<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.6 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2986 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
<!ENTITY RFC4108 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
<!ENTITY RFC5280 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8610 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
<!ENTITY RFC8742 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
<!ENTITY RFC8949 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
<!ENTITY RFC9090 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9090.xml">
<!ENTITY I-D.ietf-cose-x509 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml">
<!ENTITY RFC6487 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
<!ENTITY RFC7228 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
<!ENTITY RFC7925 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
<!ENTITY RFC7932 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
<!ENTITY RFC8446 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY RFC8603 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
<!ENTITY RFC8879 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
<!ENTITY RFC9000 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
<!ENTITY RFC9147 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
<!ENTITY RFC9190 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9190.xml">
<!ENTITY RFC9191 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9191.xml">
<!ENTITY I-D.ietf-lake-edhoc SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
<!ENTITY I-D.ietf-uta-tls13-iot-profile SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
<!ENTITY I-D.ietf-tls-ctls SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>

<rfc ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-04" category="std">

  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>

    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>

    <date year="2022" month="July" day="10"/>

    
    
    

    <abstract>


<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%.  The CBOR encoded structure can alternatively be signed directly (“natively signed”), which does not require re-encoding for the signature to be verified. The document also specifies C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc.</t>

<t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>

<t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>

<t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC8152"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates. The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>

<t><list style="numbers">
  <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
  <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
</list></t>

<t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>

<t>This document specifies COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>. The document also specifies a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>

</section>
<section anchor="notational-conventions" title="Notational Conventions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>This specification makes use of the terminology in <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>

</section>
<section anchor="certificate" title="C509 Certificate">

<t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>

<t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>

<t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>

<section anchor="message-fields" title="Message Fields">

<t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>

<t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>

<t><list style="symbols">
  <t>version. The ‘version’ field is encoded in the ‘c509CertificateType’ CBOR int. The field ‘c509CertificateType’ also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type"/>.</t>
  <t>serialNumber. The ‘serialNumber’ INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) ‘certificateSerialNumber’. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
  <t>signature. The ‘signature’ field is always the same as the ‘signatureAlgorithm’ field and therefore omitted from the CBOR encoding.</t>
  <t>issuer. In the general case, the sequence of ‘RelativeDistinguishedName’ is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as a (CBOR int, CBOR text string) pair or as a (unwrapped CBOR OID, CBOR bytes) pair. The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL have be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded ‘common name’ it is encoded as a CBOR text string. If the text string contains an EUI-64 of the form “HH-HH-HH-HH-HH-HH-HH-HH” where ‘H’ is one of the symbols ‘0’–’9’ or ‘A’–’F’ it is encoded as a CBOR byte string of length 8 instead. EUI-64 mapped from a 48-bit MAC address (i.e., of the form “HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string of length 6.</t>
  <t>validity. The ‘notBefore’ and ‘notAfter’ fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value “99991231235959Z” (no expiration date) is encoded as CBOR null.</t>
  <t>subject. The ‘subject’ is encoded exactly like issuer.</t>
  <t>subjectPublicKeyInfo.  The ‘AlgorithmIdentifier’ field including parameters is encoded as the CBOR int ‘subjectPublicKeyAlgorithm’ (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the ‘subjectPublicKey’ BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
  <t>issuerUniqueID. Not supported.</t>
  <t>subjectUniqueID. Not supported.</t>
  <t>extensions. The ‘extensions’ field is encoded as a CBOR array where each extension is encoded as either a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type or an unwrapped CBOR OID tag <xref target="RFC9090"/> followed by a CBOR bool encoding ‘critical’ and the DER encoded value of the ‘extnValue’ encoded as a CBOR byte string. If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted ‘extensions’ field is encoded as an empty CBOR array.</t>
  <t>signatureAlgorithm. The ‘signatureAlgorithm’ field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
  <t>signatureValue. In general, the ‘signatureValue’ BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
</list></t>

<t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>

<figure title="CDDL for C509Certificate." anchor="fig-CBORCertCDDL"><artwork type="CDDL" align="center"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid / 
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true, 
              extensionValue: bytes )
]]></artwork></figure>

</section>
<section anchor="alg-encoding" title="Encoding of subjectPublicKey and issuerSignatureValue">

<section anchor="encoding-of-subjectpublickey" title="Encoding of subjectPublicKey">

<t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>

<t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), uncompressed keys are point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. If a DER encoded certificate with a point compressed public key of type id-ecPublicKey is CBOR encoded, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>

</section>
<section anchor="encoding-of-issuersignaturevalue" title="Encoding of issuerSignatureValue">

<t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shortest INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>

</section>
</section>
<section anchor="ext-encoding" title="Encoding of Extensions">

<t>This section details the encoding of the ‘extensions’ field. The ‘extensions’ field is encoded as a CBOR array where each extensionID is encoded as either a CBOR int or an unwrapped CBOR OID tag. If ‘extensionID’ is encoded an int (see <xref target="extype"/>), the sign is used to encode if the extension is critical and the ‘critical’ field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>

<t>The ‘extnValue’ OCTET STRING value field is encoded as the CBOR byte string ‘extensionValue’ except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>

<t>CBOR encoding of the following extension values are fully supported:</t>

<t><list style="symbols">
  <t>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></artwork></figure>

<t><list style="symbols">
  <t>Key Usage (keyUsage). The ‘KeyUsage’ BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields"/> for special encoding in case keyUsage is the only extension present.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   KeyUsage = int
]]></artwork></figure>

<t><list style="symbols">
  <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Basic Constraints (basicConstraints). If ‘cA’ = false then extensionValue = -2, if ‘cA’ = true and ‘pathLenConstraint’ is not present then extensionValue = -1, and if ‘cA’ = true and ‘pathLenConstraint’ is present then extensionValue = pathLenConstraint.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   BasicConstraints = int
]]></artwork></figure>

<t><list style="symbols">
  <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   PolicyConstraints = [ 
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]   
]]></artwork></figure>

<t><list style="symbols">
  <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/> or unwrapped CBOR OID tags <xref target="RFC9090"/> where each int or OID tag encodes a key usage purpose.  If the array contains a single KeyPurposeId, the array is omitted.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></artwork></figure>

<t><list style="symbols">
  <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   InhibitAnyPolicy = uint
]]></artwork></figure>

<t>CBOR encoding of the following extension values are partly supported:</t>

<t><list style="symbols">
  <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When ‘otherName + hardwareModuleName’ is used, then [ oid, bytes ] is used to identify the pair ( hwType, hwSerialEntries ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></artwork></figure>

<t><list style="symbols">
  <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></artwork></figure>

<t><list style="symbols">
  <t>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></artwork></figure>

<t><list style="symbols">
  <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as an CBOR ints (see <xref target="IA"/>) or unwrapped CBOR OID tags <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></artwork></figure>

<t><list style="symbols">
  <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></artwork></figure>

<t><list style="symbols">
  <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid, 
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Name Constraints (nameConstraints). If the name constraints only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   GeneralSubtree = [ GeneralName, minimum: uint, ? maximum: uint ]
   NameConstraints = [ 
     permittedSubtrees: GeneralSubtree,
     excludedSubtrees: GeneralSubtree,
   ]
]]></artwork></figure>

<t><list style="symbols">
  <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = Attributes
]]></artwork></figure>

<t><list style="symbols">
  <t>AS Resources (autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></artwork></figure>

<t><list style="symbols">
  <t>AS Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like autonomousSysIds.</t>
  <t>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous ASid, the Addess is encoded as an uint with the the difference to the previous Addess.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   Address = bytes / uint, 
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></artwork></figure>

<t><list style="symbols">
  <t>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</t>
  <t>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as and CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></artwork></figure>

<section anchor="example-encoding-of-extensions" title="Example Encoding of Extensions">

<t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>

<t><list style="symbols">
  <t>A critical basicConstraints (‘cA’ = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
  <t>A non-critical keyUsage with digitalSignature and keyAgreement asserted is encoded as the two CBOR ints 2, 17 (2^0 + 2^4 = 17).</t>
  <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</t>
  <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string “example.com”.</t>
</list></t>

<t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 17, 8, [ 3, 6 ], 3, “example.com” ].</t>

</section>
</section>
</section>
<section anchor="CSR" title="C509 Certificate Signing Request">

<t>The section defines the C509 Certificate Signing Request (CSR) format based on and compatible with RFC 2986 <xref target="RFC2986"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>. There are currently two c509CertificateSigningRequestType values defined, c509CertificateSigningRequestType = 0 requests a c509CertificateType = 0 and c509CertificateSigningRequestType = 1 requests a c509CertificateType = 1 . subjectProofOfPossessionAlgorithm can be a C509 signature algorithm or a non-signature Proof-of-Possession Algorithm as defined in e.g. RFC 6955. CSR attributes other than extensionRequest are not supported.</t>

<figure title="CDDL for C509CertificateSigningRequest." anchor="fig-C509CSRCDDL"><artwork type="CDDL" align="center"><![CDATA[
C509CertificateSigningRequest = [
   TBSCertificateSigningRequest,
   subjectProofOfPossessionValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   c509CertificateSigningRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest : Extensions,
   subjectProofOfPossessionAlgorithm: AlgorithmIdentifier,
)
]]></artwork></figure>

<t>After verifying the subjectProofOfPossessionValue, the CA MAY transform the C509CertificateSigningRequest into a RFC 2985 CertificationRequestInfo for compatibility with existing procedures and code.</t>

</section>
<section anchor="CRL" title="C509 Certificate Revocation List">

<t>The section defines the C509 Certificate Revocation List (CRL) format based on and compatible with <xref target="RFC5280"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>.</t>

<figure title="CDDL for C509CertificateRevocationList." anchor="fig-C509CRLCDDL"><artwork type="CDDL" align="center"><![CDATA[
C509CertificateRevocationList = [
   TBSCertificateRevocationList,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   C509CertificateRevocationListType: int,
   issuer: Name,
   thisUpdate: Time,
   nextUpdate: Time,
   revokedCertificates: RevokedCertificates,
   crlExtensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

RevokedCertificates = [
    userCertificate: CertificateSerialNumber,
    revocationDate: Time,
    crlEntryExtensions: Extensions,
]
]]></artwork></figure>

</section>
<section anchor="OCSP" title="C509 Online Certificate Status Protocol">

<t>TODO</t>

</section>
<section anchor="c509-processing-and-certificate-issuance" title="C509 Processing and Certificate Issuance">

<t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>

<t>The CSR format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>.</t>

<t>When a certificate request is received the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof of possession of the public key, before normal certificate generation can take place.</t>

<t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with CA may be needed.</t>

</section>
<section anchor="dep-set" title="Legacy Considerations">

<t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. In order to verify the signature, the C509 certificate is used to recreate the original X.509 data structure to be able to verify the signature.</t>

<t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>

<t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>

<t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>

</section>
<section anchor="expected-certificate-sizes" title="Expected Certificate Sizes">

<t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in <xref target="fig-size-COSE"/> and <xref target="fig-size-TLS"/>. COSE_X509 is defined in <xref target="I-D.ietf-cose-x509"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>

<figure title="Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain)." anchor="fig-size-COSE"><artwork align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork></figure>

<figure title="Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X509 and C509 are Certificate messages. X509 + Brotli and C509 + Brotli are CompressedCertificate messages." anchor="fig-size-TLS"><artwork align="center"><![CDATA[
+-------------------+-------+---------------+------+---------------+
|                   |  X509 | X509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+---------------+------+---------------+
| RFC 7925 Cert (1) |   327 |           324 |  151 |           167 |
+-------------------+-------+---------------+------+---------------+
| RPKI Cert (1)     | 20991 |          9134 | 8660 |          5668 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (2)   |  2204 |          1455 | 1414 |          1063 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (4)   |  5190 |          3244 | 3958 |          2845 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Bag (8)     | 11578 |          3979 | 8882 |          3519 |
+-------------------+-------+---------------+------+---------------+
]]></artwork></figure>

</section>
<section anchor="sec-cons" title="Security Considerations">

<t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>

<t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>

<t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>

<t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>

</section>
<section anchor="iana" title="IANA Considerations">

<t>This document creates several new registries under the new heading “C509 Certificate”. For all items, the ‘Reference’ field points to this document.</t>

<t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>

<section anchor="type" title="C509 Certificate Types Registry">

<t>IANA has created a new registry titled “C509 Certificate Types” under the new heading “C509 Certificate”. The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”.  The initial contents of the registry are:</t>

<figure title="C509 Certificate Types" anchor="fig-types"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="atttype" title="C509 Attributes Registry">

<t>IANA has created a new registry titled “C509 Attributes” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Attributes" anchor="fig-attrtype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="extype" title="C509 Extensions Registry">

<t>IANA has created a new registry titled “C509 Extensions Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. For values in the interval [1, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Extensions" anchor="fig-extype"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:   AuthorityInfoAccessSyntax               |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestamps              |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:   SubjectDirectoryAttributes              |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     ipAddrBlocks                             |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     autonomousSysIds                         |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     ipAddrBlocks-v2                          |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     autonomousSysIds-v2                      |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="CP" title="C509 Certificate Policies Registry">

<t>IANA has created a new registry titled “C509 Certificate Policies Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Certificate Policies" anchor="fig-cp"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="PQ" title="C509 Policies Qualifiers Registry">

<t>IANA has created a new registry titled “C509 Policies Qualifiers Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Policies Qualifiers" anchor="fig-pq"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="IA" title="C509 Information Access Registry">

<t>IANA has created a new registry titled “C509 Information Access Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Information Accesses" anchor="fig-ia"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="EKU" title="C509 Extended Key Usages Registry">

<t>IANA has created a new registry titled “C509 Extended Key Usages Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Extended Key Usages" anchor="fig-eku"><artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="GN" title="C509 General Names Registry">
<t>IANA has created a new registry titled “C509 General Names Registry” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 General Names" anchor="fig-gn"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleNamee                |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="sigalg" title="C509 Signature Algorithms Registry">

<t>IANA has created a new registry titled “C509 Signature Algorithms” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. The initial contents of the registry are:</t>

<figure title="C509 Signature Algorithms" anchor="fig-sigalgs"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="pkalg" title="C509 Public Key Algorithms Registry">

<t>IANA has created a new registry titled “C509 Public Key Algorithms” under the new heading “CBOR Encoded X509 Certificates (C509 Certificates)”. The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is “IETF Review” and “Expert Review”. For all other values the registration procedure is “Expert Review”. T The initial contents of the registry are:</t>

<figure title="C509 Public Key Algorithms" anchor="fig-pkalgs"><artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork></figure>

</section>
<section anchor="cose" title="COSE Header Parameters Registry">

<t>EDITORS NOTE: The text should be moved a section and not be in the IANA Section.</t>

<t>This document registers the following entries in the “COSE Header Parameters” registry under the “CBOR Object Signing and Encryption (COSE)” heading. The formatting and processing for c5b, c5c, and c5t, and c5u are similar to x5bag, x5chain, x5t, x5u defined in <xref target="I-D.ietf-cose-x509"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cbor content format. The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>

<figure><artwork type="CDDL"><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></artwork></figure>

<t>As the contents of c5bag, c5chain, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>

<t>Note that certificates can also be identified with a ‘kid’ header parameter by storing ‘kid’ and the associated bag or chain in a dictionary.</t>

<figure><artwork><![CDATA[
+-----------+-------+----------------+------------------------------+
| Name      | Label | Value Type     | Description                  |
+===========+=======+================+==============================+
| c5b       |  TBD1 | COSE_C509      | An unordered bag of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5c       |  TBD2 | COSE_C509      | An ordered chain of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5t       |  TBD3 | COSE_CertHash  | Hash of a C509Certificate    |
+-----------+-------+----------------+------------------------------+
| c5u       |  TBD4 | uri            | URI pointing to a COSE_C509  |
|           |       |                | containing a ordered chain   |
|           |       |                | of certificates              |
+-----------+-------+----------------+------------------------------+
]]></artwork></figure>

</section>
<section anchor="tls" title="TLS Certificate Types Registry">

<t>This document registers the following entry in the “TLS Certificate Types” registry under the “Transport Layer Security (TLS) Extensions” heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as as X509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>

<t>EDITOR’S NOTE: The TLS registrations should be discussed and approved by the TLS WG at a later stage. When COSE WG has adopted work on C509 certificates, it could perhaps be presented in the TLS WG. The TLS WG might e.g. want a separate draft in the TLS WG.</t>

<figure><artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork></figure>

</section>
<section anchor="tags" title="CBOR Tags Registry">

<t>This document registers the following entries in the “CBOR Tags” registry under the “Concise Binary Object Representation (CBOR) Tags” heading.</t>

<figure><artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC2986;
&RFC4108;
&RFC5280;
&RFC8152;
&RFC8174;
&RFC8610;
&RFC8742;
&RFC8949;
&RFC9090;
&I-D.ietf-cose-x509;
<reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
  <front>
    <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
    <author >
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>

&RFC6487;
&RFC7228;
&RFC7925;
&RFC7932;
&RFC8446;
&RFC8603;
&RFC8879;
&RFC9000;
&RFC9147;
&RFC9190;
&RFC9191;
&I-D.ietf-lake-edhoc;
&I-D.ietf-uta-tls13-iot-profile;
&I-D.ietf-tls-ctls;
<reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
  <front>
    <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
    <author initials="." surname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2021" month="June"/>
  </front>
</reference>
<reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
  <front>
    <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
    <author initials="." surname="CA/Browser Forum">
      <organization></organization>
    </author>
    <date year="2021" month="May"/>
  </front>
</reference>
<reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
  <front>
    <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
    <author initials="." surname="Institute of Electrical and Electronics Engineers">
      <organization></organization>
    </author>
    <date year="2018" month="August"/>
  </front>
  <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
</reference>
<reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
  <front>
    <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
    <author initials="." surname="GSMA">
      <organization></organization>
    </author>
    <date year="2021" month="February"/>
  </front>
</reference>
<reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
  <front>
    <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
    <author initials="F." surname="Forsby">
      <organization></organization>
    </author>
    <author initials="M." surname="Furuhed">
      <organization></organization>
    </author>
    <author initials="P." surname="Papadimitratos">
      <organization></organization>
    </author>
    <author initials="S." surname="Raza">
      <organization></organization>
    </author>
    <date year="2018" month="July"/>
  </front>
  <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
</reference>
<reference anchor="CborMe" target="http://cbor.me/">
  <front>
    <title>CBOR Playground</title>
    <author initials="C." surname="Bormann">
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>


    </references>


<section anchor="appA" title="Example C509 Certificates">

<section anchor="example-rfc-7925-profiled-x509-certificate" title="Example RFC 7925 profiled X.509 Certificate">

<t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>

<figure><artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2020 GMT
            Not After : Feb  2 00:00:00 2021 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
         30:44:02:20:44:5d:79:8c:90:e7:f5:00:dc:74:7a:65:4c:ec:
         6c:fa:6f:03:72:76:e1:4e:52:ed:07:fc:16:29:4c:84:66:0d:
         02:20:5a:33:98:5d:fb:d4:bf:dd:6d:4a:cf:38:04:c3:d4:6e:
         bf:3b:7f:a6:26:40:67:4f:c0:35:4f:a0:56:db:ae:a6

]]></artwork></figure>

<t>The DER encoding of the above certificate is 314 bytes.</t>

<figure><artwork><![CDATA[
30 82 01 36 30 81 DE A0 03 02 01 02 02 03 01 F5 0D 30 0A 06 08 2A 86
48 CE 3D 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0C 0B 52 46 43 20
74 65 73 74 20 43 41 30 1E 17 0D 32 30 30 31 30 31 30 30 30 30 30 30
5A 17 0D 32 31 30 32 30 32 30 30 30 30 30 30 5A 30 22 31 20 30 1E 06
03 55 04 03 0C 17 30 31 2D 32 33 2D 34 35 2D 46 46 2D 46 45 2D 36 37
2D 38 39 2D 41 42 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86
48 CE 3D 03 01 07 03 42 00 04 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E
69 3F 16 21 3A 04 52 5E D4 44 50 B1 01 9C 2D FD 38 38 AB AC 4E 14 D8
6C 09 83 ED 5E 9E EF 24 48 C6 86 1C C4 06 54 71 77 E6 02 60 30 D0 51
F7 79 2A C2 06 A3 0F 30 0D 30 0B 06 03 55 1D 0F 04 04 03 02 07 80 30
0A 06 08 2A 86 48 CE 3D 04 03 02 03 47 00 30 44 02 20 44 5D 79 8C 90
E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1 4E 52 ED 07 FC 16 29
4C 84 66 0D 02 20 5A 33 98 5D FB D4 BF DD 6D 4A CF 38 04 C3 D4 6E BF
3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding" title="Example C509 Certificate Encoding">

<t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'445D798C90E7F500DC747A654CEC6CFA6F037276E14E52ED07
    FC16294C84660D5A33985DFBD4BFDD6D4ACF3804C3D46EBF3B
    7FA62640674FC0354FA056DBAEA6'

]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>

<figure><artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 44 5D 79 8C 90 E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1
4E 52 ED 07 FC 16 29 4C 84 66 0D 5A 33 98 5D FB D4 BF DD 6D 4A CF 38
04 C3 D4 6E BF 3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork></figure>

</section>
<section anchor="example-natively-signed-c509-certificate" title="Example: Natively Signed C509 Certificate">

<t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType and signatureValue.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'B27A0B781455F71B68290F6C2EC9A897F18FDE9B6C59575953
    BC67268AB0E4DDE99D273E04E4715383AB2257C6AAA35284E5
    ED18BDB91247E9F2C433136480B9'

]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>

<figure><artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 B2 7A 0B 78 14 55 F7 1B 68 29 0F 6C 2E C9 A8 97 F1 8F DE 9B 6C
59 57 59 53 BC 67 26 8A B0 E4 DD E9 9D 27 3E 04 E4 71 53 83 AB 22 57
C6 AA A3 52 84 E5 ED 18 BD B9 12 47 E9 F2 C4 33 13 64 80 B9
]]></artwork></figure>

</section>
<section anchor="example-additonal-keys-for-the-example-certificates" title="Example: Additonal Keys for the Example Certificates">

<t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC8152"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>

<figure><artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork></figure>

<figure><artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork></figure>

</section>
</section>
<section anchor="example-ieee-8021ar-profiled-x509-certificate" title="Example IEEE 802.1AR profiled X.509 Certificate">

<t>EDITOR’S NOTE: To do</t>

</section>
<section anchor="example-cab-baseline-ecdsa-https-x509-certificate" title="Example CAB Baseline ECDSA HTTPS X.509 Certificate">

<t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>

<figure><artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding-1" title="Example C509 Certificate Encoding">

<t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>

</section>
</section>
<section anchor="example-cab-baseline-rsa-https-x509-certificate" title="Example CAB Baseline RSA HTTPS X.509 Certificate">

<t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>

<figure><artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork></figure>

<section anchor="example-c509-certificate-encoding-2" title="Example C509 Certificate Encoding">

<t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>

<figure><artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork></figure>

<t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>

</section>
</section>
</section>
<section numbered="no" anchor="acknowledgments" title="Acknowledgments">

<t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombinini, Thomas Peterson, Michael Richardson, Maik Reichert, Stefan Santesson, Jim Schaad, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIANIhy2IAA+y9aZrbRrYg+p+riE/++svMMklhHtjP7zVHO681XaVcVf1c
vvWBAJiJK5LgJUilslSur/fQC+hd9AbuTnol75wTASAwEplOyel6pmWJxHAi
4kxxpogYDAa9Q3RYhyP2bDp5/ZbNt34chAH789BUXDYN94doFfneIUzY+bR8
6eJZL4j9rbeB14O9tzoMovCwGvhxEg78ZbwfhBzawIeXBorR85bLffhhxCqQ
er1otx+xw/6YHDRFcRWtB9dHLDkEvR7AiLbXI3YE2E5vF43YV8z3tuyYhMzb
7707dh6tmLdeszvoE4v37MZLbthNuA97jB1if4Q34GsS7w/7cJVkv+828k94
Mgh3h5sR03o973i4ifcjuIyfgfiXsWgLz//LkL3Zh8f//F/spXc4JEm8ze5z
bPxLfLNtfCTew2Dm+8jHq2w8yW6EGy9aj9i/w8vDjXjrv4XiwaEfb+p78+2Q
XYVrbxuE+1I3vv3P/70HRFXunurBdQyvDRPxWocuXA3ZW+9vXqn5qxvvJgqK
d6jpt5dX85pmE3p+uIfn/9s+gvYbsf/df/7v6/VxG1TQHq6r99qa/Hd4Y3gT
0wttbb4cssVxf7wJy02+9ICLt5Wb1Oar8OMxYd/u4+Ou3O6GXhuu+Gv/bYtP
XuODhONebxvvgQOiD+GoB6++XUw1VXVH4qvrWOKroSqO+GpqjiK+OqqpZV9t
I/1qqdkDtpE94BopXBfkDr9eDmbDXJA/gqxSJ67m02+5PAiNMV+vo90h8tn0
uP8Qsun+bneIr/fe7uauz64OwDvePkjYCgRyvgJBj8LtofAUR02ffQj3Q5A5
Au3tr0MQ/JvDYZeMnj9PQv96CMjEL+rggzbcBSt6MAC1AYIKugJ0x3ZVRpdl
OLYYlq1pKY5sVzOzr3qGAsOwMhwpevrVsXPEKCnmXNWws69uftVVC5hbe+/D
QRjcgO6RLx8P3uCwTlR9EMWHwW4fryJApPwE3B348BeMAy5Px5PBuxdXo1rU
+N4Shn3cEHqWHkhrtA0H+/A/jtE+3ACukwFo5yN9ey7TbTp+PtnHt0m4ZwsE
0GfPJuJ19lZ6nSh3uAnZZZIcva0P2nYbAMNvvWt6gMUr9ua4XEf++m7wDlU3
TByFKeOP4T6JQMOoQ3toPaM+tOrVcs8kSv/LEXqnKZqa4mUKM8uDEYPT0iCJ
rrcwsXxB3ECr7Iq3Wo8obaj/MjS9hNkwxdLlfD4fOIo2VMdv6zGVpEIKzBeG
XM7Epefw4l/hxYGmqM7w5rBZy2hC0JmIEy5exL63JiRswsM+3sXrCG7D/Bx6
bBsebuP9++T//I//eRX6x33IZuGHCHB2GQCqosMdgYbhRGGCspwOu9iKGAl1
6DSOLrcJQD4eQqTEfB36B5jERA/5z3gLsxoYPNdAW0C/hMTx8RoIxqghuPzt
1cvxIPzhcjqtx+Lt7e3wOtl4qLqfwwg2z293wGHbAwzu+XG3jr0geY5Eea5o
z6++fTNUDdRkaqbLBFKxHUbtsDffX8oMwt4AOv07iU3U0xhAcNKgFuFyf/T2
OXuQiTe4jN/VjyqII2IIVRmqimI/d21noA901R24uu3aA/uvqiH3/kV0fXO4
DfFvYT3OomvggXWR0zO5AfTsgTGQPO9uQCCSYQMXPLva7eF+uO+z6Y23GT4D
W/UFEBD56FWMMAEEB5mSHBuZxpsdfN+zK5x4/DCBOSn2I+jPZTpdAPmRHd6F
wA/xZnPcYh8BvzlXQLswPcVrphnasINkLoYokcnyrqMVUbr/BuxKb+cF0SY6
7L1DnJy2tlLtuL7L+HUKpvfLGt2IqhFuDTdhUeWh3f9m7d2h/SHMpnb1M2QT
ROB2W1E82IHBYMC8ZQID8A+9HtA2Yek8xJJd6AMrAM083i55CKgOgYaca3yJ
W4bAGiHbh8lxfcCH5HuoWsANWK9RsZb9Cf5isYXkuNuBA4BNrxErcGGZcAaE
KZyh/UTsgI5EoSHgjR3wxXIdstvocEO8hm+gNdHnSkroJnYOiu1ydgGc+upq
3GdvQY77klz3qYGy+mb1M4wwD2Asf7oJydsJwEUBbAi3is3mYnSZvyZ3u0/9
LKIAvSYwVoF0d/A9gbHtw+AIihgfTaK/hSkycGhpB4IiNggFMZhszFT+y5CV
EA1PA+WPXDqxOW+Nck62GbDoEpu53sJTAYwTDB3w3Z5ld/mtZ4C+25vIvwG2
gfa28YGJuTsbO44lVST4kkfNAXIAPvQMOSzgLJBxnrdOYon9OMe8Bp/gJvTA
xwF0efwi2FvygNnhbhdyuokHECeMa5Ah5/ZNFATrsNf7CrXaPgaMohZhn76K
8OfPvd7rbZgqKf8GWRbUmcAkeJzr+A4H5AmDgX0f3qGO2ns5Js+BkS5adCc7
Bz1+wUDUMkpij3cezBeycO14C++hhQJRP30SHsTPP/fh9S2xREz+dUgUiMHQ
3wBYPtnD5IbyHSEhw+2HCOZSzrMEBw3un38eshckZTIuYfCgQQgo0QM4DKSK
VDHy5TbeDmTQcBt88nidgKgCO3igl8dv0CDm7aAB/vPP2XcVvt+i00/aCw0L
aBOUMVIQp35gsAAME0AMgoGJJqG51FvhJBFv4bahsAFwNSM9OACDYQds8a8g
uKINcAOyNhDPaxjTFqZlwBeYOShOZFLiYLfI2sctiK8gSbhHkUnCLXhE4ip0
5HCzDwFWtEF9lnDBXN4d+C8QkBAEA/EQIeVj9sFbR6BukaTES2tyqbwgABWZ
cCZFlcO7iy5QjhKk6vW6RA7oAZeYO64Sh+xljHKLCs8/FJ7dhztoBJoTM6TH
cbAPV/hGAFP23kMNmaoXDM6Qihmy2ZFkk3p83O+xy9jJYwK2MrLmKT32Pgx3
pL2EHo7AtLzj0lN9FURgC3hLEjR1vAPgGsSImNZjwFfbJCLZ3IGWiEFHfBff
hh/QtMDeYZ+hPx7byFjINE6m/Kfx1o/g2Um0xVZeL/8dVBkobxlD7ByV4gUn
BTrZQAqubDlDyLgleS2yDleAN8AF77fxLfWXVA5K5jLchqsIpA1wDby7IQMo
CDkPBqxgypCmRhXXZzsYKhfd42aH9/opA4PIg6AANfosPPig1EifRzhTArd5
QtkRkUl3IzbB3sV5EuehTN3waxtE/jW/PORTw/IYrYHv4y0N/V+uXr/igDfw
+hruApI/Hkg0ogPwPwuH18Mc70uOZnojmzaQGDG8iP6dZeCwPnDjeAjqEUWC
01nwnQBRmA37/CcpIkQ0Aveut3GC2gh0HscfiOkBUQHIDYjBcaAhQKcf0Neb
I1AlNTgEY8ywqzMg0pb34oW3vT4iTs6ns9mLlCksFdUJKLkPUUAW0S3YUNDh
8CMyUpJPpNxqTrVhimBuvI7fXCa8k8i9OKIhzeAInY8tRS3ioWaEKbkJvdEh
3HDZTqUK+gNtA3fRr9U+3pCCws7RxHNM+NyF0+QAJ7bDzQDU1DGUDC//Bkya
vqQ4udq7AV8hBOGM9zABA4kOmSVPeANLnVpCTwrmA5ZFeVBpL5H2+OjG+3fU
jdC64LXMzEtQsAFIEK1WIWkdfIoLSzbWPgqRzC0wZYfga8CMCt/67Ah/X+CU
uNkBuWlgcIv4c3tcr+FWARvnaPdecE18AMTnNw78Rs5yuTmKIeyE/eXHv/xU
7tvG28GNT3/5GW/svGhf6T2JHVhH5OEUb5IrApRBPbYOsZPc+hGKgfj4o4f3
AE4C9JBUVV9mUd4Kv2AbGk7tf8IJARUNcBYj3OD8T5NtzMDhyKxVLv53gk0y
i3SXuRsAl/srABY4cTxpsIbhMR4Mw/5kJiq3N+AbXi1Y4p8+yeGPdBBolqdD
U3SQPo6TgjWUGd5CCYtZ0tvtYLqlQckPL0nnShYH4haVU5+0WJ9l5gqGGbEf
ZYOiz2aSSWPYeIUsU/6Wamp4ZT777jW+VhNixNvC4cX5CoGpQ11+No0qIunq
cSe+LqNEfq82XpnishXdObOh3cW90Dq7lZu/RGJUod18RY5ztLA/ZUEM7FVO
LyFcwtEDM5jrltTP49q6xjOE6aves+uzAmsWuJH/wOAeYbJkgPVFSOfTpzyO
xNU+d64e2euVMZj5TymXe3V8Dm/domm5j7ztgTcQ4NQFLeRSm3ibsjOJPMB1
K7kYaECDLr0V8+UyJMySwTDq9dQhG6MK/4Dt48xJsGR/7qQhWHRSCrK5R1Uv
NE68pNkCOx3vo2uY+NftgEHtaEP2quiEcuQW7dB8/sp9ThgpUMM/oiUVcLe4
6naDz3MA8wGHmD2RdYlQSbacKugHKg8e4xP2NhT21vjq1VAlnOObqWNH8ww8
5iUJxrYO3PwDdfwRTeQlnyPvMi9u6fnvbykpU45pZDpcmPfc48YmKrgDfJ1E
VllpwugCCvkKWwU7RBwjPHuinKREyWHYnmhFHgT3r5KULyLO954wD0CWMPxL
uhmRSR4KKA1Z/UjkRX2BeidKkmOKZQor3FXEMR1n1gR6xH6c3AHFN8Pm8Jcc
eqAuCd+DmKeCTSIRvpJO1JiZQ2XeFuLwakMZHRvDV3HYNFmd85jPPjO6U4MJ
RKvcBtJkz13ri7S3fObB+MgrYXRiVBgt9i1xG6IppKDEbYzM+ezlD1fvnvX5
v+zVa/r+dg59eTuf4fer78YvXmRf0ieuvnv9w4tZ/i1/c/r65cv5qxl/Ga6y
0qWX4//+jE9qz16/eXf5+tX4xTPyrgrU87IYExqJexgmUtvDSSzx99GS8/lk
+oapBldWmLRNIxSYieXu+JY3RfzPf3Ih3e1Cb0/2KHpW3g6D52jigSl7gz4g
8mfKUkVbbgO2QCJTFd3CaBuv42tSygXNKcVoGs08MgJF4BFc/HBPqkDYc32O
l5I5ub5FK5YeJitwFvJOROhtkBWQ1pZwGzgDwNF2Ffpc8xhDTSg6/KbhiOQ+
IReVJz726SuJBX9OUcQhShJBfjfPy3DzV44l1in81OGPyZNYw9yCnj4oJRzg
jiJ9KPsUQEnDBcVASWpbYCslY6RAFOoOwjnc8BmjaJ5VrdmqmSGlj4q2Rhp1
rrdfCuYLOc+VCQzjAxSjAyyiH0/+4Rqc1gCMm7QIwKcigF0ckRGB81K0yTwm
b59rBnzr9eWMrgGy1p4PHECoBjYHmy31wHi3MWayDcAykabTdIoMhmj0gm8v
rJQklJw9bC7ekmbvHncpzR+7GBRZNkdeh1tyKHfH/Q5jo5KqA/a/BmvjcLPJ
fKlVdD3ABjiWh1zHVacwPn+EEcbSUkO3ZBZ57fZLn5td3BxKThgo26LxAZe4
YcHdRn63pgVyJE/Nx/fpSBbHicv8hjehM8SJy/hwIxIVZdqlcoxRquAmTPXT
gVvO6WyfsGvo8hY9UEncUgN7ILMUj7MBCExVV6OLhSkSDasNZTrzh2OiINAT
88rAJSnspNpaZpfT26h8Jg0tAdsIgcxfziabZbiOb/vC0sUQCvBKuBb+Mk4j
PLDAo+2kndMmBKHJqOevehzD2esi0+DHe8AmyBE1fQVT8PzVdI53r+bvUjCy
KYv6+Sv2UoQAF1xffPpKhKwGXIH8zIWB81mqU7glG+2Lqod3fx1R/YQYMD5K
8QXRfpAH2gADNXo8F0iEjRMHhuF4wKFi/sj+jxxglZlB4qUaRwXcnT+wLBqJ
Iz0Tv874aJHdSqQ48wGKNKW9A1PtjKMC9CGHwt+tf5JsvwjIxAdBNgBaew1W
3hBrtlBNosrLHs6M2ZOW9ypeAymQJ/jwP+jsvKZf7BumXHDlUVBsmRqD9xCv
MugGOGpuTcIFot0fqFjAW786bpZYQUaYli+dsctX7+bfQgM8IllBvuD64/Z2
j9aXME2OWzHsJfxz3LDzf8AXCgQC8vOOXcktoXt7h8kGEhTlo6LwwOD5IScL
d33Iq6OX0llmG14TvtP8ncipxJvoAFzPB5qq0XSU6W+Jo4SMZ4ItBpc/O07n
qPQlIXPF9niMt2IDUDfQIUJMC52UToioofsizcVDkch3Z2/DNY1rhibgFjCY
3ITBK+jaWYkGgjt4LS+KcPaLJG98AHUOKpcCHGkuDywPDyaaxja4eS1ix0me
//JSYJnvnPWZY3/b1jO5K3NsP7tQGdJ5Krwi6CuFgy8olktyQU+W+A+Mo34a
OMUqa3qaE95bJvEaW+MMnUq3aImd55oOx8kl5UL0i7NDPn4S+QwJwCQ4hLzK
QFixadIaqzkwgXngMy28+1/RPIrIGsYp7IfDyrk68IqZlKPpxhu4RtkSfpcP
JMfbHAti2ZjnMCU+Bl10OTbTd4DjTiklHr4rRN1Rl//wbjFwctKIAo8MDaRe
uBt5433A5BqlodMRQG9lgPxBYDUEEfCAQcwwmsD1mWx6gDk0DIf9gpISAGTe
JATbhozjrC5lfDW9vMT+xreoju7KuKTh+PFxe9jfEdNLA+G5GKZxfEt0Az4I
MR/wMaXWcRvh/OSt0wsIdbnZpW2I4JHwZNDqvlwxaq4qXjldxT3eS6zdF9yR
keIM8wfxluqozzDxV6sUJHpSu9y7za5JXdiy+Q+XA8tIpQKzRezZd98N6v48
E+Ges+9IGcV5gUZyt1liycGZcvZ//sf/PHPPUE7PxvRj0dxPKQ2EkAT2nTT2
N0w7t+GCTkrWY4YzWALEl+NpmsVn55xr6gexWAwW82wQF/fpikUanCoIosOd
mEeArhPS/mdEdPw9xnqIs4Krl7dQ0lThLvZvBjwcj2Vgz8nnO/8H/nMh5/u8
64LBvs3nWOHtkYS/eX11+WfyG/s4le7QhY+3ohfwOPQzEF65Jz+ADF8IVOeA
0llQPLjkU110IM8x895qi89y958AafrIdEeWAgplWpyoS8KBNYl8qs/KyjZY
woogZbcuEJbaPj5e83buMP6jKYaLvYZm3hEmkDDoNO3FG3DvWz7xYj0OPsOJ
yaeEZy58VE2HP6Zruv/vM3a+pZRytOcBCQRSZhwiJuYzubFxpDBHamrwX4U5
O/zokfO2jt6HqVEgvcnrmL4P77DSUpSInWXWBy/6Bf7aZ8bL1l8fCS070IEb
DBwlNWZaNs2dlduRLBsxBe7eg0eOc5+YZIU3JJhnW2ZkjEcgk4q0HNUVxTse
qYRxcnOXq2ARIE672Sp+xNXCSuoLa6zU9TM2uXzHrt69vXz1bYuZWge7JhDo
AS02YqaX4GJ5w9/CfQzDpgmecu3p1C9fI/ioD4XtSSlkmBrmWx/XbaR54ygY
hH42hH7RQQXWLg8SQa6Oe/KQ80qycuT00yegWeYlCxOfc9cP2wiMtMsZSZck
bBLTtT1CJRAo6cIZP8sv1LhkZbuP6zEyN7P3Ss8X4zeSKQYvCCNM5iFgwJS7
xBuHcEOhHrAkuN+278ilBbCCSeI4Dz/ANAuSgTbzWUZx2ZUtGJKIl+0f8crZ
Scbmb3AMZZNwqhgOt1RJkTNZveG6ivYJBfwQnRq4foVwA1hW78O7HzBwcNGX
Wsv5MwOf07NCSGGYZITJtHp9l8REEYkQcWYbl3sME3reZmmWLAS2iQdkrua5
5/xlMTkEIreQcW4WtOJBYBGdL6XZsWUe4qJGgZ8O+9A7YBCHMq4pok5zPPg9
m93hTmL8oueZ6diyC1pxKzuo86qgALgnobELYyZRqFPihQc6qvBsCpPtM67e
rkoNfinNftqlKsRwqXetKe/Ml343uZrK4SZsbT6dYVF8ebKoQ8HDJgweVsxj
U13L8Xi4T6IQ57xpMRCVobU4UqkuqjJq7M4mJMcPvZxCdAddQHLU0vwiFih+
4PQfY9o8XYuSF8DzSrt8wng5/u+So96Qya32+B/lgckBiOKtC5CHf+Qfhvjq
lV//hv2IC0GKg+/jpVrSjnCW6/d+6vX+K1eFWcw5dXlS+tGCWFJxabhXjP5K
DGXUKzYKXTnHdmtCiCMKxdDN+hDeSM4oyjekkYzI7aULqSP1KvWgRozM9dI9
8qakW8JYkQA12rIjVmMy174iMAp3ci0/kuanOlqcauai12vAByA5DYhiJciG
GID9oSUU9xN7zn325zyi1es1P/uNFEJ4DnC1P0gXgGfyH0DrYhiHkzi/Ruw2
4i1fsOfPs1VM+Km8+484Cqov82J8QAZSEEdOvuBzcpagM1XMwTM4qz0nePBP
odH082OeL0wbzieotFEYrGRicBxnFwinRIH8EiIkY4DLmUBHdkWMCE3MGmwU
XuRd+n9YajrSzgzgipYGUwadIkvSGL1PI/ZVOfPCV55984y+p7l3WXE++xnf
8/a0bHQA0nS9/eaZH2LVBdzCDNO8zdsgF6VO9Xz6qjBhIKR2UL0eTlxvr8bS
ypmEnRc8ImGbZskxqo0UeYcsxiqCMFJUpWzCoslck66A1jZxcFwfEyQlz2hf
lA3OzFhCFXobd09o8Bgl+8uPTDQC2jm9mbcnXWR/+Smz/bPbMFlbpqnbspGe
W+b5Q/KQK0TDhQlRQmFPmhvx5bRTxaF2Ht2Qk69coiBREqaUP4Ugtbjk6D//
F4+2nRe92wsMkOa1C/w9xD+VOkhVDdw8yRKHoqAFl3QPdV7vgTsoUI1FOacv
579EeKsCXVq6hVRGxip2FDEsp9FFZtg/hDC3Kh9XnBHhSyBPqVllovJR0cQT
ip6mJYt1jIW8QIhOB9UxBQG7G/hxvIeHqAwAfTheJ7O+G1aFrE40OaXIQszt
zeQBkgVWT4jBeZHteISknCSseQS6SVi5RZcVofDOiXFQeQsueGjISu68IEhL
YdCmx/Vkcd4/bFNuJYt28kbKVcNFL+Ok11OikTTzfPqq4MCWqquCEDz/dVKx
6tNwQtHpfKzwCzh/pwIwbREUouOZBK2YkdzWRnD6tYkysRY3SlWiFB9KZ89M
F0qhmGzUGWdN06fD+riC0AtZao06gpBp1WS3l7OEHb4sSpLkmM/r6bv5Qz3Z
s6I1cAZd8cPdIVu0KvUsj49QRQf3DpN4Iz/UT5NkmCNa33F889o5HFghSlJN
ViN9YV7IHspfPCapZqwsjaYKaf5EuiiqzNG5b5JTWipxWx0x9pA1S4Ug7IrP
dHxZb24nnosZEMPk2dWLUnQoc4Yl7PM+YJVJxTMDm6wADkxCbnCzrBvl+4Xf
BcsN+o5dpvgbO88icUKEvxe/C8GPKCmXxtakemilL98RhDOQqEBKCzLLESLc
3QoFsVRD9DNfhiiiXlKtPS8+S/ubrokmJsqJJmaxOveWI5G/TMZ8GStiM46X
oFf42q4dXUh/A4Z+Af3eFGClvjVjX4NdQvPmLN540ZY/llrqgpWqty7w5Z/K
A5h4Ce7alK60PuC6NbwkXbngKtIfn0EXVt6al/NtyyP7hg20Pio/8SS6CTyT
uPMONy/CbQ7yLCuqzAsL6uCpPOPVHWY7vMo7DSSflBDQSvoC6jj1i7j7xQxQ
7MmPwvMSqyXmHzE8FB1SSh+5x4k+ab8n9um4iZbpA4KZqs/9BP+XR0gTP3ZU
kn0Yzfe5+LeOTfZEUgFO0ql0/v0PGKXdN8zKSSGYK037YjpPQ75pOYtHxjBf
Ri5qcoesITGR5QFgIG/4s5dBfVKhWSdkLxacfLw5zzF0dQdNfiSiaX8ovoU+
u3yhjPtLTjW0WgWjnQtCjtMrv4y3LkvQoJfHCpc/ZOLD+bUy86UT3zjfAoSX
jaRTH9zA3xeZWS2uy5uGUOC0VMyV1p3xmOo+vMby0H0aE/72FXBP0Rjjpowo
b5R9pHtwM18PDKS5ECtxJQalcq6cLeX+pbyPveIDLQ6+mjvDWpTg1RUFCGsc
6kisRJGd6eogqC6WAzlZVFNdLl9EsOTUFtYs4JM33j64he68RE89pObSulMq
iKYrmKRYhqCdeaaKFnrfciM74HtD4CWeB4v3fO8IaExefynWopzlQL+uafss
tcz7fDb4y4+M5kcemPrLT7LhHnGrJ00PAQHP2c3tO9rt5eaWBzzn2wPuRsUu
8nr1anpPbMOIjv3rNHBRRGDOlgXTtUHRiOIOEQ09l39TsZqI60mXpbg6uyiB
4NPH1wWoP0n2YMqG3xRf4gHbioIiC6RGoLlpkstzs1QVSkeKotCAj0sZNuvW
0enbFwxjyxTLRcZ+w9elnPtvX8jX+eVcATW9R3thyMWtFSBcXCWdUPtESZEd
txGGnN6GSXzc+2FuiIuIwS/XYO3zQX0fxdRFSiIN3ePT0zrcCfaqh1SxPBdg
q9GeD4jo85X4BT+680wtBRtYZ5E3AP2s7X+5h2Pa+QxXz15K+02MfZ9q87z0
Lt7kFznzUOkpUKzAm5iwqr7AtbcI4TVywD0YgAqRPYL9MoTmalL7FVPscixS
7R1MMe7xNfNqORpdnmJwZ79a8nB8zCily4uLKKcjjWQkJ1P67LiP0nwOvV9F
rmR9fV0Dv8KQqY1SR2yhnQqkntexZA2RGxjyqgwy62/jWJoZtBxQyLpRDimk
JnH2JtrNUf5mbiXjGscV3pYZEaPTXAlz1wx/ywnBDfJRJML2hXdL7lk3ds6k
CfeIIeNSQChEBbOJ/lTD9UZ+l+jJmN7JPPBCA6Pio8LtyjA8zVA2KqiEuuc6
JaG5Hy/zfGsgh3f9eXt0p7LBKJo651IuIr3IWQh898gP34ar1JEnS4oK6rcY
WuE+KZXLlxTCD+8W2dKAzmwAmqhq20/fCCOqqN6yJVLcF//Xo7emEV+2qMJU
E77517ToqEuNUYNcc3eqIQucP5B3DIQ8LVZg1V7Lai/Nuv5HeptrQOIk0oLT
KsEKYaNK5zCzi+qxrk8/sfqQEU3nhbAHmraVgBHlUYRXkz362Zy3VvsZVO0B
NQhOBZII9hmuSd8cNzwcgrjYeB/zC1zKXhUHJ4VgdrioHTWIgJ+MSg0KEQ8/
YhHciccap6MZuRvoC+UrjrIJKbuZ35NmJuTy/B3cN4sb7VLSNS8MSjNVfp4H
22e4pl3waJtCdEmLlRENuJd627U848evkZ1/qtYk3KNK48evycMTzHvViCa5
uqRq+V2x1Ljhll68jTfxEabh5DJADCOD74OoFMe8r6E2vqrTSkdSYX9K6cJz
J2JpQl53iu/y9sZXUV1WRqYnd+Whlx8iGAW90UQ1HODr/VuPtiX9Jo0T/njM
tkDjU8+VbPQJE6vw6k9pZUwbaj9olGLfhYNoh8u+JuvYf58MPmgt5lWBFFSj
eflGplYVnkQv5Pyr8eLylxKOL9B5sw9X0cfmlGqSJsTO091SyqWYlJK/qJSo
ivxzvCo8XG2Es4rcJcJ+S+gKM8flfF2SWvV5U7QzTsSTiqAT5ShTP91LqPAC
7fX5EUghrd7DlWu4C9OWNi4+wc/pAPpp/lROKN540mJWkeUXlwpMLQQiCEQP
qoIlreQ5ISMEpElKxCBFTg1YncuHdE/wBqi+bGAcXxNAF59fLqTHOd2+YezH
7HHxheQtw6uQL9RehXaeFwAVXpnexLjBPhfSCqBMTrNXuNDQ8yAp6dxYBleZ
rwpSeG/Brj5Mon0lipEl8xSr75KDt9kVnO2r6TvufH5Iz5no52uaxbpFfKiQ
Vu4s9C/iazRB65xbWY762RIx6mCFAwPJ4txE63WULmrj2yxX6kgvsjEUN88o
pvK3wGI1ZZt5fLqwxwNuLOoljSWgjQVzTV4sEYjoQ+W12dgzi3aNuBMFgcIg
yjCUV+IyHCH0ornSlZ7ICxdzo1fqwqrYiXRmauxkiYmpOonvg9lQAcPrJNK9
MnnNAsWoRQKE1nLmhSL9NNOVbqiENi0lRMZ5SUg538rOpWznRbbRViV7WTPn
Z9qd4AyMPhuoQ95coTQky4jzfcf54QwZvamv8Mj4GoxTvt1VkoRUPHGqSa3P
VJuda/+mANq1fzNwtwb7oq4LUiJRXh8MeuD9js5kSQ9HEYvM4Orr6dWb9GrL
kkCnMp1KsYK//Mj0PrOwdrGmU/X5mGxPw0ImhfPA0AeCt3RGr++MvGz5mQTq
GVXiHCu6iZfe0AZA5Z1v0oXVPF7DVzPFH4rroMQeDZRy4SUWt/FxHdB2QzUd
z1DFOajPydpnTl/CXx+/FPrOkVqzJ1dKNNzFFSO+n76aXr0VSzTy4jFp4cUp
AOfw/kW6F3W2BShfAV/czBDX3eIhWWITNvhGm2/nu1lyIIfGrb+KKS95bzEe
DBWzi5/uoUICUVp0ILovek+ZG6EvBPB+hze+YQol/eE32n8NW6xwJHQApp4G
prJhVpu7j+PV69WbOBF75ecTRrZTDKEun6eysnaxYxTIWX6T4A3gTw6RSXNQ
Aeu0wzLS0XJNc8iA9LJXy/daItc04/iUTarbFZxewlJEVv2CluIzhXUYZTzJ
E9bnWOZS6W7dopcqA+QT7xdbhZJ2sbIa5SSLNS5LkSfvbHEBDv3qbZe1BUW0
nFppQMt3pL0/pSKFeqqL0sIxrc2i8waopjxVcM1EBNLEQHehukxJE+a8TRE6
fv5G5SSE8CNfSoPbEvphQLvGc90YhPUK+m34IRaLC19EXEG/fXEfBV0GcI55
vE4KWt4/67H08mkpz/tL3a2V8uIzv8oitnrpbh1LUbora9Vwu84fdvycpmwl
2haktHIRHOH4fcGuBrf1bfUiX0i3X+dS/QjrzWrayQLZgLu9dKN9sR4Ng2Nn
Vhwf9Rl3y2nq+E/N+uXtiy76pUiYkyuZOI+/3tKunAXr5wBoS3DO5Ic+fPoK
LWEUz9ez19mLb1DYk2wraBlAejBhj/UuyW0gD+L65gCdxj2gs8MO9nwVhBBw
Ib6kjtbhteenWxvt8qZAu5Q2QiZqY2tDDkV6WJgK4gCTPGWTxHwB8eq49eXI
0HTcz3bGSkJcFof7zaUPHcRRiqldPcbcMgogWgjZOSWVRThGWghBb735fnr1
laqkz1MVPz/bQ9T50C490o6SvqyMUxtKPpCC702XtTZUsw1eufWJvaQCpqIp
n0GSDvuRcNA86j5tDE777ArE8vr5NZ4cly7k3hWZg89iIuAVY4HWijY4zffA
oVvZMqN+ulsOnUVbOBNNJHGob0jfg/c+ZLSTKw5U7A4nNmUXKCUkpcXZTabn
rZekOEH7WGKA8oAy1GDzKQqIVNlBMOkeS6KvYc3WqbSjMV4jblseN7tBtB0A
mMFttOcL/1v6q5T7mwmR1NGMTgUZEJgVJ5CWeKyykaoHSgcEl0rnucBG4pAJ
tDQ2Hp2rhg2RsfsVe8HlFqMGUSDohOt4gnA3SMLDz3XbXgox5Ruip2GmggIo
brVGOwqjCEjHlBHCuKuJh1Xl/Jb5ABKOitpD2ngOzzESGinbwJ/3gDapzQ9F
40glwW1oTiwAzM8Ro7DjuxdXz2f8lAxN3tUf3IkgufFoSyNGFQfHbciXeabU
9aBlebVBatykG0mlWOQJM3khWJwu5wcMh3x/kzjdvjTdgx6D5weqyaRli9zL
5g2nCmkZHm6xkrKCQkrvpUelVhm9KKXcCrFexH96M37Flpxk1/DcrZcePeXl
6jI9uwx4CRENreDRZhvAQHrOHm0JkfBgg1h4F3zwtgdxwBdewJhZehYVj2lU
hkBbSXiFw+VQDOm0NJgf34uUhSTh0Bs+VORWylyIXf3pdNlb3KUv2oKXLk7B
OWabz+enYt2kB4BtQi85ijw0aozrO7KbkBeQa9Z3gt+24TXM4mTLklkrDi/g
Gg/3mW46gUswI8coN3JJyOTxClTzU33w64BiUMXjZfoyVeh+QcngeVKInVSI
ayWODu9ItyFu0J8pdgWF+e4qiI8PEQkd7l2fnUFXPAAnjQ+kIUSYuLjPDlje
JvViefn9/IPWl6VT5xFUOvomFdTKXr0lCd3h2cOoSzIZlZFDgslXaYV4xF88
gH/wRb4JG9ZBC3Wcvv6cjr6SpxyPnC5Bck4F0rrzj7jotZS4uIr+FooAcm1d
fcIDzzWHJIpaadrlZLcbk6eEazuzyB7PF6aHA9CD2Z7jeFZEtmVQaSdyOkji
r38Wh+UVPKrqye8CCL0yrXslPYmCe8qls0Op4mcTJ1jnzXc0odfyUrusMlxs
6J7nPuCCCHJWdvSkAg4PRVucMfcu3VWFs0C6cQxt704yKcw2z79JhSLbulZS
3psQUL+Nkk1+3uQEWHQdcU2CezPhAXd4LFfES1pKu1VtvPcp+/Bd1TNqywcK
DmsOZRVaqHQIYNq5E0ey8unikOco2Hfv3r25qmOqczyrGimMRztzXMcggNml
C77lOreJ4K4Yf6ogaGk1P2AG5ytaDoJ5aJJtYfpjYgQMkRpi48lZ6Yhw+fWH
KDgW7Up+fgsMQLSLqMleyVioADRKt0c/4AGxNEx5C8aqoZNW3vKoqVpaS80Z
CvEpuiB24NK1dMXDWzwa3CejVDyiD/UhtwXJiBFKPeerNZB2zVR+qMUtjBym
QuJNTZOjFr2vB90+Xzd97/29XD/T8Pm7pAP+Lgn33x+lD1VuxUm5sOGQesHS
vuqqnX1X9cfqA99JgMuB3PIUGYSdaxcCD/TRVFdPv0MXjMfCQ1sPjIuMFvQx
VdtMv+uu/jh9qItlZPNDFskgKwZlmSYrWrlX7i9NOvgSyFZWpsLLIM5FaQZc
qCici1PxDzlkVzver2vGJf2uXK4VAbgmWJ3++ToV3L9z9SD+yS8/Vk8yQUB8
ZkyvaznDE7U1A3+rplq4rFr2I/YET4vJesFxoimuW2jSVZHtmGNZinzZtCzn
8XoiBEISQ2hK0xRDblI1TBQG1VCLlxVL/0w9MURPTNUtDB6Ig13QXdORL2uO
YT52TybeNTt3UuqoqmkXmtRdG1nVcRytcBl6/Fg9aVQXaI7fS1ukZ4jdV11w
ASWLk77si0HR9OTbYUmQsxfyK/hmtnlOLYyTodmrEFxHtPUrgZQk9Omg8p8l
yz6zeBt2k868LTQyr4XJkbZAuzvuxH5/FMjh3lV+Onyzb8+Po0nPf05KtYRi
xxhKRaW1fNzDl09F2kcJP4imeA4gC/f7eJ+InULE+WKnN41sOcAwtXqlg5Y8
aB2+8Soy2oQrxcqH4xqtdEpzRXQYzjT3TtNISCl2JoK6WUBr4wUU7iAvG4+R
og3cKNBEp3fRyHFTIsmmXIfee49IxN1Cinwg2bbhOkVG5izk58TtvZV05iaG
P2nvlzv5uDy5GTl8IBztSeh7As1SmaJwdPq4+XzqimRHU8HLQXjAoLWo4Kal
L2R4pXE1HjdJ4zu06y1P7hX20kyjgz+n2wwkcvyrGv6L0nGKc4BF8PFy/Gpc
lZjI23o/l49D5JG+/KTmbXgrFgTQqtvjNhB7i+KNG7GN07NyHvKZOOgYgz38
UGR85extKNCXbrYjjiYjx13qxTAt79rh9IiVoOFteigjd0SzDsnHAlVOBgxT
95/SCclxL20txfcoAMR/oPXhVPNH4iTOyfJwpy+szRFb0NCTGCU+8KAvJSbS
UCLQsM/f4WcR4DvXsXBBcycJIx3p4eXeGo8vv5NWW6SOtuigtAyDbzxWjnql
ucvSeb3ibFHhcZOXK+MB/G3/PZfQtUcijTkHcXyaOMYpjYRkcXR+qDyn1pCi
KnSa9w0hiGKYPFfu08EXwu8VbXJE4zlYYuU2aVFvR0ExTI7T4EDbgurahHxB
P4835NNSFv0J092xRduAhtsQzywPmHeN09yhpGuljgO8lZBIsUPUQWzlRZ4f
tgo+fyH2RxMCnRuayIJ+TPPoGF//I68gEk4v7bUDXWR/+XGgGX2m6X/5ifuz
Hji2VKSa6lvcT4mCIh+aIZgWgDDNHIZWgVGNzjTDwy0BASL+k8HUSxD5xmOV
yoJ3dEzJWy55d6A+qLKy1yPdgjEjrjkC2g8r0xl33EYJqiqCA3x2D43CA83r
42ab5AwqWkGOF8Ue0tpSjpxM66TxymwxM1+mhhsg5WgUZ8aJduh8UXnZLOm1
FoKlJJd6x2eWrAYEG352OX+3wCQ+KLZn1PQzLlTptVx/FljkBNQyDEIZ7bBM
YTU67KMWd8Wll70mK/U+HzSiOaL/LpOkxhVs+4AV/Q3/pP8+5JO6oOhGZOck
X0mm0rRgrFTOUcv68kh4IccJfdyakyWzRuU+1eHlUfpS516IA4mEb1Evtic3
g6X3pFVekuLwDoeH6I4cWLPSQHymyxr+XD6KnZ1XTme/6K5W+ELFwnYQdCjY
bI4H0ZO5dUg6KBz5JKtH1j7KU9I9T0T15HtT3/fzOVTPJhzJTRTPWWvtSxpe
+LvMghwYzvvrbLVSOJB+NkN5jWtB5I861IaOoQxVVTcNd6gO4f+TfQHmL0JR
LAYipo2ZYzHDwb8XNlNmTFHxuqLWQkmlpwiqy+fxVXKFRlN+Ihrf6Ka9Ly00
4ntmch3it02CrTTShubQGOrVt9qg1NJIZ6bJFAO/dIPyVGik1dHo6rjfnqRP
eUQVGiUcSp8lJ6yUDjQy7teXdhq1AXuKNNJraUQVoWnsseOIqjSSDz3oCqWB
RmYXvHSlURuwp0gjo17X0bGVXfrSquuywy9B2XWE0kAj6359aadRG7CnSCOz
jkYvYp9Xu5zuSwuN1gIKJ1L6C761QWmgkd0FL11p1AbsKdLIqtV1B4r24Tm7
GOPyG2emdl2HUF7vUxicVLhCvw1KA42cLnjpSqM2YE+RRnY9jfZheOhgfJ+g
EULJjG/+8xSUBhq5XfDSlUZtwJ4ijZw6Gr3eX3vb6G/eycBRK41iCQoXovg0
lAYaqUoHvHSl0bgjlKdCI/cUjcC++wFc/tMjaqWRt0YgglLHFihNNKr3W5ug
tNNo0hHKE6GRWhtneIdxtG59aaHR4SFQmmik3QtKO42mHaE8FRrVxhkmuOQS
Z6IpzPrXcbMV3kqjpYByCkgnGp12kLrTaNERylOhUW2c4U0MNtka+hj8kljQ
jqCcBtKJRqeN7840atWbT5FGtXGGb6lG/3S4rp1GVOnfAUinWNAj6jrtN2Yz
qLVxhkueF2gNeVdGVKFR9BAoTTQ6HVTtTqPfms1QG2f4Nl9Omm1HenJEVTnK
oLQD6USj00HV7jT6rdkMtXGG2asTtKkbUYVGwSna1EFpotHpgF13Gs07Qnkq
NKqNM7xJwmMQb+82p/vSZjM8BEpTTPUR7Trjt2YznI4zSDtGt46o1YdtA9Ip
FvSIdp31W6NRbZzhcusPOwW/W2n078d9lAQRrT58vQKY8X4X8wnqhRQSP0Ej
dagPraGK9vdQV9WhpQw1+FrF80kaTdBawC8qeUkqczSm20yfMkWjiyp7kjTS
auMMRKMuwe+H0qgZSuVzVY2eN+Hl/pSuWvS/nNIae5qUro1WEKW7pAsfSulp
nkRkD6NR1aL/5TTS2W+IRvzoSVpyw4/7bu5Lm3VIUDIgfRY0pHRbaaQM3aGm
G0AXV1MUXVGGKv4/1Mq2yEkajTG34WpMs5gDX3S20NCat4heqluF8uvTqK7I
EndOpDXPcp2lVOLYrcBSOhJaKrAUu97es76yBtZTLrQsHk3VofAyO2j5cYsu
1d+LLjNVlBZdZqz0EJF7xKLLWrXYcPZzXV9ai8Vqjm6uH9EJY19zh+rJyEY3
Y1+dMeVLOM05lKIUjhqOtK6H8tnLAvPjcu8xogqlsz267wOlkdInfe/ulP4S
KZUcyrh0vkt+IPdpKJ+/uLDpWNu2ETXJdHasZSe8NFL6pAffmdJfJDFzWqa7
4OWzlyhWz0nvMKJqmrS81X8XKI2UPlm4053SX6Icu4XSlRPXm6F89kLHpnNf
W0dULUatPSD1BF6aKK2frCzpTukvq70rlK4/OLYWymcvl6w99PDUiKqUrjlz
7ySURkqfzNl2prTWVjL2JSjdHS+fveiy8aDUthFVKF1/qOoJvDRS+vEsMu1X
1t4N55DWQfnspZvkAmJ04JQR3r60TTqcpjNeGin9eBZZJWzVBOUzUXqe40Wc
VtwI5bMXgLaezt00omaZlg7lPomXxlCwCf/ZtRmZGii1lHakULBJf+wsH1ML
5TNRuuVA7TKUz15G2nYIHD9uomZEFUo/CC+tQX9VVUG8NfheM2t3CCiXgv4z
i9kuRfwNnpVhX4TSbcenlaA8Zuqg1stqPfO2aURN/nTdoa/NeGnS3qdXR3SP
nHyJxRFtMt1yGm4JymNSutbL4ieinw6cnCjFIyinAwTd/OmTi5W6e1ltZvwX
oPRld7w8JqVrvazKceFdRlShdOmI8W54abTITq6m6U7pXznuXT6dvAXKY1K6
vuSMDpFnL/n5BB1pVFOmjlBOA+lG6ZP1td1t7185GvqmO14ek9K1Xpag9GnG
60Dpe8ZUGyl9sgK0O6W/xMYHJyndCS+PSelaL2uxD5MbPJcIw6JdR1Sh9EpA
OQWkE6VP1/p2p/SvrL0X3fHyiJTWG4robqJldMBdSoV4dxhRzeIIgjI+BaQT
pc3Hy0+3qocvYZF1x8tjUrq1EuFE3KSbl3UqbnLfyEnTLPvgyMmkCcrnzVqe
CJuwx6Z0bSXC5Rv2NuS7KbcvV2qX6R1uNDBZx/777lBOUroxKvpgSttNUD6X
TL/pjJfHpHRtJcL46jEo7R0P8TbexEdg2uQyeGB+ukzpRr/6wZR2mqB8rgzH
lYSqdiiPSen6RYyyTH9oCTR0lulBVygnKa01kfqhlFanTVD+uWS6NkZWkOkH
U7os043Uvh+lm2KZD6b0rAnKP4tM15Vj85LpQjF2Xg/dsRi7toxBKsuevvkl
22VXID7l4uz/f2+7/USqsCvc02Fjv0zSPvfWt+CAdetUu0496cbVQGmu+Rme
iEef1KlGXvOjNMJ6WotTeF/aFhD9EY/G4Hx/PvvjRW1fWmjEFxANPnAooJK6
4KWGRpo+VA1aM9Sc1mcdaGQxy2aOitsG8WV3Sg24p0ijWs+ysHRZptTrEqVa
aSQvXW6lVHcadc28daTRicz+U6FRrU94mR+sKVPosiJLJyJ6KZQTstSdRl3r
1TrSqAbcU6RRrTeX1avJFJrXaLv2erUPg+tjFIRr3ISrfUTdaNRecHySRmaR
Rqc3dH8qNKrNa6ZOGMOTE8/x/MS6yYidkqNg4O8G3O8eeEnzXtL38cNqS48q
ULr7YfOSxnuKNKrNSNbR6FyqLrnI+3JfGtU5zPejUZO+ezCN9CYoT4RG9XV8
b8MNHsZ8dfmS79GATi56jm/j0v6O8ogqH9m9EFVETSNqp/Q+2WHLAz9qx8tp
jWlx67DFjD9JaVtoTFXLrcOKKf8UKV1rwT8OpcMfLqdt+2XVQmmjdHiM/OaN
4e9D6eb58WGULsN7ipSu9QMek9Ivve1x5fmH4/4Xy3R4bNux6j6UbvYnHkbp
MrynSOlab+JxKH31cjB78zWeB3xyRN0oHewGh+a9GO9D6Wav5GGULsN7ipSu
9UkeldK4jgCp5zfupn4PSuNqjUa8dKd0c1nJwyhdhvcUKV2bYXpUSr8RJw1P
MGIAQOpG1JnSu2ULXrpTunm91MMo3bZt0FOhdG0V9uNR+qqD8u5O6eSxtHdz
fdfDKF2G9xQp3RCteDxKn1be96H0I2nv5uWUD6N0Gd7TonRd1tjfNR6TmqZr
O+aOs+xuthVvIXX85l/vmzpuA/h75vj3zHGtLntqmeP6AzmzztGmIHtwVCM/
5Pt9buRtDk9pxP84gAADy/nlBZalEXWOMLYkJh8WYSznJp+WRmzJSv6QgAi8
iokwJ/pykkbHLcHpM/HlBJSTNGoMJDyYRk84Ul83a+3+ozBr1cwUHSetmrp1
ac66HN93zmqB9/uU9fuUVauC0inr5BqKNlH73FPW6+nVm459aVeHXjCI/WTX
x++799FH+tUK5YQ6NJzGOetB6lBXfqtT1nQsslinGKcDjXxPgALjwquHej8a
PWpyGWn0hKeslkIa3BEDDb3Nrj6uVTuiBhodAFYKqs/kX7VQTtPoUZPLSKOn
nlxu2LZvDHMD7bXcdvwc6yhHJ0Hdj0ZNYcgH08hsgvJEaNRQAIDFGS+9bbQK
684Trh9RA432MA+dAHXP+aghe/9gGo2boFRo9HaBG8k7Xc5e+eype7HZ0mu+
RLS1LydplBCsVlD3pFGD0fBgGnVfHPor0ag+FYtyhG7u6kSApKMcnQB1Txo1
TEgPplH3hUFII0d1upx7+Pnc3MgruLlVB+F+pywU9jIsOLrz73940FkLDRB/
d3V/d3VrlFDhbIUuG2tWRe0Xu7knV/R06Nyp9TwpiLZ9Pzut5rHbV/N0X8tj
Nq7lOakETc05tcXVY6jA1uADZomvQKKA7b2WNOKpKer9bpAQlPEDs4fFCUpv
ijs8LAqrF8IOT40utQEHpMt0HWHGoi2924EuPkF5LLp0WJV8L7po9TCeAl1q
jTo6mBut7/YYQxe6AKRWQPeiy2Oac0gXvR7GU6BL/QqdjRetcYY+hD5fnnP1
/OXly/lFuR8n6RIipDc5oFacnqRLQxHbg+li1MN4CnSpXfHRMSjXgS7VkFxS
BHsvujRsgfFgujj1MB4a6HlMutTuGEdJh0fRYwjp8fRYw4YVD6aLWw/jCchL
ffDt+3C/DPdxgiukXl2+k22AJnzU0WX3Hl2Rwfdvps2zf0e6aM1arANd7CJd
tLISYx3oYpjmqc0EH5MutXZymS7fz2rXvHSmy/dNB2Xeiy6NhbMPo4vZCOMp
0KXWTr66+i6VkfZ+dPBffHDtr27C9boe4P3s5NOrae+jx+ST4U4HQNWTAdDH
pEutnfz05EXQpd6BeTBdrHoYvy5davcwen+sbmBUDDJ2DHh+G27DvbcmmhdC
nd+++vl+gc56SL9KiFPuyu+RzCdRtFPkjvt8HrVoZ1A77xB+adP82whsq6vN
YffDu4XzEnzHZfyx0JcWrQAaLt4Oml+uhVL5nBeVnDN0O+x8UPk0ajmndCSG
DCU7tCL9ENd3+TxqAm5Qa7OVaHTj7YNbYNuXcXBch/KZCx1oVH25Enu+H42M
x6aR0QSlQqMf2T/iKOiz5R2qzZ/q+8GhPGZBSK2/k9PoxOexyieeHl5qeXe/
8h1N64CYL4CXX0em6+PiwaurLtzyz4yX2vhnkJ4WdJ8zdj4TXroRiD02XmpX
VB63EWb2041nmg8+/Ofll9r1hxHtoNuhEPoL4IXr205QPvsORdy+BXM/uJzV
9qFuRJ8JLzgbdYTy+QplrrcFt7FglHd0GDE67OF+IWy8vsbTCm82Bb8xia69
9fV9q2TqoD6p6pg33h7uHOjC75UyT8+//POwkTlPy9tj+ZcDzazMW2+vxldX
48Gb76dX6uCD+ldT+JjfjQfVqGJjBC258dQBvjjYJx4VedIw+yf1UOGDUP4E
QKBPID77ux3Stx5GO5RBFUwHKIV4Hi4sd3DjQ1U3DRf3d+q4c0QuiQDs1Q8v
Thzj0wClEBfkJY/ohrlMGzPHYoaDfy9suq5K7pnSPFfM4u3ZgR2TTubSI85+
wHWV8vz5dHY1buO0JrwUuC70A+A2YjuA0g6kA6UVxTDxFNeuUAqUHi+TU3mB
eigVSrtpziSl9HTO9Jk4EbYJSj2lh3h9h5YXzESZVHJNmkP5rH53idJaaxan
I6XbgXSndGOFURnKZ6L0OI2xVCndsVrpNHkLffmskYQSpXWn65l5LZRuB3If
SrdsMPyrU7pL/dOvSOlKbKREabPz2bYtlG4Hch9Kt3DMr07pLhVVvyKlK9nV
IqW/n6uNx/mwFkpHwUAiNthn78NmQC2UloPa1lDvynWfm9LVCLmFxy7UQnkq
lK7E9cqUbp1j70PpZkDdKd11d/hfhdJdqr1/PUpXK1nmARjk6ulD7CsjKlNa
AOrz78A+jXBbKa0qeMbj6RVaX4LSpjghFChtmczutnvzU1lgW9XegWGcPMG+
bkRVSgOgnM4tUDtQ+uT5278Gpbvt3vxEKK1VKN0Sxanq37YoDjzdMXRyn8hJ
4xGuXyJyMjkVOZmcipzc6/O4lK7M0y2UrjpLbZSGpz8HpTvtafVrUXr6hCld
iZG1ULrqLLVRGp7+HJRu1ONPgdKzJ0zpxhj81VWHQFkjpfeJl4DlvUsSmqkl
oCegnKR0p/PjCpQWI+izl98uBmphVH2WeOvDi3B7Dde+oVOqWyhtqKcoPcbH
8FzcpnzAGPhlUYihW4qABe/D5M8dc77FYSMUzk5jOn8WYKnjtn41Q6GTih+n
L54mwoTwqPabslS1SpVAnQQ0xv5+MxIAI6hIAF0rSADQ/ulIgPaEJOB0XyQJ
0H9bElCpB6mTgMaY6G9GAmAEFQmgawUJsIwnJAH6E5KA032RJMD4bUlAZaVo
jQQ0B5zbohU5oMGJoHX3CGTbWs1fOwKpzuuhPBFK65WccC2lmwze+1D6MWLN
XU/0/VUovaiH8kQobVRizd8BiZ+zFy9Png5SHlGZ0t76enCTJIP1JhnceMlN
El330+ubQ3aNtVK6NKvB/xZGJevWyX0BSnPtP2mY1Vxcs42L/tQnSelKBPLP
L+uNjJN4KVH6r0DRv37cdNk0uZHSytAYAp01G/82RbSiaQ+mL0DpNFqBs7rC
7AX+DeZIHqpQaqA8FUpXIpBI6X97+e7+eGmi9OYkku9FaePJUnr+VCldV4vN
C6WTQkF2bRl0x2Nljst15NMC4PrC7N37B9Rl10L9vTD7N1GY/bRKs+v586T4
Pd7S32rpJFi391EFzSGBk1XQtVBOhgQ6QflMCYAgdb293Hha2XRdlSqiWxIA
cknGkfYj5iyAHFDTl89cOinz3/mfQiQdiNF//q8L7iElob8D52avlhFTqqjL
htDnpTitQ+pUUddyklAZSoHUW/gaTI/7DyH7Rur+eRG6joe3XbSSWtUb6qHT
Q/myYrvGWEn+jl57vFvjiAoM8yYGZQqKqhPbNEei1knM3m/j2y2DOe4Nz4h4
2yTiCOqD1ow2WDT1QX1stqup4+zAdrpj/JbZjnefVsSrugZmop4vhm9lO+UU
25noozttgT4yAhs2gWkb0RdgO0pDENtl9JWhfOai0g5sZ2rqb5ntePdltjO/
MNt1KLNiX5ztAC2C7TL6ylA+64rbP/PyxPOXYGpex5twf9ewK0Z5ROVY1J87
1092qIY7tQkga+G6z1UNZ83rQbAWfrnX53EpXckk/BkLFLvR+QSlO9dPdqD0
ifVpZShfhtKLehDsSVK6uotlWst8/u4WV9IHcOHW2wdJLcV/r2U+DeWpULrq
IlEt83kbfetH9Hstcz2Up0LpSjXc7zmjDMo/Vc6oejb97zmjDMo/Vc5Irdre
v+eMUij/LDkjXsVTs47whHPfiJjCZ7n3ou0ujtdvsrBn25B+ayGCU8NrxAtF
FHScgnTsFXGv3WQN/bKwqov2hNZSVMeXruMLTsqtzZHVxwo0fNYlF4/OvDXB
tTbE/NaYt35492JeVe2wN+mXYd4Ja/o8Reat2M2Pzrymqv0zM2/98O7HvPqT
Yd7mDQSfIvNWXIFHYt7F2zciddbh89tj3lPDa2NebaiZ0JmhpvHgBQAa1uve
X8a8Y7rVkp+wx/goPGEuMFzhaGTwdjiD79dn3ro6KapbKpZJ1Vclna6Ten01
Z9+FHtYu5Twg10j5cRLCs/PZ5bvXb6/Yq9fv5iMqo+FlQDfxcR2wZcg28Qcq
nErEsWJYxLOND3hL1AVRldUVvz3s9d7dRAkLYv+ICM72JeU1Pat4vY5vsYAK
7u2jvLboWX2Hn+XFO3kdFq+9Euc+pyc4Ybek2pRzhHfxLK3X4qVX/KjcQ/o4
1RQlCf6EO8w3l334y+clUr55SL8cqToqiTbR2oMexOyjufSu+/CPfwMTAH45
4F9HFoSrCI+3hkF9+nQ5mA2j8LAaIKYHH4GYP//Mwo9+uDvAMLwDjcWXi8aw
GSJ6tAWUeQEWMIHQAK5EmRlVF2Gnjgk+TlT+K70BKDr6VE0nvUu3sTZtSKOA
8X6IgpDKwbw1oHfrHSLQBbfeHY4q4mrrDm8fgTpHCoJLHWQw6uc0ZLa8A8KI
ajOuUz32w9vLtMKN6q+o8EzqYnQIN4wO2wz4Kzh+b7dbiwMin/tLpIJ4mdOK
A6wb5jHheC5T7YjNpnTwkmK9F5vOZi96ObhvCN1SlR57zn5k2h8ql38qiGtv
zLlZLjTzOU/4KU9U+CdHKdgMR7iJEG44w+9yCfUB+1y0wogq4vAxcTwgvAsY
Om7zn+L95dF/HwpkUStsE0I/tlGyYS9/uHqXsjqeRFtkOSF+VSxKXfKScud5
S6gtiQFg+Kgf1itxJHuBaUQLGTzeIVA3MFTcQBJvHncBPirq9ZLwQF9pIN7W
v4mhE8gx8REUU7yBB4+HQbwaLKmz8XYViSOwQfu8AtRw8SqM0yeeT2LCbTo/
Bynrnr2PgrMKMZDLk0OM9ZDiibR20kuS2I+oohSojkThYgF/PBZEpAm9/d2w
vthQnjsqc8iJSQWNnnyb8r+zF94yXLO0APHd3S5MJ9sw8fdRQ6FeXmwoFxxW
Cg9PVCJiX4Bx8pn53WSGuZZcvsSNMSqUeB/g7tQcYSuW3c9nZXl+L83zeKFA
z5oRPRJ2QQoKI9IaRpSOh1P+aY/okDWJI9KzEUH733nJDd6gf0mQy7rvkfty
LPQFY37HfVTEC8wkbIc2GUoezEzyLHIP7IJ2BtLQbF+i1j2goGpvJNNj4aUw
uYD1RocoSyRAuS4Yb4d18vN9LK27zM6qBV1vZr3be9tkF+8PoGXu4OIVHjQX
HcClAiAX/CCuBPRLUjKzsE5engEOqJXEvEbTNte6QRCRnlzTcOUXUkscdden
T28XU8exwXgaCuMoke0smjDoqBywYjyarNDi6cOceEjNpCBaka1yENukoRov
mliDookldabP4p33H0duqf0Vpinv/1KHQ+3fNGOg/t8pj2Ej2BEyTJMQHsdp
8R9lSTony+p2D0YPNFW6ezFMjfEz2RpH3MiV8IlkmgdR4h/JYcERAdQ92eow
bR3Em3/6lsFM6LG1h/NZcvCuwyH700245Q4C3MbVEV4Q73AuQ2+CAc6nJRzg
AnD0j7DZXbi/8XYJNs/n/0NOB97iMOs3gN9E1zcHFg6BNW697YHsBJxgARvB
3lsdSq92rs7/uuVXRemk1fmV8z3+DjLlkyeItM+8wooubq/O/7rlV7U6H5Qe
xorL60MKuue/VzVRndL5ZXgpKx1i3nfedVHRwO97aZqCT5dCbHDj4q0fgQU4
idBYSh26t6HgK084cgDkQkBJ1Uwtm/wSd5wHk6AR9kvWcORs8kvWcBCbvJtN
MCg7A33DLsFxGpVtkJOfbIb7OyjuDche5CejZsOlYZKToGTLi1AxyezQpS+P
Q6MCy8IVMCb998C8MBd5m906rEhVAiwMenHMgyLpU3impe1qJrpFq2idqX3p
RdDF4mFAEM1B+AI48KVX5GkL9Fo2u73ehdurqxclTpUaGPUQMUhf/g0/fwSR
Ap4fMZ2dKx+1i+zGVbjHhU2vjptluB8xVXM0y8Vn1JWpBNJz1TV1NfudZ49f
JskR4U1ffYMoAXQd2HScd8dbRzBH32UX8AP+FZuE4J0DG/wLzGdMZYoyoj9M
UzSFffvyXeWF8QqnnxFbhEtcOiC/oBZeuOKBN+qSog40fWCYg8VisJgPLHvg
uIPxpPysLKmX21U8KrReJ8ajUhy28EL+0gBujdg57gOwjA4Xlad2x+WochE/
ijFaqiNNHVneaOmOrHBkLkc6/NFHhjJamaNlMFopIy0cWW49BH01Ui2EoHsj
gGZqIzMcBcbIgO8KAlfUkeuPNIATNEBwRvDHW448f2SEI9UYBc7I8keKO3L0
URggQDcchauRZtRDMJyRb40ca6T6I98YKdbINEa2OrLtUWiNFG1kKSNdGQXK
yFTrIazske2ONG/ka/B65ZHx1SuVR7nzZSqVh15dXr1j0x/e/hHMIVrgkj2B
Vt4HnYWZFVrshLidHRJb7eIsuo4OIFWZ0NAT9xQhBigAqgA6NPpiBjhmxx+5
yii0kdjA6YE/sgF33sgyR4Y/Cn2pM0CTFdxYjRR9ZGsj2xqFKlIMaA5UUgCE
T7zg4puOMbIA9zLNecumh9zlOtj+aomsslyNgmBkBSMD8L9CZgBG8nW8ZcnI
gOeANe3VyINGLGRQyx4Zq5EP1DXxiwfQrVEAnBTCM0V91kNLL4tQogkgQjje
EizRYhgoYbpq8COzSlpRVyhwrzLdwrSAowJI2mUn3Y2Gb+DEF1wtTMxPVXZH
71VPPMAMAwBUGTSL3zVR2Wia6TNTzNOaGjMs3IRAU3q2QUWPOoMvoMrgokG7
QalzrDjDdgks/lGlvwt/euZYepg/oEl/F/+YtN2QRk9qimgLhKXUTwDIm9M4
WJ2+wLhM/IL9t9IvdAUxaffwi8N0l26puKUGtujeayVcr7rgDb4YPNFisImK
m1ZbYzZxsdTfnDB9gt0zFKTUZMYWMLp5D2YrfYHkgIf1Mb4IaDfnDPx/A74r
CAeAu1Ps6oJ322HjCRtPmTFHCs6cnjXFdKajs/kM33XnbL7A1Cb20MJRqFM2
NbDzpoGVq7bN5haOyCLEzmDsam9hw9SPQ5sSP4z1fDOnvICKkK/OqHTKyDkK
xu4QiU+etoEoshFFuOUU7b+k0Rdzhq07U+YqvblNzAwdmyK/2WPkPWOK6UsY
6WKMBfUAx9aYbbG5ingApMHYoRswWyMy3R487wDTWlTGR60gR+nMdbCtxQQx
PFmw2YxZwAMw6gUiFvo51fEWkGyy6AHJ7AUbW1gIAISzbGYs2FRB7oIvIIkw
Bc6AFiCVVtltaLa9+Op4UApcTZAzkOmJ87JzfJFFf9FJqxpXETm+txhEAG8D
XQwCGETe9TZOwLhNMwZF3fKcm6oUL6B0BL50lXro52j2OLahXYye90Anqn34
6+ZMIbPqDH88kwyjZ3hBNW3b0S1HUeiXpWqaZij8F76p6YZp2Y47ntD7KURt
omqqNZ641tyc6BNdN5SFOZktFG1uufpCtTRVHyuGqZnzmWEYpkIaeqIqqjvV
ZouZ7uiODFK0B0/ObNeZusrcXpiKMpvahj22TGM6n1rTxdhaKLqt2dZcNeam
Np8pNsFdTKFB15g6hmUpM3Os665jzhaTmTFZzGbWzBhPF7qjGFN9ZljzyULn
VpcNADXLUCzbWEwV3TQWY8W0ZpPxfGyd1cwMSfS3LKhfIn8hUnKB1FWBL+tm
B0XtGbnm71kFjc3qNHZPHaN+AFmeo3GKP0EDqA5zLfxp0FZImo6qEljdcUHP
YCumg9oJhKibTmN1Oq3XQadhW9ANaM4o6wR2T53Qq9MJTNYJHbRBr6gN2KNo
gxF7RcnF9R1ZVCLcVfSweK5wD97+Lt4SW2zTdxLpnVIyqV7skYN4Xsf31v00
zcrTugU9QykSDJdlZydQdOgXqQ3lt6Y2Jpo9Via2oxqmubDVieVorrKwptp8
6o4d116ozmI2dyfW1HRNG/7XOdypZWsWAFTmxgzuuzPN1ueKMTds1YSmxhNN
M+2pNR6PdVNzQOXQa/OZ6kxmE1fVDHvuLrSpoeuqbhmOMnE/n9pQ/pnVxkSj
0heQVAeNI7BWwK5RJ8xyUAGA2QLaAtqaQieh/6AbVOYs0Kx24ZlpD2xA00ZL
0NSBqDgckHUHeg4ayED1MHeZO8PSKn2OPZyTPQUPg/EFRhmYq6bdA5trPEYD
ChAL+mZuoh4CdMFIAQNgboMFBHAWGhplgAcwOS0DDaiJ26I2xpgWoKwAuG4J
STDyQWZkSLGdXm9CtgDtXYP7v1A4g70Hl2/nRfssWyuqedDN/IBKBB9AK2J7
LfJLuccSimbkaFia7M5e5oUaacbAo3gnhdN5rkI1NcxVwEtJtU9yGgRaRiWE
6eMP4R4rL7AjdV1oHYqH4dek+d1DnLWIgVlUSh/oyG2OXb7vDpYUxH68Ttg6
eg/onn33elqSKD6ULGqSucds1FPZefdtRy56ZVAAAXXdeG5MZxNFXViqMZsv
pjboPs0xF2DULMypNVNnhjZ1TcuwF4qlTsaK4iizBWhNB/43zPlZBphjJ4U8
m1rWRDdUE1TszDJcQ3Mnpq5p+mxhw78TuDCzQKcpDsDXlcl0bEwVsIBceMOe
TLSzIrvKP9JCsVKDtuqoqrrQF+5k5qoTV1ssLMe2waayQBEupvMxKEwDVOli
Zi+0xcS05nPVnrnufKyC9XVWic2n7H85n89BhLShOn7bHr0sZZJiFsQFSFOQ
44mXhGuY4cSBTd+9e/fmqg4Y8v/t7S1VMw3j/bV4kmp59mwf7tYY9Re1FPJ0
vQkTjL3wW1qNVNXFDlYRME7Z9lc16FRL8MBgS5Nl302PeZX4gUoOq71inspC
UEcu7pwchqBOe/oSn1+CpvXQXQYDB6aGlU8eoZe6eunuQGAA6EEhzGDAW6Cc
l9KRm5n7bpGrreFP0J8YjeD+t118zMPHVJqzLJ9ZK2abqC3BiMOfKlp8MGFp
Ps1WML+EzIKJLJTCBmEGsMf7hgBtdgKgDE3BqQ2nQoqF8OCHFqDq5vBV2hMp
D2PY9N2ti2p4/OFeHgLJHlbLgRB4GP62ArxVh8NeFYf1qHbEYyJso1L4R8H5
sRBQsemxAEEBHmDsOHCLEKIKVMAcDQyAX1YyyXp1JDuF4TLJeggwJIB+OSKF
AMkswYddpK9VD7zHgaMBQw+IJ1eExmqMp8S6IsbTq+HquhgP2D86zCkBC8D2
CPCLumSujnLkr5BPgElUD8cLRA8s5sPzSzCekXNgaCBZ2oo5YKkvkdYAxAUf
xWcBGDyEfHPVg1GvLJTKQMN3weDRQCQtxJu7ZEsVxVY3mArCazJXYysPzScM
+ayQygHgTUPqIIYNXMS8CnCVOgxhCTO0TmpBw4tCRcB3jqKVFO8JwLpD2VEd
ETt0iHmgRUSOzUKPhdAZBWmhhMw1yA4E89NAwYEuBS62DlLs2Ig0AI5wgkIT
8CI2YdHfBvN9ZGaw+kIbMQOtBEu2Qh7uraDbJhIFqAOG6MokzLg4mQNONJIa
LSwAV1UEq1GwUMNy6F43dmIt7ARAFB9jafyPRqDwYXodf67odWpUKfZHWYkl
BatVry6QVkaOZgrkpGJLineZ7V7cE7sX61KQMr/L8rukYexlETkr0v8GThm2
JpSSR34t/q0jO4FsggmNnreB/APTAbAu/LHI5wbM6KR1LQMjmjBk/FsnbGjk
Skh4g7faNYPh9rhOyLSurHI5KNFoW1d7jV3l/TFYh66emHcy9dXa1R7vquEX
aUo6xKDZ2dDFWKp71eOeewE02uMMgwzMOdxpJjTpMeAWUKQy1Wy9l2GjwLed
UIGdBHkElxf5mbdukaRD035uTiAXWc194ytpgE/47EYqRathafG8rggkgPKp
cGAPycopq+PFjmNBhCtZi72aFjViJKOR53FClIADYu+FxgaO6nXmKASL/Sxy
FM5rao+0ijjcAJ9RUt2upptYeBKe6cBzmJtsl8jHj0QwekDTFali/KIjkJVK
K6ct+m4x00c9D8MJKJ/AczXocdM0QWcv9OABsBidEOcvg7qHBoPOlvDWCjuP
+FRQz4O2hykPmgCEhNQcX64CiHV9dK7NFcIR17m2VNCP1sk2wwA/dW/lYH9g
3vFcnCAAPtgzht8DBELPoVG4hROTz3wbZw2UMgOftAMWkpYGtvQdsg8DDGWA
DHoOevG61QNm4JkEzUUMo3lGfOt4xMA+0h0ERKO5LyQTGvS2t2R2iNO3v0Sr
AIBY6IeiEoZBwWwIXQKVBR3mkgvTJeKZkiSA5MBHBsCZHdBoITTD7EGfYeo3
Yb7z0FoAJMMtlRQI2BIBzbmAHHjXQxwipZYaPg+PAe1g7ErY8z0ZzyzD87KK
ZxJSw8rxDKNzwchRe66N1ISpH00UHZGwtHB00BBgHtr1dWzOJD4BrKKZaqGN
pNIBHWjzOD1Vw1EAitwA+S1Q8oag/2CzwbsgIxiksvG7QfaAaaMnElBzRtgD
aQp9wmpI/AlmyQppCnoSuCI0icdsxCTGgsD48YXWlRyZXq0jgyafm+asJCSA
BQXC6INEr5DEQCygEShqYA+w06Abno0aGCgC/UTLdoXdgysBzbOmiqdLAagV
6WFgHh8YmAJKwaoHNlXekIm3AAM+0NpBEVuR8gSaglwjP6uI/OUS+QH1Cfhx
YMYraFFjQ0u0Qrl1BwgJPLwCWAVLz0R5/+yZK+64/iqpK7WPERTDXozVua66
mjOfG4o+GSsTRx/rrmnZ+mJ61u/92GMDo8+e/XCFUemBA1+n6/gYrNbeHrec
3vpDuqEWbuB1Np9O2XQ80J/1fuqDWemarqNQOFu1NNu0FApml+BbCIYC4AMT
vl55W7bYe1j158enO5Bso6Gf3UyS9dCPN7x5Gq7uWvp8Ops5xmw6UyeuPlan
C0PXZurY1lR7Zk0tfTKb67ppjhVt4UwXE3M8c1zXmM4MY64pHCF2n92cjc3p
XLfn4/lkotimMncNjCtNDMNcjGeuZqiKY7uWusBQuoovTKfKBJ6zZ45uzyYL
zdAXumPqM8OxlIWpT3R3Mncn2hhf0PvsR61xQH2G9+T4yjMY4gAuYsgeMPQj
NKjBJQY4/PHZzeGwGz1/7u/X+jCIriPkNITzPMcjYBGohcQawmOUf4CP9KbR
8U1sFGj4482ZpTgYsFcdawF4VVRFPeMdI6gJgMUBFKG+uQIAjHfdlZ6Gh2M/
2RWeTjup5c/4Ht5MOnX1QCgDzgO09VQFGiNwN2cLy5y6hraYqbatK5qmGqah
AuPqimuYFoiJbsxUkBhdnyxmC2WqLTRFmUynxnyhWsZcP+P9sm0X3nUV/kv8
A9Ad4Dtj7OozbaHMjKmh2tZsMTGAc6ZTW58Azgx9Zs/mijK3xlNHtQ3gP8MZ
O46hW5ZDYDR3sTDHuqFYzlgzlKnlmooGzDeH3mnmeGLPZ9p0Ml1YjjWfzu2J
uXCtiaGrY1exga3HZ2lvzOlsauiutphDYxMYqDFRzbk7nsFI55aq6PZiMgN+
NuzZdKzaumtMNBOeXVhTW5lPx/JYNd0pjXXuuOpUde3JYqLM9ZmuTCfWFN5W
ZiBP+tQ2Aceqbeq65eoqiAsM1FG1mTHT3JmjznhmagyKY6ZaU8OCTqgGyI5p
L6bAUXNjbpvzKYxuDiSz54u5ojkLZ24CKaA/lqPNxjC4M4LyE+oABXXAZGbp
IPMLGx5czK2p5oIQYnQVZH0xBV24sCfqdKbYmqmOgYIL27Ytd6osDFudLeZY
6zgxp4oFrZgO5rN1ZaI5GtBPnemTiTu2LEudz0xFVwHERB07mqLNldnYnJju
wjUNpRwdvncCywZzJA1sNsVn356Kzh7ieJ38wvis8Yvis0DQtvgszNbL1ECn
KF41PquQ8eFZGHABI8NB643iHUZPCbtt1L4UG7XzKjLfkmOFxeBdNSyrlOMX
eUjRRs8EPWG3Z3vk4YRofOBbPDaqFt/iEUaPIozkEQnnihJglop+MrhAGLol
r1jT62LBPr6OQRbetCXCLvgu5ix7JqUwET6Z2tgrcreEY0bRnNp4MY/n6mox
KrrERgGxja5g7gQiHDvvW6/UN1vqWMknFGEmhXDCw6wGjx/1sCiLgq26IYrl
qrFRcOdO4EQXTdumFOCWOo/PW6njqoquanQsoM1DWk5PxLOob9grBc1ojbth
Wl0oPCsCJJbAGLfew6wt+QBpKDytBlSlmkDxMJMfxls8rK/2SgHKjEzgeRqG
wCq66G4axdYFc2LPNc4SPY0KNixyLfBJIx+4ZTQnJMjJUSkKo4U9TibOY5wB
WoKA3AnXtJLM9toPV1D01HtfFZ158hDEd0yBoxsQqhSQdTAgC7fAOwInFiOw
S4yT+hozluhsrBQUAcPDYDR2L0TcqnrPUtC/Ao8XOg/UBH/DC9AX0qlWEJwo
eNF10SFBR8XDP9BzwAw4KuDukl5Cd26Fhj6OBZxMaBdxopLbaaBnAs3BWNQA
PXBoBXxm8GGAo0CsFCIx1hxYGA5Ykg60KBCD4eYAoUG3YewAGXqCIXgT1RH4
meCDge9tBuhfgTsNzvZKx/AxeIDeiiLIDnqn4IMFAQY14HkvxM6AE2uvEPkA
E7pqhOgrBhQhAk8MAAJYd0m91RAgetEhNgqq29QQIKAadJ3tIzKXOnqJgH9f
RULY0KjTg/GC/w/UwUA5kd4gXy7gXjf5cqD5LfLW8KJKWTcK/bshQXZ7+AyV
JjgeRSugCRexoZFi5Dkk+ALwgbjglwIdQaX4lGNwiI7AJxj0d3DgKqUxoAmM
HIUYwtAIM0AIQJRJoWTNQnoBAsHFhbaARcGld/QeosjB4agU3nJMHDUgGdx4
wCcAQTRaeMUgZQ5kBVYBXnIoiA9OuO+hZgtcxB5wl7ESbjBgbOVS5mCF+t+k
dAj8DVIAfYaOeUvkE5+GbBJ1+B9PzWuheVAjS2+Eap7eCIJq4Kyn6lk4vhw4
6xyI75VD7R0C8ZWsQK/QjSwAwaPbClGwErjnxeHZ7OApqB49CoYCvTT/ROC+
OGdlc0fv9Jylpw+T/rfJWtC4Pjfwb1CPcqTe0ouYpACT6eeZToNjY1kKf/dW
XGNQ+k21RRBcX0kIaQ2CUz6g1z53105/n3dCb4mhq8JO4/Zh3eh6aRgdw5q6
IsLBmteIjTyMHmb80CtgoxhGr2OJ2lH35FGLAFlLH3hgvWxN9R5KEblvvYdS
hHGKED/3Mn4uhdorCVFWTYiCcjBMIBwGeTEQbJEBQ9OcRjp5SdliixKiMBPB
rSUXIrI8tWVRKfGcpSFi646WWR2ss9XRQxa6x/O1edmenJdFHe6hfsYkvY1B
zICCqg7Fr5cwkdlUZKsRP1gIBDQ/KGojkEwXq2MegtIPdvrFQCNnpeXx8W55
CFbMQ/Qekocw0PjxfAzO4mSh9Nrj45jUN8k0wuIebF2ndA7M0SoWByAp/aC3
dJGvTLIZUI27ZBx6OBbgHM9A/Ic+un5gb4CpBg+HLtmBWWjY72EQmYADKcHk
cD1kPIzOk4XGw8fAbOhaku0BhgfYgSswSzycUlcYee8FHiIWjRkfzRuDElGu
eTIVwaRURO+hqQgmpSJ6OaoBFf7pVASYhWALuYpw5QA/IDtgPMBEH65oJqVC
TEQ1NzUpvYqsa6ExDP0Hfsa6CgdJBvYkdBXsOs2hUpJAyi35iFWsdaCLKPVk
J4NyA54BG8Mh2TTJ/POpgsFUe4ArIC4gQSWjFFVHSNa4i9CAcEAIi3De7Mj3
qo587hRQ31SyFmBOxGotyjaFlG/wyAUGjlJXPTBEQQQ8ykPr5N2jEU7CqBKi
LEq34JCXaJSGZJ5p5Dsgf66YCxyro7yHVEkDcECOoInQoC8mipJnU6ZZo5SG
TgxAmVGTHBbomA18YiEh4HnAGLATIB+YHMxjTNdRXg2zHWQeg9IwyVRbZoVH
DiXYlj2gI5gZARrGyEXoTXhUyGJQslBHnIDxiUBc1M+8AhirK1xs17FoQneR
TOh62JS10tEXWBG7goMA/I+ZPEpK4c7/FIeBIYDEQYsoPsDhFubUHc7DLqIO
kLaiehSNGIxzYEDIR+toRdyl4vPQDZuKh0A9wisoGh72HCTd9SlpZKLdDjMd
8A/WIgeoYH0qhdG5LerR+jUPLfBA74EXY5DhjVVlPor2kvx38GVABGBEIBTw
ukW+FfYNzGYSPdwcY4V0tMNeSMzGc2lwZUVr6LDmT6XiIRJ/hQqSVjSlopEf
oDMVaogocJSAxLyiSCc1iE1T7RGQBtgPxS1EhuHU8SnDihylonaFuQO32Aew
0BMfmQTLFEiNgD5H0tCVgMJEPuVxteCfPoM1tsamOXVsZa67E0OZVzNWmFEa
76O/xVsvTyv58eGQBN46zHJKVwdvv4rCdcDehf7NNl7H1xFuY5Lll1wpz0BZ
hiR94wAvUKphH+7iJDrE+7vnWUoqh0ub4RTq0dn4eLiJaYOcAftW44kqS1FN
rAW28LtuOo7q4ndMT1AfZvEGd2GYxtvDPl7zJfe4rxjPh2CTfxgWg7vP8uC3
Old1e+7MJ442sxx3MZ5NFuZUMya2vVC0qTGezW3NmuvwmKXM1LGDwWy8rM90
zcKI/NxcKK47MReGPbbHhmOamjqfI/pVbeFO58psOl6YlmupU1sx5jNrriww
Mq7OTQU35QEQ+hgeVw0Y4kKdqIpmGZYzNqezhWmMlfF07LouDFxxptBVzTZn
M2XsThcLHbrmjBc6LkibORPLnsxmC8rAWXMX+r+wp2PLNebT6UxRLIA202x3
Ai1rc3tuLeaKY01MzYahq7hq3J7a2kTHxWpTde7YzsRRFtPJXJ1PJjPFMgzT
mU0d6MZEGyuWZk7glzpxdECOO4d3cSBwyzV1ZzzHBJBrjLWxquuYy9AnM206
XYyBL6cLZ+oA+hR1rDvwqKopim6pM3WuGQBCg0HY7swxdUUFxM80x1hMXQfG
4egwFGeuqoY2d8yJPl7gyrrZDG5Z44WhaphLxHTEGJCx0FxtOgZArj3RNWOB
WYu5swCRMBaaDrg1zKmij+czZwyQptBPE/CD/41VEpk0E0bZQ+QijWESDnOK
ZjWPWMP7ySq61hJ1oBlaIRHI5EzgKrBCRVVs1cZsoFhSLmf5CvmEdgH7qc9U
liYKWTlTWH03zRcWEoadm6PhUdqQ2qQMsGYCk6iWYwIL6w5IyETDvNt8OrPG
M3di6bOJblmWniZ0qeWKcPJkbukiNUJZ4zGSzFCnim2qwCma4yr2BFdiGZam
LXTLNO0xCOPs7LNkMVVbNUtZPWcKcur8f61dTW/TQBC98yusniO0n/bugcN+
UpUiqrR/YFsvxMRxUFyDhMR/541NEeIKlyRyvOudeTNvxhrvWIuQNLxUweA5
D5mzQPu1soZPyVZaIaTDBYxTPCb4ZU4x8Zwsy79Q8MEJKBAKCtw60VoewChY
g/atlg5OqBRWZbxzCeKJ6LKA94bUQhJr9f+uYQr431+SOp2YZZhEJsujyjGm
nDOTkNGudGZbBlhaBS8z8G5hsrZtDK0XBiwaf0kKf+YgqcgEbAWEyrRKiRsn
kgb9BBWChma8zI6D6HgUCaRsQac6mxby/lHBFJJYnCumcDbzoAsACZoBKTme
qQLsaAuuBptkzlnLsd6W0Q4ReqwjgR4EGJ+YS8psYZ6xS0xbRRCYpPCpGWik
Y53oOtivzqRuLAtU6mKrmdPGWSGpDA2e9SKzrF0AXWqjIpVFve0Af2sEEaqF
kYEpQ4cAAPqSChKB+BUCnCL+NIy2ERomrYEMUJkNOF0CZJBslwFYlhYRELQF
HIVlLAonQgeboDIukZ8BggDJR5s9jABYEEIRY0SUGUjw4IzrIhg2Zw/sHRw1
IZwELCK2FAiyw6WjZ6EjhYBWYbPKGR1hOQpkKzsqGHuOSMQ0XC5Cphahi3Y+
O1gs6QKIJdUlgMypJJ1URlDLQfIcO1gmo3K/aDV4GxpPAjHdd6QRhqkRQWkV
isEcHIMhJW5JRQFKATpwQaOY5dolyKpB7DBmbqAd/I5a8gClifivRWUucM/6
u6rcuCd6b+ZY+09r02tqHj2tvYRq/+ZqOl/92C5R1gRm3jq1rfviynRsris+
/HA5Hs7j910TCnLEOjWeMr5p2jX7ZZ6b6/Myj9Ti/MOIdPTmjJHzfMa/vk6f
ywkpzrvSL0dkYGO5DM3tsMxfS7mUXXNblq2N8O0y9Y9j6etue0iozrh3uCvj
+fRIXRyHXfNwQLY0N3drW1qa/P3wdCh1bPb0fem3Y2U4NvuKIwgHu+b+uX4s
U3MPkeq2opvh1Nzj/NKvF5rrpXn4Vivlj1v7232dKsZdFkxEO+Qu62vmX7pG
b/3i1taUZ+r4irWcak/NYGkX39qJ5gWmrcMdDTrU8QuNWAvtb4fn6+Xx9auf
hSuDPRP1AQA=

-->

</rfc>

