<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-05" category="std" consensus="true" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-05"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="10"/>
    <abstract>
      <t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%.  The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re-encoding for the signature to be verified. The document also specifies C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates. The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</li>
        <li>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document specifies COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>. The document also specifies a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This specification makes use of the terminology in <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>
        <ul spacing="normal">
          <li>version. The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type"/>.</li>
          <li>serialNumber. The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</li>
          <li>signature. The 'signature' field is always the same as the 'signatureAlgorithm' field and therefore omitted from the CBOR encoding.</li>
          <li>issuer. In the general case, the sequence of 'RelativeDistinguishedName' is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as a (CBOR int, CBOR text string) pair or as a (unwrapped CBOR OID, CBOR bytes) pair. The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL have be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded 'common name' it is encoded as a CBOR text string. If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where 'H' is one of the symbols '0'-'9' or 'A'-'F' it is encoded as a CBOR byte string of length 8 instead. EUI-64 mapped from a 48-bit MAC address (i.e., of the form "HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string of length 6.</li>
          <li>validity. The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as CBOR null.</li>
          <li>subject. The 'subject' is encoded exactly like issuer.</li>
          <li>subjectPublicKeyInfo.  The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</li>
          <li>issuerUniqueID. Not supported.</li>
          <li>subjectUniqueID. Not supported.</li>
          <li>extensions. The 'extensions' field is encoded as a CBOR array where each extension is encoded as either a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type or an unwrapped CBOR OID tag <xref target="RFC9090"/> followed by a CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string. If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted 'extensions' field is encoded as an empty CBOR array.</li>
          <li>signatureAlgorithm. The 'signatureAlgorithm' field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</li>
          <li>signatureValue. In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></li>
        </ul>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <artwork type="CDDL" align="center"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid / 
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true, 
              extensionValue: bytes )
]]></artwork>
        </figure>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstrass form (id-ecPublicKey), uncompressed keys are point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. If a DER encoded certificate with a point compressed public key of type id-ecPublicKey is CBOR encoded, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shortest INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>This section details the encoding of the 'extensions' field. The 'extensions' field is encoded as a CBOR array where each extensionID is encoded as either a CBOR int or an unwrapped CBOR OID tag. If 'extensionID' is encoded an int (see <xref target="extype"/>), the sign is used to encode if the extension is critical and the 'critical' field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>
        <t>The 'extnValue' OCTET STRING value field is encoded as the CBOR byte string 'extensionValue' except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>
        <t>CBOR encoding of the following extension values are fully supported:</t>
        <ul spacing="normal">
          <li>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields"/> for special encoding in case keyUsage is the only extension present.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyUsage = int
]]></sourcecode>
        <ul spacing="normal">
          <li>Policy Mappings (policyMappings). extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyConstraints = [ 
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]   
]]></sourcecode>
        <ul spacing="normal">
          <li>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/> or unwrapped CBOR OID tags <xref target="RFC9090"/> where each int or OID tag encodes a key usage purpose.  If the array contains a single KeyPurposeId, the array is omitted.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ oid, bytes ] is used to identify the pair ( hwType, hwSerialEntries ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as an CBOR ints (see <xref target="IA"/>) or unwrapped CBOR OID tags <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier / null,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid, 
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Name Constraints (nameConstraints). If the name constraints only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralSubtree = [ GeneralName, minimum: uint, ? maximum: uint ]
   NameConstraints = [ 
     permittedSubtrees: GeneralSubtree / null,
     excludedSubtrees: GeneralSubtree / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = [+Attributes]
]]></sourcecode>
        <ul spacing="normal">
          <li>AS Resources (autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>AS Resources v2 (autonomousSysIds-v2). Encoded exactly like autonomousSysIds.</li>
          <li>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous Address, the Address is encoded as an uint with the the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2^64 - 1 corresponding to the cbor integer max value.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Address = bytes / uint, 
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></sourcecode>
        <ul spacing="normal">
          <li>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</li>
          <li>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as and CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</li>
            <li>A non-critical keyUsage with digitalSignature and keyAgreement asserted is encoded as the two CBOR ints 2, 17 (2^0 + 2^4 = 17).</li>
            <li>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</li>
            <li>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 17, 8, [ 3, 6 ], 3, "example.com" ].</t>
        </section>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate Signing Request</name>
      <t>The section defines the C509 Certificate Signing Request (CSR) format based on and compatible with RFC 2986 <xref target="RFC2986"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>. There are currently two c509CertificateSigningRequestType values defined, c509CertificateSigningRequestType = 0 requests a c509CertificateType = 0 and c509CertificateSigningRequestType = 1 requests a c509CertificateType = 1 . subjectProofOfPossessionAlgorithm can be a C509 signature algorithm or a non-signature Proof-of-Possession Algorithm as defined in e.g. RFC 6955. CSR attributes other than extensionRequest are not supported.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateSigningRequest.</name>
        <artwork type="CDDL" align="center"><![CDATA[
C509CertificateSigningRequest = [
   TBSCertificateSigningRequest,
   subjectProofOfPossessionValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   c509CertificateSigningRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest : Extensions,
   subjectProofOfPossessionAlgorithm: AlgorithmIdentifier,
)
]]></artwork>
      </figure>
      <t>After verifying the subjectProofOfPossessionValue, the CA MAY transform the C509CertificateSigningRequest into a RFC 2985 CertificationRequestInfo for compatibility with existing procedures and code.</t>
    </section>
    <section anchor="CRL">
      <name>C509 Certificate Revocation List</name>
      <t>The section defines the C509 Certificate Revocation List (CRL) format based on and compatible with <xref target="RFC5280"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>.</t>
      <figure anchor="fig-C509CRLCDDL">
        <name>CDDL for C509CertificateRevocationList.</name>
        <artwork type="CDDL" align="center"><![CDATA[
C509CertificateRevocationList = [
   TBSCertificateRevocationList,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   C509CertificateRevocationListType: int,
   issuer: Name,
   thisUpdate: Time,
   nextUpdate: Time,
   revokedCertificates: RevokedCertificates,
   crlExtensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

RevokedCertificates = [
    userCertificate: CertificateSerialNumber,
    revocationDate: Time,
    crlEntryExtensions: Extensions,
]
]]></artwork>
      </figure>
    </section>
    <section anchor="OCSP">
      <name>C509 Online Certificate Status Protocol</name>
      <t>TODO</t>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The CSR format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>.</t>
      <t>When a certificate request is received the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof of possession of the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. In order to verify the signature, the C509 certificate is used to recreate the original X.509 data structure to be able to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in <xref target="fig-size-COSE"/> and <xref target="fig-size-TLS"/>. COSE_X509 is defined in <xref target="I-D.ietf-cose-x509"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artwork align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X509 and C509 are Certificate messages. X509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artwork align="center"><![CDATA[
+-------------------+-------+---------------+------+---------------+
|                   |  X509 | X509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+---------------+------+---------------+
| RFC 7925 Cert (1) |   327 |           324 |  151 |           167 |
+-------------------+-------+---------------+------+---------------+
| RPKI Cert (1)     | 20991 |          9134 | 8660 |          5668 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (2)   |  2204 |          1455 | 1414 |          1063 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (4)   |  5190 |          3244 | 3958 |          2845 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Bag (8)     | 11578 |          3979 | 8882 |          3519 |
+-------------------+-------+---------------+------+---------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "C509 Certificate". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "C509 Certificate". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="atttype">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. For values in the interval [1, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:   AuthorityInfoAccessSyntax               |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestamps              |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:   SubjectDirectoryAttributes              |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     ipAddrBlocks                             |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     autonomousSysIds                         |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     ipAddrBlocks-v2                          |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     autonomousSysIds-v2                      |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleNamee                |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". T The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>EDITORS NOTE: The text should be moved a section and not be in the IANA Section.</t>
        <t>This document registers the following entries in the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading. The formatting and processing for c5b, c5c, and c5t, and c5u are similar to x5bag, x5chain, x5t, x5u defined in <xref target="I-D.ietf-cose-x509"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cbor content format. The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="CDDL"><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></sourcecode>
        <t>As the contents of c5bag, c5chain, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
        <artwork><![CDATA[
+-----------+-------+----------------+------------------------------+
| Name      | Label | Value Type     | Description                  |
+===========+=======+================+==============================+
| c5b       |  TBD1 | COSE_C509      | An unordered bag of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5c       |  TBD2 | COSE_C509      | An ordered chain of C509     |
|           |       |                | certificates                 |
+-----------+-------+----------------+------------------------------+
| c5t       |  TBD3 | COSE_CertHash  | Hash of a C509Certificate    |
+-----------+-------+----------------+------------------------------+
| c5u       |  TBD4 | uri            | URI pointing to a COSE_C509  |
|           |       |                | containing a ordered chain   |
|           |       |                | of certificates              |
+-----------+-------+----------------+------------------------------+
]]></artwork>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as as X509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>
        <t>EDITOR'S NOTE: The TLS registrations should be discussed and approved by the TLS WG at a later stage. When COSE WG has adopted work on C509 certificates, it could perhaps be presented in the TLS WG. The TLS WG might e.g. want a separate draft in the TLS WG.</t>
        <artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
      </section>
      <section anchor="tags">
        <name>CBOR Tags Registry</name>
        <t>This document registers the following entries in the "CBOR Tags" registry under the "Concise Binary Object Representation (CBOR) Tags" heading.</t>
        <artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4108" target="https://www.rfc-editor.org/info/rfc4108" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components.  CMS is specified in RFC 3852.  A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication.  Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package.  A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package.  Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090" target="https://www.rfc-editor.org/info/rfc9090" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9090.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="I-D.ietf-cose-x509" target="https://www.ietf.org/archive/id/draft-ietf-cose-x509-09.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-x509.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header parameters for carrying and referencing X.509 certificates</title>
            <author fullname="Jim Schaad" initials="J." surname="Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="13" month="October" year="2022"/>
            <abstract>
              <t>The CBOR Signing And Encrypted Message (COSE) structure uses references to keys in general. For some algorithms, additional properties are defined which carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-x509-09"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6487" target="https://www.rfc-editor.org/info/rfc6487" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs).  The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate.  This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI).  This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932" target="https://www.rfc-editor.org/info/rfc7932" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603" target="https://www.rfc-editor.org/info/rfc8603" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite.  The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates.  US National Security Systems are described in NIST Special Publication 800-59.  It is also appropriate for all other US Government systems that process high-value information.  It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879" target="https://www.rfc-editor.org/info/rfc8879" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <author>
              <organization>RFC Publisher</organization>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration.  QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9190.xml">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods.  This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS.  TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS.  EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS.  This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used).  This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191" target="https://www.rfc-editor.org/info/rfc9191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9191.xml">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods.  EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication.  Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem.  This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" target="https://www.ietf.org/archive/id/draft-ietf-lake-edhoc-18.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="28" month="November" year="2022"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-18"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile" target="https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-05.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date day="6" month="July" year="2022"/>
            <abstract>
              <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for Internet of Things devices. It also updates RFC 7925 with regards to the X.509 certificate profile. Discussion Venues This note is to be removed before publishing as an RFC. Source for this draft and an issue tracker can be found at https://github.com/thomas-fossati/draft-tls13-iot.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-05"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls" target="https://www.ietf.org/archive/id/draft-ietf-tls-ctls-07.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <date day="3" month="January" year="2023"/>
            <abstract>
              <t>This document specifies a "compact" version of TLS and DTLS. It is logically isomorphic to ordinary TLS, but saves space by trimming obsolete material, tighter encoding, a template-based specialization technique, and alternative cryptographic techniques. cTLS is not directly interoperable with TLS or DTLS, but it should eventually be possible for a single server port to offer cTLS alongside TLS or DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-07"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="http://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="appA">
      <name>Example C509 Certificates</name>
      <section anchor="example-rfc-7925-profiled-x509-certificate">
        <name>Example RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2020 GMT
            Not After : Feb  2 00:00:00 2021 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
         30:44:02:20:44:5d:79:8c:90:e7:f5:00:dc:74:7a:65:4c:ec:
         6c:fa:6f:03:72:76:e1:4e:52:ed:07:fc:16:29:4c:84:66:0d:
         02:20:5a:33:98:5d:fb:d4:bf:dd:6d:4a:cf:38:04:c3:d4:6e:
         bf:3b:7f:a6:26:40:67:4f:c0:35:4f:a0:56:db:ae:a6

]]></artwork>
        <t>The DER encoding of the above certificate is 314 bytes.</t>
        <artwork><![CDATA[
30 82 01 36 30 81 DE A0 03 02 01 02 02 03 01 F5 0D 30 0A 06 08 2A 86
48 CE 3D 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0C 0B 52 46 43 20
74 65 73 74 20 43 41 30 1E 17 0D 32 30 30 31 30 31 30 30 30 30 30 30
5A 17 0D 32 31 30 32 30 32 30 30 30 30 30 30 5A 30 22 31 20 30 1E 06
03 55 04 03 0C 17 30 31 2D 32 33 2D 34 35 2D 46 46 2D 46 45 2D 36 37
2D 38 39 2D 41 42 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86
48 CE 3D 03 01 07 03 42 00 04 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E
69 3F 16 21 3A 04 52 5E D4 44 50 B1 01 9C 2D FD 38 38 AB AC 4E 14 D8
6C 09 83 ED 5E 9E EF 24 48 C6 86 1C C4 06 54 71 77 E6 02 60 30 D0 51
F7 79 2A C2 06 A3 0F 30 0D 30 0B 06 03 55 1D 0F 04 04 03 02 07 80 30
0A 06 08 2A 86 48 CE 3D 04 03 02 03 47 00 30 44 02 20 44 5D 79 8C 90
E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1 4E 52 ED 07 FC 16 29
4C 84 66 0D 02 20 5A 33 98 5D FB D4 BF DD 6D 4A CF 38 04 C3 D4 6E BF
3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'445D798C90E7F500DC747A654CEC6CFA6F037276E14E52ED07
    FC16294C84660D5A33985DFBD4BFDD6D4ACF3804C3D46EBF3B
    7FA62640674FC0354FA056DBAEA6'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 138 bytes. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 44 5D 79 8C 90 E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1
4E 52 ED 07 FC 16 29 4C 84 66 0D 5A 33 98 5D FB D4 BF DD 6D 4A CF 38
04 C3 D4 6E BF 3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork>
        </section>
        <section anchor="example-natively-signed-c509-certificate">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType and signatureValue.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'B27A0B781455F71B68290F6C2EC9A897F18FDE9B6C59575953
    BC67268AB0E4DDE99D273E04E4715383AB2257C6AAA35284E5
    ED18BDB91247E9F2C433136480B9'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>
          <artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 B2 7A 0B 78 14 55 F7 1B 68 29 0F 6C 2E C9 A8 97 F1 8F DE 9B 6C
59 57 59 53 BC 67 26 8A B0 E4 DD E9 9D 27 3E 04 E4 71 53 83 AB 22 57
C6 AA A3 52 84 E5 ED 18 BD B9 12 47 E9 F2 C4 33 13 64 80 B9
]]></artwork>
        </section>
        <section anchor="example-additonal-keys-for-the-example-certificates">
          <name>Example: Additonal Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example IEEE 802.1AR profiled X.509 Certificate</name>
        <t>EDITOR'S NOTE: To do</t>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombinini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
