<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-06" category="std" consensus="true" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-06"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="07"/>
    <abstract>
      <?line 146?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%.  The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re-encoding for the signature to be verified. The document also specifies C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 150?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates. The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</li>
        <li>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document specifies COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>. The document also specifies a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This specification makes use of the terminology in <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>
        <ul spacing="normal">
          <li>version. The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type"/>.</li>
          <li>serialNumber. The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</li>
          <li>signature. The 'signature' field is always the same as the 'signatureAlgorithm' field and therefore omitted from the CBOR encoding.</li>
          <li>issuer. In the general case, the sequence of 'RelativeDistinguishedName' is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as a (CBOR int, CBOR text string) pair or as a (unwrapped CBOR OID, CBOR bytes) pair. The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL have be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded 'common name' it is encoded as a CBOR text string. If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where 'H' is one of the symbols '0'-'9' or 'A'-'F' it is encoded as a CBOR byte string of length 8 instead. EUI-64 mapped from a 48-bit MAC address (i.e., of the form "HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string of length 6.</li>
          <li>validity. The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as CBOR null.</li>
          <li>subject. The 'subject' is encoded exactly like issuer.</li>
          <li>subjectPublicKeyInfo.  The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</li>
          <li>issuerUniqueID. Not supported.</li>
          <li>subjectUniqueID. Not supported.</li>
          <li>extensions. The 'extensions' field is encoded as a CBOR array where each extension is encoded as either a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type or an unwrapped CBOR OID tag <xref target="RFC9090"/> followed by a CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string. If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted 'extensions' field is encoded as an empty CBOR array.</li>
          <li>signatureAlgorithm. The 'signatureAlgorithm' field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</li>
          <li>signatureValue. In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></li>
        </ul>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <artwork type="CDDL" align="center"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid / 
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true, 
              extensionValue: bytes )
]]></artwork>
        </figure>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstraß form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER encoded certificate with a uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shorter INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>This section details the encoding of the 'extensions' field. The 'extensions' field is encoded as a CBOR array where each extensionID is encoded either as a CBOR int or as an unwrapped CBOR OID tag. If 'extensionID' is encoded an int (see <xref target="extype"/>), the sign is used to encode if the extension is critical and the 'critical' field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>
        <t>The 'extnValue' OCTET STRING value field is encoded as the CBOR byte string 'extensionValue' except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>
        <t>CBOR encoding of the following extension values are fully supported:</t>
        <ul spacing="normal">
          <li>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields"/> for special encoding in case keyUsage is the only extension present.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyUsage = int
]]></sourcecode>
        <ul spacing="normal">
          <li>Policy Mappings (policyMappings). extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyConstraints = [ 
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]   
]]></sourcecode>
        <ul spacing="normal">
          <li>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/> or unwrapped CBOR OID tags <xref target="RFC9090"/> where each int or OID tag encodes a key usage purpose.  If the array contains a single KeyPurposeId, the array is omitted.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ oid, bytes ] is used to identify the pair ( hwType, hwSerialEntries ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as an CBOR ints (see <xref target="IA"/>) or unwrapped CBOR OID tags <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier / null,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid, 
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Name Constraints (nameConstraints). If the name constraints only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. Note that <xref target="RFC5280"/> requires that minimum MUST be zero, and maximum MUST be absent.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralSubtree = [ GeneralName ]
   NameConstraints = [ 
     permittedSubtrees: GeneralSubtree / null,
     excludedSubtrees: GeneralSubtree / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = [+Attributes]
]]></sourcecode>
        <ul spacing="normal">
          <li>AS Resources (autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>AS Resources v2 (autonomousSysIds-v2). Encoded exactly like autonomousSysIds.</li>
          <li>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous Address, the Address is encoded as an uint with the the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2^64 - 1 corresponding to the cbor integer max value.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Address = bytes / uint, 
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></sourcecode>
        <ul spacing="normal">
          <li>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</li>
          <li>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as and CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</li>
            <li>A non-critical keyUsage with digitalSignature and keyAgreement asserted is encoded as the two CBOR ints 2, 17 (2^0 + 2^4 = 17).</li>
            <li>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</li>
            <li>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 17, 8, [ 3, 6 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-parameters">
        <name>COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, and c5t, and c5u, defined in <xref target="iana-header"/> are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cose-c509 content format. The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="CDDL"><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></sourcecode>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>
        <table anchor="iana-header">
          <name>COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">TBD1</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">TBD2</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">TBD3</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">TBD4</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing a ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate Signing Request</name>
      <t>The section defines the C509 Certificate Signing Request (CSR) format based on and compatible with RFC 2986 <xref target="RFC2986"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>. There are currently two c509CertificateSigningRequestType values defined, c509CertificateSigningRequestType = 0 requests a c509CertificateType = 0 and c509CertificateSigningRequestType = 1 requests a c509CertificateType = 1 . subjectProofOfPossessionAlgorithm can be a C509 signature algorithm or a non-signature Proof-of-Possession Algorithm as defined in e.g. RFC 6955. CSR attributes other than extensionRequest are not supported.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateSigningRequest.</name>
        <artwork type="CDDL" align="center"><![CDATA[
C509CertificateSigningRequest = [
   TBSCertificateSigningRequest,
   subjectProofOfPossessionValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateSigningRequest = (
   c509CertificateSigningRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest : Extensions,
   subjectProofOfPossessionAlgorithm: AlgorithmIdentifier,
)
]]></artwork>
      </figure>
      <t>After verifying the subjectProofOfPossessionValue, the CA MAY transform the C509CertificateSigningRequest into a RFC 2985 CertificationRequestInfo for compatibility with existing procedures and code.</t>
    </section>
    <section anchor="CRL">
      <name>C509 Certificate Revocation List</name>
      <t>The section defines the C509 Certificate Revocation List (CRL) format based on and compatible with <xref target="RFC5280"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>.</t>
      <figure anchor="fig-C509CRLCDDL">
        <name>CDDL for C509CertificateRevocationList.</name>
        <artwork type="CDDL" align="center"><![CDATA[
C509CertificateRevocationList = [
   TBSCertificateRevocationList,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateRevocationList = (
   C509CertificateRevocationListType: int,
   issuer: Name,
   thisUpdate: Time,
   nextUpdate: Time,
   revokedCertificates: RevokedCertificates,
   crlExtensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

RevokedCertificates = [
    userCertificate: CertificateSerialNumber,
    revocationDate: Time,
    crlEntryExtensions: Extensions,
]
]]></artwork>
      </figure>
    </section>
    <section anchor="OCSP">
      <name>C509 Online Certificate Status Protocol</name>
      <t>TODO</t>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The CSR format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>.</t>
      <t>When a certificate request is received the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof of possession of the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. In order to verify the signature, the C509 certificate is used to recreate the original X.509 data structure to be able to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in <xref target="fig-size-COSE"/> and <xref target="fig-size-TLS"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artwork align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X509 and C509 are Certificate messages. X509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artwork align="center"><![CDATA[
+-------------------+-------+---------------+------+---------------+
|                   |  X509 | X509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+---------------+------+---------------+
| RFC 7925 Cert (1) |   327 |           324 |  151 |           167 |
+-------------------+-------+---------------+------+---------------+
| RPKI Cert (1)     | 20991 |          9134 | 8660 |          5668 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (2)   |  2204 |          1455 | 1414 |          1063 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (4)   |  5190 |          3244 | 3958 |          2845 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Bag (8)     | 11578 |          3979 | 8882 |          3519 |
+-------------------+-------+---------------+------+---------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "C509 Certificate". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "C509 Certificate". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="atttype">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. For values in the interval [1, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:   AuthorityInfoAccessSyntax               |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestamps              |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:   SubjectDirectoryAttributes              |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     ipAddrBlocks                             |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     autonomousSysIds                         |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     ipAddrBlocks-v2                          |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     autonomousSysIds-v2                      |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleNamee                |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    45 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". T The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    28 | Name:        EC Public Key (Weierstraß) with              |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading with this document as reference.</t>
      </section>
      <section anchor="media-type-applicationcose-c509">
        <name>Media Type application/cose-c509</name>
        <t>When the application/cose-c509 media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application
Subtype name: cose-c509
Required parameters: N/A
Optional parameters: usage
* Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.
* Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <t>  Deprecated alias names for this type: N/A<br/>
  Magic number(s): N/A<br/>
  File extension(s): N/A<br/>
  Macintosh file type code(s): N/A</t>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as as X509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>
        <t>EDITOR'S NOTE: The TLS registrations should be discussed and approved by the TLS WG at a later stage. When COSE WG has adopted work on C509 certificates, it could perhaps be presented in the TLS WG. The TLS WG might e.g. want a separate draft in the TLS WG.</t>
        <artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
      </section>
      <section anchor="tags">
        <name>CBOR Tags Registry</name>
        <t>This document registers the following entries in the "CBOR Tags" registry under the "Concise Binary Object Representation (CBOR) Tags" heading.</t>
        <artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4108" target="https://www.rfc-editor.org/info/rfc4108" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090" target="https://www.rfc-editor.org/info/rfc9090" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9090.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9360" target="https://www.rfc-editor.org/info/rfc9360" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9360.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general.  For some algorithms, additional properties are defined that carry parameters relating to keys as needed.  The COSE Key structure is used for transporting keys outside of COSE messages.  This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC6487" target="https://www.rfc-editor.org/info/rfc6487" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932" target="https://www.rfc-editor.org/info/rfc7932" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603" target="https://www.rfc-editor.org/info/rfc8603" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879" target="https://www.rfc-editor.org/info/rfc8879" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration.  QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9190.xml">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191" target="https://www.rfc-editor.org/info/rfc9191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9191.xml">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" target="https://datatracker.ietf.org/api/v1/doc/document/draft-ietf-lake-edhoc/" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander"/>
            <author fullname="John Preuß Mattsson"/>
            <author fullname="Francesca Palombini"/>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a
   very compact and lightweight authenticated Diffie-Hellman key
   exchange with ephemeral keys.  EDHOC provides mutual authentication,
   forward secrecy, and identity protection.  EDHOC is intended for
   usage in constrained scenarios and a main use case is to establish an
   OSCORE security context.  By reusing COSE for cryptography, CBOR for
   encoding, and CoAP for transport, the additional code size can be
   kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-20"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-tls13-iot-profile-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for Internet of Things devices. It also updates RFC 7925 with regards to the X.509 certificate profile.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-06"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-ctls-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>This document specifies a "compact" version of TLS 1.3 and DTLS 1.3. It saves bandwidth by trimming obsolete material, tighter encoding, a template-based specialization technique, and alternative cryptographic techniques. cTLS is not directly interoperable with TLS 1.3 or DTLS 1.3 since the over-the-wire framing is different. A single server can, however, offer cTLS alongside TLS or DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-08"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="http://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1651?>

<section anchor="appA">
      <name>Example C509 Certificates</name>
      <section anchor="example-rfc-7925-profiled-x509-certificate">
        <name>Example RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2020 GMT
            Not After : Feb  2 00:00:00 2021 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
         30:44:02:20:44:5d:79:8c:90:e7:f5:00:dc:74:7a:65:4c:ec:
         6c:fa:6f:03:72:76:e1:4e:52:ed:07:fc:16:29:4c:84:66:0d:
         02:20:5a:33:98:5d:fb:d4:bf:dd:6d:4a:cf:38:04:c3:d4:6e:
         bf:3b:7f:a6:26:40:67:4f:c0:35:4f:a0:56:db:ae:a6

]]></artwork>
        <t>The DER encoding of the above certificate is 314 bytes.</t>
        <artwork><![CDATA[
30 82 01 36 30 81 DE A0 03 02 01 02 02 03 01 F5 0D 30 0A 06 08 2A 86
48 CE 3D 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0C 0B 52 46 43 20
74 65 73 74 20 43 41 30 1E 17 0D 32 30 30 31 30 31 30 30 30 30 30 30
5A 17 0D 32 31 30 32 30 32 30 30 30 30 30 30 5A 30 22 31 20 30 1E 06
03 55 04 03 0C 17 30 31 2D 32 33 2D 34 35 2D 46 46 2D 46 45 2D 36 37
2D 38 39 2D 41 42 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86
48 CE 3D 03 01 07 03 42 00 04 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E
69 3F 16 21 3A 04 52 5E D4 44 50 B1 01 9C 2D FD 38 38 AB AC 4E 14 D8
6C 09 83 ED 5E 9E EF 24 48 C6 86 1C C4 06 54 71 77 E6 02 60 30 D0 51
F7 79 2A C2 06 A3 0F 30 0D 30 0B 06 03 55 1D 0F 04 04 03 02 07 80 30
0A 06 08 2A 86 48 CE 3D 04 03 02 03 47 00 30 44 02 20 44 5D 79 8C 90
E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1 4E 52 ED 07 FC 16 29
4C 84 66 0D 02 20 5A 33 98 5D FB D4 BF DD 6D 4A CF 38 04 C3 D4 6E BF
3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'445D798C90E7F500DC747A654CEC6CFA6F037276E14E52ED07
    FC16294C84660D5A33985DFBD4BFDD6D4ACF3804C3D46EBF3B
    7FA62640674FC0354FA056DBAEA6'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 138 bytes. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <artwork><![CDATA[
01
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 44 5D 79 8C 90 E7 F5 00 DC 74 7A 65 4C EC 6C FA 6F 03 72 76 E1
4E 52 ED 07 FC 16 29 4C 84 66 0D 5A 33 98 5D FB D4 BF DD 6D 4A CF 38
04 C3 D4 6E BF 3B 7F A6 26 40 67 4F C0 35 4F A0 56 DB AE A6
]]></artwork>
        </section>
        <section anchor="example-natively-signed-c509-certificate">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType and signatureValue.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1577836800,
  1612224000,
  h'0123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  0,
  h'B27A0B781455F71B68290F6C2EC9A897F18FDE9B6C59575953
    BC67268AB0E4DDE99D273E04E4715383AB2257C6AAA35284E5
    ED18BDB91247E9F2C433136480B9'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 138 bytes.</t>
          <artwork><![CDATA[
00
43 01 F5 0D
6B 52 46 43 20 74 65 73 74 20 43 41
1A 5E 0B E1 00
1A 60 18 96 00
46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
00
58 40 B2 7A 0B 78 14 55 F7 1B 68 29 0F 6C 2E C9 A8 97 F1 8F DE 9B 6C
59 57 59 53 BC 67 26 8A B0 E4 DD E9 9D 27 3E 04 E4 71 53 83 AB 22 57
C6 AA A3 52 84 E5 ED 18 BD B9 12 47 E9 F2 C4 33 13 64 80 B9
]]></artwork>
        </section>
        <section anchor="example-additonal-keys-for-the-example-certificates">
          <name>Example: Additonal Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example IEEE 802.1AR profiled X.509 Certificate</name>
        <t>EDITOR'S NOTE: To do</t>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombinini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y923bjRpYo+M6viCWvGUllkok7SJ7xTPNqq50XdTJdVT0u
dy0QACV0kgSbIFNWpV3rrDWfcD7g/MX5gf6T/pLZe0cACNwhWZmW61hOSyQu
OyL2LfYtInq9XucYHDf+iJ1NJ2/esvnODT3fY3/um8qQTf3DMVgHrnP0I3Yx
zV+6POt4obtztvC6d3DWx17gH9c9N4z8nrsKDz2fQ+u58FJPsTrOanXwP4xY
AVKnE+wPI3Y8nKKjpihDRevA9RGLjl6nAzCC3c2InQD2oLMPRuwL5jo7dop8
5hwOzj27CNbM2WzYPfSJhQd260S37NY/+B3GjqE7whvwMQoPx4O/jpLv91v5
Kzzp+fvj7YhpnQ/+7uSP4OLNITztY+y8Wf277x7ZMrjZQY+Ys/MQYYf7/TEI
d2cI4n6PqPxTeHiPD3yNL+P1rRNs4Dpi5p8QR/3wcIPXnYMLzZ3dHo/7aPTi
BT6Gl4IPfj9+7AVeeLE6hHeR/wIBvMAXb4Lj7WklQPbubl5g/wjPMUrPOh3n
dLwNDzgK/OmJv4wFOxjzP/fZ9cE//ef/ZK+c4zGKwl1yn1P0n8PbXeUj0LER
mx8CF6+y8SS54fOh/ju83N+Kt/7JFw/23XBb3puv+2zpbwCh/iHXja//838d
gNiFu009uAnhtX4kXmvRhWWfvXX+5uSaX946t4GXvUNNv71azkuajej5/gGe
/6dDAO1XYv+b//xfN5vTziug3d8U79U1+e/wRv82pBfq2nzVZ4vT4XTr55t8
5QDb7Ao3qc3X/o+niDNyvt0tvdZf89f+aYdPkrgQjjudXXgADgBeHnXg1beL
qaaqwxH/aKjKQHw0tYEiPloDPb46UG0j/mip8QMD29Dij0MjBjZUTC35OFRG
jIkvuqVQ28v59GsuBkLZzTebAITWZdPT4YPPpijC4c3B2d/ed9nyCCzjHLyI
rUGXzNcgUIG/O2ae4hjpsg/+oQ/qgkA7hxsfdFYszJHv3pAAwwe190Hr7701
PeiBeIKOATUHam+3LmBpOLBifBgDW3y0NS1GjT3UzOSjnuDDMKwEYYoefxzY
KZaUGI1D1bCTj8P06lDFj1e9GWmf3sZ57/d87xY0qHz5dHR6x02k6r0gPPb2
h3AdbPzME3C358IvGBJcno4nvXcvl6NSLLnOCjBw2hKmVg7Ia7Dzewf/P07B
wd8C2qMezDEn+vRCJuF0/GJCSvHAFgigy84m4nX2VnqdiHi89dlVFJ2cneuT
2n7l7JwbeoCFa3Z9Wm0Cd3Pfe4cTEEx/mYnvj/4hAv3O1L7dt86oD7WaNd8z
iej/fILeaYqmxniZwvz4aMTg5NqL+GT0GXEDrSZTYCmitL7+y9D0Cub0GEtX
8/m8N1C0vjp+W46pKJZXYD7f5yInLr2AF/8KL/Y0RR30b4/bjYwmBJ1IO+Hi
Zeg6G0LC1j8ewn24CeA2TNO+w3b+8Q7m9ei//vv/WPru6eCzmf8hAJxdeYCq
4HhPoGE4gR+hWMfDzrYiRkIdasbR1S4CyKejj5SYb8D4gGlM9JB/DXcwr4EV
cgO0BfRLSByfboBgjBqCy18vX417/ndX02k5Fu/u7vo30dZB5f0CRrB9cbcH
DtsdYXAvTvtN6HjRCyTKC0V7sfz6uq8aqNTURK0JpGI7jNph199eyQzCrgGd
7r3EJmozBhCcNKiFvzqcnEPKHmSo9q7Cd+Wj8sKAGEJV+qqi2C+G9qCn93R1
2Bvq9tDu2X9VDbn3L4Ob2+Odj7+FDTwLwNYClGc4PZEbQM8BGAPJ8+4WBCLq
V3DB2XJ/gPv+ocumt862fwa220sgIPLR6xBhAggOMiY5NjINt3v4fGBLnINc
P4LpKXQD6M9VPHMA+ZEd3vnAD+F2e9phHwG/KVdAuzBThRumGVq/hWQu+iiR
0eq+pR2Ru38NlqWzd7xgGxwPzjGMmu2tWDtu7hN+nYID8apEN6JqhFv9rZ9V
eWifX2+ce7RAhOFUr376bIII3O0Kigc70Ov1mLOKYADusdMB2kYsnodYtPdd
YAWgmcPbJT8H1SHQkHONbIn3gTV8dvCj0+aID8n3ULWAM7PZoGLNe0X8xWwL
0Wm/BzcGm94gVuDCKuIMCFM4Q2OK2AHdoUxDwBt74IvVxmd34DwQr+EbaE10
uZISuoldgGK7ml0Cp75ejrvsLchxV5LrLjWQV9+sfIYR5gGM5U+3PvlsHjha
gA3hHLLZXIwu8Trlbnepn1kUoO8H5iqQ7h4+RzC2g++dQBHjo1HwNz9GBg4t
7oCXxQahIATrjZnK/9FnOUTD00D5E5dObM7ZoJyTmQYsusJmbnbwlAfjBEMH
PNCz5C6/dQbou7sN3FtgG2hvFx6ZmLuTseNYYkWCLznUHCAH4EPPkMM8zgIJ
5zmbKJTYj3PMG/AKbn0HvBxAl8Mvgr0lD5gcU0438QDihHEN0ufcvg08b+N3
Ol+gVjuEgFHUIuzjFwF+/bnTebPzYyXl3iLLgjoTmAS/eRPek08sDAb2rX+P
OurgpJi8AEa6rNGd7AL0+CUDUUsoiT3eOzBfyMK15y28hxYyRP34UbgTP//c
hdd3xBIhRQl8okAINv8WwPLJHiY3lO8ACenvPgQwl3KeJThocP/8c5+9JCmT
cQmDBw1CQIkewGEgVaSKkS934a4ng4bbx9ANNxGIKrCDA3p5fI0GMW8HDfCf
f04+q/D5DkMXpL3QsIA2QRkjBXHqBwbzwDABxCAYmGgimkudNU4S4Q5uGwrr
AVcz0oM9MBj2wBb/AoIr2gA3IGkD8byBMe1gWgZ8gZmD4kQmJQ52h6x92oH4
CpL4BxSZyN+BcySuQkeOtwcfYAVb1GcRF8zV/ZF/AwHxQTAQDwFSPmQfnE0A
6hZJSry0Ie/K8TxQkRFnUlQ5vLvoAqUoQarebHLkgB5wibnnKrHPXoUot6jw
3GPm2YO/h0agOTFDOhwHB3+Nb3gwZR8c1JCxesEQE6mYPpudSDapx6fDAbuM
nTxFYCsjazbpsfe+vyftJfRwAKblPZee4qsgAjvAWxShqeMcAdcgRsS0DgO+
2kUByeYetEQIOuKb8M7/gKYF9g77DP1x2FbGQqJxEuU/DXduAM9Ogh22ImJb
bzMYYheoFC85KdDjBlJwZcsZQsYtyWuWdbgCvAUueL8L76i/pHJQMlf+zl8H
IG2Aa+DdLRlAns950GMZU4Y0Naq4LtvDULnonrYUduvGDAwiD4IC1Ogy/+iC
UiN9HuBMCdzmCGVHRCbdjdgEexfnSZyHEnXDr20R+Tf8cp9PDatTsAG+D3c0
9H9evnnNAW/h9Q3cBST/eCTRCI7A/8zv3/RTvK84mumNZNpAYoTwIvp3loHD
+sCN4z6oRxQJTmfBdwJEZjbs8q+kiBDRCNy52YURaiPQeRx/IKZHRAUg1yMG
x4H6AJ2+QF9vT0CV2OAQjDHDrs6ASDvei5fO7uaEOLmYzmYvY6awVFQnoOQ+
BB5ZRHdgQ0GH/R+RkaJ0IuVWc6wNYwRz43V8fRXxTiL34oj6NIMjdD62GLWI
h5IRxuQm9AZHf8tlO5Yq6A+0DdxF39aHcEsKCjtHE88p4nMXTpM9nNiOtz1Q
UydfMrzcWzBpupLi5GrvFnwFH4QzPMAEDCQ6JpY84Q0sdWoJPSmYD1gS8EGl
vULa46Nb599RN0LrgtcSMy9CwQYgXrBe+6R18CkuLMlYuyhEMrfAlO2DrwEz
KnzqshP8vsQpcbsHctPA4Bbx5+602cCtDDYu0O695Jr4CIhPbxz5jZTlUnMU
A/ER+8v3f/kh37ets4cbH//yM97YO8Gh0HsSO7COyMPJ3iRXBCiDemzjYye5
9SMUA/Hxjw7eAzgR0ENSVV2ZRXkr/IJtaDi1/wknBFQ0wFmMcIPzP022IQOH
I7FWufjfCzZJLNJ94m4AXO6vAFjgxPGkwhqGx3gwDPuTmKjc3oBPeDVjiX/8
KIc/4kGgWR4PTdFB+jhOMtZQYngLJSxmSWe/h+mWBiU/vCKdK1kciFtUTl3S
Yl2WmCsYZsR+5A2KLptJJo1h4xWyTMUzpoZX5rNv3uBrJSFGvC0cXpyvEJja
1+Vn46gikq4cd+LjKojk90rjlTEua9GdMhvaXdwLLbNbuflLJEYV2s5X5DhH
C/tjEsTAXqX0EsIlHD0wg7luif08rq1LPEOYvso9uy7LsGaGG/kXDO4RJnMG
WFeEdD5+TONIXO1z5+qJvV4Zg4n/FHO5U8bn8NYdmpaHwNkdeQMeTl3QQiq1
kbPNO5PIA1y3kouBBjTo0jsxX658wiwZDKNOR+2zMarwD9g+zpwES/bnGg3B
rJOSkc0DqnqhccIVzRbY6fAQ3MDEv6kHDGpH67PXWSeUIzdrh6bzV+pzwkiB
Gu4JLSmPu8VFtxt8niOYDzjE5ImkS4RKsuVUQT9QefAYn7B3vrC3xsvXfZVw
jm/Gjh3NM/CYE0UY2zpy8w/U8Y9oIq/4HHmfeHErx31/R/mZfEwj0eHCvOce
NzZRwB3gqxFZeaUJo/Mo5CtsFewQcYzw7IlykhIlh2HX0Io8CO5fRTFfBJzv
HWEegCxh+Jd0MyKTPBRQGrL6kciL+gL1ThBFpxjLFFa4L4hjPM6kCfSI3TC6
B4pv+9XhLzn0QF0SvgcxTwGbRCJ8JZ6oMXeNyrwuxOGUhjJaNoav4rBpsrrg
MZ9DYnTHBhOIVr4NpMmBu9aXcW/5zIPxkdfC6MSoMFrsO+I2RJNPQYm7EJnz
7NV3y3dnXf6XvX5Dn9/OoS9v5zP8vPxm/PJl8iF+YvnNm+9eztJP6ZvTN69e
zV/P+MtwleUuvRr/6xmf1M7eXL+7evN6/PKMvKsM9ZwkxoRG4gGGidR2cBKL
3EOw4nw+mV4z1eDKCtO2cYQC07LcHd/xpoj/+VcupPu97xzIHkXPytlj8BxN
PDBlb9EHRP6MWSpry23BFohkqqJbGOzCTXhDSjmjOaUYTaWZR0agCDyCi+8f
SBUIe67L8ZIzJzd3aMXSw2QFznzeiQC9DbIC4goZbgMnADjalr7LNY/R14Si
w08ajkjuE3JRfuJjH7+QWPDnGEUcoiQR5HfzvAw3f+VYYpnCjx3+kDyJDcwt
6OmDUsIB7inSh7JPAZQ4XJANlMS2BbaSM0YyRKHuIJzjLZ8xsuZZ0ZotmhlS
+ihra8RR53L7JWO+kPNcmMAwPkAxOsAi+vHkH27AafXAuInrAVyqB9iHARkR
OC8F28Rjcg6pZsC33lzN6Boga+O4wAGEamBzsNliD4x3G2MmOw8sE2k6jadI
r49GL/j2wkqJfMnZw+bCHWn29nGX3PyxD0GRJXPkjb8jh3J/OuwxNiqpOmD/
G7A2jrfbxJdaBzc9bIBjuc91XHEK4/OHH2AsLTZ0c2aRU2+/dLnZxc2hqMFA
2WWND7jEDQvuNvK7JS2QI9k0Hz+kI0kcJ8zzG96EzhAnrsLjrUhU5GkXyzFG
qbxbP9ZPR245x7N9xG6gyzv0QCVxiw3snsxSPM4GIDBVXYwuZqZINKy2lOlM
Hw6JgkBPzCsDl8Swo2JriV1Ob6PymVS0BGwjBDJ9OZlsVv4mvOsKSxdDKMAr
/kb4yziN8MACj7aTdo6bEIQmo56/6nAMJ6+LTIMbHgCbIEfU9BKm4Pnr6Rzv
LufvYjCyKYv6+Qv2SoQAF1xffPxChKx6XIH8zIWB81msU7glGxyyqod3fxNQ
/YQYMD5K8QXRvpcG2gADJXo8FUiEjRMHhuF4wKFg/sj+jxxglZlB4qUSRwXc
nT+wJBqJIz0X3875aJHdcqQ4dwGKNKW9A1PtnKMC9CGHwt8tf5JsvwDIxAdB
NgBaexVWXh/Lt1BNospLHk6M2UbLex1ugBTIE3z4H3R2UdIv9hVTLrnyyCi2
RI3Be4hXGXQFHDW1JuEC0e4PVCzgbF6ftissJiNMy5fO2dXrd/OvoQEekSwg
X3D9aXd3QOtLmCannRj2Cv6ctuzi7/CBAoGA/LRjS7kldG/vMdlAgqL8qCg8
MHhxTMnCXR/y6uileJbZ+TeE7zh/J3Iq4TY4AtfzgcZqNB5l/F3iKCHjiWCL
waXPjuM5Kn5JyFy2PR7jLdgA1A10iBDTQifFEyJq6K5Ic/FQJPLd+Vt/Q+Oa
oQm4AwxGt773Grp2nqOB4A5ekYwinHwjyRsfQZ2DyqUAR5zLA8vDgYmmsg1u
XovYcZTmv5wYWOI7J33m2N/V9UzuyhzbTy4UhnQRC68I+krh4EuK5ZJc0JM5
/gPjqBsHTrFWnJ7mhHdWUbjB1jhDx9ItWmIXqabDcXJJuRT94uyQjp9EPkEC
MAkOIa0yEFZsnLTGag5MYB75TAvv/jc0jwKyhnEK++64HiyPvGIm5mi6cQ3X
KFvC7/KBpHibY0ksG/McpsTHoIuuxmb8DnBck1Li4btM1B11+XfvFr1BShpR
4JGggdQLdyNvnQ+YXKM0dDwC6K0MkD8IrIYgPB4wCBlGE7g+k00PMIf6fr+b
UVICgMybhGDbkHGc1KWMl9OrK+xveIfq6D6PSxqOG552x8M9Mb00EJ6LYRrH
t0Q34AMf8wE/xtQ67QKcn5xNfAGhrrb7uA0RPBKeDFrdV2tGzRXFK6WruMd7
iSsQBHckpDjH/EG4o0rqc0z8lSoFiZ7ULvduk2tSF3Zs/t1VzzJiqcBsETv7
5pte2b8zEe45/4aUUZgWaET32xWWHJwr5//13//H+fAc5fR8TF8W1f2U0kAI
SWB/EMf++nHntlzQSck6zBj0VgDx1XgaZ/HZBeea8kEsFr3FPBnE5UO6YpEG
pwqC4Hgv5hGg64S0/zkRHb+PsR7iPOPqpS3kNJW/D93bHg/HYxnYC/L5Lv6O
fy7lfJ9zkzHYd+kcK7w9kvDrN8urP5Pf2MWpdI8ufLgTvYDHoZ+e8Mod+QFk
+EygOgUUz4LiwRWf6oIjeY6J91ZafJa6/wRI00fmcGQpoFCm2Yk6JxxYk8in
+qSsbIslrAhSdus8YakdwtMNb+ce4z+aYgyx19DMO8IEEgadpoN4A+59zSde
rMfBZzgx+ZRwNoQfVdPhnzk0h//vGbvYUUo5OPCABALJMw4RE/OZ3Ng4UZgj
NjX4t8yc7f/okPO2Cd77sVEgvcnrmL7177HSUpSInSfWBy/6Bf46JMbLzt2c
CC170IFbDBxFJWZaMs2d59uRLBsxBe7fg0eOc5+YZIU3JJhnl2dkjEcgk4qU
G9UVhXseqYRxcnOXq2ARII67WSt+xNXCSuoKayzX9XM2uXrHlu/eXr3+usZM
LYNdEgh0gBZbMdNLcLG84W/+IYRh0wRPufZ46pevEXzUh8L2pBQyTA3pWi16
LfB6vpsMoZt1UIG184NEkOvTgTzktJIsHzn9+BFolnjJwsTn3PXdLgAj7WpG
0iUJm8R0dY9QCQRKunDGz9MLJS5Z3u7jeozMzeS93PPZ+I1kisELwgiTeQgY
MOYu8cbR31KoBywJ7rcdWnJpBqxgkjBMww8wzYJkoM18nlBcdmUzhiTiZfdH
vHLeyNj8DY6hZBKOFcPxjiopUiYrN1zXwSGigB+iUwPXLxNuAMvqvX//HQYO
LrtSayl/JuBTehYIKQyThDCJVi/vkpgoAhEiTmzjfI9hQk/bzM2SmcA28YDM
1Tz3nL4sJgdP5BYSzk2CVjwILKLzuTQ7tsxDXNQo8NPx4DtHDOJQxjVGVDPH
g9+z3R/vJcbPep6Jjs27oAW3soU6LwoKgHsWGjszZhKFMiWeeaClCk+mMNk+
4+ptmWvwc2n2ZpcqE8Ol3tWmvBNf+t1kOZXDTdjafDrDovj8ZFGGgsdNGDys
mMam2pbj8XCfRCHOedNsICpBa3akUl1UYdTYna1Pjh96OZnoDrqA5KjF+UUs
UPzA6T/GtHm8FiUtgOeVdumE8Wr8r5KjXpHJLfb47/mByQGI7K1LkIe/pz8M
8dXJv/4V+x4XgmQH38VLpaQd4SzX7fzQ6fw3rgqTmHPs8sT0oyWxpOLicK8Y
/VIMZdTJNgpducB2S0KIIwrF0M3yEN5IzijKN6SRjMjtpQuxI/U69qBGjMz1
3D3ypqRbwliRAFXasiNWYjKXviIwCndSLT+S5qcyWjQ1c9npVOADkBwHRLES
ZEsMwP5QE4r7gb3gPvsLHtHqdKqf/UoKIbwAuNofpAvAM+kXoHU2jMNJnF4j
dhvxli/ZixfJKib8Kbz79zDwii/zYnxABlIQR06+4AtylqAzRczBMzirvSB4
8CfTaPzzfZovjBtOJ6i4URisZGJwHCcXCKdEgfQSIiRhgKuZQEdyRYwITcwS
bGRe5F36f1hsOtL+EuCK5gaTBx0jS9IYnY8j9kU+88JXnn11Rp/j3LusOM9+
xvecAy0b7YE03ey+OnN9rLqAW5hhmtd5G+SilKmej19kJgyE1ADq4xdwaX9a
gSHay72LU9rb5VhaUxOxi4yvJKzWJG1GVZMiI5FEX0V4Roq35I1bNKZLEhnQ
2jb0TptThETmue7LvCmamFGoXO/C9qkOHr1kf/meiUZAb8c30/aki+wvPyRe
QXIbpnHLNHVbNt9Tmz19SB5ygQa4ZCGIKCBKsya+HHcqO9TWo+tz8uWLFyRK
wmTzJx/kGRcj/ef/5HG4i6zfe9nlj24dWthGpQ9SlQM3V5JEoihwwSXefZ3X
f+DmCugQ8HK6qgm80A1q9CQS7KF79GHuVH5UtC7+1nnACD4ZuQ6k7V3lawrk
/JsIr5120kikZWPIR8i6WVQgDTMpfIKSxQitOMl0ee2Lvq49eZZPiiVxUPFo
9DhTmi2tzKQqfPSDqLTK89h9zw3DAzxElQnoVvLSnc19vyj3ZdqCswgZrakJ
HD1CpIGOPuYLRALmCfKEkpZIg+JVWoIbmUldDO+cGAdV3EALFXnSveMlxEQv
A1e4hWn3sEm5kST+ytvI1zFn/Z5GPyxHImku/PhFxqXO1Xt5/tEJNlHBz4gD
HFk3+KkCQuCOygFSEQ/KeLqJY1vuyhIlzyWA2TTprjSs1C3N3okFwkGsjaWg
VTylJ2pYig8lA094axo/7ZcHO4SySPJ91BGETEs5272cZBHxZVEnJQei3kzf
zR/rXp9nTZRz6Irr74/JSlqpZ2nQhspMuMsahVv5oW6cucPE1eae45sX9OHA
MqGbYgYd6QtTUvJQ+uKJiuKK2s11dlS2zZ+IV2rlmTp1mFJKS3V36xMGRJJm
qTqFLfkky9cap8brhZh8MXafXL3MhawSD13CPu8Dlr4U3EUwFDPgwE7lXgBL
upG/n/meMSeh79hlCgqyiyQ8KKT4W/E9E5EJony9bkn+iZYf821KOAOJsqi4
SjQftsJNt1AQc4VNP/O1kSIUJy0A4BVxcX/jhdrERCnRxDxW5nNzJPKXycPI
Y0XsEPIK9ApfcLanC/F3wNAvoN91Blbs8DP2JZhENHPOwq0T7PhjsfsgWKl4
6xJf/iE/gIkT4a5S8fLvIy6mw0vSlUuuIt3xOXRh7Wy4CbTLj+wr1gNbKEie
RN+Fpzf3zvH2pb9LQZ4nlZ5ptUMZPJVbVe1h1sMrvFNB8kkOAbWkz6COUz+L
u1/MANmefC/cQbGEY/4jxqyCY0zpE3eD0VHudsTmIbfBKn5AMFPxuR/g//wI
ae7HjkqyD6P5NhX/2rHJTlAswFE8lc6//Q5Dx4eKWTnKRJilmV/M6HEcOq6x
cchK5mvbRaFwn1VkS5LkBAzkmj975ZVnOqp1QvJiJvKAN+cphpb30OSPRDTt
D9m3MJAgX8jj/opTDe1WwWgXgpDj+Mov462rHDTo5anA5Y+Z+HB+Lcx88cQ3
Tvcl4bUs8dQHN/D7ZWJYi+vyTiYUzc1VmMXFcDzQe/BvsGb1ELteX78G7ska
Y9yUETWXsvP0AG7mi5SBNJdiebDEoFRjlrKl3L+Y97FXfKDZwRcTelgg471e
UtSyxJcPxPIY2Y8vDoKKdTmQxkqf4hr+LIIzjq20kAKfvHUO3h105xUGCXxq
Li6GpSptuoKZk5UP2pmnz2j1+R03sj2+YQVe4sm58MA3tIDG5EWhYoHMeQr0
y5K2z2PLvMtng798z2h+5NGyv/wgG+4Bt3rinBUQ8ILd3r2jLWhu73gUdr47
4hZZ7DItoi/mHMVGkejtv4ljJlkEpmyZMV0rFI2oOBEh2gv5O1XQiWCjdFkK
9rPLHAg+fXyZgfqDZA/GbPhV9iUeRS4oKLJASgSamyapPFdLVaaeJSsKFfi4
kmGzdh2dvn3JMOBNAWZk7Gu+WObCfftSvs4vpwqo6j3aoEOuuC0A4eIq6YTS
J3KK7LQLMMz01o/C08H1U0NcxAx+uQarnw/K+yimLlIScT4Bn56W4U6wVzmk
guW5AFuNNqJARF+sxTf40p5nSilYwTqLtAHoZ2n/8z0c03ZsuKT3StoEY+y6
VDDoxHfxJr/ImYfqYYFiGd7ELFrxBa69RWyvkgMewABUHe0Q7Fc+NFdSb1Aw
xa7GIv/fwhTjHl81r+YD4fkpBrcbLCUPx8eM8sy84okSTdJIRnKGp8tOhyBO
MtH7ReRK1teXJfALDBnbKGXEFtopQ+p5GUuWELmCIZd5kEl/K8dSzaD5gELS
jXxIITaJkzfRbg7SN1MrGRdervG2zIgYsuZKmLtm+F3OUm6RjwKRMci8m3PP
2rFzIk24cQ0ZlwJCJjCYTPRNDZcb+W2iJ2N6J/HAMw2McoGWjPeVIHqaYG6U
0Qxlz7VKkHN3Xmb92ngOH8GL+iBPYfNTtHgupDxFfJFzErjwgeu/9dexP08G
FRX77zDCwl1TKuXP6YXv3i2SZQutuQEUUtHEn14LWyqr5ZLlW9wl/5eTs6ER
X9VoxFghXv9LXBDVpv6pQry5V1WRoU4fSDsGsh4XUrBir2XtF2eE/yO+zRUh
cRIpw2mRYJnoUaFzmHVGLVnWpx9YeeSIZvVM9AMt3ELciBIqwrlJHv10Plxa
Bi6vFhTBErENBi6P3562jPY5AAiYY+HqbOv8mLnjrGoig0KKQY8fUT3hPFOw
rF9nUSLFb/a4TB/Vj3g/GuUBZvSI/yNW97V7unJmm5Hngm5VuqIqmduSm+k9
aZJDSUnfwX3BuP0vpY7Twqc47eWmSbVDQi/a5Y+2YUTvNlv5UYFpqbdty0++
/xJF4odizcUDqlC+/5KcRSEAy0o0IVW/TL8W0D9esthU4nZjuAu34Qkm9ejK
QySjnBy8IBcVfajZN16WKbcTacI/xaThmRix+iItrcV3eXvjZVCW45FJygMD
0MsPAYyC3qgiHA7wzeGtQzuvfhVHHb8/Jbu88RlsKZuQwmDLvPpDXPxTh9oP
WhG7vQ9ajamWeZSKUK+uZVoFXm/v94I9rpObbEL3vUwtZP3leHH1S8nGVyBd
H/x18GN1hjaKk2sX8XYw+VpTSvBfFmpwRTY7XGceLjbCGUXuEuG+JgyGieh8
7i+KPYS0Kdr6J9jFClaOWHXjzZIyL9Bmpj8CKaTlibg0D7eZ2tHOzA3cHA+g
G+di5eTkrSOt1hU1A+JSytLx+yQRaS+KoiUtV2qQEg4F5sQj5v9PG48veqQS
dL6RJBWaisZSSJHY+5f2OdnhPYRJpZtJZNbZJS8eiGi06cmBq1nt3yyD9ZjK
CnX+2EHcmzxJxyHaP9QpYtGIyCWCUHJJlu4JPgY9nSCR03YCpOV5h0vpcc5j
XzH2ffK4+ECaIeEBoQnQO8q08yIDKPPK9DbE0w64OikASjRK8goXcHoepHok
hpYHV9DuGY2BKqioNGqUUPFhUkNLURku2eNYChkdne0+E2RYTt9xp/tDfOhH
N11gLhaR4kOZdHprBfUyvEGbu8ypl2W+m6zXow4WJMWTTOxtsNkE8QpDvud1
oaj3MhlDdieTbAnDDlispIY2jctnNtzAXV6dqLIet7J6scp7JwIRfajWORl7
YsJvEHeiOlMYcQmG0rJohiOEXlSXHdMTaRVpauVLXVhnOxHPoZWdzDEx1WXx
TUkrin94fUi8cSmv1aDYvEj80MLatECmG2f44t2t0IinRNA4LYXJ55nZhZTl
vUx2PStkbUusk2QmIjg9o8t6ap83lymJSSoB+Cbw/KSMhN7UV3hkfAMGNd97
LIp8KhppalLrMtVmF9q/KYB27d8M3DrDvizrgpRAlRdrgx54v6cDcuTD2vjV
N9PldXy1Zn3moDD1SzGSv3zP9C6zsFy0pFPleahkg8lMBonzQB8mpLrO6OWd
kdeQn0mgzqgC6VTQTbzkiHZjym9DFK9y53EqvrQs/JBdlCY2zKBUEy8tuYtn
3rKOJ6jiHNTlZO2yQVfCXxc/ZPrOkQoyRNsLfkPbC7LrpLI8Xh+DMcVjTNn9
IcS4XrwNmmuuuvDLFVE18xh/OHWzObfA2Tk9voNhnEMKtngIH87nP5or56YL
f2jHf/xwxF+nQtoODxqD10VZVlJZWNiRh2pjpdLQ4o5YYlcgsiJh9H+lN9IT
FKR36fafcSdLHJa0AXfmtIp4N+4kJUcxmKM4yim7BfDNCxonMhhtgEd2lyhv
++7tFbdE5QXwUhdpJQ9tX+lJaxPTBUAv+KGQVBssIIjDJ/iW4yVjjVfL5Gl5
wrZjCjil+ZcU3FeF9U9iOUb+ck6FjzP77NGqnrQfMj/xyrcEo8FufxIuC+cq
ec2esAlgTKKyklu0YLPSjpuUMki/ivdXJ/e9L9BErbCtD3TaBZGIqwjWpxhh
huOEuBbxJ3WJdkPIdF6E+cj5csVJApG/WfdEqZnMM6KFBB6Lt7qEocal3ac9
rgtNF6ZSBTwfiLNzb3G37XhqojpF+NAL170V3xRkBx7INt7h/SceJPuJvXRg
xoS/PJ1FqdufmJyM+AmehXHD1XeTmQp/Uo74CReUnnakvlCbOjel+20JEC4H
oRVBxAC4zNSAOHIQegICHvkGDyj9idEfwnCeHfmrJ/6qAX9OhwB+gxjyenTh
ccgiKCvxYu9yHcMFLZLuS9aylGrcM4bHl3x1dmAb/A8Xr6RxwcJGsrSJF7J5
bHclNbLn7wPvvCAXqG/w5AaqdKUnSvYDJjIdxHBoCZ3HN6hxDvflu2nGMzzu
v45p0Y9fTJdvxeLKtMhaWjLZBOAC3r+MT5FINu/mbJrdhhh3zMBTHMX2qfCJ
YqbpPtTS5FW6aWd2gpF3BeUZQ+GKuPHuZ2Q95ZYLiu6L3pOMCONSAO+2eOMr
plCwF76jvq/YHE0olmZgajMwlfWTtTOHMFy/WV+HkTjlJvUukj3e+JyRWpzJ
E3yvRzDK0psED3VLCpFJDksG63Q2AtLRGppmnwHp5XhtKLS3I1VFxmxS3Gio
efFpFlnlS1Gzz2RWUObxJHs3n2KBaqG7ZctViwyQemmfbf1o3MXCOtJGFqtc
UCqbCcmyQBz68m2bVYFZtDStEaSFt9Ku3VIlXznVRf39mFZV00lBtNgqVnDV
RATS4HQiVJcpacKUtyl/lUTPsmcY+T/yRbDcHPHovBeuGz2/XEG/9T+EYluA
lwFX0G9fPkRB5wFcYLFLKwWdzWU9jV5ulvK0v9TdUinPPvOrLD8vdJOku3Ys
WekurDLHjba/2/MTFpM15DuQ0sLFA4B9nwnCRCOic+4iXwJ/2KRS/QQrxUva
SdK8gLuDdKN+mT0Ng2Nnlh0f9Rn3uavq+A/V+uXtyzb6JUuYxjXInMff7Gg/
7Yz1cwS0RThn8uOaPn6BYRMUzzezN8mL16nbTWFJCUB8pHCHda7IXaRw083t
ETqNpzckxxQd+GJBIeBCfEkdbfwbx403JZQ8fNAuQfYIA6I2ttbnUKSHhakg
jh5LCxqikG/9sT7tXDnlMR13kz0tIx+tVNwpNn4odpXiIMwYC7DIgwULITlh
rLBc1oirBemt62+nyy9UJX6elrrxU7lEMSztrycnFWRlHNtQ8lFSfFfZpLW+
mmzNzq1P7CVV+WbjPgkk6Zg+CQfVo+7SkR60Q75ALHfeNnjma7wFyz7LHHwW
i31erGJe09bk6e51dCtZpNuN97mjc+Qzp5mKEgfqG9L36Lz3Ge3BjgMV+7qK
41QESglJ8QqmKtPzzolinKB9LDFAfkAJarD5GAUiYhCnDsTuiKKvfsmm53QW
AYV9kNtWp+2+F+x6AKZ3Fxz4lj01/VXy/U2ESOpoQqeMDAjMirPD88Gq/Bbo
DigdEFz/kAhsII6HQktDLBzHhsjY/YK95HKLIWZwAg9iB5iPX3j+vhf5x5/L
NqwWYsqPMoldxowCyEbT6CwAFAHpgFFCGI9L4jGTKb8lPoCEo6z2kLaMxRMI
hUZKjt7hPaDt5dMAFUcqCW5Fc2KBfnoCKOWo3r1cvpjx8600+TwecCe86Nah
zQgZleWddj7fhiGmrgMty0vyYuMm3gIyxiIvBZHXS4fxRjyAYZ9nLMN44/H4
9BiMzhxp4QJtK8BDsrzhWCGt/OMdLjcooJAKV+JDzouMnpVSboVYL8M/XY9f
sxUn2Q08d+fEh0Y6qbqMTx0FXkJEQyt4KOkWMBCfkEubOUU8Mi3Wp3sfnN1R
HM2JFzDBEp8imYZcMn2kTaCczLGwKIZ0zinMj++jJAIaSzj0hg8VuZVS8uI8
HjoX/g731w124KWL8+tOybEx6XmWt/HRnVvfiU6iSgs1xs092U3IC8g1m3vB
bzv/BmZxsmXJrBXHDnGNhydEVJ2dKZhRROHIyCUhk8crUM3P48OPPUpYZA+G
68pUofsZJYOBaMSOHAkuZZfkAIEK/RljV1CY74uG+PgQkNDhqTPJ6bHZo+vi
+ECcb4KJi/vsgOVdVC6WV9/OP2hdWTrFLhR0aF0sqIWYfk5CASiuQJOOZZGR
Q4LJlzL7eDhv2IM/+CLfPhUXCwl1HL/+gg6tlKcch5wuQXJOBdK68x/3PHCc
DWL9zRcZk9LFZxHPUmZElR9vLBYU0f5k+/2YPCXcAyGJK/NCmPhYH3owOS0E
44jJZn+5M0TSzIUcyM+lUki/p9mFvOclDo7i7nHuqG8qgt2GEa6A4vkHei0t
Qk/WTInzV9LsOFwQEdTCBtxU5OigPIsjYd/Fm6Bxusf7vNFpLCSIwlZz3NtY
EpKd5iWNnQTz0+OhJ8CXm4CrD9xKEc+jxVM0A17lmSs62TrvY57hh6AkJJbP
/+2XnKEuVE/uzN64cw0nqPM54phmsdk3795dL8s46eLu7o5OYuyHB3HYWwhS
l1y65CekTOP8lxh/rBVo2xF+HhxOUrRQEquqSKCFvY/JBrA+SoiNB13GI8Kt
ST4E3ilrTPLj1mAAol1ETfJKwkIZoEF8mskRz3OnYcqlskXrJl6TwkOlam6j
Ec5QiE/RBbFhpq7FawHfYrrEJUtUPKL39T43AMlyEZo85asNkHbDVH4G1R2M
HOY/4k1Nk0MVnS977X6+rPrc+SlfDlrx85Mk+JlsypP0ocitOBNn9gdUL1nc
V121k8+q/lR94LvscDmQW55S1uJCuxR4oB9NHerxZ+iC8VR4qOuBcZnQgn5M
1Tbjz/pQf5o+lAUwkkkhCV+Q6YKyTDMU5c/y/aWZBl8C2UqKLnmh3IUoNMwm
trgkXjYFPeQ4Xel4vywZl/S9cLlUBOCaYHX682UsuD8xkUOcZi8/VU8SQUB8
JkyvaynDE7U1TCoy1VQzl1XLfsKe4OFuSS84TjRlOMw0OVSR7djAshT5smlZ
g6friRAISQyhKU1TDLlJ1TBRGFRDzV5WLP0T9cQQPTHVYWbwQBzsgj40B/Jl
bWCYT92TiXPDLgYxdVTVtDNN6kMbWXUwGGiZy9Djp+pJpbpAG/xB2iI+8vOh
6oILKFmc9OGQjYTGB9X3c4KcvJBewTeT/eZKYTTGY5c++Ito4BeiJ5Hv9tBX
+1ky5xOLt+Lwh8TFQiPzRpgccQu0GfNebM9L0RvuUvGAAAKtduj56XEeBUvi
g+3SynixnRrln+LKdO7Wy4cYHoKInxuXPbaX+YdDeIjEHlriONDmPZ5rzhuO
rV7pXEQHWodPvM6Y9syMsfLhtEErnXJbAZ1dN01d0jj8kQuYiUhuEsXaOh7F
OMi1xlMfab9Vii7RYZs0ctywT7IpN77z3iEScV+Qwh1Itp2/iZGRVv4kx7oe
nLV0RDbGPGlXtHv5dFu5GTlmILzric+rdfA0j7TgXjg6XTwrJnZFkpMk4WXP
xzqluNiNFoWS4RUH03iwJA7q0Cb1PKOX2fo6DglKa8qkoFcx5hfE48QYB+2m
Q77v1fj1uCgxWODyc/70Yh7ewwDbB75Kzr8Ta+RoP4rTzhOFWXjjVmxxeJZP
Pp5xex2rJbH0TRRanr+N6+bibejESaLkrUu96McFwHucHnFNg38Xn6HMHdGk
Q/IpfoWDfP3Y56ccQnQ6SNsu8t17APEfqJyQqsJJnMSxlli7Q9WbYnM2ehJD
w0ce6aVsRBw/BBp2+Tv86CB85yYULmjqJGF44yjOTnc2gGnvXlqAGDvaooPS
ykS+x2Y+1BUnLKXzrYmr7sWOcORxk5cr4wH8bfc9l9CNQyKNiQZx2qmor4zD
H0nwnPLUglp9CqXgrnZiYQkFLnmC3KVzqoTfK9rkiMZjK8WeJqRFnT1FwjAj
ToMDbQuqa+vvjmm8IZ2WkpCPHx9mkS5qufODG4whODc4zR1zulbqOMBbC4kU
eycexT6X5Plhq+DzZwJ+NCHQMd+RLOinOHmOQfU/8rIh4fTSLnTQRfaX73ua
0WWa/pcfuD/rgGNLyxhifYs7DVJQ5EM1BNMCEKaZwtAKMIrRmWp4uE8vQMQ/
CUw9B1EUF+fLCd7RqWJvueThnslUe9/pkG7BmBHXHB7tFJnojHtuo3hFFcEB
nj1Ao/Do8ua03UUpg4pWkONFhYdU6MiRk2idOEiZbPPBV27jWqQUjeKIV9EO
HQcubyhBeq2GYDHJpd7xmSUp/MCGz67m7xaYuQfFdkZNn3Ghiq+l+jPDIg1Q
8zAIZXQgAoXV0mLdPO6yVcKdKiv1IT9oRHNEZ2tPH/YDVvRX/Cf++5if2AVF
N+J1bCotJVNpmjFWCseeJn15IryQ44Q+bslB0Emjcp/K8PIkfSlzL8T5gcK3
KBfbxr3b6T1p0bKkOJzj8TG6IwVWrTQQn/HCtz/neg5+Tn4w0WV7tcK3Wcps
lERneM7mb7vo1tD820LhyAdPPrH2UZ6T7nkmqic9SuKhP59C9Wz9kdxE9ljU
2r7E4YWfZBbkwHDe3yTrWf2e9LUayhtcLSj/qH2tPzCUvqrqpjHsq334v7Ev
wPxZKIrFQMS0MRtYzBjg74XNlBlTVLyuqKVQYunJgmrz8/QquUCjKT/AlG8B
V9+XGhrx3aS5DnHrJsFaGml9s2/09eJbdVBKaaQz02SKgR/aQXkuNNLKaLQ8
HXaN9MmPqECjiEPpsqjBSmlBI+NhfamnUR2w50gjvZRGVAYaxx5bjqhII/mM
orZQKmhktsFLWxrVAXuONDLKdR2dMt2mL7W6LjmrGpRdSygVNLIe1pd6GtUB
e440Msto9DJ0eYlLc19qaLQRUDiR4m/wqQ5KBY3sNnhpS6M6YM+RRlaprjtS
tO+ABeAfaNOJFiMq6jqE8uYQw+Ckwv1m6qBU0GjQBi9taVQH7DnSyC6n0cH3
jy2M7wYaIZTE+OZfm6BU0GjYBi9taVQH7DnSaFBGozeHG2cX/M1pDBzV0iiU
oHAhCpuhVNBIVVrgpS2Nxi2hPBcaDZtoBPbdd+DyN4+olkbOBoEISp1qoFTR
qNxvrYJST6NJSyjPhEZqaZzhHcbR2vWlhkbHx0CpopH2ICj1NJq2hPJcaFQa
Z5jgOkuciaYw69+E1VZ4LY1WAkoTkFY0anaQ2tNo0RLKc6FRaZzhOgSbbAN9
9H5JLGhPUJqBtKJRs/Hdmka1evM50qg0zvA1FeY3h+vqaUTl/S2AtIoFPaGu
035jNoNaGme44nmB2pB3YUQFGgWPgVJFo+agansa/dZshtI4w9fpGtJkh+7G
ERXlKIFSD6QVjZqDqu1p9FuzGUrjDLPXDbQpG1GBRl4TbcqgVNGoOWDXnkbz
llCeC41K4wzXkX/ywt39trkvdTbDY6BUxVSf0K4zfms2Q3OcQTpEoXZEtT5s
HZBWsaAntOus3xqNSuMMVzu33yr4XUujfz8dgkjsjfZmDTDDwz7kE9RLKSTe
QCO1r/etvor2d19X1b6l9DX4WMRzI40maC3gB5W8JJUNNKbbTJ8yRaOLKnuW
NNJK4wxEozbB78fSqBpK4WdZjJ5X4eXhlC5a9L+c0hp7npQujVYQpdukCx9L
6WmaRGSPo1HRov/lNNLZ86RRabSCH8pMS27CHVapV/elzjokKAmQLvMqUrq1
NFL6w76mG0CXoaYouqL0Vfy/r+VtkUYajTG3MdSYZrEBfNDZQkNr3iJ6qcMi
lF+fRmVFlrhdIq15lusspRLHdgWW6d5YcoGl2Bf9gfWVJbCec6Fl9tDGFoWX
+zAKPkHRpfp70WWiiuKiy4SVHiNyT1h0WTp1xcdT5Q4xLOtLbbEYQckeglc+
ogZjXxv21cbIRjtjX50x5XM4zSmUrBSOEuy2wcsnLwtMD5J/wIgKlE5OcXgI
lEpKN/re7Sn9OVIqKZRx7rgy9m17vHz64sKqA9/rRlQl08mBz63wUknpRg++
NaU/S2KmWabb4OWTlyhO8BiXzEGQLUZUTJPmD4NpA6WS0o2FO+0p/TnKsWso
PWmPl09e6Fh1InrtiIrFqKVHhzfgpYrSemNlSXtKf17tXaB0+ZHqpVA+eblk
6TnATSMqUrrkGNpGKJWUbszZtqa0Vlcy9jko3R4vn7zosvII8boRFShdftx4
A14qKf10Fpn2K2vviqO5y6B88tJNcgExOtBkhNcvbZOOL2uNl0pKP51FVghb
VUH5RJSep3hZ3u+Ozo/VUD55AWgq01fSRipj182XVbeTaQRS8nIplMpQsAn/
2aUZmRIopZQeSKFgk/7ZST6mFMononSK3hQxpST/DGWkdceE8jMmSkZUoPSj
8FIb9FdVFcRbg88ls3aLgHIu6D+zmD2kiL/BszLss1C67oDNHJSnTB2Uelm1
R7hXjajKny47w7waL1Xau3l1RPvIyedYHFEn0zWHu+egPCWlS72sKzoHpDlw
0lCKR1CaAwTt/OnGxUrtvaw6M/4zUPqqPV6ektKlXhZ14aExjwKlcYV0GyDt
LLLG1TTtKf0rx71ft8fLU1K6vOQM3bx79oofStCSRiVl6gilGUg7SjfW17a3
vX/laOh1e7w8JaVLvSxB6WbGa0HpB8ZUKyndWAHantKfY+ODRkq3wstTUrrU
y1oc/OgWDyPCsGjbERUovRZQmoC0onRzrW97Sv/K2nvRHi9PSGm9oojuNlgF
ePzvvRDvFiMqWRxBUMZNQFpR2ny6/HStevgcFll7vDwlpWsrERriJu28rKa4
yUMjJ1Wz7KMjJ5MqKJ82a9kQNmFPTenSSoSra/bW57sp1y9XqpfpPW40MNmE
7vv2UBopXRkVfTSl7Soon0qmr1vj5SkpXVqJMF4+BaWd0zHchdvwBEwbXXmP
zE/nKV3pVz+a0oMqKJ8qw7GUUFUP5SkpXb6IUZbpDzWBhtYy3WsLpZHSWhWp
H0tpdVoF5R9LpktjZBmZfjSl8zJdSe2HUboqlvloSs+qoPyjyHRZOTYvmc4U
Y6f10C2LsUvLGKSy7On1L9kuuwDxORdn/++97fYzqcIucE+Ljf0SSfvUW9+C
A9auU/U6tdGNK4FSXfPTb4hHN+pUI635USphPa/FKbwvpf6pWED0Rzwag/P9
xeyPl6V9qaERX0DU+8ChgEpqg5cSGml6XzVozVB1Wp+1oJHFLJsNVNw2iC+7
U0rAPUcalXqWmaXLMqXe5ChVSyN56XItpdrTqG3mrSWNGjL7z4VGpT7hVXqw
pkyhq4IsNUT0YigNstSeRm3r1VrSqATcc6RRqTeX1KvJFJqXaLv6erUPvZtT
4Pkb3ISrfkTtaFRfcNxIIzNLo+YN3Z8LjUrzmrETxvDkxAs8P7FsMmJNcuT1
3H2P+909J6reS/ohflhp6VEBSns/bJ7TeM+RRqUZyTIaXUjVJZdpXx5KozKH
+WE0qtJ3j6aRXgXlmdCovI7vrb/Fw5iXV6/4Hg3o5KLn+DbM7e8oj6jwI7sX
ooqoakT1lD5Ee2y55wb1eGnWmBa3DmvM+EZK20JjqlpqHRZM+edI6VIL/mko
7X93Na3bL6sUSh2l/VPgVm8M/xBKV8+Pj6N0Ht5zpHSpH/CUlH7l7E5rxz2e
Dr9Ypv1T3Y5VD6F0tT/xOErn4T1HSpd6E09D6eWr3uz6SzwPuHFE7Sjt7XvH
6r0YH0Lpaq/kcZTOw3uOlC71SZ6U0riOAKnnVu6m/gBK42qNSry0p3R1Wcnj
KJ2H9xwpXZphelJKX4uThicYMQAgZSNqTen9qgYv7SldvV7qcZSu2zbouVC6
tAr76Si9bKG821M6eirtXV3f9ThK5+E9R0pXRCuejtLNyvshlH4i7V29nPJx
lM7De16ULssau/vKY1LjdG3L3HGS3U224s2kjq//5aGp4zqAv2eOf88cl+qy
55Y5Lj+QM+kcbQpyAEc1cH2+3+dW3uawSSP+xxEEGFjOzS+wzI2odYSxJjH5
uAhjPjf5vDRiTVbyuwhE4HVIhGnoSyONTjuC02XiQwOURhpVBhIeTaNnHKkv
m7X2/5GZtUpmipaTVkndujRnXY0fOmfVwPt9yvp9yipVQfGU1biGok7UPvWU
9Wa6vG7Zl3p16Hi90I32Xfy8fx/8SN9qoTSoQ2NQOWc9Sh3qym91ypqORRar
iXFa0Mh1BCgwLpxyqA+j0ZMml5FGz3jKqimkwR0x0NDb7svjWqUjqqDREWDF
oLpM/lYKpZlGT5pcRho99+RyxbZ9Y5gbaK/luuPnWEs5agT1MBpVhSEfTSOz
CsozoVFFAQAWZ7xydsHaLztPuHxEFTQ6wDzUAOqB81FF9v7RNBpXQSnQ6O0C
N5IftDl75ZOn7sVmS2/4EtHavjTSKCJYtaAeSKMKo+HRNGq/OPRXolF5Khbl
CN3cdUOApKUcNYB6II0qJqRH06j9wiCk0UAdtDn38NO5uYGTcXOLDsLDTlnI
7GWYcXTn3373qLMWKiD+7ur+7uqWKKHM2QptNtYsitovdnMbV/S06FzTep4Y
RN2+n61W89j1q3nar+UxK9fyNCpBUxs0bXH1FCqwNviAWeIlSBSwvVOTRmya
ot7vexFBGT8ye5idoPSquMPjorB6Juzw3OhSGnBAukw3AWYs6tK7LejiEpSn
okuLVckPootWDuM50KXUqKODudH6ro8xtKELQKoF9CC6PKU5h3TRy2E8B7qU
r9DZOsEGZ+ij7/LlOcsXr65ezS/z/Wiki4+QrlNAtThtpEtFEduj6WKUw3gO
dCld8dEyKNeCLsWQXJQF+yC6VGyB8Wi6DMphPDbQ85R0Kd0xjpIOT6LHENLT
6bGKDSseTZdhOYxnIC/lwbdv/cPKP4QRrpB6ffVOtgGq8FFGl/17dEV6315P
q2f/lnTRqrVYC7rYWbpoeSXGWtDFMM2mzQSfki6ldnKeLt/OSte8tKbLt1UH
ZT6ILpWFs4+ji1kJ4znQpdROXi6/iWWkvh8t/BcXXPvlrb/ZlAN8mJ3cvJr2
IXpMPhmuOQCqNgZAn5IupXby85MXQZdyB+bRdLHKYfy6dCndw+j9qbiBUTbI
2DLg+bW/8w/OhmieCXV+/frnhwU6yyH9KiFOuSu/RzKfRdFOljse8vOkRTu9
0nmH8Eub5t8FYFstt8f9d+8Wg1fgO67CHzN9qdEKoOHCXa/65VIohZ+LrJIb
9Ictdj4o/FRquUHuSAwZSnJoRfxDXN/m50kTcL1Smy1Ho1vn4N0B274KvdPG
l89caEGj4suF2PPDaGQ8NY2MKigFGn3P/h4GXpet7lFt/lDeDw7lKQtCSv2d
lEYNP09VPvH88FLKu4e1O9C0Foj5DHj5dWS6PC7uvV624ZZ/ZLyUxj+9+LSg
h5yx84nw0o5A7KnxUrqi8rQLMLMfbzxTffDhPy6/lK4/DGgH3RaF0J8BL1zf
toLyyXco4vYtmPve1ay0D2Uj+kR4wdmoJZRPVyhzs8u4jRmjvKXDiNFhB/cL
YePNDZ5WeLvN+I1RcONsbh5aJVMG9VlVx1w7B7hzpAu/V8o8P//yz/1K5myW
t6fyL3uaWZi33i7Hy+W4d/3tdKn2Pqh/NYWP+c24V4wqVkbQoltH7eGLvUPk
UJEnDbPbqIcyPwjlTwAE+gTic7jfI33LYdRD6RXBtICSiefhwvIBbnyo6qYx
xP2dWu4ckUoiAHv93cuGY3wqoGTigrzkEd2wIdPGbGAxY4C/FzZdVyX3TKme
K2bh7vzITlErc+kJZz/gukJ5/nw6W47rOK0KLxmu810PuI3YDqDUA2lBaUUx
TDzFtS2UDKXHq6gpL1AOpUDpYZwziSk9nTN9Jk6ErYJSTuk+Xt+j5QUzUSKV
XJOmUD6p352jtFabxWlJ6Xog7SldWWGUh/KJKD2OYyxFSresVmomb6YvnzSS
kKO0Pmh7Zl4NpeuBPITSNRsM/+qUblP/9CtSuhAbyVHabH22bQ2l64E8hNI1
HPOrU7pNRdWvSOlCdjVL6W/nauVxPqyG0oHXk4gN9tl7vxpQDaXloLbV19ty
3aemdDFCbuGxC6VQngulC3G9PKVr59iHULoaUHtKt90d/lehdJtq71+P0sVK
lrkHBrnafIh9YUR5SgtAXf4Z2KcSbi2lVQXPeGxeofU5KG2KE0KB0pbJ7Ha7
Nz+XBbZF7e0ZRuMJ9mUjKlIaAKV0roHagtKN52//GpRut3vzM6G0VqB0TRSn
qH/rojjwdMvQyUMiJ5VHuH6OyMmkKXIyaYqcPOjnaSldmKdrKF10luooDU9/
Ckq32tPq16L09BlTuhAjq6F00VmqozQ8/SkoXanHnwOlZ8+Y0pUx+OWyRaCs
ktKHyInA8t5HEc3UEtAGKI2UbnV+XIbSYgRd9urrRU/NjKrLImdzfOnvbuDa
V3RKdQ2lDbWJ0mN8DM/FrcoHjIFfFpkYuqUIWPA+TP7cMedbHFZC4ew0pvNn
AZY6rutXNRQ6qfhp+uJoIkwIj2q/KUtVK1QJlElAZezvNyMBMIKCBNC1jAQA
7Z+PBGjPSAKa+yJJgP7bkoBCPUiZBFTGRH8zEgAjKEgAXctIgGU8IwnQn5EE
NPdFkgDjtyUBhZWiJRJQHXCui1akgHoNQev2Eci6tZq/dgRSnZdDeSaU1gs5
4VJKVxm8D6H0U8Sa257o+6tQelEO5ZlQ2ijEmr8BEr9gL181ng6SH1Ge0s7m
pncbRb3NNurdOtFtFNx04+vbY3KN1VI6N6vB/xZGJcvWyX0GSnPtP6mY1Ya4
ZhsX/anPktKFCOSfX5UbGY14yVH6r0DRv/64bbNpciWllb7RBzprNv42RbSi
ag+mz0DpOFqBs7rC7AX+BnMkDVUoJVCeC6ULEUik9L+9evdwvFRRetuI5AdR
2ni2lJ4/b0oXIpDLV5qYoF81J22qI5BbTaSDtw+DUtDeqmlhDmlo43xdcYR0
AcpnqPMgh2C6wF3aoFcDndltVtD/Kjnhsqp7XhIfZUrvSwveWx4gdFptApeW
epeX4O/fP6ICvxTq7yX4v4kS/OdVhF/On02q4ClPZihziFrqJFajaA+R01jv
XgqlMfjTCsonSvV4cZDFSc3ktU3XVan2vSbVIyvaE+08zVkAOaCkL5+4SFbm
v4s/+Ug6EKP//J+XfKqNfHcPbuxBzSMmVzuZDKHLi65qh9REaqqdrDkzKg8l
Q+odfPSmp8MHn30ldf8iC13HY/oua0mt6hWV7/Hxi0lZZWVULH1HLz3Ir3JE
GYa5DkGZgqJqxTbVMcdNFLL3u/Bux2COu+a5L2cXBRxBXdCawRbL4z6oT812
JRW7LdhOHxi/Zbbj3ae9D1RdA4dAT7c9qGU7pYntTIzGDOpCumTuV2z3Uzei
z8B2lHAitkvoK0P5xOXDLdjO1NTfMtvx7stsZ35mtmtRUMc+O9sBWgTbJfSV
oXzStdV/5oWoF6/A1LwJt/7hvmL/k/yI8lHHP7eulG1R99i03SOr4bpPVfdo
zctBsBp+edDP01K6kDP6M5aitqNzA6VbV8q2oHTDSsQ8lM9D6UU5CPYsKV3c
rzSuWr94d4d7Jnhw4c45eFEpxX+vWm+G8lwoXXSRqGr9oo6+5SP6vWq9HMpz
oXSh7vH37GAC5R8qO6gW6vt+zw4mUP6hsoNq0fb+PTsYQ/mHyg4WV6I0OveV
iMn8rA5OsNuH4eY6CXvWDem3FiJoGl4lXiiioOMUpGOviHvtKmuoNtBgNAUa
hmhPaDXlk3yTAnxhEHNrdWT1qQINn3RxzZMzb0lwrQ4xvzXmLR/eg5hXVVvs
Qvt5mHfCqn6eI/MW7OYnZ15T1f6Rmbd8eA9jXv3ZMG/1VpHPkXkLrsATMe/i
7bVInbX4+e0xb9Pw6phX62smdKavaTx4oWHZVGOcrMC8ZhPzjkXxU2Vf7DHV
Q6nMXGC4YqCRwdvitMXnwrwF7+aJmDfaavvW3PvbY96m4dUzr1zlpytVRkMD
87YsJahh3kxJn8a02h16nxfzlhX5UdFdtsavvKSuucjvzXLOvvEdLLxLeUAu
8HPDyI/r+4KIHfz/OPkUsz+GzImw2JEqvwDoIeAFbB8/Bs7O6d0S1J9/xgfx
ibPyts7SorG0/o/X/ImT5eMz4rCmTaqJukB4l2dJnSCJ7PEW+uiF7gmphsnL
Q1yp16fxvvK9wGHv7vc+c/b7jTga9QUOsucCHjt/uvX5gEpvsy29f8T3oaET
MEGXnvaco0Plf4TRvxJJYEwnF8su++yKl8ft41GzsxMenHOGr0T+EVF05t6C
iXPW5UOIEM3Qa8CnJ+ocHeamNY6Mnu5LdZfp/tPU1DrcbMI7xIvU5Y8f3y6m
1kAf/PzzqNMhLOxII0qD7SxPq2N6J8XMW+hSgOD3kq54/WLceUP0cDaZGzS+
zh/Y1NmxFWCTx11gnPtD+CHwAHzI1qcDVSIG0hnqzio8HZMaSDpnaOs7RH9R
YxgePHqHvhCfJMiCJyQcRf20/SyS8WOMWADj8AZlMJyeR38bIYng8ZUoygTR
p+rWKnpQnSr21g13EYyTF1UCQlbBzjncdzpLPC0sON4XHlj6PnUjeWCaeQDr
EwhD0LvvM2z+ww/IB9i5cA9Pr4JNGXikVIe0RHSLqmvvu7zvcHtUgNjpjFOW
iDiOcLdZeizlqBErPuZv95vwnmsWFFl8jeShgDOEAF1fHJwbEtcg3WO/tPdj
zwsEq0ksA5z8X//9/4N/Mx+I4/Li400Are3o/B94kHebdxggMSbeeOXcgM7c
nbYr/3ARXWZvLoINqDU87CqCVgq3XzkuMEQY3bI1PkgigyXK0oOdaxAFoNj/
yehoWOaIjfOBnbBw1gHdhp0rEYMRA11680+Bf1z3w8MNJy8JA8nVCLD76tWb
1x0QSqwidjn6oSlxm6PrdLwNDyNOiT993elMb53djU9tH0A9+HDvar78mhQj
HRst0QaVQ2YeOG4imAbeZfRrrHOinMrByeA+FtGzUtDlav/dwdlF+/BwZC+d
e7iYyMIFALnkR48hNaJE7fNKb6wXz3MWc7noo5Lmk4OT8g/2KSO+YlJHASMt
ORjYw59/7nPOxTH762AHgMSgIjocyLknpo6oKr3LVicSEmRzL1jTvHMUiwBQ
EIId4MrxUIDBxOn5cUU7FTJLnemycO+AKqJrf0VN9H+p/b72b5rRU/9vzjkB
1pGXKMC/Y3dlXF8ADk67uwMoeGgqd/cS9dXs6t2bt+dL9vrNu/mIkIm4kSvC
QfXchqeNh8j0gsg9ke2DIwKooM3hy+qeOoNv/ulrBkrAYRsH57noCPzYZzSr
Cj6k2crxwj0KKhomyLfTHA5wyTuaWtgsKLVbZx9h80gjNF8SOvAW+0m/Afw2
uLkFLdQH1rhz0AgA9ODMBNjwDs76mHu1dZX6lzXfCg5HXKVeONHkJ5Apl4xK
pH1iYJZZoTVV6l/WfCtWqb+bzDBmml8nkTGS/zVvMre2ZR+AFxnTZH0i875z
brKKBr4/SNME6bqJswRihVkZ7twA5qMJTcaxgfnWF3zlCMMSgFwKKLGaKWWT
X2LZc78UGvlFaxlSNvklaxmITd7NJhicnKHlcwWWz0gyZdv9JI7TT6C4tyB7
gQtT93jHTTZgdzKSUP8VxL0cSrLMBhWTzA5t+vI0NMqwLFxhK8d9D8wLc5ED
ho5fkKoIWBj04pj7V/FTeIqnPdRMNH/RXojVvvQi6GLxMCCI5iB8Afyn3Cvy
tAV6LZnd3uz93XL5MsepUgOjDiIG6cs/4c8fQaTI3tDZhfKjdpncWPoHXODz
mmyjEVO1gWYN8Rl1bSqe9FxxbVnJDu/J41dRdEJ409dfIUoAXUc2HafdAcMN
5uj75AL+vA6PbOKDbQRs8M8wnzFw+pUR/WOaoins61fvCi+M1zj9jNjCX2EJ
vfyCmnlhyX146pKi9jS9Z5i9xaK3mPcsuzcY9saT/LOypF6B0TbKtF4mxqNc
SCfzQvpSD26N2AXufLAKjpeFp/an1ahwEX8UY7RSR5o6spzRajiy/JG5Gunw
Tx8ZymhtjlbeaK2MNH9kDcsh6OuRaiEE3RkBNFMbmf7IM0YGfFYQuKKOhu5I
AzheBYTBCP45q5Hjjgx/pBojbzCy3JEyHA30ke8hwKE/8tcjzSiHYAxGrjUa
WCPVHbnGSLFGpjGy1ZFtj3xrpGgjSxnpyshTRqZaDmFtj+zhSHNGrgavFx4Z
L1+rPGCWLtcoPPT6avmOTb97+0cwh2ihR/IEWnkf9NQniLKdELeTY3GLXZwF
N8ERpCoRGnrigSLEAAVAFUCHRh9MD8c8cEdDZeTbSGzgdM8d2YA7Z2SZI8Md
+a7UGaDJGm6sR4o+srWRbY18FSkGNAcqKQDCJV4Y4psDY2QB7mWa85ZNB7lr
OMD21ytkldV65HkjyxsZgP81MgMwkqvjLUtGBjwHrGmvRw40YiGDWvbIWI9c
oK6JHxyAbo084CQfnsnqsw5aemA+Mz92tEVYwFmBJZpRjjBh6KrBDwnLaUVd
oQC2ynQLI4wDFUDSvkLx/jt8yyq+8GhhYp6msB98p3jGAwYrAaCKySL8rIkK
Pww88memmK80NWZYuO2CpnRsg4r/dAYfQJXBRYP2v1LnWHmF7RJY/KdKvzP/
OuZYepg/oEm/s/9M2mBJoyc1RbQFwpLrJwDkzWkcrE4fYFwmfsD+W/EHuoKY
tDv4YcD0Id1ScRMRbHH4oBVhneLCL/hg8ISDwSYqbtNtjdlkiCXv5oTpE+ye
oSClJjO2gNHNOzBb6QskBzysj/FFQLs5ZzMDt0EwFYQDwIdT7OqCd3vAxhM2
njJjjhScDTrWFNN6A53NZ/jucM7mC0zxYQ8tHAUGlikxaBpYwWnbbG7hiCxC
7AzGrnYWNkz9OLQp8cNYT7evSguJCPnqjEqIjJSjYOwDInHj+SKIIhtRhJts
0Y5TGn0wZ9j6YMqGSmduEzNDx6bIb/YYec+YYiYERroYY2E5wLE1ZltsriIe
AGkwdugGzNaIzGEHnh8A01pUzkatIEfpbDjAthYTxPBkwWYzZgEPjDHwrtMp
s1MdbwHJJosOkMxesLGFCXEgnGUzY8GmCnIXfABJhClwBrQAqbTybkO17cXi
6BtXE+QMJHriIu8cX8aqg5z5onEVkON7h0EE8DbQxSCAXuDc7MIIjFvG4zU5
3fKCm6oUL6CAML60jD30CzR7BrahXY5edEAnql34dXuukFl1jl/OJMPoDC+o
pm0PdGugKPTNUjVNMxT+Dd/UdMO07MFwPKH3Y4jaRNVUazwZWnNzok903VAW
5mS2ULS5NdQXqqWp+lgxTM2czwzDMBXS0BPM1ky12WKmD/SBDFK0B0/O7OFg
OlTm9sJUlNnUNuyxZRrT+dSaLsbWQtFtzbbmqjE3tflMsQnuYgoNDo3pwLAs
ZWaOdX04MGeLycyYLGYza2aMpwt9oBhTfWZY88lC51aXDQA1y1As21hMFd00
FmPFtGaT8XxsnZfMDFHwNz8ma478mUjJJVJXBb7kswPFD/b59M6eW3LvYUKn
zEcafXCQwJF7CFY8FPHxY3RawePwKNUpx63+/HOOORS1Y6STSsfKTAasbDLo
qGNUPaAm5mj34ldQLuqADS38atC+UpqOWhikaDAEFYatmANUfCCf7dQlK1OX
nRbqEtuCbkBzRl7dsAeqm06ZumGyummhaDpZRcOeRNGM2GvnGHzwN/dkrIlI
WtZ54xtOHIBF9uGOOG4XvxNJ72QUTJVGQXbjwXDX2XTB4HT9PY8Vu1kVxhNZ
O2nTEQo8/SKNpPzWNNJEs8fKxB6ohmkubHViDbShsrCm2nw6HA+G9kIdLGbz
4cSamkPThv91Dndq2ZoFAJW5MYP7w5lm63PFmBu2akJT44mmmfbUGo/HuqkN
QJvRa/OZOpjMJkNVM+z5cKFNDV1XdcsYKJPhE2qknNpQ/pHVxkSj6hKQ1AHa
XWAIgcmkTpg1QAUAFhFoC2hrCp2E/oNuUNlggRb7EJ6ZdsC8NG00Mk0diIrD
AVkfQM9BAxmoHuZDNpxh9ZI+xx7OyVSDh8GuA3sPLGHT7oA5Nx6jbQaIBX0z
N1EPAbpgpIABsOTBuAI4Cw3tPcADWLOWgbbZZFijNihjRQkH8ArjVJSf2i9S
2KjTmZCZQdvDYPqTIiU0+eyd4JBsJiNqDtCD/YBKBB9AA2V3gzwlcu3cGfJF
M5mcKJ/q0pf5hjRxMsKhUCpF6ikENVRMDdMg8FJU7JOcYYGWqRgA97LxD8Ga
ZwTKulA7FAcju1H1uzwVSy1izBeV0gc6v5xjl29tsz+Ex9ANNxHbBO8B3bNv
3kxzEsWHkgRkEs+bjToqu2i/s8dlJw8KIKCuG8+N6WyiqAtLNWbzxdQG3acN
zAXYSwtzas3UmaFNh6Zl2AvFUidjRRkoswVozQH8b5jz8wQwx04MeTa1rIlu
qCao2JllDA1tODF1TdNnCxv+TuDCzAKdpgwAvq5MpmNjqoBxNYQ37MlEO8+y
q/wlLmfJNWirA1VVF/piOJkN1clQWyysgW2DuWaBIlxM52NQmAao0sXMXmiL
iWnN56o9Gw7nYxUMu/NC2D9m/6v5fA4ipPXV8dv6wGguSRUyL8xAmoIcT5zI
38AMJ06/+ubdu+tlGTDk/7u7u36cXBVPRv4B+BatvA0mFHjCMDNdb8EqdG58
fksrkaqysMQ6AMbJuxWqBp2qiUsYbGWy5LPpMKcQmlDJF7bXzFGZD+poiAVu
vg/qtKOv8PkVaFoHPXEwcGBqWLvkbDqxFxlvwAMGgO5lIhgGvAXKeSWdX5pE
Bizy4jX8CvoTAx3ctbezjzn4mEpzluUya417qFlkxOFXFS0+mLA0l2YrmF98
ZsFE5ksRCT8B2OF9Q4A2awAoQ1NwasOpkMIsPK6ieai6OXyVth1KIyQ2fR6W
BUwc/nAnja4kD6v5GAs8DL8tD2+V4bBTxGE5qgfiMRERUimyJMqQpViNTY95
CArwAGPHgVuEEFWgAuZoYAD8sJZJ1ikjWROG8yTrIECfALr5YBcCJLMEHx4i
fa1y4B0OHA0YekA8uSY0FsNHOdYV4aNOCVeXhY/A/tFhTvGYB7aHhx/UFRvq
KEfuGvkEmER1cLxAdM9iLjy/AuMZOQeGBpKlrdkALPUV0hqADMFHcZkHBg8h
31x3YNRrC6XS0/BdMHg0EEkL8TZcsZWKYqsbTAXhNdlQY2sHzSeMJq2Ryh7g
TUPqIIYNXCe89nAhOAxhBTO0TmpBw4tCRcBnjqK1FErywLpD2VEHIiw5IOaB
FhE5NvMd5kNnFKSF4rOhQXYgmJ8GCg50yRti6yDFAxuRBsARjpdpAl7EJiz6
bTDXRWYGq8+3ETPQirdia+Thzhq6bSJRgDpgiK5NwswQJ3PAiUZSo/kZ4KqK
YDWKQ2pYcdxpx06shp0AiOJimI7/0wgUPkyv49c1vU6NKtn+KGtRtb9ed8pi
dHnkaKZATrp6gDgh3gq6I7aC1qX4Z3qXpXdJw9irLHLWpP8NnDJsTSglh/xa
/K0jO4FsggmNnreB/APTAbAu/LPI5wbM6KR1LQODpTBk/K0TNjRyJSS8wVv1
msEYdrhOSLSurHI5KNFoXVc7lV3l/TFYi642zDuJ+qrtaod31XCzNCUdYtDs
bOhiLMWN/3FbOw8a7XCGQQbmHD6oJjTpMeAWUKQy1Wy9k2Ajw7etUIGdBHkE
lxf5mbdukaRD025qTiAXWdV944tVgE/47EYqRSthafG8rggkgPIpcGAHycop
q+PFlmNBhCtJi52SFjViJKOS53FClIADYh+ExgqO6rTmKASL/cxyFM5raoe0
ijgpAp9RYt2uxvtEOBKe6fR4mJvsIZGPny9hdICma1LF+EFHIGuVFidb9Nli
pot6HobjUaqCp4HQ46Zpgg6y6MADYDEOfJy/DOoeGgw6W8Fba+w84lNBPQ/a
HqY8aAIQ4lNzfEUIIHboonNtrhGOuM61pYJ+tE62GeYOqHvrAfYH5h1niBME
wAd7xnA7gEDoOTQKt3Bicplr46yBUmbgk7bHfNLSwJbugOxDD0MZIIPOAL14
3eoAM/AkhTZEDKN5Rnw7cIiBXaQ7CIhGc59PJjTobWfFbB+nb3eFVgEAsdAP
RSUMg4LZELoEKgs6zCUXpkvEM+VfAMmeiwyAMzug0UJohtmBPsPUb8J856C1
AEiGWyopELAlPJpzATnwroM4REqtNHweHgPawdgVv+M6Mp5ZgudVEc8kpIaV
4hlGNwQjR+0MbaQmTP1oouiIhJWFo4OGAPPQrqtjcybxCWAVzVQLbSSVTjtB
m2fQUTUcBaBo6CG/eUraEPQfbDZ4F2QEg1Q2fjbIHjBt9EQ8as7wOyBNvktY
9Yk/wSxZI01BTwJX+CbxmI2YxFgQGD+u0LqSI9MpdWTQ5BvG6TAJCWBBgTC6
INFrJDEQC2gEihrYA+w06IZjowYGikA/0bJdY/fgikfzrKniUV0Aak16GJjH
BQamgJK37oBNlTZk4i3AgAu0HqCIrUl5Ak1BrpGfVUT+aoX8gPoE/Dgw4xW0
qLGhFVqh3LoDhHgOXgGsgqVnorx/8qQYd1x/layY2sUIimEvxupcV4faYD43
FH0yViYDfawPTcvWF9Pzbuf7DusZXXb23RKj0r0BfJxuwpO33jgH3NV55/bp
hpq5gdfZfDpl03FPP+v80AWzcmgOBwqFs1VLs01LoWB2Dr6FYCgA3jPh49LZ
scXBwYJCN2zuQLQL+m5yM4o2fTfc8uZpuPrQ0ufT2WxgzKYzdTLUx+p0Yeja
TB3bmmrPrKmlT2ZzXTfNsaItBtPFxBzPBsOhMZ0ZxlxTOELsLrs9H5vTuW7P
x/PJRLFNZT40MK40MQxzMZ4NNUNVBvbQUhcYSlfxhelUmcBz9myg27PJQjP0
hT4w9ZkxsJSFqU/04WQ+nGhjfEHvsu+1ygF1Gd6T4ytnMMQeXMSQPWDoe2hQ
g0sMcPj92e3xuB+9eOEeNnrfC24C5DSE8yLFI2ARqIXE6sNjlH+AH+lNo+Wb
2CjQ8Pvbc0sZYMBeHVgLwKuiKuo57xhBjQAsDiAL9XoJABjv+lB6Gh4O3Wif
eTrupJY+4zp4M2rV1SOhDDgP0NZRFWiMwN2eLyxzOjS0xUy1bV3RNNUwDRUY
V1eGhmmBmOjGTAWJ0fXJYrZQptpCU5TJdGrMF6plzPVz3i/bHsK7Q4V/E38A
+gD4zhgP9Zm2UGbG1FBta7aYGMA506mtTwBnhj6zZ3NFmVvj6UC1DeA/YzAe
DAzdsgYERhsuFuZYNxRrMNYMZWoNTUUD5ptD7zRzPLHnM206mS6sgTWfzu2J
uRhaE0NXx0PFBrYen8e9MaezqaEPtcUcGpvAQI2Jas6H4xmMdG6pim4vJjPg
Z8OeTceqrQ+NiWbCswtraivz6Vgeq6YPcmOdD4bqVB3ak8VEmeszXZlOrCm8
rcxAnvSpbQKOVdvUdWuoqyAuMNCBqs2MmTacDdQZz0yNQXHMVGtqWNAJ1QDZ
Me3FFDhqbsxtcz6F0c2BZPZ8MVe0wWIwN4EU0B9roM3GMLhzgvID6gAFdcBk
Zukg8wsbHlzMrak2BCHE6CrI+mIKunBhT9TpTLE1Ux0DBRe2bVvDqbIwbHW2
mGMZ5cScKha0Yg4wVa4rE22gAf3UmT6ZDMeWZanzmanoKoCYqOOBpmhzZTY2
J+ZwMTQNJR8dfnACywZzJA5sVsVn3zZFZ49huIl+YXzW+EXxWSBoXXwWZutV
bKBTFK8Yn1XI+HAsDLiAkTFA643iHUZH8dvthb4Se6HzAjXXkmOF2eBdMSyr
5OMXaUjRRs8EPeFhx3bIw/HR+MC3eGxUzb7FI4wORRjJIxLOFSXALBX9ZHCB
MHRLXrGml8WCXXwdgyy8aUuEXfBdzFl2TEphInwytbFX5G4Jx4yiOaXxYh7P
1dVsVHSFjQJiK13B1AlEOHbat06ub7bUsZxPKMJMCuGEh1kNHj/qYL0XBVt1
Q9ThFWOj4M414EQXTdumFOCWOo/PW7HjqoquanTGos1DWoOOiGdR37BXCprR
GnfDtLJQeFJfSCyBMW69g1lb8gHiUHhcaKhK5YbiYSY/jLd4WF/t5AKUCZnA
8zQMgVV00YdxFFsXzIk91zhLdDQq2LDItcAnjXTgllGdkCAnR6UojOZ3OJk4
j3EGqAkCcidc03Iy26k/v0DRY+99nXXmyUMQnzEFjm6Ar1JAdoABWbgF3hE4
sRiBXWGc1NWYsUJnY62gCBgOBqOxez7iVtU7loL+FXi80HmgJvgbjoe+kE5l
iOBEwYvDITok6Kg4+A96DpgBRwXcXdJL6M6t0dDHsYCTCe0iTlRyOw30TKA5
GIvqoQcOrYDPDD4McBSIlUIkxpoDC8MBK9KBFgViMNzsITToNowdIENPMARv
ojoCPxN8MPC9TQ/9K3Cnwdle6xg+Bg/QWVMEeYDeKfhgnodBDXje8bEz4MTa
a0Q+wISuGj76ih5FiMATA4AAdrii3moIEL1oHxsF1W1qCBBQDbrOdhGZKx29
RMC/qyIhbGh00IHxgv8P1MFAOZHeIF/O4143+XKg+S3y1vCiSlk3Cv0PfYI8
7OAzVJowcChaAU0MERsaKUaeQ4IPAB+IC34p0BFUiks5hgHREfgEg/4DHLhK
aQxoAiNHPoYwNMIMEAIQZVIoWbOQXoBAcHGhLWBRcOkHegdRNMDhqBTeGpg4
akAyuPGATwCCaLTwikHKHMgKrAK8NKAgPjjhroOazRsi9oC7jLVwgwFj6yFl
Dtao/01Kh8BvkALoM3TMWSGfuDRkk6jD/zlqWmbNgxpJesNX0/SG5xUDZx1V
T8Lx+cBZ60B8Jx9qbxGIL2QFOpluJAEIHt1WiIKFwD2vO09mB0dB9ehQMBTo
pbkNgfvsnJXMHZ3mOUuPHyb9b5O1oHF9buBvUI9ypN7Ss5ikAJPppplOg2Nj
lQt/d9ZcY1D6TbVFEFxfSwipDYJTPqBTP3eXTn+fdkKviaGrwk7j9mHZ6Dpx
GB3DmroiwsGaU4mNNIzuJ/zQyWAjG0YvY4nSUXfkUYsAWU0feGA9b011HksR
uW+dx1KEcYoQP3cSfs6F2gsJUVZMiIJyMEwgHAZ5MRBskQFD05xGOnlF2WKL
EqIwE8GtFRcisjy1VVYp8ZylIWLrAy2xOlhrq6ODLPSA50vzsh05L4s63EH9
jEl6G4OYHgVVBxS/XsFEZlORrUb8YCEQ0PygqA1PMl2slnkISj/Y8QcDjZy1
lsbH2+UhWDYP0XlMHsJA48dxMTiLk4XSqY+PY1LfJNMIi3uwdZ3SOTBHq1gc
gKR0vc5qiHxlks2AanxIxqGDYwHOcQzEv++i6wf2Bphq8LA/JDswCQ27HQwi
E3AgJZgcQwcZD6PzZKHx8DEwG7qWZHuA4QF24BrMEgen1DVG3jueg4hFY8ZF
88agRNTQbExFMCkV0XlsKoJJqYhOimpAhducigCzEGyhoSJcOcAPyA4YDzDR
+2uaSakQE1HNTU1KryLrWmgMQ/+Bn7GuYoAkA3sSugp2nTagUhJPyi25iFWs
daCLKPVkJ4NyA54BG2NAsmmS+edSBYOpdgBXQFxAgkpGKaoOn6zxIUIDwgEh
LMJ5tSPfKTryqVNAfVPJWoA5Eau1KNvkU77BIRcYOEpdd8AQBRFwKA+tk3eP
RjgJo0qIsijdgkNeoVHqk3mmke+A/LlmQ+BYHeXdp0oagANyBE34Bn0wUZQc
mzLNGqU0dGIAyoya5LBAx2zgEwsJAc8DxoCdAPnA5GAeY7qO8mqY7SDzGJSG
SabaKik8GlCCbdUBOoKZ4aFhjFyE3oRDhSwGJQt1xAkYnwhkiPqZVwBjdcUQ
2x1YNKEPkUzoetiUtdLRF1gTu4KDAPyPmTxKSuHm+hSHgSGAxEGLKD7A4Rbm
1Aech4eIOkDamupRNGIwzoEeIR+tozVxl4rPQzdsKh4C9QivoGg42HOQ9KFL
SSMT7XaY6YB/sBbZQwXrUimMzm1Rh5bGOWiBe3oHvBiDDG+sKnNRtFfkv4Mv
AyIAIwKhgNct8q2wb2A2k+jhvhtrpKPtd3xiNp5LgytrWp6HNX8qFQ+R+CtU
kLSmKRWNfA+dKV9DRIGjBCTmFUU6qUFsmmqPgDTAfihuPjIMp45LGVbkKBW1
K8wduIs9gIWeuMgkWKZAagT0OZKGrngUJnIpj6t5//AZrLE1Ns3pwFbm+nBi
KPNixgozSuND8Ldw56RpJTc8HiPP2fhJTml5dA7rwN947J3v3u7CTXgT4A4p
SX5pKOUZKMsQxW8c4QVKNRz8fRgFx/Bw/yJJSaVwaZ+dTD0647sH4d47Pfa1
xhNVlqKaWAts4WfdHAzUIX7G9AT1YRZucYOHKd9giK/mx/2YeD4Em/xDPxvc
PUuD3+pc1e35YD4ZaDNrMFyMZ5OFOdWMiW0vFG1qjGdzW7Pm/39t19LjRhGE
7/yKUS5cFtRV/T5wqH4RhSCiJNccJvGENet4kScOEhL/na/Gu1GyQQgJkCWv
d6anu+v1dXs+V41Fs2AaSdKb2XrYNstB78h3P0zOxQ8XJYpL3jP1ruonHrl2
06oMH3KgGo3rLXQz9M44dW+03g+6sILm5CDioEKGgwtJfG3DOzFSJecMwU2q
mCpH35qRXMewmFqSYTXXraUSYmltbAxc6BnzH7FKyK7X2owJ6K1xzAUjc489
jG5SKJ4jRCdNSI81crGaB1epp5hKMqOWTr2UZoJzPrWaMI3CYgL7gv+oJAvl
5I5rVRCcyt4m6UoAZScsZK1yGbY0rnUI/LKOVBPUZ0hsQlNiY2ygRp0dumAI
EXNL3hqC4hsnN2pOkCNZiJI6keOefLEyNGmvNZwKMhyxcolKRwiUMThzFXSU
Y7HshrIWPQ2EhBtsoVvnq7HSWxL0VDFPD/3oS2gLmXsmbGMP1Yt4UhJOOUX/
JY/4F76/vt3/zCt9w44/IwKnT5nAt7uwGDKRorKBd9nqn7J8n/EJfx9gr64m
mu6JwukhU/jltfd84WeE4T8ebhNvow23MTcGmD2chELycGGbECGFlXfrtQVp
uQTbig0h2HtCdxv5i+C8kLkPDm6DbKyxqMkcVRM9wVM4ZROLZmK5wDxs8D4K
grF9/b+wmBTJP2D1UkWcJs+1e0Spg8MT1UGmar7W8IgpG2xmtoIBkjhqHXE5
eus0ejbjzgqlCkOBUFClLBwyVSAK5uBL8FYQhM5hVqmIdIjHTQYjemsPkCRn
/19zmIz4eyCp+G6yQSe2Z2putNbHGMZCxrzBWQ4GZgkOUZYQ3ZyGz6HVUDgB
RdudpIhnAkg1w/AVAKrxrndKwt0Dfqqr1UMzxQ4hAB017gDlDDj1IwXI+wmD
yVZRnJxxaG0K4AKGBMwAlISGMsCi2b0eaDKITCDMNxjNENGfdXTAAwPxFbms
HRnu2WI3Pjs1QeoO794ARqKJHCP81w9VN6YFKJUWvBGfJLNVGho4W3iY4aUC
Ln1yTWnRkiPMHxIroGY4GZCyRiwAgC/rIBGA32GBc4qfyWgaYTI2J8gAleWK
5hZGBsjGAYMNm7ECArZgR87GNBauET6hNK6CX4IFYaTS8ihwAthCLdRwDTc7
YAmqkiQ2IOwYBbYXBGrHclIxiRZ0IRiCoVsxNapCAKvwWSfJN3iOA9jaqIRx
IaxExiPkGmQKWLo0qVrgsaoLWKy72GFkUkq6u4FFbVRLo0V4plG6n4MHbkPj
nbGml6gaMegaK6jOwhm4gxg4UqesKqpQCqyDEEzOZPLSIasHsMOZKUE7+Ny8
pQqlcfu3pDIxvrN+ZJUneaOPpjwsu61q5Kolbi8lHJfdd4+Ot4/+uAwxbxuY
9VIEbsuLm4830+MFb2V/urm+Pfx+NdUZe8TlOBXd8R2PV9Pz87pOj2/P60EL
Mf90wHb0yS2uXNdbnC3L8Zf5HbY4P8y78w12YIf5tJ+e7s/rh3k+zVfT0/m8
Fayanp6Pu9eHebdcXX4ktKz47vBsPty+e70/4nU1vbzGbmmdnm0FU7XzH/dv
ruflMD3Xv6fdduzF++XtfJxeQIblMoUn+3fTCzSYd1vP63KaXv62LLphvH82
/XHBdafz/mZLiTttj26/L6B7qT33fmPAL4+qP23lPLHj+3CpBfXxYe6Xanl6
0fVy+PVjid3v9+8fn19/+9Wfvc/BN8b+AQA=

-->

</rfc>
