPvw37Y06je5k
2B5Om6PJ0OgcV9LaGStb5aJKLL5YNOkU15YBuoJraAri7JLlzko1KaUAosJR
C5dXAKhf8LjZhw/AOHA73Er79uVbqXhUHWTDqLRIscxA3U0qnZGqkJlOIVeM
Ies02ajBxridmn7to8AeocStgKTkW2vAGQFl2AGZ3WfgN8CL2j2SjiZwH2mt
IT7SmbL2iDVHQmvBMEYTNgOtNUWwzZnUWkOutSrtKZtIrTXiWmuM9eSzidBa
/F0wEngdAJxwkT9ixoRxkT8NRf5EivxpJPJnisifTCqTIZuCyB9jyft0SEYB
iPwxifwpivwJSfpZh02kpJ8ZMAY2Ikk/nrHRtMIl/RhUYo9NW2w4FpIeAApJ
P2W9EUn6CRu22XCKCIFX50j6AXtt7Z0be3NHRrOdrszhDLj0fOCSnecS07ny
mUB5Jibhs0Q6chzPCsLaroI0WNo7nkhbxnUIhpyrMYs0zscUVsKTIbN59JS3
bg2XPEUQP0mnNKoxBZHSAnGhH5fuWjlO4vIJJHA01s5s3G80GwY81x82e+NG
r9EYNieNkdnv9MdDEHPd7rQ3nXSm42ar1e+0JgS3NTXGnVGzO+7NRu2WYXZb
4+Zo1DNG5qzdbHSb4/YM3gxCa2wO+2av12nTY73mqDM0O93+qDPt9MyJCb/0
WzBieN/xo4m1hOxp/MZlT2fGxn1huKPBDYMBMTOm7YcN/DwBOCbrdxDO0ERJ
AEbzFIQEyKppZdzEd8G3rQmQFffQAIqaXTbusdkIjWzwqQA5cNuIWtsBKJgC
iDRA2riNcggGg+JkjNtz+ibr9WjnGNzfwdcBfvojRALIRZgF3GPCSGB2Uz6w
tOwhcYFrPn0Qq9h9sr/FOnD7xvEOAQgJElUgODabA2U4eGUFBv09N9oVkTIE
6myYFk34XkvqwPQA2C3lTWTi59q6sZU3wKfhlW/TRhAms0HWEqQjce3eA3EE
Fo4ihNgJBdKBf5dWQMyeNIQiOIHsOY0co6SeDBq0mF0kz04pe0VdoG8xBB/K
VRS/woKmHBEv45iLgpM2nqFSN3lMdH5eA4FQa3eGMFQLcwAoBWnXTzhP/G1n
Ob6ocqfsHHyknR8qZkUxQVBPaBilyuNH3LrDazjsyNlQQr2Vyoh8AuqujTX+
3JwOhyB7cQuDFqNOWDZIN6A34V4JOkTxC8E+8cJ/bhlFD/NNNDFK8NILChv3
G20TU4t8101yTGrWUuIFW4GDx7DmSTbdEHKnIiiR+axCCWQv1D83AMPzOXZ5
Z/Cd7+29pbcJ2MZ5B+ie/PBmnJCdfCoat2BQMXCDVNnGyKeVJCiAgEptOG2N
J6MGWMVGazKdjbug5MxeezYZd2ftcWdiTFrmuN/utLqzRscYDRugnyYzUI89
+B8Ux3EIOKoPRciTcQfUU8togy6ddFr9ltkftZum2ZzMuvDvCC5MOqPGtNED
+M3GaDxsjRvD8awPT3RHKWWk/iJ9pcQLu0bPMIxZc9YfTfrGqG/OZp1etztr
9jqjyWg2ng67ANvs9GaT7swErdmZTo3upN8HO78zaR2nUnWS/c+mU7DbGmbd
GF7kJjOGbsgMuMfOzX1SXZgnlJS32YQ21SkbVqt46WxC6lVsuyGGGu52Nlh6
79lYyglcBEarJxZBvje/3BxIGq7sveVswqby15aPu+HsV97qsLEpjUtON3xN
/EpX4OUC/8PNnnf150ZeXKoCGz9FTqZvGGYb+K7bNoxeq9UxQAvCA1272+kY
q+6i3bJbnab56bma797Oq2x++d14WGVvvgs5wV3Cr2+/i7ALg65iGkUS+b6J
HYybGgOzP0ATBCzF3MTOxF5ScLI5aPfhD+vDT0ZiRx3/y+9e0izsxCzOvMsX
atTku5/2aPt+FamfZQ9D7qaB4XdjOTDbGGDv2pjKWbYxgQJIWqwxd6OF0F8P
VktMHLTWGNvvLQbLJgb2l8tBrzFYNgaYG2pjimHdzhjDcrBeD/rtQW816LYH
LUo99IyB1RlY5qDVHqzWgzXlF/oNPYSFjY8v1/j4mrIb6z6+1OwMjN5g3cPk
FIBamJgU0EJodzD9ZLcHOJ3+l0n9jKwAyB+W8e2D9FDHw8Fs+HI+1T0ueYyY
KxR7aRj9DqZJGpNBr4t4Gc0G3dlg0hhMu5i3gw/D8aALSOxi5mw4wWRPe4I4
HTZ0r+XFm1gFVfTiTm8wMQYdSvvM+vg3vHvcG5jDQas5MCY4pv5s0OgNRuOB
ORmYjUF7NIA13dG+OMqUMRlAK06ZVemxqbt0diCG0eTLQyXIZdvnAQDehyH1
glCa69kKhX7NWQ0SB/v16i2wlVc1z62lNUV69eIP1WllxxGvby+pSFi+pwX/
d4xuu2406mlOjZ6aS6E1YJiDMzHf12jdN7EY3frH+DAT2UaQBqseZuuAB1eU
QOyuMKcMIqIJMqSH6TxLkRI2rOvWoG9gAhqkwWqBcFqNQb8PixRFhNHFnC+m
qmGlNwddkGaKmOopr7a6+G2/hwu8tcSkp2EN2kvKY64wxWxag9YKs4rh4x0L
edGCEXZRBAE7goSEMXdIWoJg6cEN1mBlDzrwIAAH8VIy25iwKdrgw5K7P9Dm
GU1sHRHmHKcmHSCbSDX2MCTX7bCOwSZdNmqj+9vqsKZZSZ4PpbajUDKP7Qkq
xMaIAnz9eOaxUzHoNvi13cy+DXz0Md4mspDJPGZF3Dak20YYb+j2cMCdCTYN
7ozR1ca4BYUZOvQio6M0MmpS/qhFjQzH2IgI7sGAB/n0nT7GIvHvJsIUV2YI
CuFQDtQw4iNpEpyhSOM2TQxjwM0tij2o6VT4bFDzU0yJ9nlms9KkEYo/Jl03
MI/ZHmJfSjzht6/8MWQqNvzQhusV+hsfQRKMc0jAsklQySGBHlpX3jYOKVXR
ZJwlpTolKNUYU55xGIfAKUW5RaBFu0V3qmcfh3e2RYa33cWkdoSlli4FXHRA
S6tXSZzDoqaAxz2MNZsGxnuMMXbnm7Zw+TQxhIJ5WBOU8YyZk0p/xiZjHHxr
hm/pjTB01DbYeIx51XGDIl5tnCYG5MZsNmP9NutN8My1FoXLe0ZlSKEj4PbJ
jM0oON5vsNEU7xzP8M4Z5VtnfQRldpB5Zj3kfHhqZGKwDcQssOi0zXA8PCRm
sN5Q1B70ukkSGxPCVUssbZ7VNSYV9Qbs99nCt+DfFDPrEFEAGlyE6XdnGNOC
0cJagA/DMYqXBlCny4YTXGttwvyQA5/F3m7S242eKGno0RLu9NiEjpRuGxWY
LKAR3jImkgG74pAmOEEg4ohihMBg7RGuWZ4NxwGr459VeOQScB5LebfFkMxh
HCEG3mOSHADSD8WYK/rTbXt487ARlxt95c4W/g1cBNRpDCviSksKZJp+GcGr
pN0ratodWGvSw+gm0GVC+ZXuRERYm2OEMx1i2gN84j7QzsAoLLDZZFQx6eht
cGaAT/AowC4bdyheSwIEY58THEn4omEXL/Z7iHmQBrDojGEFBBEmdSYY+ETq
THAldv7/7q6tN44jO7/3r2joRUBAyXW/BMhDd1f3bhIHMSznyfBDT19WjGnS
EKU1doH893zf6RnODDmiaDtGgIUJeS7VVafO/VY1DTdC0kdyMqgD8QFgQUQJ
tAZDYr+lp5ZA7JPZTHJuDv/B6u6sPbx/HXtGzCW23vWMmFmW+B5OxBt3Vb/6
r3dSKakDXu+rJnW64m/UPQSQ24cZH57FwtvHGh8fA+JXVf0DPtbepcyEUMCb
2083N19a0eP11yerL5dWRwwrb95YvNni18N6sk9lu9Q6owetO+N7F3vbdD5i
XDuYkofSuewGZVLbWa+7LqlO2UF71Q5edcOQ/QEzNeB8Yw77e/86h6BUSVGH
dohDUX30pqimi0HFGJsSgi/KNEoKPnXkIyEVHViBzl63Q5dM46wuCmAorG+K
Ub7VOmyPYC2gAC+ws+/fYMnv3782rWLp2inNjJ1qlH59tRWtjLLKvf7hh/qk
mWCfoKl/eXsptfPVhiYlaOqwE51zKMarWFjOsp1LfdP4vs8u67Y0obRGO5Vz
yUnr2AXb2qBtdF1JoYmySZdTHlxnjW58NxhfksUei7WhUQkoiWUwitgNIIlO
qVFN6UOxLhsbfm/5ycAoXfJHod3cZx1Nyj/Uazj4KFB84eCIQHGEvcNXPeNG
QIbDi7y6CuOV1KSed910Q6eKBqwT8xxYSzoAWT0G0svr7gjwF/0elatw4twY
I3ZRVOqpB8Ni1lZNsxedj+qS81H/Suej2jsfUnozYhr9r7Drtdj16tSu40N/
Zrbrl5nt6sFsm82mWrnBbusReGpEN0ssdzW6owWttlvKt7LgH20OL1nB+mAF
q99hBevLVvBoBNn3MN4vN7A3dd+Vd0395+++++bdpZw4xfiXX355ezhsux95
v3z46/KBvS03PMuynSU7s4U/LffHm+fMheLQpRB1vf5w//GxSdVGXS5M76NT
V+98/fDajxeaYrW44HGtR81WQtDUJAT6IFNldxy/S2y4ZFAUWJZdp6e9sxf6
F9m2ODIqU7sXhU96iyji+bCRw7QU2cNUh5XeOShLFTSJ/jGiAaaDElioBMzy
qBf2JFK1MmGsvzDh6WyKepIaSRp8N9XEvlj7pK93a8mNh+DzUquuDK6sOfTy
xpNI1TwejH/DLBHaBRxWF0LQi6hO+2HHLMAxhq9OQ1AOmzkVFewiGw+CEL1H
BQQcDMAX6ynJqksk+xKGH5Os4oSLTDg9brPmhNJHwcGZ9A2XJ6+2ydlxIQP2
I1dB40sbl6sLXH0paoXqs0s9zfUMlTjzhd7V2VKOppV8AibRI/cLos+BHcZs
fl3IOdgaJMusdYLfuyOtMQm0opukoVmQ79cKu14DpXI20hUNwCCSgXjLO3Y8
Q2yh0/TK5lpotnWk0mMfs7RKz8CbIXWIYQnp15l2E1vYzWxc3pJZ63xQEXi9
oWg9a2I2ovwfRY9YkciJbPZdAIwiLdRChc+ulcRGYQgOQJozV4cUw+RlgY3z
zOd90stZ9DttjfWKzcrADFaZd2xldrZaAbYnUUCdID3ixExmTRo4MVs3/HI2
+T7UlLDc8N7h6mXsVD/DTphETbTR25+RqThYHufbVR7fcgHn8LApXPyBda0u
dYc/Ro7xe+QcU2/CCYcgudoHyfYk7bJ7EkIf1HI871DX0qEeJd8UzV4pgTmt
sCh4NckRCHgd0cmfojkA6+IP2OAepe2bW3Zs08eW9/7hwWk8xRueel4zOLhw
Mv5B656q3G2q/aLPgVp9FtQNns1x/QKoX7A7D+rrWVCrDVQ3ndNUdIgT6+zs
fi9bUgNcvSkfJbIM8QzTPrdCBt44PH2e0KLHtBxmOKVatNUDNs749kWoIJCQ
R28lf72tHkTStRyDObgT5KLwedi2K+vBJ5t1E5ViLrD0frxVeyRA+TzhwIpk
3Shr+eEL90KEq4cVqwsrGmEk91mep0E8mRyI/VVo/AxHVS/mKAlnlKD9VJAp
/pVolcepxq1Qsf+1uPEEz+LewzbFLORz279VkoMfeMsXlpOskpwiZRW/8hP1
PLYzyyGZ7QASVJMXM6FI1opteIGnSmC/nIBHh8HWOzy1EnjiUw7MTHJEB0sA
IYsst90LD8TmiTkvv3Ke/eebtlTsbrbimz3kztZEeGB3xkwDgfnhz7ipAgIB
ORbl2RUYpqmeIq0GpcxxZJzrRbQ02HJK4h/ObLyEDI6JTdAIGcAMSoImk4lh
umfCt2kUBp6kjVPRymCJRVxo6O1xx9M4MN/Tjl4BJgmsNlEJY1OwhjuJTAHw
Jrkwl8RzlFALzsBEBqBlX3gSCbM5Xzk5NMXzSyO9BSAZX2lRIPAlZrG5PO0z
0RWBaIAQOzkrhWGgHfaulmoaT/FcP+B59xTP6fEZJOwOMd2kqxxJTZh+uihy
zGwX5GRRIOax7mS5nBc+AVbppgb6SFoievo8qdKGuwCK8iwn907OIAF++Gx4
FjLCrtrI1078AQT1iERmWc4tFaRpmQSri/Bn5MmuRfQkuGLxwmORmGSn6Cyn
wuyjQKb6VQex4EFBGCdI9EoSg1igERQ12AN+GsAYIzUwKAI46dmuBA+fzGJn
EbaPMtUqehjMM4GB5dTZvFbwqY4LeX4V5GQaom+I2CrKEzRN0hALZgDydzvy
Q5BEEI+3KXrUXGhHL3Tz7oCQeeQnwCo8PU95/8MPYm2B6/9LRlhfsRHQxaHR
vdXZpL53yraNapNtbPYh2qF7fVV9X53mat8wJdvd3H2a15uRLQr/eju9lS/0
2Rf8vO67ru6aN/ZV9cMV3Mrsc2KbO14HE9l8z9eP5j+mgt8wE/xuvK2HDyPv
spjuvgzA/e312+nhy/v7m7fT3U/b8rJdm4Ptu1KSK13RbbaN7gZnTdFNNDqW
wPxm6a31vlFmSN3Q+qaknF1XnOuN2hAiad3Gd72NfdO3rYpe9dmxPbJ1zg9N
ycZplWIOengtWWlmWzvVYlwsycbSDsbZwSZvi0tBDd62Nrd9bk3DB5j9NZ/d
0FXN707zK6+wRaaOmf4Ghr7HgoZ5XuDw+1fvP378+Z+/+mr6cGPfsluZnMZ5
vjriEVgEtUistxi2Jdrr+uRJ98InuWiQrHVQKbikdAoD8MoTFq83wGTWe0zL
DZzP+s07TFBvoOeT0Rh8N93/fDb6AKQ5jplGfnn/IlA/Csr22X2trrZsP8g0
BN9lZ4aiY7TKGO2802Bcq7LzAWJiXdGQGGvboQyqM4NRqu061w86uN5umX8o
roxns9re7f+H2RP4zjXZFjOo4jqnYyhD68A5XRdtC5w5W2LplepD0yUdHfjP
pSYlZ0NIMo3Jw+Ab61RIjXGqC9krA+brAZ3xTRv7Yrq2G0IKfdfH1g85tM7q
JqsItm5eH6DxXemczWbosViLjbpW+z43BTvtg1Y2Dm0BP7tYukZHm11rPMYO
oYuq75rTvRqbHu21T1l3Osd2aFVvi1VdGzo8rQrkyXbRA8c6emtDthrigo0m
bYorJpeky9ZJ1UBxFB06FwCEdpAdH4cOHNW7Pvq+w+56kCz2Q69MGlLvQQrA
w2MuDTb3Wmb5gTpAUQe0JVjI/BAxcOhDZzKEkE3CkPWhgy4cYqu7oqLxugEF
hxhjyJ0aXNRl6Nno2fpOBazik3dDY1VrkgH9dLFtm5sQgu6LV1ZjilY3ySjT
q9L41uche6d+94mbCHfkkNj8XH722y9lZz/e3d3c/878rPtd+VkQ9Ln8LKz1
7uCgSxbvwqUF4nyMgQkXOBmJ3pvkO1yllv25830xfDz+NPAqScl9uLUT11/t
2xOmcJorPE/ePU3Lqsf5i2NKMTIyYSScqzhKhLPQ+XjS3XOeYRwlwygR0T64
shIIacbJCIGYupWo2NhLueCJjzPJsi0d9mkXPuuk1CFnrji/uNqESsKtfWAm
2ZyL+eKHWxnOsqI7LgrEfjYUPAaBnCceYasewRZPAHsUE+7TTEpwsqVZ3ZY/
qnjTgCRbt74b++QKCoK3+xJO7H7p6E8S3M9X9bYxWh5hJFzt81kCG6FSdKPN
FoaZS6nwh8sq9KFLy7JrxkoMcHbFxUPTljq8lUDxdDC/2tL6unqUoHwgEyJP
5/ZYZYieD1lsu2dOQm42lqiYYBVfOUjkFtxx48F9viCx3aUhWRizVBuZNh7b
GOCZJOAWhBvzSGaryzKr9zK71er4dj0P5iVC2L/mgT2GAYuWhGxiQhZfITpC
EMsM7I550snUbsdggzdqTCzPzIuAtxC32lZBMb5CxAvgQU3EG+PMWMjKBRgI
olYp3SEgYaAy8g+QAzMIVBDuil5iOLfS0edeEGRiXeJES9jpGJlgOexFz4zA
sQqPKidyFG/1WLaaMZxnpgN2ogODJGKYbp45G8DG3jFzluqj9VRHk1x6gdjb
z4yvEE4j2F4t08eIAMdVMsiJ0SlisHlmUgPjx4XAIIiNK5GPOQGqWxgrzpIh
QiSGCTFtlltJsLVFbgRBpMeCtFz9EgXV0HVxIjJ3llEi8D9pEiJi0VRhv4j/
QR0myoX0TmK5eYu6JZaD5g8SrfFDLVU3Sf3nRWbOFcdkSnoaJVuBJTKxYUQx
bjUkvMD8IC7iUtARKmWSGkMSOoJPmPRP3LiWMgbLrjOpYBzVCDADQgBRXlLJ
JpBeQCBCXKyV5GhlshVRlLgdLemt5LlrIBlhPPCJSYjGwE+cKHOQFawCXkqS
xEcQPo3UbHMm9sBdbt2HwcDYmqVysFL/eymH4F9IAWCe5UIXK9TXzFaQOtvf
+NDnpfdJjYfyxqKP5Y15fpo4k17afTr+SY/eSxPx1eNU+wsS8U+qAtUZGCcN
dOOmSM+B2RL3+/uBDtZhVFSPoyRDQS8zfSFxf26zHmxH9WWbZQ+DRf9He3K3
kNxXwDt7TjL1wZ5jUhJMfjpWOt2Gjd2j9He1bhpDym867pPgdj1ByLNJcKkH
VM/b7ovm74816M/k0PWhjdR8bnfVIY3OtKZV+3SwGT+LjWMafXngh+oMG+dp
9EsscXHX1emu9wmyZ2DYEuuPvanqt1LkFLbqt1Kk3igi/Fw98POjVPuTguiF
dlooB+fZX4zVmQgO4sCImTOik3dSLQ5SEIUlwle7TYi2HtjduVLaapZun1tP
5sHrqF/sdVRkoV8x/mJdtjqty1KHj9TPLNJHJjFnSaomyV/vYMgi0+UwZOSH
wEmg+aGo3XziuoQX1iGk/BAPLxydnNUc8+Mvq0PU53WI6rfUIRydn3FicpbG
QlXP58dZ1PfiGrG5h6tbKefARms2B5CU01ztMvnKi89ANZ7FORy5F15d5oj/
ZWLoB38DrhoGL1n8wIfU8FQxiSyTB17ExRQwb0DQdN7iuE8fg9kYWorvAccD
fuAKt2SkSV2Zea/mUe4JM/Q0FrkBjh0G/ouliPqkFFH91lJEfVKKqI6oNryW
7IulCLiF8IWy2odywA9kB84DDP2yiiW1guF8cDWlvErWDXSGAT/4mX0ViSSD
PwlQ4deZJK0k80ltaSJW2esgH1LqxU+GcgPPwMdIIpte3L9JOhh4V9xC4gIJ
WpxSqo5FvPHM2UA4ECIIzj8fyFdPA/ljUCCwafEWYBPZrSXVpkXqDaOEwOAo
vfKGtiR3IrqJ3Ojl1rotQteCqCDlFm55JzfkiXtmJHYgf651BsdayvsinTSY
B3I0ysVvfOEpSmOUSrORkoYVBpDKqJeABYBF8EkgITAeGGM3XiKTwz1muU7q
apN073npqvHiqu0eGo+SFNh2FegIN2OmY0wuYjQxSiOLk2Kh3E3kpMsTnJyk
0mzkBaQsCXpp0DPJxNAjStXKMhZYhV0RILB3M5HcSfpEjeRhsAVIHFak+IDD
A2vqaePhTNQBaav0oxhhsI0DZ0E+vaNVuEtzPMCI0jwE9YhHKBojIYek50mK
Rp5+Oywd+AfKGY9DwU7SCmM3X3SUSxlHeuCzrRDFOHG82VU2UbR3Er/z2kLD
HUEo8HiQ2IqwwW0W0eON7CvpGJdqEWbbamn4ZJWLIVc5nM3mIRF/JQ1Jq5hU
Ovkzg6nFEFEIlEDiraPIihrk0tJ7BNKA/ShuCxlmo84kFVZylKZ2he1Qcuxm
BCQTmYRtCqJGoM9JGvlkljTRJHVcM//DV7Ca0Hjfpah6m1un+qcVK1aUmg/X
f7+7HY9lpenu48f7ebxZHmpK7z6OH9br5Wauv1um97d3N3d/uV7uT+pL+aTO
IFWG+8MTH/GAlBo+LD/f3fNHAP721UNJ6jjv/raHU5wfDyS/qf9ktkJVUNrz
SovA19anpDNfy6EJwlDufuLd4t32gzPbfQP8PZ7jIYx/enue3H11TH7rXlve
K9UmU0LKQ1PawXfGtTEOynSuKX00obcYFlTRTWIymx/bYo2cbe79oHJu/eBi
ExuXvDe674l+bYbc9ap0zeBDDrqLyvECKzUwM657r/hTEDza0GC4dtjioFut
THAhNb4rg3eNarom54yNq9QBVBN9KarJ3TBYgJaawfLQQUltiG0pg1TgQp8B
/xC7JmTXd11RKmC2YmJusbLpYx+GXqXQehOxdc1jxrGLprUu9G2n+xRTm9TQ
tb3u27ao4JxPpUsAozWNCsa3eKfbZIGc3ONZbgRfZW9T07MAlF1jGm0taxm2
LabrhgZ82Q2pS0Cf0o1NGMoryGzQRfeGZ5cNNhFzSd4qDcQXk9zQ5YR9JIut
pF5rZ/rkW9sMBcCWgq9CMzhtWEtkOaIBMgaTTddgohxba9zAqkWfBoiEG4wF
bp3vlG36khrM1AFOD/zwv0aLyBwqYVI9JBcZOSdyOI7yqI54gffv1+u/mHv9
xjhzVgisTyuB6xwWpVXUkdXA/enl0yrfWT3heQH74arW9aFQWD+uFD599lAv
PCsYvng52Z6UDWVNqQAbDybRIXmwsE2QkNaw7tZ3JTQlt8GW1oYQ7KGgKys/
Ec6tmPvow/1ZJpaZSTKnOxW9BqeYlFVsVRuTC8YMNngfGwhjef2HVDF11P5R
VS91kNPkTdd7SKkDw2vdDVp1pc168JApG2w2xjZYIDVOlx5yOfSl10Of1bCn
Qts1BggEgjqdeR2d7qBRAINvg7cNhNA5QJXapumxPVOawUB6uz5gJ3k7oPV/
WcM0kL9HO218r7LCJLbPurihlH4YBmWxxyzqLAcFsgQHKUuQbpMGn0PpQmsS
tGjZ75RX9EBJFWXAK1Coyru+16kxvYf66VzXeWCmtUOjoeh0MT2UcoY69UMK
2O9JBdNYanHtlMNo1UJdgJBQM1BKjR5YAW6U66yHNhm0VkED3qB40RHbOnqo
BwONT81l7ZDBniX2ymdHEqTe4V+voEaiiiZG8K8fiG6ABVXalOBV41OTjWUZ
Gnq2NYMafNNBXfrkCsuibY4gf0iGCjWDyaApuwgDAPVlHXYExe9g4Bz1Z1IY
mJOyOWEPQFnuMNyCyFCycQDBBpthAaG2QEeTleLNhV0ET7CMS+WXQEEQqS15
aMEEoAUpVPCMKXYAJXTXpCYWaNhhaEH7BoLaw5x0AKIEGoKhwdKlVV0kQqBW
wbOuSb6AcxyUrY0sGLcalkh5iFzBngJMF5YqDTiWuADFeMoQRNYsSfdugFEb
OquHEsGZiuV+Ezz0NjDeG9j0NhIjClPDghIKp8AOPDAH45uJog5IAXUggsmp
rH3TY68eih3MrBOwg9fFW90Baab87mscjfPHqnLdTD/e3v1ys8zyi4H3/DWs
7Yf8lvlfXt3evfqfbYlRHJj77feH5Hq38fbH+s8L/mmvP/z4/u7m71d1N8JH
XG7rlh7f7e1V/e2n+/v6z3ef7m+Wv13V/3kDd/Tf7vDk/T3vVWqX2/8ef4KL
8+/j/OlHeGA344fr+uvrT/d/HccP41X99fhp+9G1rz/dzrubcV6utiah5R6x
wzfjzd1Pu+vb66v6u/fwle7rb+QX5Dj1f1xP78flpv6W//8wy2fvPi7reFu/
ww6WDYB/u/6pfocB4wxgPlzzy2sYAlnkfvlQf/fLstB33O4x/Xa5XTDJh0/X
P8olb7wecZGf7JG7rLdfPZJi+O32S/TyO35w/vZXXj9cxLX9ZhMfer/c/Mwn
pMj+p+uPf/60e1v9L98qv2vQcgIA

-->

</rfc>
