<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-07" category="std" consensus="true" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-07"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>Nexus Group</organization>
      <address>
        <email>martin.furuhed@nexusgroup.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="20"/>
    <abstract>
      <?line 149?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates with over 50%.  The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re-encoding for the signature to be verified. The document also specifies C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 153?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40 - 50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by e.g. encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null), byte strings (bstr), and text strings (tstr), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="I-D.ietf-lake-edhoc"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments. This document specifies a CBOR encoding based on <xref target="X.509-IoT"/>, which can support large parts of RFC 5280. The encoding supports all RFC 7925, IEEE 802.1AR, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates. The resulting certificates are called C509 Certificates. This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
        </li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document specifies COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>. The document also specifies a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This specification makes use of the terminology in <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the order of elements in arrays are always encoded in the same order as the elements or the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are listed below, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates:</t>
        <ul spacing="normal">
          <li>
            <t>version. The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Currently, the type can be a natively signed C509 certificate following X.509 v3 (c509CertificateType = 0) or a CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 1), see <xref target="type"/>.</t>
          </li>
          <li>
            <t>serialNumber. The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
          </li>
          <li>
            <t>signature. The 'signature' field is always the same as the 'signatureAlgorithm' field and therefore omitted from the CBOR encoding.</t>
          </li>
          <li>
            <t>issuer. In the general case, the sequence of 'RelativeDistinguishedName' is encoded as a CBOR array of CBOR arrays of Attributes. Typically, each RelativeDistinguishedName only contains a single attribute and the sequence is then encoded as a CBOR array of Attributes. Each Attribute is encoded as a (CBOR int, CBOR text string) pair or as a (unwrapped CBOR OID, CBOR bytes) pair. The absolute value of the CBOR int (see <xref target="fig-attrtype"/>) encodes the attribute type and the sign is used to represent the character string type; positive for Utf8String, negative for PrintableString. The Attribute Email Address is always an IA5String. In natively signed C509 certificates all text strings are UTF-8 encoded and all attributeType SHALL be non-negative. Text strings SHALL still adhere to any X.509 restrictions, i.e., serialNumber SHALL only contain the 74 character subset of ASCII allowed by PrintableString and countryName SHALL have length 2. The string types teletexString, universalString, and bmpString are not supported. If Name contains a single Attribute containing an utf8String encoded 'common name' it is encoded as follows:
            </t>
            <ul spacing="normal">
              <li>
                <t>If the text string contains only the symbols '0'–'9' or 'a'–'f', it is encoded as a CBOR byte string, prefixed with an initial byte set to '00'.</t>
              </li>
              <li>
                <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where 'H' is one of the symbols '0'–'9' or 'A'–'F' it is encoded as a CBOR byte string prefixed with an initial byte set to '01', for a total length of 9. An EUI-64 mapped from a 48-bit MAC address (i.e., of the form "HH-HH-HH-FF-FE-HH-HH-HH) is encoded as a CBOR byte string prefixed with an initial byte set to '01', for a total length of 7.</t>
              </li>
              <li>
                <t>Otherwise it is encoded as a CBOR text string.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>validity. The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as CBOR null.</t>
          </li>
          <li>
            <t>subject. The 'subject' is encoded exactly like issuer.</t>
          </li>
          <li>
            <t>subjectPublicKeyInfo.  The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string. In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
          </li>
          <li>
            <t>issuerUniqueID. Not supported.</t>
          </li>
          <li>
            <t>subjectUniqueID. Not supported.</t>
          </li>
          <li>
            <t>extensions. The 'extensions' field is encoded as a CBOR array where each extension is encoded as either a CBOR int (see <xref target="extype"/>) followed by an optional CBOR item of any type or an unwrapped CBOR OID tag <xref target="RFC9090"/> followed by a CBOR bool encoding 'critical' and the DER encoded value of the 'extnValue' encoded as a CBOR byte string. If the array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage), the array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int. Extensions are encoded as specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
          </li>
          <li>
            <t>signatureAlgorithm. The 'signatureAlgorithm' field including parameters is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          </li>
          <li>
            <t>signatureValue. In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes the BIT STRING has zero unused bits and the unused bits byte is omitted. For natively signed C509 certificates the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
          </li>
        </ul>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item MAY represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate).</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <artwork type="CDDL" align="center"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuer: Name,
   validityNotBefore: Time,
   validityNotAfter: Time,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensions: Extensions,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
)

CertificateSerialNumber = ~biguint

Name = [ * RelativeDistinguishedName ] / text / bytes

RelativeDistinguishedName = Attribute / [ 2* Attribute ]

Attribute = ( attributeType: int, attributeValue: text ) //
            ( attributeType: ~oid, attributeValue: bytes )

Time = ~time / null

AlgorithmIdentifier = int / ~oid / 
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = ( extensionID: int, extensionValue: any ) //
            ( extensionID: ~oid, ? critical: true, 
              extensionValue: bytes )
]]></artwork>
        </figure>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e. [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent is omitted and subjectPublicKey consist of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstraß form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER encoded certificate with a uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as the any leading 0x00 byte (to indicate that the number is not negative) are omitted. If the two INTEGER value fields have different lengths, the shorter INTEGER value field is padded with zeroes so that the two fields have the same length. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>This section details the encoding of the 'extensions' field. The 'extensions' field is encoded as a CBOR array where each extensionID is encoded either as a CBOR int or as an unwrapped CBOR OID tag. If 'extensionID' is encoded an int (see <xref target="extype"/>), the sign is used to encode if the extension is critical and the 'critical' field is omitted. Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign.</t>
        <t>The 'extnValue' OCTET STRING value field is encoded as the CBOR byte string 'extensionValue' except for the extensions specified below. For some extensions, only commonly used parts are supported by the CBOR encoding. If unsupported parts are used, the CBOR encoding cannot be used.</t>
        <t>CBOR encoding of the following extension values are fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="message-fields"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyUsage = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyConstraints = [ 
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]   
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/> or unwrapped CBOR OID tags <xref target="RFC9090"/> where each int or OID tag encodes a key usage purpose.  If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ oid, bytes ] is used to identify the pair ( hwType, hwSerialEntries ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumberm or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier / null,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid, 
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. Note that <xref target="RFC5280"/> requires that minimum MUST be zero, and maximum MUST be absent.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   GeneralSubtree = [ GeneralName ]
   NameConstraints = [ 
     permittedSubtrees: GeneralSubtree / null,
     excludedSubtrees: GeneralSubtree / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Attributes = ( attributeType: int, attributeValue: [+text] ) //
                ( attributeType: ~oid, attributeValue: [+bytes] )
   SubjectDirectoryAttributes = [+Attributes]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources (autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   AsIdsOrRanges = uint / [uint, uint]
   ASIdentifiers = [ + AsIdsOrRanges ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources v2 (autonomousSysIds-v2). Encoded exactly like autonomousSysIds.</t>
          </li>
          <li>
            <t>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI is not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress is set to ones. With the exception of the first  Address, if the byte string has the same length as the previous Address, the Address is encoded as an uint with the the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2^64 - 1 corresponding to the cbor integer max value.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   Address = bytes / uint, 
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange =  [Address, Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddrBlocks = [ AFI: uint, IPAddressChoice ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</t>
          </li>
          <li>
            <t>Signed Certificate Timestamp. If all the SCTs are version 1, and there are no SCT extensions, the extension value can be CBOR encoded. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as a CBOR int (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
          </li>
        </ul>
        <sourcecode type="CDDL"><![CDATA[
   SignedCerticateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCerticateTimestamp ]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature and keyAgreement asserted is encoded as the two CBOR ints 2, 17 (2^0 + 2^4 = 17).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 6 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 17, 8, [ 3, 6 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-parameters">
        <name>COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, and c5t, and c5u, defined in <xref target="iana-header"/> are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER encoded X.509 and uses a COSE_C509 structure instead of COSE_X509. c5u provides an alternative way to identify an untrusted certificate bag/chain by reference with a URI. The content is a COSE_C509 item served with the application/cose-c509 content format. The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="CDDL"><![CDATA[
COSE_C509 = C509Certificate / [ 2* C509Certificate ]
]]></sourcecode>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism MUST process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter MUST NOT cause the update of the set of trust anchors without some out-of-band confirmation.</t>
        <table anchor="iana-header">
          <name>COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">TBD1</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">TBD2</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">TBD3</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">TBD4</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing a ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate Signing Request</name>
      <t>The section defines the format of a C509 Certificate Signing Request (CSR), also known as a C509 Certificate Request, based on and compatible with RFC 2986 <xref target="RFC2986"/> reusing the formatting for C509 certificates defined in <xref target="certificate"/>. There are currently two c509CertificateRequestType values defined, c509CertificateRequestType = 0 requests a c509CertificateType = 0 and c509CertificateRequestType = 1 requests a c509CertificateType = 1. subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, e.g. as defined in <xref target="RFC6955"/>. In the latter case, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier distributed out-of-band. Both kinds are listed in the C509 Signature Algorithms Registry, see <xref target="sigalg"/>.</t>
      <t>Certificate request attributes, i.e. attributes for use with certificate requests providing additional information about the subject of the certificate, are defined in <xref section="5.4" sectionFormat="of" target="RFC2985"/>. The attribute extensionRequest is supported with a dedicated element. Other certificate request attributes are included using the same Extensions structure as in extensionsRequest, both extensions and attributes are listed in the C509 Extensions Registry, see <xref target="fig-extype"/>. The only other certificate request attribute specified in this document is challengePassword which is defined for utf8String values and encoded as CBOR text string, except if the text string contains only the symbols '0'–'9' or 'a'–'f', in which case it is encoded as a CBOR byte string.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateRequest.</name>
        <artwork type="CDDL" align="center"><![CDATA[
C509CertificateRequest = [
   TBSCertificateRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateRequest = (
   c509CertificateRequestType: int,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: any,
   extensionsRequest: Extensions,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
)

challengePassword: tstr / bstr
]]></artwork>
      </figure>
      <t>After verifying the subjectSignatureValue, the CA MAY transform the C509CertificateRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and code.</t>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certificate Signing Request (CSR)) format defined in Section 4 follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>.</t>
      <t>When a certificate request is received the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession of the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 1 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 0 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 CSR, the CA transforms it into a DER encoded RFC 2986 CertificationRequestInfo and use that with existing processes and code to produce an RFC 5280 DER encoded X.509 certificate. The DER encoded X509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where the handshake is sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over a constrained wireless links. The conversion to X.509 within an IoT device will incur a computational overhead, however, measured in energy this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in <xref target="fig-size-COSE"/> and <xref target="fig-size-TLS"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. For the example HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 use dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 0 and 1 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artwork align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       139 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1394 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3934 |
+---------------------------------------+-----------+-----------+
]]></artwork>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X509 and C509 are Certificate messages. X509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artwork align="center"><![CDATA[
+-------------------+-------+---------------+------+---------------+
|                   |  X509 | X509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+---------------+------+---------------+
| RFC 7925 Cert (1) |   327 |           324 |  151 |           167 |
+-------------------+-------+---------------+------+---------------+
| RPKI Cert (1)     | 20991 |          9134 | 8660 |          5668 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (2)   |  2204 |          1455 | 1414 |          1063 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Chain (4)   |  5190 |          3244 | 3958 |          2845 |
+-------------------+-------+---------------+------+---------------+
| HTTPS Bag (8)     | 11578 |          3979 | 8882 |          3519 |
+-------------------+-------+---------------+------+---------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR profiling of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this draft does not reveal any additional information compared to X.509. Because of difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "C509 Certificate". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate one that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1 byte encodings, other values in the interval [-256, 255] have a 2 byte encodings, and the remaining values in the interval [-65536, 65535] have 3 byte encodings.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "C509 Certificate". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Natively Signed C509 Certificate following X.509 v3       |
+-------+-----------------------------------------------------------+
|     1 | CBOR re-encoding of X.509 v3 Certificate                  |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="atttype">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an non-negative integer, and the other columns are text strings. For values in the interval [0, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:            Postal Address                           |
|       | Identifiers:     postalAddress                            |
|       | OID:             2.5.4.16                                 |
|       | DER:             06 03 55 04 10                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08 00      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is an positive integer, and the other columns are text strings. The registry also contains CSR attributes for use in Certificate Requests, see <xref target="CSR"/>. For values in the interval [1, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions and CSR Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestampList           |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     autonomousSysIds                         |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     autonomousSysIds-v2                      |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            Biometric Information                    |
|       | Identifiers:     biometricInfo                            |
|       | OID:             1.3.6.1.5.5.7.1.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 02            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    37 | Name:            Precertificate Signing Certificate       |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.4                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 04      |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    38 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    39 | Name:            Qualified Certificate Statements         |
|       | Identifiers:     id-pe-qcStatements                       |
|       | OID:             1.3.6.1.5.5.7.1.3                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 03            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    40 | Name:            S/MIME Capabilities                      |
|       | Identifiers:     smimeCapabilities                        |
|       | OID:             1.2.840.113549.1.9.15                    |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 0F         |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    41 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|    42 | Name:            Subject Information Access               |
|       | Identifiers:     id-pe-subjectInfoAccess                  |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:                                           |
+-------+-----------------------------------------------------------+
|   255 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        CSR Attribute                            |
|       | extensionValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -3 | Name:            otherName with BundleEID                 |
|       | Comments:        id-on-bundleEID                          |
|       |                  (1.3.6.1.5.5.7.8.11)                     |
|       |                  06 08 2B 06 01 05 05 07 08 0B            |
|       | Value:           eid-structure from RFC 9171              |
+-------+-----------------------------------------------------------+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleNamee                |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        SHA-256 with HMAC-SHA256                     |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    15 | Name:        SHA-384 with HMAC-SHA384                     |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    16 | Name:        SHA-512 with HMAC-SHA512                     |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient public static Diffie-Hellman key.  |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    42 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    43 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    44 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    45 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X509 Certificates (C509 Certificates)". The columns of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". T The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Point compressed subjectPublicKey            |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:        HSS / LMS                                    |
|       | Identifiers: id-alg-hss-lms-hashsig, id-alg-mts-hashsig   |
|       | OID:         1.2.840.113549.1.9.16.3.17                   |
|       | Parameters:  Absent                                       |
|       | DER:         30 0D 06 0B 2A 86 48 86 F7 0D 01 09 10 03 11 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:        XMSS                                         |
|       | Identifiers: id_alg_xmss                                  |
|       | OID:         0.4.0.127.0.15.1.1.13.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0D 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:        XMSS^MT                                      |
|       | Identifiers: id_alg_xmssmt                                |
|       | OID:         0.4.0.127.0.15.1.1.14.0                      |
|       | Parameters:  Absent                                       |
|       | DER:         30 0B 06 09 04 00 7F 00 0F 01 01 0E 00       |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
|    28 | Name:        EC Public Key (Weierstraß) with              |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Point compressed subjectPublicKey            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
        <section anchor="suitability-of-different-public-key-algorithms-for-use-within-iot-scenarios">
          <name>Suitability of different public key algorithms for use within IoT scenarios</name>
          <t>The public key algorithms registry <xref target="pkalg"/> specify a number of algorithms, not all which are suitable for usage with constrained devices. RSA requires large keys and large signature sizes compared to elliptic curve cryptography (ECC), which together with resource-efficient implementations of named elliptic curves (Montgomery, Edwards and Weierstraß curves), make them suitable candidates for IoT public key usage. These curves are represented by ids 1–11 and 24–28 in <xref target="pkalg"/>.</t>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading with this document as reference.</t>
      </section>
      <section anchor="media-type-applicationcose-c509">
        <name>Media Type application/cose-c509</name>
        <t>When the application/cose-c509 media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
        <t>IANA has registered the following media type <xref target="RFC6838"/>:</t>
        <t>Type name: application
Subtype name: cose-c509
Required parameters: N/A
Optional parameters: usage</t>
        <ul spacing="normal">
          <li>
            <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
          </li>
          <li>
            <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
          </li>
        </ul>
        <t>Encoding considerations: binary</t>
        <t>Security considerations: See the Security Considerations section of [[this document]].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [[this document]]</t>
        <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information:</t>
        <t>  Deprecated alias names for this type: N/A<br/>
  Magic number(s): N/A<br/>
  File extension(s): N/A<br/>
  Macintosh file type code(s): N/A</t>
        <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: N/A</t>
        <t>Author: COSE WG</t>
        <t>Change controller: IESG</t>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as as X509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).</t>
        <t>EDITOR'S NOTE: The TLS registrations should be discussed and approved by the TLS WG at a later stage. When COSE WG has adopted work on C509 certificates, it could perhaps be presented in the TLS WG. The TLS WG might e.g. want a separate draft in the TLS WG.</t>
        <artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
      </section>
      <section anchor="tags">
        <name>CBOR Tags Registry</name>
        <t>This document registers the following entries in the "CBOR Tags" registry under the "Concise Binary Object Representation (CBOR) Tags" heading.</t>
        <artwork><![CDATA[
+------+------------------------------------------------------------+
|  Tag | X.509 Public Key Algorithms                                |
+======+============================================================+
| TDB6 | Data Item: COSE_C509                                       |
|      | Semantics: An ordered chain of C509 certificates           |
|      | Reference: This document                                   |
+------+------------------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4108" target="https://www.rfc-editor.org/info/rfc4108" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4108.xml">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9052.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090" target="https://www.rfc-editor.org/info/rfc9090" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9090.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9360" target="https://www.rfc-editor.org/info/rfc9360" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9360.xml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2985" target="https://www.rfc-editor.org/info/rfc2985" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2985.xml">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC6487" target="https://www.rfc-editor.org/info/rfc6487" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6487.xml">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955" target="https://www.rfc-editor.org/info/rfc6955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6955.xml">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932" target="https://www.rfc-editor.org/info/rfc7932" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7932.xml">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603" target="https://www.rfc-editor.org/info/rfc8603" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879" target="https://www.rfc-editor.org/info/rfc8879" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8879.xml">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148" target="https://www.rfc-editor.org/info/rfc9148" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9148.xml">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190" target="https://www.rfc-editor.org/info/rfc9190" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9190.xml">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191" target="https://www.rfc-editor.org/info/rfc9191" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9191.xml">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" target="https://datatracker.ietf.org/doc/html/draft-ietf-lake-edhoc-22" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lake-edhoc.xml">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="25" month="August" year="2023"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-22"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-uta-tls13-iot-profile-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-uta-tls13-iot-profile.xml">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="14" month="September" year="2023"/>
            <abstract>
              <t>This document is a companion to RFC 7925 and defines TLS/DTLS 1.3 profiles for Internet of Things devices. It also updates RFC 7925 with regards to the X.509 certificate profile.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-07"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-ctls-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-ctls.xml">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Google</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>This document specifies a "compact" version of TLS 1.3 and DTLS 1.3. It saves bandwidth by trimming obsolete material, tighter encoding, a template-based specialization technique, and alternative cryptographic techniques. cTLS is not directly interoperable with TLS 1.3 or DTLS 1.3 since the over-the-wire framing is different. A single server can, however, offer cTLS alongside TLS or DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-08"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.7.6"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 2.3"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/esim/wp-content/uploads/2021/02/SGP.14-v2.1.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.1</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2021" month="February"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="http://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1772?>

<section anchor="appA">
      <name>Example C509 Certificates</name>
      <section anchor="example-rfc-7925-profiled-x509-certificate">
        <name>Example RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage: 
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86 
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20 
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30 
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06 
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37 
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86 
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e 
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8 
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51 
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30 
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d 
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55 
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1 
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16 
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  1,                   / version and certificate type /
  h'01f50d',           / serialNumber /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  h'010123456789AB',   / subject, EUI-64 / 
  1,                   / subjectPublicKeyAlgorithm /
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',  
  1,                   / single extension:
                         non-critical keyUsage 
                         digitalSignature /
  0,                   / signatureAlgorithm /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 139 bytes. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <artwork><![CDATA[
01 
43 01 F5 0D 
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00 
1A 69 55 B9 00 
47 01 01 23 45 67 89 AB 
01 
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB 
01 
00 
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD 
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE 
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16  
]]></artwork>
        </section>
        <section anchor="example-natively-signed-c509-certificate">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>The corresponding natively signed C509 certificate in CBOR diagnostic format is identical, except for c509CertificateType, encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  0,
  h'01f50d',
  "RFC test CA",
  1672531200,
  1767225600,
  h'010123456789AB',
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',  
  1,
  0,
  h'6FC903015259A38C0800A3D0B2969CA21977E8ED6EC344964D
    4E1C6B37C8FB541274C3BB81B2F53073C5F101A5AC2A928865
    83B6A2679B6E682D2A26945ED0B2'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 139 bytes.</t>
          <artwork><![CDATA[
00 
43 01 F5 0D 
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00 
1A 69 55 B9 00 
47 01 01 23 45 67 89 AB 
01 
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB 
01 
00 
58 40 6F C9 03 01 52 59 A3 8C 08 00 A3 D0 B2 96 9C A2 19 77 E8 ED 6E 
C3 44 96 4D 4E 1C 6B 37 C8 FB 54 12 74 C3 BB 81 B2 F5 30 73 C5 F1 01 
A5 AC 2A 92 88 65 83 B6 A2 67 9B 6E 68 2D 2A 26 94 5E D0 B2
]]></artwork>
        </section>
        <section anchor="c509-for-diffie-hellman-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate the common key usage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example IEEE 802.1AR profiled X.509 Certificate</name>
        <t>EDITOR'S NOTE: Need good example, or remove section</t>
        <t>One example of an IEEE 802.1AR profiled X.509 certificate (IDevID) is provided in <xref target="RFC9148"/>. The DER encoding is given in the second example in Appendix A.2, and the plain text is in the second example of Appendix C.2. The X509v3 Subject Alternative Name is of type OtherName (see <xref target="RFC5280"/>), with type-id = id-on-hardwareModuleName (see <xref target="RFC4108"/>) consisting of hardware type OID and hardware serial number of the device, in that example being 1.3.6.1.4.1.6715.1.10 and 01020304, respectively.</t>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example C509 Certificate Encoding</name>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'047FA1E31928EE403BA0B83A395673FC',
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'03963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
0,
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

1,
h'A6A55C870E39B40E',
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
23,
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and helping with GitHub.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
