<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-09" category="std" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-09"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <abstract>
      <?line 169?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50% while also significantly reducing memory and code size compared to ASN.1.  The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re-encoding for the signature to be verified. The document also specifies C509 Certificate Signing Requests, C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 173?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc. The use of CBOR also reduces code complexity, code size, memory usage, and CPU usage.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates, and is designed to render a compact encoding of certificates used in constrained environments.</t>
      <t>The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
        </li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document also specifies C509 Certificate Signing Requests, see <xref target="CSR"/>; COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>; and a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This specification makes use of the terminology in <xref target="RFC2986"/>, <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers or complemented with CBOR OID and PEN encodings <xref target="RFC9090"/>, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>
        <ul spacing="normal">
          <li>
            <t>version. The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type"/>.</t>
          </li>
          <li>
            <t>serialNumber. The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
          </li>
          <li>
            <t>signature. The 'signature' field is always the same as the 'signatureAlgorithm' field and therefore omitted from the CBOR encoding.</t>
          </li>
          <li>
            <t>issuer. In the general case, the sequence of 'RelativeDistinguishedName' is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as either  </t>
            <ul spacing="normal">
              <li>
                <t>a (CBOR int, CBOR text string) pair, or</t>
              </li>
              <li>
                <t>a (unwrapped CBOR OID, CBOR bytes) pair, or</t>
              </li>
              <li>
                <t>a (CBOR PEN, CBOR bytes) pair.</t>
              </li>
            </ul>
            <t>
The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded 'common name' it is encoded as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>If the text string has an even length <contact fullname="≥"/> 2 and contains only the symbols '0'–'9' or 'a'–'f', it is encoded as a CBOR byte string, prefixed with an initial byte set to '00'.</t>
              </li>
              <li>
                <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where 'H' is one of the symbols '0'–'9' or 'A'–'F' it is encoded as a CBOR byte string prefixed with an initial byte set to '01', for a total length of 9. An EUI-64 mapped from a 48-bit MAC address (i.e., of the form "HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string prefixed with an initial byte set to '01', for a total length of 7.</t>
              </li>
              <li>
                <t>Otherwise it is encoded as a CBOR text string.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>validity. The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as CBOR null.</t>
          </li>
          <li>
            <t>subject. The 'subject' is encoded exactly like issuer.</t>
          </li>
          <li>
            <t>subjectPublicKeyInfo.  The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
          </li>
          <li>
            <t>issuerUniqueID. Not supported.</t>
          </li>
          <li>
            <t>subjectUniqueID. Not supported.</t>
          </li>
          <li>
            <t>extensions. The 'extensions' field is encoded as a CBOR array where each extension is encoded as either  </t>
            <ul spacing="normal">
              <li>
                <t>a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type, or</t>
              </li>
              <li>
                <t>an unwrapped CBOR OID tag <xref target="RFC9090"/> followed by an optional CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string, or</t>
              </li>
              <li>
                <t>a CBOR PEN tag <xref target="RFC9090"/> followed by an optional CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
        <ul spacing="normal">
          <li>
            <t>signatureAlgorithm. The 'signatureAlgorithm' field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          </li>
          <li>
            <t>signatureValue. In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
          </li>
        </ul>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <artwork type="CDDL" align="center"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes ) //
            ( attributeType: pen, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid /
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true,
              extensionValue: bytes ) //
            ( extensionID: pen, ? critical: true,
              extensionValue: bytes )
]]></artwork>
        </figure>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstraß form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER encoded certificate with an uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shorter INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>This section details the encoding of the 'extensions' field. The 'extensions' field is encoded as a CBOR array where each extensionID is encoded either as a CBOR int or as an unwrapped CBOR OID tag. If 'extensionID' is encoded an int (see <xref target="extype"/>), the sign is used to encode if the extension is critical and the 'critical' field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>
        <t>The 'extnValue' OCTET STRING value field is encoded as the CBOR byte string 'extensionValue' except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>
        <t>A note on extension ID naming: in existing OID databases most IDs can be found in versions with and without an 'id-pe' or 'id-ce' prefix. We have excluded the prefix for the commonly used extensions defined in <xref target="RFC5280"/> and included them for extensions defined elsewhere.</t>
        <t>CBOR encoding of the following extension values is fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyUsage = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyConstraints = [
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>), unwrapped CBOR OID tags <xref target="RFC9090"/>, or CBOR PEN tags <xref target="RFC9090"/>, where each int or OID / PEN tag encodes a key usage purpose. If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyPurposeId = int / ~oid / pen
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ ~oid, bytes ] is used to contain the pair ( hwType, hwSerialNum ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier / null,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid,
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contain general names registered in <xref target="GN"/> the extension value can be CBOR encoded. C509 uses the same additions and restrictions as defined in <xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>. Note that the minimum and maximum fields are not used and therefore omitted.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralSubtrees = [ + GeneralName ]
   NameConstraints = [
     permittedSubtrees: GeneralSubtrees / null,
     excludedSubtrees: GeneralSubtrees / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = [+Attributes]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources (id-pe-autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources v2 (id-pe-autonomousSysIds-v2). Encoded exactly like autonomousSysIds.</t>
          </li>
          <li>
            <t>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous Address, the Address is encoded as an uint with the the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2^64 - 1 corresponding to the cbor integer max value.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Address = bytes / uint,
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</t>
          </li>
          <li>
            <t>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as a CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature (0), nonRepudiation (1), keyEncipherment (2) and keyAgreement (4) asserted is encoded as the two CBOR ints 2, 23 (2^0 + 2^1 + 2^2 + 2^4 = 23).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 23, 8, [ 3, 6 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-parameters">
        <name>COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, and c5t, and c5u, defined in <xref target="iana-header"/> are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cose-c509-cert media type, see <xref target="c509-cert"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD8 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <t>The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="CDDL"><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></sourcecode>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>
        <table anchor="iana-header">
          <name>COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">TBD1</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">TBD2</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">TBD3</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">TBD4</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing a ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
      <section anchor="private-key-structures">
        <name>Private Key Structures</name>
        <t>Certificate management also makes use of data structures including private keys, see e.g. <xref target="RFC7468"/>. This section defines the following CBOR encoded structures:</t>
        <sourcecode type="CDDL"><![CDATA[
C509PrivateKey = [
   subjectPrivateKeyAlgorithm: AlgorithmIdentifier,
   subjectPrivateKey: any,
]
]]></sourcecode>
        <t>The C509PrivateKey item is served with the application/cose-c509-privkey media type, see <xref target="c509-privkey"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD12 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <sourcecode type="CDDL"><![CDATA[
C509PEM = [
   C509PrivateKey,
   COSE_C509 / null,
]
]]></sourcecode>
        <t>The C509PEM item is served with the application/cose-c509-pem media type, see <xref target="c509-pem"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined in <xref target="RFC9277"/>, with "magic number" TBD13 composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value.</t>
        <t>Editor's note: Include further details for encoding of subjectPrivateKey.</t>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate Signing Request</name>
      <t>This section defines the format of a C509 Certificate Signing Request (CSR), also known as a C509 Certificate Request, based on and compatible with RFC 2986 <xref target="RFC2986"/>, and reusing the formatting of C509 certificates defined in <xref target="certificate"/>. The media type is application/cose-c509-pkcs10, see <xref target="c509-pkcs10"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD9 is composed of the reserved CBOR tag 55799 concatenated with the CBOR tag calculated from the CoAP Content-Format value, see <xref target="RFC9277"/>.</t>
      <t>Different types of C509 Certificate Requests are defined, see <xref target="csr-type"/>, all using the same CBOR encoding and differing only in what is being signed and what type of C509 certificate is being requested:</t>
      <ul spacing="normal">
        <li>
          <t>The C509 Certificate Request can either be an invertible CBOR re-encoding of a DER encoded RFC 2986 certification request, or it can be natively signed where the signature is calculated over the CBOR encoding instead of the DER encoding.</t>
        </li>
        <li>
          <t>The requested C509 certificate in the C509 Certificate Request can either be of type 0 or of type 1, see <xref target="type"/>.</t>
        </li>
      </ul>
      <t>Combining these options enables the four instances of c509CertificateRequestType defined in <xref target="csr-type"/>. An implementation MAY only support c509CertificateRequestType = 0. The most common variants are expected to be:</t>
      <ul spacing="normal">
        <li>
          <t>c509CertificateRequestType = 0. This type indicates that the C509 Certificate Request is natively signed, and that the requested certificate format is C509 Type 0. This encoding removes the need for ASN.1 and DER parsing and re-encoding in the requesting party.</t>
        </li>
        <li>
          <t>c509CertificateRequestType = 3. This type indicates that the C509 Certificate Request is CBOR re-encoded RFC 2986 certification requests, and that the requested certificate formate is C509 Type 1. This encoding is backwards compatible with legacy RFC 2986 certification requests and X.509 certificates, but enables a reduced transport overhead.</t>
        </li>
      </ul>
      <t>subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, e.g., as defined in <xref target="RFC6955"/>. In the latter case, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier distributed out-of-band. Both kinds are listed in the C509 Signature Algorithms Registry, see <xref target="sigalg"/>. Note that a key agreement key pair may be used with a signature algorithm in a certificate request, see <xref target="app-DH-keys"/>.</t>
      <t>Certificate request attributes, i.e. attributes for use with certificate requests providing additional information about the subject of the certificate, are defined in <xref section="5.4" sectionFormat="of" target="RFC2985"/>. The attribute extensionRequest is supported with a dedicated element. Other certificate request attributes are included using the same Extensions structure as in extensionsRequest, both extensions and attributes are listed in the C509 Extensions Registry, see <xref target="fig-extype"/>. The only other certificate request attribute specified in this document is challengePassword which is defined for utf8String values and encoded as CBOR text string, except if the text string contains only the symbols '0'–'9' or 'a'–'f', in which case it is encoded as a CBOR byte string.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateRequest.</name>
        <artwork type="CDDL" align="center"><![CDATA[
C509CertificateRequest = [
   TBSCertificateRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateRequest = (
   c509CertificateRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest: Extensions,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
)

challengePassword: tstr / bstr
]]></artwork>
      </figure>
      <t>After verifying the subjectSignatureValue, the CA MAY transform the C509CertificateRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and code.</t>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certificate Signing Request (CSR)) format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>.</t>
      <t>When a certificate request is received, the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession corresponding to the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with the CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 CSR, the CA transforms it into a DER encoded RFC 2986 CertificationRequestInfo and use that with existing processes and code to produce an RFC 5280 DER encoded X.509 certificate. The DER encoded X.509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in <xref target="fig-size-COSE"/> and <xref target="fig-size-TLS"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artwork align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X.509 and C509 are Certificate messages. X.509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artwork align="center"><![CDATA[
+-------------------+-------+----------------+------+---------------+
|                   | X.509 | X.509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+----------------+------+---------------+
| RFC 7925 Cert (1) |   327 |            324 |  151 |           167 |
+-------------------+-------+----------------+------+---------------+
| RPKI Cert (1)     | 20991 |           9134 | 8660 |          5668 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (2)   |  2204 |           1455 | 1414 |          1063 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (4)   |  5190 |           3244 | 3958 |          2845 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Bag (8)     | 11578 |           3979 | 8882 |          3519 |
+-------------------+-------+----------------+------+---------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "CBOR Encoded X.509 (C509) Parameters". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="csr-type">
        <name>C509 Certificate Request Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-csr-types">
          <name>C509 Certificate Request Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate Request.                 |
|       | Requested certificate is C509 Type 0.                     |
+-------+-----------------------------------------------------------+
|     1 | Natively Signed C509 Certificate Request.                 |
|       | Requested certificate is C509 Type 1.                     |
+-------+-----------------------------------------------------------+
|     2 | CBOR re-encoding of RFC 2986 certification request.       |
|       | Requested certificate is C509 Type 0.                     |
+-------+-----------------------------------------------------------+
|     3 | CBOR re-encoding of RFC 2986 certification request.       |
|       | Requested certificate is C509 Type 1.                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="atttype">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:            Postal Address                           |
|       | Identifiers:     postalAddress                            |
|       | OID:             2.5.4.16                                 |
|       | DER:             06 03 55 04 10                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08 00      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. The registry also contains CSR attributes for use in Certificate Requests, see <xref target="CSR"/>. For values in the interval [1, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions and CSR Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestampList           |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     id-pe-autonomousSysIds                   |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     id-pe-autonomousSysIds-v2                |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            Biometric Information                    |
|       | Identifiers:     id-pe-biometricInfo                      |
|       | OID:             1.3.6.1.5.5.7.1.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 02            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    37 | Name:            Precertificate Signing Certificate       |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.4                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 04      |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    38 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    39 | Name:            Qualified Certificate Statements         |
|       | Identifiers:     id-pe-qcStatements                       |
|       | OID:             1.3.6.1.5.5.7.1.3                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 03            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    40 | Name:            S/MIME Capabilities                      |
|       | Identifiers:     smimeCapabilities                        |
|       | OID:             1.2.840.113549.1.9.15                    |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 0F         |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    41 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|   255 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        CSR Attribute                            |
|       | extensionValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
|    15 | Name:            CMC Certification Authority            |
|       | Identifiers:     id-kp-cmcCA                            |
|       | OID:             1.3.6.1.5.5.7.3.27                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1B          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    16 | Name:            CMC Registration Authority             |
|       | Identifiers:     id-kp-cmcRA                            |
|       | OID:             1.3.6.1.5.5.7.3.28                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1C          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    17 | Name:            CMC Archive Server                     |
|       | Identifiers:     id-kp-cmcArchive                       |
|       | OID:             1.3.6.1.5.5.7.3.29                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1D          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    18 | Name:            CMC Key Generation Authority           |
|       | Identifiers:     id-kp-cmKGA                            |
|       | OID:             1.3.6.1.5.5.7.3.32                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 20          |
|       | Comments:        RFC 9480                               |
+-------+---------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -3 | Name:            otherName with BundleEID                 |
|       | Comments:        id-on-bundleEID                          |
|       |                  (1.3.6.1.5.5.7.8.11)                     |
|       |                  06 08 2B 06 01 05 05 07 08 0B            |
|       | Value:           eid-structure from RFC 9171              |
+-------+-----------------------------------------------------------+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleName                 |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        SHA-256 with HMAC-SHA256                     |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    15 | Name:        SHA-384 with HMAC-SHA384                     |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    16 | Name:        SHA-512 with HMAC-SHA512                     |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    45 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". T The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    28 | Name:        EC Public Key (Weierstraß) with              |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
        <section anchor="suitability-of-different-public-key-algorithms-for-use-within-iot-scenarios">
          <name>Suitability of different public key algorithms for use within IoT scenarios</name>
          <t>The public key algorithms registry <xref target="pkalg"/> specify a number of algorithms, not all which are suitable for usage with constrained devices. RSA requires large keys and large signature sizes compared to elliptic curve cryptography (ECC), which together with resource-efficient implementations of named elliptic curves (Montgomery, Edwards and Weierstraß curves), make them suitable candidates for IoT public key usage. These curves are represented by ids 1–11 and 24–28 in <xref target="pkalg"/>.</t>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading with this document as reference.</t>
      </section>
      <section anchor="c509-cert">
        <name>Media Type application/cose-c509-cert</name>
        <t>When the application/cose-c509-cert media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-cert</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <ul spacing="normal">
          <li>
            <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
          </li>
          <li>
            <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
          </li>
        </ul>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD8</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-pkcs10">
        <name>Media Type application/cose-c509-pkcs10</name>
        <t>When the application/cose-c509-pkcs10 media type is used, the data is a C509CertificateRequest structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-pkcs10</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD9</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-privkey">
        <name>Media Type application/cose-c509-privkey</name>
        <t>When the application/cose-c509-privkey media type is used, the data is a C509PrivateKey structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-privkey</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD12</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="c509-pem">
        <name>Media Type application/cose-c509-pem</name>
        <t>When the application/cose-c509-pem media type is used, the data is a C509PEM structure.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application</t>
        <t>Subtype name: cose-c509-pem</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: usage</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <ul spacing="normal">
          <li>
            <t>Deprecated alias names for this type: N/A</t>
          </li>
          <li>
            <t>Magic number(s): TBD13</t>
          </li>
          <li>
            <t>File extension(s): .c509</t>
          </li>
          <li>
            <t>Macintosh file type code(s): N/A</t>
          </li>
        </ul>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to add the media types "application/cose-c509-cert", "application/cose-c509-pkcs10", "application/cose-c509-privkey" and "application/cose-c509-pem" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters".</t>
        <figure anchor="fig-format-ids">
          <name>CoAP Content-Format IDs</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="160" width="592" viewBox="0 0 592 160" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,144" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,144" fill="none" stroke="black"/>
                <path d="M 360,32 L 360,144" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,144" fill="none" stroke="black"/>
                <path d="M 584,32 L 584,144" fill="none" stroke="black"/>
                <path d="M 8,32 L 584,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 584,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 584,66" fill="none" stroke="black"/>
                <path d="M 8,144 L 584,144" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Media</text>
                  <text x="84" y="52">Type</text>
                  <text x="316" y="52">Encoding</text>
                  <text x="380" y="52">ID</text>
                  <text x="472" y="52">Reference</text>
                  <text x="124" y="84">application/cose-c509-cert</text>
                  <text x="288" y="84">-</text>
                  <text x="396" y="84">TBD6</text>
                  <text x="460" y="84">[[this</text>
                  <text x="532" y="84">document]]</text>
                  <text x="132" y="100">application/cose-c509-pkcs10</text>
                  <text x="288" y="100">-</text>
                  <text x="396" y="100">TBD7</text>
                  <text x="460" y="100">[[this</text>
                  <text x="532" y="100">document]]</text>
                  <text x="136" y="116">application/cose-c509-privkey</text>
                  <text x="288" y="116">-</text>
                  <text x="392" y="116">TBD10</text>
                  <text x="460" y="116">[[this</text>
                  <text x="532" y="116">document]]</text>
                  <text x="120" y="132">application/cose-c509-pem</text>
                  <text x="288" y="132">-</text>
                  <text x="392" y="132">TBD11</text>
                  <text x="460" y="132">[[this</text>
                  <text x="532" y="132">document]]</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+--------------------------------+----------+-------+-------------------+
| Media Type                     | Encoding | ID    | Reference         |
+================================+==========+=======+===================+
| application/cose-c509-cert     | -        |  TBD6 | [[this document]] |
| application/cose-c509-pkcs10   | -        |  TBD7 | [[this document]] |
| application/cose-c509-privkey  | -        | TBD10 | [[this document]] |
| application/cose-c509-pem      | -        | TBD11 | [[this document]] |
+--------------------------------+----------+-------+-------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as as X.509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>
        <t>Editor's Note: The TLS registrations should be discussed and approved by the TLS WG at a later stage. The TLS WG might e.g. want a separate draft in the TLS WG.</t>
        <artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
      </section>
      <section anchor="tags">
        <name>CBOR Tags Registry</name>
        <t>This document registers the following entries in the "CBOR Tags" registry under the "Concise Binary Object Representation (CBOR) Tags" heading.</t>
        <artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2985" target="https://www.rfc-editor.org/info/rfc2985" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2985.xml">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4108" target="https://www.rfc-editor.org/info/rfc4108" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090" target="https://www.rfc-editor.org/info/rfc9090" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9090.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9277" target="https://www.rfc-editor.org/info/rfc9277" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9277.xml">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9360" target="https://www.rfc-editor.org/info/rfc9360" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9360.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6487" target="https://www.rfc-editor.org/info/rfc6487" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955" target="https://www.rfc-editor.org/info/rfc6955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6955.xml">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7468" target="https://www.rfc-editor.org/info/rfc7468" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7468.xml">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932" target="https://www.rfc-editor.org/info/rfc7932" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603" target="https://www.rfc-editor.org/info/rfc8603" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879" target="https://www.rfc-editor.org/info/rfc8879" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148" target="https://www.rfc-editor.org/info/rfc9148" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9148.xml">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9190.xml">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191" target="https://www.rfc-editor.org/info/rfc9191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9191.xml">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" target="https://datatracker.ietf.org/doc/html/draft-ietf-lake-edhoc-23" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="22" month="January" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-23"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-tls13-iot-profile-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="22" month="October" year="2023"/>
            <abstract>
              <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for Internet of Things devices. It also updates RFC 7925 with regards to the X.509 certificate profile.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-08"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-ctls-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>This document specifies a "compact" version of TLS 1.3 and DTLS 1.3. It saves bandwidth by trimming obsolete material, tighter encoding, a template-based specialization technique, and alternative cryptographic techniques. cTLS is not directly interoperable with TLS 1.3 or DTLS 1.3 since the over-the-wire framing is different. A single server can, however, offer cTLS alongside TLS or DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-09"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="https://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
        <reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
            <author initials="E." surname="Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
        </reference>
      </references>
    </references>
    <?line 2041?>

<section anchor="appA">
      <name>Example C509 Certificates</name>
      <section anchor="example-rfc-7925-profiled-x509-certificate">
        <name>Example RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,                   / version and certificate type /
  h'01f50d',           / serialNumber /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  h'010123456789AB',   / subject, EUI-64 /
  1,                   / subjectPublicKeyAlgorithm /
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,                   / single extension:
                         non-critical keyUsage
                         digitalSignature /
  0,                   / signatureAlgorithm /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 139 bytes. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
47 01 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16
]]></artwork>
        </section>
        <section anchor="example-natively-signed-c509-certificate">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType, encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1672531200,
  1767225600,
  h'010123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'6FC903015259A38C0800A3D0B2969CA21977E8ED6EC344964D
    4E1C6B37C8FB541274C3BB81B2F53073C5F101A5AC2A928865
    83B6A2679B6E682D2A26945ED0B2'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 139 bytes.</t>
          <artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
47 01 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 6F C9 03 01 52 59 A3 8C 08 00 A3 D0 B2 96 9C A2 19 77 E8 ED 6E
C3 44 96 4D 4E 1C 6B 37 C8 FB 54 12 74 C3 BB 81 B2 F5 30 73 C5 F1 01
A5 AC 2A 92 88 65 83 B6 A2 67 9B 6E 68 2D 2A 26 94 5E D0 B2
]]></artwork>
        </section>
        <section anchor="app-DH-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate the common key usage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used to sign a certificate request.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example IEEE 802.1AR profiled X.509 Certificate</name>
        <t>An example of an IEEE 802.1AR profiled X.509 certificate (Secure Device Identifier, DevID) is provided in Appendix C.2 of <xref target="RFC9148"/>. The certificate is shown below including details of the hardwareModuleName type of otherName in subjectAltName, see <xref target="ext-encoding"/>.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 9112578475118446130 (0x7e7661d7b54e4632)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: C=US, ST=CA, O=Example Inc, OU=certification, CN=802.1AR CA
        Validity
            Not Before: Jan 31 11:29:16 2019 GMT
            Not After : Dec 31 23:59:59 9999 GMT
        Subject: C=US, ST=CA, L=LA, O=example Inc, OU=IoT/serialNumber=Wt1234
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:c8:b4:21:f1:1c:25:e4:7e:3a:c5:71:23:bf:2d:
                    9f:dc:49:4f:02:8b:c3:51:cc:80:c0:3f:15:0b:f5:
                    0c:ff:95:8d:75:41:9d:81:a6:a2:45:df:fa:e7:90:
                    be:95:cf:75:f6:02:f9:15:26:18:f8:16:a2:b2:3b:
                    56:38:e5:9f:d9
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Subject Key Identifier:
                96:60:0D:87:16:BF:7F:D0:E7:52:D0:AC:76:07:77:AD:66:5D:02:A0
            X509v3 Authority Key Identifier:
                68:D1:65:51:F9:51:BF:C8:2A:43:1D:0D:9F:08:BC:2D:20:5B:11:60
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Subject Alternative Name:
                otherName:
                    type-id: 1.3.6.1.5.5.7.8.4 (id-on-hardwareModuleName)
                    value:
                        hwType: 1.3.6.1.4.1.6175.10.1
                        hwSerialNum: 01:02:03:04
    Signature Algorithm: ecdsa-with-SHA256
    Signature Value:
        30:46:02:21:00:c0:d8:19:96:d2:50:7d:69:3f:3c:48:ea:a5:
        ee:94:91:bd:a6:db:21:40:99:d9:81:17:c6:3b:36:13:74:cd:
        86:02:21:00:a7:74:98:9f:4c:32:1a:5c:f2:5d:83:2a:4d:33:
        6a:08:ad:67:df:20:f1:50:64:21:18:8a:0a:de:6d:34:92:36
]]></artwork>
        <t>The DER encoding of the certificate is 577 bytes:</t>
        <artwork><![CDATA[
30 82 02 3D 30 82 01 E2 A0 03 02 01 02 02 08 7E 76 61 D7 B5 4E 46 32
30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 5D 31 0B 30 09 06 03 55 04 06
13 02 55 53 31 0B 30 09 06 03 55 04 08 0C 02 43 41 31 14 30 12 06 03
55 04 0A 0C 0B 45 78 61 6D 70 6C 65 20 49 6E 63 31 16 30 14 06 03 55
04 0B 0C 0D 63 65 72 74 69 66 69 63 61 74 69 6F 6E 31 13 30 11 06 03
55 04 03 0C 0A 38 30 32 2E 31 41 52 20 43 41 30 20 17 0D 31 39 30 31
33 31 31 31 32 39 31 36 5A 18 0F 39 39 39 39 31 32 33 31 32 33 35 39
35 39 5A 30 5C 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0B 30 09 06
03 55 04 08 0C 02 43 41 31 0B 30 09 06 03 55 04 07 0C 02 4C 41 31 14
30 12 06 03 55 04 0A 0C 0B 65 78 61 6D 70 6C 65 20 49 6E 63 31 0C 30
0A 06 03 55 04 0B 0C 03 49 6F 54 31 0F 30 0D 06 03 55 04 05 13 06 57
74 31 32 33 34 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48
CE 3D 03 01 07 03 42 00 04 C8 B4 21 F1 1C 25 E4 7E 3A C5 71 23 BF 2D
9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C FF 95 8D 75 41 9D 81
A6 A2 45 DF FA E7 90 BE 95 CF 75 F6 02 F9 15 26 18 F8 16 A2 B2 3B 56
38 E5 9F D9 A3 81 8A 30 81 87 30 09 06 03 55 1D 13 04 02 30 00 30 1D
06 03 55 1D 0E 04 16 04 14 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07
77 AD 66 5D 02 A0 30 1F 06 03 55 1D 23 04 18 30 16 80 14 68 D1 65 51
F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20 5B 11 60 30 0E 06 03 55 1D 0F
01 01 FF 04 04 03 02 05 A0 30 2A 06 03 55 1D 11 04 23 30 21 A0 1F 06
08 2B 06 01 05 05 07 08 04 A0 13 30 11 06 09 2B 06 01 04 01 B4 3B 0A
01 04 04 01 02 03 04 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 30
46 02 21 00 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 02 21 00 A7 74 98 9F 4C 32 1A
5C F2 5D 83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34
92 36
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

 1,
 h'7E7661D7B54E4632',
 [
  -4, "US",
   6, "CA",
   8, "Example Inc",
   9, "certification",
   1, "802.1AR CA"
 ],
 1548934156,
 null,
 [
  -4, "US",
   6, "CA",
   5, "LA",
   8, "example Inc",
   9, "IoT",
  -3, "Wt1234"
 ],
 1,
 h'03C8B421F11C25E47E3AC57123BF2D9FDC494F028BC351CC80C03F150BF50CFF95',
 [
   4, -2,
   1, h'96600D8716BF7FD0E752D0AC760777AD665D02A0',
   7, h'68D16551F951BFC82A431D0D9F08BC2D205B1160',
  -2, 5,
  3, [-1, [h'2B06010401B01F0A01', h'01020304']]   / subjectAltName w. hardwareModuleName /
 ],
 0,
 h'C0D81996D2507D693F3C48EAA5EE9491BDA6DB214099D98117C63B361374CD86A7
   74989F4C321A5CF25D832A4D336A08AD67DF20F1506421188A0ADE6D349236'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 275 bytes:</t>
          <artwork><![CDATA[
01 48 7E 76 61 D7 B5 4E 46 32 8A 23 62 55 53 06 62 43 41 08 6B 45 78
61 6D 70 6C 65 20 49 6E 63 09 6D 63 65 72 74 69 66 69 63 61 74 69 6F
6E 01 6A 38 30 32 2E 31 41 52 20 43 41 1A 5C 52 DC 0C F6 8C 23 62 55
53 06 62 43 41 05 62 4C 41 08 6B 65 78 61 6D 70 6C 65 20 49 6E 63 09
63 49 6F 54 22 66 57 74 31 32 33 34 01 58 21 03 C8 B4 21 F1 1C 25 E4
7E 3A C5 71 23 BF 2D 9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C
FF 95 8A 04 21 01 54 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07 77 AD
66 5D 02 A0 07 54 68 D1 65 51 F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20
5B 11 60 21 05 03 82 20 82 49 2B 06 01 04 01 B0 1F 0A 01 44 01 02 03
04 00 58 40 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 A7 74 98 9F 4C 32 1A 5C F2 5D
83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34 92 36
]]></artwork>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Lijun Liao, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y923bjRpIo+s6vyCWvfSS1SRYB3jnH5wyvtsZ10Yiqdu/j
9vQCSVDCFAmwAVIqdbl6zet+ng+Yp/0L+wfmT+ZLTkRkJpAAEheppCqVx3K5
igKBQGZEZNwzslarVfbOfmMP2NF49OaCTd2lt7JX7E/1dqPPxra/d9bO0trb
ATsZJy+dHlVW3tK1tvD4yrfW+5pj79e1pRfYteXC82s2h1ZbwkO1Rr9iLRa+
fTNgKUiVirPzB2zvH4K92Wj0G2YFrg9YsF9VgsNi6wSB47n7ux286Wx6OasA
XMe9GrADvK9X2TkD9g1bWi47BDazfN+6YyfOmlmbDbuDcTLPZ9dWcM2ubd+u
MLb3lgP8Aj4Gnr/37XUQ/n63VX+FO1f2bn89YGblxnYP9gAuXvneYScx9mbx
r/Zyz+bOlQsjYpa7QiT6d7s9jPgIQdCoj37y/Hd4w/f4MF7fWs4GriO2/hHx
Vvf8K7xu+Ut43dH1fr8LBi9e4G14ybmx6/K2F3jhxcL3bgP7BQJ4gQ9eOfvr
w0KArN1evcDxEe4lmo8qFeuwv/Z8nAX+1MS/jDkuzPmf6uzctw//+R/slbXf
B4Hnht9zKv+Td+1m3gIDG7Cp7yzxKhuOwi9sPtV/hYfrW/HUP9rixvrS2+pH
832dze0NINT2E8P4/j//jw/ETn1bNIIrDx6rB+KxEkOY19mF9Tcr8fr5tXXt
rOLf0KsvzuZTzWsDur/uw/3/6Dvw/kzs//Cf/+dqc3BXKbTbm/R3ea/8V3ii
fu3RA3nvfFVns4N/uLaTr3xlAdu4qS/pna/t94eAM3LyvVt6rL7mj/2ji3fS
ciEcVyqu5wMHAC8PKvDoxWxsGkZ/ID72e+3oY0d8bBmNnvjYNnsN8bHTa8qr
PaPbkh87hryh122Z8mO/JV/Rb7TN8GNf3ts3u135sdlp0NDm0/H3fJUI+Tjd
bBxY00s2Pvg3NhvjCveufGt3fVdl8z1wlOWvArYGUTNdw3pzbHcfu4sjrMpu
bL8O0oRAW/6VDWJOrvXAXl7R+oYPRu3GrO9Wa7pxBasXRBBIRpCU7jqJxE6r
JyfQ6bclErumKXHUbXXCj30zvKHfDHHUanVCJDaa8mOvG2GuEaLLaHWjj73w
Y4RPo2/gx7PahERWbWO9s2v26hrErnr5sLdq+01gNGuOt6/tfG/tbOzYHfBt
bQl/wUTh8ng4ql2+nA+0uFtaC8DLYUv4W1iwyB3Xrvn2Xw+Ob2+BGEENlNWB
Pr1QCTsevhiRJPXZDAFU2dFIPM4ulMeJtPtrm50FwcFylzbJ+leWa13RDcxb
s/PDYuMsN3e1S9RkoEdjGvSPto9qjBn1br1zRGPIFcfJkSms8E8HGJ3ZMA2J
lzEo2gcjBrV0LeAa7DPiBt4a6k0tosx689PQ9AoMAYmls+l0Wus1zLoxvNBj
KpCrGJjPtvlCFJdewIN/gQdrZsPo1a/3242KJgQdygDCxUtvaW0ICVt773s7
b+PA16DbbYu59v4WjIHgv/7t3+f28uDbbGLfOICzsxWgytnfEWiYjmMHuNjl
tONvETOhARXj6MwNAPJhbyMlphuwWED3iRHyXz0XlCGYLldAW0C/gsTh4QoI
xuhFcPn7+athzX57Nh7rsXh7e1u/CrYWSvwXMIPti9sdcJi7h8m9OOw2nrUK
XiBRXjTMF/Pvz+tGC0WdEQo7gVR8D6P3sPMfz1QGYeeAzuWdwiZGMQYQnDKp
mb3wD5YfsQdZvLUz71I/q5XnEEMYjbrRaHRf9Lu9WrPWNPq1frPb79a6fzFa
6uhfOlfX+1sb/xbG9MQBAw1QHuP0cN0AenxgDCTP5TUsiKCewQVH850P39t+
lY2vrW39CAy+l0BA5KPXHsIEEBykJDm+ZOxtd/DZZ3PUTEs7AKXlLR0Yz5nU
J0B+ZIdLG/jB224PLo4R8BtxBbwX9Je3YWbLrJdYmbM6rshgcVfS+Eh8fw7m
qLWzVs7W2fvW3guKjTQpHTd3Ib+OwRN5lSUb4bv61o7LPLTqzzfWHdotwtzK
lz91NkIMum5K8vARzM9B7jRq7c6wkLc6DbP34vXZ/LI+P6+Lh/ymOrwLIo4N
QgBpQ7Q9txy/9pMDrs+P9l1tCjILJG1wTYJ3vrwGCRywtwFK2YkTLH0bWOKl
d2X54C9sYyZKFsvhgJDP5jubWIaLcj4AMUgY141Dq7GMyJ4Cyiz/XWi6J75+
WQfetl39l0Mgtwf8GLzLYCu44Y8WOIwb+0Z/w0WdTSwYrSrjYFFtBMFqtRqz
FgGw3HJfqcBqDJi0HFiAGFgDfpjFGYVcXEQtrDq+zlWHqw6L2Wa+HRw2e7xJ
/Q6VAfismw2qwqRDzB+MvyE47HbgreKrN8hBcGERcJEBRhdD65gWMHq9sRcB
w+yAWIuNzW6B5iQd8Ak0BatcrQhtwk5AFZ1NTkG2vJ4Pq+wCJG9VkcRVekFS
4TK9TSAMOpjLT0BMdM1X4E8DNkRcgE2mYnZhwEEddpXGGUcBuvjglcBau4PP
AczNt1cHUJ14a+D8zZbIwKnJAazi2CAUeGCFs3bjf7Dba7gDUBZ4jAwgvMvd
g/ggwPjOrb31QE/gxGnU9BpCqc8nNJy/Bu3FEhSD74CFDlww47itDYp4stsB
/MKm98FdK0DYEt94chR+y786AjrA+JbXwH8wcNfbM2G2hUjEAUodgg9Z9DoY
FMCHKSKrrjgvhSzM5xrycZL1QosMaWkHe6ADv+UNOJrXtgWOM1yy+EWwxlXk
UqyD84i4AfHPuH6p85W1dVarjV2pfIM6z/cAySRGPnzj4K8fK5U3ri1V2PIa
lwcoO0G1lQ3mwx2FWYQMQomHGsy3ImSfANOe5mhWdgJa/pTBsg65BkcM9Axi
C3nH3/AO3hBjoA8fhC/68WMVHneJ/TwKPNlEJA/8xC2A5aYgmD4oSxykte3e
OGBp8fVBcNBJ+/ixzl7SilZxCZMHaUVAiWTAzbCCSVHjGnA9t6aChq/33tLb
BCAWgGMs0NrDc3SX+HvQPfv4MfxswOdbjIaRnEazE94JqhopiIYh8OAKzFZA
DIIBnUABOGat0YTwXPi61WA1WEGMlGQNzMkdsMU/g5AQ7wB/MXwH4nkDc3LB
aAN8gRGMSze+3g4uiApBEtvH5RmAkguYuAoD2V/7NsByUJ3B9EgILO72/DdY
QzasHcSDg5T32I21cVBJAkmJlzbkkVurFYjjgDMpijc+XPSgI5QgVa82CXLA
CPiiuuPit85eeb6QBMt97F7f3sFL4HXCfrI4Dnx7jU+sQLv6FkpjKcowakni
DBTTgZYvjfjg+zhkHOQhAE8KWbNIZr6z7R1JSiHzHXA87vjqST8KS8AFvAUB
GsLWHnANy4iY1mLAV27g0NrcgSDxQIz84N3aN2h44uhwzDAei21VLIRCKVQ0
Y89domkyclx8iwiXXsQwxE5Qbp5yUmC4BkjBBTtnCBW3tF7jrMNl5DVwwTvX
u6XxksjBlbmwXXvtwGoDXAPvbsk8XtmcB1GiK4YuaQUUcVW2g6nypXvYUiS3
KhkYljwsFKBGldn7JZetAhck/GmtysGTwkDcbOz3QIdqpEGqUq8QZYVePX/L
fwVRSbAc1PXAw5YQocQ6pDSQRuBjoaYPdRKC4Ne2SNIrfrnOh7U4OBtYTZ5L
CP2n+ZvXHPAWHt/At0C693tacM4eVhWz61f1iJoLTjx6ItRXSGIPHsSYQqeF
yLrhDlkdhC4uNM49gpsFiJg+ryooQ/IhcOvK9QKUcSBJOVVg8e8RFUCyFS0b
nKgN0OkXGOv1AWgtTSbBbhMc6gRI7/JRvLTcqwPi5GQ8mbyUrNYxUEiB6Lxx
VmTT3YLZDgO23yN7BpEG556alLESwdxhGp6fBXyQyAc4ozrZIAidz02iFvGg
maEkN6HX2dtbLjHkWoXxwLuBZ+m3te9tSezh4EidHQKuEVH51lBd7q9rIPwO
tmI6khdQVcQxF6bX4J+Cjgf4oNaBRPvQeyS8galPb0LvHbQMC0OPqAoWSHu8
dWv9K0pceLvgtdBQDVBcAJCVs17bJMvwLr4Ew7lWcWmq3AKGgA3+Lehp+FRl
B/j7FBUtriJGE4OviD/dw2YDX8WwcYKW+ylfUHtAfPTFnn8RsVxkUGPGKGB/
/vnPvyTHtrV28MWHP3/EL3bgaKVGT8sObSX0quNfkvsLlOESAAfJzS4hboiP
31v4HcAJgB6KAKyqLMrfwi90WyYaDD+hmhGuICPcoFVBKtxj4F6G9jZf/neC
TUKbehd6uACX+8gAFjhxOMqw5+E2HoDF8YRGNrdi4BNejfkSHz6oITc5CXQs
5NQaTVh9HCcxGyt0HYRoF7rX2u1AidOk1JsXJMkVOwZxi8KpSlKsykIjCKPc
OI6kmVJlE8VQanXxCtm74p62iVemkx/e4GOasDZ+LYIsqAURmFFvqvfKSDaS
To878XHhBOpz2hi5xGUuuiNmQ2uOxxx01jA3qonEKELLebsc52i3fwgDZziq
iF5icQlXFYxrLlukp8qltca3BfWl902rLMaaMW7kv2BAmTCZMOuqIoz44UMU
u+Rin7uHOjsK0YuokAqXHFfMGorlHDN2YF4xD4GWHki1LNO/jmGFB8cFVAqF
jqFcRZZuHcFTt2gQ+47l7vkLVqga4Q2RVAisbdLdRiRw2U2zRLMfZnUr9PHC
JsoRfgaVCrjAQ1QRN/h+1MwES3VUC83XuGsVW/s+qhIh0bwFaSMctOc7V2BY
bPIBA77NOnsd9645cuNUj/Rj5EzDTIEaywPafyseOEgHJsBT24N5glMM7wiH
RKgkC9QQ9AORCrdxg8C1hT1HcQTCOT4p3VHSY3CbFQQYr91zo1UYlGS4wbd3
oe+5sJbvbikTmYz6hDpCOCU8lEBRwSTuAF+FyEoKZZjditIYwhbCARHHiJAF
UU4R0uTmuAVvUSfBvcJA8oXD+d4S5gesJUxphDFR8qtAKKniTSEvyiOUa04Q
HCSWKV5yl1qOcp7hK3AxL73gDii+rScDhPePrnC9P56DyP6HWJSF5iFcC+K4
FAmIrviIhIKVHwiGR2B00ZmSQPFRBEKa8oSHzPzQ4pfWGqy75DuQYD6PFpzK
UXG1hyGf18LixTQIugsusSKXhhhnufWQc49evZ1fHlX5v+z1G/p8MYWxXEwn
+Hn+w/Dly/CDvGP+w5u3LyfRp+jJ8ZtXr6avJ/xhuMoSl14N/+cRF/lHb84v
z968Hr48IocxTtowsoYWqr/DQPoKFzYoiaXvLPgiGI3PmdHikgyLG2TQBcsU
eITB5a+ixcF/5St4t7Mtn4xhdOusHWaLUBOBHX2Nbi0yr+S3uCG5BUMkUKmK
nq7jehvviiQ2H0y/1wnNSiljlRhUpsFJ5qgI4vo2KAMSGsKyrHIkJQzbzS3a
03Qz2aMTm4/IQb+H7BFZaMat8RAAx+HcXnIZ1aqbQiTiJxOnp44JWSq1wj58
o/DjR4kvDlFZmRRX4FlJboir4VSdapABDY98mg1oIYxkgPjCCe4okolSggJE
0kKIB4KklYNvSZhFMaLQcBDO/prrlrihmLar0waPkjyNWz0ygq+3pGKGFLnx
KVWH8Q+KQQIWMaJAnuoG3OcVmFmyRmZJNTI7zyFzAzWYsw19N8uPxAQ+9eZs
QtcAWRtrCRxAqAaeB+sx9AUpkCo1mLyHF+Dh4/CK8+nrcJCBtNz7IUIxJOOu
wP5RlLZUxKs6mu4LxxW2UGArLiu+1nNJf5SPSSW01M4DiRhq4ivbJbd4d/B3
GDdWZCYsnSuPEnOhZlg7VzV8AaeQMB3TipJrKdvBOKM01xPGl5VvJVW5cceN
rqDADHLjJg5c4uYLd375t5o3kDtcpPXvM5AwGuUleRW/hMEQFy+8/bVIGCVp
J2UAxtpW17aUbXtun0ubImBXMGQX/Whlqcr0Xk1lKR6DBBBY5JGOvMZ0LZpv
W6oRiG72iIJAT6zIAC4JeTr9ttD6p6dRcI0y3gRsIxZz9HCotRb2xrutCnsa
XRzgFXsjvH7URzw8wjMRJNnlKwShyXXgj1ocw+HjIguz9HzAJqwjevUcdPn0
9XiK386nlxKMajCjbP+GvRKBzBmXNR++EYG3Ghc+H/li4Hwm5RG3lx0/Lrb4
8DcOVR6JCeOt0lWj0FwULsRobloHRAsSYaPSwWAiD5uk7CjVy1KDzyozKLyk
cYfAqfoDC2OqONNj8dsxny2yW4IUx0uAoqjDS7D5jjkqQJZyKPxZ/Z1kvzpA
Jj4JMibQbMwwF+tYDoliEkVeeHNoMhfa92tvA6RAnuDTv2myE8242HesccqF
R0ywhWIMnkO8qqAz4BiRWQoXiHZ/oJoHa/P6sF1gcSZhWr10zM5eX06/hxfw
uGoK+YLrD+6tj2acMGsOrpj2Av45bNnJ3+EDhTMB+dHA5uqb0Im+w0QMLZTG
+0aDhzdP9hFZuINFviM9JLWMa18RvmVuU+SbvK2zB67nE5ViVM5S/q5wlFjj
4cIWk4vuHUodJR8Say7+Ph6pTtkPNAx0uxDTQiZJhYgSuipSgDyginx3fGFv
aF4TNB9dwGBwba9ew9COEzQQ3ME3AIQJGS694NfhHsQ5iFwKo8g8J1gtFiia
zHdwO11EwIMoN2hJYKGHHo6ZY9/NG5k6lCm+P7yQmBJX6FhFxP4AUE7kShZx
bCXCfUrhaVSx4c0JfgRLqSrDwbh9I/0Ar32avk7fVqchIM9Yi8Db4ED5WpCC
QYyLnURCElHEF9mpmBLnpAh1JC1C/AF/4eyjQhFhPMtaACzIwbzwnitpePYf
0LJyyAhH7fd2v+7N97xMTS4GXiEF1yhdxL/lzB+hfIrF62zIU8PKEgAxdjZs
y2eAWYvkGY9fxtIOqAbeXs5qvYiqokYnRANJJu7KLmxK7MvBw0BVWPweYFB8
esWDGR7DSAeXgqrBAkZU3a5XY6JNAFA5mnDbbanoDauKhvPx2RkO1btFIXaX
RKOoiTm4e/+OlgoHf20B1nkeipkc1QrJgAVszIW8l4Q6uA5qNWsjLyDUxXYn
3yECW8J3Qlv9bM3odelFGZFUfMdHiduEBGOEVDjG3Inn0naHY0x6xtcdV0wB
Vdj/Ad/I3eqQGDxf6aKf5srJfvjw4b/+1//+CLrcFKgR4yOEE4vfbRdYonHc
OP6vf/v34/4x6rRji35ZH1fTw7CihSheXAVfE6yK99IHooooJVeHtAOmOG40
jutZY48Q57Lp27NapyWXMeb32NEPP9R0f45EAO34BxK8XlSoo5/XkH6ZabCb
nlbZWRmAJVGg4GE1rUA9jKNP8WcxnS0Xe6SCLNbq1RYwhlfDsaz/YCd8dein
PZvVZtNw2qefYfBdTqs3KOxvMX+dhTKFjHW0DrHIxdnfCXUOC2VESviYGBB/
H2LJznHMW4+AJhSEvfOW1zWe28G6yBfktp/8Hf85VZPH1lXMb3IjU0c47CQt
z9/Mz/5Ern8VLZodRmE8V4wCbodxrkRgxVJvQAkSy0pEgKQxIm5ccIvD2ZMD
HzrR2lrMKIJDgMzmoN0fdBognMdxeykhbbComltcYZXlFmvwEaTqXa+Ewex7
hyv+njuM55mNVh9HDa+5JEwgYdB39cUT8N333P7BkjG8hxOTq9ejPvwYZhP+
tPvt/v93xE5cqk9wfB5TQiBJDiViYnKc23wHilRJi4//FjOd7PcW+dAb550t
bTPlSV5q96N9h6XiotDxODQC+a4F4C8/tCHd5eZAaNmBUtli7C/QWMuhyXCc
fI9iYApzYvfO2lyhHeGRi2kJpzRcb2lLh5hUiQJRVR5GnmGeXLhznSayAXKY
ueucuFoYq1VhFCeGfsxGZ5dsfnlx9vr7HG9BB1sT2LWAFlthNSlwUff8zfY9
mDYZS1S4Ic0o9RrBR1EtXACqRwBdG+1Q5YnOVc1ehlOoxuMEwNrJSSLI9cGn
QEVU7JiMhH/4ADQLgxXC0+Lc9dZ1wFY+m9DqUhabwnR5t1A9Da50ERM5ji5o
POOk+c3lGFn94XN6q5sJuzhp3MJjwqxVOQnYUPKYeGJvbynuBgYar4z1Qpil
WDYX+sLzouAQmDOwYNCjOQ4ZQQ00xGx1RJf7R7xyXGRreAkkYJD1uY0SY1v8
EU7f0LqRYm1/S0VF0RLRuzBrxw8o4ozMYLKTeMwKFPg7++4tRp9Oq8rbotUV
go+4McWGwk4NGSrUSfohCTXniBxF6CUlRwxOZPTOhI6PZVaId9U1ycswooeF
aluJTFe47sLIJ89CiPRQouIE38zjpIHYKbL3bWuPkUAyziSiitcrGNbb3f5O
Wbbx8EWoIZJxjFRsooQySi9wAPcs9E1szrQWdCoodkNJBRQqYNWM5cJ5nnjh
59JLxc51LBFAo8utzggDMpej+ViNWeLbpuMJ7nBJqjodCh6m7nhsOgpwlq1M
5TFjhUKc88bxaGaI1vhMlRLB1KxxOFub4gDo9MZChOigkt8us91Yq3vD6T/E
Cg+5FTDahMKLTiNF92r4P5WQTUZdQXrEf09OTI1axb86hfXw9+iHIb4qyce/
Yz9TpCo2+Spe0pJ2gNq5WvmlUvkHLgrDxIX0DCX9qI0BiTiZMxCzn4upDCrx
l8JQTvC9mjj0gEJ49KU+DjxQU9rqF8pMBhQFoQvSDXwt/b8BI2cj8R35gspX
wtRSAGVa4gOmMfi1jwiMwjeRlB8o+klHi6LXnFYqGfgAJMuoOhYtbYkBwF7J
juf+wl5wL/oFj29WKtn3fqdElF4AXPMPygXgmegXoHU8oMdJHF0jdhvwN5+y
Fy/CLYn4k3r2756zSj/Md7sUP72jGhP9wyCWHJoZefUwK/QTYSZptMM9qBJf
0GBY/JXy5+coYS0HHSk3+U5AlGKecPqEF4geRL3oEiIzZJ6ziUBleEVMCM1q
DS5iD/Ih/b9M2p3UY4izuvKThJyJ5xhswvIDQatyrPJhwL5JJhX5dt/vjuiz
LElRxfnRR3zO8qmXQA3W+JX73dESiyN8+AqTp9M8D47Xt2oE4odvYmoMIRWA
+vANXNodFmAe1xLPoqK9mA+VrXQBO4n5n8KWDjPCVNYskm1hdkDEyZQYVtLk
RhNfk6ODt2291WFzCJB9eBnHadJADo07FPm3XvksHg+xsz//zMRLQJvIL6P3
KRfZn3+py3hs+DUYF512u9lVnYrIk4huUqecogFWGjsBRe3DYLMcVHyqpWdX
5+RL1vQolAQV+JMNggJrnP/zP3gQ9SQeSzit8lu3Fm15pYogpfiHG1FhjlzU
fWHfj3qTl0VhHx50U3g9apZZkRoGvfQgake85d4Gjd543zCr+HeTB+HgUysx
gOh9Z8lyGTW1HHkBylSU7aLISMi7cVwgEWPlKQQmjhLaaRYb89oWg12vVOMj
LDfGWcnpNGUVQLw4OZZLo4QF1R+uVuyutvQ8H26iqhv0dnlJ2+aunl74OnHB
eYRs6cgyDx6wpoGQNma1RIbwEXLgipgIF12mmOC2b1jzxQcn5kGVaPCGjBqA
nbUKiYnOD+5s9aLh4SvVl4RBbf6OZIeAuDtW6B4mSKSo2Q/fxDz9RB3kyt5b
ziZIuT8y8BL3zh8rygZeshp1FrVqMQc89Lf1HjZR8lgBGC8BcLVRuqo2vSya
EDhSHCuRQKnSQzmsxK3CiYe8NZZ32/oYjEhwhAlpGghCpi3c5R4O09z4sKgB
VANkb8aX04d6/cdxG+UYhrK0d/twB70ysiiWRCVU3JMOvK16U1XmlzG9urnj
+OaFrjixWEQpXR2C9AWdFN4UPXigYtG0dFtaLm184HcAboYoCNCnVYgK3AM+
r4MtIx28zi194iosElxQaeDWAw16NglL/te0Ow7uF1VXgRT8q6gS3mXHIOWx
cgozng72ujwW6UDao0drHhC6OdBWTgz+0JchduN4UnAdU0tRmRgZbm4Eb0uQ
NM/Zm8C+FTXjqVYlcdc2wpMo0aWAB0auQkJQLRqbc7uDd12IHIUTYY9giii8
epqILYahFG2WPeXXg+0cAwdOAXfXWDiM5Pex32MWNowdh0zRW3YSxnGFXPtR
/B4LnTlBssxfk+akRgy8nRdfUqIIUtaTJ+OL2NESRVOijPEj388tYqbKpiJe
/yrHK1tWELtENBOaXRcc4UjkD5M3l8SK6KT1CiQt3yS7owvyd8DQJ9DvPAZL
RmYY+xasRLIlJt7Wclx+m/TVBCulvzrFh39JTmBkBdiTUW602+MGYLykXDnl
SmM5PIYhrK0Ntwrd5My+YzUwD53wTvTmeBZ9Z+2vX9puBPI4rOuOCpR08Ayx
j7A0zHx4qWcySD5KICCX9DHUcerHcffJDBAfieABsSts+h5ji85eEvrAIw4Y
kxCetONeOwt5g+Cl9H0pviBLCAeprHuYyY/R0s+dl+oTysUbSMNi+uNbsir0
Jkpi74HnxzJniW8VK0lYPwjlRZhnk2VzFvkVvAuI2DYQGrWJrFeYZIK5nvNb
z1b6jFW2yAgfTASBMOiBt0wjVM7v4MXvKaxj/iH+LIZ21AtJIp1x2qK5L7jx
RJB7KK98GgOeJaDBKA+ppXBf5YjGCJolKfUoteMw6vTEC9WkfoQv8PfTkHTi
utobimLziaJTWR/Lw/a+fYVl7L60Db5/DQokbsNyC1CYMarPeQ+2590XgDSn
ou+Bwqt4QeFNdXxykeCo+ETjk0+nZ7GObPV6TjFoTQzEEVvv1PhHehJ4pwBS
UDWla04SR7De8uJju7b81S0M5xUGV2x6nayPp40bdAXzYAsbRDhPhlJbjVvu
m6x4fx+8xFOtvAcM9QJSd7uL/XbHEdBvNe8+lg5NlauMP/8stCgPM/75F9Xh
USs+iYAn7Pr2kuoSrm/DmDo7jfbUpLPHoiEzRkjeyDhTHHkRS8as/QxRIyqf
RLD9RP2dqmJF6Fe5rKRt2GkCBA8ufxuD+otiMEoW/C7+EM8HpIQTmSiaxcxt
l2gtZ6+oWF1VfBlk4ONMhc3KDXR88RIbO/JoPzL1Od93d7K8eKle55cj4ZP1
HHUdUgvwU0D4UlXkgfaOhBA7uA6G5i7swDv4Szuy1EWY5dOlV74u0I9RqC0S
EDIzhHePdbgT7KWHlDJBZmDMUXcdRPTJWvwGv5TnGS0FM1hnFr0Axqkdf3KE
Q+rRiX0EzpTOPsPlkipkLfktfskvcuahGnegWIw3MR+afoBLbhEOzeSAezAA
bZawCPYrG16XEYNSwkBnQ1nHUaZsQzT0yuTVZPIgqV6yqMPRMaGCAV54RxlD
ZSID1dAC49J3ZLaQnk/jVjG8vtXAT/GjNE90tBbCKUbpqY4jNTTOmPE8CTIc
b+ZcsvkzGXAIh5EMOUibOHwS7WYnejIyk3EL9xq/VvkQo/xcBnPXDX9X081b
ZCRHJFlizybct3LcHC4mbMZFdqWAEAulhjq+6MV6K79MdGVIz4TeWewFg0Qg
JuaehYgeh5gbxASD7r5SlQ7crVNZPzfew2fwIj8IlGoijp0ATpTUjrzIOQlc
fGdpX9hr6e+TKUX7d1yMwHDflbboJMTC28tZuBOpNDe8wdhj0rofnwtTKm6m
h5s5ucv+zwdrQzM+05TSJSXi+T/fSyLm+fYZ1QLRDdHAYK3LihiWHrUq/QTL
/FV+y+UgXSVZOE7TKxZcSo0N0/QoJHVD+oXpA0uk02PBEbRvU2ElykAJtya8
NbbB6jGdN0p/HuQ2dr47U7gygehyoGxZT+U2RfKHumrUjYboxyX3skcbHSh7
7LjOFtwBOsPAek+flQR8bDXsNXtNdTwj5AJohj0IvExr/XUc0RFtd9hEBOFL
CIMUyJhwknH3Urdn6ssJuUPop0W7NkONGX4ZfaeoTlx/0TPYQZE7FUoOP6qL
k+nHZUQFP+QD6rJKbXDRXY7X9mSZHNGby1Yn/fwtrrRf0qUvvPylVJHSz9+S
8ynW1TwTTUjWb6NfU+gfzpm0vwIqK9jZNdAinuttvQMYDMHZClGNi9BfOYmI
7H0tyuFcJzgPJGV/kgTieTGxwSiqv8Zn+fuGc0eXcVMJ68kc0I0Ds6AnssiH
E3zjX1jU//o7GfL8+RB2xeTaca5ap8IYjD36iyzyykPwjZmF49qNmWMMxm6l
euWz8zTdnB1urh1tvOU7lWa4DObD2dmnEo/v6TvnibXMrHkgE54nMnuXLEum
oovTVLm2qDDw1rGb0y/h7KIOiSiQE2PD4oBkPjaQLkj0Kmpo5rhSFqvhsKps
ARd7gBpLvwdSKHuaxS5EEB9BMU/LCVRlflxNGF9biv4RdRziUsTY8nlaF9Eo
0gtM2ZdXsFY4FFC7e6zJOGxWfLs07Vbg7XepJlm8LIIUiD7s1JPJxe8QJlX5
hmFfyw0f9Ilo1KDJ5yLX/JdOi9WYwVJbQiiDu0CfQCQEEe03eUJZvERkM2Fp
HmQpcJyNQWSHOOSkHQFleebjVLmds9h3jP0c3i4+kHgIWUCIA3S/Yu95EQMU
e2R87eGxRFympACFYiV8hK9vuh8WNR9qNQUuJehjAiOSQ6rMyJFB6ZtJCs3F
HgLF4Me612BvbXexIMZ8fMktmht5Olc1smmEqYM3xSocSsunl94VGvW6oIG6
5EXvFDnAnJjG1tlsHLmPlh8+kCr+Pg1nEG+bFK8pcYHBNLXWUcQ/1t0HG2Nb
QWbddmY9aVZwgMhD1KGa+HDmoYewQcyJellhzoX4icrnGc4QRpFdnk53RBXD
kRehDGEdH4RUo5mDTLAwFcrxPs4Z1Vi8YEf2eubFMxT1Fykl2qceVSxVZZJR
tuFDL4FSTMOoNimZ5mYnSpL5NKxQSSWNNQZKqIYITq1VZTWjzl8Xq1EKCxH4
aRz8QKuQ3uykAZwHD1zYu8PKEZ39DV4CCnhxdrCkqJPiiXlKE4Prwyuww/nF
1inuK7Kp7KdojGaVmU2A8y8NoJP5Lwb9bdLfLUCB2TzVjV9JAKsNIkCEvNvR
IXjqKa786pvx/FxezdnC3EsZDUr85s8/s2aVdbD6VzMofXosbLgbS2xxBqqD
KssbTFM/GLUDxJEC6ojqyQ4pscYLyKhvXLJhmuyswWNoFHRaeDfxnY+itQ9l
wHhZzK3U2bqBh6ji7FflJK6yXlXBXxU/xMbOkQoLkDqn/kCdU9l5uAVBbsLC
eOdeUnbnexhzlM0el+1FFf5aiohfey8/HKpx/9mxXKvGm7PK9JazxdN50RJ4
315YV1X4h85twQ97/OuQyibiEaPwuCiyC/3tVO8w8vWVQt907z7Rv4wUBMz+
L/REdA6O8ix9/Sfs7IvTUg48iB1LJE8/EOHSOx4f2ovjGuMt169e0DyRwajN
J1lsoljx7cUZt2HVHhHKEGm7GLXzXSkbYKNdZi/4CdLYVhxfyrY2SBOxg1r0
uZXfUQ0FgohbZmNveI7BG3x7bSbPzlDoIEZW45yB0Y8hnesB3ytHFvEO4Any
md1u+NajrXWFBzmQg3DELkeTHu8XSd3R+cpAn4amyhehdcXa7W6/j8hBXLrW
XkVDeJOyqzFqpKWZljQ2Ed86Lgh7kSe4/KBOztImzSJw36W2H4rdUMnLCc04
jPVZpU110TjUlcYrPENec9zdQbiBfL2pW2aFoYV1nLyCmHsJ4AdQb2bsb+xG
v4rnF4flO1uETOktwFXAwa4TbBm1GRZCgSK7sbUoBFkaf8qQqJVKbPAiOEsO
7VKclBPYm3VNFBCqqynMyQt4TPY9hqnKPQyHHW7LjvaF01YPPhHLXV7juQ9S
41M9LnyoeevaQvQhAq9uK88a+ZXHNn9lLy0wROBfnoOkfPuvTE0h/Qr3wrzh
KnC2Af9EHPEr7uc+uCTYUc9YV9qeiQLEkoMw0yAkAC5NckDsOYhmCAJu+QHP
dP+V0T+E4SQ78kcP/NEW/HPwHfgbBBTfdyG8OFU4qeotPbrEwHDnlqIVwk1b
Wl10xPB4ru+OfLbB/3CXVhRyTbUcp0aMyObSnA1rwY/fOavj1LpASYwSjCq6
6Q5N53giky+mQztYVzxYbPl8xwe2+LpBzGHCbR6efhPbfomFK/JcXxplrP00
NYBVzs1R9t8L0Lg3hwtyOsSFdxVodXo8+RrbpBDthFb2UWuP2NMLMCComBDO
R8SR5eap8It7bHINnwn3DcfkHQnh+EtJ2dGkyug7xBFmLDNUnvj62Wk9w/xS
ak9P8+krSew4NYiW0VqX0f8sKgKYe5IPbs4inb19fmRrfimyTVcOTOCYwr54
gDbf0BB2WZDbk2hrg2bvaUhQfQv4xCEL7MM3eLxCaguUKl1odKEOyYV2AsAw
xIKijzd75jGa5HPi/mp0WA5XxvFjObCpGLbmjzfp57m86HAWxYPR6sg4vyj9
7z/Kvg+SKckY1zPvu2VgNOJMS5cej29xKGk2pIMIvwQjKodu8ZUC7DRJn1WW
RdlYj+cQb4Ffk1Ec9I8f6YAdvuuInEVRbprqpRw+4fPhiapkKc10MyBLQ1jR
2LC58Pye+J7YkHejYeDK8iXjY1x8L+31ZHuXxzhrB79MdA3/g9hQKVCgQZPY
IlsOJbJ2rYGTkb8YqRbSyeMDePMfDNFgu1QpZA4+Dd6SJ8UlOoOIEZAhHl9I
IU/xM5ZiJ/lQ4xViHXnkVg7Y75g4eYv2uokWqLGDoez3O+44UQMo4qBieE4g
ZIvSOFzENTLxjDm/OEvIsLV4MqJhvGO4VHb8BGIijhhDyCL3PF8p1sHfVV8u
+kbtefupXEQ0PwERyabm+QsruAei7DimjCSmUGhkHhm1sa+s5V3RaGgwujPU
6FRRsQAscXjGih8sS3wqj1sF3ArFrkkshL3kIykRthwRx0l4bi36Evx48Hvh
D565kTxUQ54ImKyMwZNT+u22cuYJSKA9HcMQdiRXhVR4VAm2vON9ZYmNaE8T
TlY0A0Bl4ti1H+zNBpymsDfAdXg4N5g6skoXBV7ktNfZCM+seOfIfqni6AJV
ekWR9xBdAXAVFhj5d1JEyVZman0P301khaF3/I0yPqJNA8WMhLepQzt5jvED
j4XE5+8E+6I2+aGGjh6XjulblboY0UZDKZSRZ1RxoyP9cCAimCLdK8+i0h9P
Kuts5Jni6jkjiTMaohKpdr0lqqOA8dvSdIkal4eBbmURR5uWBepgJdN7VrKr
VJ03+NVNSZ0+tceVW3wT9oOywz+K8fHD5aLge2R5Ig+pO8uxdDH+Ig1fKe9I
chO2qZFZKo4T0jxe8bTiO0niJ2uh2pdHvZ9bQYDHgEUH6EgCEVdEjbzlbqz4
XttkpqMqA+1OThvs8v25Y+fSlGhrDcxfKW5aJplI27tMElMJQ8RTrE/Ywiwa
mK6TmaL/oozsZ+spJt6eai2WqUqye4ulmG/A8LBg7BAG/+h7NSEq5hdlWjWJ
gRZ1bKLmbMohhIrsitNbNEEYkuFH2pRa3sjlqyEf0AaDnIqHqRgikRCjetiw
VCZ+eHzYMoHi5CsK7XF3dmVHTvh5lFmjY8YUgYC14Wj4VipnXFpiNvrqeg/v
Q+MjPPjZ581dhCiS1h5OQFgj3NJQcngwGCd+aCNVIuDLRMWscrMwJ8QR8VE5
deAJp/HgLtVyqPGwKnuSgAjEaCuaVvImGfKXadahTMQUhQ9OoxPdU92PWnIj
E8E8/3E8/8ZoyPupcQk/BV3s06Ne92o5ks5IU3Ujl+VRMbARHkDHeQPmQHsP
tSqeWz9LG+x22Y2DYygbJ1UywekcQIF2nqLYOFsn9NB2cc7hy0BmdlIGnbYO
K2rAVJWN4V2c8yY2D16OTSNFXthb72xGxlx0RJY4a1bglzAmWzFknCnEbq0g
MsOrKq8kZxfiCd8u8SGSZLIESRxbIIZqa6xrOn6RcsDImIvDdldz3BqAqd06
Pm8SmzPeRnK84XpTBhoSLbZcBGIDwdQpiyquIS2QjbDGbT9c2444m1vKMGFx
4suobPwb9pIvcyxYcVaCVNjOaGXvaoG9/6g7a0usan7WqzTAYvIinl6nIxBx
TfhWaEWRax2KOfgagaKJ4Lh8zy7t0sWawRxRyE+b4Uu2Gvqa6bQ9D/VIP14h
JR75qFJhY91h6SnuVN6FZ3Di8hPtV8mpnF+EOiHUBwGZJ1zwa2M2mRpAlBVw
V0Ej/INAnbB6+KUbHZGQfx4z2SnpW+TBSeEkSDDyBF0KxHDP24TRUQqUzVP4
WHM0YnSs0BKbUovWcPL8aD6AePJKcCU+pMij6Agt3vwMU80eZvZ4PeLly/mL
CT8A3lQPlL4GjAXXFh2wwGiP18G1eRtEuQIteKva/0WGi+WxFpLL+Q4AtV2Z
J9vzwgqwuVD05Jl28vhjTBrvaQM8tfXjNTT8xVKDLOz9LW5bT6GQ9ivscb+6
rxNGcUHK7crOS++n8+FrcEGo9ucK7rultmAoHKxIv/FjnRmudUQ0vOUOMLMF
DKCvIMIVJEywlEi0h1vdWGC6X4X5cCynk9EEJYqvjpGCiVbsSHYUlRvM+W8c
910QlqxIKQyj4VPFNUDV1+JAaTzlGi5u0ONcHuSJ8IfwaGM5kiq79m5Rl1TZ
1raCg9j0g1L96o67QA7nms2dELSufQV2IUVgyAgT52ZzrcTjJxi0O7hSvysx
lJnoKCXoLEP20XwFqomY9LFGYkg5lDtsPyhupe9jigD9bsROLPiuY5fwbMoM
HSexKyjMA6aIjxuHzBs8GZktNw5lmWMjDENCslhwIR1QwLIb6Jfl2Y/TG1iP
yuoUXSCnkx/ejOVCTRVhJVYoAOVJinCNqsihhcn7ZsEirO29GvyDD/IjYTBS
IVSmfPzFyhZwpFlgkcktSM6pQFpxKsOycdPyb7YocdM2MQl4TWpsqV7zjiK8
MYXLgzVDcAh4C8Kw3IWnZ+TR03RjeBAtJlDDIwASx9NGpWbafCSvfSP9G5WD
JdNXdIg5CHhyiFCj4JkDiPs1OCTo0lPwenXgSSx6LAr8hL03xNG+US00XBCF
HakD2mizG0WQ6CxfEgV8Rxunu8xL0kG/tBCFcW0tr+VKCA8xVCR2WGOE0aEl
7ZIYAV9uHC4+8IAFeO0GZgQjoz2DCbt2a72TPMPD1yGJaUOY2NNQT7fEk6In
fixxOLgkWu3EcbFMChOhJ9gPl5fncx0nndze3tYde7+uez5XWXsPVl146ZQH
ocbS8hHzl1KBun5GJztTwx3cQEMLOtrwqMTSVGJTVxMxIwy53zirQ9zeD+gk
ZpiAeC836sQjIQvFgDryoNy944tpqsHTtPUZ5YhwgkaizydnKMSnGII4RqNp
yp4yF1jFtSRvQdzSrDfr3EiPQrEqX22AtBtmGKIXobsC/Ue8aZpqTUTl21q5
n2+zPld+Te4CzPj5VVn4sSKvRxlDmltRE8dODTBOmRxr0+iGn43mY42BN7nl
60B985iKqbCkneOBfkyj35SfYQitx8JD3ghapyEt6KdtdNvyc7PffJwx6GJh
oVIII2FkuuBaJg1F2erkeEnT4EOwtsL9dXxP1El0Ll5K4JwWhdHUAeqm+61m
WuqF5HX9EvhVmIby32/lyv2VidrGcfzyo40lXAqI0ZDtm2bE8pzgJpY7MqNt
xK4bne5jjuX8x7NoHBwvZqPfj7+zbyDvsV6n01Cvtzud3iOORSwLZTHCu0yz
0YrPv9XGNWG0jNh1o9FpPtVYWmIsbaMfmz+SCAfR7Ld76nWz12o/+lhG1hU7
6UkaGUa724uPpd9Fpu31eqZ6vQmDfrSxZIoOtMfvJTlIH8JT9xUdSgCG2yN+
PFQr2rIG9eSqDp+IruCjYfN3LZCiExowBHugHjWpWFdgL2vouX1UjPvQ/s04
3jJ0uNDkvBIGiHwDHdgkalJEVIMcLB4eoDKjTPc+oET+isImsvVEtCVa9ISg
kI3cksydfO6w8vt9J3hHsbFE7Yrt+54fiKi5qCAuPgcqp7xD2sDVKH9owdvh
E99hSlWEEis3hw3a7JTncOyA6nhCB1UGQxIhThGID2OOW2tFEQ9ytC0sG8Nj
VSjOREExmjl2z1cszI1tvbOIRNwzpOAHks21NxIZ0faEMF3qW+t9RGaMUlOL
8rusHLgaQRC+9sjmWwqwUDvaaS3cHjp/WDomGG2nOAQ8vLJxM4UsOKF+Q2SG
yc5EPHQiQzx0kB2vsIwdjyUDuB+jQgklBJaO0DpynhjxoGau5AmfDV8P0ysG
q/BlhWeYV+aBPgy33fAWLPataMDiO/T2lSgwwy+uxXkDR7TaprHA5Any4Kla
y88teizwwwphsXfu+EJuhZJ94ne8bxz588rI6nJD6A6VJ25wt2/R25ZNwZVB
Kq5xPGmeLNayXYwwRVVBvFksEOOGKlJolzAtMQqm8U0HtCFPdE+nOzHAv+fx
ekowyQgj0LXKn+FJb3zmyhNOauRGYQBkL6oXrQ1gf3WndLxJlS2FrXD4IRjJ
YJhMUkcxTB6ku6O5C5+c/GAVD+CRL9/xVbuxaJkDs4ueuWFsOywyDSunMJbN
qVWnYAu2nRddBii0yePQSzruXHjG4p0c0QARBkgkI8lq7ShWhkFzmhxIYBBn
W9vdRxGJSFmFQSFbnoIZdTi4tZ0rjDJYV6j89gn5qwwc4K3FKhWHG+zFQRTk
G+Jbr8FRVEOCvOghQBZWF/9BFixjWuSPoic8F4XUFB2GyP78c81s4R7NP//C
PV4LXF8qfZAyGI8CoLDJTTaEdgdAtNsRDDMFIx2/yYaHJ+kARPwnhNlMQBT7
RZPleJdU7isLXkCkUJVLpULyBqNKXJqs6CiHUI7ccctlBWJDC/DoE6UMj0lv
Dls3iJhWvBlXgagIUHZtcYSFkkiGNsNGk7x5GDariFAr6nfEexBurKUhyboc
Iko2UEbHNVCYIcMXH51NL2cwMBR2R/TqI77Q5LVIpsbYpgBqEgahTJ6/ru48
TOJuoHcWy/rIuh80uDmi4xvp7vcDBvd3/Ef++5Af6bii0/FamlRzxaQax4wa
WSPEWfGmGY3lkfBCfhY6xpqy8vCl6ph0eHmUsegcEV7sL70Q/VIuPHEts8Q3
JVvCiu5PkC8x4L/Lmd/lzFcgZ2QtnGYsMuzwq7wpuUs6UfGfMaNHwq6UVp9t
RsbnmJGZIX/zK/zrD5vRZ6FR83PO6IlppNNLUlFk66a4Giino5QujIpSsvb7
h+ikCNhnUkK8/Xysgfybs0kVC4qqGJQjT7GEesKNI+GpbI+rqxqPpamE8/Xh
w4f/+l//++PHjxjp7/RoOOEOSao5E5vr3wb246i3Z6LdohOW7/vzFNptaw/U
V0zBId2ELf1yxxLJGYVvOTB0azdh8z67pvyaDeUNNkdTf4y6We+1GnXDaLZb
/bpRh/8LxwIrJg6l0WGwNs0hA8nZ6uHfsy5rTFjDwOsNQwtFLrk4qDI/T6Gv
EzQa8z2O/DyN/LHk0IjvlOSCZ5lnZ+XSyKy36616M/1UHhQtjZqs3WaNFn4o
B+W50MjU0Wh+8N1C+iRnlKJRwKFUWVBgCJegUet+Y8mnUR6w50ijppZG1Jpf
JtxKzihNI6XBf8GMCmnULoOXsjTKA/YcadTSyzrsQnVXZiy5so6gCGFXEkoG
jTr3G0s+jfKAPUcatXU0eukteY1n8VhyaLQRUDiR5G/wKQ9KBo26ZfBSlkZ5
wJ4jjTpaWbenZBZa1ZjCWWZqpnxZh1De+BIGJxX21s6DkkGjXhm8lKVRHrDn
SKOunka+be9LGN8FNEIoofHNfy2CkkGjfhm8lKVRHrDnSKOejkZv/CvLdf5m
FcYmc2nkKVD4IvKKoWTQyGiUwEtZGg1LQnkuNOoX0Qjsu7fg8hfPKJdG1gaB
CEodcqBk0Ujvt2ZByafRqCSUZ0IjQxtnuMRwW7mx5NBo/xAoWTQy7wUln0bj
klCeC420cYYRNupATTQGrX/lZVvhuTRaCChFQErRqNhBKk+jWUkoz4VG2jjD
uQc22QbGuPqUWNCOoBQDKUWjYuO7NI1y5eZzpJE2zvA97UwrDtfl04j2t5UA
UioW9IiyzvzKbAZDG2c443mB3JB3akYpGjkPgZJFo+KgankafW02gzbO8H3U
5yI88LBwRul1FELJB1KKRsVB1fI0+tpsBm2cYfK6gDa6GaVotCqijQ5KFo2K
A3blaTQtCeW50EgbZzgP7MPKc++2xWPJsxkeAiUrpvqIdl3ra7MZiuMMypG0
uTPK9WHzgJSKBT2iXdf52mikjTOcuct6qeB3Lo3+9eA7gTiz4M0aYHr+zuMK
6qUSEi+gkVFv1jt1A+3vetMw6p0GPxE3dyxaGo3QWsAPBnlJBuuZrNllzTFr
mHTRYM+SRqY2zkA0KhP8fiiNsqGkfubp6HkWXu5P6bRF/+mUNtnzpLQ2WkGU
LpMufCilx1ESkT2MRmmL/tNp1GTPk0baaMXEw/0utMvUc3ETVvZY8qxDghIC
qbJVRko3l0aNer9uNltAl77ZaDQbjbqB/9fNpC1SSKMh5jb6JjM7rAcfmmxm
ojXfIXoZ/TSU50IjrScsIkqfmIXiEaV71pFlRZQe0YLPzZY8RxppPeEyYaDU
jFI0KlegxErRKNfqTkPJ97K+skyhqfWEL+2NvbvG7aMFtUH5GQ4JpajAqASN
zEfMFBpfWQWYqfWEJ9QOFZMSr6IDwISSiq2xfH20XZVbkGUqwB4xotT8yqqL
TK0nfMACu1WpseTQ6FAKBCugUZbNkBJ+n2YzyKLk50gjrSf81g07jK5ylVM+
jRQouQvqvlXj+mzHp1SNm1ooz4RGTa0nHKNRnmFWmka51t19aaSv4CqxjjJp
1GONRhrKl6eRbk8UnilBDffULVHKLqRye6A0p1ywD9+Iwy3uuQVKA+t57YUK
j00QjxXujQKXxHnYvqjL2EjxkLzwnI3x/EJ3zAs6uZrT1eSZI3h238eC/VbG
7/utPk0Syv1WISc/ZMU/4n4rbdRqLo7ywXNVS0foNftECAoAyYVRwgI1QRoX
mqDlLFADJPHnyJdFUOIiYRBitwxennxHEFL4LfXVuceMUpR+Z9+VAlKO0oVp
t/KU/hzVVBGUUDVKSv9YHi9Pv69IrOnhBoQ5b/2mN4rLrGkAUuBclqJ0YfKu
NKU/S01W8Zoug5cn3500sgJnSZ3bqPvUPjPSmV8hiVBKAClH6cKa/fKU/hw7
MXMoPSqPlyff4zS+eMkm8lxDtCXOPf2Q8vehXbxUgWTBKEfpZmHItTylP6/0
TlF6XB4vT75TSrXbz72Ns8T+d0UzSlM6gpILpBylC8s1S1M6Nwb8OShdHi9P
vt9qeNhfe9ROscD6zqW0JaEUWZmlKP14Fpn5haX3sDxennzXFrmAGJwoMsJz
KQ1TLGdmlqL041lkqYx1FpQnovQ0wsv8zt1b77OhPPner2hNnyltg4fLZTJQ
WW5NIxDNw1oomVUgbfivqy3G0kDRUrqnVIG06U9XzROkoTz1mo7woqf4Z9hB
JruXqT0Nna0d7K3tjr10ol3JuZR+EF5y630Mw4DlbWK+NR9KVjw7Xu8z6bAu
JRzwVzMN5am8LMKues6ixK2KWvbIlNZXpEh/OsrWKs2+smaU5U+HQDJglJPe
xRujy0dOPke1Q7E/XQYvT17Xgifqgo1QGDjJp7RDUIoDBOX86cI+BeW9rDwz
/jNQ+qw8Xp68OoaGcN+Yh7aCqQyQchZZYXlMeUp/4bj36/J4efIaG3LzsMCG
DuQsSSNNPSFCKQZSjtKFW+vK295fOBp6Xh4vT16pIyhdzHglKH3PmGompQtL
R8tT+nNUvBVSuhRenrzeZ+bbwTV2aMWwaNkZpSi9FlCKgJSidPE2v/KU/sLS
e1YeL09eNXTmXjsLh86lFsu7xIw0+6IJyrAISClKF5dIlqb0Z6mQzLPIyuPl
MSmdW4lQEDcp52UVxU3uGznJ0rIPjpyMsqA8rZdVFDd5bEprKxHOztmFzc8O
y+9UkL+mV7WdXXN2WAU42njLd2W0fSGlM6OiD6Z0NwvKU63p80KMSCiPSWlt
JcJw/niUtg57z/W23gFYNzhb6eDdi9KZfvWDKd3LgvJU0dC5gqp8KI9JaX3/
EnVN3+QEGu65pmt6WPeitJlF6odS2hhnQfltrWltjCy2pj+R0sk1raH2/Sid
Fct8MKUnWVB+W2taGyMbOd7W3vvOMmaTFcwog9ILCQtBFeOlmNJlsHsv6W1m
QXkiSt8DymNSWh8j8231hBZMvmBhffrosC+Wy9L4XJ+Yy2qlofy2KK3v6zKe
n7PXHhvTkZ4lZ6Rd0++c9zVvGexqrrfMBHaPNd3q4cdCKFk7pVJrutkQv+qg
/LYorY2RyQ5W8RQ19QChqWtnlCG9/7rUPJeNl0LpnRn/frD0bmZB+U1RuqWv
RHjx6uzVlI2tXXjudvGM0pGTrbO1i2EUUjp9Zo52UZdZ01k762ZaKL8tSmtj
ZJcv52xmW7j78ZP96f0mWHNQpaAUW2RZYdEH296f25++B5THo7TZ1td7X1sb
PMvaZudWENx6ftb28fwqYAmlAMi917Q+TPYpa7qrhZKiNO53LHWAWX4VcHm8
PN2eW74vNrbjVtn0ilspY5N9yGG5YYmzsh13fP4pJ+SmID6vTblf7/m5/913
yaaYrMSZS+EafepTCYfuXblB5Vf1FqbZNFCy92TUC+qFCqVxK9qT0ciE9Vh6
98lPJRRtc4CfnBXn+5PJH08LZpTR2612w6HY2U1bCmhkNutGi9q5ZZddsxI0
6rBOl/UMPNGBB6kaGnDPkUbazF+sq6xKqTcJSuXSSO0qm0up8jQqWxlZkkYF
ldfPhUbanN2Zu3JunNUB1IFKobPUWiqouJBQCtZSeRqV3U9UkkYacM+RRtps
W7ifSKXQVCPt8vcT3dSuDs7K3uD5KPkzKkej/A2hhTRqx2lUfNbuc6GRNqYu
k2Ts/MczdnIBf+uUEStaR6vacicyojUryO7Cdx9fXbs1JAWlvK8+faLsyZPv
y9PR6ESp/j+NxnJfGukS1/ejUZa8ezCNniRG+uT7rC7srYeB67NXvH02usfo
YF54iaO31BmlflT3QuzyyJpRPqX9YIdvri2dfLwUS8wOtw5zzPhCSneFxDTM
yDpMmfLPkdJaC/5xKG2/PRvnHWWihZJHafvgLLPP7L0PpbP148MonYT3HCmt
9QMek9KvLPewtqgj4KeuafuQd5jIfSid7U88jNJJeM+R0lpv4nEoPX9Vm5x/
S+mPohmVo/Rqh/mPMlCKKJ3tlTyM0kl4z5HSWp/kUSmNG72RessH1xwplMbd
9Jl4KU/p7LL/h1E6Ce85Ulqbm3pUSgOEtQPPjTBiAEB0MypN6d0iBy/lKZ3d
z+JhlM470eG5UFpbAfh4lJ6XEN7lKR08lvTO3n/zMEon4T1HSmdEKx6P0sXC
+z6UfiTpnd3u5mGUTsJ7XpTW5ZuXu1iuWZfVLZliDpPA4SmJsQzz+T/fN8Oc
B/D3BPPvCeZPEXnPLcGsDX1Eg6Pejj74s85SqdbUihmd4PzrHtY58Cn8lTuj
0oHInPzlwwKRyRTm8xKcOclLWBA+e+0RYQrGUkijg0twqkx8KIBSSKNH3g6R
TGE+LxrplNvurzHlplEoJXWbZvuxotrOhvdVbTnwftdsj6PZfkNKqnDze97i
emolRXtHyo0lXwBaK9o5Uo3tI8mFUmLvSImxlBaAfO9IBpQvLwBzlNR4KNJb
RYxTgkZLS4ACc8LSQ70fjR4164w0esZKKqfCBlsZomm33ekDXtoZZdBoD7Ak
qCpTf9NCKabRo2adkUbPPeuc0W99CLqBTuzx8o/zLbWOCkHdj0ZZ8ckH06id
BeWZ0CijMgCrNl5ZrrO2g+yjfFkpGvmghwpA3VMfZaT1H0yjYRaUFI0uZniQ
X6+wwfPnyOmLLrlveG+f3LEU0iggWLmg7kmjDKPhwTQq39XnC9FIn6PFdYSO
7bogJFJyHRWAuieNMhTSg2lUvqMD0qhn9AoPP3hSx9axYo5t2kG43+l8sSb0
Mdd2+uPbB53RlwHxd+f2v2fY9hGWQurwvDInJ6SX5Ce7w4VbgkoMrmhDkASR
d7BDqe1A3fztQOU3A7UzNwMVCsu22SvqYfwYojI3SIFp5jkuC59OUcjKQxap
sne7Gi0uf/jA9GNckTWz4hMPi882Y+GJ50YXbWAC6TLeOJjLyMsPl6DLkqA8
Fl0ytPuD6WLqYTwHumiNvzHo4bDhT944iukCkHIB3Ysuj2n2IV2aehjPgS76
LT5by9mgit6Dt0P7e3ibj9PkOArpYiOk8whQLk4L6ZJRBfdgurT0MJ4DXbRb
RkoG70rQJR26C+Jg70WXjB6HD6ZLTw/joQGhx6SLtt0RJSceRY4hpMeTYxkd
CR9Ml74exjNYL/og3Y+2v7B9L8AtVq/PLlUbIAsfGe3GwBep/Xg+ztb+Jeli
ZkuxEnTpxuliJoUYK0GXVrtd1C3+MemitZOTdPlxot00U5ouP64y98jcgy6Z
lbcPo0s7E8ZzoIvWTp7Pf5BrJH8cJfyXJfj282t7s9EDvJ+dXLwd9z5yTG0K
VhwoNQoDpY9JF/2h2kAX4Vfmj+M+dNEDvB9d9A7Mg+nS0cN4DnTRH4F9cFcb
sMgQqXjsYuY4CumyIEg5gO7nvzywlWUGXcz7+C99o1t0RsVj0kWfQH01TlQ1
RkdjZuAjy6/cLsex5FceTovXywNbl2Wtl5EeRkbCR9cZJDGOx6OL/nhpoMuF
GgXWkqUkXS4ekS56B+bBdBnrYTwHumg3YCBdhv7yGs8czNEz5egiAWXN5T50
0TswD6bLRA/jOdBF6+8jXTC8/73t2jkrphRdfvz+8dZLxpnsD9YvDT0MvX5p
fSa/Uts28d0h3TMxnoQsmRDlJN0QzWOp0O9ff7xfIlQP6TOlQNWXf82Zzt9Q
GW+cH+7z86hlvDWtJ0P4pfNPb539tTCgp2cTzVhy5ADINM8VNrPuYS2U1M9J
XKxhSY6+S1IulEy51sspyUl1/bVhSsAfB2olwda+t5XGdML1fdSSnJo2CpCg
0Xy73729nPVeWc5m4b2PjaWQRtkPl8Nuikb9Eo2sUj95NOpnQUnRiCRTmZ/H
pZE2gpag0bXlr25BtLzyVoeNrR5xXIJG2Q+Xw26KRq3HplErC0qKRj+zv3vO
qsoWd3iG9y/6cXAoj1nGq40+RzQq+Hmsotfnhxct7/rrZc80SyDmM+Dly6xp
fZXC6vW8DLf8lvGijbKtHN9eYv36fY60fyK8lCMQe2y8aKMpB9fBekzZRzDy
/L4AXr4Qv2ijGQ4dWFdi+9pnwAuXt6WgPHnDSe6DgEu2yjOZ2WfBC2qjklCe
rrz5yo058zHHqaQbj7l6fo7JcHOFcZnrbcybD5wra3N139pmHdTHcOjDtznu
cnNYAWcuwEhhQfg6K5oEuskuWIfRl+D9eusa/Nl5WPmNXVqUBz65ajoa7W+o
gvo3FFfgrKVl+OI1/FhxhZrZTunCi/lwPh/Wzn8cz43ajfGXtvBbfxjW0nnj
zFhpcG0ZNXyw5gdWxPXVQtkW+0EoPwEQGBMsSf9uh/TVw8iHUkuDKQElFrlN
HZ1TtrlYtBIB2Ou3L19mPpUHJRYB5ptf8o7hCV2+Rrb+mXju8Z4dglIm2CNq
1JrmoKTpeDIf5nFaFl5iXGcvV8BtxHYAJR9ICUo3Gq02Hl5ZFkqM0sNFUFT5
oYeSonRfVsVISo+nrDkRB2FmQdFTuo7Xd2jNgXaLdBFJ0gjKk/ryCUqbuXU6
JSmdD6Q8pTNryJNQnojSQxm3SVO6ZD16MXljY3nS6ESC0s1eXiVDSUrnA7kP
pXPOoPjilC5TIfIFKZ2KtyQo3TbKHsKSQ+l8IPehdA7HfHFKl6mZ/4KUTmWd
4pT+cWpkFHukZhSjtLOqKcQG++ydnQ0oh9JqoLyTlUdPQ3lqSqej7p1yWfkv
SOlUrDBJ6Vwdex9KZwMqT+myBwh9EUqX2c/35SidrlWersAgNzJ2N+ThJUlp
AajKPwP7ZMLNpbTRwOPii/fqfw5Kt4nATaR0p8265Q74eC6tVtLSe9Vq5cjr
7BmlKQ2AIjrnQC1B6bzFrIHyeShd7oCP50LplPSWrhXJ7x9eDcd5blJ2FMdC
6X197u1QdMPjteuttRSf86DkSm+zrMf3JaS3MdRDiVH6PC92W8UT8+z3INkJ
+dlxqR8nMwpzAnWqLLBtXijZb7fr7ML+68GJnQyeCcW3l86O9oTsDouNs2TB
3trDPxNnDVSs/WBvNlvLZe/su/pjc10qiiPdvBjXZblsJbkOHg+5TgOqPNfl
7W/44lxXpvb8d67DN6dr4aXLGeO6LPexJNfB4yHXaUCV57o8dfvFua5MZf3v
XIdvNlO2VE6eJK0c8/IkcHfJ5MR9chNZDdFyuO7xchOjotzEqCg3ca+fx6V0
ypbKoXRaIeVRGu5+CkqX6hj+pSg9fsaUTtkvOZROK4E8SsPdT0HpTE/pOVB6
8owpnZnlns9LpKIyKe0HVgB2wy4IyBdWgBZAKaR0ZqAhk9JiBlX26vtZzYjN
CjSutdm/tN0ruPYda5q5lG4ZRZQe4m3NVraeHgK/zGJZ6k5DwILnwb3moW9+
gEQmFM5OQwPtFIBlDPPGlQ3FQPvnccZimSIRB7eaX1UsyEzV9ulWQGZ27atZ
ATCD1Aqga7EVALR/PivAfEYroHgsygpofl0rIFXFqVsBmVnHr2YFwAxSK4Cu
xVZAp/WMVkDzGa2A4rEoK6D1da2AVLctzQrITunm5QMiQLWCtHD5HF/evuQv
HjmZ6qE8E0o3U1VXWkrfOx+gofRjZHPzCuy+OKVneijPhNKtVDb3ByDxC/by
VeERrckZJSltba5q10FQ22yD2rUVXAfOVVVe3+7DayyX0gmtBv93MO+ni8V/
Bkpz6T/K0Gp97HuHjS2MZ0npVATyT6/0RkYhXhKU/gtQ9C/vt2UOqMqkdKPe
qgOdzS7+3RbRiqw+1p+B0jJagVq9wboz/BvMkShU0dBAeS6UTkUgkdL/8ury
/njJovS2EMn3onTr2VJ6+rwpnc6gvhJ5rPmr4rKI7Ajk1hQFV9v7QUlJb6Pd
wSqNfhf1dSNHUX/mSkpyCMYz7HQPo+o1WbdMF8IvUnWl2yvHN7IFsQ1z2m1q
JU9x5tkwbJuj3zi3e/eAfXNaqF/4MJDft7VlbWt7Xhvb9BxZtPgf89xLnQtU
UgqxHNHqB1bhHjItlMJwTykoT5TcWcmwihUZxusuXTeU/WQ5yR1VtB7oXC/O
AsgBmrE88cYTlf9OfrKRdLCM/vM/TrlyDezlDhxX30giJrEfIZxClRcy506p
iNS0HyHnDO4klBipXfi4Gh/8G5t9pwz/JA4dPKt69zSX1EYzYzcZBbTUrQqZ
cbDoGTq8pJHbODa7rsQDYQqCqhTbZEcZN4HH3rnerctAq53zbJflBg5HUBWk
prPFkvMb47HZTrMLpgTbNXutr5nt+PCpR5HRNMEFaEbtiXLZrlHEdm2Mv/Ty
grhk4Gc0Sc6b0WdgO0oxEduF9FWhPPGWnBJs1zaNr5nt+PBVtmt/ZrYrUaTO
PjvbAVoE24X0VaE8aQ+UP/HNHSevwNS88ra2f5fRpyw5o2Sc8U+ld5+U2EtQ
1MyU5XDdU+0l6Ez1IFgOv9zr53EpncoS/Qm3d5SjcwGlS+8+KUHpgt39SSif
h9IzPQj2LCmdPuVF7gQ7ubzF3kYruHBr+atAS/E8Sv++E4xDeS6UTrtItBPs
JI+++hn9vhNMD+W5UDpV6fh7PjCE8pvKB6bPHvg9HxhC+U3lA9OnGfyeDwyh
/Kbygem9J4XOfSZiYj8L33LcnedtzsOwZ96UvrYQQdH0MvFCEYUmqqAmjoq4
t5tlDeUGGlpFgYY+2hNmTsEkb/yDD/Qkt2ZHVh8r0PCk22kenXk1wbU8xHxt
zKuf3r2YN+vQhS/AvCOW9fMcmTdlNz8687YN87fMvPrp3Y95m8+GebNbOj9H
5k25Ao/EvLOLc5E6K/Hz9TFv0fTymNesm20YTN00efDCxEKpwjhZinnbRcw7
FOVOmWPpDqkCymDtGYYreiYZvBlzeo7Mm/JuHol5g625K829Xx/zFk0vn3nV
ur5mI8toKGDekqUEOcwbK+IzmZnbSf95Ma+urI/K7OJVffoiuqKyvm/Y/ODs
rYWzwbMJvTVbOWuqbAs7X7wDgEp/+bXnUydnXB+Oy868SxYAQMt3vKBSwdIw
/XNhYdiHD7xG8CMLdvbSWd9haeBhu7B9fH30RJW53p6q1W6vneU1Vc0FNNaN
LUZhXYlzlJaei+vWcYEkK/vGWdpBncqwfNnyY2P5cDOMiXfI579GpZmB8ze4
CQkLr1mxvcfszcbZYcuPJS0DKsTyrnxrdw2SYjoen1bFuOCqTeV0NBJfnOpR
s9drZ0kdRJztbmMjD1F1HVXK0fpKvCJQM19VmRCh0SqCSdwLb99a72wsudtG
WFnCzc7KwqMrEEFIG4UYhC+qiwTyiVciUn0buRl5YsUWdyB6Amb817/9u2HQ
u80WfAbRCbQOKVfnBaFv5lP2g21hkWYkPdRi0KUX2LIW1AmIGDZlewC/VoDY
p5pBeLXv8NLHDx8cy7Vq1wQVWARuxDuO9O86irgqqhXl9aFvaF1SqSsWjeJM
lGq6E4R3ehTWlBLpgJ8DtvKWB6QVpr19WePJ5/vKXjkWu7zb2cza7TbiiOIX
OMnaElZgbYl1kjBr+flj5adrm08x54Etgd0jWHg/LK1VlR4BOlpUT0qI/gut
8fCouTo74/WWO4kMdkT0PcJHAnuPmDtaXsOSOKrymQWIfZgMNtLBoSD12TI8
bRlYAu+uK6W70cEj9Kq1t9l4t4guZcgfPlzMxp1es/fx4wCWP15yScUqM65U
5ofFPvoqjoBKRfTlWUWTAWn7+sWwUnlD5LI2sW9onpXKH9jYctkCcMsjejDh
ne/dOCt4jcfWB58WpePiWTu8rtVaeId9WF1L539ubYv4Q1Svev6KnqFfiI9C
rMEdCrKCevT+OLbxo8QwgLH4C1UwnLB7G4QikAVuX4hyX1iGVCmdRRiqecbR
oriDefJyXcDIwgH5ewdolueQJ2+Y2yQqohPPx7EbsPKFMASj+/nn2Dr45Rfk
CBydt4PbhZ5IwidikQIKrlErkmAX1B+kQVYqw4g7Ao4l1Cl0W8RcA5a+zQZh
6t1x2YOLGh+jpZHCGkKAsc9864oWtBOds6Qd/nC1cgS3KUwzQEaboIRc8jL2
jQNvcumMTpSxNGQ+WILyB/bKugKByzXaSXA6YJejSQ+/mDkgom08eRZbW9FX
dVwF/KElsIAXXLM13kWLBQvc6S6OXeB9oND/BRiwnA2zxFFJwD5Ygm2BrMPh
aNh+wEC2Xv2jY+/Xdc+/4tQk5qeFNABcvnr15jUuQ6xHXwol5cqvOXLo+OIB
x/tP31cq42vLvbLp3T7IBRu+O5vO4YtSknL3bhkYDSkr+W+F0lI8VEJewt3R
MfL2BVc7ivD8rDKOD/veUo6++X3Fp1c8rXaFvEzQ97Ovdf1S7+et9N/SQi+1
zn3nBk1PudD5r8UrXTxWbqmfw91AL3R8vtQS5+N9qCXz+yp/9npdv9YN8/fF
rqwCcEXlQre3xYscbi+5wKevvtjKtre/r+r/bqu6+d9oVY+94TnyF27irM1o
HIkQDv+KDzEzmLPiKzDihoAdZcc8jqpZ33JjOed7rmnF9tZMwXIUBY4089OG
jcJLV7532OGDUUjxYjq/XB82bOreOL7nUjyYnYy9i2l8z3FsvyuzrODmqlIY
+/02/VH3DCYxFBGsDVuzUOb8yvhZsb9GG5XVuHTh1tb0R90zOKacyBYfQC0a
Hq4uTH+nRAxF3HO9Pg2k7n0hCasyDgkXfOO+kEB1pWeHkIwMSI/HBbpsAF+c
NYzcyoxAmu2BIwKxlf/y5TzmQV3SglVW/X4TfMRgvhoQlco2SOhajN7eyZjZ
kRa0Pk576VtusPOAUV5ad3AxVHcnAOSUTaXwDcI4Ld/Uj80AkqoDQ98YR0MT
gkdzrUhB4Jhi8TSRv0EdSuZBr9ftf/xY56oJ52yvad2LSQWwwNmtdUdaK+D7
zqtscSA1iIosypnwFg8onBwQHzBqVNKT6UXNjvUrUEZTZd7OAlFK1/6Chs//
bdTr5r+YrZrx/3B94WDPAE1I8u+JQAc7ASQc3FsfuNZeJcMgpxhBBJx4/nHA
Xnt7UBeITUSOuvsfzItr77BZITZXTrA8UJ4LZwRQfe+GJwn24smfvmfAWRbb
WBiCDvYywyC/3DpX12AG1IF0txZG1WH0aCvBYFe+td5LFPPb66UbBnyb81tK
bMqGAalD4FE6Lim/h6QJc326hGCOGPw257d0wwCQEli+lopiqPnK/5nMXpZO
K94DLyqmyRJA3rq0ruKCAH6/lyRwohYWRyHEjDyN5y4dMAhHZA/LjM2FzEZZ
IlMDQE4FFCkGtGzyKUlWXiIAL2Gf0lYiYpNPaStBbHI5GaGinKAfdLa3twMl
CVTuJ8xh/wqCdQtrz1mC7Tx0eY4D2J2yCiiexgmJFOihhIYEyg2VHcqM5XFo
FGNZuMIW1vIdMC/oCguTrKlVFQALg9gacrUn78ITIbp9s435IjThpVRWHgRR
KW4GBJGOwAc+fkw+oqoVkGuh9nmzs935/GWCU5UXDCqIGKQv/4Q/f4QlRU5A
k5003pun4Rdz28deK6/JTRkww+yZnT7eY6zbjZVyX7qxj+YA2/D2syA4ILzx
6+8QJXsMko+H0XDAewJ9cRdewB9QHGxkg8EBbPBPoG6YwRqNAf1hZsNssu9f
XaYeGK5RO2gf6MQemPNyChpSw6iZzVqrXZvNarNprdOt9fq14Sh5r7pSz8CT
GsTerlvGg0R1TeyB6KEafDVgJ9h2cuHsT1N37Q6LQeoi/jRag4UxMI1Bxxos
+oOOPWgvBk340xy0GoN1e7BYDdaNgWkPOn09hOZ6YHQQQtMaALS2OWjbg1Vr
0ILPDQTeMAb95cAEOKsMCL0B/LEWA2s5aNkDozVY9Qad5aDRH/SaA3uFAPv2
wF4PzJYeQqs3WHYGvc7AWA6WrUGjM2i3Bl1j0O0O7M6gYQ46jUGzMVg1Bm1D
D2HdHXT7A9MaLE14PHXLcP7a4LVLUeeM1E2vz+aXbPz24o/TAe+5Ed7xJ1h+
N83IRQ/igxBfI+Hfkm+cAj1xrpw9rKpw0dAd91xCgIEWYQOIBTwNNGrCZBcD
YzXo9Aat/sBuIs7h2/4K0dVoDrrKWIzmoAd80hmsTaRszxy0uoPVarCyBnYX
6QXS1rYG7fag0R40lwMD7lEe7zeUV7eREOvOYNVB9gB6rQ1kgEVr0GsNluvB
AvgN3tKJHl8CNXsDu4VMAswJTALvMvr0xx70Fkji7mpgtQeWjQwMozI6cSGM
ph6Yt8yWjqdIpFsL78aOSUfQGE0DltIdJc9jUJoNKiY0gGux2qtngAHOrEbU
/Zg3DOdNYNZtbBaE+28sWfmFrYQqrR68jjVX0RnWWDjWgZdi4S5+NsVuSywC
4/csWWPB2iZrdbDppdmodFu0EbPJ4IPZwIst6j5u2LgLDt8LYJvUkNpQ/o79
qbQt5eZO/s0Mbm5Sr5EmNfrn74LVkhgnAOQQTDkG/ADzauMHHH9HfqAr+N5u
BT8ASvv0lYEtXPGN/XhJnWzEJLCnltQlECub8MCHFi/+bLGFgceQdiy26LOO
zdoL1lzg8FoNpNRixdYwO7sC6qq5RnLAzU0LHwS0t8EJaGETynYD4QDw/hKH
uubD7gEXMWvJWjZScNWrdJZYYt2DRb/CZ/s2s9dYbo0j7OAsjCVbUpF2u4W7
abtdZndwRh1C7ArmblTWXdD9OLUl8YMFk1qLzlT49yJiEmOFXyEJJEfB3HtE
4jjvsTTvIYr6iCJscU5jMFHv4XyBfPAWY1Xp9PAeu0l14zB3PgDgPRupA6ug
02FrE5EDq6PVZasVW1nM7jLAA7zOtmCQlUabNZe4fbQHCGkoL2rDZNm6w1Yd
QdC1gfhctFivxZZrdO86ALwDUqDS7TG7hagGwgGqAbLRpz826y0Qe13w/trM
spG4MIakFPjmm2wTLIxJcWFBPkEoLU6SLuypFCDkc6dtLIfc01v09cHpQE+D
AK4c68r1Aqyl47GQhIR5wS1Wcuspq4APzaUffYLWT6/bMk8HLyogHY2qRpu9
YDfcPCNfOBV/eAHPXR83yCA7rsaeC8h648Yb3XekWFtH1fA+h8wxusPodM12
0zAbjaoKyfX23PbiN3XhLlBG6Zu4vSWH1DDMZqvd6fb6wxEN7YUsW62y6duz
WqfFwelnnaxwDdWihG+ODNPoDEf9zrQ9ao6azVZj1h5NZg1z2uk3Z0bHNJrD
RqtttqeTVqvVbpD+GWFN8NiczCbNXrOHA8sZArCKGo3Xmxv043pubQnDA8ps
sOiRdH/27StuA0RKH+fUyBqFuCmJgUmraTZGxqTTa/WnzUbfNPqTZqPR7E6N
Zs/odGZmu9EzW93JZDKcdjvj8ZQGNB222412c2w0etN+Y9JuG7POpAPk6syM
4WjU6rXGs9G0AwQeG93etDUc02PNptGaDo0+/DftjTqN7mTYHk6bo8nQ6BxX
0toZK1vlokosvlg06RTXlgG6gmtoCuLskuXOSjUppQCiwlELl1cAqF/wuNmH
D8A4cDvcSvv25VupeFQdZMOotEixzEDdTSqdkaqQmU4hV4wh6zTZqMHGuJ2a
fu2jwB6hxK2ApORba8AZAWXYAZndZ+A3wIvaPZKOJnAfaa0hPtKZsvaINUdC
a8EwRhM2A601RbDNmdRaQ661Ku0pm0itNeJaa4z15LOJ0Fr8XTASeB0AnHCR
P2LGhHGRPw1F/kSK/Gkk8meKyJ9MKpMhm4LIH2PJ+3RIRgGI/DGJ/CmK/AlJ
+lmHTaSknxkwBjYiST+esdG0wiX9GFRij01bbDgWkh4ACkk/Zb0RSfoJG7bZ
cIoIgVfnSPoBe23tnRt7c0dGs52uzOEMuPR84JKd5xLTufKZQHkmJuGzRDpy
HM8KwtqugjRY2jueSFvGdQiGnKsxizTOxxRWwpMhs3n0lLduDZc8RRA/Sac0
qjEFkdICcaEfl+5aOU7i8gkkcDTWzmzcbzQbBjzXHzZ740av0Rg2J42R2e/0
x0MQc93utDeddKbjZqvV77QmBLc1NcadUbM77s1G7ZZhdlvj5mjUM0bmrN1s
dJvj9gzeDEJrbA77Zq/XadNjveaoMzQ73f6oM+30zIkJv/RbMGJ43/GjibWE
7Gn8xmVPZ8bGfWG4o8ENgwExM6bthw38PAE4Jut3EM7QREkARvMUhATIqmll
3MR3wbetCZAV99AAippdNu6x2QiNbPCpADlw24ha2wEomAKINEDauI1yCAaD
4mSM23P6Juv1aOcY3N/B1wF++iNEAshFmAXcY8JIYHZTPrC07CFxgWs+fRCr
iPXVJj/U8LePnE/2t1gWbt843iEAmUGSC+TIZnOghAcvtMAcgOdGmyRSdkGd
DdOSCodhSZWYHg+7pTSKzANdWze28gb4NLzybdoXwmRyyFqCsCQm3nsgncDg
UWQSO6G4OrDz0gqI95N2UQQnkC2okYGUTJRBgxazi8TbKSWzqCn0LUbkQzGL
0lgY1JQy4lUdc1F/0sYjVeomD5HOz2sgH2rtzhCGamFKAIUibQIK54m/7SzH
F0XvlKyDj7QRJF4O4oc1nTGNo1R9/IgU5zUdduR8KKHfSmVEPgJ128aaf25e
h2OQvbmFgYtRKCwjpBvQu3CvBCGieIbgn/hGAG4pRQ/zTTUxUvBSDAoj9xtt
E1ONfBdOckxqFlMiBluDgwex5kk33RBypyJIkfmsQgrkL9RHNwDD8zl2eafw
ne/tvaW3CdjGeQfonvzwZpyQpXwqGjdhUDFww1TZRsmnlSQogIBKbjhtjSej
BljJRmsynY27oPTMXns2GXdn7XFnYkxa5rjf7rS6s0bHGA0boK8mM1CXPfgf
FMlxCDiqF0XIk3EH1FXLaINunXRa/ZbZH7WbptmczLrw7wguTDqjxrTRA/jN
xmg8bI0bw/GsD090RynlpP4ifafEC7tGzzCMWXPWH036xqhvzmadXrc7a/Y6
o8loNp4OuwDb7PRmk+7MBC3amU6N7qTfB7u/M2kdp1J3kv3PplOw4xpm3Rhe
5CY3hm7IDLjnzs19Ul2XJ5Skt9mENtkpG1ireOlsQupWbMMhhhrudjZYfu/Z
WAoKXARGqycWQb53v9wcSByu7L3lbMIm89eWj7vj7Ffe6rCxKa1LTjh8TfxK
V+DlAv/DzZ53+edGX1ysAhs/RY6mbxhmG/iu2zaMXqvVMUArwgNdu9vpGKvu
ot2yW52m+em5m+/ezqtsfvndeFhlb74LOcFdwq9vv4uwC4OuYlpFEvm+iR6M
oxoDsz9AkwQsx9xEz8ReUrCyOWj34Q/rw09Gokcd/8vvXtIs7MQszrzLF2oU
5buf9mgLfxWpoGUPQ/CmgeF4Yzkw2xhw79qY2lm2MaECSFqsMZejhdBfD1ZL
TCS01hjr7y0GyyYG+pfLQa8xWDYGmCtqY8ph3c4Yw3KwXg/67UFvNei2By1K
RfSMgdUZWOag1R6s1oM15Rv6DT2EhY2PL9f4+JqyHes+vtTsDIzeYN3DZBWA
WpiYJNBCaHcwHWW3Bzid/pdJBY2sAMgflvXtg/RQx8PBbPhyPtU9LnmMmCsU
e2kY/Q6mTRqTQa+LeBnNBt3ZYNIYTLuYx4MPw/GgC0jsYiZtOMHkT3uCOB02
dK/lxZxYFVX04k5vMDEGHUoDzfr4N7x73BuYw0GrOTAmOKb+bNDoDUbjgTkZ
mI1BezSANd3RvjjKnDEZUCtOoVXpsam7dHYghtHmy0MlyGXb5wEB3pch9YJQ
muvZCoV+zVkNEgf99eotMJZXNc+tpTVFevXiD9VtZccVr28vqWhYvqcF/3eM
brtuNOppTo2emkuhNWCYkzMx/9do3TfRGN36x/gwE9lHkAarHmbvgAdXlFDs
rjDHDCKiCTKkh+k9S5ESNqzr1qBvYEIapMFqgXBajUG/D4sURYTRxRwwpq5h
pTcHXZBmipjqKa+2uvhtv4cLvLXEJKhhDdpLymuuMOVsWoPWCrOM4eMdC3nR
ghF2UQQBO4KEhDF3SFqCYOnBDdZgZQ868CAAB/FSMvuYsCna4NOS+z/Q5h1N
bCUR5iCnJh0om0g99jBE1+2wjsEmXTZqozvc6rCmWUmeF6W2p1Ayke0JKsTG
iAJ+/XgmslMx6Db4td3Mvg189jHeJrKSybxmRdw2pNtGGH/o9nDAnQk2Ee6M
0fXGOAaFHTr0IqOjNDZqUj6pRY0Nx9iYCO7BAAj5+J0+xibx7ybCFFdmCArh
UE7UMOIjaRKcoUjrNk0Ma8DNLYpFqOlV+GxQM1RMkfZ5prPSpBGKPyZdNzCv
2R5in0o88bev/DFkajb80IbrFfobH0ESjHNIwLJJUMkhgR5aV942DilV0WSg
JaU6JSjVGFPecRiHwClFuUagRbtFd6pnIYd3tkXGt93FJHeEpZYuJVx0YEur
V0mcy6KmhMc9jD2bBsZ/jDF265u2cPk0MYaCeVkTlPGMmZNKf8YmYxx8a4Zv
6Y0wlNQ22HiMedZxgyJgbZwmBujGbDZj/TbrTfAMthaFz3tGZUihJOD2yYzN
KFjeb7DRFO8cz/DOGeVfZ30EZXaQeWY95Hx4amRi8A3ELLDotM1wPDxEZrDe
UNQi9LpJEhsTwlVLLG2e5TUmFfUG7P/Zwrfg3xRD6xBRABpchOl3ZxjjgtHC
WoAPwzGKlwZQp8uGE1xrbcL8kAOfxd5u0tuNnihx6NES7vTYhI6YbhsVmCyg
Ed4yJpIBu+KQJjhBIOKIYobAYO0RrlmeHccBq+OfVXgkE3AeS4G3xZDMYRwh
Bt5jkhwA0g/FmCv60257ePOwEZcbfeXOFv4NXATUaQwr4kpLCmSafhnBq6Th
K2oaHlhr0sNoJ9BlQvmW7kREXJtjhDMdYhoEfOI+0M7AqCyw2WRUMekobnBm
gE/waMAuG3cofksCBGOhExxJ+KJhFy/2e4h5kAaw6IxhBQQRJnkmGAhF6kxw
JXaGOBEkfff/7+7aeuM4svN7/4qGXgQElFz3S4A8dHd1r5NsEMNyngw/9PRl
xTVNGqK0xu6vz/ednuHMkCOKtmMEWFig51Jddercb1VDTgZ1ID4ALIgogdZg
SOy39NQSiH0ym0vOzeE/WR2etYj3r2PPiLnE1rueETPLFN/DiXjjrupX//NO
Kid1wOt9FaVOV/zNuocAcvsw48OzWHj7WOPjY0D8qqp/wMfau5SZEAp4c/vp
5uZLK3q8/vPJ6sul1RHDyps3Fm+2+PWwnuxT2S61zuhB68743sXeNp2PGNcO
puShdC67QZnUdtbrrkuqU3bQXrWDV90wZH/ATA0435jD/t6/ziEoVVLUoR3i
UFQfvSmq6WJQMcamhOCLMo2SAlAd+UhIRQdWpLPX7dAl0ziriwIYCuubYpRv
tQ7bI1gLKMAL7Oz7N1jy+/evTatYynZKM2OnGqVfX21FLKOscq9/+KE+aS7Y
J2jqX95eSu18taFJCZo67ETnHIrxKhaWt2znUt80vu+zy7otTSit0U7lXHLS
OnbBtjZoG11XUmiibNLllAfXWaMb3w3Gl2Sxx2JtaFQCSmIZjCJ2A0iiU2pU
U/pQrMvGht9bjjIwSpf8UWg391lHk/IP9RoOPgoUXzg4IlAcYe/wVc+4EZDh
8CKvrsJ4JTWq51033dCpogHrxDwH1pYOQFaPgfTyujsC/EW/R+UqnDg3xohd
FJV66sGwuLVV1+xF56O65HzUv9L5qPbOh5TijJhG/yvsei12vTq16/jQn5nt
+mVmu3ow22azqVZutNt6Bp4a0c0Sy92N7mhBq+3W8q1M+Eebw0tWsD5Ywep3
WMH6shU8GkH2QYz3yw3sTd135V1Tf/3dd9+8u5QTpxj/8ssvbw+Hb/cj75cP
f1s+sNflhmdbtrNlZ7bwp+X+eBOduVAcuhSirtcf7j8+NqnaqMuF6n106uqd
rx9e+/FCk6wWFzyu9ajZWgiamoRAH2Sq7I7jd4kNmAyKAsu06/S0l/ZCPyPb
GEdGZWr3ovBJbxFFPB82cpiWonuY6rDSOwdlqYIm0T9GNMB0UAILlYBZHvXG
nkSqViaM9RcmPJ1NUU9SI0nD76aa2Cdrn/T5bi268RB8XmrdlcGVNYfe3ngS
qZrHg/E3zBKhXcBhdSEEvYjqtB92zAIcY/jqNATlsJlTUcEusvEgCNF7VEDA
wQB8sZ6SrLpEsi9h+DHJKk64yITT47ZrTih9FRycSd9wefJqm5wdGDJgP3IV
NL60kbm6wNWXolaoPrvU01zPUIkzX+hdnS3laFrJJ2ASPXK/IPoc2HHMZtiF
nIOtQbLMWif4vTvSGpNAK7pJGpwF+X6tsOs1UCpnI13SAAwiGYi3vGMHNMQW
Ok2vbLaFZltHKj32NUvr9Ay8GVKHGJaQfp1pN7GF3cxG5i2Ztc4HFYHXG4rW
s6ZmI8r/UfSIFYmcyObfBcAo0kItVPjsYklsHIbgAKQ5c3VIMUxeFtg4z3ze
N72cRb/T1miv2LwMzGCVecfWZmerFWB7EgXUCdIzTsxk1qSBE7N1xy9nk+9D
TQnLDe8hrl7GTvUz7IRJ1EQbvf0zMhUHy+N8u8rjWy7gHB42iYs/sK7VpW7x
x8gxfo+cY+pNOOEQJFf7INmepF12T0Log1qO5x3rWjrWo+SbotkrJTCnFRYF
ryY5EgGvIzr5p2gOwLr4B2xwj9IGzi07tu1jy3v/8OA0nuINTz2vGRxcOBn/
oHVPVe421X7R50CtPgvqBs/muH4B1C/YnQf19Syo1Qaqm85pKjrEiXV2dr+X
LakBrt6UjxJZhniGaZ9bIQNvHJ4+T2jRY1oON5xSLdrqARtnfPsiVBBIyKO3
kr/eVg8i6VqOxRzcCXJR+Dxs2xX24JPNuolKMRdYej/eqj0SoHyecGBFsm6U
tfzwhXshwtXDitWFFY0wkvssz9MgnkwOxP4qNH6Go6oXc5SEM0rQfirIFP9K
tMrjVONWqNj/etx4gmdx72GbYhbyue1vleQgCN7yheUkqySnSFnFr/xEPY/t
zHJoZjuQBNXkxUwokrViW17gKRPYLyfg0WGw9Q5PrQSe+JQDNJMc2cESQMgi
y233xAOxeWLOy6+cZ//5pi0Vu52t+GYPubM1ER7YnTHTQGB++DNuqoBAQI5F
eZYFhmmqp0irQSlzHBnnehEtDbackviHMxsxIYNjYlM0QgYwg5KgyWRimO6Z
8G0ahYEnaetUtDJYYhEXGnp73PF0Dsz3tKNXgEkCq01UwtgUrOFOIlMAvEku
zCXxHCXUgjMwkQFo2ReeTMJszldODlHxPNNIbwFIxldaFAh8iVlsLk//THRF
IBogxE7OTmEYaIe9q6WaxlM81w943j3Fc3p8Jgm7Q0w36SpHUhOmny6KHDvb
BTlpFIh5rDtZLueFT4BVuqmBPpKWiJ4+T6q04S6AojzLSb6TM0mAHz4bnoWM
sMs28rUTfwBBPSKRWZZzSwVpWibB6iL8GXnSaxE9Ca5YvPBYJCbZOTrLKTH7
KJCpftXBLHhQEMYJEr2SxCAWaARFDfaAnwYwxkgNDIoATnq2K8HDJ7PYWYTt
o0y1ih4G80xgYDmFNq8VfKrjQp5fBTmphugbIraK8gRNkzTIghmA/N2O/BAk
EcTjbooeNRfa0QvdvDsgZB75CbAKT89T3v/wg1lb4Pr/khHWV2wEdHFodG91
NqnvnbJto9pkG5t9iHboXl9V31enudo3TMl2N3ef5vVmZIvCv99Ob+ULffYF
P6/7rqu75o19Vf1wBbcy+5zY9o7XwUQ24/P1o/mPqeA3zAS/G2/r4cPIuy2m
uy8DcH97/XZ6+PL+/ubtdPfTtrxs1+Zg+66U5EpXdJtto7vBWVN0E42OJTC/
WXprvW+UGVI3tL4pKWfXFed6ozaESFq38V1vY9/0bauiV312bI9snfNDU7Jx
WqWYgx5eS1aa2dZOtRgXS7KxtINxdrDJ2+JSUIO3rc1tn1vT8AFmf81nN3RV
87vT/MorbJGpY6a/gaHvsaBhnhc4/P7V+48ff/7Xr76aPtzYt2xXJqdxnq+O
eAQWQS0S6y2GbYn2uj550r3wSS4aJGsdVAouKZ3CALzyxMXrDTCZ9R7TcgPn
s37zDhPUG+j5ZDQG3033P5+NPgBpjmOmkV/evwjUj4KyfXZfq6st2w8yDcF3
2Zmh6BitMkY77zQY16rsfICYWFc0JMbadiiD6sxglGq7zvWDDq63W+Yfiivj
2ay2d/v/YfYEvnNNtsUMqrjO6RjK0DpwTtdF2wJnzpZYeqX60HRJRwf+c6lJ
ydkQkkxj8jD4xjoVUmOc6kL2yoD5ekBnfNPGvpiu7YaQQt/1sfVDDq2zuskq
gq2b1wdofFc6Z7MZeizWYqOu1b7PTcFO+6CVjUNbwM8ulq7R0WbXGo+xQ+ii
6rvmdK/Gpkd77VPWnc6xHVrV22JV14YOT6sCebJd9MCxjt7akK2GuGCjSZvi
iskl6bJ1UjVQHEWHzgUAoR1kx8ehA0f1ro++77C7HiSL/dArk4bUe5AC8PDY
S4PNvZZZfqAOUNQBbQkWMj9EDBz60JkMIWSTMGR96KALh9jqrqhovG5AwSHG
GHKnBhd1GXo2era+UwGr+OTd0FjVmmRAP11s2+YmhKD74pXVmKLVTTLK9Ko0
vvV5yN6p330CJ8IdOSQ2P5ef/fZL2dmPd3c3978zP+t+V34WBH0uPwtrvTs4
6JLFu3CJgTgfY2DCBU5Govcm+Q5XqWV/Dn1fDB+PPxW8SlJyH27txPVX+/aE
KZzmCs+Td0/Tsupx/uKYUoyMTBgJ5yqOEuEsdD6edPecZxhHyTBKRLQPrqwE
QppxMkIgpm4lKjb2Ui544uNMsmxLh33ahc86KXXIGSzOL642oZJwax+YSTbn
Yr744ZaGs6zojosCsZ8NBY9BIOeJR9iqR7DFE8AexYT7NJMSnGxpVrfljyre
PCDJ1q3vxj65koLg7b6EE7tfOvqTBPfzVb1tjJZHGAlX+3yWwEaoFN1os4Vh
5lIq/OHyCn3o0rLsmrESA5xdefHQtKUObyVQPB3Mr7a0vq4eJSgfyITI07k9
Vhmi50MW2+6Zk5CbjSUqJljFVw4SuQV33Hhwny9IbHdrSBbGLNVGpo3HNgZ4
Jgm4BeHGPJLZ6rLM6r3MbrU6vl3Pg3mJEPaveYCPYcCiJSGbmJDFV4iOEMQy
A7tjnnQytdsx2OANGxPLM/Mi4C3ErbZVUIyvEPECeFAT8cY4MxayciEGgqhV
SncISBiojPwHyIEZBCoId0UvMZxb6ehzLwgysS5xoiXsdIxMsBz2omdG4FiF
R5cTOYq3fCxbzRjOM9MBO9GBQRIxTDfPnA1gY++YOUv10Xqqo0kuwUDs7WfG
VwinEWyvluljRIDjKhnkxOgUMdg8M6mB8eNCYBDExpXIx5wA1S2MFWfJECES
w4SYNsstJdjaIjeEINJjQVqugomCaui6OBGZO8soEfifNAkRsWiqsF/E/6AO
E+VCeiex3LxF3RLLQfMHidb4oZaqm6T+8yIz54pjMiU9jZKtwBKZ2DCiGLca
El5gfhAXcSnoCJUySY0hCR3BJ0z6J25cSxmDZdeZVDCOagSYASGAKC+pZBNI
LyAQIS7WSnLUMtmKKErcjpb0VvLcNZCMMB74xCREY+AnTpQ5yApWAS8lSeIj
CJ9GarY5E3vgLrfuw2BgbM1SOVip/72UQ/AXUgCYZ7ngxQr1NbMVpM72b3zo
89L7pMZDeWPRx/LGPD9NnEkv7T4d/6RH76WJ+Opxqv0FifgnVYHqDIyTBrpx
U6TnwGyJ+/19QQfrMCqqx1GSoaCXmb6QuD+3WQ+2o/qyzbKHwaL/oz25a0ju
L+AdPieZ+mDPMSkJJj8dK51uw8buUfq7WjeNIeU3HfdJcLueIOTZJLjUA6rn
bfdF8/fHGvRncuj60EZqPre76pBGZ1rTqn062IyfxcYxjb488EN1ho3zNPol
lri46+p01/sE2TMwbIn1x95U9Vspcgpb9VspUm8UEX6uHvj5Uar9SUH0Qjst
lIPz7C/G6kwEB3FgxMwZ0ck7qRYHKYjCEuGr3SZEWw/s7lwpbTVLt8+tJ/Pg
ddQv9joqstCvGH+xLlud1mWpw0fqZxbpI5OYsyRVk+SvdzBkkelyGDLyQ+Ak
0PxQ1G4+cV3CC+sQUn6IhxeOTs5qjvnxl9Uh6vM6RPVb6hCOzs84MTlLY6Gq
5/PjLOp7cY3Y3MPVrZRzYKM1mwNIymmudpl85cVnoBrP4hyO3AuvMnPE/zIx
9IO/AVcNg5csfuBDaniqmESWyQMv5mIKmDciaDpvcdynj8FsDC3F94DjAT9w
hVsy0qSuzLxX8yj3hhl6GovcCMcOA//FUkR9Uoqofmspoj4pRVRHVBteU/bF
UgTcQvhCWe1DOeAHsgPnAYZ+WcWSWsFwPriaUl4l6wY6w4Af/My+ikSSwZ8E
qPDrTJJWkvmktjQRq+x1kA8p9eInQ7mBZ+BjJJFNL+7fJB0MvDtuIXGBBC1O
KVXHIt545mwgHAgRBOefD+Srp4H8MSgQ2LR4C7CJ7NaSatMi9YZRQmBwlF55
Y1uSOxLdRG70covdFqFrQVSQcgu3vJMb88Q9MxI7kD/XOoNjLeV9kU4azAM5
GuUiOL7wFKUxSqXZSEnDCgNIZdRLwALAIvgkkBAYD4yxGy+RyeEes1wndbVJ
uve8dNV4cdV2D41HSQpsuwp0hJsx0zEmFzGaGKWRxUmxUO4qctLlCU5OUmk2
8gJSlgS9NOiZZGLoEaVqZRkLrMKuCBDYu5lI7iR9okbyMNgCJA4rUnzA4YE1
9bTxcCbqgLRV+lGMMNjGgbMgn97RKtylOR5gRGkegnrEIxSNkZBD0vMkRSNP
vx2WDvwD5YzHoWAnaYWxmy86yiWNIz3w2VaIYpw43uwqmyjaO4nfeY2h4Y4g
FHg8SGxF2OA2i+jxhvaVdIxLtQizbbU0fLLKRZGrHM5m85CIv5KGpFVMKp38
mcHUYogoBEog8dZRZEUNcmnpPQJpwH4Ut4UMs1FnkgorOUpTu8J2KDl2MwKS
iUzCNgVRI9DnJI18MkuaaJI6rpn/6StYTWi871JUvc2tU/3TihUrSs2H63/c
3Y7HstJ09/Hj/TzeLA81pXcfxw/r9XIz198t0/vbu5u7v1wv9yf1pXxSZ5Aq
w/3hiY94QEoNH5af7+75owB//+qhJHWcd3/bwynOjweS39R/MluhKijteaVF
4GvrU9KZr+XQBGEodz/xrvFu+wGa7b4B/j7P8RDGv7w9T+6+Oia/da8t75lq
kykh5aEp7eA749oYB2U615Q+mtBbDAuq6CYxmc2PbbFGzjb3flA5t35wsYmN
S94b3fdEvzZD7npVumbwIQfdReV4oZUamBnXvVf8aQgebWgwXDtscdCtVia4
kBrflcG7RjVdk3PGxlXqAKqJvhTV5G4YLEBLzWB56KCkNsS2lEEqcKHPgH+I
XROy67uuKBUwWzExt1jZ9LEPQ69SaL2J2LrmMePYRdNaF/q2032KqU1q6Npe
921bVHDOp9IlgNGaRgXjW7zTbbJATu7xLDeCr7K3qelZAMquMY22lrUM2xbT
dUMDvuyG1CWgT+nGJgzllWQ26KJ7w7PLBpuIuSRvlQbii0lu6HLCPpLFVlKv
tTN98q1thgJgS8FXoRmcNqwlshzRABmDyaZrMFGOrTVuYNWiTwNEwg3GArfO
d8o2fUkNZuoApwd++F+jRWQOlTCpHpKLjJwTORxHeVRHvMD79+v1X8y9fmOc
OSsE1qeVwHUOi9Iq6shq4P708mmV76ye8LyA/XBV6/pQKKwfVwqfPnuoF54V
DF+8nGxPyoayplSAjQeT6JA8WNgmSEhrWHfruxKakttgS2tDCPZQ0JWVnwjn
Vsx99OH+LBPLzCSZ052KXoNTTMoqtqqNyQVjBhu8jw2Esbz+Q6qYOmr/qKqX
Oshp8qbrPaTUgeG17gatutJmPXjIlA02G2MbLJAap0sPuRz60uuhz2rYU6Ht
GgMEAkGdzryeTnfQKIDBt8HbBkLoHKBKbdP02J4pzWAgvV0fsJO8HdD6v6xh
Gsjfo502vldZYRLbZ13cUEo/DIOy2GMWdZaDAlmCg5QlSLdJg8+hdKE1CVq0
7HfKK3qgpIoy4BUoVOVd3+vUmN5D/XSu6zww09qh0VB0upgeSjlDnfohBez3
pIJpLLW4dsphtGqhLkBIqBkopUYPrAA3ynXWQ5sMWqugAW9QvOiIbR091IOB
xqfmsnbIYM8Se+WzIwlS7/DXK6iRqKKJEfzrB6IbYEGVNiV41fjUZGNZhoae
bc2gBt90UJc+ucKyaJsjyB+SoULNYDJoyi7CAEB9WYcdQfE7GDhH/ZkUBuak
bE7YA1CWOwy3IDKUbBxAsMFmWECoLdDRZKV4k2EXwRMs41L5JVAQRGpLHlow
AWhBChU8Y4odQAndNamJBRp2GFrQvoGg9jAnHYAogYZgaLB0aVUXiRCoVfCs
a5Iv4BwHZWsjC8athiVSHiJXsKcA04WlSgOOJS5AMZ4yBJE1S9K9G2DUhs7q
oURwpmK53wQPvQ2M9wY2vY3EiMLUsKCEwimwAw/MwfhmoqgDUkAdiGByKmvf
9Nirh2IHM+sE7OB18VZ3QJopv/taR+P8sapcN9OPt3e/3Cyz/ILgPX8da/th
v2X+t1e3d6/2NwKO4sDcb79HJNe7jbc/1l8v+NNef/jx/d3NP67qboSPuNzW
LT2+29ur+ttP9/f113ef7m+Wv1/V/30Dd/Q/7vDk/T3vVWqX27+OP8HF+c9x
/vTjVf3n679+usXf8Q7e2M344RqvP93/bRw/jPhy/LT9INufP93Ou5txXq62
hqHlHnHEN+PN3U+769vrq/q79/Cb7utv5NfluMx/XU/vx+Wm/pb//zDLZ+8+
Lut4W7/DbpYNmP+4/ql+hwHjDMA+XPPLaxgFWeR++VB/98uy0I/c7jj9drld
MMmHT9c/yoVvvCtxkZ/zkXuut19EksL47fYr9fIbf3AE99dhP1zKtf2eEx96
v9z8zCek4P6n649ff9q9rf4XyywJruRyAgA=

-->

</rfc>
