<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.25 (Ruby 3.1.3) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fdb-rats-psa-endorsements-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="CoRIM PSA Profile">A CoRIM Profile for Arm's Platform Security Architecture (PSA)</title>
    <seriesInfo name="Internet-Draft" value="draft-fdb-rats-psa-endorsements-02"/>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Ltd</organization>
      <address>
        <email>thomas.fossati@arm.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm Ltd</organization>
      <address>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <date/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <abstract>
      <t>PSA Endorsements include reference values, endorsed values, cryptographic key
material and certification status information that a Verifier may need in order
to appraise attestation Evidence produced by a PSA device.  This memo defines
PSA Endorsements as a profile of the CoRIM data model.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/corim-psa"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>PSA Endorsements include reference values, endorsed values, cryptographic key
material and certification status information that a Verifier needs in order to
appraise attestation Evidence produced by a PSA device <xref target="PSA-TOKEN"/>.  This
memo defines PSA Endorsements as a profile of the CoRIM data model
<xref target="CoRIM"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>An understanding of the <xref target="CoRIM"/> data model is a prerequisite.</t>
      <t>The reader is also assumed to be familiar with the terms defined in <xref section="2.1" sectionFormat="of" target="PSA-TOKEN"/> and in <xref section="4" sectionFormat="of" target="RATS-ARCH"/>.</t>
    </section>
    <section anchor="sec-psa-endorsements">
      <name>PSA Endorsements</name>
      <t>PSA Endorsements describe an attesting device in terms of the hardware and
firmware components that make up its PSA Root of Trust (RoT). This includes
the identification and expected state of the device as well as the
cryptographic key material needed to verify Evidence signed by the device's PSA
RoT. Additionally, PSA Endorsements can include information related to the
certification status of the attesting device.</t>
      <t>There are three basic types of PSA Endorsements:</t>
      <ul spacing="normal">
        <li>Reference Values (<xref target="sec-ref-values"/>), i.e., measurements of the PSA RoT
firmware;</li>
        <li>Attestation Verification Claims (<xref target="sec-keys"/>), i.e., cryptographic keys
that are used to verify signed Evidence produced by the PSA RoT, along
with the identifiers that bind the keys to their device instances;</li>
        <li>Certification Claims (<xref target="sec-certificates"/>), i.e., metadata that describe
the certification status associated with a PSA device;</li>
      </ul>
      <t>There is a fourth PSA Endorsement type that aims at covering more advanced
Verifier use cases (e.g., the one described in <xref section="7" sectionFormat="of" target="TEEP"/>):</t>
      <ul spacing="normal">
        <li>Software Relations (<xref target="sec-swrel"/>), used to model upgrade and patch
relationships between software components.</li>
      </ul>
      <section anchor="psa-endorsement-profile">
        <name>PSA Endorsement Profile</name>
        <t>PSA Endorsements are carried in one or more CoMIDs inside a CoRIM.</t>
        <t>The profile attribute in the CoRIM MUST be present and MUST be set to the URI
<tt>http://arm.com/psa/iot/1</tt> as shown in <xref target="ex-psa-iot-profile"/>.</t>
        <figure anchor="ex-psa-iot-profile">
          <name>PSA IoT version 1, CoRIM profile</name>
          <artwork><![CDATA[
/ corim-map / {
  / corim.profile / 3: 32("http://arm.com/psa/iot/1")
  / ... /
}
]]></artwork>
        </figure>
        <t>The list of all, and only, the CoMIDs that are currently "active" (i.e., CoMIDs
that contain triples that can be used for appraisal) is provided in a CoBOM
tag.</t>
        <t><cref>TODO CoBOM example</cref></t>
      </section>
      <section anchor="sec-psa-rot-id">
        <name>PSA Endorsements to PSA RoT Linkage</name>
        <t>Each PSA Endorsement - be it a Reference Value, Attestation Verification Claim
or Certification Claim - is associated with an immutable PSA RoT.  The linkage
between a PSA Endorsement and its PSA RoT is made by means of the unique PSA
RoT identifier known as Implementation ID (see <xref section="3.2.2" sectionFormat="of" target="PSA-TOKEN"/>).</t>
        <t>In order to support PSA Implementation IDs, the CoMID type
<tt>$class-id-type-choice</tt> is extended as follows:</t>
        <artwork><![CDATA[
; from draft-tschofenig-rats-psa-token
psa-implementation-id-type = bytes .size 32

tagged-implementation-id-type = #6.600(implementation-id-type)

$class-id-type-choice /= tagged-implementation-id-type
]]></artwork>
        <t>Besides, a PSA Endorsement can be associated with a specific instance of a
certain PSA RoT - as is the case for Attestation Verification Claims.  A PSA
Endorsement is associated with a PSA RoT instance by means of the Instance ID
(see <xref section="3.2.1" sectionFormat="of" target="PSA-TOKEN"/>) and its "parent" Implementation ID.</t>
        <t>These identifiers are typically found in the subject of a CoMID triple, encoded
in an <tt>environment-map</tt> as shown in <xref target="ex-psa-rot-id"/>.</t>
        <figure anchor="ex-psa-rot-id">
          <name>Example PSA RoT Identification</name>
          <artwork><![CDATA[
/ environment-map / {
  / comid.class / 0 : {
    / comid.class-id / 0 :
      / tagged-impl-id-type / 600(
        h'61636d652d696d706c656d656e746174
          696f6e2d69642d303030303030303031'
      ),
      / comid.vendor / 1 : "ACME Ltd.",
      / comid.model /  2 : "Roadrunner 1.0"
  },
  / comid.instance / 1 :
    / tagged-ueid-type / 550(
      h'01
        4ca3e4f50bf248c39787020d68ffd05c
        88767751bf2645ca923f57a98becd296'
    )
}
]]></artwork>
        </figure>
        <t>Optional <tt>vendor</tt> and <tt>model</tt> can be specified as well.  Together, they are
interpreted as a unique identifier of the product that embeds the PSA RoT.
It is RECOMMENDED to consistently provide a product identifier.</t>
      </section>
      <section anchor="sec-ref-values">
        <name>Reference Values</name>
        <t>Reference Values carry measurements and other metadata associated with the
updatable firmware in a PSA RoT.  When appraising Evidence, the Verifier
compares Reference Values against the values found in the Software Components
of the PSA token (see <xref section="3.4.1" sectionFormat="of" target="PSA-TOKEN"/>).</t>
        <t>When there is more than one measurement associated to a certain PSA RoT, the
measurements are spread across multiple <tt>reference-triple-record</tt>s and, in
certain cases, across multiple CoMIDs.  A single CoBOM MUST completely describe
the updatable PSA RoT.</t>
        <t>The elements of the <tt>psa-software-component</tt> map defined in <xref section="4.4.1" sectionFormat="of" target="PSA-TOKEN"/> are matched against CoMID <tt>measurement-map</tt> entries as follows:</t>
        <table anchor="tbl-psa-swcomp-mappings">
          <name>PSA Software Component Mappings</name>
          <thead>
            <tr>
              <th align="left">PSA Evidence</th>
              <th align="left">PSA Endorsement</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>measurement-type</tt></td>
              <td align="left">
                <tt>measurement-values-map.name</tt></td>
              <td align="left">
                <xref section="4.4.1.1" sectionFormat="of" target="PSA-TOKEN"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>measurement-value</tt></td>
              <td align="left">
                <tt>measurement-values-map.digests[*][1]</tt></td>
              <td align="left">
                <xref section="4.4.1.2" sectionFormat="of" target="PSA-TOKEN"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>version</tt></td>
              <td align="left">
                <tt>measurement-values-map.version.version</tt></td>
              <td align="left">
                <xref section="4.4.1.3" sectionFormat="of" target="PSA-TOKEN"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>measurement-desc</tt></td>
              <td align="left">
                <tt>measurement-values-map.digests[*][0]</tt></td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">
                <tt>signer-id</tt></td>
              <td align="left">
                <tt>authorized-by[0]</tt></td>
              <td align="left">
                <xref section="4.4.1.4" sectionFormat="of" target="PSA-TOKEN"/></td>
            </tr>
          </tbody>
        </table>
        <t>The <tt>digests</tt> array MUST contain at least one entry and MAY contain more than
one entry if multiple digests (obtained with different hash algorithms) of the
same measured component exist.</t>
        <t>The <tt>authorized-by</tt> in the <tt>measurement-map</tt> MUST have exactly one entry of
type <tt>tagged-thumbprint-type</tt> (CBOR tag 557) containing the <tt>signer-id</tt>.</t>
        <t>The example in <xref target="ex-reference-value"/> shows a CoMID encoding a PSA Endorsement
of type Reference Value for a firmware measurement associated with
Implementation ID <tt>acme-implementation-id-000000001</tt>.</t>
        <figure anchor="ex-reference-value">
          <name>Example Reference Value</name>
          <artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.reference-triples / 0 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
            / comid.vendor / 1 : "ACME Ltd.",
            / comid.model /  2 : "Roadrunner 1.0"
          }
        },
        [
          / measurement-map / {
            / comid.mval / 1 : {
              / comid.version / 0 : {
                / version / 0: "1.3.5"
              },
              / comid.digests / 2 : [
                [
                  / hash-alg-id / "sha-256",
                  / hash-value /  h'44aa336af4cb14a8
                                    79432e53dd6571c7
                                    fa9bccafb75f4882
                                    59262d6ea3a4d91b'
                ]
              ],
              / comid.name / 11 : "PRoT"
            },
            / authorized-by / 2 : [
              557([
                / hash-alg-id / "sha-256",
                / hash-value /  h'acbb11c7e4da2172
                                  05523ce4ce1a245a
                                  e1a239ae3c6bfd9e
                                  7871f7e5d8bae86b'
              ])
            ]
          }
        ]
      ]
    ]
  }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-keys">
        <name>Attestation Verification Claims</name>
        <t>An Attestation Verification Claim carries the verification key associated with
the Initial Attestation Key (IAK) of a PSA device.  When appraising Evidence,
the Verifier can use the Implementation ID and Instance ID claims (see
<xref target="sec-psa-rot-id"/>) to look up the verification key that it SHALL use to check
the signature on the Evidence.  This allows the Verifier to prove (or disprove)
the Attester's claimed identity.</t>
        <t>Each verification key is provided alongside the corresponding device Instance
and Implementation IDs (and, possibly, a product identifier) in an
<tt>attest-key-triple-record</tt>.  Specifically:</t>
        <ul spacing="normal">
          <li>The Instance and Implementation IDs are encoded in the environment-map as
shown in <xref target="ex-psa-rot-id"/>;</li>
          <li>The IAK public key is carried in the <tt>comid.key</tt> entry in the
<tt>verification-key-map</tt>.  The IAK public key is a PEM-encoded
SubjectPublicKeyInfo <xref target="RFC5280"/>.  There MUST be only one
<tt>verification-key-map</tt> in an <tt>attest-key-triple-record</tt>;</li>
          <li>The optional <tt>comid.keychain</tt> entry MUST NOT be set by a CoMID producer that
uses the profile described in this document, and MUST be ignored by a CoMID
consumer that is parsing according to this profile.</li>
        </ul>
        <t>The example in <xref target="ex-attestation-verification-claim"/> shows the PSA Endorsement
of type Attestation Verification Claim carrying a secp256r1 EC public IAK
associated with Instance ID <tt>4ca3...d296</tt>.</t>
        <figure anchor="ex-attestation-verification-claim">
          <name>Example Attestation Verification Claim</name>
          <artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.attest-key-triples / 3 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          },
          / comid.instance / 1 :
            / tagged-ueid-type / 550(
              h'01
                4ca3e4f50bf248c39787020d68ffd05c
                88767751bf2645ca923f57a98becd296'
            )
        },
        [
          / verification-key-map / {
            / comid.key / 0 :
              "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgA
ETl4iCZ47zrRbRG0TVf0dw7VFlHtv18HInY
hnmMNybo+A1wuECyVqrDSmLt4QQzZPBECV8
ANHS5HgGCCSr7E/Lg=="
          }
        ]
      ]
    ]
  }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-certificates">
        <name>Certification Claims</name>
        <t>PSA Certified <xref target="PSA-CERTIFIED"/> defines a certification scheme for the PSA
ecosystem.  A product - either a hardware component, a software component, or
an entire device - that is verified to meet the security criteria established
by the PSA Certified scheme is warranted a PSA Certified Security Assurance
Certificate (SAC).  A SAC contains information about the certification of a
certain product (e.g., the target system, the attained certification level, the
test lab that conducted the evaluation, etc.), and has a unique Certificate
Number.</t>
        <t>The linkage between a PSA RoT -- comprising the immutable part as well as zero
or more of the mutable components -- and the associated SAC is provided by a
Certification Claim, which binds the PSA RoT Implementation ID and the software
component identifiers with the SAC unique Certificate Number.  When appraising
Evidence, the Verifier can use the Certification Claims associated with the
identified Attester as ancillary input to the Appraisal Policy, or to enrich
the produced Attestation Result.</t>
        <t>A Certification Claim is encoded as a <tt>conditional-endorsement-triple-record</tt>.</t>
        <t>The SAC is encoded in a <tt>psa-cert-num</tt> that extends the
<tt>measurement-values-map</tt>:</t>
        <artwork><![CDATA[
$$measurement-values-map-extension //= (
  &(psa-cert-num: 100) => psa-cert-num-type
)

psa-cert-num-type = text .regexp "[0-9]{13} - [0-9]{5}"
]]></artwork>
        <t>The <tt>conditional-endorsement-triple-record</tt> is constructed as follows:</t>
        <ul spacing="normal">
          <li>The Implementation ID of the immutable PSA RoT to which the SAC applies is
encoded as a <tt>tagged-impl-id-type</tt> in the <tt>environment-map</tt> of the
<tt>stateful-environment-record</tt>;</li>
          <li>Any software component that is part of the certified PSA RoT is encoded as a
reference value (see <xref target="sec-ref-values"/>) in the <tt>measurement-map</tt> of the
<tt>stateful-environment-record</tt>;</li>
          <li>The unique SAC Certificate Number is encoded as <tt>psa-cert-num</tt> in the
<tt>measurement-values-map</tt>.</li>
        </ul>
        <t>The example in <xref target="ex-certification-claim"/> shows a Certification Claim that
associates Certificate Number <tt>1234567890123 - 12345</tt> to Implementation ID
<tt>acme-implementation-id-000000001</tt> and a single "PRoT" software component with
version "1.3.5".</t>
        <figure anchor="ex-certification-claim">
          <name>Example Certification Claim</name>
          <artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'dbb0508ac658421c99c904124bab59ca'
  },
  / comid.triples / 4 : {
    / comid.conditional-endorsement-triple / 9 : [
      [
        / stateful-environment-record / [
          / environment-map / {
            / comid.class / 0 : {
              / comid.class-id / 0 :
                / tagged-impl-id-type / 600(
                  h'61636d652d696d706c656d656e746174
                    696f6e2d69642d303030303030303031'
                ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
            }
          },
          / measurement-map / {
            / comid.mval / 1 : {
              / comid.version / 0 : {
                / version / 0: "1.3.0"
              },
              / comid.digests / 2 : [
                [
                  / hash-alg-id / "sha-256",
                  / hash-value /  h'44aa336af4cb14a8
                                    79432e53dd6571c7
                                    fa9bccafb75f4882
                                    59262d6ea3a4d91b'
                ]
              ],
              / comid.name / 11 : "PRoT"
            },
            / authorized-by / 2 : [
              557([
                / hash-alg-id / "sha-256",
                / hash-value /  h'acbb11c7e4da2172
                                  05523ce4ce1a245a
                                  e1a239ae3c6bfd9e
                                  7871f7e5d8bae86b'
              ])
            ]
          }
        ],
        / measurement-values-map / {
           / psa.cert-num / 100 : "1234567890123 - 12345"
        }
      ]
    ]
  }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-swrel">
        <name>Software Upgrades and Patches</name>
        <t>In order to model software lifecycle events such as updates and patches, this
profile defines a new triple that conveys the following semantics:</t>
        <ul spacing="normal">
          <li>SUBJECT: a software component</li>
          <li>PREDICATE: (non-critically / critically) (updates / patches)</li>
          <li>OBJECT: another software component</li>
        </ul>
        <t>The triple is reified and used as the object of another triple,
<tt>psa-swrel-triple-record</tt>, whose subject is the embedding environment.</t>
        <artwork><![CDATA[
comid.psa-swrel-triples = TBD2

$$triples-map-extension //= (
  comid.psa-swrel-triples => [ + psa-swrel-triple-record ]
)

psa.updates = 1
psa.patches = 2

psa-swrel-rel = [
  type: psa.updates / psa.patches
  security-critical: bool ; true means it's a fix for a security bug
]

sw-rel = [
  new: comid.measurement-map ; the "new" firmware
  rel: psa-swrel-rel         ; patches/updates and the security flag
  old: comid.measurement-map ; the "old" firmware
]

psa-swrel-triple-record = [
  environment-map
  sw-rel
]
]]></artwork>
        <t>An example of a security critical update involving versions "1.2.5" and "1.3.0"
of software component "PRoT" within the target environment associated with
Implementation ID <tt>acme-implementation-id-000000001</tt> is shown in
<xref target="ex-psa-swrel-update-crit"/>.</t>
        <figure anchor="ex-psa-swrel-update-crit">
          <name>Example Critical Software Upgrade</name>
          <artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.psa-swrel-triples / 5 : [
      [
        / environment-map / {
          / comid.class-id / 0 :
          / tagged-impl-id-type / 600(
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031'
          ),
          / comid.vendor / 1 : "ACME Ltd.",
          / comid.model /  2 : "Roadrunner 1.0"
        },

        / sw-rel / [
          / new / {
            / comid.mval / 1 : {
              / comid.version / 0 : {
                / version / 0: "1.3.0"
              },
              / comid.digests / 2 : [
                [
                  / hash-alg-id / "sha-256",
                  / hash-value /  h'44aa336af4cb14a8
                                    79432e53dd6571c7
                                    fa9bccafb75f4882
                                    59262d6ea3a4d91b'
                ]
              ],
              / comid.name / 11 : "PRoT"
            },
            / authorized-by / 2 : [
              557([
                  / hash-alg-id / "sha-256",
                  / hash-value /  h'acbb11c7e4da2172
                                    05523ce4ce1a245a
                                    e1a239ae3c6bfd9e
                                    7871f7e5d8bae86b'
              ])
            ]
          },

          / rel / [
            / type / 1, / psa.updates /
            / security-critical / true
          ],

          / old / {
            / comid.mval / 1 : {
              / comid.version / 0 : {
                / version / 0: "1.2.5"
              },
              / comid.digests / 2 : [
                [
                  / hash-alg-id / "sha-256",
                  / hash-value /  h'98b06c3f4bfeb294
                                    f69dae2bbe7d4be0
                                    750e258a86414d90
                                    a17cda9e2e775337'
                ]
              ],
              / comid.name / 11 : "PRoT"
            },
            / authorized-by / 2 : [
              557([
                  / hash-alg-id / "sha-256",
                  / hash-value /  h'acbb11c7e4da2172
                                    05523ce4ce1a245a
                                    e1a239ae3c6bfd9e
                                    7871f7e5d8bae86b'
              ])
            ]
          }
        ]
      ]
    ]
  }
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><cref>TODO</cref></t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="cbor-tag-registrations">
        <name>CBOR Tag Registrations</name>
        <t>IANA is requested to allocate the following tag in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specified value:</t>
        <table anchor="tbl-psa-cbor-tag">
          <name>CoRIM CBOR Tags</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Data Item</th>
              <th align="left">Semantics</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">600</td>
              <td align="left">tagged bytes</td>
              <td align="left">PSA Implementation ID (<xref target="sec-psa-rot-id"/> of RFCthis)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="corim-profile-registration">
        <name>CoRIM Profile Registration</name>
        <t>IANA is requested to register the following profile value in the
<cref>TODO</cref> CoRIM registry.</t>
        <table align="left" anchor="tbl-psa-corim-profile">
          <name>PSA profile for CoRIM</name>
          <thead>
            <tr>
              <th align="left">Profile Value</th>
              <th align="left">Type</th>
              <th align="left">Semantics</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>http://arm.com/psa/iot/1</tt></td>
              <td align="left">uri</td>
              <td align="left">The CoRIM profile specified by this document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="comid-codepoints">
        <name>CoMID Codepoints</name>
        <section anchor="comid-triples-map-extension">
          <name>CoMID Triples Map Extension</name>
          <t>IANA is requested to register the following codepoints to the "CoMID Triples
Map" registry.</t>
          <table align="left" anchor="tbl-psa-comid-triples">
            <name>PSA CoMID Triples</name>
            <thead>
              <tr>
                <th align="left">Index</th>
                <th align="left">Item Name</th>
                <th align="left">Specification</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">50</td>
                <td align="left">comid.psa-swrel-triples</td>
                <td align="left">RFCthis</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="comid-measurement-values-map-extension">
          <name>CoMID Measurement Values Map Extension</name>
          <table align="left" anchor="tbl-psa-comid-measurement-values-map">
            <name>Measurement Values Map Extensions</name>
            <thead>
              <tr>
                <th align="left">Key</th>
                <th align="left">Item Name</th>
                <th align="left">Item Type</th>
                <th align="left">Specification</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">100</td>
                <td align="left">comid.psa-cert-num</td>
                <td align="left">
                  <tt>psa-cert-num</tt></td>
                <td align="left">
                  <xref target="sec-certificates"/> of RFCthis</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t><cref>TODO</cref></t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="PSA-TOKEN">
          <front>
            <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Mathias Brossard" initials="M." surname="Brossard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
              <organization>HP Labs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date day="28" month="February" year="2023"/>
            <abstract>
              <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-11"/>
        </reference>
        <reference anchor="CoRIM">
          <front>
            <title>Concise Reference Integrity Manifest</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>arm</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="9" month="March" year="2023"/>
            <abstract>
              <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies Concise Reference Integrity Manifests (CoRIM) that
   represent Endorsements and Reference Values in CBOR format.
   Composite devices or systems are represented by a collection of
   Concise Module Identifiers (CoMID) and Concise Software Identifiers
   (CoSWID) bundled in a CoRIM document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RATS-ARCH">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="D. Thaler" initials="D." surname="Thaler">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="N. Smith" initials="N." surname="Smith">
              <organization/>
            </author>
            <author fullname="W. Pan" initials="W." surname="Pan">
              <organization/>
            </author>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="TEEP">
          <front>
            <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
            <author fullname="Mingliang Pei" initials="M." surname="Pei">
              <organization>Broadcom</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Dave Thaler" initials="D." surname="Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Dave Wheeler" initials="D. M." surname="Wheeler">
              <organization>Amazon</organization>
            </author>
            <date day="24" month="October" year="2022"/>
            <abstract>
              <t>   A Trusted Execution Environment (TEE) is an environment that enforces
   that any code within that environment cannot be tampered with, and
   that any data used by such code cannot be read or tampered with by
   any code outside that environment.  This architecture document
   motivates the design and standardization of a protocol for managing
   the lifecycle of trusted applications running inside such a TEE.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teep-architecture-19"/>
        </reference>
        <reference anchor="PSA-CERTIFIED" target="https://www.psacertified.org">
          <front>
            <title>PSA Certified</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1ce3PbRpL/fz7FLJNai4lI8U1RXm8tTdFrXiw/JCZXict1
HABDEWsQYABQMi0pn+U+y32y6+6ZwZuy7NzeZqusVBISGPRM9/Tj1z0NNhoN
FruxJ0/4mE+C89kZfx0GS9eTfBmEfByuH0X8tSdi+LbmF9Lehm68g+v2yo2l
HW9DyQ9eX4zrTFhWKK9ODJGLsSHEnMD2xRpmcEKxjBtLx2qEIo4am0g0pO8E
YSTX0ocLrQ5zRAwDb07H8+kds+HLZRDuTrjrLwPmbsITHofbKO60WiMYLEIp
TnjNrKrGroPw/WUYbDdw9Vyug1jy8TyWUSxiN/BxQbZ0YMkXNRZtrbUbRXB5
vtvAlLPp/BljMNJ3/kt4gQ+XdjJiG/eEcR4u4bko3nn6KudxYGc+ur4DDJgL
URDGoVxGyffdOvc1Dl07GWwHa2I+oSY/xA3PjeIGPGYFHtxoBN99D3dAjGux
2bj+pRrLxDZeBeEJYw24qyQ8XwVrEfFnQRQBy3A5CGE07CJ/ETvwVa6F64EQ
aVhzqYb9TYTrJqwjS+jn4FJGK34K/9mASOReUjsa2HTMwCpiz6X/nj91w/er
wPtoKD0LxdZfBUsZ8ovZPCW4gsFNSw/+W+TGzWUyEqZhzAdNhFVfSdwZ0LPG
/NUP05ewg43TZhzZONB3L1MVi4P30oehpJhqmCvjpRpgB6ELa0X9ylA9H88v
GuPzyfMTfv5sMup2e3BxPp2+zjweS7lpiIwd6NVMpufz2bPZ9BQJ8ViElxI2
exXHm+jk6Oj6+roJi7JlGLtLVzpNkAWNUzaIZjMx9/C6sodOq9NmDNQEtBzJ
XkxfPEMVfzaJV25UA1k3GlxYoFnCjhlDKtOMYYH52N7WkRzUUIbStyW/Et5W
Rodc25+TXLDD3SYOLkOxWbk2fy93DMQiQ1d4HLaX64XbyqDQsLYRT6QHl+KV
iLngP8EjwEPI12LHfQkTuD7suyNDFgcc1DgUbiS5iFPrnF65Dq1tEwbOFgyO
WzughMw48sq1ZRP2ANjla7BsuLR0fbCCEq+g/gJJkA8LlrAgqX0SyFLwdeBI
r6kktnYdB/wT+4bP/JgmxYX8seSHsosS4YGzYV8mPH5zk9jK3Z0WJcuKkn+R
KNnNDV0CmijISeBfoZ4GfkT8niJtl74zNofnQSIc3DTwVDv78WJeO1T/5y9f
0efz6ZsfZ+fTU/x88Xz84kXygekRF89f/fjiNP2UPjl5dXY2fXmqHoarPHeJ
1c7GP8MdXFXt1ev57NXL8YsaShZtCL3rFrnmEFRAytyScAs2bhPKGKQpIgYu
zg5dS6ny08nr//nvdg+k+iewwk67Pbq701+O28MefLkGR6ZmC3xvp7+CBHe4
gVKESEV4HrfFxo2FB6oD4o5WwbUPLjCUIE029vkWXGpIUQn8vtmDROSZfeCu
2ix49NetC24TKaDAIUai4uBtLwLTiyLg09EsLsXa9VxYzLUbr4g2sLyOtEoQ
pzc3EF/JLjrNNq4go0bEXnYM7+GIxH1qpSgqFrs54d9E0i4hAH5XYXxG7jCZ
VnkUhdZq3D5asRbNSoTONW4hrIwt3XBNXyAebSCkIzWyr7V4L/l2w91Yaf15
EMRIYY7ggh+cB/N6U/kabfkRQ+JoYhnrReblhw1wDpJCQ0yMRC8ONvRawhYL
nFaykmvgiWtAK1ebcoWGv0vtOXIvfWXNKeFHtGoGy2zyseOQeYEq7Q7LJmyD
0Iz3yrqZUAKmUzPS0qrckmamKHOlVyhitJRVKCW3RAQcxQCkIq0huVUARPmO
nye+8ydylfzg5gZ1AHxqQznPu7v6IXebsnkILl5EEFIVD3odaqMQKZh9fQxk
xxknqJymZmLiCXedzALSztIvbQVBL3K9wNQ2yu2F3oJKF5tZGBgw4EaM5okx
GYUBE1bULUCKdAen1MJ3w1SZ0dJtGSFjk9yW5LlJt6sgtViQR6C5jN0QZ7I6
8oA3APRKmkCLzkaMx2afybMsg20IAwpbS3uuBYfrg//bAYoNtGUdoI44V8iR
w5KABsIFrYxQAWTzskk+EVyk5Dn/mnqUIRkmYC9glBTpIljGZNXnqMMUabRY
omtQa5KH2UHlGrcb2GmHfALfiNheIaQ3D6/cTQSuML6WEsRiaKceAz1YyYUl
uU0F/sCnRRi6GvMAZ5BIkTAmwdnsFH1K5OJqVCzVbtqEWbA2EMI2Vq4tCbgU
Iy0cJiOKUsCKuRbJWKsS//F8xhaINQFqaiB+BE72yA3io/YijTAkYfmBHDDc
a+jZyV//9ttv7IgTMG5AwsGP+A3IS19pmnUe8e4J73YOavtmq9XpqWazyY/Y
HVFFt1+eVGHfJzWU5CyYo9VhWsbbh5p3Pa6G0QFFhdkRKgW4vDTAHmphkYQT
S4bEEHxODPG3BsgY0H2NHyhbUSMZjbQDPxYo7tDdeFI/jp7T0r4AU2ENu4RX
R4OANaE7oC3GjXz66ozF4hLE9xcbPNpf569OX6nLECLEGsj+5YhuVGkTeQLt
RfgL138vLmUuRoYgLdcB9qfCLttgg8AKosaCjz38hHdkwFaFmwGCboVrAK1Z
r7exsLzE5RGMxA1RSzZWJEpLJJyQBNs50l+jRYIHBVfvJz5+67u/bqWJbhn/
yd/7qLegwDMUJhJVK56d8oNIyozD6DY7zU4BqNRhY2YphubRdrOBLJ3WUyIY
ZXSJHBxbfGt7IA/YgwZ+b0CSCQ5ygWxAug4IhhAiqInnBdcY7lDbH/NlGKx1
0WN/YkrWkFuCmYY/AfnA/vFm5H6UYGwMVexSOvvHfzNoDlqtg+r7dcYq+eBH
T/i9hIkd9lSi20KcWtpebSvlaBIBOkLtSkIb2S3BDTQ4ow4NlJ4bqTgFsUHV
nu6P7KB7Y1KU7EKq9DZVOrOGotbNzI3ZKatQpiLqrSfqXNsIdC+1sg4prx7l
IQABpt0G+ACwhhFVoWdcQrS1/gFTkniM5pE3whTThijmMPQ0Pl9I/8oNAx8n
Q/e8x6lrj5H688JjGa8OWXCT1AK+tfgJXS/cAVLqJt3Cmxl9SdTviKPu6SGc
rx4N2oPuwBn0O85gNHCGrYE96OP3gRz2BpAlJUM5hwHLgaSBvY7TbRX+aT/S
Y+uHyRLU+q4of4CvbVh6bTw5m2J9qlkrjlNI4IjzDo47D4QTbn0fvEG72arB
2LvDjDgSTSGyLMfyVqb89vsJv6tHrXbCT88WXdlb9lvWstM7truj4fGw1Wk5
g+Pl0mn17WTg8fFwMBz22zBu0OvbYtTpLvtDMTq2pO10RgPFdr0cP9X+mtA5
VSEm0fRZLlGhwPlqo7IEvlASW5ASL0gsC2PA2lyVN8PUBR18cClBQ0OVvKIO
s3xiDAqr3XbGXWvLUlA5VhFVri2sZWQgc5PNyGYziTp6Z4jHEcR4Fbh1pFWV
CCKWTqOwWTGzSEJnJrVgrJR/IEjb5TMNAhPIbAqli+4Es6XtBm9hHEwyTNdP
HQ0I7T9XGAYVYkAsbHIHFVkMFmaIMuHpqJwciUuBSkjDFQt5f5GA4EkCVFkm
T6LQUg6MvbIvAxHSYmMD9Qmpwn4p6JoRT1YUWMPjBS9OvLG8PEPUKaxAcGGH
AbiY9daL0a3xRVJLayhHB7sFCNNZ0C5ARuMnUYKyhcMSBYXgKAygjOkK4i2C
xShZDxQUFCjJgwhgJFuXqCBhSunlk80FGpnJBhpJNrDg6DurqiO8p6XLcvUR
EMAaMw60FL2lyrsvMoJSfhw+QNIQ5YEERVqTeN6WAu8tVuiBOzJurGnewr8s
Rxtd1QIG5i4qlcJ5m1iix/sFTkqawsoE7iPruJcQvaO33717235XRb8I0dhC
A//7qOohzczQIt3uvetGZXjgslvvFmxBuX8IrpYeUicuAMachrXDARXz94rz
ozeKLY/cdnSNqtTQ5zhRNvUpWzQ/08OSzGehlwfOOwzFzqi6yl7Aw3rAVEx2
i8q0U1ni+OdkSGLbLB3jLlOT0uT5QWDheOPzHHdJthrzlYgAUXmXIIR4tY7q
2lxYBEpkfIWTJs+AjsGPaxPLS29hPFnZEIirlbiSmDrZGAPS1YJ9Uexd6Ggc
r7ZraxO6iaIfTJ6+OsdYDcF5WDecow+mydL9NIavQ6cBT6lbIq0AG0ZwFSWo
jNAYkiuhYPK/uLaCM1fZYxoq9rhUlDQrJzcLYa9lBS5v6b/2IpOy+7YbycYa
AQoIIA/x4EpDRc54p+FSHumpARoErh51l62BWA66YtS1223ZGw1Hw1ar3+oP
Rq3hsLt8VARNJns+4r0S7aKzN1jzrUZCbxNEtA+ppvf3IdbKEUXkmg56AIL9
IiT7uYjW/CXI9vPw7eehXPN3l3y+Swm9zYm5YJaFbchMCXaS06cqHlRFp2q3
1LjMCFg3OPFmv1YYdne4h7pxWkfE9NsS9fIVfBY9WQM8mVKQWrQSjU5/UCtO
khlM/gBlu3rU6wnR7YJ59Gyr3RPHFQ+V/4ajXrcj+10H9GbYtocPemgpRpZt
i6U17C97x8edBz3UH3UGoHhSdEXPGbWtoqpx/q5w5d0+4SI6wN0l7XsNeCm/
LXdFNcz5+D1bAo75oLwpn7El5Q0RtmW1Qaay54hOe/gQMbX6/U7Xlj1btkWn
1xcPeARHdkdCdu2BtXRG8gGPQOLXXg5l3zm2hDwelLbiXT134V2ljZqr6v/4
37t8RlgIWsW0sBCQaneUNn2ivpJkUXR0QoeR9z+hq94qwbvK3sajrmKkU3UX
N8bTryzdH2DswWz8Q12VQnKn/3uzKpbNqiiZxVMGmqIUUBETZQo+3NYnK5Ar
MXWMkK2f1DHV8YLgPR4XVjJGqa0bczqkVvNCBruS9ntaFQIOQW1SgcI7ZtGm
m0EQ1M/lhUgB014JQCwE9BXRlzrRU7KS4aNIrRzTEB3Vm7o+XFpitl5NZ1R0
/kDFtiCE9BPAmpM5UzXSYSSqUnWUH1CCtoFkzLWw8F6VmdcpI/bZQp0eohIV
8jzg/0JXB7EcRkc782wxbs/sCKF0ScxAyCJiENRmtbcm9tjMNP6Bb7aWpw9j
3Sh7bkNoUflAuLkwYJluAPVFVsjEHUJXXQ8vEwZFnp41TCUPOFflvtc0CFR+
5i8D3T7Q7xy3dIMGZuTmkIeaCAAH752b6/rgXoEbtoOkEpSwZ68AIxseTTuG
OVqiRhIFfvXJZ0hKDyvZRtrczVFO7gwv11dxmDuyAqMIQtOkQrSpFc7H3oRQ
mxQorQjJzoWNDBCGDxRVPd8eDJ9pjGnkZEUWk0B6UyypwvAPcHU7lQWAx9hA
mArbfDoxuw4KwIqFo6zPWWCBsNlsYonv3wK/l5QKh3W/AvjsX30fhnoYhP8C
EH9YIdaK0nVJZHtK2Km0MqVs8/fgkrb5e1hpOxHepxOSKq+3NytBv1ulNrWz
Z++vp9c/P/8h+GX28R+tyfjNzzP9+XT8xj59czlm07nXcye/9IYfw3Pr/O+t
+U/LlnM9/OmZ9zy+ah8/n/k/s5W/Pnu5s4Lvx+3r7XSy++nX8PRi/SLuvXnz
8ZfXT6eTn47Z+OXzi/7zy79PJhfhcHr04vLJk+ok7JMA736PVsR79zsvDf+q
+ksSzJdrMFFVyKQtVXcSJn2u2IamOwhFscsEcNBaFUC0s2UQi6IdAJg1FW4N
cGhw6VLdXaQdXEkVCRFGuTHjkAchIBQMWm6YtFw1kuChxKTbQKRUpfTINLBD
lKLWK46CAp8drSAuZ/p5Um41D0DxGotuPh16FMakffER5MyEnVLxAoq7GE/q
xC98MCWpfNunsIJtXNGnkzsuNdLKNM6o/mKuRHpo+rVU7S5PyZNX0lM1etQO
7gmLm+4HpCpVY5LEDIKeOOQytpt1FbhX2XOeDG/s5XZt0UFMphGA5xsB6IS3
QTsXKuBOvVFJMwGE+TjbK/dRhgEzPTO6Hm/GZjr5sOVZd1NlYi1KOIt3EWGw
Cl0/5NcrF8AydmTlzqT2pAykPVoJWVrgzB7vJm1fuIayqLgWVSmPYdWnQ7k8
prIbrOpsKlmQk6QKdEYH0MLzBEHYzTbpFxqbphb+OgDgskOjwnvSD0E4LD3C
S8ipBZzLaOthYXdc2UCCfREaopPeLFDHdJtituGzmBIoLdJbmAH5Qp3HoEI3
/O16oc8TqfVC9VbuqecvdC/Gt99W328QDVV6OnrCMRL++SA71Qlvt1p1/uSv
PHtVdUXUGStd5E/oDQ7eDOWl/LDhtbetxujdTbt7B65Jfe7f1VRDxVylGA+R
DCUnAI/jUFlq7oxIZzMltdWmU+rawQ1Wym+UFXTRw8zdxcQpv3MVKCst3Zd6
EfRxAOQo1A+73CJT6ZhMJjL2dxVOPQv9Y8NA8rJEtn0ou0pq58t15pujz1KD
6f5Th4cvfZ42KqHwyiZeWF9Bd9Mcco/O7slqcu68kMqISjOkLC1xElHVShft
TrfXHwyPRy34BDpK3xeoIiWFYp8+iyBXKcx5rCoYVm0zlYBM0VfXe/9JeZBj
WZD1HAsA/Me9TtsejexRq9fu9Cxh9Ue2+Kw86H5rhWGjPTnRPToFd/NA9/78
6SEZ1ANzqM/Mor4wj/r8TOpfkEtl0Xgps/oXH4W0vh6F4N/Xo5CvRyHZ3cnb
ZRo/i+Z5hNCtaeIv7mALba9WGfnSPTVz7s3JK+JxMRGvCMo6+066PX5U7yao
3rPX1CqUpuHqhYZ867LyaElM9dyltHe2h5kbpUXRFoAdoA7qdNJ0N4ruIRVP
WVqsNVm7L691u2mSEl7RCyorqXEmZm0Q6yD9dW2FOS9+fPof08n8pDI5h/uv
z6ens8l4Pj3hBz4KCBJk3fl6xNMvdX5gVnpk1lmHx18Z6r5qyKuYg1CSXjYg
rlDq1kVgmLr21WtXPEg7azUt3VnLVJMXyrgAtzE5DKK0K1e3JlMDI9WhMyFa
wxblI4oEI8gH5k9POwwyEH1lT9qx9/m/8rf8e75npaCXKgtpGiE+4W36rkUJ
3zsqTVFPw79wCV1OTK+9Zx9VhqIfxBMUXdVItu6EW0Hg8cf4Er7ULdRu/Ihe
D3I/6D6XpMRibS/ZO8ai68ykoGgnJlgWgupjEnENRtSSXhkC9t4Jz6/f/D02
+nKU1fVcmWfpCXwhK/CcT0wLIzLTvsuKLC9wxUcBoqGwiE14klK7sZ/AdzrG
zNWdUJTaPAHcXwXeFaqUjvsRxvwOwGH1oqqO/0CkAkVrfI1gWqc1uhyUWd7/
SYsRGoA5T2PJeZoSj2KEdCT3+tAf9iyjbGNHvP/7jzKqQPaD4fVnA+vPgdT1
qnOChwDpzwPRsAHZhEeZfTG3wUjzFT5/hc//TPj8uzflCyD0F4HoL4LRvw9I
Z2wUOS+bKDkt5aXahxoSJAChMK4EEPBZgAaZYe8KE0Kc/f+1/84fu5NwdGyB
q+8ue9ZSWp1Rdf2k+LccjBwhO5Ylh07Pkq2HaU2/JTv9Y3E86LXBlh/2kGgP
bUeMZEcOh/1ud/jV/vf+/XvYPyte3ZveViK8UoJrDL+Yz9IrC9+kB6OTgF56
D4X+KZj0Len0vWg+G78cl0biUTW29M8BRZ7LSxd/5EjfovGU+f26xZMu9V4S
pKtU4c4nrwhCNUiuGXpRDR4lijtAtX9Cck3bCkJErNHd3SG+bb+ElVj4+y3m
cC99R440BnLhW1rbLT/F98VmsVzD5wuTK/NbRu/k3CLogxsKEOoXe2+rX0A2
v2eQbVrDPOLm5s/4y094jHGbe63ELNpsj3pvPmVTn/jnft4tK8s9olTCkWFB
lKZ+oCxGH2eUNlRPZwTcRDmZudV7ESA3DDSVwrrnRwxuOagUPpz8OIJZULo1
dJKf/VWfgrzoxw30Y2gAwnMv/Sc1Ty5jckuZ93I2mZ/Do+kSaWJH3ASg8SZw
8fU7uGiuznVicQYpw9Sk+p8nZDshbM5qaznaDGjX8tKd+Y78AIIhFXyJ7vY2
bbGkbdbC7aMi7kuGblM1K8iMcjk9+/0yy61UycuI5izz9ot+17EgpVvqAc6z
QZ+NtlSx1G7leUrKfbfF47dbXvUbKjnzquC7utR4jxg+xacSCx/b+MMGnnQu
059G8uloTjpPan6Ao8q+8n8BdfUbCbZRAAA=

-->

</rfc>
