<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-15" category="std" consensus="true" submissionType="IETF" updates="6698" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-15"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>RISE AB</organization>
      <address>
        <email>shahid.raza@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>IN Groupe</organization>
      <address>
        <email>martin.furuhed@ingroupe.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="18"/>
    <abstract>
      <?line 175?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA 1.0, RPKI, GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles. C509 is deployed in different settings including, in-vehicle and vehicle-to-cloud communication, Unmanned Aircraft Systems (UAS), and Global Navigation Satellite System (GNSS). When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates by over 50% while also significantly reducing memory and code size compared to ASN.1. The CBOR encoded structure can alternatively be signed directly ("natively signed"), which does not require re-encoding for the signature to be verified. The TLSA selectors registry defined in RFC 6698 is extended to include C509 certificates. The document also specifies C509 Certificate Requests, C509 COSE headers, a C509 TLS certificate type, and a C509 file format.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 179?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40–50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly, which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc. The use of CBOR also reduces code complexity, code size, memory usage, and CPU usage.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by, e.g., encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null, undefined), byte strings (bytes), and text strings (text), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA 1.0 <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="RFC9528"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments.</t>
      <t>This document specifies a CBOR encoding of X.509 certificates based on <xref target="X.509-IoT"/>. The resulting certificates are called C509 Certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CAB Baseline <xref target="CAB-TLS"/>,  <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates, and is designed to render a compact encoding of certificates used in constrained environments. C509 is deployed in, e.g., in-vehicle and vehicle-to-cloud communication, Unmanned Aircraft Systems (UAS), and Global Navigation Satellite System (GNSS). When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates by over 50% while also significantly reducing memory and code size compared to ASN.1. C509 is not a general CBOR ecoding for Abstract Syntax Notation One (ASN.1) data structures.</t>
      <t>C509 is designed to be extensible to additional features of X.509, for example support for new algorithms, including new post-quantum algorithms, which can be registered in the IANA registry as they become specified, see <xref target="sigalg"/>.</t>
      <t>This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in the first variant. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
        </li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document also specifies C509 Certificate Requests, see <xref target="CSR"/>; COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>; a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>; and a C509 file format. The TLSA selectors registry is extended to include C509 certificates, thus this document updates <xref target="RFC6698"/>.</t>
    </section>
    <section anchor="notation">
      <name>Notational Conventions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This specification makes use of the terminology in <xref target="RFC2986"/>, <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers or complemented with CBOR OID encoding <xref target="RFC9090"/>, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the elements in arrays are always encoded in the same order as elements of the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are described in this section, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item <bcp14>MAY</bcp14> represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate). Examples are given in the appendices, e.g., <xref target="rfc7925-prof"/>.</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
   issuer: Name / null,
   validityNotBefore: ~time,
   validityNotAfter: ~time / null,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   extensions: Extensions,
)

CertificateSerialNumber = ~biguint

Name = [ * Attribute ] / SpecialText

Attribute = (( attributeType: int, attributeValue: SpecialText ) //
             ( attributeType: ~oid, attributeValue: bytes ))

AlgorithmIdentifier = int / ~oid /
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = (( extensionID: int, extensionValue: Defined ) //
             ( extensionID: ~oid, ? critical: true,
              extensionValue: bytes ))

SpecialText = text / bytes / tag

Defined = any .ne undefined

tag = #6
]]></sourcecode>
        </figure>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates as detailed in the following subsections.</t>
        <section anchor="version">
          <name>version</name>
          <t>The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Two types are defined in this document: natively signed C509 certificates, following X.509 v3 (c509CertificateType = 2); and CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 3), see <xref target="type"/>. The number of elements in TBSCertificate is fixed and determined by the type. Additional types may be added in the future.</t>
        </section>
        <section anchor="serialnumber">
          <name>serialNumber</name>
          <t>The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
        </section>
        <section anchor="signature">
          <name>signature</name>
          <t>The 'signature' field, containing the signature algorithm including parameters, is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
        </section>
        <section anchor="issuer">
          <name>issuer</name>
          <t>In the general case, the sequence of 'Attribute' is encoded as a CBOR array consisting of Attribute elements. RelativeDistinguishedName with more than one AttributeTypeAndValue is not supported. Each Attribute is CBOR encoded as (type, value) either as a (int, SpecialText) pair, or a (~oid, bytes) tuple.</t>
          <t>In the former case, the absolute value of the int encodes the attribute type (see <xref target="fig-attrtype"/>) and the sign is used to represent the character string type in the X.509 certificate; positive for utf8String, negative for printableString. Attribute values which are always of type IA5String are unambiguously represented using a non-negative int. Examples include emailAddress and domainComponent (see <xref target="RFC5280"/>). In CBOR, all text strings are UTF-8 encoded and in natively signed C509 certificates all CBOR ints <bcp14>SHALL</bcp14> be non-negative. Text strings <bcp14>SHALL</bcp14> still adhere to any X.509 restrictions, i.e., serialNumber <bcp14>SHALL</bcp14> only contain the 74-character subset of ASCII allowed by printableString and countryName <bcp14>SHALL</bcp14> have length 2. CBOR encoding is allowed for IA5String (if this is the only allowed type, e.g., emailAddress), printableString and utf8String, whereas the string types teletexString, universalString, and bmpString are not supported.</t>
          <t>The text strings are further optimized as follows:</t>
          <ul spacing="normal">
            <li>
              <t>If the text string has an even length <contact fullname="≥"/> 2 and contains only the symbols '0'–'9' or 'a'–'f', it is encoded as a CBOR byte string.</t>
            </li>
            <li>
              <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where each 'H' is one of the symbols '0'-'9' or 'A'-'F', it is encoded as a CBOR tagged MAC address using the CBOR tag 48, see <xref section="2.4" sectionFormat="of" target="RFC9542"/>. If of the form "HH-HH-HH-FF-FE-HH-HH-HH", it is encoded as a 48-bit MAC address, otherwise as a 64-bit MAC address. See example in <xref target="rfc7925-prof"/>.</t>
            </li>
            <li>
              <t>Otherwise it is encoded as a CBOR text string.</t>
            </li>
          </ul>
          <t>The final encoding of the extension value may therefore be text, bytes, or tag, i.e., SpecialText. If Name contains a single 'common name' attribute with attributeType = +1, it is for compactness encoded as just the SpecialText containing the single attribute value.</t>
          <t>In natively signed C509 certificates, bytes and tag 48 do not correspond to any predefined text string encoding and may also be used for other attribute types.</t>
          <t>If the 'issuer' field is identical to the 'subject' field, e.g., in case of self-signed certificates, then the 'issuer' field <bcp14>MUST</bcp14> be encoded as the CBOR simple value null (0xf6).</t>
        </section>
        <section anchor="validity">
          <name>validity</name>
          <t>The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as the CBOR simple value null.</t>
        </section>
        <section anchor="subject">
          <name>subject</name>
          <t>The 'subject' field is encoded exactly like issuer, except that the CBOR simple value is not a valid value.</t>
        </section>
        <section anchor="subjectpublickeyinfo">
          <name>subjectPublicKeyInfo</name>
          <t>The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          <t>In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string, but may be encoded as a CBOR item of any type except undefined (see <xref target="CRT"/>). This specification assumes the BIT STRING has zero unused bits, and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
        </section>
        <section anchor="issueruniqueid">
          <name>issuerUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="subjectuniqueid">
          <name>subjectUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="ext-field">
          <name>extensions</name>
          <t>The 'extensions' field is encoded either as a CBOR array or as a CBOR int. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
          <t>Each 'extensionID' in the CBOR array is encoded either as a CBOR int (see <xref target="extype"/>) or as an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          <ul spacing="normal">
            <li>
              <t>If 'extensionID' is encoded as a CBOR int, it is followed by a CBOR item of any type except undefined (see <xref target="CRT"/>), and the sign of the int is used to encode if the extension is critical: Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign. If the CBOR array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage, see <xref target="ext-encoding"/>), the CBOR array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int.</t>
            </li>
            <li>
              <t>If extensionID is encoded as an unwrapped CBOR OID tag, then it is followed by an optional CBOR simple value true (0xf5) 'critical', and the DER-encoded value of the extnValue. The presence of the CBOR true value in the array indicates that the extension is critical; its absence means that the extension is non-critical (see <xref target="fig-CBORCertCDDL"/>). The extnValue OCTET STRING value field is encoded as the CBOR byte string 'extensionValue'.</t>
            </li>
          </ul>
          <t>The processing of critical and non-critical extensions is specified in <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
          <t>The currently defined extension values for which there is CBOR int encoded 'extensionID' are specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment.</t>
          <t>More details about extensions in <xref target="ext-encoding"/>.</t>
        </section>
        <section anchor="signaturealgorithm">
          <name>signatureAlgorithm</name>
          <t>The 'signatureAlgorithm' field is always the same as the 'signature' field and therefore omitted from the CBOR encoding.</t>
        </section>
        <section anchor="signaturevalue">
          <name>signatureValue</name>
          <t>In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes that the BIT STRING has zero unused bits, and the unused bits byte is omitted. For natively signed C509 certificates, the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
        </section>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted, and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e., [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent are omitted and subjectPublicKey consists of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstraß form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER encoded certificate with an uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, the octets 0xfe and 0xfd are used instead of 0x02 and 0x03 in the CBOR encoding to represent even and odd y-coordinate, respectively.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as any leading 0x00 byte (to indicate that the number is not negative) are omitted. Each of the two INTEGER value fields are then padded with leading zeroes to the same fixed length, given by the number of bytes needed to represent the order n of the cyclic subgroup used with the algorithm. For example, for P-256, the number of bytes for each integer is 32. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>The 'extensions' field is encoded as specified in <xref target="ext-field"/> with further details provided in this section.</t>
        <t>For some extensions, the CBOR int encoded extensionID is only supported for commonly used values of the extension. In case of extension values for which the CBOR int encoded extensionID is not supported, the extension <bcp14>MUST</bcp14> be encoded using the unwrapped CBOR OID tag encoded extensionID.</t>
        <t>A note on extensionID naming: in existing OID databases, most IDs can be found in versions with and without an 'id-pe' or 'id-ce' prefix. We have excluded the prefix for the commonly used extensions defined in <xref target="RFC5280"/> and included them for extensions defined elsewhere.</t>
        <t>CBOR encoding of the following extension values is fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). In natively signed certificates, KeyIdentifier <bcp14>SHOULD</bcp14> be composed of the leftmost 160-bits of the SHA-256 hash of the CBOR encoded subjectPublicKey. Other methods of generating unique numbers can be used. The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="ext-field"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyUsage = uint
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyConstraints = [
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>), or unwrapped CBOR OID tags <xref target="RFC9090"/>, where each int or OID encodes a key usage purpose. If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ ~oid, bytes ] is used to contain the pair ( hwType, hwSerialNum ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumber or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid,
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contain general names registered in <xref target="GN"/> the extension value can be CBOR encoded. C509 uses the same additions and restrictions as defined in <xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>. Note that the minimum and maximum fields are not used and therefore omitted. For IPv4 addresses, the iPAddress field <bcp14>MUST</bcp14> contain five octets and for IPv6 addresses, the field <bcp14>MUST</bcp14> contain 17 octets, where the last octet indicates the number of bits in the netmask. As an example, the address block 192.0.2.0/24 is encoded as C0 00 02 00 18 instead of C0 00 02 00 FF FF FF 00 as in the DER encoding.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralSubtrees = [ + GeneralName ]
   NameConstraints = [
     permittedSubtrees: GeneralSubtrees / null,
     excludedSubtrees: GeneralSubtrees / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
      Attributes = (( attributeType: int,
                      attributeValue: [+ SpecialText] ) //
                    ( attributeType: ~oid, attributeValue: [+ bytes] ))
      SubjectDirectoryAttributes = [+Attributes]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources (id-pe-autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   ASIdOrRange = uint / [min:uint, max:uint]
   ASIdentifiers = [ + ASIdOrRange ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources v2 (id-pe-autonomousSysIds-v2). Encoded exactly like autonomousSysIds.</t>
          </li>
          <li>
            <t>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI are not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress are set to one. With the exception of the first Address, if the byte string has the same length as the previous Address, the Address is encoded as a uint with the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2<sup>64</sup> - 1 corresponding to the CBOR integer max value.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   Address = bytes
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange = [min: Address, max: Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddressFamily = (AFI: uint, IPAddressChoice)
   IPAddrBlocks = [ + IPAddressFamily ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</t>
          </li>
          <li>
            <t>Signed Certificate Timestamp (Certificate Transparency). If all the SCTs are version v1 <xref target="RFC6962"/>, and there are no SCT extensions, the extension value can be CBOR encoded. Other versions of SCT are out of scope for this document. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as a CBOR uint (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   SignedCertificateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCertificateTimestamp ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>OCSP No Check (id-pkix-ocsp-nocheck). If the extension value is NULL, it can be CBOR encoded. The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>Precertificate Signing Certificate. The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>TLS Features (id-pe-tlsfeature). The extensionValue is encoded as an array of integers, where each integer represents a TLS extension.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   TLSFeatures = [* feature: uint]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature (0), nonRepudiation (1), keyEncipherment (2) and keyAgreement (4) asserted is encoded as the two CBOR ints 2, 23 (2<sup>0</sup> + 2<sup>1</sup> + 2<sup>2</sup> + 2<sup>4</sup> = 23).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 9 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 23, 8, [ 3, 9 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-params">
        <name>COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, c5t, and c5u, defined in <xref target="iana-header"/> below, are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER encoded X.509 and use a COSE_C509 structure instead of COSE_X509.</t>
        <t>The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
COSE_C509 = C509CertData / [ 2* C509CertData ]
C509CertData = bytes .cborseq C509Certificate
]]></sourcecode>
        <t>C509CertData thus includes the unwrapped CBOR sequence, ~C509Certificate. The byte string encoding includes the length of each certificate which simplifies parsing. See <xref target="other-examples"/> for an example.</t>
        <t>The COSE_C509 item has media type application/cose-c509-cert, see <xref target="c509-cert"/>. Different  CoAP Content-Formats are defined depending on "usage" = "chain" or not, see <xref target="content-format"/>.  Stored file formats are defined for the cases with/without ("usage" = "chain") with "magic numbers" TBD8/TBD6 using the reserved CBOR tag 55799 and the corresponding Content-Formats TBD15/TBD3, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <t>The value type of c5t is the COSE_CertHash structure defined in <xref target="RFC9360"/>, which contains the hash value of the C509 certificate calculated over ~C509Certificate. Thus C509CertData contains all data necessary to calculate the thumbprint c5t.</t>
        <t>c5u provides an alternative way to identify an untrusted certificate chain by reference with a URI <xref target="RFC3986"/>, encoded as a CBOR text string (media type application/cbor and CoAP Content-Format 60). The referenced resource is a COSE_C509 item served with the application/cose-c509-cert media type ("usage" = "chain"), as described above.</t>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism <bcp14>MUST</bcp14> process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter <bcp14>MUST NOT</bcp14> cause the update of the set of trust anchors without appropriate authorization.</t>
        <table anchor="iana-header">
          <name>COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">24</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">25</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">22</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a ~C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">23</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing an ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
      <section anchor="private-key-structures">
        <name>Private Key Structures</name>
        <t>Certificate management also makes use of data structures including private keys, see, e.g., <xref target="RFC7468"/>. This section defines the following CBOR encoded structures:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PrivateKey = [
   C509PrivateKeyType: int,
   subjectPrivateKeyAlgorithm: AlgorithmIdentifier,
   subjectPrivateKey: any,
]
]]></sourcecode>
        <t>The field 'C509PrivateKeyType' indicates the type of the C509 private key. Different types of C509 Private Key Structures can be defined, see <xref target="privkeys"/>. Currently, two types are defined. When C509PrivateKeyType = 0, the subjectPrivateKey is the CBOR byte string encoding of the PrivateKey OCTET STRING value field defined in <xref target="RFC5958"/>. When C509PrivateKeyType = 1, the subjectPrivateKey is a COSE_KEY structure containing a private key as defined in <xref target="RFC9052"/>. Note that COSE_KEY might not be possible to use with all algorithms that have a C509 AlgorithmIdentifier defined.</t>
        <t>The C509PrivateKey item is served with the application/cose-c509-privkey media type, see <xref target="c509-privkey"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD12 using of the reserved CBOR tag 55799 and the Content-Format TBD10, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PEM = [
   C509PrivateKey,
   COSE_C509 / null,
]
]]></sourcecode>
        <t>The C509PEM item is served with the application/cose-c509-pem media type, see <xref target="c509-pem"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD13 using of the reserved CBOR tag 55799 and the Content-Format TBD11, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
      <section anchor="deterministic-encoding">
        <name>Deterministic Encoding</name>
        <t>In some use cases it is desirable to be able to specify a unique C509 representation of a given X.509 certificate.</t>
        <t>While this specification requires the use of Deterministically Encoded CBOR (see <xref target="notation"/>), it is still possible to represent certain X.509 certificate fields in different ways. This is a consequence of the extensibility of the C509 format where new encodings can be defined, for example to optimize extensions for which no special CBOR encoding have been previously defined.</t>
        <t>Where there is support for a specific and a generic CBOR encoding, the specific CBOR encoding <bcp14>MUST</bcp14> be used. For example, when there is support for specific CBOR encoding of an extension, as specified in <xref target="ext-encoding"/> and the C509 Extensions Registry, it <bcp14>MUST</bcp14> be used. In particular, when there is support for a specific otherName encoding (negative integer value in C509 General Names Registry) it <bcp14>MUST</bcp14> be used.</t>
        <t>Native C509 certificates <bcp14>MUST</bcp14> only use specific CBOR encoded fields. However, when decoding a non-native C509 certificates, the decoder may need to support, for example, (extensionID:~oid, ? critical: true, extensionValue:bytes)-encoding of an extension for which there is an (extensionID:int, extensionValue:Defined)-encoding. One reason is that the certificate was issued before the specific CBOR extension was registered.</t>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate (Signing) Request</name>
      <t>This section defines the format of a C509 Certificate Request, also known as a C509 Certificate Signing Request (CSR), based on and compatible with RFC 2986 <xref target="RFC2986"/>, and reusing the formatting of C509 certificates defined in <xref target="certificate"/>.</t>
      <t>The CDDL for the C509 Certificate Request is shown in <xref target="fig-C509CSRCDDL"/>. The fields have the same encoding as the corresponding fields of the C509 Certificate, see <xref target="message-fields"/>.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateRequest.</name>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificateRequest = [
   TBSCertificateRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateRequest = (
   c509CertificateRequestType: int,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   extensionsRequest: Extensions,
)

]]></sourcecode>
      </figure>
      <t>After verifying the subjectSignatureValue, the CA <bcp14>MAY</bcp14> transform the C509CertificateRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and code.</t>
      <t>The media type of C509CertificateRequest is application/cose-c509-pkcs10, see <xref target="c509-pkcs10"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD9 is defined using the reserved CBOR tag 55799 and the Content-Format TBD4, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      <section anchor="certificate-request-types">
        <name>Certificate Request Types</name>
        <t>Different types of C509 Certificate Requests are defined, see <xref target="csr-type"/>, all using the same CBOR encoding and differing only in what is being signed and what type of C509 certificate is being requested:</t>
        <ul spacing="normal">
          <li>
            <t>The C509 Certificate Request can either be an invertible CBOR re-encoding of a DER encoded RFC 2986 certification request, or it can be natively signed where the signature is calculated over the CBOR encoding instead of the DER encoding.</t>
          </li>
          <li>
            <t>The requested C509 certificate in the C509 Certificate Request can either be of type 2 or of type 3, see <xref target="type"/>.</t>
          </li>
        </ul>
        <t>Combining these options enables the four instances of c509CertificateRequestType defined in <xref target="csr-type"/> and illustrated in <xref target="fig-csr-types2"/>.</t>
        <figure anchor="fig-csr-types2">
          <name>C509 Certificate Request Types 0, 1, 2 and 3.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="544" viewBox="0 0 544 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                <path d="M 216,32 L 216,192" fill="none" stroke="black"/>
                <path d="M 376,72 L 376,192" fill="none" stroke="black"/>
                <path d="M 536,32 L 536,192" fill="none" stroke="black"/>
                <path d="M 8,32 L 536,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 536,64" fill="none" stroke="black"/>
                <path d="M 8,126 L 536,126" fill="none" stroke="black"/>
                <path d="M 8,130 L 536,130" fill="none" stroke="black"/>
                <path d="M 8,160 L 536,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 536,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="348" y="52">Signed</text>
                  <text x="404" y="52">object</text>
                  <text x="244" y="84">CBOR</text>
                  <text x="296" y="84">encoded</text>
                  <text x="348" y="84">C509</text>
                  <text x="400" y="84">DER</text>
                  <text x="448" y="84">encoded</text>
                  <text x="500" y="84">C509</text>
                  <text x="296" y="100">Certificate</text>
                  <text x="456" y="100">Certificate</text>
                  <text x="56" y="116">Requested</text>
                  <text x="144" y="116">certificate</text>
                  <text x="296" y="116">Request</text>
                  <text x="456" y="116">Request</text>
                  <text x="96" y="148">c509CertificateType</text>
                  <text x="184" y="148">=</text>
                  <text x="200" y="148">2</text>
                  <text x="296" y="148">0</text>
                  <text x="472" y="148">1</text>
                  <text x="96" y="180">c509CertificateType</text>
                  <text x="184" y="180">=</text>
                  <text x="200" y="180">3</text>
                  <text x="296" y="180">2</text>
                  <text x="472" y="180">3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------------------------+---------------------------------------+
|                         |             Signed object             |
+-------------------------+---------------------------------------+
|                         | CBOR encoded C509 | DER encoded C509  |
|                         |    Certificate    |    Certificate    |
| Requested certificate   |      Request      |      Request      |
+=========================+===================+===================+
| c509CertificateType = 2 |         0         |           1       |
+-------------------------+-------------------+-------------------+
| c509CertificateType = 3 |         2         |           3       |
+-------------------------+-------------------+-------------------+
]]></artwork>
          </artset>
        </figure>
        <t>An implementation <bcp14>MAY</bcp14> only support c509CertificateRequestType = 0. The most common variants are expected to be:</t>
        <ul spacing="normal">
          <li>
            <t>c509CertificateRequestType = 0. This type indicates that the C509 Certificate Request is natively signed, and that the requested certificate format has c509CertificateType = 2. This encoding removes the need for ASN.1 and DER parsing and re-encoding in the requesting party.</t>
          </li>
          <li>
            <t>c509CertificateRequestType = 3. This type indicates that the C509 Certificate Request is CBOR re-encoded RFC 2986 certification requests, and that the requested certificate format has c509CertificateType = 3. This encoding is backwards compatible with legacy RFC 2986 certification requests and X.509 certificates, but enables a reduced transport overhead.</t>
          </li>
        </ul>
      </section>
      <section anchor="subject-signature-algorithm">
        <name>Subject Signature Algorithm</name>
        <t>subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, e.g., as defined in <xref target="RFC6955"/>. In the case of <xref target="RFC6955"/>, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier distributed out-of-band. Both signature algorithms and non-signature proof-of-possession algorithms are listed in the C509 Signature Algorithms Registry, see <xref target="sigalg"/>. The non-signature roof-of-possession algorithms with SHA-2 and HMAC-SHA2 (see values 14-16 in <xref target="sigalg"/>) requires a signature value with syntax DhSigStatic defined as follows:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
DhSigStatic = MessageDigest / DhSigStaticType

MessageDigest = bytes

DhSigStaticType = [
  issuer: Name,
  serialNumber: CertificateSerialNumber
  hashValue: MessageDigest
]
]]></sourcecode>
        <t>Note that a key agreement key pair may be used with a signature algorithm in a certificate request, see <xref target="app-DH-keys"/>.</t>
      </section>
      <section anchor="certificate-request-attributes">
        <name>Certificate Request Attributes</name>
        <t><xref section="5.4" sectionFormat="of" target="RFC2985"/> specifies two attribute types that may be included in the certificate request: extension request and challenge password.</t>
        <section anchor="extensions-request">
          <name>Extensions Request</name>
          <t>The extensionRequest field is used to carry information about certificate extensions the entity requesting certification wishes to be included in the certificate, encoded as Extensions in <xref target="message-fields"/>. An empty CBOR array indicates no extensions.</t>
        </section>
        <section anchor="challenge-password">
          <name>Challenge Password</name>
          <t>Other certificate request attributes are included using the Extensions structure and the extensionRequest field. The only other certificate request attribute specified in this document is challengePassword, listed in the C509 Extensions Registry, see <xref target="fig-extype"/>. The extensionValue is encoded as follows:</t>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
challengePassword = SpecialText
]]></sourcecode>
          <t>In natively signed requests (types 0 and 2), a positive extensionID is used. In CBOR re-encoding of a DER encoded request (types 1 and 3), the sign of extensionID of challengePassword indicates the string type in the DER encoded challengePassword (instead of the criticalness in extensions): positive for utf8String and negative for printableString. The same text string encoding optimizations applies as in <xref target="issuer"/>.</t>
        </section>
      </section>
      <section anchor="CRT">
        <name>Certificate Request Template</name>
        <t>Enrollment over Secure Transport (EST, <xref target="RFC7030"/>) defines, and <xref target="I-D.ietf-lamps-rfc7030-csrattrs"/> clarifies, how an EST server can specify what it expects the EST client to include in a subsequent Certificate Signing Request (CSR). Alternatively to the unstructured mechanism specified in <xref target="RFC7030"/>, <xref section="B" sectionFormat="of" target="RFC8295"/> describes an approach using a Certificate Request Template in response to a GET /csrattrs request by the EST client. The EST server thus returns an Certificate Request-like object with various fields filled out, and other fields waiting to be filled in and a signature to be added by the EST client.</t>
        <t>For C509 we follow the approach of <xref target="RFC8295"/>. The C509CertificateRequestTemplate is based on TBSCertificatdsveRequest of the C509CertificateRequest, see <xref target="fig-C509CSRCDDL"/>, but excludes the subjectSignatureValue field from the template since that needs no further specification.</t>
        <t>The C509 Certificate Request Template is shown in <xref target="fig-C509CSRTemplateCDDL"/>.</t>
        <figure anchor="fig-C509CSRTemplateCDDL">
          <name>CDDL for C509CertificateRequestTemplate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificateRequestTemplate = [
   c509CertificateRequestTemplateType: int,
   c509CertificateRequestType: [+ int] / undefined,
   subjectSignatureAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subject: NameTemplate,
   subjectPublicKeyAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subjectPublicKey: undefined
   extensionsRequest: ExtensionsTemplate,
]

NameTemplate = [ * AttributeTemplate ] / SpecialText

AttributeTemplate = (( attributeType: int,
                       attributeValue: SpecialText / undefined ) //
                     ( attributeType: ~oid,
                       attributeValue: bytes / undefined ))

ExtensionsTemplate = [ * ExtensionTemplate ] / int

ExtensionTemplate = (( extensionID: int, extensionValue: any ) //
                     ( extensionID: ~oid, ? critical: true,
                       extensionValue: bytes / undefined ))
]]></sourcecode>
        </figure>
        <t>Except as specified in this section, the fields have the same encoding as the corresponding fields of the TBSCertificateRequest, see <xref target="fig-C509CSRCDDL"/>. The specification of the template makes use of the CBOR simple value undefined (0xf7) to indicate fields to fill in. Consistent with this rule, note that the subjectPublicKey field always has the value undefined in the template.</t>
        <t>Different types of Certificate Request Templates can be defined (see <xref target="temp-type"/>), distinguished by the c509CertificateRequestTemplateType integer. Each type may have its own CDDL structure.</t>
        <t>The presence of a Defined (non-undefined) value in a C509CertificateRequestTemplate indicates that the EST server expects the EST client to use that value in the certificate request. If multiple AlgorithmIdentifier or c509CertificateRequestType values are present, the EST server expects the EST client to select one of them for use in the Certificate Request. The presence of an undefined value indicates that the EST client is expected to provide an appropriate value for that field. For example, if the EST server includes a subjectAltName with a partially filled extensionValue, such as iPAddress with an empty byte string, this means that the client <bcp14>SHOULD</bcp14> fill in the corresponding GeneralName value.</t>
        <t>The media type of C509CertificateRequestTemplate is application/cose-c509-crtemplate, see <xref target="c509-crtemplate"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD18 is defined using the reserved CBOR tag 55799 and the Content-Format TBD19, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certificate Request format defined in <xref target="CSR"/> follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>. The CA can make use of a Certificate Request Template defined in <xref target="CRT"/>, for simplified configuration.</t>
      <t>When a certificate request is received, the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession corresponding to the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 3 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 2 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with the CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 CSR, the CA transforms it into a DER encoded RFC 2986 CertificationRequestInfo and uses that with existing processes and code to produce an RFC 5280 DER encoded X.509 certificate. The DER encoded X.509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where certificates are sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway, which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over constrained wireless links. The conversion to X.509 within a constrained IoT device will incur a computational overhead. However, measured in energy, this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in Figures <xref target="fig-size-COSE" format="counter"/> and <xref target="fig-size-TLS" format="counter"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. In the examples with HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 uses dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 2 and 3 have the same size. For Brotli <xref target="RFC7932"/>, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="528" viewBox="0 0 528 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
              <path d="M 328,32 L 328,160" fill="none" stroke="black"/>
              <path d="M 424,32 L 424,160" fill="none" stroke="black"/>
              <path d="M 520,32 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,32 L 520,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 520,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 520,160" fill="none" stroke="black"/>
              <g class="text">
                <text x="376" y="52">COSE_X509</text>
                <text x="472" y="52">COSE_C509</text>
                <text x="32" y="84">RFC</text>
                <text x="68" y="84">7925</text>
                <text x="124" y="84">profiled</text>
                <text x="176" y="84">IoT</text>
                <text x="240" y="84">Certificate</text>
                <text x="304" y="84">(1)</text>
                <text x="400" y="84">317</text>
                <text x="496" y="84">142</text>
                <text x="40" y="116">ECDSA</text>
                <text x="88" y="116">HTTPS</text>
                <text x="160" y="116">Certificate</text>
                <text x="232" y="116">Chain</text>
                <text x="272" y="116">(2)</text>
                <text x="396" y="116">2193</text>
                <text x="492" y="116">1397</text>
                <text x="32" y="148">RSA</text>
                <text x="72" y="148">HTTPS</text>
                <text x="144" y="148">Certificate</text>
                <text x="216" y="148">Chain</text>
                <text x="256" y="148">(4)</text>
                <text x="396" y="148">5175</text>
                <text x="492" y="148">3937</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       142 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1397 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3937 |
+---------------------------------------+-----------+-----------+
]]></artwork>
        </artset>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X.509 and C509 are Certificate messages. X.509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="560" viewBox="0 0 560 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,224" fill="none" stroke="black"/>
              <path d="M 168,32 L 168,224" fill="none" stroke="black"/>
              <path d="M 232,32 L 232,224" fill="none" stroke="black"/>
              <path d="M 368,32 L 368,224" fill="none" stroke="black"/>
              <path d="M 424,32 L 424,224" fill="none" stroke="black"/>
              <path d="M 552,32 L 552,224" fill="none" stroke="black"/>
              <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 552,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 552,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 552,224" fill="none" stroke="black"/>
              <g class="text">
                <text x="200" y="52">X.509</text>
                <text x="264" y="52">X.509</text>
                <text x="296" y="52">+</text>
                <text x="332" y="52">Brotli</text>
                <text x="396" y="52">C509</text>
                <text x="452" y="52">C509</text>
                <text x="480" y="52">+</text>
                <text x="516" y="52">Brotli</text>
                <text x="32" y="84">RFC</text>
                <text x="68" y="84">7925</text>
                <text x="108" y="84">Cert</text>
                <text x="144" y="84">(1)</text>
                <text x="208" y="84">327</text>
                <text x="344" y="84">324</text>
                <text x="400" y="84">152</text>
                <text x="528" y="84">170</text>
                <text x="36" y="116">RPKI</text>
                <text x="76" y="116">Cert</text>
                <text x="112" y="116">(1)</text>
                <text x="200" y="116">20991</text>
                <text x="340" y="116">9134</text>
                <text x="396" y="116">8663</text>
                <text x="524" y="116">5671</text>
                <text x="40" y="148">HTTPS</text>
                <text x="88" y="148">Chain</text>
                <text x="128" y="148">(2)</text>
                <text x="204" y="148">2204</text>
                <text x="340" y="148">1455</text>
                <text x="396" y="148">1417</text>
                <text x="524" y="148">1066</text>
                <text x="40" y="180">HTTPS</text>
                <text x="88" y="180">Chain</text>
                <text x="128" y="180">(4)</text>
                <text x="204" y="180">5190</text>
                <text x="340" y="180">3244</text>
                <text x="396" y="180">3961</text>
                <text x="524" y="180">2848</text>
                <text x="40" y="212">HTTPS</text>
                <text x="80" y="212">Bag</text>
                <text x="112" y="212">(8)</text>
                <text x="200" y="212">11578</text>
                <text x="340" y="212">3979</text>
                <text x="396" y="212">8885</text>
                <text x="524" y="212">3522</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-------------------+-------+----------------+------+---------------+
|                   | X.509 | X.509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+----------------+------+---------------+
| RFC 7925 Cert (1) |   327 |            324 |  152 |           170 |
+-------------------+-------+----------------+------+---------------+
| RPKI Cert (1)     | 20991 |           9134 | 8663 |          5671 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (2)   |  2204 |           1455 | 1417 |          1066 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (4)   |  5190 |           3244 | 3961 |          2848 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Bag (8)     | 11578 |           3979 | 8885 |          3522 |
+-------------------+-------+----------------+------+---------------+
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR encoding of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors. The security considerations of <xref target="RFC5280"/> apply.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this document does not reveal any additional information compared to X.509. Because of the difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
      <t>Any issue to decode or parse a C509 certificate should be handled by the certificate using system as would the issue of parsing the corresponding X.509 certificate. For example, a non-critical extension <bcp14>MAY</bcp14> be ignored if it is not recognized, see <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
      <t>As stated in <xref target="cose-header-params"/>, the contents of the COSE Header Parameters c5b, c5c, c5t, c5u is untrusted input that potentially may be verified using existing trust anchors or other trust establishment mechanism out of scope of this document. Similar security considerations as x5bag, x5chain, x5t and x5u applies, see <xref target="RFC9360"/>. Security considerations of the COSE protected and unprotected headers is discussed in <xref target="RFC9052"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "CBOR Encoded X.509 (C509) Parameters". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate an entry that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1-byte encoding, other values in the interval [-256, 255] have a 2-byte encoding, and the remaining values in the interval [-65536, 65535] have a 3-byte encoding.</t>
      <t>All assignments according to "IETF Review with Expert Review" are made on a "IETF Review" basis per Section 4.8 of <xref target="RFC8126"/> with "Expert Review" additionally required per Section 4.5 of <xref target="RFC8126"/>. The procedure for early IANA allocation of "standards track code points" defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, working group chairs are encouraged to consult the expert(s) early during the process outlined in Section 3.1 of <xref target="RFC7120"/>.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. It is mandatory to specify content in all columns. For values in the interval [-24, 23], the registration procedure is "IETF Review with Expert Review". For all other values, the registration procedure is "Expert Review".  The initial contents of the registry are (see <xref target="version"/>):</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="432" viewBox="0 0 432 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,192" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,192" fill="none" stroke="black"/>
                <path d="M 8,32 L 424,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 424,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 424,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 424,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 424,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 424,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 424,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="116" y="84">Reserved</text>
                  <text x="56" y="116">1</text>
                  <text x="116" y="116">Reserved</text>
                  <text x="56" y="148">2</text>
                  <text x="116" y="148">Natively</text>
                  <text x="180" y="148">Signed</text>
                  <text x="228" y="148">C509</text>
                  <text x="296" y="148">Certificate</text>
                  <text x="56" y="180">3</text>
                  <text x="100" y="180">CBOR</text>
                  <text x="164" y="180">Re-encoded</text>
                  <text x="232" y="180">X.509</text>
                  <text x="268" y="180">v3</text>
                  <text x="328" y="180">Certificate</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-------------------------------------------+
| Value | Description                               |
+=======+===========================================+
|     0 | Reserved                                  |
+-------+-------------------------------------------+
|     1 | Reserved                                  |
+-------+-------------------------------------------+
|     2 | Natively Signed C509 Certificate          |
+-------+-------------------------------------------+
|     3 | CBOR Re-encoded X.509 v3 Certificate      |
+-------+-------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="csr-type">
        <name>C509 Certificate Request Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-csr-types">
          <name>C509 Certificate Request Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,256" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 552,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 552,208" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="120" y="84">Requested</text>
                  <text x="208" y="84">certificate</text>
                  <text x="268" y="84">is</text>
                  <text x="300" y="84">C509</text>
                  <text x="340" y="84">Type</text>
                  <text x="372" y="84">2.</text>
                  <text x="116" y="100">Natively</text>
                  <text x="180" y="100">Signed</text>
                  <text x="228" y="100">C509</text>
                  <text x="296" y="100">Certificate</text>
                  <text x="380" y="100">Request.</text>
                  <text x="56" y="132">1</text>
                  <text x="120" y="132">Requested</text>
                  <text x="208" y="132">certificate</text>
                  <text x="268" y="132">is</text>
                  <text x="300" y="132">C509</text>
                  <text x="340" y="132">Type</text>
                  <text x="372" y="132">2.</text>
                  <text x="100" y="148">CBOR</text>
                  <text x="168" y="148">re-encoding</text>
                  <text x="228" y="148">of</text>
                  <text x="256" y="148">RFC</text>
                  <text x="292" y="148">2986</text>
                  <text x="368" y="148">certification</text>
                  <text x="460" y="148">request.</text>
                  <text x="56" y="180">2</text>
                  <text x="120" y="180">Requested</text>
                  <text x="208" y="180">certificate</text>
                  <text x="268" y="180">is</text>
                  <text x="300" y="180">C509</text>
                  <text x="340" y="180">Type</text>
                  <text x="372" y="180">3.</text>
                  <text x="116" y="196">Natively</text>
                  <text x="180" y="196">Signed</text>
                  <text x="228" y="196">C509</text>
                  <text x="296" y="196">Certificate</text>
                  <text x="380" y="196">Request.</text>
                  <text x="56" y="228">3</text>
                  <text x="120" y="228">Requested</text>
                  <text x="208" y="228">certificate</text>
                  <text x="268" y="228">is</text>
                  <text x="300" y="228">C509</text>
                  <text x="340" y="228">Type</text>
                  <text x="372" y="228">3.</text>
                  <text x="100" y="244">CBOR</text>
                  <text x="168" y="244">re-encoding</text>
                  <text x="228" y="244">of</text>
                  <text x="256" y="244">RFC</text>
                  <text x="292" y="244">2986</text>
                  <text x="368" y="244">certification</text>
                  <text x="460" y="244">request.</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Requested certificate is C509 Type 2.                     |
|       | Natively Signed C509 Certificate Request.                 |
+-------+-----------------------------------------------------------+
|     1 | Requested certificate is C509 Type 2.                     |
|       | CBOR re-encoding of RFC 2986 certification request.       |
+-------+-----------------------------------------------------------+
|     2 | Requested certificate is C509 Type 3.                     |
|       | Natively Signed C509 Certificate Request.                 |
+-------+-----------------------------------------------------------+
|     3 | Requested certificate is C509 Type 3.                     |
|       | CBOR re-encoding of RFC 2986 certification request.       |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="privkeys">
        <name>C509 Private Key Types Registry</name>
        <t>IANA has created a new registry titled "C509 Private Key Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Comments, and subjectPrivateKey, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-rivkeys">
          <name>C509 Private Key Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="560" viewBox="0 0 560 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,160" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 552,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="112" y="52">Private</text>
                  <text x="160" y="52">Key</text>
                  <text x="200" y="52">Types</text>
                  <text x="56" y="84">0</text>
                  <text x="120" y="84">Comments:</text>
                  <text x="276" y="84">Asymmetric</text>
                  <text x="336" y="84">Key</text>
                  <text x="384" y="84">Package</text>
                  <text x="436" y="84">(RFC</text>
                  <text x="480" y="84">5958)</text>
                  <text x="156" y="100">subjectPrivateKey:</text>
                  <text x="256" y="100">bytes</text>
                  <text x="56" y="132">1</text>
                  <text x="120" y="132">Comments:</text>
                  <text x="252" y="132">COSE</text>
                  <text x="288" y="132">Key</text>
                  <text x="332" y="132">Object</text>
                  <text x="380" y="132">(RFC</text>
                  <text x="424" y="132">9052)</text>
                  <text x="156" y="148">subjectPrivateKey:</text>
                  <text x="268" y="148">COSE_Key</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Private Key Types                                         |
+=======+===========================================================+
|     0 | Comments:          Asymmetric Key Package (RFC 5958)      |
|       | subjectPrivateKey: bytes                                  |
+-------+-----------------------------------------------------------+
|     1 | Comments:          COSE Key Object (RFC 9052)             |
|       | subjectPrivateKey: COSE_Key                               |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="temp-type">
        <name>C509 Certificate Request Templates Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Templates Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-temp-types">
          <name>C509 Certificate Request Templates Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,96" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="108" y="84">Simple</text>
                  <text x="156" y="84">C509</text>
                  <text x="224" y="84">Certificate</text>
                  <text x="304" y="84">Request</text>
                  <text x="372" y="84">Template</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Simple C509 Certificate Request Template                  |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="atttype">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is a non-negative integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [0, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". Name and Identifiers are informal descriptions. The OID is given in dotted decimal representation. The DER column contains the hex string of the DER-encoded OID <xref target="X.690"/>.</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2880" width="560" viewBox="0 0 560 2880" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2864" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2864" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2864" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,832 L 552,832" fill="none" stroke="black"/>
                <path d="M 8,928 L 552,928" fill="none" stroke="black"/>
                <path d="M 8,1024 L 552,1024" fill="none" stroke="black"/>
                <path d="M 8,1120 L 552,1120" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1312 L 552,1312" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1504 L 552,1504" fill="none" stroke="black"/>
                <path d="M 8,1600 L 552,1600" fill="none" stroke="black"/>
                <path d="M 8,1696 L 552,1696" fill="none" stroke="black"/>
                <path d="M 8,1792 L 552,1792" fill="none" stroke="black"/>
                <path d="M 8,1888 L 552,1888" fill="none" stroke="black"/>
                <path d="M 8,1984 L 552,1984" fill="none" stroke="black"/>
                <path d="M 8,2096 L 552,2096" fill="none" stroke="black"/>
                <path d="M 8,2192 L 552,2192" fill="none" stroke="black"/>
                <path d="M 8,2288 L 552,2288" fill="none" stroke="black"/>
                <path d="M 8,2384 L 552,2384" fill="none" stroke="black"/>
                <path d="M 8,2480 L 552,2480" fill="none" stroke="black"/>
                <path d="M 8,2576 L 552,2576" fill="none" stroke="black"/>
                <path d="M 8,2672 L 552,2672" fill="none" stroke="black"/>
                <path d="M 8,2768 L 552,2768" fill="none" stroke="black"/>
                <path d="M 8,2864 L 552,2864" fill="none" stroke="black"/>
                <circle cx="368" cy="864" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="120" y="52">Attribute</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="240" y="84">Email</text>
                  <text x="296" y="84">Address</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="272" y="100">emailAddress,</text>
                  <text x="384" y="100">e-mailAddress</text>
                  <text x="100" y="116">OID:</text>
                  <text x="300" y="116">1.2.840.113549.1.9.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">09</text>
                  <text x="276" y="132">2A</text>
                  <text x="300" y="132">86</text>
                  <text x="324" y="132">48</text>
                  <text x="348" y="132">86</text>
                  <text x="372" y="132">F7</text>
                  <text x="396" y="132">0D</text>
                  <text x="420" y="132">01</text>
                  <text x="444" y="132">09</text>
                  <text x="468" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="244" y="180">Common</text>
                  <text x="292" y="180">Name</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="264" y="196">commonName,</text>
                  <text x="324" y="196">cn</text>
                  <text x="100" y="212">OID:</text>
                  <text x="248" y="212">2.5.4.3</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">03</text>
                  <text x="276" y="228">55</text>
                  <text x="300" y="228">04</text>
                  <text x="324" y="228">03</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="248" y="276">Surname</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="252" y="292">surname,</text>
                  <text x="300" y="292">sn</text>
                  <text x="100" y="308">OID:</text>
                  <text x="248" y="308">2.5.4.4</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">03</text>
                  <text x="276" y="324">55</text>
                  <text x="300" y="324">04</text>
                  <text x="324" y="324">04</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="244" y="372">Serial</text>
                  <text x="300" y="372">Number</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="268" y="388">serialNumber</text>
                  <text x="100" y="404">OID:</text>
                  <text x="248" y="404">2.5.4.5</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">03</text>
                  <text x="276" y="420">55</text>
                  <text x="300" y="420">04</text>
                  <text x="324" y="420">05</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="248" y="468">Country</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="268" y="484">countryName,</text>
                  <text x="328" y="484">c</text>
                  <text x="100" y="500">OID:</text>
                  <text x="248" y="500">2.5.4.6</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">03</text>
                  <text x="276" y="516">55</text>
                  <text x="300" y="516">04</text>
                  <text x="324" y="516">06</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="56" y="564">5</text>
                  <text x="104" y="564">Name:</text>
                  <text x="252" y="564">Locality</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="272" y="580">localityName,</text>
                  <text x="368" y="580">locality,</text>
                  <text x="416" y="580">l</text>
                  <text x="100" y="596">OID:</text>
                  <text x="248" y="596">2.5.4.7</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">03</text>
                  <text x="276" y="612">55</text>
                  <text x="300" y="612">04</text>
                  <text x="324" y="612">07</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="56" y="660">6</text>
                  <text x="104" y="660">Name:</text>
                  <text x="240" y="660">State</text>
                  <text x="276" y="660">or</text>
                  <text x="324" y="660">Province</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="300" y="676">stateOrProvinceName,</text>
                  <text x="396" y="676">st</text>
                  <text x="100" y="692">OID:</text>
                  <text x="248" y="692">2.5.4.8</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">03</text>
                  <text x="276" y="708">55</text>
                  <text x="300" y="708">04</text>
                  <text x="324" y="708">08</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="56" y="756">7</text>
                  <text x="104" y="756">Name:</text>
                  <text x="244" y="756">Street</text>
                  <text x="304" y="756">Address</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="276" y="772">streetAddress,</text>
                  <text x="364" y="772">street</text>
                  <text x="100" y="788">OID:</text>
                  <text x="248" y="788">2.5.4.9</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">03</text>
                  <text x="276" y="804">55</text>
                  <text x="300" y="804">04</text>
                  <text x="324" y="804">09</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="56" y="852">8</text>
                  <text x="104" y="852">Name:</text>
                  <text x="268" y="852">Organization</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="288" y="868">organizationName,</text>
                  <text x="100" y="884">OID:</text>
                  <text x="252" y="884">2.5.4.10</text>
                  <text x="100" y="900">DER:</text>
                  <text x="228" y="900">06</text>
                  <text x="252" y="900">03</text>
                  <text x="276" y="900">55</text>
                  <text x="300" y="900">04</text>
                  <text x="324" y="900">0A</text>
                  <text x="120" y="916">Comments:</text>
                  <text x="56" y="948">9</text>
                  <text x="104" y="948">Name:</text>
                  <text x="276" y="948">Organizational</text>
                  <text x="356" y="948">Unit</text>
                  <text x="132" y="964">Identifiers:</text>
                  <text x="312" y="964">organizationalUnitName,</text>
                  <text x="420" y="964">ou</text>
                  <text x="100" y="980">OID:</text>
                  <text x="252" y="980">2.5.4.11</text>
                  <text x="100" y="996">DER:</text>
                  <text x="228" y="996">06</text>
                  <text x="252" y="996">03</text>
                  <text x="276" y="996">55</text>
                  <text x="300" y="996">04</text>
                  <text x="324" y="996">0B</text>
                  <text x="120" y="1012">Comments:</text>
                  <text x="52" y="1044">10</text>
                  <text x="104" y="1044">Name:</text>
                  <text x="240" y="1044">Title</text>
                  <text x="132" y="1060">Identifiers:</text>
                  <text x="240" y="1060">title</text>
                  <text x="100" y="1076">OID:</text>
                  <text x="252" y="1076">2.5.4.12</text>
                  <text x="100" y="1092">DER:</text>
                  <text x="228" y="1092">06</text>
                  <text x="252" y="1092">03</text>
                  <text x="276" y="1092">55</text>
                  <text x="300" y="1092">04</text>
                  <text x="324" y="1092">0C</text>
                  <text x="120" y="1108">Comments:</text>
                  <text x="52" y="1140">11</text>
                  <text x="104" y="1140">Name:</text>
                  <text x="252" y="1140">Business</text>
                  <text x="324" y="1140">Category</text>
                  <text x="132" y="1156">Identifiers:</text>
                  <text x="284" y="1156">businessCategory</text>
                  <text x="100" y="1172">OID:</text>
                  <text x="252" y="1172">2.5.4.15</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="228" y="1188">06</text>
                  <text x="252" y="1188">03</text>
                  <text x="276" y="1188">55</text>
                  <text x="300" y="1188">04</text>
                  <text x="324" y="1188">0F</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="52" y="1236">12</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="244" y="1236">Postal</text>
                  <text x="292" y="1236">Code</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="260" y="1252">postalCode</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="252" y="1268">2.5.4.17</text>
                  <text x="100" y="1284">DER:</text>
                  <text x="228" y="1284">06</text>
                  <text x="252" y="1284">03</text>
                  <text x="276" y="1284">55</text>
                  <text x="300" y="1284">04</text>
                  <text x="324" y="1284">11</text>
                  <text x="120" y="1300">Comments:</text>
                  <text x="52" y="1332">13</text>
                  <text x="104" y="1332">Name:</text>
                  <text x="240" y="1332">Given</text>
                  <text x="284" y="1332">Name</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="256" y="1348">givenName</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="252" y="1364">2.5.4.42</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">03</text>
                  <text x="276" y="1380">55</text>
                  <text x="300" y="1380">04</text>
                  <text x="324" y="1380">2A</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="52" y="1428">14</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="252" y="1428">Initials</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="252" y="1444">initials</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="252" y="1460">2.5.4.43</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">03</text>
                  <text x="276" y="1476">55</text>
                  <text x="300" y="1476">04</text>
                  <text x="324" y="1476">2B</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="52" y="1524">15</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="260" y="1524">Generation</text>
                  <text x="344" y="1524">Qualifier</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="296" y="1540">generationQualifier</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="252" y="1556">2.5.4.44</text>
                  <text x="100" y="1572">DER:</text>
                  <text x="228" y="1572">06</text>
                  <text x="252" y="1572">03</text>
                  <text x="276" y="1572">55</text>
                  <text x="300" y="1572">04</text>
                  <text x="324" y="1572">2C</text>
                  <text x="120" y="1588">Comments:</text>
                  <text x="52" y="1620">16</text>
                  <text x="104" y="1620">Name:</text>
                  <text x="228" y="1620">DN</text>
                  <text x="280" y="1620">Qualifier</text>
                  <text x="132" y="1636">Identifiers:</text>
                  <text x="264" y="1636">dnQualifier</text>
                  <text x="100" y="1652">OID:</text>
                  <text x="252" y="1652">2.5.4.46</text>
                  <text x="100" y="1668">DER:</text>
                  <text x="228" y="1668">06</text>
                  <text x="252" y="1668">03</text>
                  <text x="276" y="1668">55</text>
                  <text x="300" y="1668">04</text>
                  <text x="324" y="1668">2E</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="52" y="1716">17</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="256" y="1716">Pseudonym</text>
                  <text x="132" y="1732">Identifiers:</text>
                  <text x="256" y="1732">pseudonym</text>
                  <text x="100" y="1748">OID:</text>
                  <text x="252" y="1748">2.5.4.65</text>
                  <text x="100" y="1764">DER:</text>
                  <text x="228" y="1764">06</text>
                  <text x="252" y="1764">03</text>
                  <text x="276" y="1764">55</text>
                  <text x="300" y="1764">04</text>
                  <text x="324" y="1764">41</text>
                  <text x="120" y="1780">Comments:</text>
                  <text x="52" y="1812">18</text>
                  <text x="104" y="1812">Name:</text>
                  <text x="268" y="1812">Organization</text>
                  <text x="364" y="1812">Identifier</text>
                  <text x="132" y="1828">Identifiers:</text>
                  <text x="308" y="1828">organizationIdentifier</text>
                  <text x="100" y="1844">OID:</text>
                  <text x="252" y="1844">2.5.4.97</text>
                  <text x="100" y="1860">DER:</text>
                  <text x="228" y="1860">06</text>
                  <text x="252" y="1860">03</text>
                  <text x="276" y="1860">55</text>
                  <text x="300" y="1860">04</text>
                  <text x="324" y="1860">61</text>
                  <text x="120" y="1876">Comments:</text>
                  <text x="52" y="1908">19</text>
                  <text x="104" y="1908">Name:</text>
                  <text x="236" y="1908">Inc.</text>
                  <text x="292" y="1908">Locality</text>
                  <text x="132" y="1924">Identifiers:</text>
                  <text x="376" y="1924">jurisdictionOfIncorporationLocalityName</text>
                  <text x="100" y="1940">OID:</text>
                  <text x="316" y="1940">1.3.6.1.4.1.311.60.2.1.1</text>
                  <text x="100" y="1956">DER:</text>
                  <text x="228" y="1956">06</text>
                  <text x="252" y="1956">0B</text>
                  <text x="276" y="1956">2B</text>
                  <text x="300" y="1956">06</text>
                  <text x="324" y="1956">01</text>
                  <text x="348" y="1956">04</text>
                  <text x="372" y="1956">01</text>
                  <text x="396" y="1956">82</text>
                  <text x="420" y="1956">37</text>
                  <text x="444" y="1956">3C</text>
                  <text x="468" y="1956">02</text>
                  <text x="492" y="1956">01</text>
                  <text x="516" y="1956">01</text>
                  <text x="120" y="1972">Comments:</text>
                  <text x="52" y="2004">20</text>
                  <text x="104" y="2004">Name:</text>
                  <text x="236" y="2004">Inc.</text>
                  <text x="280" y="2004">State</text>
                  <text x="316" y="2004">or</text>
                  <text x="364" y="2004">Province</text>
                  <text x="132" y="2020">Identifiers:</text>
                  <text x="328" y="2020">jurisdictionOfIncorporation</text>
                  <text x="296" y="2036">StateOrProvinceName</text>
                  <text x="100" y="2052">OID:</text>
                  <text x="316" y="2052">1.3.6.1.4.1.311.60.2.1.2</text>
                  <text x="100" y="2068">DER:</text>
                  <text x="228" y="2068">06</text>
                  <text x="252" y="2068">0B</text>
                  <text x="276" y="2068">2B</text>
                  <text x="300" y="2068">06</text>
                  <text x="324" y="2068">01</text>
                  <text x="348" y="2068">04</text>
                  <text x="372" y="2068">01</text>
                  <text x="396" y="2068">82</text>
                  <text x="420" y="2068">37</text>
                  <text x="444" y="2068">3C</text>
                  <text x="468" y="2068">02</text>
                  <text x="492" y="2068">01</text>
                  <text x="516" y="2068">02</text>
                  <text x="120" y="2084">Comments:</text>
                  <text x="52" y="2116">21</text>
                  <text x="104" y="2116">Name:</text>
                  <text x="236" y="2116">Inc.</text>
                  <text x="288" y="2116">Country</text>
                  <text x="132" y="2132">Identifiers:</text>
                  <text x="372" y="2132">jurisdictionOfIncorporationCountryName</text>
                  <text x="100" y="2148">OID:</text>
                  <text x="316" y="2148">1.3.6.1.4.1.311.60.2.1.3</text>
                  <text x="100" y="2164">DER:</text>
                  <text x="228" y="2164">06</text>
                  <text x="252" y="2164">0B</text>
                  <text x="276" y="2164">2B</text>
                  <text x="300" y="2164">06</text>
                  <text x="324" y="2164">01</text>
                  <text x="348" y="2164">04</text>
                  <text x="372" y="2164">01</text>
                  <text x="396" y="2164">82</text>
                  <text x="420" y="2164">37</text>
                  <text x="444" y="2164">3C</text>
                  <text x="468" y="2164">02</text>
                  <text x="492" y="2164">01</text>
                  <text x="516" y="2164">03</text>
                  <text x="120" y="2180">Comments:</text>
                  <text x="52" y="2212">22</text>
                  <text x="104" y="2212">Name:</text>
                  <text x="244" y="2212">Domain</text>
                  <text x="312" y="2212">Component</text>
                  <text x="132" y="2228">Identifiers:</text>
                  <text x="284" y="2228">domainComponent,</text>
                  <text x="364" y="2228">dc</text>
                  <text x="100" y="2244">OID:</text>
                  <text x="324" y="2244">0.9.2342.19200300.100.1.25</text>
                  <text x="100" y="2260">DER:</text>
                  <text x="228" y="2260">06</text>
                  <text x="252" y="2260">0A</text>
                  <text x="276" y="2260">09</text>
                  <text x="300" y="2260">92</text>
                  <text x="324" y="2260">26</text>
                  <text x="348" y="2260">89</text>
                  <text x="372" y="2260">93</text>
                  <text x="396" y="2260">F2</text>
                  <text x="420" y="2260">2C</text>
                  <text x="444" y="2260">64</text>
                  <text x="468" y="2260">01</text>
                  <text x="492" y="2260">19</text>
                  <text x="120" y="2276">Comments:</text>
                  <text x="52" y="2308">25</text>
                  <text x="104" y="2308">Name:</text>
                  <text x="236" y="2308">Name</text>
                  <text x="132" y="2324">Identifiers:</text>
                  <text x="236" y="2324">name</text>
                  <text x="100" y="2340">OID:</text>
                  <text x="252" y="2340">2.5.4.41</text>
                  <text x="100" y="2356">DER:</text>
                  <text x="228" y="2356">06</text>
                  <text x="252" y="2356">03</text>
                  <text x="276" y="2356">55</text>
                  <text x="300" y="2356">04</text>
                  <text x="324" y="2356">29</text>
                  <text x="120" y="2372">Comments:</text>
                  <text x="52" y="2404">26</text>
                  <text x="104" y="2404">Name:</text>
                  <text x="256" y="2404">Telephone</text>
                  <text x="324" y="2404">Number</text>
                  <text x="132" y="2420">Identifiers:</text>
                  <text x="280" y="2420">telephoneNumber</text>
                  <text x="100" y="2436">OID:</text>
                  <text x="252" y="2436">2.5.4.20</text>
                  <text x="100" y="2452">DER:</text>
                  <text x="228" y="2452">06</text>
                  <text x="252" y="2452">03</text>
                  <text x="276" y="2452">55</text>
                  <text x="300" y="2452">04</text>
                  <text x="324" y="2452">14</text>
                  <text x="120" y="2468">Comments:</text>
                  <text x="52" y="2500">27</text>
                  <text x="104" y="2500">Name:</text>
                  <text x="256" y="2500">Directory</text>
                  <text x="340" y="2500">Management</text>
                  <text x="412" y="2500">Domain</text>
                  <text x="460" y="2500">Name</text>
                  <text x="132" y="2516">Identifiers:</text>
                  <text x="248" y="2516">dmdName</text>
                  <text x="100" y="2532">OID:</text>
                  <text x="252" y="2532">2.5.4.54</text>
                  <text x="100" y="2548">DER:</text>
                  <text x="228" y="2548">06</text>
                  <text x="252" y="2548">03</text>
                  <text x="276" y="2548">55</text>
                  <text x="300" y="2548">04</text>
                  <text x="324" y="2548">36</text>
                  <text x="120" y="2564">Comments:</text>
                  <text x="52" y="2596">28</text>
                  <text x="104" y="2596">Name:</text>
                  <text x="244" y="2596">userid</text>
                  <text x="132" y="2612">Identifiers:</text>
                  <text x="232" y="2612">uid</text>
                  <text x="100" y="2628">OID:</text>
                  <text x="320" y="2628">0.9.2342.19200300.100.1.1</text>
                  <text x="100" y="2644">DER:</text>
                  <text x="228" y="2644">06</text>
                  <text x="252" y="2644">0A</text>
                  <text x="276" y="2644">09</text>
                  <text x="300" y="2644">92</text>
                  <text x="324" y="2644">26</text>
                  <text x="348" y="2644">89</text>
                  <text x="372" y="2644">93</text>
                  <text x="396" y="2644">F2</text>
                  <text x="420" y="2644">2C</text>
                  <text x="444" y="2644">64</text>
                  <text x="468" y="2644">01</text>
                  <text x="492" y="2644">01</text>
                  <text x="120" y="2660">Comments:</text>
                  <text x="52" y="2692">29</text>
                  <text x="104" y="2692">Name:</text>
                  <text x="268" y="2692">Unstructured</text>
                  <text x="340" y="2692">Name</text>
                  <text x="132" y="2708">Identifiers:</text>
                  <text x="284" y="2708">unstructuredName</text>
                  <text x="100" y="2724">OID:</text>
                  <text x="300" y="2724">1.2.840.113549.1.9.2</text>
                  <text x="100" y="2740">DER:</text>
                  <text x="228" y="2740">06</text>
                  <text x="252" y="2740">09</text>
                  <text x="276" y="2740">2A</text>
                  <text x="300" y="2740">86</text>
                  <text x="324" y="2740">48</text>
                  <text x="348" y="2740">86</text>
                  <text x="372" y="2740">F7</text>
                  <text x="396" y="2740">0D</text>
                  <text x="420" y="2740">01</text>
                  <text x="444" y="2740">09</text>
                  <text x="468" y="2740">02</text>
                  <text x="120" y="2756">Comments:</text>
                  <text x="52" y="2788">30</text>
                  <text x="104" y="2788">Name:</text>
                  <text x="268" y="2788">Unstructured</text>
                  <text x="352" y="2788">Address</text>
                  <text x="132" y="2804">Identifiers:</text>
                  <text x="296" y="2804">unstructuredAddress</text>
                  <text x="100" y="2820">OID:</text>
                  <text x="300" y="2820">1.2.840.113549.1.9.8</text>
                  <text x="100" y="2836">DER:</text>
                  <text x="228" y="2836">06</text>
                  <text x="252" y="2836">0A</text>
                  <text x="276" y="2836">2A</text>
                  <text x="300" y="2836">86</text>
                  <text x="324" y="2836">48</text>
                  <text x="348" y="2836">86</text>
                  <text x="372" y="2836">F7</text>
                  <text x="396" y="2836">0D</text>
                  <text x="420" y="2836">01</text>
                  <text x="444" y="2836">09</text>
                  <text x="468" y="2836">08</text>
                  <text x="492" y="2836">00</text>
                  <text x="120" y="2852">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08 00      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is a positive integer, and the other columns are text strings. The fields Name, OID, DER, abd extensionValue are mandatory. The registry also contains certificate request attributes for use in Certificate Requests, see <xref target="CSR"/>. For values in the interval [1, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions and Certificate Request Attributes</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2992" width="560" viewBox="0 0 560 2992" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2976" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2976" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2976" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,288 L 552,288" fill="none" stroke="black"/>
                <path d="M 8,400 L 552,400" fill="none" stroke="black"/>
                <path d="M 8,512 L 552,512" fill="none" stroke="black"/>
                <path d="M 8,624 L 552,624" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,960 L 552,960" fill="none" stroke="black"/>
                <path d="M 8,1072 L 552,1072" fill="none" stroke="black"/>
                <path d="M 8,1184 L 552,1184" fill="none" stroke="black"/>
                <path d="M 8,1296 L 552,1296" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1520 L 552,1520" fill="none" stroke="black"/>
                <path d="M 8,1632 L 552,1632" fill="none" stroke="black"/>
                <path d="M 8,1744 L 552,1744" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,1968 L 552,1968" fill="none" stroke="black"/>
                <path d="M 8,2080 L 552,2080" fill="none" stroke="black"/>
                <path d="M 8,2192 L 552,2192" fill="none" stroke="black"/>
                <path d="M 8,2304 L 552,2304" fill="none" stroke="black"/>
                <path d="M 8,2416 L 552,2416" fill="none" stroke="black"/>
                <path d="M 8,2528 L 552,2528" fill="none" stroke="black"/>
                <path d="M 8,2640 L 552,2640" fill="none" stroke="black"/>
                <path d="M 8,2752 L 552,2752" fill="none" stroke="black"/>
                <path d="M 8,2864 L 552,2864" fill="none" stroke="black"/>
                <path d="M 8,2976 L 552,2976" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="120" y="52">Extension</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="248" y="84">Subject</text>
                  <text x="296" y="84">Key</text>
                  <text x="356" y="84">Identifier</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="300" y="100">subjectKeyIdentifier</text>
                  <text x="100" y="116">OID:</text>
                  <text x="256" y="116">2.5.29.14</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">03</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">0E</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="144" y="164">extensionValue:</text>
                  <text x="300" y="164">SubjectKeyIdentifier</text>
                  <text x="56" y="196">2</text>
                  <text x="104" y="196">Name:</text>
                  <text x="232" y="196">Key</text>
                  <text x="272" y="196">Usage</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="252" y="212">keyUsage</text>
                  <text x="100" y="228">OID:</text>
                  <text x="256" y="228">2.5.29.15</text>
                  <text x="100" y="244">DER:</text>
                  <text x="228" y="244">06</text>
                  <text x="252" y="244">03</text>
                  <text x="276" y="244">55</text>
                  <text x="300" y="244">1D</text>
                  <text x="324" y="244">0F</text>
                  <text x="120" y="260">Comments:</text>
                  <text x="144" y="276">AttributeValue:</text>
                  <text x="252" y="276">KeyUsage</text>
                  <text x="56" y="308">3</text>
                  <text x="104" y="308">Name:</text>
                  <text x="248" y="308">Subject</text>
                  <text x="328" y="308">Alternative</text>
                  <text x="396" y="308">Name</text>
                  <text x="132" y="324">Identifiers:</text>
                  <text x="276" y="324">subjectAltName</text>
                  <text x="100" y="340">OID:</text>
                  <text x="256" y="340">2.5.29.17</text>
                  <text x="100" y="356">DER:</text>
                  <text x="228" y="356">06</text>
                  <text x="252" y="356">03</text>
                  <text x="276" y="356">55</text>
                  <text x="300" y="356">1D</text>
                  <text x="324" y="356">11</text>
                  <text x="120" y="372">Comments:</text>
                  <text x="144" y="388">extensionValue:</text>
                  <text x="276" y="388">SubjectAltName</text>
                  <text x="56" y="420">4</text>
                  <text x="104" y="420">Name:</text>
                  <text x="240" y="420">Basic</text>
                  <text x="312" y="420">Constraints</text>
                  <text x="132" y="436">Identifiers:</text>
                  <text x="284" y="436">basicConstraints</text>
                  <text x="100" y="452">OID:</text>
                  <text x="256" y="452">2.5.29.19</text>
                  <text x="100" y="468">DER:</text>
                  <text x="228" y="468">06</text>
                  <text x="252" y="468">03</text>
                  <text x="276" y="468">55</text>
                  <text x="300" y="468">1D</text>
                  <text x="324" y="468">13</text>
                  <text x="120" y="484">Comments:</text>
                  <text x="144" y="500">extensionValue:</text>
                  <text x="284" y="500">BasicConstraints</text>
                  <text x="56" y="532">5</text>
                  <text x="104" y="532">Name:</text>
                  <text x="232" y="532">CRL</text>
                  <text x="300" y="532">Distribution</text>
                  <text x="380" y="532">Points</text>
                  <text x="132" y="548">Identifiers:</text>
                  <text x="304" y="548">cRLDistributionPoints</text>
                  <text x="100" y="564">OID:</text>
                  <text x="256" y="564">2.5.29.31</text>
                  <text x="100" y="580">DER:</text>
                  <text x="228" y="580">06</text>
                  <text x="252" y="580">03</text>
                  <text x="276" y="580">55</text>
                  <text x="300" y="580">1D</text>
                  <text x="324" y="580">1F</text>
                  <text x="120" y="596">Comments:</text>
                  <text x="144" y="612">extensionValue:</text>
                  <text x="304" y="612">CRLDistributionPoints</text>
                  <text x="56" y="644">6</text>
                  <text x="104" y="644">Name:</text>
                  <text x="264" y="644">Certificate</text>
                  <text x="348" y="644">Policies</text>
                  <text x="132" y="660">Identifiers:</text>
                  <text x="296" y="660">certificatePolicies</text>
                  <text x="100" y="676">OID:</text>
                  <text x="256" y="676">2.5.29.32</text>
                  <text x="100" y="692">DER:</text>
                  <text x="228" y="692">06</text>
                  <text x="252" y="692">03</text>
                  <text x="276" y="692">55</text>
                  <text x="300" y="692">1D</text>
                  <text x="324" y="692">20</text>
                  <text x="120" y="708">Comments:</text>
                  <text x="144" y="724">extensionValue:</text>
                  <text x="296" y="724">CertificatePolicies</text>
                  <text x="56" y="756">7</text>
                  <text x="104" y="756">Name:</text>
                  <text x="256" y="756">Authority</text>
                  <text x="312" y="756">Key</text>
                  <text x="372" y="756">Identifier</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="308" y="772">authorityKeyIdentifier</text>
                  <text x="100" y="788">OID:</text>
                  <text x="256" y="788">2.5.29.35</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">03</text>
                  <text x="276" y="804">55</text>
                  <text x="300" y="804">1D</text>
                  <text x="324" y="804">23</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="144" y="836">extensionValue:</text>
                  <text x="308" y="836">AuthorityKeyIdentifier</text>
                  <text x="56" y="868">8</text>
                  <text x="104" y="868">Name:</text>
                  <text x="252" y="868">Extended</text>
                  <text x="304" y="868">Key</text>
                  <text x="344" y="868">Usage</text>
                  <text x="132" y="884">Identifiers:</text>
                  <text x="264" y="884">extKeyUsage</text>
                  <text x="100" y="900">OID:</text>
                  <text x="256" y="900">2.5.29.37</text>
                  <text x="100" y="916">DER:</text>
                  <text x="228" y="916">06</text>
                  <text x="252" y="916">03</text>
                  <text x="276" y="916">55</text>
                  <text x="300" y="916">1D</text>
                  <text x="324" y="916">25</text>
                  <text x="120" y="932">Comments:</text>
                  <text x="144" y="948">extensionValue:</text>
                  <text x="288" y="948">ExtKeyUsageSyntax</text>
                  <text x="56" y="980">9</text>
                  <text x="104" y="980">Name:</text>
                  <text x="256" y="980">Authority</text>
                  <text x="344" y="980">Information</text>
                  <text x="420" y="980">Access</text>
                  <text x="132" y="996">Identifiers:</text>
                  <text x="296" y="996">authorityInfoAccess</text>
                  <text x="100" y="1012">OID:</text>
                  <text x="288" y="1012">1.3.6.1.5.5.7.1.1</text>
                  <text x="100" y="1028">DER:</text>
                  <text x="228" y="1028">06</text>
                  <text x="252" y="1028">08</text>
                  <text x="276" y="1028">2B</text>
                  <text x="300" y="1028">06</text>
                  <text x="324" y="1028">01</text>
                  <text x="348" y="1028">05</text>
                  <text x="372" y="1028">05</text>
                  <text x="396" y="1028">07</text>
                  <text x="420" y="1028">01</text>
                  <text x="444" y="1028">01</text>
                  <text x="120" y="1044">Comments:</text>
                  <text x="144" y="1060">extensionValue:</text>
                  <text x="320" y="1060">AuthorityInfoAccessSyntax</text>
                  <text x="52" y="1092">10</text>
                  <text x="104" y="1092">Name:</text>
                  <text x="244" y="1092">Signed</text>
                  <text x="320" y="1092">Certificate</text>
                  <text x="408" y="1092">Timestamp</text>
                  <text x="468" y="1092">List</text>
                  <text x="132" y="1108">Identifiers:</text>
                  <text x="100" y="1124">OID:</text>
                  <text x="312" y="1124">1.3.6.1.4.1.11129.2.4.2</text>
                  <text x="100" y="1140">DER:</text>
                  <text x="228" y="1140">06</text>
                  <text x="252" y="1140">0A</text>
                  <text x="276" y="1140">2B</text>
                  <text x="300" y="1140">06</text>
                  <text x="324" y="1140">01</text>
                  <text x="348" y="1140">04</text>
                  <text x="372" y="1140">01</text>
                  <text x="396" y="1140">D6</text>
                  <text x="420" y="1140">79</text>
                  <text x="444" y="1140">02</text>
                  <text x="468" y="1140">04</text>
                  <text x="492" y="1140">02</text>
                  <text x="120" y="1156">Comments:</text>
                  <text x="144" y="1172">extensionValue:</text>
                  <text x="328" y="1172">SignedCertificateTimestamps</text>
                  <text x="52" y="1204">24</text>
                  <text x="104" y="1204">Name:</text>
                  <text x="248" y="1204">Subject</text>
                  <text x="320" y="1204">Directory</text>
                  <text x="404" y="1204">Attributes</text>
                  <text x="132" y="1220">Identifiers:</text>
                  <text x="324" y="1220">subjectDirectoryAttributes</text>
                  <text x="100" y="1236">OID:</text>
                  <text x="252" y="1236">2.5.29.9</text>
                  <text x="100" y="1252">DER:</text>
                  <text x="228" y="1252">06</text>
                  <text x="252" y="1252">03</text>
                  <text x="276" y="1252">55</text>
                  <text x="300" y="1252">1D</text>
                  <text x="324" y="1252">09</text>
                  <text x="120" y="1268">Comments:</text>
                  <text x="144" y="1284">extensionValue:</text>
                  <text x="324" y="1284">SubjectDirectoryAttributes</text>
                  <text x="52" y="1316">25</text>
                  <text x="104" y="1316">Name:</text>
                  <text x="244" y="1316">Issuer</text>
                  <text x="320" y="1316">Alternative</text>
                  <text x="388" y="1316">Name</text>
                  <text x="132" y="1332">Identifiers:</text>
                  <text x="272" y="1332">issuerAltName</text>
                  <text x="100" y="1348">OID:</text>
                  <text x="256" y="1348">2.5.29.18</text>
                  <text x="100" y="1364">DER:</text>
                  <text x="228" y="1364">06</text>
                  <text x="252" y="1364">03</text>
                  <text x="276" y="1364">55</text>
                  <text x="300" y="1364">1D</text>
                  <text x="324" y="1364">12</text>
                  <text x="120" y="1380">Comments:</text>
                  <text x="144" y="1396">extensionValue:</text>
                  <text x="272" y="1396">IssuerAltName</text>
                  <text x="52" y="1428">26</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="236" y="1428">Name</text>
                  <text x="304" y="1428">Constraints</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="280" y="1444">nameConstraints</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="256" y="1460">2.5.29.30</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">03</text>
                  <text x="276" y="1476">55</text>
                  <text x="300" y="1476">1D</text>
                  <text x="324" y="1476">1E</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="144" y="1508">extensionValue:</text>
                  <text x="280" y="1508">NameConstraints</text>
                  <text x="52" y="1540">27</text>
                  <text x="104" y="1540">Name:</text>
                  <text x="244" y="1540">Policy</text>
                  <text x="308" y="1540">Mappings</text>
                  <text x="132" y="1556">Identifiers:</text>
                  <text x="276" y="1556">policyMappings</text>
                  <text x="100" y="1572">OID:</text>
                  <text x="256" y="1572">2.5.29.33</text>
                  <text x="100" y="1588">DER:</text>
                  <text x="228" y="1588">06</text>
                  <text x="252" y="1588">03</text>
                  <text x="276" y="1588">55</text>
                  <text x="300" y="1588">1D</text>
                  <text x="324" y="1588">21</text>
                  <text x="120" y="1604">Comments:</text>
                  <text x="144" y="1620">extensionValue:</text>
                  <text x="276" y="1620">PolicyMappings</text>
                  <text x="52" y="1652">28</text>
                  <text x="104" y="1652">Name:</text>
                  <text x="244" y="1652">Policy</text>
                  <text x="320" y="1652">Constraints</text>
                  <text x="132" y="1668">Identifiers:</text>
                  <text x="288" y="1668">policyConstraints</text>
                  <text x="100" y="1684">OID:</text>
                  <text x="256" y="1684">2.5.29.36</text>
                  <text x="100" y="1700">DER:</text>
                  <text x="228" y="1700">06</text>
                  <text x="252" y="1700">03</text>
                  <text x="276" y="1700">55</text>
                  <text x="300" y="1700">1D</text>
                  <text x="324" y="1700">24</text>
                  <text x="120" y="1716">Comments:</text>
                  <text x="144" y="1732">extensionValue:</text>
                  <text x="288" y="1732">PolicyConstraints</text>
                  <text x="52" y="1764">29</text>
                  <text x="104" y="1764">Name:</text>
                  <text x="252" y="1764">Freshest</text>
                  <text x="304" y="1764">CRL</text>
                  <text x="132" y="1780">Identifiers:</text>
                  <text x="264" y="1780">freshestCRL</text>
                  <text x="100" y="1796">OID:</text>
                  <text x="256" y="1796">2.5.29.46</text>
                  <text x="100" y="1812">DER:</text>
                  <text x="228" y="1812">06</text>
                  <text x="252" y="1812">03</text>
                  <text x="276" y="1812">55</text>
                  <text x="300" y="1812">1D</text>
                  <text x="324" y="1812">2E</text>
                  <text x="120" y="1828">Comments:</text>
                  <text x="144" y="1844">extensionValue:</text>
                  <text x="264" y="1844">FreshestCRL</text>
                  <text x="52" y="1876">30</text>
                  <text x="104" y="1876">Name:</text>
                  <text x="248" y="1876">Inhibit</text>
                  <text x="320" y="1876">anyPolicy</text>
                  <text x="132" y="1892">Identifiers:</text>
                  <text x="284" y="1892">inhibitAnyPolicy</text>
                  <text x="100" y="1908">OID:</text>
                  <text x="256" y="1908">2.5.29.54</text>
                  <text x="100" y="1924">DER:</text>
                  <text x="228" y="1924">06</text>
                  <text x="252" y="1924">03</text>
                  <text x="276" y="1924">55</text>
                  <text x="300" y="1924">1D</text>
                  <text x="324" y="1924">36</text>
                  <text x="120" y="1940">Comments:</text>
                  <text x="144" y="1956">extensionValue:</text>
                  <text x="284" y="1956">InhibitAnyPolicy</text>
                  <text x="52" y="1988">31</text>
                  <text x="104" y="1988">Name:</text>
                  <text x="248" y="1988">Subject</text>
                  <text x="328" y="1988">Information</text>
                  <text x="404" y="1988">Access</text>
                  <text x="132" y="2004">Identifiers:</text>
                  <text x="288" y="2004">subjectInfoAccess</text>
                  <text x="100" y="2020">OID:</text>
                  <text x="292" y="2020">1.3.6.1.5.5.7.1.11</text>
                  <text x="100" y="2036">DER:</text>
                  <text x="228" y="2036">06</text>
                  <text x="252" y="2036">08</text>
                  <text x="276" y="2036">2B</text>
                  <text x="300" y="2036">06</text>
                  <text x="324" y="2036">01</text>
                  <text x="348" y="2036">05</text>
                  <text x="372" y="2036">05</text>
                  <text x="396" y="2036">07</text>
                  <text x="420" y="2036">01</text>
                  <text x="444" y="2036">0B</text>
                  <text x="120" y="2052">Comments:</text>
                  <text x="144" y="2068">extensionValue:</text>
                  <text x="312" y="2068">SubjectInfoAccessSyntax</text>
                  <text x="52" y="2100">32</text>
                  <text x="104" y="2100">Name:</text>
                  <text x="228" y="2100">IP</text>
                  <text x="280" y="2100">Resources</text>
                  <text x="132" y="2116">Identifiers:</text>
                  <text x="292" y="2116">id-pe-ipAddrBlocks</text>
                  <text x="100" y="2132">OID:</text>
                  <text x="288" y="2132">1.3.6.1.5.5.7.1.7</text>
                  <text x="100" y="2148">DER:</text>
                  <text x="228" y="2148">06</text>
                  <text x="252" y="2148">08</text>
                  <text x="276" y="2148">2B</text>
                  <text x="300" y="2148">06</text>
                  <text x="324" y="2148">01</text>
                  <text x="348" y="2148">05</text>
                  <text x="372" y="2148">05</text>
                  <text x="396" y="2148">07</text>
                  <text x="420" y="2148">01</text>
                  <text x="444" y="2148">07</text>
                  <text x="120" y="2164">Comments:</text>
                  <text x="144" y="2180">extensionValue:</text>
                  <text x="268" y="2180">IPAddrBlocks</text>
                  <text x="52" y="2212">33</text>
                  <text x="104" y="2212">Name:</text>
                  <text x="228" y="2212">AS</text>
                  <text x="280" y="2212">Resources</text>
                  <text x="132" y="2228">Identifiers:</text>
                  <text x="308" y="2228">id-pe-autonomousSysIds</text>
                  <text x="100" y="2244">OID:</text>
                  <text x="288" y="2244">1.3.6.1.5.5.7.1.8</text>
                  <text x="100" y="2260">DER:</text>
                  <text x="228" y="2260">06</text>
                  <text x="252" y="2260">08</text>
                  <text x="276" y="2260">2B</text>
                  <text x="300" y="2260">06</text>
                  <text x="324" y="2260">01</text>
                  <text x="348" y="2260">05</text>
                  <text x="372" y="2260">05</text>
                  <text x="396" y="2260">07</text>
                  <text x="420" y="2260">01</text>
                  <text x="444" y="2260">08</text>
                  <text x="120" y="2276">Comments:</text>
                  <text x="144" y="2292">extensionValue:</text>
                  <text x="272" y="2292">ASIdentifiers</text>
                  <text x="52" y="2324">34</text>
                  <text x="104" y="2324">Name:</text>
                  <text x="228" y="2324">IP</text>
                  <text x="280" y="2324">Resources</text>
                  <text x="332" y="2324">v2</text>
                  <text x="132" y="2340">Identifiers:</text>
                  <text x="304" y="2340">id-pe-ipAddrBlocks-v2</text>
                  <text x="100" y="2356">OID:</text>
                  <text x="292" y="2356">1.3.6.1.5.5.7.1.28</text>
                  <text x="100" y="2372">DER:</text>
                  <text x="228" y="2372">06</text>
                  <text x="252" y="2372">08</text>
                  <text x="276" y="2372">2B</text>
                  <text x="300" y="2372">06</text>
                  <text x="324" y="2372">01</text>
                  <text x="348" y="2372">05</text>
                  <text x="372" y="2372">05</text>
                  <text x="396" y="2372">07</text>
                  <text x="420" y="2372">01</text>
                  <text x="444" y="2372">1C</text>
                  <text x="120" y="2388">Comments:</text>
                  <text x="144" y="2404">extensionValue:</text>
                  <text x="268" y="2404">IPAddrBlocks</text>
                  <text x="52" y="2436">35</text>
                  <text x="104" y="2436">Name:</text>
                  <text x="228" y="2436">AS</text>
                  <text x="280" y="2436">Resources</text>
                  <text x="332" y="2436">v2</text>
                  <text x="132" y="2452">Identifiers:</text>
                  <text x="320" y="2452">id-pe-autonomousSysIds-v2</text>
                  <text x="100" y="2468">OID:</text>
                  <text x="292" y="2468">1.3.6.1.5.5.7.1.29</text>
                  <text x="100" y="2484">DER:</text>
                  <text x="228" y="2484">06</text>
                  <text x="252" y="2484">08</text>
                  <text x="276" y="2484">2B</text>
                  <text x="300" y="2484">06</text>
                  <text x="324" y="2484">01</text>
                  <text x="348" y="2484">05</text>
                  <text x="372" y="2484">05</text>
                  <text x="396" y="2484">07</text>
                  <text x="420" y="2484">01</text>
                  <text x="444" y="2484">1D</text>
                  <text x="120" y="2500">Comments:</text>
                  <text x="144" y="2516">extensionValue:</text>
                  <text x="272" y="2516">ASIdentifiers</text>
                  <text x="52" y="2548">36</text>
                  <text x="104" y="2548">Name:</text>
                  <text x="236" y="2548">OCSP</text>
                  <text x="268" y="2548">No</text>
                  <text x="304" y="2548">Check</text>
                  <text x="132" y="2564">Identifiers:</text>
                  <text x="300" y="2564">id-pkix-ocsp-nocheck</text>
                  <text x="100" y="2580">OID:</text>
                  <text x="300" y="2580">1.3.6.1.5.5.7.48.1.5</text>
                  <text x="100" y="2596">DER:</text>
                  <text x="228" y="2596">06</text>
                  <text x="252" y="2596">09</text>
                  <text x="276" y="2596">2B</text>
                  <text x="300" y="2596">06</text>
                  <text x="324" y="2596">01</text>
                  <text x="348" y="2596">05</text>
                  <text x="372" y="2596">05</text>
                  <text x="396" y="2596">07</text>
                  <text x="420" y="2596">30</text>
                  <text x="444" y="2596">01</text>
                  <text x="468" y="2596">05</text>
                  <text x="120" y="2612">Comments:</text>
                  <text x="144" y="2628">extensionValue:</text>
                  <text x="236" y="2628">null</text>
                  <text x="52" y="2660">37</text>
                  <text x="104" y="2660">Name:</text>
                  <text x="276" y="2660">Precertificate</text>
                  <text x="368" y="2660">Signing</text>
                  <text x="448" y="2660">Certificate</text>
                  <text x="132" y="2676">Identifiers:</text>
                  <text x="100" y="2692">OID:</text>
                  <text x="312" y="2692">1.3.6.1.4.1.11129.2.4.3</text>
                  <text x="100" y="2708">DER:</text>
                  <text x="228" y="2708">06</text>
                  <text x="252" y="2708">0A</text>
                  <text x="276" y="2708">2B</text>
                  <text x="300" y="2708">06</text>
                  <text x="324" y="2708">01</text>
                  <text x="348" y="2708">04</text>
                  <text x="372" y="2708">01</text>
                  <text x="396" y="2708">D6</text>
                  <text x="420" y="2708">79</text>
                  <text x="444" y="2708">02</text>
                  <text x="468" y="2708">04</text>
                  <text x="492" y="2708">03</text>
                  <text x="120" y="2724">Comments:</text>
                  <text x="232" y="2724">RFC</text>
                  <text x="268" y="2724">6962</text>
                  <text x="144" y="2740">extensionValue:</text>
                  <text x="236" y="2740">null</text>
                  <text x="52" y="2772">38</text>
                  <text x="104" y="2772">Name:</text>
                  <text x="232" y="2772">TLS</text>
                  <text x="284" y="2772">Features</text>
                  <text x="132" y="2788">Identifiers:</text>
                  <text x="284" y="2788">id-pe-tlsfeature</text>
                  <text x="100" y="2804">OID:</text>
                  <text x="292" y="2804">1.3.6.1.5.5.7.1.24</text>
                  <text x="100" y="2820">DER:</text>
                  <text x="228" y="2820">06</text>
                  <text x="252" y="2820">08</text>
                  <text x="276" y="2820">2B</text>
                  <text x="300" y="2820">06</text>
                  <text x="324" y="2820">01</text>
                  <text x="348" y="2820">05</text>
                  <text x="372" y="2820">05</text>
                  <text x="396" y="2820">07</text>
                  <text x="420" y="2820">01</text>
                  <text x="444" y="2820">18</text>
                  <text x="120" y="2836">Comments:</text>
                  <text x="232" y="2836">RFC</text>
                  <text x="268" y="2836">7633</text>
                  <text x="144" y="2852">extensionValue:</text>
                  <text x="264" y="2852">TLSFeatures</text>
                  <text x="48" y="2884">255</text>
                  <text x="104" y="2884">Name:</text>
                  <text x="256" y="2884">Challenge</text>
                  <text x="332" y="2884">Password</text>
                  <text x="132" y="2900">Identifiers:</text>
                  <text x="288" y="2900">challengePassword</text>
                  <text x="100" y="2916">OID:</text>
                  <text x="300" y="2916">1.2.840.113549.1.9.7</text>
                  <text x="100" y="2932">DER:</text>
                  <text x="228" y="2932">06</text>
                  <text x="252" y="2932">09</text>
                  <text x="276" y="2932">2A</text>
                  <text x="300" y="2932">86</text>
                  <text x="324" y="2932">48</text>
                  <text x="348" y="2932">86</text>
                  <text x="372" y="2932">F7</text>
                  <text x="396" y="2932">0D</text>
                  <text x="420" y="2932">01</text>
                  <text x="444" y="2932">09</text>
                  <text x="468" y="2932">07</text>
                  <text x="120" y="2948">Comments:</text>
                  <text x="264" y="2948">Certificate</text>
                  <text x="344" y="2948">Request</text>
                  <text x="420" y="2948">Attributes</text>
                  <text x="144" y="2964">extensionValue:</text>
                  <text x="288" y="2964">ChallengePassword</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestamps              |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     id-pe-autonomousSysIds                   |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     id-pe-autonomousSysIds-v2                |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:                                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    37 | Name:            Precertificate Signing Certificate       |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.3                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 03      |
|       | Comments:        RFC 6962                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    38 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:        RFC 7633                                 |
|       | extensionValue:  TLSFeatures                              |
+-------+-----------------------------------------------------------+
|   255 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        Certificate Request Attributes           |
|       | extensionValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1648" width="560" viewBox="0 0 560 1648" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1632" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1632" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,1632" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,960 L 552,960" fill="none" stroke="black"/>
                <path d="M 8,1072 L 552,1072" fill="none" stroke="black"/>
                <path d="M 8,1184 L 552,1184" fill="none" stroke="black"/>
                <path d="M 8,1296 L 552,1296" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1520 L 552,1520" fill="none" stroke="black"/>
                <path d="M 8,1632 L 552,1632" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Certificate</text>
                  <text x="204" y="52">Policy</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="232" y="84">Any</text>
                  <text x="276" y="84">Policy</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="256" y="100">anyPolicy</text>
                  <text x="100" y="116">OID:</text>
                  <text x="264" y="116">2.5.29.32.0</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">04</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">20</text>
                  <text x="348" y="132">00</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="244" y="180">Domain</text>
                  <text x="316" y="180">Validation</text>
                  <text x="380" y="180">(DV)</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">domain-validated</text>
                  <text x="100" y="212">OID:</text>
                  <text x="276" y="212">2.23.140.1.2.1</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">06</text>
                  <text x="276" y="228">67</text>
                  <text x="300" y="228">81</text>
                  <text x="324" y="228">0C</text>
                  <text x="348" y="228">01</text>
                  <text x="372" y="228">02</text>
                  <text x="396" y="228">01</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="268" y="276">Organization</text>
                  <text x="364" y="276">Validation</text>
                  <text x="428" y="276">(OV)</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="308" y="292">organization-validated</text>
                  <text x="100" y="308">OID:</text>
                  <text x="276" y="308">2.23.140.1.2.2</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">06</text>
                  <text x="276" y="324">67</text>
                  <text x="300" y="324">81</text>
                  <text x="324" y="324">0C</text>
                  <text x="348" y="324">01</text>
                  <text x="372" y="324">02</text>
                  <text x="396" y="324">02</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="260" y="372">Individual</text>
                  <text x="348" y="372">Validation</text>
                  <text x="412" y="372">(IV)</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="300" y="388">individual-validated</text>
                  <text x="100" y="404">OID:</text>
                  <text x="276" y="404">2.23.140.1.2.3</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">06</text>
                  <text x="276" y="420">67</text>
                  <text x="300" y="420">81</text>
                  <text x="324" y="420">0C</text>
                  <text x="348" y="420">01</text>
                  <text x="372" y="420">02</text>
                  <text x="396" y="420">03</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="252" y="468">Extended</text>
                  <text x="332" y="468">Validation</text>
                  <text x="396" y="468">(EV)</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="272" y="484">ev-guidelines</text>
                  <text x="100" y="500">OID:</text>
                  <text x="268" y="500">2.23.140.1.1</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">05</text>
                  <text x="276" y="516">67</text>
                  <text x="300" y="516">81</text>
                  <text x="324" y="516">0C</text>
                  <text x="348" y="516">01</text>
                  <text x="372" y="516">01</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="56" y="564">7</text>
                  <text x="104" y="564">Name:</text>
                  <text x="252" y="564">Resource</text>
                  <text x="304" y="564">PKI</text>
                  <text x="348" y="564">(RPKI)</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="304" y="580">id-cp-ipAddr-asNumber</text>
                  <text x="100" y="596">OID:</text>
                  <text x="292" y="596">1.3.6.1.5.5.7.14.2</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">0E</text>
                  <text x="444" y="612">02</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="56" y="660">8</text>
                  <text x="104" y="660">Name:</text>
                  <text x="252" y="660">Resource</text>
                  <text x="304" y="660">PKI</text>
                  <text x="348" y="660">(RPKI)</text>
                  <text x="432" y="660">(Alternative)</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="316" y="676">id-cp-ipAddr-asNumber-v2</text>
                  <text x="100" y="692">OID:</text>
                  <text x="292" y="692">1.3.6.1.5.5.7.14.3</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">0E</text>
                  <text x="444" y="708">03</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="52" y="756">10</text>
                  <text x="104" y="756">Name:</text>
                  <text x="244" y="756">Remote</text>
                  <text x="288" y="756">SIM</text>
                  <text x="356" y="756">Provisioning</text>
                  <text x="428" y="756">Role</text>
                  <text x="264" y="772">Certificate</text>
                  <text x="340" y="772">Issuer</text>
                  <text x="132" y="788">Identifiers:</text>
                  <text x="272" y="788">id-rspRole-ci</text>
                  <text x="100" y="804">OID:</text>
                  <text x="284" y="804">2.23.146.1.2.1.0</text>
                  <text x="100" y="820">DER:</text>
                  <text x="228" y="820">06</text>
                  <text x="252" y="820">07</text>
                  <text x="276" y="820">67</text>
                  <text x="300" y="820">81</text>
                  <text x="324" y="820">12</text>
                  <text x="348" y="820">01</text>
                  <text x="372" y="820">02</text>
                  <text x="396" y="820">01</text>
                  <text x="420" y="820">00</text>
                  <text x="120" y="836">Comments:</text>
                  <text x="52" y="868">11</text>
                  <text x="104" y="868">Name:</text>
                  <text x="244" y="868">Remote</text>
                  <text x="288" y="868">SIM</text>
                  <text x="356" y="868">Provisioning</text>
                  <text x="428" y="868">Role</text>
                  <text x="240" y="884">eUICC</text>
                  <text x="132" y="900">Identifiers:</text>
                  <text x="284" y="900">id-rspRole-euicc</text>
                  <text x="100" y="916">OID:</text>
                  <text x="284" y="916">2.23.146.1.2.1.1</text>
                  <text x="100" y="932">DER:</text>
                  <text x="228" y="932">06</text>
                  <text x="252" y="932">07</text>
                  <text x="276" y="932">67</text>
                  <text x="300" y="932">81</text>
                  <text x="324" y="932">12</text>
                  <text x="348" y="932">01</text>
                  <text x="372" y="932">02</text>
                  <text x="396" y="932">01</text>
                  <text x="420" y="932">01</text>
                  <text x="120" y="948">Comments:</text>
                  <text x="52" y="980">12</text>
                  <text x="104" y="980">Name:</text>
                  <text x="244" y="980">Remote</text>
                  <text x="288" y="980">SIM</text>
                  <text x="356" y="980">Provisioning</text>
                  <text x="428" y="980">Role</text>
                  <text x="240" y="996">eUICC</text>
                  <text x="316" y="996">Manufacturer</text>
                  <text x="132" y="1012">Identifiers:</text>
                  <text x="276" y="1012">id-rspRole-eum</text>
                  <text x="100" y="1028">OID:</text>
                  <text x="284" y="1028">2.23.146.1.2.1.2</text>
                  <text x="100" y="1044">DER:</text>
                  <text x="228" y="1044">06</text>
                  <text x="252" y="1044">07</text>
                  <text x="276" y="1044">67</text>
                  <text x="300" y="1044">81</text>
                  <text x="324" y="1044">12</text>
                  <text x="348" y="1044">01</text>
                  <text x="372" y="1044">02</text>
                  <text x="396" y="1044">01</text>
                  <text x="420" y="1044">02</text>
                  <text x="120" y="1060">Comments:</text>
                  <text x="52" y="1092">13</text>
                  <text x="104" y="1092">Name:</text>
                  <text x="244" y="1092">Remote</text>
                  <text x="288" y="1092">SIM</text>
                  <text x="356" y="1092">Provisioning</text>
                  <text x="428" y="1092">Role</text>
                  <text x="244" y="1108">SM-DP+</text>
                  <text x="288" y="1108">TLS</text>
                  <text x="132" y="1124">Identifiers:</text>
                  <text x="288" y="1124">id-rspRole-dp-tls</text>
                  <text x="100" y="1140">OID:</text>
                  <text x="284" y="1140">2.23.146.1.2.1.3</text>
                  <text x="100" y="1156">DER:</text>
                  <text x="228" y="1156">06</text>
                  <text x="252" y="1156">07</text>
                  <text x="276" y="1156">67</text>
                  <text x="300" y="1156">81</text>
                  <text x="324" y="1156">12</text>
                  <text x="348" y="1156">01</text>
                  <text x="372" y="1156">02</text>
                  <text x="396" y="1156">01</text>
                  <text x="420" y="1156">03</text>
                  <text x="120" y="1172">Comments:</text>
                  <text x="52" y="1204">14</text>
                  <text x="104" y="1204">Name:</text>
                  <text x="244" y="1204">Remote</text>
                  <text x="288" y="1204">SIM</text>
                  <text x="356" y="1204">Provisioning</text>
                  <text x="428" y="1204">Role</text>
                  <text x="244" y="1220">SM-DP+</text>
                  <text x="332" y="1220">Authentication</text>
                  <text x="132" y="1236">Identifiers:</text>
                  <text x="292" y="1236">id-rspRole-dp-auth</text>
                  <text x="100" y="1252">OID:</text>
                  <text x="284" y="1252">2.23.146.1.2.1.4</text>
                  <text x="100" y="1268">DER:</text>
                  <text x="228" y="1268">06</text>
                  <text x="252" y="1268">07</text>
                  <text x="276" y="1268">67</text>
                  <text x="300" y="1268">81</text>
                  <text x="324" y="1268">12</text>
                  <text x="348" y="1268">01</text>
                  <text x="372" y="1268">02</text>
                  <text x="396" y="1268">01</text>
                  <text x="420" y="1268">04</text>
                  <text x="120" y="1284">Comments:</text>
                  <text x="52" y="1316">15</text>
                  <text x="104" y="1316">Name:</text>
                  <text x="244" y="1316">Remote</text>
                  <text x="288" y="1316">SIM</text>
                  <text x="356" y="1316">Provisioning</text>
                  <text x="428" y="1316">Role</text>
                  <text x="244" y="1332">SM-DP+</text>
                  <text x="304" y="1332">Profile</text>
                  <text x="368" y="1332">Binding</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="284" y="1348">id-rspRole-dp-pb</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="284" y="1364">2.23.146.1.2.1.5</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">07</text>
                  <text x="276" y="1380">67</text>
                  <text x="300" y="1380">81</text>
                  <text x="324" y="1380">12</text>
                  <text x="348" y="1380">01</text>
                  <text x="372" y="1380">02</text>
                  <text x="396" y="1380">01</text>
                  <text x="420" y="1380">05</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="52" y="1428">16</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="244" y="1428">Remote</text>
                  <text x="288" y="1428">SIM</text>
                  <text x="356" y="1428">Provisioning</text>
                  <text x="428" y="1428">Role</text>
                  <text x="240" y="1444">SM-DS</text>
                  <text x="280" y="1444">TLS</text>
                  <text x="132" y="1460">Identifiers:</text>
                  <text x="288" y="1460">id-rspRole-ds-tls</text>
                  <text x="100" y="1476">OID:</text>
                  <text x="284" y="1476">2.23.146.1.2.1.6</text>
                  <text x="100" y="1492">DER:</text>
                  <text x="228" y="1492">06</text>
                  <text x="252" y="1492">07</text>
                  <text x="276" y="1492">67</text>
                  <text x="300" y="1492">81</text>
                  <text x="324" y="1492">12</text>
                  <text x="348" y="1492">01</text>
                  <text x="372" y="1492">02</text>
                  <text x="396" y="1492">01</text>
                  <text x="420" y="1492">06</text>
                  <text x="120" y="1508">Comments:</text>
                  <text x="52" y="1540">17</text>
                  <text x="104" y="1540">Name:</text>
                  <text x="244" y="1540">Remote</text>
                  <text x="288" y="1540">SIM</text>
                  <text x="356" y="1540">Provisioning</text>
                  <text x="428" y="1540">Role</text>
                  <text x="240" y="1556">SM-DS</text>
                  <text x="324" y="1556">Authentication</text>
                  <text x="132" y="1572">Identifiers:</text>
                  <text x="292" y="1572">id-rspRole-ds-auth</text>
                  <text x="100" y="1588">OID:</text>
                  <text x="284" y="1588">2.23.146.1.2.1.7</text>
                  <text x="100" y="1604">DER:</text>
                  <text x="228" y="1604">06</text>
                  <text x="252" y="1604">07</text>
                  <text x="276" y="1604">67</text>
                  <text x="300" y="1604">81</text>
                  <text x="324" y="1604">12</text>
                  <text x="348" y="1604">01</text>
                  <text x="372" y="1604">02</text>
                  <text x="396" y="1604">01</text>
                  <text x="420" y="1604">07</text>
                  <text x="120" y="1620">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,256" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Certificate</text>
                  <text x="204" y="52">Policy</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="272" y="84">Certification</text>
                  <text x="364" y="84">Practice</text>
                  <text x="440" y="84">Statement</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="260" y="100">id-qt-cps,</text>
                  <text x="320" y="100">cps</text>
                  <text x="100" y="116">OID:</text>
                  <text x="288" y="116">1.3.6.1.5.5.7.2.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">02</text>
                  <text x="444" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="236" y="180">User</text>
                  <text x="284" y="180">Notice</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="276" y="196">id-qt-unotice,</text>
                  <text x="368" y="196">unotice</text>
                  <text x="100" y="212">OID:</text>
                  <text x="288" y="212">1.3.6.1.5.5.7.2.2</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">02</text>
                  <text x="444" y="228">02</text>
                  <text x="120" y="244">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="560" viewBox="0 0 560 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,736" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,736" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Information</text>
                  <text x="204" y="52">Access</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="236" y="84">OCSP</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="264" y="100">id-ad-ocsp,</text>
                  <text x="364" y="100">id-pkix-ocsp</text>
                  <text x="100" y="116">OID:</text>
                  <text x="292" y="116">1.3.6.1.5.5.7.48.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">30</text>
                  <text x="444" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="228" y="180">CA</text>
                  <text x="272" y="180">Issuers</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">id-ad-caIssuers,</text>
                  <text x="392" y="196">caIssuers</text>
                  <text x="100" y="212">OID:</text>
                  <text x="292" y="212">1.3.6.1.5.5.7.48.2</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">30</text>
                  <text x="444" y="228">02</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">3</text>
                  <text x="104" y="276">Name:</text>
                  <text x="236" y="276">Time</text>
                  <text x="292" y="276">Stamping</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="296" y="292">id-ad-timeStamping,</text>
                  <text x="428" y="292">timeStamping</text>
                  <text x="100" y="308">OID:</text>
                  <text x="292" y="308">1.3.6.1.5.5.7.48.3</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">30</text>
                  <text x="444" y="324">03</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">5</text>
                  <text x="104" y="372">Name:</text>
                  <text x="228" y="372">CA</text>
                  <text x="284" y="372">Repository</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="292" y="388">id-ad-caRepository</text>
                  <text x="100" y="404">OID:</text>
                  <text x="292" y="404">1.3.6.1.5.5.7.48.5</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">08</text>
                  <text x="276" y="420">2B</text>
                  <text x="300" y="420">06</text>
                  <text x="324" y="420">01</text>
                  <text x="348" y="420">05</text>
                  <text x="372" y="420">05</text>
                  <text x="396" y="420">07</text>
                  <text x="420" y="420">30</text>
                  <text x="444" y="420">05</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="52" y="468">10</text>
                  <text x="104" y="468">Name:</text>
                  <text x="236" y="468">RPKI</text>
                  <text x="292" y="468">Manifest</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="292" y="484">id-ad-rpkiManifest</text>
                  <text x="100" y="500">OID:</text>
                  <text x="296" y="500">1.3.6.1.5.5.7.48.10</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">08</text>
                  <text x="276" y="516">2B</text>
                  <text x="300" y="516">06</text>
                  <text x="324" y="516">01</text>
                  <text x="348" y="516">05</text>
                  <text x="372" y="516">05</text>
                  <text x="396" y="516">07</text>
                  <text x="420" y="516">30</text>
                  <text x="444" y="516">0A</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="232" y="532">RFC</text>
                  <text x="268" y="532">6487</text>
                  <text x="52" y="564">11</text>
                  <text x="104" y="564">Name:</text>
                  <text x="244" y="564">Signed</text>
                  <text x="300" y="564">Object</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="292" y="580">id-ad-signedObject</text>
                  <text x="100" y="596">OID:</text>
                  <text x="296" y="596">1.3.6.1.5.5.7.48.11</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">30</text>
                  <text x="444" y="612">0B</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="232" y="628">RFC</text>
                  <text x="268" y="628">6487</text>
                  <text x="52" y="660">13</text>
                  <text x="104" y="660">Name:</text>
                  <text x="236" y="660">RPKI</text>
                  <text x="284" y="660">Notify</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="284" y="676">id-ad-rpkiNotify</text>
                  <text x="100" y="692">OID:</text>
                  <text x="296" y="692">1.3.6.1.5.5.7.48.13</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">30</text>
                  <text x="444" y="708">0D</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">8182</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1712" width="544" viewBox="0 0 544 1712" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1696" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1696" fill="none" stroke="black"/>
                <path d="M 536,32 L 536,1696" fill="none" stroke="black"/>
                <path d="M 8,32 L 536,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 536,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 536,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 536,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 536,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 536,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 536,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 536,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 536,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 536,736" fill="none" stroke="black"/>
                <path d="M 8,832 L 536,832" fill="none" stroke="black"/>
                <path d="M 8,928 L 536,928" fill="none" stroke="black"/>
                <path d="M 8,1024 L 536,1024" fill="none" stroke="black"/>
                <path d="M 8,1120 L 536,1120" fill="none" stroke="black"/>
                <path d="M 8,1216 L 536,1216" fill="none" stroke="black"/>
                <path d="M 8,1312 L 536,1312" fill="none" stroke="black"/>
                <path d="M 8,1408 L 536,1408" fill="none" stroke="black"/>
                <path d="M 8,1504 L 536,1504" fill="none" stroke="black"/>
                <path d="M 8,1600 L 536,1600" fill="none" stroke="black"/>
                <path d="M 8,1696 L 536,1696" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="116" y="52">Extended</text>
                  <text x="168" y="52">Key</text>
                  <text x="208" y="52">Usage</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="232" y="84">Any</text>
                  <text x="284" y="84">Extended</text>
                  <text x="336" y="84">Key</text>
                  <text x="376" y="84">Usage</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="296" y="100">anyExtendedKeyUsage</text>
                  <text x="100" y="116">OID:</text>
                  <text x="264" y="116">2.5.29.37.0</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">04</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">25</text>
                  <text x="348" y="132">00</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">5280</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="232" y="180">TLS</text>
                  <text x="276" y="180">Server</text>
                  <text x="364" y="180">authentication</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">id-kp-serverAuth</text>
                  <text x="100" y="212">OID:</text>
                  <text x="288" y="212">1.3.6.1.5.5.7.3.1</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">03</text>
                  <text x="444" y="228">01</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="232" y="244">RFC</text>
                  <text x="268" y="244">5280</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="232" y="276">TLS</text>
                  <text x="276" y="276">Client</text>
                  <text x="364" y="276">Authentication</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="284" y="292">id-kp-clientAuth</text>
                  <text x="100" y="308">OID:</text>
                  <text x="288" y="308">1.3.6.1.5.5.7.3.2</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">03</text>
                  <text x="444" y="324">02</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="232" y="340">RFC</text>
                  <text x="268" y="340">5280</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="236" y="372">Code</text>
                  <text x="288" y="372">Signing</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="288" y="388">id-kp-codeSigning</text>
                  <text x="100" y="404">OID:</text>
                  <text x="288" y="404">1.3.6.1.5.5.7.3.3</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">08</text>
                  <text x="276" y="420">2B</text>
                  <text x="300" y="420">06</text>
                  <text x="324" y="420">01</text>
                  <text x="348" y="420">05</text>
                  <text x="372" y="420">05</text>
                  <text x="396" y="420">07</text>
                  <text x="420" y="420">03</text>
                  <text x="444" y="420">03</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="232" y="436">RFC</text>
                  <text x="268" y="436">5280</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="240" y="468">Email</text>
                  <text x="308" y="468">protection</text>
                  <text x="388" y="468">(S/MIME)</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="304" y="484">id-kp-emailProtection</text>
                  <text x="100" y="500">OID:</text>
                  <text x="288" y="500">1.3.6.1.5.5.7.3.4</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">08</text>
                  <text x="276" y="516">2B</text>
                  <text x="300" y="516">06</text>
                  <text x="324" y="516">01</text>
                  <text x="348" y="516">05</text>
                  <text x="372" y="516">05</text>
                  <text x="396" y="516">07</text>
                  <text x="420" y="516">03</text>
                  <text x="444" y="516">04</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="232" y="532">RFC</text>
                  <text x="268" y="532">5280</text>
                  <text x="56" y="564">8</text>
                  <text x="104" y="564">Name:</text>
                  <text x="236" y="564">Time</text>
                  <text x="292" y="564">Stamping</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="296" y="580">id-kp-timeStamping,</text>
                  <text x="428" y="580">timestamping</text>
                  <text x="100" y="596">OID:</text>
                  <text x="288" y="596">1.3.6.1.5.5.7.3.8</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">03</text>
                  <text x="444" y="612">08</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="56" y="660">9</text>
                  <text x="104" y="660">Name:</text>
                  <text x="236" y="660">OCSP</text>
                  <text x="288" y="660">Signing</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="288" y="676">id-kp-OCSPSigning</text>
                  <text x="100" y="692">OID:</text>
                  <text x="288" y="692">1.3.6.1.5.5.7.3.9</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">03</text>
                  <text x="444" y="708">09</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">5280</text>
                  <text x="52" y="756">10</text>
                  <text x="104" y="756">Name:</text>
                  <text x="252" y="756">Kerberos</text>
                  <text x="316" y="756">PKINIT</text>
                  <text x="372" y="756">Client</text>
                  <text x="420" y="756">Auth</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="308" y="772">id-pkinit-KPClientAuth</text>
                  <text x="100" y="788">OID:</text>
                  <text x="280" y="788">1.3.6.1.5.2.3.4</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">07</text>
                  <text x="276" y="804">2B</text>
                  <text x="300" y="804">06</text>
                  <text x="324" y="804">01</text>
                  <text x="348" y="804">05</text>
                  <text x="372" y="804">02</text>
                  <text x="396" y="804">03</text>
                  <text x="420" y="804">04</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="232" y="820">RFC</text>
                  <text x="268" y="820">4556</text>
                  <text x="52" y="852">11</text>
                  <text x="104" y="852">Name:</text>
                  <text x="252" y="852">Kerberos</text>
                  <text x="316" y="852">PKINIT</text>
                  <text x="360" y="852">KDC</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="280" y="868">id-pkinit-KPKdc</text>
                  <text x="100" y="884">OID:</text>
                  <text x="280" y="884">1.3.6.1.5.2.3.5</text>
                  <text x="100" y="900">DER:</text>
                  <text x="228" y="900">06</text>
                  <text x="252" y="900">07</text>
                  <text x="276" y="900">2B</text>
                  <text x="300" y="900">06</text>
                  <text x="324" y="900">01</text>
                  <text x="348" y="900">05</text>
                  <text x="372" y="900">02</text>
                  <text x="396" y="900">03</text>
                  <text x="420" y="900">05</text>
                  <text x="120" y="916">Comments:</text>
                  <text x="232" y="916">RFC</text>
                  <text x="268" y="916">4556</text>
                  <text x="52" y="948">12</text>
                  <text x="104" y="948">Name:</text>
                  <text x="232" y="948">SSH</text>
                  <text x="276" y="948">Client</text>
                  <text x="132" y="964">Identifiers:</text>
                  <text x="312" y="964">id-kp-secureShellClient</text>
                  <text x="100" y="980">OID:</text>
                  <text x="292" y="980">1.3.6.1.5.5.7.3.21</text>
                  <text x="100" y="996">DER:</text>
                  <text x="228" y="996">06</text>
                  <text x="252" y="996">08</text>
                  <text x="276" y="996">2B</text>
                  <text x="300" y="996">06</text>
                  <text x="324" y="996">01</text>
                  <text x="348" y="996">05</text>
                  <text x="372" y="996">05</text>
                  <text x="396" y="996">07</text>
                  <text x="420" y="996">03</text>
                  <text x="444" y="996">15</text>
                  <text x="120" y="1012">Comments:</text>
                  <text x="232" y="1012">RFC</text>
                  <text x="268" y="1012">6187</text>
                  <text x="52" y="1044">13</text>
                  <text x="104" y="1044">Name:</text>
                  <text x="232" y="1044">SSH</text>
                  <text x="276" y="1044">Server</text>
                  <text x="132" y="1060">Identifiers:</text>
                  <text x="312" y="1060">id-kp-secureShellServer</text>
                  <text x="100" y="1076">OID:</text>
                  <text x="292" y="1076">1.3.6.1.5.5.7.3.22</text>
                  <text x="100" y="1092">DER:</text>
                  <text x="228" y="1092">06</text>
                  <text x="252" y="1092">08</text>
                  <text x="276" y="1092">2B</text>
                  <text x="300" y="1092">06</text>
                  <text x="324" y="1092">01</text>
                  <text x="348" y="1092">05</text>
                  <text x="372" y="1092">05</text>
                  <text x="396" y="1092">07</text>
                  <text x="420" y="1092">03</text>
                  <text x="444" y="1092">16</text>
                  <text x="120" y="1108">Comments:</text>
                  <text x="232" y="1108">RFC</text>
                  <text x="268" y="1108">6187</text>
                  <text x="52" y="1140">14</text>
                  <text x="104" y="1140">Name:</text>
                  <text x="244" y="1140">Bundle</text>
                  <text x="308" y="1140">Security</text>
                  <text x="132" y="1156">Identifiers:</text>
                  <text x="300" y="1156">id-kp-bundleSecurity</text>
                  <text x="100" y="1172">OID:</text>
                  <text x="292" y="1172">1.3.6.1.5.5.7.3.35</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="228" y="1188">06</text>
                  <text x="252" y="1188">08</text>
                  <text x="276" y="1188">2B</text>
                  <text x="300" y="1188">06</text>
                  <text x="324" y="1188">01</text>
                  <text x="348" y="1188">05</text>
                  <text x="372" y="1188">05</text>
                  <text x="396" y="1188">07</text>
                  <text x="420" y="1188">03</text>
                  <text x="444" y="1188">23</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="232" y="1204">RFC</text>
                  <text x="268" y="1204">9174</text>
                  <text x="52" y="1236">15</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="232" y="1236">CMC</text>
                  <text x="304" y="1236">Certification</text>
                  <text x="400" y="1236">Authority</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="264" y="1252">id-kp-cmcCA</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="292" y="1268">1.3.6.1.5.5.7.3.27</text>
                  <text x="100" y="1284">DER:</text>
                  <text x="228" y="1284">06</text>
                  <text x="252" y="1284">08</text>
                  <text x="276" y="1284">2B</text>
                  <text x="300" y="1284">06</text>
                  <text x="324" y="1284">01</text>
                  <text x="348" y="1284">05</text>
                  <text x="372" y="1284">05</text>
                  <text x="396" y="1284">07</text>
                  <text x="420" y="1284">03</text>
                  <text x="444" y="1284">1B</text>
                  <text x="120" y="1300">Comments:</text>
                  <text x="232" y="1300">RFC</text>
                  <text x="268" y="1300">6402</text>
                  <text x="52" y="1332">16</text>
                  <text x="104" y="1332">Name:</text>
                  <text x="232" y="1332">CMC</text>
                  <text x="300" y="1332">Registration</text>
                  <text x="392" y="1332">Authority</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="264" y="1348">id-kp-cmcRA</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="292" y="1364">1.3.6.1.5.5.7.3.28</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">08</text>
                  <text x="276" y="1380">2B</text>
                  <text x="300" y="1380">06</text>
                  <text x="324" y="1380">01</text>
                  <text x="348" y="1380">05</text>
                  <text x="372" y="1380">05</text>
                  <text x="396" y="1380">07</text>
                  <text x="420" y="1380">03</text>
                  <text x="444" y="1380">1C</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="232" y="1396">RFC</text>
                  <text x="268" y="1396">6402</text>
                  <text x="52" y="1428">17</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="232" y="1428">CMC</text>
                  <text x="280" y="1428">Archive</text>
                  <text x="340" y="1428">Server</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="284" y="1444">id-kp-cmcArchive</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="292" y="1460">1.3.6.1.5.5.7.3.29</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">08</text>
                  <text x="276" y="1476">2B</text>
                  <text x="300" y="1476">06</text>
                  <text x="324" y="1476">01</text>
                  <text x="348" y="1476">05</text>
                  <text x="372" y="1476">05</text>
                  <text x="396" y="1476">07</text>
                  <text x="420" y="1476">03</text>
                  <text x="444" y="1476">1D</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="232" y="1492">RFC</text>
                  <text x="268" y="1492">6402</text>
                  <text x="52" y="1524">18</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="232" y="1524">CMC</text>
                  <text x="264" y="1524">Key</text>
                  <text x="324" y="1524">Generation</text>
                  <text x="408" y="1524">Authority</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="264" y="1540">id-kp-cmKGA</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="292" y="1556">1.3.6.1.5.5.7.3.32</text>
                  <text x="100" y="1572">DER:</text>
                  <text x="228" y="1572">06</text>
                  <text x="252" y="1572">08</text>
                  <text x="276" y="1572">2B</text>
                  <text x="300" y="1572">06</text>
                  <text x="324" y="1572">01</text>
                  <text x="348" y="1572">05</text>
                  <text x="372" y="1572">05</text>
                  <text x="396" y="1572">07</text>
                  <text x="420" y="1572">03</text>
                  <text x="444" y="1572">20</text>
                  <text x="120" y="1588">Comments:</text>
                  <text x="232" y="1588">RFC</text>
                  <text x="268" y="1588">9480</text>
                  <text x="52" y="1620">19</text>
                  <text x="104" y="1620">Name:</text>
                  <text x="264" y="1620">Certificate</text>
                  <text x="364" y="1620">Transparency</text>
                  <text x="132" y="1636">Identifiers:</text>
                  <text x="100" y="1652">OID:</text>
                  <text x="312" y="1652">1.3.6.1.4.1.11129.2.4.4</text>
                  <text x="100" y="1668">DER:</text>
                  <text x="228" y="1668">06</text>
                  <text x="252" y="1668">0A</text>
                  <text x="276" y="1668">2B</text>
                  <text x="300" y="1668">06</text>
                  <text x="324" y="1668">01</text>
                  <text x="348" y="1668">04</text>
                  <text x="372" y="1668">01</text>
                  <text x="396" y="1668">D6</text>
                  <text x="420" y="1668">79</text>
                  <text x="444" y="1668">02</text>
                  <text x="468" y="1668">04</text>
                  <text x="492" y="1668">04</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="232" y="1684">RFC</text>
                  <text x="268" y="1684">6962</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
|    15 | Name:            CMC Certification Authority            |
|       | Identifiers:     id-kp-cmcCA                            |
|       | OID:             1.3.6.1.5.5.7.3.27                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1B          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    16 | Name:            CMC Registration Authority             |
|       | Identifiers:     id-kp-cmcRA                            |
|       | OID:             1.3.6.1.5.5.7.3.28                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1C          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    17 | Name:            CMC Archive Server                     |
|       | Identifiers:     id-kp-cmcArchive                       |
|       | OID:             1.3.6.1.5.5.7.3.29                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1D          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    18 | Name:            CMC Key Generation Authority           |
|       | Identifiers:     id-kp-cmKGA                            |
|       | OID:             1.3.6.1.5.5.7.3.32                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 20          |
|       | Comments:        RFC 9480                               |
+-------+---------------------------------------------------------+
|    19 | Name:            Certificate Transparency               |
|       | Identifiers:                                            |
|       | OID:             1.3.6.1.4.1.11129.2.4.4                |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 04    |
|       | Comments:        RFC 6962                               |
+-------+---------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. The fields Name and Value are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="720" width="560" viewBox="0 0 560 720" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,704" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,704" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,704" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,384 L 552,384" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,512 L 552,512" fill="none" stroke="black"/>
                <path d="M 8,576 L 552,576" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,704 L 552,704" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="112" y="52">General</text>
                  <text x="168" y="52">Names</text>
                  <text x="52" y="84">-2</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">otherName</text>
                  <text x="316" y="84">with</text>
                  <text x="400" y="84">SmtpUTF8Mailbox</text>
                  <text x="120" y="100">Comments:</text>
                  <text x="304" y="100">id-on-SmtpUTF8Mailbox</text>
                  <text x="296" y="116">(1.3.6.1.5.5.7.8.9)</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">08</text>
                  <text x="444" y="132">09</text>
                  <text x="108" y="148">Value:</text>
                  <text x="236" y="148">text</text>
                  <text x="52" y="180">-1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="256" y="180">otherName</text>
                  <text x="316" y="180">with</text>
                  <text x="412" y="180">hardwareModuleName</text>
                  <text x="120" y="196">Comments:</text>
                  <text x="316" y="196">id-on-hardwareModuleName</text>
                  <text x="296" y="212">(1.3.6.1.5.5.7.8.4)</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">08</text>
                  <text x="444" y="228">04</text>
                  <text x="108" y="244">Value:</text>
                  <text x="224" y="244">[</text>
                  <text x="256" y="244">~oid,</text>
                  <text x="304" y="244">bytes</text>
                  <text x="336" y="244">]</text>
                  <text x="56" y="276">0</text>
                  <text x="104" y="276">Name:</text>
                  <text x="256" y="276">otherName</text>
                  <text x="120" y="292">Comments:</text>
                  <text x="108" y="308">Value:</text>
                  <text x="224" y="308">[</text>
                  <text x="256" y="308">~oid,</text>
                  <text x="304" y="308">bytes</text>
                  <text x="336" y="308">]</text>
                  <text x="56" y="340">1</text>
                  <text x="104" y="340">Name:</text>
                  <text x="260" y="340">rfc822Name</text>
                  <text x="120" y="356">Comments:</text>
                  <text x="108" y="372">Value:</text>
                  <text x="236" y="372">text</text>
                  <text x="56" y="404">2</text>
                  <text x="104" y="404">Name:</text>
                  <text x="248" y="404">dNSName</text>
                  <text x="120" y="420">Comments:</text>
                  <text x="108" y="436">Value:</text>
                  <text x="236" y="436">text</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="272" y="468">directoryName</text>
                  <text x="120" y="484">Comments:</text>
                  <text x="108" y="500">Value:</text>
                  <text x="236" y="500">Name</text>
                  <text x="56" y="532">6</text>
                  <text x="104" y="532">Name:</text>
                  <text x="320" y="532">uniformResourceIdentifier</text>
                  <text x="120" y="548">Comments:</text>
                  <text x="108" y="564">Value:</text>
                  <text x="236" y="564">text</text>
                  <text x="56" y="596">7</text>
                  <text x="104" y="596">Name:</text>
                  <text x="256" y="596">iPAddress</text>
                  <text x="120" y="612">Comments:</text>
                  <text x="108" y="628">Value:</text>
                  <text x="240" y="628">bytes</text>
                  <text x="56" y="660">8</text>
                  <text x="104" y="660">Name:</text>
                  <text x="268" y="660">registeredID</text>
                  <text x="120" y="676">Comments:</text>
                  <text x="108" y="692">Value:</text>
                  <text x="236" y="692">~oid</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleName                 |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2752" width="560" viewBox="0 0 560 2752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2736" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2736" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2736" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,208 L 552,208" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,432 L 552,432" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,656 L 552,656" fill="none" stroke="black"/>
                <path d="M 8,768 L 552,768" fill="none" stroke="black"/>
                <path d="M 8,880 L 552,880" fill="none" stroke="black"/>
                <path d="M 8,992 L 552,992" fill="none" stroke="black"/>
                <path d="M 8,1104 L 552,1104" fill="none" stroke="black"/>
                <path d="M 8,1248 L 552,1248" fill="none" stroke="black"/>
                <path d="M 8,1392 L 552,1392" fill="none" stroke="black"/>
                <path d="M 8,1536 L 552,1536" fill="none" stroke="black"/>
                <path d="M 8,1648 L 552,1648" fill="none" stroke="black"/>
                <path d="M 8,1760 L 552,1760" fill="none" stroke="black"/>
                <path d="M 8,1872 L 552,1872" fill="none" stroke="black"/>
                <path d="M 8,2048 L 552,2048" fill="none" stroke="black"/>
                <path d="M 8,2224 L 552,2224" fill="none" stroke="black"/>
                <path d="M 8,2400 L 552,2400" fill="none" stroke="black"/>
                <path d="M 8,2512 L 552,2512" fill="none" stroke="black"/>
                <path d="M 8,2624 L 552,2624" fill="none" stroke="black"/>
                <path d="M 8,2736 L 552,2736" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="104" y="52">X.509</text>
                  <text x="168" y="52">Signature</text>
                  <text x="252" y="52">Algorithms</text>
                  <text x="44" y="84">-256</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="84">with</text>
                  <text x="392" y="84">SHA-1</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="284" y="100">sha1-with-rsa-signature,</text>
                  <text x="276" y="116">sha1WithRSAEncryption,</text>
                  <text x="276" y="132">sha-1WithRSAEncryption</text>
                  <text x="100" y="148">OID:</text>
                  <text x="268" y="148">1.2.840.113549.1.1.5</text>
                  <text x="128" y="164">Parameters:</text>
                  <text x="204" y="164">NULL</text>
                  <text x="100" y="180">DER:</text>
                  <text x="196" y="180">30</text>
                  <text x="220" y="180">0D</text>
                  <text x="244" y="180">06</text>
                  <text x="268" y="180">09</text>
                  <text x="292" y="180">2A</text>
                  <text x="316" y="180">86</text>
                  <text x="340" y="180">48</text>
                  <text x="364" y="180">86</text>
                  <text x="388" y="180">F7</text>
                  <text x="412" y="180">0D</text>
                  <text x="436" y="180">01</text>
                  <text x="460" y="180">01</text>
                  <text x="484" y="180">05</text>
                  <text x="508" y="180">05</text>
                  <text x="532" y="180">00</text>
                  <text x="120" y="196">Comments:</text>
                  <text x="208" y="196">Don't</text>
                  <text x="248" y="196">use</text>
                  <text x="44" y="228">-255</text>
                  <text x="104" y="228">Name:</text>
                  <text x="208" y="228">ECDSA</text>
                  <text x="252" y="228">with</text>
                  <text x="296" y="228">SHA-1</text>
                  <text x="132" y="244">Identifiers:</text>
                  <text x="248" y="244">ecdsa-with-SHA1</text>
                  <text x="100" y="260">OID:</text>
                  <text x="256" y="260">1.2.840.10045.4.1</text>
                  <text x="128" y="276">Parameters:</text>
                  <text x="212" y="276">Absent</text>
                  <text x="100" y="292">DER:</text>
                  <text x="196" y="292">30</text>
                  <text x="220" y="292">09</text>
                  <text x="244" y="292">06</text>
                  <text x="268" y="292">07</text>
                  <text x="292" y="292">2A</text>
                  <text x="316" y="292">86</text>
                  <text x="340" y="292">48</text>
                  <text x="364" y="292">CE</text>
                  <text x="388" y="292">3D</text>
                  <text x="412" y="292">04</text>
                  <text x="436" y="292">01</text>
                  <text x="120" y="308">Comments:</text>
                  <text x="208" y="308">Don't</text>
                  <text x="252" y="308">use.</text>
                  <text x="316" y="308">Compressed</text>
                  <text x="400" y="308">signature</text>
                  <text x="464" y="308">value</text>
                  <text x="56" y="340">0</text>
                  <text x="104" y="340">Name:</text>
                  <text x="208" y="340">ECDSA</text>
                  <text x="252" y="340">with</text>
                  <text x="304" y="340">SHA-256</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="256" y="356">ecdsa-with-SHA256</text>
                  <text x="100" y="372">OID:</text>
                  <text x="264" y="372">1.2.840.10045.4.3.2</text>
                  <text x="128" y="388">Parameters:</text>
                  <text x="212" y="388">Absent</text>
                  <text x="100" y="404">DER:</text>
                  <text x="196" y="404">30</text>
                  <text x="220" y="404">0A</text>
                  <text x="244" y="404">06</text>
                  <text x="268" y="404">08</text>
                  <text x="292" y="404">2A</text>
                  <text x="316" y="404">86</text>
                  <text x="340" y="404">48</text>
                  <text x="364" y="404">CE</text>
                  <text x="388" y="404">3D</text>
                  <text x="412" y="404">04</text>
                  <text x="436" y="404">03</text>
                  <text x="460" y="404">02</text>
                  <text x="120" y="420">Comments:</text>
                  <text x="228" y="420">Compressed</text>
                  <text x="312" y="420">signature</text>
                  <text x="376" y="420">value</text>
                  <text x="56" y="452">1</text>
                  <text x="104" y="452">Name:</text>
                  <text x="208" y="452">ECDSA</text>
                  <text x="252" y="452">with</text>
                  <text x="304" y="452">SHA-384</text>
                  <text x="132" y="468">Identifiers:</text>
                  <text x="256" y="468">ecdsa-with-SHA384</text>
                  <text x="100" y="484">OID:</text>
                  <text x="264" y="484">1.2.840.10045.4.3.3</text>
                  <text x="128" y="500">Parameters:</text>
                  <text x="212" y="500">Absent</text>
                  <text x="100" y="516">DER:</text>
                  <text x="196" y="516">30</text>
                  <text x="220" y="516">0A</text>
                  <text x="244" y="516">06</text>
                  <text x="268" y="516">08</text>
                  <text x="292" y="516">2A</text>
                  <text x="316" y="516">86</text>
                  <text x="340" y="516">48</text>
                  <text x="364" y="516">CE</text>
                  <text x="388" y="516">3D</text>
                  <text x="412" y="516">04</text>
                  <text x="436" y="516">03</text>
                  <text x="460" y="516">03</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="228" y="532">Compressed</text>
                  <text x="312" y="532">signature</text>
                  <text x="376" y="532">value</text>
                  <text x="56" y="564">2</text>
                  <text x="104" y="564">Name:</text>
                  <text x="208" y="564">ECDSA</text>
                  <text x="252" y="564">with</text>
                  <text x="304" y="564">SHA-512</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="256" y="580">ecdsa-with-SHA512</text>
                  <text x="100" y="596">OID:</text>
                  <text x="264" y="596">1.2.840.10045.4.3.4</text>
                  <text x="128" y="612">Parameters:</text>
                  <text x="212" y="612">Absent</text>
                  <text x="100" y="628">DER:</text>
                  <text x="196" y="628">30</text>
                  <text x="220" y="628">0A</text>
                  <text x="244" y="628">06</text>
                  <text x="268" y="628">08</text>
                  <text x="292" y="628">2A</text>
                  <text x="316" y="628">86</text>
                  <text x="340" y="628">48</text>
                  <text x="364" y="628">CE</text>
                  <text x="388" y="628">3D</text>
                  <text x="412" y="628">04</text>
                  <text x="436" y="628">03</text>
                  <text x="460" y="628">04</text>
                  <text x="120" y="644">Comments:</text>
                  <text x="228" y="644">Compressed</text>
                  <text x="312" y="644">signature</text>
                  <text x="376" y="644">value</text>
                  <text x="56" y="676">3</text>
                  <text x="104" y="676">Name:</text>
                  <text x="208" y="676">ECDSA</text>
                  <text x="252" y="676">with</text>
                  <text x="308" y="676">SHAKE128</text>
                  <text x="132" y="692">Identifiers:</text>
                  <text x="276" y="692">id-ecdsa-with-shake128</text>
                  <text x="100" y="708">OID:</text>
                  <text x="260" y="708">1.3.6.1.5.5.7.6.32</text>
                  <text x="128" y="724">Parameters:</text>
                  <text x="212" y="724">Absent</text>
                  <text x="100" y="740">DER:</text>
                  <text x="196" y="740">30</text>
                  <text x="220" y="740">0A</text>
                  <text x="244" y="740">06</text>
                  <text x="268" y="740">08</text>
                  <text x="292" y="740">2B</text>
                  <text x="316" y="740">06</text>
                  <text x="340" y="740">01</text>
                  <text x="364" y="740">05</text>
                  <text x="388" y="740">05</text>
                  <text x="412" y="740">07</text>
                  <text x="436" y="740">06</text>
                  <text x="460" y="740">20</text>
                  <text x="120" y="756">Comments:</text>
                  <text x="228" y="756">Compressed</text>
                  <text x="312" y="756">signature</text>
                  <text x="376" y="756">value</text>
                  <text x="56" y="788">4</text>
                  <text x="104" y="788">Name:</text>
                  <text x="208" y="788">ECDSA</text>
                  <text x="252" y="788">with</text>
                  <text x="308" y="788">SHAKE256</text>
                  <text x="132" y="804">Identifiers:</text>
                  <text x="276" y="804">id-ecdsa-with-shake256</text>
                  <text x="100" y="820">OID:</text>
                  <text x="260" y="820">1.3.6.1.5.5.7.6.33</text>
                  <text x="128" y="836">Parameters:</text>
                  <text x="212" y="836">Absent</text>
                  <text x="100" y="852">DER:</text>
                  <text x="196" y="852">30</text>
                  <text x="220" y="852">0A</text>
                  <text x="244" y="852">06</text>
                  <text x="268" y="852">08</text>
                  <text x="292" y="852">2B</text>
                  <text x="316" y="852">06</text>
                  <text x="340" y="852">01</text>
                  <text x="364" y="852">05</text>
                  <text x="388" y="852">05</text>
                  <text x="412" y="852">07</text>
                  <text x="436" y="852">06</text>
                  <text x="460" y="852">21</text>
                  <text x="120" y="868">Comments:</text>
                  <text x="228" y="868">Compressed</text>
                  <text x="312" y="868">signature</text>
                  <text x="376" y="868">value</text>
                  <text x="52" y="900">12</text>
                  <text x="104" y="900">Name:</text>
                  <text x="216" y="900">Ed25519</text>
                  <text x="132" y="916">Identifiers:</text>
                  <text x="232" y="916">id-Ed25519,</text>
                  <text x="336" y="916">id-EdDSA25519</text>
                  <text x="100" y="932">OID:</text>
                  <text x="232" y="932">1.3.101.112</text>
                  <text x="128" y="948">Parameters:</text>
                  <text x="212" y="948">Absent</text>
                  <text x="100" y="964">DER:</text>
                  <text x="196" y="964">30</text>
                  <text x="220" y="964">05</text>
                  <text x="244" y="964">06</text>
                  <text x="268" y="964">03</text>
                  <text x="292" y="964">2B</text>
                  <text x="316" y="964">65</text>
                  <text x="340" y="964">70</text>
                  <text x="120" y="980">Comments:</text>
                  <text x="52" y="1012">13</text>
                  <text x="104" y="1012">Name:</text>
                  <text x="208" y="1012">Ed448</text>
                  <text x="132" y="1028">Identifiers:</text>
                  <text x="224" y="1028">id-Ed448,</text>
                  <text x="312" y="1028">id-EdDSA448</text>
                  <text x="100" y="1044">OID:</text>
                  <text x="232" y="1044">1.3.101.113</text>
                  <text x="128" y="1060">Parameters:</text>
                  <text x="212" y="1060">Absent</text>
                  <text x="100" y="1076">DER:</text>
                  <text x="196" y="1076">30</text>
                  <text x="220" y="1076">05</text>
                  <text x="244" y="1076">06</text>
                  <text x="268" y="1076">03</text>
                  <text x="292" y="1076">2B</text>
                  <text x="316" y="1076">65</text>
                  <text x="340" y="1076">71</text>
                  <text x="120" y="1092">Comments:</text>
                  <text x="52" y="1124">14</text>
                  <text x="104" y="1124">Name:</text>
                  <text x="200" y="1124">PoP</text>
                  <text x="236" y="1124">with</text>
                  <text x="288" y="1124">SHA-256</text>
                  <text x="336" y="1124">and</text>
                  <text x="400" y="1124">HMAC-SHA256</text>
                  <text x="132" y="1140">Identifiers:</text>
                  <text x="304" y="1140">sa-ecdhPop-sha256-hmac-sha256</text>
                  <text x="100" y="1156">OID:</text>
                  <text x="260" y="1156">1.3.6.1.5.5.7.6.26</text>
                  <text x="128" y="1172">Parameters:</text>
                  <text x="212" y="1172">Absent</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="196" y="1188">30</text>
                  <text x="220" y="1188">0A</text>
                  <text x="244" y="1188">06</text>
                  <text x="268" y="1188">08</text>
                  <text x="292" y="1188">2B</text>
                  <text x="316" y="1188">06</text>
                  <text x="340" y="1188">01</text>
                  <text x="364" y="1188">05</text>
                  <text x="388" y="1188">05</text>
                  <text x="412" y="1188">07</text>
                  <text x="436" y="1188">06</text>
                  <text x="460" y="1188">1A</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="264" y="1204">Proof-of-possession</text>
                  <text x="388" y="1204">algorithm,</text>
                  <text x="464" y="1204">indexed</text>
                  <text x="516" y="1204">with</text>
                  <text x="200" y="1220">KDF</text>
                  <text x="232" y="1220">and</text>
                  <text x="268" y="1220">MAC,</text>
                  <text x="304" y="1220">see</text>
                  <text x="336" y="1220">RFC</text>
                  <text x="376" y="1220">6955.</text>
                  <text x="436" y="1220">Requires</text>
                  <text x="232" y="1236">recipient's</text>
                  <text x="308" y="1236">public</text>
                  <text x="364" y="1236">static</text>
                  <text x="452" y="1236">Diffie-Hellman</text>
                  <text x="528" y="1236">key</text>
                  <text x="52" y="1268">15</text>
                  <text x="104" y="1268">Name:</text>
                  <text x="200" y="1268">PoP</text>
                  <text x="236" y="1268">with</text>
                  <text x="288" y="1268">SHA-384</text>
                  <text x="336" y="1268">and</text>
                  <text x="400" y="1268">HMAC-SHA384</text>
                  <text x="132" y="1284">Identifiers:</text>
                  <text x="304" y="1284">sa-ecdhPop-sha384-hmac-sha384</text>
                  <text x="100" y="1300">OID:</text>
                  <text x="260" y="1300">1.3.6.1.5.5.7.6.27</text>
                  <text x="128" y="1316">Parameters:</text>
                  <text x="212" y="1316">Absent</text>
                  <text x="100" y="1332">DER:</text>
                  <text x="196" y="1332">30</text>
                  <text x="220" y="1332">0A</text>
                  <text x="244" y="1332">06</text>
                  <text x="268" y="1332">08</text>
                  <text x="292" y="1332">2B</text>
                  <text x="316" y="1332">06</text>
                  <text x="340" y="1332">01</text>
                  <text x="364" y="1332">05</text>
                  <text x="388" y="1332">05</text>
                  <text x="412" y="1332">07</text>
                  <text x="436" y="1332">06</text>
                  <text x="460" y="1332">1B</text>
                  <text x="120" y="1348">Comments:</text>
                  <text x="264" y="1348">Proof-of-possession</text>
                  <text x="388" y="1348">algorithm,</text>
                  <text x="464" y="1348">indexed</text>
                  <text x="516" y="1348">with</text>
                  <text x="200" y="1364">KDF</text>
                  <text x="232" y="1364">and</text>
                  <text x="268" y="1364">MAC,</text>
                  <text x="304" y="1364">see</text>
                  <text x="336" y="1364">RFC</text>
                  <text x="376" y="1364">6955.</text>
                  <text x="436" y="1364">Requires</text>
                  <text x="232" y="1380">recipient's</text>
                  <text x="308" y="1380">public</text>
                  <text x="364" y="1380">static</text>
                  <text x="452" y="1380">Diffie-Hellman</text>
                  <text x="528" y="1380">key</text>
                  <text x="52" y="1412">16</text>
                  <text x="104" y="1412">Name:</text>
                  <text x="200" y="1412">PoP</text>
                  <text x="236" y="1412">with</text>
                  <text x="288" y="1412">SHA-512</text>
                  <text x="336" y="1412">and</text>
                  <text x="400" y="1412">HMAC-SHA512</text>
                  <text x="132" y="1428">Identifiers:</text>
                  <text x="304" y="1428">sa-ecdhPop-sha512-hmac-sha512</text>
                  <text x="100" y="1444">OID:</text>
                  <text x="260" y="1444">1.3.6.1.5.5.7.6.28</text>
                  <text x="128" y="1460">Parameters:</text>
                  <text x="212" y="1460">Absent</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="196" y="1476">30</text>
                  <text x="220" y="1476">0A</text>
                  <text x="244" y="1476">06</text>
                  <text x="268" y="1476">08</text>
                  <text x="292" y="1476">2B</text>
                  <text x="316" y="1476">06</text>
                  <text x="340" y="1476">01</text>
                  <text x="364" y="1476">05</text>
                  <text x="388" y="1476">05</text>
                  <text x="412" y="1476">07</text>
                  <text x="436" y="1476">06</text>
                  <text x="460" y="1476">1C</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="264" y="1492">Proof-of-possession</text>
                  <text x="388" y="1492">algorithm,</text>
                  <text x="464" y="1492">indexed</text>
                  <text x="516" y="1492">with</text>
                  <text x="200" y="1508">KDF</text>
                  <text x="232" y="1508">and</text>
                  <text x="268" y="1508">MAC,</text>
                  <text x="304" y="1508">see</text>
                  <text x="336" y="1508">RFC</text>
                  <text x="376" y="1508">6955.</text>
                  <text x="436" y="1508">Requires</text>
                  <text x="232" y="1524">recipient's</text>
                  <text x="308" y="1524">public</text>
                  <text x="364" y="1524">static</text>
                  <text x="452" y="1524">Diffie-Hellman</text>
                  <text x="528" y="1524">key</text>
                  <text x="52" y="1556">23</text>
                  <text x="104" y="1556">Name:</text>
                  <text x="256" y="1556">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1556">with</text>
                  <text x="400" y="1556">SHA-256</text>
                  <text x="132" y="1572">Identifiers:</text>
                  <text x="280" y="1572">sha256WithRSAEncryption</text>
                  <text x="100" y="1588">OID:</text>
                  <text x="272" y="1588">1.2.840.113549.1.1.11</text>
                  <text x="128" y="1604">Parameters:</text>
                  <text x="204" y="1604">NULL</text>
                  <text x="100" y="1620">DER:</text>
                  <text x="196" y="1620">30</text>
                  <text x="220" y="1620">0B</text>
                  <text x="244" y="1620">06</text>
                  <text x="268" y="1620">09</text>
                  <text x="292" y="1620">2A</text>
                  <text x="316" y="1620">86</text>
                  <text x="340" y="1620">48</text>
                  <text x="364" y="1620">86</text>
                  <text x="388" y="1620">F7</text>
                  <text x="412" y="1620">0D</text>
                  <text x="436" y="1620">01</text>
                  <text x="460" y="1620">01</text>
                  <text x="484" y="1620">0B</text>
                  <text x="508" y="1620">05</text>
                  <text x="532" y="1620">00</text>
                  <text x="120" y="1636">Comments:</text>
                  <text x="52" y="1668">24</text>
                  <text x="104" y="1668">Name:</text>
                  <text x="256" y="1668">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1668">with</text>
                  <text x="400" y="1668">SHA-384</text>
                  <text x="132" y="1684">Identifiers:</text>
                  <text x="280" y="1684">sha384WithRSAEncryption</text>
                  <text x="100" y="1700">OID:</text>
                  <text x="272" y="1700">1.2.840.113549.1.1.12</text>
                  <text x="128" y="1716">Parameters:</text>
                  <text x="204" y="1716">NULL</text>
                  <text x="100" y="1732">DER:</text>
                  <text x="196" y="1732">30</text>
                  <text x="220" y="1732">0B</text>
                  <text x="244" y="1732">06</text>
                  <text x="268" y="1732">09</text>
                  <text x="292" y="1732">2A</text>
                  <text x="316" y="1732">86</text>
                  <text x="340" y="1732">48</text>
                  <text x="364" y="1732">86</text>
                  <text x="388" y="1732">F7</text>
                  <text x="412" y="1732">0D</text>
                  <text x="436" y="1732">01</text>
                  <text x="460" y="1732">01</text>
                  <text x="484" y="1732">0C</text>
                  <text x="508" y="1732">05</text>
                  <text x="532" y="1732">00</text>
                  <text x="120" y="1748">Comments:</text>
                  <text x="52" y="1780">25</text>
                  <text x="104" y="1780">Name:</text>
                  <text x="256" y="1780">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1780">with</text>
                  <text x="400" y="1780">SHA-512</text>
                  <text x="132" y="1796">Identifiers:</text>
                  <text x="280" y="1796">sha512WithRSAEncryption</text>
                  <text x="100" y="1812">OID:</text>
                  <text x="272" y="1812">1.2.840.113549.1.1.13</text>
                  <text x="128" y="1828">Parameters:</text>
                  <text x="204" y="1828">NULL</text>
                  <text x="100" y="1844">DER:</text>
                  <text x="196" y="1844">30</text>
                  <text x="220" y="1844">0B</text>
                  <text x="244" y="1844">06</text>
                  <text x="268" y="1844">09</text>
                  <text x="292" y="1844">2A</text>
                  <text x="316" y="1844">86</text>
                  <text x="340" y="1844">48</text>
                  <text x="364" y="1844">86</text>
                  <text x="388" y="1844">F7</text>
                  <text x="412" y="1844">0D</text>
                  <text x="436" y="1844">01</text>
                  <text x="460" y="1844">01</text>
                  <text x="484" y="1844">0D</text>
                  <text x="508" y="1844">05</text>
                  <text x="532" y="1844">00</text>
                  <text x="120" y="1860">Comments:</text>
                  <text x="52" y="1892">26</text>
                  <text x="104" y="1892">Name:</text>
                  <text x="228" y="1892">RSASSA-PSS</text>
                  <text x="292" y="1892">with</text>
                  <text x="344" y="1892">SHA-256</text>
                  <text x="132" y="1908">Identifiers:</text>
                  <text x="232" y="1908">rsassa-pss,</text>
                  <text x="336" y="1908">id-RSASSA-PSS</text>
                  <text x="100" y="1924">OID:</text>
                  <text x="272" y="1924">1.2.840.113549.1.1.10</text>
                  <text x="128" y="1940">Parameters:</text>
                  <text x="220" y="1940">SHA-256,</text>
                  <text x="280" y="1940">MGF-1</text>
                  <text x="324" y="1940">with</text>
                  <text x="380" y="1940">SHA-256,</text>
                  <text x="460" y="1940">saltLength</text>
                  <text x="512" y="1940">=</text>
                  <text x="532" y="1940">32</text>
                  <text x="100" y="1956">DER:</text>
                  <text x="196" y="1956">30</text>
                  <text x="220" y="1956">41</text>
                  <text x="244" y="1956">06</text>
                  <text x="268" y="1956">09</text>
                  <text x="292" y="1956">2A</text>
                  <text x="316" y="1956">86</text>
                  <text x="340" y="1956">48</text>
                  <text x="364" y="1956">86</text>
                  <text x="388" y="1956">F7</text>
                  <text x="412" y="1956">0D</text>
                  <text x="436" y="1956">01</text>
                  <text x="460" y="1956">01</text>
                  <text x="484" y="1956">0A</text>
                  <text x="508" y="1956">30</text>
                  <text x="532" y="1956">34</text>
                  <text x="196" y="1972">A0</text>
                  <text x="220" y="1972">0F</text>
                  <text x="244" y="1972">30</text>
                  <text x="268" y="1972">0D</text>
                  <text x="292" y="1972">06</text>
                  <text x="316" y="1972">09</text>
                  <text x="340" y="1972">60</text>
                  <text x="364" y="1972">86</text>
                  <text x="388" y="1972">48</text>
                  <text x="412" y="1972">01</text>
                  <text x="436" y="1972">65</text>
                  <text x="460" y="1972">03</text>
                  <text x="484" y="1972">04</text>
                  <text x="508" y="1972">02</text>
                  <text x="532" y="1972">01</text>
                  <text x="196" y="1988">05</text>
                  <text x="220" y="1988">00</text>
                  <text x="244" y="1988">A1</text>
                  <text x="268" y="1988">1C</text>
                  <text x="292" y="1988">30</text>
                  <text x="316" y="1988">1A</text>
                  <text x="340" y="1988">06</text>
                  <text x="364" y="1988">09</text>
                  <text x="388" y="1988">2A</text>
                  <text x="412" y="1988">86</text>
                  <text x="436" y="1988">48</text>
                  <text x="460" y="1988">86</text>
                  <text x="484" y="1988">F7</text>
                  <text x="508" y="1988">0D</text>
                  <text x="532" y="1988">01</text>
                  <text x="196" y="2004">01</text>
                  <text x="220" y="2004">08</text>
                  <text x="244" y="2004">30</text>
                  <text x="268" y="2004">0D</text>
                  <text x="292" y="2004">06</text>
                  <text x="316" y="2004">09</text>
                  <text x="340" y="2004">60</text>
                  <text x="364" y="2004">86</text>
                  <text x="388" y="2004">48</text>
                  <text x="412" y="2004">01</text>
                  <text x="436" y="2004">65</text>
                  <text x="460" y="2004">03</text>
                  <text x="484" y="2004">04</text>
                  <text x="508" y="2004">02</text>
                  <text x="532" y="2004">01</text>
                  <text x="196" y="2020">05</text>
                  <text x="220" y="2020">00</text>
                  <text x="244" y="2020">a2</text>
                  <text x="268" y="2020">03</text>
                  <text x="292" y="2020">02</text>
                  <text x="316" y="2020">01</text>
                  <text x="340" y="2020">20</text>
                  <text x="120" y="2036">Comments:</text>
                  <text x="52" y="2068">27</text>
                  <text x="104" y="2068">Name:</text>
                  <text x="228" y="2068">RSASSA-PSS</text>
                  <text x="292" y="2068">with</text>
                  <text x="344" y="2068">SHA-384</text>
                  <text x="132" y="2084">Identifiers:</text>
                  <text x="232" y="2084">rsassa-pss,</text>
                  <text x="336" y="2084">id-RSASSA-PSS</text>
                  <text x="100" y="2100">OID:</text>
                  <text x="272" y="2100">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2116">Parameters:</text>
                  <text x="220" y="2116">SHA-384,</text>
                  <text x="280" y="2116">MGF-1</text>
                  <text x="324" y="2116">with</text>
                  <text x="380" y="2116">SHA-384,</text>
                  <text x="460" y="2116">saltLength</text>
                  <text x="512" y="2116">=</text>
                  <text x="532" y="2116">48</text>
                  <text x="100" y="2132">DER:</text>
                  <text x="196" y="2132">30</text>
                  <text x="220" y="2132">41</text>
                  <text x="244" y="2132">06</text>
                  <text x="268" y="2132">09</text>
                  <text x="292" y="2132">2A</text>
                  <text x="316" y="2132">86</text>
                  <text x="340" y="2132">48</text>
                  <text x="364" y="2132">86</text>
                  <text x="388" y="2132">F7</text>
                  <text x="412" y="2132">0D</text>
                  <text x="436" y="2132">01</text>
                  <text x="460" y="2132">01</text>
                  <text x="484" y="2132">0A</text>
                  <text x="508" y="2132">30</text>
                  <text x="532" y="2132">34</text>
                  <text x="196" y="2148">A0</text>
                  <text x="220" y="2148">0F</text>
                  <text x="244" y="2148">30</text>
                  <text x="268" y="2148">0D</text>
                  <text x="292" y="2148">06</text>
                  <text x="316" y="2148">09</text>
                  <text x="340" y="2148">60</text>
                  <text x="364" y="2148">86</text>
                  <text x="388" y="2148">48</text>
                  <text x="412" y="2148">01</text>
                  <text x="436" y="2148">65</text>
                  <text x="460" y="2148">03</text>
                  <text x="484" y="2148">04</text>
                  <text x="508" y="2148">02</text>
                  <text x="532" y="2148">02</text>
                  <text x="196" y="2164">05</text>
                  <text x="220" y="2164">00</text>
                  <text x="244" y="2164">A1</text>
                  <text x="268" y="2164">1C</text>
                  <text x="292" y="2164">30</text>
                  <text x="316" y="2164">1A</text>
                  <text x="340" y="2164">06</text>
                  <text x="364" y="2164">09</text>
                  <text x="388" y="2164">2A</text>
                  <text x="412" y="2164">86</text>
                  <text x="436" y="2164">48</text>
                  <text x="460" y="2164">86</text>
                  <text x="484" y="2164">F7</text>
                  <text x="508" y="2164">0D</text>
                  <text x="532" y="2164">01</text>
                  <text x="196" y="2180">01</text>
                  <text x="220" y="2180">08</text>
                  <text x="244" y="2180">30</text>
                  <text x="268" y="2180">0D</text>
                  <text x="292" y="2180">06</text>
                  <text x="316" y="2180">09</text>
                  <text x="340" y="2180">60</text>
                  <text x="364" y="2180">86</text>
                  <text x="388" y="2180">48</text>
                  <text x="412" y="2180">01</text>
                  <text x="436" y="2180">65</text>
                  <text x="460" y="2180">03</text>
                  <text x="484" y="2180">04</text>
                  <text x="508" y="2180">02</text>
                  <text x="532" y="2180">02</text>
                  <text x="196" y="2196">05</text>
                  <text x="220" y="2196">00</text>
                  <text x="244" y="2196">A2</text>
                  <text x="268" y="2196">03</text>
                  <text x="292" y="2196">02</text>
                  <text x="316" y="2196">01</text>
                  <text x="340" y="2196">30</text>
                  <text x="120" y="2212">Comments:</text>
                  <text x="52" y="2244">28</text>
                  <text x="104" y="2244">Name:</text>
                  <text x="228" y="2244">RSASSA-PSS</text>
                  <text x="292" y="2244">with</text>
                  <text x="344" y="2244">SHA-512</text>
                  <text x="132" y="2260">Identifiers:</text>
                  <text x="232" y="2260">rsassa-pss,</text>
                  <text x="336" y="2260">id-RSASSA-PSS</text>
                  <text x="100" y="2276">OID:</text>
                  <text x="272" y="2276">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2292">Parameters:</text>
                  <text x="220" y="2292">SHA-512,</text>
                  <text x="280" y="2292">MGF-1</text>
                  <text x="324" y="2292">with</text>
                  <text x="380" y="2292">SHA-512,</text>
                  <text x="460" y="2292">saltLength</text>
                  <text x="512" y="2292">=</text>
                  <text x="532" y="2292">64</text>
                  <text x="100" y="2308">DER:</text>
                  <text x="196" y="2308">30</text>
                  <text x="220" y="2308">41</text>
                  <text x="244" y="2308">06</text>
                  <text x="268" y="2308">09</text>
                  <text x="292" y="2308">2A</text>
                  <text x="316" y="2308">86</text>
                  <text x="340" y="2308">48</text>
                  <text x="364" y="2308">86</text>
                  <text x="388" y="2308">F7</text>
                  <text x="412" y="2308">0D</text>
                  <text x="436" y="2308">01</text>
                  <text x="460" y="2308">01</text>
                  <text x="484" y="2308">0A</text>
                  <text x="508" y="2308">30</text>
                  <text x="532" y="2308">34</text>
                  <text x="196" y="2324">A0</text>
                  <text x="220" y="2324">0F</text>
                  <text x="244" y="2324">30</text>
                  <text x="268" y="2324">0D</text>
                  <text x="292" y="2324">06</text>
                  <text x="316" y="2324">09</text>
                  <text x="340" y="2324">60</text>
                  <text x="364" y="2324">86</text>
                  <text x="388" y="2324">48</text>
                  <text x="412" y="2324">01</text>
                  <text x="436" y="2324">65</text>
                  <text x="460" y="2324">03</text>
                  <text x="484" y="2324">04</text>
                  <text x="508" y="2324">02</text>
                  <text x="532" y="2324">03</text>
                  <text x="196" y="2340">05</text>
                  <text x="220" y="2340">00</text>
                  <text x="244" y="2340">A1</text>
                  <text x="268" y="2340">1C</text>
                  <text x="292" y="2340">30</text>
                  <text x="316" y="2340">1A</text>
                  <text x="340" y="2340">06</text>
                  <text x="364" y="2340">09</text>
                  <text x="388" y="2340">2A</text>
                  <text x="412" y="2340">86</text>
                  <text x="436" y="2340">48</text>
                  <text x="460" y="2340">86</text>
                  <text x="484" y="2340">F7</text>
                  <text x="508" y="2340">0D</text>
                  <text x="532" y="2340">01</text>
                  <text x="196" y="2356">01</text>
                  <text x="220" y="2356">08</text>
                  <text x="244" y="2356">30</text>
                  <text x="268" y="2356">0D</text>
                  <text x="292" y="2356">06</text>
                  <text x="316" y="2356">09</text>
                  <text x="340" y="2356">60</text>
                  <text x="364" y="2356">86</text>
                  <text x="388" y="2356">48</text>
                  <text x="412" y="2356">01</text>
                  <text x="436" y="2356">65</text>
                  <text x="460" y="2356">03</text>
                  <text x="484" y="2356">04</text>
                  <text x="508" y="2356">02</text>
                  <text x="532" y="2356">03</text>
                  <text x="196" y="2372">05</text>
                  <text x="220" y="2372">00</text>
                  <text x="244" y="2372">A2</text>
                  <text x="268" y="2372">03</text>
                  <text x="292" y="2372">02</text>
                  <text x="316" y="2372">01</text>
                  <text x="340" y="2372">40</text>
                  <text x="120" y="2388">Comments:</text>
                  <text x="52" y="2420">29</text>
                  <text x="104" y="2420">Name:</text>
                  <text x="228" y="2420">RSASSA-PSS</text>
                  <text x="292" y="2420">with</text>
                  <text x="348" y="2420">SHAKE128</text>
                  <text x="132" y="2436">Identifiers:</text>
                  <text x="276" y="2436">id-RSASSA-PSS-SHAKE128</text>
                  <text x="100" y="2452">OID:</text>
                  <text x="260" y="2452">1.3.6.1.5.5.7.6.30</text>
                  <text x="128" y="2468">Parameters:</text>
                  <text x="212" y="2468">Absent</text>
                  <text x="100" y="2484">DER:</text>
                  <text x="196" y="2484">30</text>
                  <text x="220" y="2484">0A</text>
                  <text x="244" y="2484">06</text>
                  <text x="268" y="2484">08</text>
                  <text x="292" y="2484">2B</text>
                  <text x="316" y="2484">06</text>
                  <text x="340" y="2484">01</text>
                  <text x="364" y="2484">05</text>
                  <text x="388" y="2484">05</text>
                  <text x="412" y="2484">07</text>
                  <text x="436" y="2484">06</text>
                  <text x="460" y="2484">1E</text>
                  <text x="120" y="2500">Comments:</text>
                  <text x="52" y="2532">30</text>
                  <text x="104" y="2532">Name:</text>
                  <text x="228" y="2532">RSASSA-PSS</text>
                  <text x="292" y="2532">with</text>
                  <text x="348" y="2532">SHAKE256</text>
                  <text x="132" y="2548">Identifiers:</text>
                  <text x="276" y="2548">id-RSASSA-PSS-SHAKE256</text>
                  <text x="100" y="2564">OID:</text>
                  <text x="260" y="2564">1.3.6.1.5.5.7.6.31</text>
                  <text x="128" y="2580">Parameters:</text>
                  <text x="212" y="2580">Absent</text>
                  <text x="100" y="2596">DER:</text>
                  <text x="196" y="2596">30</text>
                  <text x="220" y="2596">0A</text>
                  <text x="244" y="2596">06</text>
                  <text x="268" y="2596">08</text>
                  <text x="292" y="2596">2B</text>
                  <text x="316" y="2596">06</text>
                  <text x="340" y="2596">01</text>
                  <text x="364" y="2596">05</text>
                  <text x="388" y="2596">05</text>
                  <text x="412" y="2596">07</text>
                  <text x="436" y="2596">06</text>
                  <text x="460" y="2596">1F</text>
                  <text x="120" y="2612">Comments:</text>
                  <text x="52" y="2644">45</text>
                  <text x="104" y="2644">Name:</text>
                  <text x="200" y="2644">SM2</text>
                  <text x="236" y="2644">with</text>
                  <text x="272" y="2644">SM3</text>
                  <text x="132" y="2660">Identifiers:</text>
                  <text x="236" y="2660">sm2-with-sm3</text>
                  <text x="100" y="2676">OID:</text>
                  <text x="264" y="2676">1.2.156.10197.1.501</text>
                  <text x="128" y="2692">Parameters:</text>
                  <text x="212" y="2692">Absent</text>
                  <text x="100" y="2708">DER:</text>
                  <text x="196" y="2708">30</text>
                  <text x="220" y="2708">0A</text>
                  <text x="244" y="2708">06</text>
                  <text x="268" y="2708">08</text>
                  <text x="292" y="2708">2A</text>
                  <text x="316" y="2708">81</text>
                  <text x="340" y="2708">1C</text>
                  <text x="364" y="2708">CF</text>
                  <text x="388" y="2708">55</text>
                  <text x="412" y="2708">01</text>
                  <text x="436" y="2708">83</text>
                  <text x="460" y="2708">75</text>
                  <text x="120" y="2724">Comments:</text>
                  <text x="228" y="2724">Compressed</text>
                  <text x="312" y="2724">signature</text>
                  <text x="376" y="2724">value</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        PoP with SHA-256 and HMAC-SHA256             |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    15 | Name:        PoP with SHA-384 and HMAC-SHA384             |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    16 | Name:        PoP with SHA-512 and HMAC-SHA512             |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    45 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1872" width="560" viewBox="0 0 560 1872" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1856" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1856" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,464 L 552,464" fill="none" stroke="black"/>
                <path d="M 8,608 L 552,608" fill="none" stroke="black"/>
                <path d="M 8,720 L 552,720" fill="none" stroke="black"/>
                <path d="M 8,832 L 552,832" fill="none" stroke="black"/>
                <path d="M 8,944 L 552,944" fill="none" stroke="black"/>
                <path d="M 8,1056 L 552,1056" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1376 L 552,1376" fill="none" stroke="black"/>
                <path d="M 8,1536 L 552,1536" fill="none" stroke="black"/>
                <path d="M 8,1696 L 552,1696" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="104" y="52">X.509</text>
                  <text x="156" y="52">Public</text>
                  <text x="200" y="52">Key</text>
                  <text x="260" y="52">Algorithms</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="200" y="84">RSA</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="240" y="100">rsaEncryption</text>
                  <text x="100" y="116">OID:</text>
                  <text x="268" y="116">1.2.840.113549.1.1.1</text>
                  <text x="128" y="132">Parameters:</text>
                  <text x="204" y="132">NULL</text>
                  <text x="100" y="148">DER:</text>
                  <text x="196" y="148">30</text>
                  <text x="220" y="148">0d</text>
                  <text x="244" y="148">06</text>
                  <text x="268" y="148">09</text>
                  <text x="292" y="148">2a</text>
                  <text x="316" y="148">86</text>
                  <text x="340" y="148">48</text>
                  <text x="364" y="148">86</text>
                  <text x="388" y="148">f7</text>
                  <text x="412" y="148">0d</text>
                  <text x="436" y="148">01</text>
                  <text x="460" y="148">01</text>
                  <text x="484" y="148">01</text>
                  <text x="508" y="148">05</text>
                  <text x="532" y="148">00</text>
                  <text x="120" y="164">Comments:</text>
                  <text x="228" y="164">Compressed</text>
                  <text x="340" y="164">subjectPublicKey</text>
                  <text x="56" y="196">1</text>
                  <text x="104" y="196">Name:</text>
                  <text x="196" y="196">EC</text>
                  <text x="236" y="196">Public</text>
                  <text x="280" y="196">Key</text>
                  <text x="348" y="196">(Weierstraß)</text>
                  <text x="420" y="196">with</text>
                  <text x="480" y="196">secp256r1</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="236" y="212">ecPublicKey,</text>
                  <text x="348" y="212">id-ecPublicKey</text>
                  <text x="100" y="228">OID:</text>
                  <text x="256" y="228">1.2.840.10045.2.1</text>
                  <text x="128" y="244">Parameters:</text>
                  <text x="228" y="244">namedCurve</text>
                  <text x="280" y="244">=</text>
                  <text x="328" y="244">secp256r1</text>
                  <text x="456" y="244">(1.2.840.10045.3.1.7)</text>
                  <text x="100" y="260">DER:</text>
                  <text x="196" y="260">30</text>
                  <text x="220" y="260">13</text>
                  <text x="244" y="260">06</text>
                  <text x="268" y="260">07</text>
                  <text x="292" y="260">2A</text>
                  <text x="316" y="260">86</text>
                  <text x="340" y="260">48</text>
                  <text x="364" y="260">CE</text>
                  <text x="388" y="260">3D</text>
                  <text x="412" y="260">02</text>
                  <text x="436" y="260">01</text>
                  <text x="460" y="260">06</text>
                  <text x="484" y="260">08</text>
                  <text x="508" y="260">2A</text>
                  <text x="532" y="260">86</text>
                  <text x="196" y="276">48</text>
                  <text x="220" y="276">CE</text>
                  <text x="244" y="276">3D</text>
                  <text x="268" y="276">03</text>
                  <text x="292" y="276">01</text>
                  <text x="316" y="276">07</text>
                  <text x="120" y="292">Comments:</text>
                  <text x="228" y="292">Compressed</text>
                  <text x="340" y="292">subjectPublicKey</text>
                  <text x="204" y="308">Also</text>
                  <text x="248" y="308">known</text>
                  <text x="284" y="308">as</text>
                  <text x="324" y="308">P-256,</text>
                  <text x="400" y="308">ansip256r1,</text>
                  <text x="492" y="308">prime256v1</text>
                  <text x="56" y="340">2</text>
                  <text x="104" y="340">Name:</text>
                  <text x="196" y="340">EC</text>
                  <text x="236" y="340">Public</text>
                  <text x="280" y="340">Key</text>
                  <text x="348" y="340">(Weierstraß)</text>
                  <text x="420" y="340">with</text>
                  <text x="480" y="340">secp384r1</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="236" y="356">ecPublicKey,</text>
                  <text x="348" y="356">id-ecPublicKey</text>
                  <text x="100" y="372">OID:</text>
                  <text x="256" y="372">1.2.840.10045.2.1</text>
                  <text x="128" y="388">Parameters:</text>
                  <text x="228" y="388">namedCurve</text>
                  <text x="280" y="388">=</text>
                  <text x="328" y="388">secp384r1</text>
                  <text x="428" y="388">(1.3.132.0.34)</text>
                  <text x="100" y="404">DER:</text>
                  <text x="196" y="404">30</text>
                  <text x="220" y="404">10</text>
                  <text x="244" y="404">06</text>
                  <text x="268" y="404">07</text>
                  <text x="292" y="404">2A</text>
                  <text x="316" y="404">86</text>
                  <text x="340" y="404">48</text>
                  <text x="364" y="404">CE</text>
                  <text x="388" y="404">3D</text>
                  <text x="412" y="404">02</text>
                  <text x="436" y="404">01</text>
                  <text x="460" y="404">06</text>
                  <text x="484" y="404">05</text>
                  <text x="508" y="404">2B</text>
                  <text x="532" y="404">81</text>
                  <text x="196" y="420">04</text>
                  <text x="220" y="420">00</text>
                  <text x="244" y="420">22</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="228" y="436">Compressed</text>
                  <text x="340" y="436">subjectPublicKey</text>
                  <text x="204" y="452">Also</text>
                  <text x="248" y="452">known</text>
                  <text x="284" y="452">as</text>
                  <text x="324" y="452">P-384,</text>
                  <text x="396" y="452">ansip384r1</text>
                  <text x="56" y="484">3</text>
                  <text x="104" y="484">Name:</text>
                  <text x="196" y="484">EC</text>
                  <text x="236" y="484">Public</text>
                  <text x="280" y="484">Key</text>
                  <text x="348" y="484">(Weierstraß)</text>
                  <text x="420" y="484">with</text>
                  <text x="480" y="484">secp521r1</text>
                  <text x="132" y="500">Identifiers:</text>
                  <text x="236" y="500">ecPublicKey,</text>
                  <text x="348" y="500">id-ecPublicKey</text>
                  <text x="100" y="516">OID:</text>
                  <text x="256" y="516">1.2.840.10045.2.1</text>
                  <text x="128" y="532">Parameters:</text>
                  <text x="228" y="532">namedCurve</text>
                  <text x="280" y="532">=</text>
                  <text x="328" y="532">secp521r1</text>
                  <text x="428" y="532">(1.3.132.0.35)</text>
                  <text x="100" y="548">DER:</text>
                  <text x="196" y="548">30</text>
                  <text x="220" y="548">10</text>
                  <text x="244" y="548">06</text>
                  <text x="268" y="548">07</text>
                  <text x="292" y="548">2A</text>
                  <text x="316" y="548">86</text>
                  <text x="340" y="548">48</text>
                  <text x="364" y="548">CE</text>
                  <text x="388" y="548">3D</text>
                  <text x="412" y="548">02</text>
                  <text x="436" y="548">01</text>
                  <text x="460" y="548">06</text>
                  <text x="484" y="548">05</text>
                  <text x="508" y="548">2B</text>
                  <text x="532" y="548">81</text>
                  <text x="196" y="564">04</text>
                  <text x="220" y="564">00</text>
                  <text x="244" y="564">23</text>
                  <text x="120" y="580">Comments:</text>
                  <text x="228" y="580">Compressed</text>
                  <text x="340" y="580">subjectPublicKey</text>
                  <text x="204" y="596">Also</text>
                  <text x="248" y="596">known</text>
                  <text x="284" y="596">as</text>
                  <text x="324" y="596">P-521,</text>
                  <text x="396" y="596">ansip521r1</text>
                  <text x="56" y="628">8</text>
                  <text x="104" y="628">Name:</text>
                  <text x="212" y="628">X25519</text>
                  <text x="292" y="628">(Montgomery)</text>
                  <text x="132" y="644">Identifiers:</text>
                  <text x="224" y="644">id-X25519</text>
                  <text x="100" y="660">OID:</text>
                  <text x="232" y="660">1.3.101.110</text>
                  <text x="128" y="676">Parameters:</text>
                  <text x="212" y="676">Absent</text>
                  <text x="100" y="692">DER:</text>
                  <text x="196" y="692">30</text>
                  <text x="220" y="692">05</text>
                  <text x="244" y="692">06</text>
                  <text x="268" y="692">03</text>
                  <text x="292" y="692">2B</text>
                  <text x="316" y="692">65</text>
                  <text x="340" y="692">6E</text>
                  <text x="120" y="708">Comments:</text>
                  <text x="56" y="740">9</text>
                  <text x="104" y="740">Name:</text>
                  <text x="204" y="740">X448</text>
                  <text x="276" y="740">(Montgomery)</text>
                  <text x="132" y="756">Identifiers:</text>
                  <text x="216" y="756">id-X448</text>
                  <text x="100" y="772">OID:</text>
                  <text x="232" y="772">1.3.101.111</text>
                  <text x="128" y="788">Parameters:</text>
                  <text x="212" y="788">Absent</text>
                  <text x="100" y="804">DER:</text>
                  <text x="196" y="804">30</text>
                  <text x="220" y="804">05</text>
                  <text x="244" y="804">06</text>
                  <text x="268" y="804">03</text>
                  <text x="292" y="804">2B</text>
                  <text x="316" y="804">65</text>
                  <text x="340" y="804">6F</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="52" y="852">10</text>
                  <text x="104" y="852">Name:</text>
                  <text x="216" y="852">Ed25519</text>
                  <text x="284" y="852">(Twisted</text>
                  <text x="356" y="852">Edwards)</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="232" y="868">id-Ed25519,</text>
                  <text x="336" y="868">id-EdDSA25519</text>
                  <text x="100" y="884">OID:</text>
                  <text x="232" y="884">1.3.101.112</text>
                  <text x="128" y="900">Parameters:</text>
                  <text x="212" y="900">Absent</text>
                  <text x="100" y="916">DER:</text>
                  <text x="196" y="916">30</text>
                  <text x="220" y="916">05</text>
                  <text x="244" y="916">06</text>
                  <text x="268" y="916">03</text>
                  <text x="292" y="916">2B</text>
                  <text x="316" y="916">65</text>
                  <text x="340" y="916">70</text>
                  <text x="120" y="932">Comments:</text>
                  <text x="52" y="964">11</text>
                  <text x="104" y="964">Name:</text>
                  <text x="208" y="964">Ed448</text>
                  <text x="272" y="964">(Edwards)</text>
                  <text x="132" y="980">Identifiers:</text>
                  <text x="224" y="980">id-Ed448,</text>
                  <text x="312" y="980">id-EdDSA448</text>
                  <text x="100" y="996">OID:</text>
                  <text x="232" y="996">1.3.101.113</text>
                  <text x="128" y="1012">Parameters:</text>
                  <text x="212" y="1012">Absent</text>
                  <text x="100" y="1028">DER:</text>
                  <text x="196" y="1028">30</text>
                  <text x="220" y="1028">05</text>
                  <text x="244" y="1028">06</text>
                  <text x="268" y="1028">03</text>
                  <text x="292" y="1028">2B</text>
                  <text x="316" y="1028">65</text>
                  <text x="340" y="1028">71</text>
                  <text x="120" y="1044">Comments:</text>
                  <text x="52" y="1076">24</text>
                  <text x="104" y="1076">Name:</text>
                  <text x="196" y="1076">EC</text>
                  <text x="236" y="1076">Public</text>
                  <text x="280" y="1076">Key</text>
                  <text x="348" y="1076">(Weierstraß)</text>
                  <text x="420" y="1076">with</text>
                  <text x="248" y="1092">brainpoolP256r1</text>
                  <text x="132" y="1108">Identifiers:</text>
                  <text x="236" y="1108">ecPublicKey,</text>
                  <text x="348" y="1108">id-ecPublicKey</text>
                  <text x="100" y="1124">OID:</text>
                  <text x="256" y="1124">1.2.840.10045.2.1</text>
                  <text x="128" y="1140">Parameters:</text>
                  <text x="228" y="1140">namedCurve</text>
                  <text x="280" y="1140">=</text>
                  <text x="352" y="1140">brainpoolP256r1</text>
                  <text x="276" y="1156">(1.3.36.3.3.2.8.1.1.7)</text>
                  <text x="100" y="1172">DER:</text>
                  <text x="196" y="1172">30</text>
                  <text x="220" y="1172">14</text>
                  <text x="244" y="1172">06</text>
                  <text x="268" y="1172">07</text>
                  <text x="292" y="1172">2A</text>
                  <text x="316" y="1172">86</text>
                  <text x="340" y="1172">48</text>
                  <text x="364" y="1172">CE</text>
                  <text x="388" y="1172">3D</text>
                  <text x="412" y="1172">02</text>
                  <text x="436" y="1172">01</text>
                  <text x="460" y="1172">06</text>
                  <text x="484" y="1172">09</text>
                  <text x="508" y="1172">2B</text>
                  <text x="532" y="1172">24</text>
                  <text x="196" y="1188">03</text>
                  <text x="220" y="1188">03</text>
                  <text x="244" y="1188">02</text>
                  <text x="268" y="1188">08</text>
                  <text x="292" y="1188">01</text>
                  <text x="316" y="1188">01</text>
                  <text x="340" y="1188">07</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="228" y="1204">Compressed</text>
                  <text x="340" y="1204">subjectPublicKey</text>
                  <text x="52" y="1236">25</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="196" y="1236">EC</text>
                  <text x="236" y="1236">Public</text>
                  <text x="280" y="1236">Key</text>
                  <text x="348" y="1236">(Weierstraß)</text>
                  <text x="420" y="1236">with</text>
                  <text x="248" y="1252">brainpoolP384r1</text>
                  <text x="132" y="1268">Identifiers:</text>
                  <text x="236" y="1268">ecPublicKey,</text>
                  <text x="348" y="1268">id-ecPublicKey</text>
                  <text x="100" y="1284">OID:</text>
                  <text x="256" y="1284">1.2.840.10045.2.1</text>
                  <text x="128" y="1300">Parameters:</text>
                  <text x="228" y="1300">namedCurve</text>
                  <text x="280" y="1300">=</text>
                  <text x="352" y="1300">brainpoolP384r1</text>
                  <text x="280" y="1316">(1.3.36.3.3.2.8.1.1.11)</text>
                  <text x="100" y="1332">DER:</text>
                  <text x="196" y="1332">30</text>
                  <text x="220" y="1332">14</text>
                  <text x="244" y="1332">06</text>
                  <text x="268" y="1332">07</text>
                  <text x="292" y="1332">2A</text>
                  <text x="316" y="1332">86</text>
                  <text x="340" y="1332">48</text>
                  <text x="364" y="1332">CE</text>
                  <text x="388" y="1332">3D</text>
                  <text x="412" y="1332">02</text>
                  <text x="436" y="1332">01</text>
                  <text x="460" y="1332">06</text>
                  <text x="484" y="1332">09</text>
                  <text x="508" y="1332">2B</text>
                  <text x="532" y="1332">24</text>
                  <text x="196" y="1348">03</text>
                  <text x="220" y="1348">03</text>
                  <text x="244" y="1348">02</text>
                  <text x="268" y="1348">08</text>
                  <text x="292" y="1348">01</text>
                  <text x="316" y="1348">01</text>
                  <text x="340" y="1348">0B</text>
                  <text x="120" y="1364">Comments:</text>
                  <text x="228" y="1364">Compressed</text>
                  <text x="340" y="1364">subjectPublicKey</text>
                  <text x="52" y="1396">26</text>
                  <text x="104" y="1396">Name:</text>
                  <text x="196" y="1396">EC</text>
                  <text x="236" y="1396">Public</text>
                  <text x="280" y="1396">Key</text>
                  <text x="348" y="1396">(Weierstraß)</text>
                  <text x="420" y="1396">with</text>
                  <text x="248" y="1412">brainpoolP512r1</text>
                  <text x="132" y="1428">Identifiers:</text>
                  <text x="236" y="1428">ecPublicKey,</text>
                  <text x="348" y="1428">id-ecPublicKey</text>
                  <text x="100" y="1444">OID:</text>
                  <text x="256" y="1444">1.2.840.10045.2.1</text>
                  <text x="128" y="1460">Parameters:</text>
                  <text x="228" y="1460">namedCurve</text>
                  <text x="280" y="1460">=</text>
                  <text x="352" y="1460">brainpoolP512r1</text>
                  <text x="280" y="1476">(1.3.36.3.3.2.8.1.1.13)</text>
                  <text x="100" y="1492">DER:</text>
                  <text x="196" y="1492">30</text>
                  <text x="220" y="1492">14</text>
                  <text x="244" y="1492">06</text>
                  <text x="268" y="1492">07</text>
                  <text x="292" y="1492">2A</text>
                  <text x="316" y="1492">86</text>
                  <text x="340" y="1492">48</text>
                  <text x="364" y="1492">CE</text>
                  <text x="388" y="1492">3D</text>
                  <text x="412" y="1492">02</text>
                  <text x="436" y="1492">01</text>
                  <text x="460" y="1492">06</text>
                  <text x="484" y="1492">09</text>
                  <text x="508" y="1492">2B</text>
                  <text x="532" y="1492">24</text>
                  <text x="196" y="1508">03</text>
                  <text x="220" y="1508">03</text>
                  <text x="244" y="1508">02</text>
                  <text x="268" y="1508">08</text>
                  <text x="292" y="1508">01</text>
                  <text x="316" y="1508">01</text>
                  <text x="340" y="1508">0D</text>
                  <text x="120" y="1524">Comments:</text>
                  <text x="228" y="1524">Compressed</text>
                  <text x="340" y="1524">subjectPublicKey</text>
                  <text x="52" y="1556">27</text>
                  <text x="104" y="1556">Name:</text>
                  <text x="196" y="1556">EC</text>
                  <text x="236" y="1556">Public</text>
                  <text x="280" y="1556">Key</text>
                  <text x="348" y="1556">(Weierstraß)</text>
                  <text x="420" y="1556">with</text>
                  <text x="220" y="1572">FRP256v1</text>
                  <text x="132" y="1588">Identifiers:</text>
                  <text x="236" y="1588">ecPublicKey,</text>
                  <text x="348" y="1588">id-ecPublicKey</text>
                  <text x="100" y="1604">OID:</text>
                  <text x="256" y="1604">1.2.840.10045.2.1</text>
                  <text x="128" y="1620">Parameters:</text>
                  <text x="228" y="1620">namedCurve</text>
                  <text x="280" y="1620">=</text>
                  <text x="324" y="1620">FRP256v1</text>
                  <text x="288" y="1636">(1.2.250.1.223.101.256.1)</text>
                  <text x="100" y="1652">DER:</text>
                  <text x="196" y="1652">30</text>
                  <text x="220" y="1652">15</text>
                  <text x="244" y="1652">06</text>
                  <text x="268" y="1652">07</text>
                  <text x="292" y="1652">2A</text>
                  <text x="316" y="1652">86</text>
                  <text x="340" y="1652">48</text>
                  <text x="364" y="1652">CE</text>
                  <text x="388" y="1652">3D</text>
                  <text x="412" y="1652">02</text>
                  <text x="436" y="1652">01</text>
                  <text x="460" y="1652">06</text>
                  <text x="484" y="1652">0A</text>
                  <text x="508" y="1652">2A</text>
                  <text x="532" y="1652">81</text>
                  <text x="196" y="1668">7A</text>
                  <text x="220" y="1668">01</text>
                  <text x="244" y="1668">81</text>
                  <text x="268" y="1668">5F</text>
                  <text x="292" y="1668">65</text>
                  <text x="316" y="1668">82</text>
                  <text x="340" y="1668">00</text>
                  <text x="364" y="1668">01</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="228" y="1684">Compressed</text>
                  <text x="340" y="1684">subjectPublicKey</text>
                  <text x="52" y="1716">28</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="196" y="1716">EC</text>
                  <text x="236" y="1716">Public</text>
                  <text x="280" y="1716">Key</text>
                  <text x="348" y="1716">(Weierstraß)</text>
                  <text x="420" y="1716">with</text>
                  <text x="224" y="1732">sm2p256v1</text>
                  <text x="132" y="1748">Identifiers:</text>
                  <text x="236" y="1748">ecPublicKey,</text>
                  <text x="348" y="1748">id-ecPublicKey</text>
                  <text x="100" y="1764">OID:</text>
                  <text x="256" y="1764">1.2.840.10045.2.1</text>
                  <text x="128" y="1780">Parameters:</text>
                  <text x="228" y="1780">namedCurve</text>
                  <text x="280" y="1780">=</text>
                  <text x="328" y="1780">sm2p256v1</text>
                  <text x="272" y="1796">(1.2.156.10197.1.301)</text>
                  <text x="100" y="1812">DER:</text>
                  <text x="196" y="1812">30</text>
                  <text x="220" y="1812">13</text>
                  <text x="244" y="1812">06</text>
                  <text x="268" y="1812">07</text>
                  <text x="292" y="1812">2A</text>
                  <text x="316" y="1812">86</text>
                  <text x="340" y="1812">48</text>
                  <text x="364" y="1812">CE</text>
                  <text x="388" y="1812">3D</text>
                  <text x="412" y="1812">02</text>
                  <text x="436" y="1812">01</text>
                  <text x="460" y="1812">06</text>
                  <text x="484" y="1812">08</text>
                  <text x="508" y="1812">2A</text>
                  <text x="532" y="1812">81</text>
                  <text x="196" y="1828">1C</text>
                  <text x="220" y="1828">CF</text>
                  <text x="244" y="1828">55</text>
                  <text x="268" y="1828">01</text>
                  <text x="292" y="1828">82</text>
                  <text x="316" y="1828">2D</text>
                  <text x="120" y="1844">Comments:</text>
                  <text x="228" y="1844">Compressed</text>
                  <text x="340" y="1844">subjectPublicKey</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    28 | Name:        EC Public Key (Weierstraß) with              |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <section anchor="suitability-of-different-public-key-algorithms-for-use-within-iot-scenarios">
          <name>Suitability of different public key algorithms for use within IoT scenarios</name>
          <t>The public key algorithms registry <xref target="pkalg"/> specifies a number of algorithms, not all which are suitable for usage with constrained devices. RSA requires large keys and large signature sizes compared to elliptic curve cryptography (ECC), which together with resource-efficient implementations of named elliptic curves (Montgomery, Edwards and Weierstraß curves) make them suitable candidates for IoT public key usage. These curves are represented by ids 1–11 and 24–28 in <xref target="pkalg"/>.</t>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading with this document as reference.</t>
      </section>
      <section anchor="media-type-application-registry">
        <name>Media Type Application Registry</name>
        <t>IANA is requested to assign the following entries in to the "application" registry under the "Media Types" heading with this document as reference.</t>
        <section anchor="c509-cert">
          <name>Media Type application/cose-c509-cert</name>
          <t>When the application/cose-c509-cert media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-cert</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
            </li>
            <li>
              <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD8, TBD6</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pkcs10">
          <name>Media Type application/cose-c509-pkcs10</name>
          <t>When the application/cose-c509-pkcs10 media type is used, the data is a C509CertificateRequest structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pkcs10</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD9</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-crtemplate">
          <name>Media Type application/cose-c509-crtemplate</name>
          <t>When the application/cose-c509-crtemplate media type is used, the data is a C509CertificateRequestTemplate structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-crtemplate</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD18</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-privkey">
          <name>Media Type application/cose-c509-privkey</name>
          <t>When the application/cose-c509-privkey media type is used, the data is a C509PrivateKey structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-privkey</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD12</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pem">
          <name>Media Type application/cose-c509-pem</name>
          <t>When the application/cose-c509-pem media type is used, the data is a C509PEM structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pem</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD13</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="cose-certhash">
          <name>Media Type application/cose-certhash</name>
          <t>When the application/cose-certhash media type is used, the data is a COSE_CertHash structure, see <xref target="RFC9360"/>.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-certhash</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about what the hash value is calculated over.</t>
            </li>
            <li>
              <t>Can be set to "c509" to indicate that the hash value is calculated over a C509 certificate, see <xref target="cose-header-params"/>.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of <xref target="RFC9360"/>.</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use X.509 or C509 as certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): N/A</t>
            </li>
            <li>
              <t>File extension(s): N/A</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
      </section>
      <section anchor="content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to add entries for "application/cose-c509-cert", "application/cose-c509-pkcs10", "application/cose-c509-crtemplate", "application/cose-c509-privkey" and "application/cose-c509-pem" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters".
A dedicated Content-Format ID is requested for the "application/cose-c509-cert" media type in the case when the parameter "usage" is set to "chain", see <xref target="c509-cert"/>.</t>
        <t>IANA is requested to add entries for "application/cose-certhash" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters". A dedicated Content-Format ID is requested  in the case when the parameter "usage" is set to "c509", see <xref target="c509-cert"/>.</t>
        <t>IANA is requested to add entries for "application/cbor" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters", in the case when the encoding is a CBOR text string containing a URI, see <xref target="RFC3986"/>.</t>
        <figure anchor="fig-format-ids">
          <name>CoAP Content-Format IDs</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="616" viewBox="0 0 616 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,496" fill="none" stroke="black"/>
                <path d="M 192,32 L 192,496" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,496" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,496" fill="none" stroke="black"/>
                <path d="M 488,32 L 488,496" fill="none" stroke="black"/>
                <path d="M 608,32 L 608,496" fill="none" stroke="black"/>
                <path d="M 8,32 L 608,32" fill="none" stroke="black"/>
                <path d="M 8,78 L 608,78" fill="none" stroke="black"/>
                <path d="M 8,82 L 608,82" fill="none" stroke="black"/>
                <path d="M 8,128 L 608,128" fill="none" stroke="black"/>
                <path d="M 8,192 L 608,192" fill="none" stroke="black"/>
                <path d="M 8,240 L 608,240" fill="none" stroke="black"/>
                <path d="M 8,288 L 608,288" fill="none" stroke="black"/>
                <path d="M 8,336 L 608,336" fill="none" stroke="black"/>
                <path d="M 8,384 L 608,384" fill="none" stroke="black"/>
                <path d="M 8,432 L 608,432" fill="none" stroke="black"/>
                <path d="M 8,496 L 608,496" fill="none" stroke="black"/>
                <g class="text">
                  <text x="48" y="52">Content</text>
                  <text x="232" y="52">Content</text>
                  <text x="304" y="52">Media</text>
                  <text x="444" y="52">ID</text>
                  <text x="536" y="52">Reference</text>
                  <text x="44" y="68">Format</text>
                  <text x="228" y="68">Coding</text>
                  <text x="300" y="68">Type</text>
                  <text x="68" y="100">application/</text>
                  <text x="208" y="100">-</text>
                  <text x="308" y="100">[[link</text>
                  <text x="348" y="100">to</text>
                  <text x="388" y="100">9.15]]</text>
                  <text x="452" y="100">TBD3</text>
                  <text x="524" y="100">[[this</text>
                  <text x="76" y="116">cose-c509-cert</text>
                  <text x="556" y="116">document]]</text>
                  <text x="68" y="148">application/</text>
                  <text x="524" y="148">[[this</text>
                  <text x="80" y="164">cose-c509-cert;</text>
                  <text x="208" y="164">-</text>
                  <text x="308" y="164">[[link</text>
                  <text x="348" y="164">to</text>
                  <text x="388" y="164">9.15]]</text>
                  <text x="456" y="164">TBD15</text>
                  <text x="556" y="164">document]]</text>
                  <text x="40" y="180">usage</text>
                  <text x="72" y="180">=</text>
                  <text x="104" y="180">chain</text>
                  <text x="68" y="212">application/</text>
                  <text x="208" y="212">-</text>
                  <text x="308" y="212">[[link</text>
                  <text x="348" y="212">to</text>
                  <text x="388" y="212">9.15]]</text>
                  <text x="452" y="212">TBD4</text>
                  <text x="524" y="212">[[this</text>
                  <text x="84" y="228">cose-c509-pkcs10</text>
                  <text x="556" y="228">document]]</text>
                  <text x="68" y="260">application/</text>
                  <text x="208" y="260">-</text>
                  <text x="308" y="260">[[link</text>
                  <text x="348" y="260">to</text>
                  <text x="388" y="260">9.15]]</text>
                  <text x="456" y="260">TBD19</text>
                  <text x="524" y="260">[[this</text>
                  <text x="100" y="276">cose-c509-crtemplate</text>
                  <text x="556" y="276">document]]</text>
                  <text x="68" y="308">application/</text>
                  <text x="208" y="308">-</text>
                  <text x="308" y="308">[[link</text>
                  <text x="348" y="308">to</text>
                  <text x="388" y="308">9.15]]</text>
                  <text x="456" y="308">TBD10</text>
                  <text x="524" y="308">[[this</text>
                  <text x="88" y="324">cose-c509-privkey</text>
                  <text x="556" y="324">document]]</text>
                  <text x="68" y="356">application/</text>
                  <text x="208" y="356">-</text>
                  <text x="308" y="356">[[link</text>
                  <text x="348" y="356">to</text>
                  <text x="388" y="356">9.15]]</text>
                  <text x="456" y="356">TBD11</text>
                  <text x="524" y="356">[[this</text>
                  <text x="72" y="372">cose-c509-pem</text>
                  <text x="556" y="372">document]]</text>
                  <text x="68" y="404">application/</text>
                  <text x="208" y="404">-</text>
                  <text x="308" y="404">[[link</text>
                  <text x="348" y="404">to</text>
                  <text x="388" y="404">9.15]]</text>
                  <text x="456" y="404">TBD16</text>
                  <text x="524" y="404">[[this</text>
                  <text x="72" y="420">cose-certhash</text>
                  <text x="556" y="420">document]]</text>
                  <text x="68" y="452">application/</text>
                  <text x="524" y="452">[[this</text>
                  <text x="76" y="468">cose-certhash;</text>
                  <text x="208" y="468">-</text>
                  <text x="308" y="468">[[link</text>
                  <text x="348" y="468">to</text>
                  <text x="388" y="468">9.15]]</text>
                  <text x="456" y="468">TBD17</text>
                  <text x="556" y="468">document]]</text>
                  <text x="40" y="484">usage</text>
                  <text x="72" y="484">=</text>
                  <text x="100" y="484">c509</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+----------------------+---------+------------------+-------+--------------+
| Content              | Content | Media            | ID    | Reference    |
| Format               | Coding  | Type             |       |              |
+======================+=========+==================+=======+==============+
| application/         | -       | [[link to 9.15]] | TBD3  | [[this       |
| cose-c509-cert       |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         |         |                  |       | [[this       |
| cose-c509-cert;      | -       | [[link to 9.15]] | TBD15 |   document]] |
| usage = chain        |         |                  |       |              |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD4  | [[this       |
| cose-c509-pkcs10     |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD19 | [[this       |
| cose-c509-crtemplate |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD10 | [[this       |
| cose-c509-privkey    |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD11 | [[this       |
| cose-c509-pem        |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD16 | [[this       |
| cose-certhash        |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         |         |                  |       | [[this       |
| cose-certhash;       | -       | [[link to 9.15]] | TBD17 |   document]] |
| usage = c509         |         |                  |       |              |
+----------------------+---------+------------------+-------+--------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as X.509, but uses a different value and instead of the DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; in TLS 1.3 and opaque ASN.1Cert&lt;1..2^24-1&gt; in TLS 1.2, contains the CBOR sequence ~C509Certificate (an unwrapped C509Certificate). Similar to COSE_C509, the TLS handshake contains the length of each certificate. The TLS extensions client_certificate_type and server_certificate_type <xref target="RFC7250"/> are used to negotiate the use of C509.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,96" fill="none" stroke="black"/>
              <path d="M 336,32 L 336,96" fill="none" stroke="black"/>
              <path d="M 552,32 L 552,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="100" y="52">Name</text>
                <text x="280" y="52">Recommended</text>
                <text x="376" y="52">Comment</text>
                <text x="44" y="84">TBD5</text>
                <text x="100" y="84">C509</text>
                <text x="168" y="84">Certificate</text>
                <text x="320" y="84">Y</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           Y |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="tlsa">
        <name>TLSA Selectors Registry</name>
        <t>This document registers the following entries in the "TLSA Selectors" registry under the "DNS-Based Authentication of Named Entities (DANE) Parameters" heading.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="584" viewBox="0 0 584 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
              <path d="M 416,32 L 416,96" fill="none" stroke="black"/>
              <path d="M 576,32 L 576,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 576,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 576,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 576,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 576,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="112" y="52">Acronym</text>
                <text x="208" y="52">Short</text>
                <text x="280" y="52">Description</text>
                <text x="496" y="52">Reference</text>
                <text x="44" y="84">TBD7</text>
                <text x="124" y="84">C509</text>
                <text x="180" y="84">CBOR</text>
                <text x="232" y="84">encoded</text>
                <text x="284" y="84">PKIX</text>
                <text x="356" y="84">certificates</text>
                <text x="452" y="84">[[this</text>
                <text x="524" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+---------+--------------------------------+-------------------+
| Value | Acronym |    Short Description           |     Reference     |
+=======+=========+================================+===================+
|  TBD7 |    C509 | CBOR encoded PKIX certificates | [[this document]] |
+-------+---------+--------------------------------+-------------------+
]]></artwork>
        </artset>
        <t>The TLSA selectors registry defined in <xref target="RFC6698"/> originally only applied to PKIX <xref target="RFC5280"/> certificates in DER encoding. This specification updates <xref target="RFC6698"/> to accept the use of C509 certificates, which are essentially CBOR encoded PKIX certificates.</t>
      </section>
      <section anchor="edhoc-authentication-credential-types-registry">
        <name>EDHOC Authentication Credential Types Registry</name>
        <t>This document registers the following entry in the "EDHOC Authentication Credential Types" registry under the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" heading. This is used to identify supported authentication credential type, for example, during discovery of EDHOC resources, see <xref target="RFC9668"/>.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="424" viewBox="0 0 424 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 256,32 L 256,96" fill="none" stroke="black"/>
              <path d="M 416,32 L 416,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 416,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 416,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 416,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 416,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="128" y="52">Description</text>
                <text x="336" y="52">Reference</text>
                <text x="40" y="84">TBD14</text>
                <text x="100" y="84">C509</text>
                <text x="168" y="84">certificate</text>
                <text x="292" y="84">[[this</text>
                <text x="364" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+----------------------+-------------------+
| Value | Description          |     Reference     |
+=======+======================+===================+
| TBD14 | C509 certificate     | [[this document]] |
+-------+----------------------+-------------------+
]]></artwork>
        </artset>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2985">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5958">
          <front>
            <title>Asymmetric Key Packages</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document defines the syntax for private-key information and a content type for it. Private-key information includes a private key for a specified public-key algorithm and a set of attributes. The Cryptographic Message Syntax (CMS), as defined in RFC 5652, can be used to digitally sign, digest, authenticate, or encrypt the asymmetric key format content type. This document obsoletes RFC 5208. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5958"/>
          <seriesInfo name="DOI" value="10.17487/RFC5958"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>ASN.1 encoding rules. Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7468">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="5" month="May" year="2025"/>
            <abstract>
              <t>   RFC 7925 offers guidance to developers on using TLS/DTLS 1.2 for
   Internet of Things (IoT) devices with resource constraints.  This
   document is a companion to RFC 7925, defining TLS/DTLS 1.3 profiles
   for IoT devices.  Additionally, it updates RFC 7925 with respect to
   the X.509 certificate profile and ciphersuite requirements.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/thomas-fossati/draft-tls13-iot.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-14"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="17" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a "compact" version of TLS 1.3 and DTLS 1.3.
   It saves bandwidth by trimming obsolete material, tighter encoding, a
   template-based specialization technique, and alternative
   cryptographic techniques. cTLS is not directly interoperable with TLS
   1.3 or DTLS 1.3 since the over-the-wire framing is different.  A
   single server can, however, offer cTLS alongside TLS or DTLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-rfc7030-csrattrs">
          <front>
            <title>Clarification and enhancement of RFC7030 CSR Attributes definition</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens</organization>
            </author>
            <author fullname="Dan Harkins" initials="D." surname="Harkins">
              <organization>The Industrial Lounge</organization>
            </author>
            <date day="28" month="June" year="2025"/>
            <abstract>
              <t>   This document updates RFC7030, Enrollment over Secure Transport
   (EST), clarifying how the Certificate Signiing Request (CSR)
   Attributes Response can be used by an EST server to specify both CSR
   attribute Object IDs (OID) and also CSR attribute values, in
   particular X.509 extension values, that the server expects the client
   to include in subsequent CSR request.  RFC9148 is derived from
   RFC7030, and it is also updated.

   RFC7030 (EST) is ambiguous in its specification of the CSR Attributes
   Response.  This has resulted in implementation challenges and
   implementor confusion.  As a result, there was not universal
   understanding of what was specified.  This document clarifies the
   encoding rules.

   This document therefore also provides a new straightforward approach:
   using a template for CSR contents that may be partially filled in by
   the server.  This also allows an EST server to specify a subject
   Distinguished Name (DN).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc7030-csrattrs-23"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 2.1.4"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 3.8.0"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/solutions-and-impact/technologies/esim/wp-content/uploads/2025/01/SGP.14-v2.2.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.2</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="https://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
        <reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
            <author initials="E." surname="Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
        </reference>
      </references>
    </references>
    <?line 2359?>

<section anchor="appA">
      <name>C509 Certificate Examples</name>
      <section anchor="rfc7925-prof">
        <name>Example: RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example: C509 Certificate Encoding</name>
          <t>This section shows the C509 encoding of the X.509 certificate in the previous section. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <t><xref target="fig-CBOR-diagnostic-7925"/> shows the diagnostic notation of the unwrapped CBOR sequence, ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-CBOR-diagnostic-7925">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  3,                   / version and certificate type /
  h'01f50d',           / serialNumber /
  0,                   / signatureAlgorithm /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  48(h'0123456789AB'), / subject, EUI-64 /
  1,                   / subjectPublicKeyAlgorithm /
  h'FEB1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,                   / single extension:
                         non-critical keyUsage
                         digitalSignature /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-7925"/> shows the plain hex format of the unwrapped CBOR sequence, the size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-7925">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
03
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 FE B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16
]]></artwork>
          </figure>
        </section>
        <section anchor="example-native">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>This section shows the natively signed C509 certificate corresponding to that of the previous section, which is identical except for c509CertificateType, encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <t><xref target="fig-CBOR-diagnostic-native"/> shows the diagnostic notation of the natively signed unwrapped CBOR sequence, ~C509Certificate.</t>
          <figure anchor="fig-CBOR-diagnostic-native">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  2,
  h'01f50d',
  0,
  "RFC test CA",
  1672531200,
  1767225600,
  48(h'0123456789AB'),
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  h'EB0D472731F689BC00F5880B12C68B3F9FD38B23FADFCA2095
    0F3F241B60A202579CAC28CD3B7494D5FA5D8BBAB4600357E5
    50AB9FA9A65D9BA2B3B82E668CC6'
]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-native"/> shows the plain hex format of the natively signed unwrapped CBOR sequence, the size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-native">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
        </section>
        <section anchor="app-DH-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate keyUsage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used to sign a certificate request.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
        <section anchor="other-examples">
          <name>Examples: C509Certificate and C509CertData</name>
          <t>This section examplifies other CBOR objects defined in this specification, based on the natively signed C509 certificate in <xref target="example-native"/>.</t>
          <t><xref target="fig-C509Certificate"/> shows the encoding of the corresponding C509Certificate, i.e., the CBOR array wrapping of the CBOR sequence ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-C509Certificate">
            <name>C509Certificate: The CBOR array wrapping of ~C509Certificate</name>
            <artwork><![CDATA[
8B
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509Certificate is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 8B (which indicates that it is a CBOR array with 11 elements).</t>
          <t><xref target="fig-C509CertData"/> shows the encoding of the corresponding C509CertData, i.e., the CBOR byte string wrapping of the CBOR sequence ~C509Certificate, see <xref target="cose-header-params"/>.</t>
          <figure anchor="fig-C509CertData">
            <name>C509CertData: CBOR byte string wrapping of ~C509Certificate.</name>
            <artwork><![CDATA[
58 8C
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509CertData is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 58 8C (which indicates that it is a CBOR byte string of 140 bytes).</t>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example: IEEE 802.1AR profiled X.509 Certificate</name>
        <t>An example of an IEEE 802.1AR profiled X.509 certificate (Secure Device Identifier, DevID) is provided in Appendix C.2 of <xref target="RFC9148"/>. The certificate is shown below including details of the hardwareModuleName type of otherName in subjectAltName, see <xref target="ext-encoding"/>.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 9112578475118446130 (0x7e7661d7b54e4632)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: C=US, ST=CA, O=Example Inc, OU=certification, CN=802.1AR CA
        Validity
            Not Before: Jan 31 11:29:16 2019 GMT
            Not After : Dec 31 23:59:59 9999 GMT
        Subject: C=US, ST=CA, L=LA, O=example Inc, OU=IoT/serialNumber=Wt1234
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:c8:b4:21:f1:1c:25:e4:7e:3a:c5:71:23:bf:2d:
                    9f:dc:49:4f:02:8b:c3:51:cc:80:c0:3f:15:0b:f5:
                    0c:ff:95:8d:75:41:9d:81:a6:a2:45:df:fa:e7:90:
                    be:95:cf:75:f6:02:f9:15:26:18:f8:16:a2:b2:3b:
                    56:38:e5:9f:d9
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Subject Key Identifier:
                96:60:0D:87:16:BF:7F:D0:E7:52:D0:AC:76:07:77:AD:66:5D:02:A0
            X509v3 Authority Key Identifier:
                68:D1:65:51:F9:51:BF:C8:2A:43:1D:0D:9F:08:BC:2D:20:5B:11:60
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Subject Alternative Name:
                otherName:
                    type-id: 1.3.6.1.5.5.7.8.4 (id-on-hardwareModuleName)
                    value:
                        hwType: 1.3.6.1.4.1.6715.10.1
                        hwSerialNum: 01:02:03:04
    Signature Algorithm: ecdsa-with-SHA256
    Signature Value:
        30:46:02:21:00:c0:d8:19:96:d2:50:7d:69:3f:3c:48:ea:a5:
        ee:94:91:bd:a6:db:21:40:99:d9:81:17:c6:3b:36:13:74:cd:
        86:02:21:00:a7:74:98:9f:4c:32:1a:5c:f2:5d:83:2a:4d:33:
        6a:08:ad:67:df:20:f1:50:64:21:18:8a:0a:de:6d:34:92:36
]]></artwork>
        <t>The DER encoding of the certificate is 577 bytes:</t>
        <artwork><![CDATA[
30 82 02 3D 30 82 01 E2 A0 03 02 01 02 02 08 7E 76 61 D7 B5 4E 46 32
30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 5D 31 0B 30 09 06 03 55 04 06
13 02 55 53 31 0B 30 09 06 03 55 04 08 0C 02 43 41 31 14 30 12 06 03
55 04 0A 0C 0B 45 78 61 6D 70 6C 65 20 49 6E 63 31 16 30 14 06 03 55
04 0B 0C 0D 63 65 72 74 69 66 69 63 61 74 69 6F 6E 31 13 30 11 06 03
55 04 03 0C 0A 38 30 32 2E 31 41 52 20 43 41 30 20 17 0D 31 39 30 31
33 31 31 31 32 39 31 36 5A 18 0F 39 39 39 39 31 32 33 31 32 33 35 39
35 39 5A 30 5C 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0B 30 09 06
03 55 04 08 0C 02 43 41 31 0B 30 09 06 03 55 04 07 0C 02 4C 41 31 14
30 12 06 03 55 04 0A 0C 0B 65 78 61 6D 70 6C 65 20 49 6E 63 31 0C 30
0A 06 03 55 04 0B 0C 03 49 6F 54 31 0F 30 0D 06 03 55 04 05 13 06 57
74 31 32 33 34 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48
CE 3D 03 01 07 03 42 00 04 C8 B4 21 F1 1C 25 E4 7E 3A C5 71 23 BF 2D
9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C FF 95 8D 75 41 9D 81
A6 A2 45 DF FA E7 90 BE 95 CF 75 F6 02 F9 15 26 18 F8 16 A2 B2 3B 56
38 E5 9F D9 A3 81 8A 30 81 87 30 09 06 03 55 1D 13 04 02 30 00 30 1D
06 03 55 1D 0E 04 16 04 14 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07
77 AD 66 5D 02 A0 30 1F 06 03 55 1D 23 04 18 30 16 80 14 68 D1 65 51
F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20 5B 11 60 30 0E 06 03 55 1D 0F
01 01 FF 04 04 03 02 05 A0 30 2A 06 03 55 1D 11 04 23 30 21 A0 1F 06
08 2B 06 01 05 05 07 08 04 A0 13 30 11 06 09 2B 06 01 04 01 B4 3B 0A
01 04 04 01 02 03 04 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 30
46 02 21 00 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 02 21 00 A7 74 98 9F 4C 32 1A
5C F2 5D 83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34
92 36
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

 3,
 h'7E7661D7B54E4632',
 0,
 [
  -4, "US",
   6, "CA",
   8, "Example Inc",
   9, "certification",
   1, "802.1AR CA"
 ],
 1548934156,
 null,
 [
  -4, "US",
   6, "CA",
   5, "LA",
   8, "example Inc",
   9, "IoT",
  -3, "Wt1234"
 ],
 1,
 h'FDC8B421F11C25E47E3AC57123BF2D9FDC494F028BC351CC80C03F150BF50CFF95',
 [
   4, -2,
   1, h'96600D8716BF7FD0E752D0AC760777AD665D02A0',
   7, h'68D16551F951BFC82A431D0D9F08BC2D205B1160',
  -2, 5,
  3, [-1, [h'2B06010401B43B0A01', h'01020304']]
     / subjectAltName with hardwareModuleName /
 ],
 h'C0D81996D2507D693F3C48EAA5EE9491BDA6DB214099D98117C63B361374CD86A7
   74989F4C321A5CF25D832A4D336A08AD67DF20F1506421188A0ADE6D349236'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 275 bytes:</t>
          <artwork><![CDATA[
03 48 7E 76 61 D7 B5 4E 46 32 00 8A 23 62 55 53 06 62 43 41 08 6B 45
78 61 6D 70 6C 65 20 49 6E 63 09 6D 63 65 72 74 69 66 69 63 61 74 69
6F 6E 01 6A 38 30 32 2E 31 41 52 20 43 41 1A 5C 52 DC 0C F6 8C 23 62
55 53 06 62 43 41 05 62 4C 41 08 6B 65 78 61 6D 70 6C 65 20 49 6E 63
09 63 49 6F 54 22 66 57 74 31 32 33 34 01 58 21 FD C8 B4 21 F1 1C 25
E4 7E 3A C5 71 23 BF 2D 9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5
0C FF 95 8A 04 21 01 54 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07 77
AD 66 5D 02 A0 07 54 68 D1 65 51 F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D
20 5B 11 60 21 05 03 82 20 82 49 2B 06 01 04 01 B4 3B 0A 01 44 01 02
03 04 58 40 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 A7 74 98 9F 4C 32 1A 5C F2 5D
83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34 92 36
]]></artwork>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example: CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'047FA1E31928EE403BA0B83A395673FC',
0,
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'FD963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example: CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'A6A55C870E39B40E',
23,
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Corey Bonnell, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Fraser Tweedale, and Rene Struik for reviewing and commenting on intermediate versions of the draft and help with GitHub.</t>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Special acknowledgement goes to Lijun Liao for his careful review and many detailed improvement proposals.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
