<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-16" category="std" consensus="true" submissionType="IETF" updates="6698" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-16"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>University of Glasgow</organization>
      <address>
        <email>shahid.raza@glasgow.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>IN Groupe</organization>
      <address>
        <email>martin.furuhed@ingroupe.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="25"/>
    <abstract>
      <?line 175?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 certificates. The CBOR encoding supports a large subset of RFC 5280, common certificate profiles and is extensible.</t>
      <t>Two types of C509 certificates are defined. One type is an invertible CBOR re-encoding of DER encoded X.509 certificates with the signature field copied from the DER encoding. The other type is identical except that the signature is over the CBOR encoding instead of the DER encoding, avoiding the use of ASN.1. Both types of certificates have the same semantics as X.509 and the same reduced size compared to X.509.</t>
      <t>The document also specifies CBOR encoded data structures for certificate (signing) requests and certificate request templates, new COSE headers, as well as a TLS certificate type and a file format for C509. This document updates RFC 6698; the TLSA selectors registry is extended to include C509 certificates.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 183?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40–50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases. Due to the current PKI usage of DER encoded X.509 certificates, keeping compatibility with DER encoded X.509 is necessary at least for a transition period. However, the use of a more compact encoding with the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> reduces the certificate size significantly, which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc. The use of CBOR also reduces code complexity, code size, memory usage, and CPU usage.</t>
      <t>CBOR is a data format designed for small code size and small message size. CBOR builds on the JSON data model but extends it by, e.g., encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation.</t>
      <t>CBOR data items are encoded to or decoded from byte strings using a type-length-value encoding scheme, where the three highest order bits of the initial byte contain information about the major type. CBOR supports several different types of data items, in addition to integers (int, uint), simple values (e.g. null, undefined), byte strings (bytes), and text strings (text), CBOR also supports arrays [] of data items, maps {} of pairs of data items, and sequences of data items. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. We recommend implementors to get used to CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA 1.0 <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="RFC9528"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments.</t>
      <t>This document specifies a CBOR encoding of X.509 certificates based on <xref target="X.509-IoT"/>. The resulting certificates are called C509 certificates. The CBOR encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CAB Baseline <xref target="CAB-TLS"/>,  <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates, and is designed to render a compact encoding of certificates used in constrained environments. C509 is deployed in, e.g., in-vehicle and vehicle-to-cloud communication, Unmanned Aircraft Systems (UAS), and Global Navigation Satellite System (GNSS). When used to re-encode DER encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates by over 50% while also significantly reducing memory and code size compared to ASN.1. C509 is not a general CBOR ecoding for Abstract Syntax Notation One (ASN.1) data structures.</t>
      <t>C509 is designed to be extensible to additional features of X.509, for example support for new algorithms, including new post-quantum algorithms, which can be registered in the IANA registry as they become specified, see <xref target="sigalg"/>.</t>
      <t>This document does not specify a certificate profile. Two variants are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in the first variant. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</t>
        </li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document also specifies C509 Certificate Requests, see <xref target="CSR"/>; COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>; a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>; and a C509 file format. The TLSA selectors registry is extended to include C509 certificates, thus this document updates <xref target="RFC6698"/>.</t>
    </section>
    <section anchor="notation">
      <name>Notational Conventions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This specification makes use of the terminology in <xref target="RFC2986"/>, <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers or complemented with CBOR OID encoding <xref target="RFC9090"/>, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER encoded X.509 certificate, in which case the signature is calculated on the DER encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the elements in arrays are always encoded in the same order as elements of the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are described in this section, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item <bcp14>MAY</bcp14> represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate). Examples are given in the appendices, e.g., <xref target="rfc7925-prof"/>.</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
   issuer: Name / null,
   validityNotBefore: ~time,
   validityNotAfter: ~time / null,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   extensions: Extensions,
)

CertificateSerialNumber = ~biguint

Name = [ * Attribute ] / SpecialText

Attribute = (( attributeType: int, attributeValue: SpecialText ) //
             ( attributeType: ~oid, attributeValue: bytes ))

AlgorithmIdentifier = int / ~oid /
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = (( extensionID: int, extensionValue: Defined ) //
             ( extensionID: ~oid, ? critical: true,
              extensionValue: bytes ))

SpecialText = text / bytes / tag

Defined = any .ne undefined

tag = #6
]]></sourcecode>
        </figure>
        <t>C509 certificates are defined in terms of DER encoded <xref target="RFC5280"/> X.509 certificates as detailed in the following subsections.</t>
        <section anchor="version">
          <name>version</name>
          <t>The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Two types are defined in this document: natively signed C509 certificates, following X.509 v3 (c509CertificateType = 2); and CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 3), see <xref target="type"/>. The number of elements in TBSCertificate is fixed and determined by the type. Additional types may be added in the future.</t>
        </section>
        <section anchor="serialnumber">
          <name>serialNumber</name>
          <t>The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
        </section>
        <section anchor="signature">
          <name>signature</name>
          <t>The 'signature' field, containing the signature algorithm including parameters, is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
        </section>
        <section anchor="issuer">
          <name>issuer</name>
          <t>In the general case, the sequence of 'Attribute' is encoded as a CBOR array consisting of Attribute elements. RelativeDistinguishedName with more than one AttributeTypeAndValue is not supported. Each Attribute is CBOR encoded as (type, value) either as a (int, SpecialText) pair, or a (~oid, bytes) tuple.</t>
          <t>In the former case, the absolute value of the int encodes the attribute type (see <xref target="fig-attrtype"/>) and the sign is used to represent the character string type in the X.509 certificate; positive for utf8String, negative for printableString. Attribute values which are always of type IA5String are unambiguously represented using a non-negative int. Examples include emailAddress and domainComponent (see <xref target="RFC5280"/>). In CBOR, all text strings are UTF-8 encoded and in natively signed C509 certificates all CBOR ints <bcp14>SHALL</bcp14> be non-negative. Text strings <bcp14>SHALL</bcp14> still adhere to any X.509 restrictions, i.e., serialNumber <bcp14>SHALL</bcp14> only contain the 74-character subset of ASCII allowed by printableString and countryName <bcp14>SHALL</bcp14> have length 2. CBOR encoding is allowed for IA5String (if this is the only allowed type, e.g., emailAddress), printableString and utf8String, whereas the string types teletexString, universalString, and bmpString are not supported.</t>
          <t>The text strings are further optimized as follows:</t>
          <ul spacing="normal">
            <li>
              <t>If the text string has an even length <contact fullname="≥"/> 2 and contains only the symbols '0'–'9' or 'a'–'f', it is encoded as a CBOR byte string.</t>
            </li>
            <li>
              <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where each 'H' is one of the symbols '0'-'9' or 'A'-'F', it is encoded as a CBOR tagged MAC address using the CBOR tag 48, see <xref section="2.4" sectionFormat="of" target="RFC9542"/>. If of the form "HH-HH-HH-FF-FE-HH-HH-HH", it is encoded as a 48-bit MAC address, otherwise as a 64-bit MAC address. See example in <xref target="rfc7925-prof"/>.</t>
            </li>
            <li>
              <t>Otherwise it is encoded as a CBOR text string.</t>
            </li>
          </ul>
          <t>The final encoding of the extension value may therefore be text, bytes, or tag, i.e., SpecialText. If Name contains a single 'common name' attribute with attributeType = +1, it is for compactness encoded as just the SpecialText containing the single attribute value.</t>
          <t>In natively signed C509 certificates, bytes and tag 48 do not correspond to any predefined text string encoding and may also be used for other attribute types.</t>
          <t>If the 'issuer' field is identical to the 'subject' field, e.g., in case of self-signed certificates, then the 'issuer' field <bcp14>MUST</bcp14> be encoded as the CBOR simple value null (0xf6).</t>
        </section>
        <section anchor="validity">
          <name>validity</name>
          <t>The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as the CBOR simple value null.</t>
        </section>
        <section anchor="subject">
          <name>subject</name>
          <t>The 'subject' field is encoded exactly like issuer, except that the CBOR simple value is not a valid value.</t>
        </section>
        <section anchor="subjectpublickeyinfo">
          <name>subjectPublicKeyInfo</name>
          <t>The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          <t>In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string, but may be encoded as a CBOR item of any type except undefined (see <xref target="CRT"/>). This specification assumes the BIT STRING has zero unused bits, and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
        </section>
        <section anchor="issueruniqueid">
          <name>issuerUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="subjectuniqueid">
          <name>subjectUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="ext-field">
          <name>extensions</name>
          <t>The 'extensions' field is encoded either as a CBOR array or as a CBOR int. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
          <t>Each 'extensionID' in the CBOR array is encoded either as a CBOR int (see <xref target="extype"/>) or as an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          <ul spacing="normal">
            <li>
              <t>If 'extensionID' is encoded as a CBOR int, it is followed by a CBOR item of any type except undefined (see <xref target="CRT"/>), and the sign of the int is used to encode if the extension is critical: Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign. If the CBOR array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage, see <xref target="ext-encoding"/>), the CBOR array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int.</t>
            </li>
            <li>
              <t>If extensionID is encoded as an unwrapped CBOR OID tag, then it is followed by an optional CBOR simple value true (0xf5) 'critical', and the DER-encoded value of the extnValue. The presence of the CBOR true value in the array indicates that the extension is critical; its absence means that the extension is non-critical (see <xref target="fig-CBORCertCDDL"/>). The extnValue OCTET STRING value field is encoded as the CBOR byte string 'extensionValue'.</t>
            </li>
          </ul>
          <t>The processing of critical and non-critical extensions is specified in <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
          <t>The currently defined extension values for which there is CBOR int encoded 'extensionID' are specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment.</t>
          <t>More details about extensions in <xref target="ext-encoding"/>.</t>
        </section>
        <section anchor="signaturealgorithm">
          <name>signatureAlgorithm</name>
          <t>The 'signatureAlgorithm' field is always the same as the 'signature' field and therefore omitted from the CBOR encoding.</t>
        </section>
        <section anchor="signaturevalue">
          <name>signatureValue</name>
          <t>In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes that the BIT STRING has zero unused bits, and the unused bits byte is omitted. For natively signed C509 certificates, the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
        </section>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted, and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e., [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent are omitted and subjectPublicKey consists of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstraß form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstraß form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER encoded certificate with an uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, then the octet 0xfe is used instead of 0x02 to represent an even y-coordinate, and the octet 0xfd is used instead of 0x03 to represent an odd y-coordinate.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as any leading 0x00 byte (to indicate that the number is not negative) are omitted. Each of the two INTEGER value fields are then padded with leading zeroes to the same fixed length, given by the number of bytes needed to represent the order n of the cyclic subgroup used with the algorithm. For example, for P-256, the number of bytes for each integer is 32. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>The 'extensions' field is encoded as specified in <xref target="ext-field"/> with further details provided in this section.</t>
        <t>For some extensions, the CBOR int encoded extensionID is only supported for commonly used values of the extension. In case of extension values for which the CBOR int encoded extensionID is not supported, the extension <bcp14>MUST</bcp14> be encoded using the unwrapped CBOR OID tag encoded extensionID.</t>
        <t>A note on extensionID naming: in existing OID databases, most IDs can be found in versions with and without an 'id-pe' or 'id-ce' prefix. We have excluded the prefix for the commonly used extensions defined in <xref target="RFC5280"/> and included them for extensions defined elsewhere.</t>
        <t>CBOR encoding of the following extension values is fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). In natively signed certificates, KeyIdentifier <bcp14>SHOULD</bcp14> be composed of the leftmost 160-bits of the SHA-256 hash of the CBOR encoded subjectPublicKey. Other methods of generating unique numbers can be used. The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="ext-field"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyUsage = uint
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: ~oid, subjectDomainPolicy: ~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyConstraints = [
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>), or unwrapped CBOR OID tags <xref target="RFC9090"/>, where each int or OID encodes a key usage purpose. If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the hardwareModuleName type of otherName has been given its own int due to its mandatory use in IEEE 802.1AR. When 'otherName + hardwareModuleName' is used, then [ ~oid, bytes ] is used to contain the pair ( hwType, hwSerialNum ) directly as specified in <xref target="RFC4108"/>. Only the general names in <xref target="GN"/> are supported.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If the CRL Distribution Points is a sequence of DistributionPointName, where each DistributionPointName only contains uniformResourceIdentifiers, the extension value can be CBOR encoded. extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   DistributionPointName = [ 2* text ] / text
   CRLDistributionPoints = [ + DistributionPointName ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumber or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid,
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, ? [ + PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contain general names registered in <xref target="GN"/> the extension value can be CBOR encoded. C509 uses the same additions and restrictions as defined in <xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>. Note that the minimum and maximum fields are not used and therefore omitted. For IPv4 addresses, the iPAddress field <bcp14>MUST</bcp14> contain five octets and for IPv6 addresses, the field <bcp14>MUST</bcp14> contain 17 octets, where the last octet indicates the number of bits in the netmask. As an example, the address block 192.0.2.0/24 is encoded as C0 00 02 00 18 instead of C0 00 02 00 FF FF FF 00 as in the DER encoding.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralSubtrees = [ + GeneralName ]
   NameConstraints = [
     permittedSubtrees: GeneralSubtrees / null,
     excludedSubtrees: GeneralSubtrees / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
      Attributes = (( attributeType: int,
                      attributeValue: [+ SpecialText] ) //
                    ( attributeType: ~oid, attributeValue: [+ bytes] ))
      SubjectDirectoryAttributes = [+Attributes]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources (id-pe-autonomousSysIds).  If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as an uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   ASIdOrRange = uint / [min:uint, max:uint]
   ASIdentifiers = [ + ASIdOrRange ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Resources v2 (id-pe-autonomousSysIds-v2). Encoded exactly like autonomousSysIds.</t>
          </li>
          <li>
            <t>IP Resources (id-pe-ipAddrBlocks).  If rdi and SAFI are not present, the extension value can be CBOR encoded. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress are set to one. With the exception of the first Address, if the byte string has the same length as the previous Address, the Address is encoded as a uint with the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2<sup>64</sup> - 1 corresponding to the CBOR integer max value.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   Address = bytes
   AddressPrefix = (Address, unusedBits: uint)
   AddressRange = [min: Address, max: Address]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddressFamily = (AFI: uint, IPAddressChoice)
   IPAddrBlocks = [ + IPAddressFamily ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IP Resources v2 (id-pe-ipAddrBlocks-v2). Encoded exactly like id-pe-ipAddrBlocks.</t>
          </li>
          <li>
            <t>Signed Certificate Timestamp (Certificate Transparency). If all the SCTs are version v1 <xref target="RFC6962"/>, and there are no SCT extensions, the extension value can be CBOR encoded. Other versions of SCT are out of scope for this document. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as a CBOR uint (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   SignedCertificateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCertificateTimestamp ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>OCSP No Check (id-pkix-ocsp-nocheck). If the extension value is NULL, it can be CBOR encoded. The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>Precertificate Signing Certificate. The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>TLS Features (id-pe-tlsfeature). The extensionValue is encoded as an array of integers, where each integer represents a TLS extension.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   TLSFeatures = [* feature: uint]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature (0), nonRepudiation (1), keyEncipherment (2) and keyAgreement (4) asserted is encoded as the two CBOR ints 2, 23 (2<sup>0</sup> + 2<sup>1</sup> + 2<sup>2</sup> + 2<sup>4</sup> = 23).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 9 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 23, 8, [ 3, 9 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-params">
        <name>COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, c5t, and c5u, defined in <xref target="iana-header"/> below, are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER encoded X.509 and use a COSE_C509 structure instead of COSE_X509.</t>
        <t>The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
COSE_C509 = C509CertData / [ 2* C509CertData ]
C509CertData = bytes .cborseq C509Certificate
]]></sourcecode>
        <t>C509CertData thus includes the unwrapped CBOR sequence, ~C509Certificate. The byte string encoding includes the length of each certificate which simplifies parsing. See <xref target="other-examples"/> for an example.</t>
        <t>The COSE_C509 item has media type application/cose-c509-cert, see <xref target="c509-cert"/>. Different  CoAP Content-Formats are defined depending on "usage" = "chain" or not, see <xref target="content-format"/>.  Stored file formats are defined for the cases with/without ("usage" = "chain") with "magic numbers" TBD8/TBD6 using the reserved CBOR tag 55799 and the corresponding Content-Formats TBD15/TBD3, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <t>The value type of c5t is the COSE_CertHash structure defined in <xref target="RFC9360"/>, which contains the hash value of the C509 certificate calculated over ~C509Certificate. Thus C509CertData contains all data necessary to calculate the thumbprint c5t.</t>
        <t>c5u provides an alternative way to identify an untrusted certificate chain by reference with a URI <xref target="RFC3986"/>, encoded as a CBOR text string (media type application/cbor and CoAP Content-Format 60). The referenced resource is a COSE_C509 item served with the application/cose-c509-cert media type ("usage" = "chain"), as described above.</t>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism <bcp14>MUST</bcp14> process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter <bcp14>MUST NOT</bcp14> cause the update of the set of trust anchors without appropriate authorization.</t>
        <table anchor="iana-header">
          <name>COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">24</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">25</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">22</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a ~C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">23</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing an ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
      <section anchor="private-key-structures">
        <name>Private Key Structures</name>
        <t>Certificate management also makes use of data structures including private keys, see, e.g., <xref target="RFC7468"/>. This section defines the following CBOR encoded structures:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PrivateKey = [
   C509PrivateKeyType: int,
   subjectPrivateKeyAlgorithm: AlgorithmIdentifier,
   subjectPrivateKey: any,
]
]]></sourcecode>
        <t>The field 'C509PrivateKeyType' indicates the type of the C509 private key. Different types of C509 Private Key Structures can be defined, see <xref target="privkeys"/>. Currently, two types are defined. When C509PrivateKeyType = 0, the subjectPrivateKey is the CBOR byte string encoding of the PrivateKey OCTET STRING value field defined in <xref target="RFC5958"/>. When C509PrivateKeyType = 1, the subjectPrivateKey is a COSE_KEY structure containing a private key as defined in <xref target="RFC9052"/>. Note that COSE_KEY might not be possible to use with all algorithms that have a C509 AlgorithmIdentifier defined.</t>
        <t>The C509PrivateKey item is served with the application/cose-c509-privkey media type, see <xref target="c509-privkey"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD12 using the reserved CBOR tag 55799 and the Content-Format TBD10, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PEM = [
   C509PrivateKey,
   COSE_C509 / null,
]
]]></sourcecode>
        <t>The C509PEM item is served with the application/cose-c509-pem media type, see <xref target="c509-pem"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD13 using the reserved CBOR tag 55799 and the Content-Format TBD11, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
      <section anchor="deterministic-encoding">
        <name>Deterministic Encoding</name>
        <t>In some use cases it is desirable to be able to specify a unique C509 representation of a given X.509 certificate.</t>
        <t>While this specification requires the use of Deterministically Encoded CBOR (see <xref target="notation"/>), it is still possible to represent certain X.509 certificate fields in different ways. This is a consequence of the extensibility of the C509 format where new encodings can be defined, for example to optimize extensions for which no special CBOR encoding have been previously defined.</t>
        <t>Where there is support for a specific and a generic CBOR encoding, the specific CBOR encoding <bcp14>MUST</bcp14> be used. For example, when there is support for specific CBOR encoding of an extension, as specified in <xref target="ext-encoding"/> and the C509 Extensions Registry, it <bcp14>MUST</bcp14> be used. In particular, when there is support for a specific otherName encoding (negative integer value in C509 General Names Registry) it <bcp14>MUST</bcp14> be used.</t>
        <t>Native C509 certificates <bcp14>MUST</bcp14> only use specific CBOR encoded fields. However, when decoding a non-native C509 certificates, the decoder may need to support, for example, (extensionID:~oid, ? critical: true, extensionValue:bytes)-encoding of an extension for which there is an (extensionID:int, extensionValue:Defined)-encoding. One reason is that the certificate was issued before the specific CBOR extension was registered.</t>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate (Signing) Request</name>
      <t>This section defines the format of a C509 Certificate Request, also known as a C509 Certificate Signing Request (CSR), based on and compatible with RFC 2986 <xref target="RFC2986"/>, and reusing the formatting of C509 certificates defined in <xref target="certificate"/>.</t>
      <t>The CDDL for the C509 Certificate Request is shown in <xref target="fig-C509CSRCDDL"/>. The fields have the same encoding as the corresponding fields of the C509 Certificate, see <xref target="message-fields"/>.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateRequest.</name>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificateRequest = [
   TBSCertificateRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateRequest = (
   c509CertificateRequestType: int,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   extensionsRequest: Extensions,
)

]]></sourcecode>
      </figure>
      <t>After verifying the subjectSignatureValue, the CA <bcp14>MAY</bcp14> transform the C509CertificateRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and code.</t>
      <t>The media type of C509CertificateRequest is application/cose-c509-pkcs10, see <xref target="c509-pkcs10"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD9 is defined using the reserved CBOR tag 55799 and the Content-Format TBD4, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      <section anchor="certificate-request-types">
        <name>Certificate Request Types</name>
        <t>Different types of C509 Certificate Requests are defined, see <xref target="csr-type"/>, all using the same CBOR encoding and differing only in what is being signed and what type of C509 certificate is being requested:</t>
        <ul spacing="normal">
          <li>
            <t>The C509 Certificate Request can either be an invertible CBOR re-encoding of a DER encoded RFC 2986 certification request, or it can be natively signed where the signature is calculated over the CBOR encoding instead of the DER encoding.</t>
          </li>
          <li>
            <t>The requested C509 certificate in the C509 Certificate Request can either be of type 2 or of type 3, see <xref target="type"/>.</t>
          </li>
        </ul>
        <t>Combining these options enables the four instances of c509CertificateRequestType defined in <xref target="csr-type"/> and illustrated in <xref target="fig-csr-types2"/>.</t>
        <figure anchor="fig-csr-types2">
          <name>C509 Certificate Request Types 0, 1, 2 and 3.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="544" viewBox="0 0 544 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                <path d="M 216,32 L 216,192" fill="none" stroke="black"/>
                <path d="M 376,72 L 376,192" fill="none" stroke="black"/>
                <path d="M 536,32 L 536,192" fill="none" stroke="black"/>
                <path d="M 8,32 L 536,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 536,64" fill="none" stroke="black"/>
                <path d="M 8,126 L 536,126" fill="none" stroke="black"/>
                <path d="M 8,130 L 536,130" fill="none" stroke="black"/>
                <path d="M 8,160 L 536,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 536,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="348" y="52">Signed</text>
                  <text x="404" y="52">object</text>
                  <text x="244" y="84">CBOR</text>
                  <text x="296" y="84">encoded</text>
                  <text x="348" y="84">C509</text>
                  <text x="400" y="84">DER</text>
                  <text x="448" y="84">encoded</text>
                  <text x="500" y="84">C509</text>
                  <text x="296" y="100">Certificate</text>
                  <text x="456" y="100">Certificate</text>
                  <text x="56" y="116">Requested</text>
                  <text x="144" y="116">certificate</text>
                  <text x="296" y="116">Request</text>
                  <text x="456" y="116">Request</text>
                  <text x="96" y="148">c509CertificateType</text>
                  <text x="184" y="148">=</text>
                  <text x="200" y="148">2</text>
                  <text x="296" y="148">0</text>
                  <text x="472" y="148">1</text>
                  <text x="96" y="180">c509CertificateType</text>
                  <text x="184" y="180">=</text>
                  <text x="200" y="180">3</text>
                  <text x="296" y="180">2</text>
                  <text x="472" y="180">3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------------------------+---------------------------------------+
|                         |             Signed object             |
+-------------------------+---------------------------------------+
|                         | CBOR encoded C509 | DER encoded C509  |
|                         |    Certificate    |    Certificate    |
| Requested certificate   |      Request      |      Request      |
+=========================+===================+===================+
| c509CertificateType = 2 |         0         |           1       |
+-------------------------+-------------------+-------------------+
| c509CertificateType = 3 |         2         |           3       |
+-------------------------+-------------------+-------------------+
]]></artwork>
          </artset>
        </figure>
        <t>An implementation <bcp14>MAY</bcp14> only support certain values of c509CertificateRequestType. The most common values are expected to be:</t>
        <ul spacing="normal">
          <li>
            <t>c509CertificateRequestType = 0. This type indicates that the C509 Certificate Request is natively signed, and that the requested certificate format has c509CertificateType = 2. This encoding removes the need for ASN.1 and DER parsing and re-encoding in the requesting party.</t>
          </li>
          <li>
            <t>c509CertificateRequestType = 3. This type indicates that the C509 Certificate Request is CBOR re-encoded RFC 2986 certification requests, and that the requested certificate format has c509CertificateType = 3. This encoding is backwards compatible with legacy RFC 2986 certification requests and X.509 certificates, but enables a reduced transport overhead.</t>
          </li>
        </ul>
      </section>
      <section anchor="subject-signature-algorithm">
        <name>Subject Signature Algorithm</name>
        <t>subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, e.g., as defined in <xref target="RFC6955"/>. In the case of <xref target="RFC6955"/>, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier distributed out-of-band. Both signature algorithms and non-signature proof-of-possession algorithms are listed in the C509 Signature Algorithms Registry, see <xref target="sigalg"/>. The non-signature roof-of-possession algorithms with SHA-2 and HMAC-SHA2 (see values 14-16 in <xref target="sigalg"/>) requires a signature value with syntax DhSigStatic defined as follows:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
DhSigStatic = MessageDigest / DhSigStaticType

MessageDigest = bytes

DhSigStaticType = [
  issuer: Name,
  serialNumber: CertificateSerialNumber
  hashValue: MessageDigest
]
]]></sourcecode>
        <t>Note that a key agreement key pair may be used with a signature algorithm in a certificate request, see <xref target="app-DH-keys"/>.</t>
      </section>
      <section anchor="certificate-request-attributes">
        <name>Certificate Request Attributes</name>
        <t><xref section="5.4" sectionFormat="of" target="RFC2985"/> specifies two attribute types that may be included in the certificate request: extension request and challenge password.</t>
        <section anchor="extensions-request">
          <name>Extensions Request</name>
          <t>The extensionRequest field is used to carry information about certificate extensions the entity requesting certification wishes to be included in the certificate, encoded as Extensions in <xref target="message-fields"/>. An empty CBOR array indicates no extensions.</t>
        </section>
        <section anchor="challenge-password">
          <name>Challenge Password</name>
          <t>Other certificate request attributes are included using the Extensions structure and the extensionRequest field. The only other certificate request attribute specified in this document is challengePassword, listed in the C509 Extensions Registry, see <xref target="fig-extype"/>. The extensionValue is encoded as follows:</t>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
challengePassword = SpecialText
]]></sourcecode>
          <t>In natively signed requests (types 0 and 2), a positive extensionID is used. In CBOR re-encoding of a DER encoded request (types 1 and 3), the sign of extensionID of challengePassword indicates the string type in the DER encoded challengePassword (instead of the criticalness in extensions): positive for utf8String and negative for printableString. The same text string encoding optimizations applies as in <xref target="issuer"/>.</t>
        </section>
      </section>
      <section anchor="CRT">
        <name>Certificate Request Template</name>
        <t>Enrollment over Secure Transport (EST, <xref target="RFC7030"/>) defines, and <xref target="I-D.ietf-lamps-rfc7030-csrattrs"/> clarifies, how an EST server can specify what it expects the EST client to include in a subsequent Certificate Signing Request (CSR). Alternatively to the unstructured mechanism specified in <xref target="RFC7030"/>, <xref section="B" sectionFormat="of" target="RFC8295"/> describes an approach using a Certificate Request Template in response to a GET /csrattrs request by the EST client. The EST server thus returns an Certificate Request-like object with various fields filled out, and other fields waiting to be filled in and a signature to be added by the EST client.</t>
        <t>For C509 we follow the approach of <xref target="RFC8295"/>. The C509CertificateRequestTemplate is based on TBSCertificateRequest of the C509CertificateRequest, see <xref target="fig-C509CSRCDDL"/>, but excludes the subjectSignatureValue field from the template since that needs no further specification.</t>
        <t>The C509 Certificate Request Template is shown in <xref target="fig-C509CSRTemplateCDDL"/>.</t>
        <figure anchor="fig-C509CSRTemplateCDDL">
          <name>CDDL for C509CertificateRequestTemplate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificateRequestTemplate = [
   c509CertificateRequestTemplateType: int,
   c509CertificateRequestType: [+ int] / undefined,
   subjectSignatureAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subject: NameTemplate,
   subjectPublicKeyAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subjectPublicKey: undefined
   extensionsRequest: ExtensionsTemplate,
]

NameTemplate = [ * AttributeTemplate ] / SpecialText

AttributeTemplate = (( attributeType: int,
                       attributeValue: SpecialText / undefined ) //
                     ( attributeType: ~oid,
                       attributeValue: bytes / undefined ))

ExtensionsTemplate = [ * ExtensionTemplate ] / int

ExtensionTemplate = (( extensionID: int, extensionValue: any ) //
                     ( extensionID: ~oid, ? critical: true,
                       extensionValue: bytes / undefined ))
]]></sourcecode>
        </figure>
        <t>Except as specified in this section, the fields have the same encoding as the corresponding fields of the TBSCertificateRequest, see <xref target="fig-C509CSRCDDL"/>. The specification of the template makes use of the CBOR simple value undefined (0xf7) to indicate fields to fill in. Consistent with this rule, note that the subjectPublicKey field always has the value undefined in the template.</t>
        <t>Different types of Certificate Request Templates can be defined (see <xref target="temp-type"/>), distinguished by the c509CertificateRequestTemplateType integer. Each type may have its own CDDL structure.</t>
        <t>The presence of a Defined (non-undefined) value in a C509CertificateRequestTemplate indicates that the EST server expects the EST client to use that value in the certificate request. If multiple AlgorithmIdentifier or c509CertificateRequestType values are present, the EST server expects the EST client to select one of them for use in the Certificate Request. The presence of an undefined value indicates that the EST client is expected to provide an appropriate value for that field. For example, if the EST server includes a subjectAltName with a GeneralNameType iPAddress and a GeneralNameValue empty byte string, this means that the client <bcp14>SHOULD</bcp14> fill in a corresponding GeneralNameValue.</t>
        <t>The media type of C509CertificateRequestTemplate is application/cose-c509-crtemplate, see <xref target="c509-crtemplate"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD18 is defined using the reserved CBOR tag 55799 and the Content-Format TBD19, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certificate Request format defined in <xref target="CSR"/> follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>. The CA can make use of a Certificate Request Template defined in <xref target="CRT"/>, for simplified configuration.</t>
      <t>When a certificate request is received, the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession corresponding to the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 3 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 2 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with the CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 CSR, the CA transforms it into a DER encoded RFC 2986 CertificationRequestInfo and uses that with existing processes and code to produce an RFC 5280 DER encoded X.509 certificate. The DER encoded X.509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where certificates are sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway, which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over constrained wireless links. The conversion to X.509 within a constrained IoT device will incur a computational overhead. However, measured in energy, this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in Figures <xref target="fig-size-COSE" format="counter"/> and <xref target="fig-size-TLS" format="counter"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli <xref target="RFC7932"/> will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. In the examples with HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 uses dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 2 and 3 have the same size. For Brotli, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="528" viewBox="0 0 528 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
              <path d="M 328,32 L 328,160" fill="none" stroke="black"/>
              <path d="M 424,32 L 424,160" fill="none" stroke="black"/>
              <path d="M 520,32 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,32 L 520,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 520,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 520,160" fill="none" stroke="black"/>
              <g class="text">
                <text x="376" y="52">COSE_X509</text>
                <text x="472" y="52">COSE_C509</text>
                <text x="32" y="84">RFC</text>
                <text x="68" y="84">7925</text>
                <text x="124" y="84">profiled</text>
                <text x="176" y="84">IoT</text>
                <text x="240" y="84">Certificate</text>
                <text x="304" y="84">(1)</text>
                <text x="400" y="84">317</text>
                <text x="496" y="84">142</text>
                <text x="40" y="116">ECDSA</text>
                <text x="88" y="116">HTTPS</text>
                <text x="160" y="116">Certificate</text>
                <text x="232" y="116">Chain</text>
                <text x="272" y="116">(2)</text>
                <text x="396" y="116">2193</text>
                <text x="492" y="116">1397</text>
                <text x="32" y="148">RSA</text>
                <text x="72" y="148">HTTPS</text>
                <text x="144" y="148">Certificate</text>
                <text x="216" y="148">Chain</text>
                <text x="256" y="148">(4)</text>
                <text x="396" y="148">5175</text>
                <text x="492" y="148">3937</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       142 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1397 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3937 |
+---------------------------------------+-----------+-----------+
]]></artwork>
        </artset>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X.509 and C509 are Certificate messages. X.509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="560" viewBox="0 0 560 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,224" fill="none" stroke="black"/>
              <path d="M 168,32 L 168,224" fill="none" stroke="black"/>
              <path d="M 232,32 L 232,224" fill="none" stroke="black"/>
              <path d="M 368,32 L 368,224" fill="none" stroke="black"/>
              <path d="M 424,32 L 424,224" fill="none" stroke="black"/>
              <path d="M 552,32 L 552,224" fill="none" stroke="black"/>
              <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 552,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 552,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 552,224" fill="none" stroke="black"/>
              <g class="text">
                <text x="200" y="52">X.509</text>
                <text x="264" y="52">X.509</text>
                <text x="296" y="52">+</text>
                <text x="332" y="52">Brotli</text>
                <text x="396" y="52">C509</text>
                <text x="452" y="52">C509</text>
                <text x="480" y="52">+</text>
                <text x="516" y="52">Brotli</text>
                <text x="32" y="84">RFC</text>
                <text x="68" y="84">7925</text>
                <text x="108" y="84">Cert</text>
                <text x="144" y="84">(1)</text>
                <text x="208" y="84">327</text>
                <text x="344" y="84">324</text>
                <text x="400" y="84">152</text>
                <text x="528" y="84">170</text>
                <text x="36" y="116">RPKI</text>
                <text x="76" y="116">Cert</text>
                <text x="112" y="116">(1)</text>
                <text x="200" y="116">20991</text>
                <text x="340" y="116">9134</text>
                <text x="396" y="116">8663</text>
                <text x="524" y="116">5671</text>
                <text x="40" y="148">HTTPS</text>
                <text x="88" y="148">Chain</text>
                <text x="128" y="148">(2)</text>
                <text x="204" y="148">2204</text>
                <text x="340" y="148">1455</text>
                <text x="396" y="148">1417</text>
                <text x="524" y="148">1066</text>
                <text x="40" y="180">HTTPS</text>
                <text x="88" y="180">Chain</text>
                <text x="128" y="180">(4)</text>
                <text x="204" y="180">5190</text>
                <text x="340" y="180">3244</text>
                <text x="396" y="180">3961</text>
                <text x="524" y="180">2848</text>
                <text x="40" y="212">HTTPS</text>
                <text x="80" y="212">Bag</text>
                <text x="112" y="212">(8)</text>
                <text x="200" y="212">11578</text>
                <text x="340" y="212">3979</text>
                <text x="396" y="212">8885</text>
                <text x="524" y="212">3522</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-------------------+-------+----------------+------+---------------+
|                   | X.509 | X.509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+----------------+------+---------------+
| RFC 7925 Cert (1) |   327 |            324 |  152 |           170 |
+-------------------+-------+----------------+------+---------------+
| RPKI Cert (1)     | 20991 |           9134 | 8663 |          5671 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (2)   |  2204 |           1455 | 1417 |          1066 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (4)   |  5190 |           3244 | 3961 |          2848 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Bag (8)     | 11578 |           3979 | 8885 |          3522 |
+-------------------+-------+----------------+------+---------------+
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR encoding of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors. The security considerations of <xref target="RFC5280"/> apply.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this document does not reveal any additional information compared to X.509. Because of the difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
      <t>Any issues with decoding or parsing a C509 certificate should be handled exactly as how such errors would be handled for the corresponding X.509 certificate. For example, a non-critical extension <bcp14>MAY</bcp14> be ignored if it is not recognized, see <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
      <t>As stated in <xref target="cose-header-params"/>, the contents of the COSE Header Parameters c5b, c5c, c5t, c5u is untrusted input that potentially may be verified using existing trust anchors or other trust establishment mechanism out of scope of this document. Similar security considerations as x5bag, x5chain, x5t and x5u applies, see <xref target="RFC9360"/>. Security considerations of the COSE protected and unprotected headers is discussed in <xref target="RFC9052"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries under the new heading "CBOR Encoded X.509 (C509) Parameters". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate an entry that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1-byte encoding, other values in the interval [-256, 255] have a 2-byte encoding, and the remaining values in the interval [-65536, 65535] have a 3-byte encoding.</t>
      <t>All assignments according to "IETF Review with Expert Review" are made on a "IETF Review" basis per Section 4.8 of <xref target="RFC8126"/> with "Expert Review" additionally required per Section 4.5 of <xref target="RFC8126"/>. The procedure for early IANA allocation of "standards track code points" defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, working group chairs are encouraged to consult the expert(s) early during the process outlined in Section 3.1 of <xref target="RFC7120"/>.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. It is mandatory to specify content in all columns. For values in the interval [-24, 23], the registration procedure is "IETF Review with Expert Review". For all other values, the registration procedure is "Expert Review".  The initial contents of the registry are (see <xref target="version"/>):</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="432" viewBox="0 0 432 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,192" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,192" fill="none" stroke="black"/>
                <path d="M 8,32 L 424,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 424,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 424,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 424,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 424,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 424,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 424,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="116" y="84">Reserved</text>
                  <text x="56" y="116">1</text>
                  <text x="116" y="116">Reserved</text>
                  <text x="56" y="148">2</text>
                  <text x="116" y="148">Natively</text>
                  <text x="180" y="148">Signed</text>
                  <text x="228" y="148">C509</text>
                  <text x="296" y="148">Certificate</text>
                  <text x="56" y="180">3</text>
                  <text x="100" y="180">CBOR</text>
                  <text x="164" y="180">Re-encoded</text>
                  <text x="232" y="180">X.509</text>
                  <text x="268" y="180">v3</text>
                  <text x="328" y="180">Certificate</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-------------------------------------------+
| Value | Description                               |
+=======+===========================================+
|     0 | Reserved                                  |
+-------+-------------------------------------------+
|     1 | Reserved                                  |
+-------+-------------------------------------------+
|     2 | Natively Signed C509 Certificate          |
+-------+-------------------------------------------+
|     3 | CBOR Re-encoded X.509 v3 Certificate      |
+-------+-------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="csr-type">
        <name>C509 Certificate Request Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-csr-types">
          <name>C509 Certificate Request Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,256" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 552,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 552,208" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="120" y="84">Requested</text>
                  <text x="208" y="84">certificate</text>
                  <text x="268" y="84">is</text>
                  <text x="300" y="84">C509</text>
                  <text x="340" y="84">Type</text>
                  <text x="372" y="84">2.</text>
                  <text x="116" y="100">Natively</text>
                  <text x="180" y="100">Signed</text>
                  <text x="228" y="100">C509</text>
                  <text x="296" y="100">Certificate</text>
                  <text x="380" y="100">Request.</text>
                  <text x="56" y="132">1</text>
                  <text x="120" y="132">Requested</text>
                  <text x="208" y="132">certificate</text>
                  <text x="268" y="132">is</text>
                  <text x="300" y="132">C509</text>
                  <text x="340" y="132">Type</text>
                  <text x="372" y="132">2.</text>
                  <text x="100" y="148">CBOR</text>
                  <text x="168" y="148">re-encoding</text>
                  <text x="228" y="148">of</text>
                  <text x="256" y="148">RFC</text>
                  <text x="292" y="148">2986</text>
                  <text x="368" y="148">certification</text>
                  <text x="460" y="148">request.</text>
                  <text x="56" y="180">2</text>
                  <text x="120" y="180">Requested</text>
                  <text x="208" y="180">certificate</text>
                  <text x="268" y="180">is</text>
                  <text x="300" y="180">C509</text>
                  <text x="340" y="180">Type</text>
                  <text x="372" y="180">3.</text>
                  <text x="116" y="196">Natively</text>
                  <text x="180" y="196">Signed</text>
                  <text x="228" y="196">C509</text>
                  <text x="296" y="196">Certificate</text>
                  <text x="380" y="196">Request.</text>
                  <text x="56" y="228">3</text>
                  <text x="120" y="228">Requested</text>
                  <text x="208" y="228">certificate</text>
                  <text x="268" y="228">is</text>
                  <text x="300" y="228">C509</text>
                  <text x="340" y="228">Type</text>
                  <text x="372" y="228">3.</text>
                  <text x="100" y="244">CBOR</text>
                  <text x="168" y="244">re-encoding</text>
                  <text x="228" y="244">of</text>
                  <text x="256" y="244">RFC</text>
                  <text x="292" y="244">2986</text>
                  <text x="368" y="244">certification</text>
                  <text x="460" y="244">request.</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Requested certificate is C509 Type 2.                     |
|       | Natively Signed C509 Certificate Request.                 |
+-------+-----------------------------------------------------------+
|     1 | Requested certificate is C509 Type 2.                     |
|       | CBOR re-encoding of RFC 2986 certification request.       |
+-------+-----------------------------------------------------------+
|     2 | Requested certificate is C509 Type 3.                     |
|       | Natively Signed C509 Certificate Request.                 |
+-------+-----------------------------------------------------------+
|     3 | Requested certificate is C509 Type 3.                     |
|       | CBOR re-encoding of RFC 2986 certification request.       |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="privkeys">
        <name>C509 Private Key Types Registry</name>
        <t>IANA has created a new registry titled "C509 Private Key Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Comments, and subjectPrivateKey, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-rivkeys">
          <name>C509 Private Key Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="560" viewBox="0 0 560 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,160" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 552,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="112" y="52">Private</text>
                  <text x="160" y="52">Key</text>
                  <text x="200" y="52">Types</text>
                  <text x="56" y="84">0</text>
                  <text x="120" y="84">Comments:</text>
                  <text x="276" y="84">Asymmetric</text>
                  <text x="336" y="84">Key</text>
                  <text x="384" y="84">Package</text>
                  <text x="436" y="84">(RFC</text>
                  <text x="480" y="84">5958)</text>
                  <text x="156" y="100">subjectPrivateKey:</text>
                  <text x="256" y="100">bytes</text>
                  <text x="56" y="132">1</text>
                  <text x="120" y="132">Comments:</text>
                  <text x="252" y="132">COSE</text>
                  <text x="288" y="132">Key</text>
                  <text x="332" y="132">Object</text>
                  <text x="380" y="132">(RFC</text>
                  <text x="424" y="132">9052)</text>
                  <text x="156" y="148">subjectPrivateKey:</text>
                  <text x="268" y="148">COSE_Key</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Private Key Types                                         |
+=======+===========================================================+
|     0 | Comments:          Asymmetric Key Package (RFC 5958)      |
|       | subjectPrivateKey: bytes                                  |
+-------+-----------------------------------------------------------+
|     1 | Comments:          COSE Key Object (RFC 9052)             |
|       | subjectPrivateKey: COSE_Key                               |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="temp-type">
        <name>C509 Certificate Request Templates Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Templates Types" under the new heading "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-temp-types">
          <name>C509 Certificate Request Templates Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,96" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="108" y="84">Simple</text>
                  <text x="156" y="84">C509</text>
                  <text x="224" y="84">Certificate</text>
                  <text x="304" y="84">Request</text>
                  <text x="372" y="84">Template</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Simple C509 Certificate Request Template                  |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="atttype">
        <name>C509 Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 Attributes" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is a non-negative integer, and the other columns are text strings. Name and Identifiers are informal descriptions. The fields Name, OID, and DER are mandatory. For values in the interval [0, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". Name and Identifiers are informal descriptions. The OID is given in dotted decimal representation. The DER column contains the hex string of the DER-encoded OID <xref target="X.690"/>.</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 Attributes</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2880" width="560" viewBox="0 0 560 2880" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2864" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2864" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2864" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,832 L 552,832" fill="none" stroke="black"/>
                <path d="M 8,928 L 552,928" fill="none" stroke="black"/>
                <path d="M 8,1024 L 552,1024" fill="none" stroke="black"/>
                <path d="M 8,1120 L 552,1120" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1312 L 552,1312" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1504 L 552,1504" fill="none" stroke="black"/>
                <path d="M 8,1600 L 552,1600" fill="none" stroke="black"/>
                <path d="M 8,1696 L 552,1696" fill="none" stroke="black"/>
                <path d="M 8,1792 L 552,1792" fill="none" stroke="black"/>
                <path d="M 8,1888 L 552,1888" fill="none" stroke="black"/>
                <path d="M 8,1984 L 552,1984" fill="none" stroke="black"/>
                <path d="M 8,2096 L 552,2096" fill="none" stroke="black"/>
                <path d="M 8,2192 L 552,2192" fill="none" stroke="black"/>
                <path d="M 8,2288 L 552,2288" fill="none" stroke="black"/>
                <path d="M 8,2384 L 552,2384" fill="none" stroke="black"/>
                <path d="M 8,2480 L 552,2480" fill="none" stroke="black"/>
                <path d="M 8,2576 L 552,2576" fill="none" stroke="black"/>
                <path d="M 8,2672 L 552,2672" fill="none" stroke="black"/>
                <path d="M 8,2768 L 552,2768" fill="none" stroke="black"/>
                <path d="M 8,2864 L 552,2864" fill="none" stroke="black"/>
                <circle cx="368" cy="864" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="120" y="52">Attribute</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="240" y="84">Email</text>
                  <text x="296" y="84">Address</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="272" y="100">emailAddress,</text>
                  <text x="384" y="100">e-mailAddress</text>
                  <text x="100" y="116">OID:</text>
                  <text x="300" y="116">1.2.840.113549.1.9.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">09</text>
                  <text x="276" y="132">2A</text>
                  <text x="300" y="132">86</text>
                  <text x="324" y="132">48</text>
                  <text x="348" y="132">86</text>
                  <text x="372" y="132">F7</text>
                  <text x="396" y="132">0D</text>
                  <text x="420" y="132">01</text>
                  <text x="444" y="132">09</text>
                  <text x="468" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="244" y="180">Common</text>
                  <text x="292" y="180">Name</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="264" y="196">commonName,</text>
                  <text x="324" y="196">cn</text>
                  <text x="100" y="212">OID:</text>
                  <text x="248" y="212">2.5.4.3</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">03</text>
                  <text x="276" y="228">55</text>
                  <text x="300" y="228">04</text>
                  <text x="324" y="228">03</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="248" y="276">Surname</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="252" y="292">surname,</text>
                  <text x="300" y="292">sn</text>
                  <text x="100" y="308">OID:</text>
                  <text x="248" y="308">2.5.4.4</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">03</text>
                  <text x="276" y="324">55</text>
                  <text x="300" y="324">04</text>
                  <text x="324" y="324">04</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="244" y="372">Serial</text>
                  <text x="300" y="372">Number</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="268" y="388">serialNumber</text>
                  <text x="100" y="404">OID:</text>
                  <text x="248" y="404">2.5.4.5</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">03</text>
                  <text x="276" y="420">55</text>
                  <text x="300" y="420">04</text>
                  <text x="324" y="420">05</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="248" y="468">Country</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="268" y="484">countryName,</text>
                  <text x="328" y="484">c</text>
                  <text x="100" y="500">OID:</text>
                  <text x="248" y="500">2.5.4.6</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">03</text>
                  <text x="276" y="516">55</text>
                  <text x="300" y="516">04</text>
                  <text x="324" y="516">06</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="56" y="564">5</text>
                  <text x="104" y="564">Name:</text>
                  <text x="252" y="564">Locality</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="272" y="580">localityName,</text>
                  <text x="368" y="580">locality,</text>
                  <text x="416" y="580">l</text>
                  <text x="100" y="596">OID:</text>
                  <text x="248" y="596">2.5.4.7</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">03</text>
                  <text x="276" y="612">55</text>
                  <text x="300" y="612">04</text>
                  <text x="324" y="612">07</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="56" y="660">6</text>
                  <text x="104" y="660">Name:</text>
                  <text x="240" y="660">State</text>
                  <text x="276" y="660">or</text>
                  <text x="324" y="660">Province</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="300" y="676">stateOrProvinceName,</text>
                  <text x="396" y="676">st</text>
                  <text x="100" y="692">OID:</text>
                  <text x="248" y="692">2.5.4.8</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">03</text>
                  <text x="276" y="708">55</text>
                  <text x="300" y="708">04</text>
                  <text x="324" y="708">08</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="56" y="756">7</text>
                  <text x="104" y="756">Name:</text>
                  <text x="244" y="756">Street</text>
                  <text x="304" y="756">Address</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="276" y="772">streetAddress,</text>
                  <text x="364" y="772">street</text>
                  <text x="100" y="788">OID:</text>
                  <text x="248" y="788">2.5.4.9</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">03</text>
                  <text x="276" y="804">55</text>
                  <text x="300" y="804">04</text>
                  <text x="324" y="804">09</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="56" y="852">8</text>
                  <text x="104" y="852">Name:</text>
                  <text x="268" y="852">Organization</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="288" y="868">organizationName,</text>
                  <text x="100" y="884">OID:</text>
                  <text x="252" y="884">2.5.4.10</text>
                  <text x="100" y="900">DER:</text>
                  <text x="228" y="900">06</text>
                  <text x="252" y="900">03</text>
                  <text x="276" y="900">55</text>
                  <text x="300" y="900">04</text>
                  <text x="324" y="900">0A</text>
                  <text x="120" y="916">Comments:</text>
                  <text x="56" y="948">9</text>
                  <text x="104" y="948">Name:</text>
                  <text x="276" y="948">Organizational</text>
                  <text x="356" y="948">Unit</text>
                  <text x="132" y="964">Identifiers:</text>
                  <text x="312" y="964">organizationalUnitName,</text>
                  <text x="420" y="964">ou</text>
                  <text x="100" y="980">OID:</text>
                  <text x="252" y="980">2.5.4.11</text>
                  <text x="100" y="996">DER:</text>
                  <text x="228" y="996">06</text>
                  <text x="252" y="996">03</text>
                  <text x="276" y="996">55</text>
                  <text x="300" y="996">04</text>
                  <text x="324" y="996">0B</text>
                  <text x="120" y="1012">Comments:</text>
                  <text x="52" y="1044">10</text>
                  <text x="104" y="1044">Name:</text>
                  <text x="240" y="1044">Title</text>
                  <text x="132" y="1060">Identifiers:</text>
                  <text x="240" y="1060">title</text>
                  <text x="100" y="1076">OID:</text>
                  <text x="252" y="1076">2.5.4.12</text>
                  <text x="100" y="1092">DER:</text>
                  <text x="228" y="1092">06</text>
                  <text x="252" y="1092">03</text>
                  <text x="276" y="1092">55</text>
                  <text x="300" y="1092">04</text>
                  <text x="324" y="1092">0C</text>
                  <text x="120" y="1108">Comments:</text>
                  <text x="52" y="1140">11</text>
                  <text x="104" y="1140">Name:</text>
                  <text x="252" y="1140">Business</text>
                  <text x="324" y="1140">Category</text>
                  <text x="132" y="1156">Identifiers:</text>
                  <text x="284" y="1156">businessCategory</text>
                  <text x="100" y="1172">OID:</text>
                  <text x="252" y="1172">2.5.4.15</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="228" y="1188">06</text>
                  <text x="252" y="1188">03</text>
                  <text x="276" y="1188">55</text>
                  <text x="300" y="1188">04</text>
                  <text x="324" y="1188">0F</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="52" y="1236">12</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="244" y="1236">Postal</text>
                  <text x="292" y="1236">Code</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="260" y="1252">postalCode</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="252" y="1268">2.5.4.17</text>
                  <text x="100" y="1284">DER:</text>
                  <text x="228" y="1284">06</text>
                  <text x="252" y="1284">03</text>
                  <text x="276" y="1284">55</text>
                  <text x="300" y="1284">04</text>
                  <text x="324" y="1284">11</text>
                  <text x="120" y="1300">Comments:</text>
                  <text x="52" y="1332">13</text>
                  <text x="104" y="1332">Name:</text>
                  <text x="240" y="1332">Given</text>
                  <text x="284" y="1332">Name</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="256" y="1348">givenName</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="252" y="1364">2.5.4.42</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">03</text>
                  <text x="276" y="1380">55</text>
                  <text x="300" y="1380">04</text>
                  <text x="324" y="1380">2A</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="52" y="1428">14</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="252" y="1428">Initials</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="252" y="1444">initials</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="252" y="1460">2.5.4.43</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">03</text>
                  <text x="276" y="1476">55</text>
                  <text x="300" y="1476">04</text>
                  <text x="324" y="1476">2B</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="52" y="1524">15</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="260" y="1524">Generation</text>
                  <text x="344" y="1524">Qualifier</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="296" y="1540">generationQualifier</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="252" y="1556">2.5.4.44</text>
                  <text x="100" y="1572">DER:</text>
                  <text x="228" y="1572">06</text>
                  <text x="252" y="1572">03</text>
                  <text x="276" y="1572">55</text>
                  <text x="300" y="1572">04</text>
                  <text x="324" y="1572">2C</text>
                  <text x="120" y="1588">Comments:</text>
                  <text x="52" y="1620">16</text>
                  <text x="104" y="1620">Name:</text>
                  <text x="228" y="1620">DN</text>
                  <text x="280" y="1620">Qualifier</text>
                  <text x="132" y="1636">Identifiers:</text>
                  <text x="264" y="1636">dnQualifier</text>
                  <text x="100" y="1652">OID:</text>
                  <text x="252" y="1652">2.5.4.46</text>
                  <text x="100" y="1668">DER:</text>
                  <text x="228" y="1668">06</text>
                  <text x="252" y="1668">03</text>
                  <text x="276" y="1668">55</text>
                  <text x="300" y="1668">04</text>
                  <text x="324" y="1668">2E</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="52" y="1716">17</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="256" y="1716">Pseudonym</text>
                  <text x="132" y="1732">Identifiers:</text>
                  <text x="256" y="1732">pseudonym</text>
                  <text x="100" y="1748">OID:</text>
                  <text x="252" y="1748">2.5.4.65</text>
                  <text x="100" y="1764">DER:</text>
                  <text x="228" y="1764">06</text>
                  <text x="252" y="1764">03</text>
                  <text x="276" y="1764">55</text>
                  <text x="300" y="1764">04</text>
                  <text x="324" y="1764">41</text>
                  <text x="120" y="1780">Comments:</text>
                  <text x="52" y="1812">18</text>
                  <text x="104" y="1812">Name:</text>
                  <text x="268" y="1812">Organization</text>
                  <text x="364" y="1812">Identifier</text>
                  <text x="132" y="1828">Identifiers:</text>
                  <text x="308" y="1828">organizationIdentifier</text>
                  <text x="100" y="1844">OID:</text>
                  <text x="252" y="1844">2.5.4.97</text>
                  <text x="100" y="1860">DER:</text>
                  <text x="228" y="1860">06</text>
                  <text x="252" y="1860">03</text>
                  <text x="276" y="1860">55</text>
                  <text x="300" y="1860">04</text>
                  <text x="324" y="1860">61</text>
                  <text x="120" y="1876">Comments:</text>
                  <text x="52" y="1908">19</text>
                  <text x="104" y="1908">Name:</text>
                  <text x="236" y="1908">Inc.</text>
                  <text x="292" y="1908">Locality</text>
                  <text x="132" y="1924">Identifiers:</text>
                  <text x="376" y="1924">jurisdictionOfIncorporationLocalityName</text>
                  <text x="100" y="1940">OID:</text>
                  <text x="316" y="1940">1.3.6.1.4.1.311.60.2.1.1</text>
                  <text x="100" y="1956">DER:</text>
                  <text x="228" y="1956">06</text>
                  <text x="252" y="1956">0B</text>
                  <text x="276" y="1956">2B</text>
                  <text x="300" y="1956">06</text>
                  <text x="324" y="1956">01</text>
                  <text x="348" y="1956">04</text>
                  <text x="372" y="1956">01</text>
                  <text x="396" y="1956">82</text>
                  <text x="420" y="1956">37</text>
                  <text x="444" y="1956">3C</text>
                  <text x="468" y="1956">02</text>
                  <text x="492" y="1956">01</text>
                  <text x="516" y="1956">01</text>
                  <text x="120" y="1972">Comments:</text>
                  <text x="52" y="2004">20</text>
                  <text x="104" y="2004">Name:</text>
                  <text x="236" y="2004">Inc.</text>
                  <text x="280" y="2004">State</text>
                  <text x="316" y="2004">or</text>
                  <text x="364" y="2004">Province</text>
                  <text x="132" y="2020">Identifiers:</text>
                  <text x="328" y="2020">jurisdictionOfIncorporation</text>
                  <text x="296" y="2036">StateOrProvinceName</text>
                  <text x="100" y="2052">OID:</text>
                  <text x="316" y="2052">1.3.6.1.4.1.311.60.2.1.2</text>
                  <text x="100" y="2068">DER:</text>
                  <text x="228" y="2068">06</text>
                  <text x="252" y="2068">0B</text>
                  <text x="276" y="2068">2B</text>
                  <text x="300" y="2068">06</text>
                  <text x="324" y="2068">01</text>
                  <text x="348" y="2068">04</text>
                  <text x="372" y="2068">01</text>
                  <text x="396" y="2068">82</text>
                  <text x="420" y="2068">37</text>
                  <text x="444" y="2068">3C</text>
                  <text x="468" y="2068">02</text>
                  <text x="492" y="2068">01</text>
                  <text x="516" y="2068">02</text>
                  <text x="120" y="2084">Comments:</text>
                  <text x="52" y="2116">21</text>
                  <text x="104" y="2116">Name:</text>
                  <text x="236" y="2116">Inc.</text>
                  <text x="288" y="2116">Country</text>
                  <text x="132" y="2132">Identifiers:</text>
                  <text x="372" y="2132">jurisdictionOfIncorporationCountryName</text>
                  <text x="100" y="2148">OID:</text>
                  <text x="316" y="2148">1.3.6.1.4.1.311.60.2.1.3</text>
                  <text x="100" y="2164">DER:</text>
                  <text x="228" y="2164">06</text>
                  <text x="252" y="2164">0B</text>
                  <text x="276" y="2164">2B</text>
                  <text x="300" y="2164">06</text>
                  <text x="324" y="2164">01</text>
                  <text x="348" y="2164">04</text>
                  <text x="372" y="2164">01</text>
                  <text x="396" y="2164">82</text>
                  <text x="420" y="2164">37</text>
                  <text x="444" y="2164">3C</text>
                  <text x="468" y="2164">02</text>
                  <text x="492" y="2164">01</text>
                  <text x="516" y="2164">03</text>
                  <text x="120" y="2180">Comments:</text>
                  <text x="52" y="2212">22</text>
                  <text x="104" y="2212">Name:</text>
                  <text x="244" y="2212">Domain</text>
                  <text x="312" y="2212">Component</text>
                  <text x="132" y="2228">Identifiers:</text>
                  <text x="284" y="2228">domainComponent,</text>
                  <text x="364" y="2228">dc</text>
                  <text x="100" y="2244">OID:</text>
                  <text x="324" y="2244">0.9.2342.19200300.100.1.25</text>
                  <text x="100" y="2260">DER:</text>
                  <text x="228" y="2260">06</text>
                  <text x="252" y="2260">0A</text>
                  <text x="276" y="2260">09</text>
                  <text x="300" y="2260">92</text>
                  <text x="324" y="2260">26</text>
                  <text x="348" y="2260">89</text>
                  <text x="372" y="2260">93</text>
                  <text x="396" y="2260">F2</text>
                  <text x="420" y="2260">2C</text>
                  <text x="444" y="2260">64</text>
                  <text x="468" y="2260">01</text>
                  <text x="492" y="2260">19</text>
                  <text x="120" y="2276">Comments:</text>
                  <text x="52" y="2308">25</text>
                  <text x="104" y="2308">Name:</text>
                  <text x="236" y="2308">Name</text>
                  <text x="132" y="2324">Identifiers:</text>
                  <text x="236" y="2324">name</text>
                  <text x="100" y="2340">OID:</text>
                  <text x="252" y="2340">2.5.4.41</text>
                  <text x="100" y="2356">DER:</text>
                  <text x="228" y="2356">06</text>
                  <text x="252" y="2356">03</text>
                  <text x="276" y="2356">55</text>
                  <text x="300" y="2356">04</text>
                  <text x="324" y="2356">29</text>
                  <text x="120" y="2372">Comments:</text>
                  <text x="52" y="2404">26</text>
                  <text x="104" y="2404">Name:</text>
                  <text x="256" y="2404">Telephone</text>
                  <text x="324" y="2404">Number</text>
                  <text x="132" y="2420">Identifiers:</text>
                  <text x="280" y="2420">telephoneNumber</text>
                  <text x="100" y="2436">OID:</text>
                  <text x="252" y="2436">2.5.4.20</text>
                  <text x="100" y="2452">DER:</text>
                  <text x="228" y="2452">06</text>
                  <text x="252" y="2452">03</text>
                  <text x="276" y="2452">55</text>
                  <text x="300" y="2452">04</text>
                  <text x="324" y="2452">14</text>
                  <text x="120" y="2468">Comments:</text>
                  <text x="52" y="2500">27</text>
                  <text x="104" y="2500">Name:</text>
                  <text x="256" y="2500">Directory</text>
                  <text x="340" y="2500">Management</text>
                  <text x="412" y="2500">Domain</text>
                  <text x="460" y="2500">Name</text>
                  <text x="132" y="2516">Identifiers:</text>
                  <text x="248" y="2516">dmdName</text>
                  <text x="100" y="2532">OID:</text>
                  <text x="252" y="2532">2.5.4.54</text>
                  <text x="100" y="2548">DER:</text>
                  <text x="228" y="2548">06</text>
                  <text x="252" y="2548">03</text>
                  <text x="276" y="2548">55</text>
                  <text x="300" y="2548">04</text>
                  <text x="324" y="2548">36</text>
                  <text x="120" y="2564">Comments:</text>
                  <text x="52" y="2596">28</text>
                  <text x="104" y="2596">Name:</text>
                  <text x="244" y="2596">userid</text>
                  <text x="132" y="2612">Identifiers:</text>
                  <text x="232" y="2612">uid</text>
                  <text x="100" y="2628">OID:</text>
                  <text x="320" y="2628">0.9.2342.19200300.100.1.1</text>
                  <text x="100" y="2644">DER:</text>
                  <text x="228" y="2644">06</text>
                  <text x="252" y="2644">0A</text>
                  <text x="276" y="2644">09</text>
                  <text x="300" y="2644">92</text>
                  <text x="324" y="2644">26</text>
                  <text x="348" y="2644">89</text>
                  <text x="372" y="2644">93</text>
                  <text x="396" y="2644">F2</text>
                  <text x="420" y="2644">2C</text>
                  <text x="444" y="2644">64</text>
                  <text x="468" y="2644">01</text>
                  <text x="492" y="2644">01</text>
                  <text x="120" y="2660">Comments:</text>
                  <text x="52" y="2692">29</text>
                  <text x="104" y="2692">Name:</text>
                  <text x="268" y="2692">Unstructured</text>
                  <text x="340" y="2692">Name</text>
                  <text x="132" y="2708">Identifiers:</text>
                  <text x="284" y="2708">unstructuredName</text>
                  <text x="100" y="2724">OID:</text>
                  <text x="300" y="2724">1.2.840.113549.1.9.2</text>
                  <text x="100" y="2740">DER:</text>
                  <text x="228" y="2740">06</text>
                  <text x="252" y="2740">09</text>
                  <text x="276" y="2740">2A</text>
                  <text x="300" y="2740">86</text>
                  <text x="324" y="2740">48</text>
                  <text x="348" y="2740">86</text>
                  <text x="372" y="2740">F7</text>
                  <text x="396" y="2740">0D</text>
                  <text x="420" y="2740">01</text>
                  <text x="444" y="2740">09</text>
                  <text x="468" y="2740">02</text>
                  <text x="120" y="2756">Comments:</text>
                  <text x="52" y="2788">30</text>
                  <text x="104" y="2788">Name:</text>
                  <text x="268" y="2788">Unstructured</text>
                  <text x="352" y="2788">Address</text>
                  <text x="132" y="2804">Identifiers:</text>
                  <text x="296" y="2804">unstructuredAddress</text>
                  <text x="100" y="2820">OID:</text>
                  <text x="300" y="2820">1.2.840.113549.1.9.8</text>
                  <text x="100" y="2836">DER:</text>
                  <text x="228" y="2836">06</text>
                  <text x="252" y="2836">0A</text>
                  <text x="276" y="2836">2A</text>
                  <text x="300" y="2836">86</text>
                  <text x="324" y="2836">48</text>
                  <text x="348" y="2836">86</text>
                  <text x="372" y="2836">F7</text>
                  <text x="396" y="2836">0D</text>
                  <text x="420" y="2836">01</text>
                  <text x="444" y="2836">09</text>
                  <text x="468" y="2836">08</text>
                  <text x="492" y="2836">00</text>
                  <text x="120" y="2852">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Attribute                                                 |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08 00      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is a positive integer, and the other columns are text strings. The fields Name, OID, DER, abd extensionValue are mandatory. The registry also contains certificate request attributes for use in Certificate Requests, see <xref target="CSR"/>. For values in the interval [1, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions and Certificate Request Attributes</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2992" width="560" viewBox="0 0 560 2992" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2976" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2976" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2976" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,288 L 552,288" fill="none" stroke="black"/>
                <path d="M 8,400 L 552,400" fill="none" stroke="black"/>
                <path d="M 8,512 L 552,512" fill="none" stroke="black"/>
                <path d="M 8,624 L 552,624" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,960 L 552,960" fill="none" stroke="black"/>
                <path d="M 8,1072 L 552,1072" fill="none" stroke="black"/>
                <path d="M 8,1184 L 552,1184" fill="none" stroke="black"/>
                <path d="M 8,1296 L 552,1296" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1520 L 552,1520" fill="none" stroke="black"/>
                <path d="M 8,1632 L 552,1632" fill="none" stroke="black"/>
                <path d="M 8,1744 L 552,1744" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,1968 L 552,1968" fill="none" stroke="black"/>
                <path d="M 8,2080 L 552,2080" fill="none" stroke="black"/>
                <path d="M 8,2192 L 552,2192" fill="none" stroke="black"/>
                <path d="M 8,2304 L 552,2304" fill="none" stroke="black"/>
                <path d="M 8,2416 L 552,2416" fill="none" stroke="black"/>
                <path d="M 8,2528 L 552,2528" fill="none" stroke="black"/>
                <path d="M 8,2640 L 552,2640" fill="none" stroke="black"/>
                <path d="M 8,2752 L 552,2752" fill="none" stroke="black"/>
                <path d="M 8,2864 L 552,2864" fill="none" stroke="black"/>
                <path d="M 8,2976 L 552,2976" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="120" y="52">Extension</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="248" y="84">Subject</text>
                  <text x="296" y="84">Key</text>
                  <text x="356" y="84">Identifier</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="300" y="100">subjectKeyIdentifier</text>
                  <text x="100" y="116">OID:</text>
                  <text x="256" y="116">2.5.29.14</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">03</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">0E</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="144" y="164">extensionValue:</text>
                  <text x="300" y="164">SubjectKeyIdentifier</text>
                  <text x="56" y="196">2</text>
                  <text x="104" y="196">Name:</text>
                  <text x="232" y="196">Key</text>
                  <text x="272" y="196">Usage</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="252" y="212">keyUsage</text>
                  <text x="100" y="228">OID:</text>
                  <text x="256" y="228">2.5.29.15</text>
                  <text x="100" y="244">DER:</text>
                  <text x="228" y="244">06</text>
                  <text x="252" y="244">03</text>
                  <text x="276" y="244">55</text>
                  <text x="300" y="244">1D</text>
                  <text x="324" y="244">0F</text>
                  <text x="120" y="260">Comments:</text>
                  <text x="144" y="276">AttributeValue:</text>
                  <text x="252" y="276">KeyUsage</text>
                  <text x="56" y="308">3</text>
                  <text x="104" y="308">Name:</text>
                  <text x="248" y="308">Subject</text>
                  <text x="328" y="308">Alternative</text>
                  <text x="396" y="308">Name</text>
                  <text x="132" y="324">Identifiers:</text>
                  <text x="276" y="324">subjectAltName</text>
                  <text x="100" y="340">OID:</text>
                  <text x="256" y="340">2.5.29.17</text>
                  <text x="100" y="356">DER:</text>
                  <text x="228" y="356">06</text>
                  <text x="252" y="356">03</text>
                  <text x="276" y="356">55</text>
                  <text x="300" y="356">1D</text>
                  <text x="324" y="356">11</text>
                  <text x="120" y="372">Comments:</text>
                  <text x="144" y="388">extensionValue:</text>
                  <text x="276" y="388">SubjectAltName</text>
                  <text x="56" y="420">4</text>
                  <text x="104" y="420">Name:</text>
                  <text x="240" y="420">Basic</text>
                  <text x="312" y="420">Constraints</text>
                  <text x="132" y="436">Identifiers:</text>
                  <text x="284" y="436">basicConstraints</text>
                  <text x="100" y="452">OID:</text>
                  <text x="256" y="452">2.5.29.19</text>
                  <text x="100" y="468">DER:</text>
                  <text x="228" y="468">06</text>
                  <text x="252" y="468">03</text>
                  <text x="276" y="468">55</text>
                  <text x="300" y="468">1D</text>
                  <text x="324" y="468">13</text>
                  <text x="120" y="484">Comments:</text>
                  <text x="144" y="500">extensionValue:</text>
                  <text x="284" y="500">BasicConstraints</text>
                  <text x="56" y="532">5</text>
                  <text x="104" y="532">Name:</text>
                  <text x="232" y="532">CRL</text>
                  <text x="300" y="532">Distribution</text>
                  <text x="380" y="532">Points</text>
                  <text x="132" y="548">Identifiers:</text>
                  <text x="304" y="548">cRLDistributionPoints</text>
                  <text x="100" y="564">OID:</text>
                  <text x="256" y="564">2.5.29.31</text>
                  <text x="100" y="580">DER:</text>
                  <text x="228" y="580">06</text>
                  <text x="252" y="580">03</text>
                  <text x="276" y="580">55</text>
                  <text x="300" y="580">1D</text>
                  <text x="324" y="580">1F</text>
                  <text x="120" y="596">Comments:</text>
                  <text x="144" y="612">extensionValue:</text>
                  <text x="304" y="612">CRLDistributionPoints</text>
                  <text x="56" y="644">6</text>
                  <text x="104" y="644">Name:</text>
                  <text x="264" y="644">Certificate</text>
                  <text x="348" y="644">Policies</text>
                  <text x="132" y="660">Identifiers:</text>
                  <text x="296" y="660">certificatePolicies</text>
                  <text x="100" y="676">OID:</text>
                  <text x="256" y="676">2.5.29.32</text>
                  <text x="100" y="692">DER:</text>
                  <text x="228" y="692">06</text>
                  <text x="252" y="692">03</text>
                  <text x="276" y="692">55</text>
                  <text x="300" y="692">1D</text>
                  <text x="324" y="692">20</text>
                  <text x="120" y="708">Comments:</text>
                  <text x="144" y="724">extensionValue:</text>
                  <text x="296" y="724">CertificatePolicies</text>
                  <text x="56" y="756">7</text>
                  <text x="104" y="756">Name:</text>
                  <text x="256" y="756">Authority</text>
                  <text x="312" y="756">Key</text>
                  <text x="372" y="756">Identifier</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="308" y="772">authorityKeyIdentifier</text>
                  <text x="100" y="788">OID:</text>
                  <text x="256" y="788">2.5.29.35</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">03</text>
                  <text x="276" y="804">55</text>
                  <text x="300" y="804">1D</text>
                  <text x="324" y="804">23</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="144" y="836">extensionValue:</text>
                  <text x="308" y="836">AuthorityKeyIdentifier</text>
                  <text x="56" y="868">8</text>
                  <text x="104" y="868">Name:</text>
                  <text x="252" y="868">Extended</text>
                  <text x="304" y="868">Key</text>
                  <text x="344" y="868">Usage</text>
                  <text x="132" y="884">Identifiers:</text>
                  <text x="264" y="884">extKeyUsage</text>
                  <text x="100" y="900">OID:</text>
                  <text x="256" y="900">2.5.29.37</text>
                  <text x="100" y="916">DER:</text>
                  <text x="228" y="916">06</text>
                  <text x="252" y="916">03</text>
                  <text x="276" y="916">55</text>
                  <text x="300" y="916">1D</text>
                  <text x="324" y="916">25</text>
                  <text x="120" y="932">Comments:</text>
                  <text x="144" y="948">extensionValue:</text>
                  <text x="288" y="948">ExtKeyUsageSyntax</text>
                  <text x="56" y="980">9</text>
                  <text x="104" y="980">Name:</text>
                  <text x="256" y="980">Authority</text>
                  <text x="344" y="980">Information</text>
                  <text x="420" y="980">Access</text>
                  <text x="132" y="996">Identifiers:</text>
                  <text x="296" y="996">authorityInfoAccess</text>
                  <text x="100" y="1012">OID:</text>
                  <text x="288" y="1012">1.3.6.1.5.5.7.1.1</text>
                  <text x="100" y="1028">DER:</text>
                  <text x="228" y="1028">06</text>
                  <text x="252" y="1028">08</text>
                  <text x="276" y="1028">2B</text>
                  <text x="300" y="1028">06</text>
                  <text x="324" y="1028">01</text>
                  <text x="348" y="1028">05</text>
                  <text x="372" y="1028">05</text>
                  <text x="396" y="1028">07</text>
                  <text x="420" y="1028">01</text>
                  <text x="444" y="1028">01</text>
                  <text x="120" y="1044">Comments:</text>
                  <text x="144" y="1060">extensionValue:</text>
                  <text x="320" y="1060">AuthorityInfoAccessSyntax</text>
                  <text x="52" y="1092">10</text>
                  <text x="104" y="1092">Name:</text>
                  <text x="244" y="1092">Signed</text>
                  <text x="320" y="1092">Certificate</text>
                  <text x="408" y="1092">Timestamp</text>
                  <text x="468" y="1092">List</text>
                  <text x="132" y="1108">Identifiers:</text>
                  <text x="100" y="1124">OID:</text>
                  <text x="312" y="1124">1.3.6.1.4.1.11129.2.4.2</text>
                  <text x="100" y="1140">DER:</text>
                  <text x="228" y="1140">06</text>
                  <text x="252" y="1140">0A</text>
                  <text x="276" y="1140">2B</text>
                  <text x="300" y="1140">06</text>
                  <text x="324" y="1140">01</text>
                  <text x="348" y="1140">04</text>
                  <text x="372" y="1140">01</text>
                  <text x="396" y="1140">D6</text>
                  <text x="420" y="1140">79</text>
                  <text x="444" y="1140">02</text>
                  <text x="468" y="1140">04</text>
                  <text x="492" y="1140">02</text>
                  <text x="120" y="1156">Comments:</text>
                  <text x="144" y="1172">extensionValue:</text>
                  <text x="328" y="1172">SignedCertificateTimestamps</text>
                  <text x="52" y="1204">24</text>
                  <text x="104" y="1204">Name:</text>
                  <text x="248" y="1204">Subject</text>
                  <text x="320" y="1204">Directory</text>
                  <text x="404" y="1204">Attributes</text>
                  <text x="132" y="1220">Identifiers:</text>
                  <text x="324" y="1220">subjectDirectoryAttributes</text>
                  <text x="100" y="1236">OID:</text>
                  <text x="252" y="1236">2.5.29.9</text>
                  <text x="100" y="1252">DER:</text>
                  <text x="228" y="1252">06</text>
                  <text x="252" y="1252">03</text>
                  <text x="276" y="1252">55</text>
                  <text x="300" y="1252">1D</text>
                  <text x="324" y="1252">09</text>
                  <text x="120" y="1268">Comments:</text>
                  <text x="144" y="1284">extensionValue:</text>
                  <text x="324" y="1284">SubjectDirectoryAttributes</text>
                  <text x="52" y="1316">25</text>
                  <text x="104" y="1316">Name:</text>
                  <text x="244" y="1316">Issuer</text>
                  <text x="320" y="1316">Alternative</text>
                  <text x="388" y="1316">Name</text>
                  <text x="132" y="1332">Identifiers:</text>
                  <text x="272" y="1332">issuerAltName</text>
                  <text x="100" y="1348">OID:</text>
                  <text x="256" y="1348">2.5.29.18</text>
                  <text x="100" y="1364">DER:</text>
                  <text x="228" y="1364">06</text>
                  <text x="252" y="1364">03</text>
                  <text x="276" y="1364">55</text>
                  <text x="300" y="1364">1D</text>
                  <text x="324" y="1364">12</text>
                  <text x="120" y="1380">Comments:</text>
                  <text x="144" y="1396">extensionValue:</text>
                  <text x="272" y="1396">IssuerAltName</text>
                  <text x="52" y="1428">26</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="236" y="1428">Name</text>
                  <text x="304" y="1428">Constraints</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="280" y="1444">nameConstraints</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="256" y="1460">2.5.29.30</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">03</text>
                  <text x="276" y="1476">55</text>
                  <text x="300" y="1476">1D</text>
                  <text x="324" y="1476">1E</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="144" y="1508">extensionValue:</text>
                  <text x="280" y="1508">NameConstraints</text>
                  <text x="52" y="1540">27</text>
                  <text x="104" y="1540">Name:</text>
                  <text x="244" y="1540">Policy</text>
                  <text x="308" y="1540">Mappings</text>
                  <text x="132" y="1556">Identifiers:</text>
                  <text x="276" y="1556">policyMappings</text>
                  <text x="100" y="1572">OID:</text>
                  <text x="256" y="1572">2.5.29.33</text>
                  <text x="100" y="1588">DER:</text>
                  <text x="228" y="1588">06</text>
                  <text x="252" y="1588">03</text>
                  <text x="276" y="1588">55</text>
                  <text x="300" y="1588">1D</text>
                  <text x="324" y="1588">21</text>
                  <text x="120" y="1604">Comments:</text>
                  <text x="144" y="1620">extensionValue:</text>
                  <text x="276" y="1620">PolicyMappings</text>
                  <text x="52" y="1652">28</text>
                  <text x="104" y="1652">Name:</text>
                  <text x="244" y="1652">Policy</text>
                  <text x="320" y="1652">Constraints</text>
                  <text x="132" y="1668">Identifiers:</text>
                  <text x="288" y="1668">policyConstraints</text>
                  <text x="100" y="1684">OID:</text>
                  <text x="256" y="1684">2.5.29.36</text>
                  <text x="100" y="1700">DER:</text>
                  <text x="228" y="1700">06</text>
                  <text x="252" y="1700">03</text>
                  <text x="276" y="1700">55</text>
                  <text x="300" y="1700">1D</text>
                  <text x="324" y="1700">24</text>
                  <text x="120" y="1716">Comments:</text>
                  <text x="144" y="1732">extensionValue:</text>
                  <text x="288" y="1732">PolicyConstraints</text>
                  <text x="52" y="1764">29</text>
                  <text x="104" y="1764">Name:</text>
                  <text x="252" y="1764">Freshest</text>
                  <text x="304" y="1764">CRL</text>
                  <text x="132" y="1780">Identifiers:</text>
                  <text x="264" y="1780">freshestCRL</text>
                  <text x="100" y="1796">OID:</text>
                  <text x="256" y="1796">2.5.29.46</text>
                  <text x="100" y="1812">DER:</text>
                  <text x="228" y="1812">06</text>
                  <text x="252" y="1812">03</text>
                  <text x="276" y="1812">55</text>
                  <text x="300" y="1812">1D</text>
                  <text x="324" y="1812">2E</text>
                  <text x="120" y="1828">Comments:</text>
                  <text x="144" y="1844">extensionValue:</text>
                  <text x="264" y="1844">FreshestCRL</text>
                  <text x="52" y="1876">30</text>
                  <text x="104" y="1876">Name:</text>
                  <text x="248" y="1876">Inhibit</text>
                  <text x="320" y="1876">anyPolicy</text>
                  <text x="132" y="1892">Identifiers:</text>
                  <text x="284" y="1892">inhibitAnyPolicy</text>
                  <text x="100" y="1908">OID:</text>
                  <text x="256" y="1908">2.5.29.54</text>
                  <text x="100" y="1924">DER:</text>
                  <text x="228" y="1924">06</text>
                  <text x="252" y="1924">03</text>
                  <text x="276" y="1924">55</text>
                  <text x="300" y="1924">1D</text>
                  <text x="324" y="1924">36</text>
                  <text x="120" y="1940">Comments:</text>
                  <text x="144" y="1956">extensionValue:</text>
                  <text x="284" y="1956">InhibitAnyPolicy</text>
                  <text x="52" y="1988">31</text>
                  <text x="104" y="1988">Name:</text>
                  <text x="248" y="1988">Subject</text>
                  <text x="328" y="1988">Information</text>
                  <text x="404" y="1988">Access</text>
                  <text x="132" y="2004">Identifiers:</text>
                  <text x="288" y="2004">subjectInfoAccess</text>
                  <text x="100" y="2020">OID:</text>
                  <text x="292" y="2020">1.3.6.1.5.5.7.1.11</text>
                  <text x="100" y="2036">DER:</text>
                  <text x="228" y="2036">06</text>
                  <text x="252" y="2036">08</text>
                  <text x="276" y="2036">2B</text>
                  <text x="300" y="2036">06</text>
                  <text x="324" y="2036">01</text>
                  <text x="348" y="2036">05</text>
                  <text x="372" y="2036">05</text>
                  <text x="396" y="2036">07</text>
                  <text x="420" y="2036">01</text>
                  <text x="444" y="2036">0B</text>
                  <text x="120" y="2052">Comments:</text>
                  <text x="144" y="2068">extensionValue:</text>
                  <text x="312" y="2068">SubjectInfoAccessSyntax</text>
                  <text x="52" y="2100">32</text>
                  <text x="104" y="2100">Name:</text>
                  <text x="228" y="2100">IP</text>
                  <text x="280" y="2100">Resources</text>
                  <text x="132" y="2116">Identifiers:</text>
                  <text x="292" y="2116">id-pe-ipAddrBlocks</text>
                  <text x="100" y="2132">OID:</text>
                  <text x="288" y="2132">1.3.6.1.5.5.7.1.7</text>
                  <text x="100" y="2148">DER:</text>
                  <text x="228" y="2148">06</text>
                  <text x="252" y="2148">08</text>
                  <text x="276" y="2148">2B</text>
                  <text x="300" y="2148">06</text>
                  <text x="324" y="2148">01</text>
                  <text x="348" y="2148">05</text>
                  <text x="372" y="2148">05</text>
                  <text x="396" y="2148">07</text>
                  <text x="420" y="2148">01</text>
                  <text x="444" y="2148">07</text>
                  <text x="120" y="2164">Comments:</text>
                  <text x="144" y="2180">extensionValue:</text>
                  <text x="268" y="2180">IPAddrBlocks</text>
                  <text x="52" y="2212">33</text>
                  <text x="104" y="2212">Name:</text>
                  <text x="228" y="2212">AS</text>
                  <text x="280" y="2212">Resources</text>
                  <text x="132" y="2228">Identifiers:</text>
                  <text x="308" y="2228">id-pe-autonomousSysIds</text>
                  <text x="100" y="2244">OID:</text>
                  <text x="288" y="2244">1.3.6.1.5.5.7.1.8</text>
                  <text x="100" y="2260">DER:</text>
                  <text x="228" y="2260">06</text>
                  <text x="252" y="2260">08</text>
                  <text x="276" y="2260">2B</text>
                  <text x="300" y="2260">06</text>
                  <text x="324" y="2260">01</text>
                  <text x="348" y="2260">05</text>
                  <text x="372" y="2260">05</text>
                  <text x="396" y="2260">07</text>
                  <text x="420" y="2260">01</text>
                  <text x="444" y="2260">08</text>
                  <text x="120" y="2276">Comments:</text>
                  <text x="144" y="2292">extensionValue:</text>
                  <text x="272" y="2292">ASIdentifiers</text>
                  <text x="52" y="2324">34</text>
                  <text x="104" y="2324">Name:</text>
                  <text x="228" y="2324">IP</text>
                  <text x="280" y="2324">Resources</text>
                  <text x="332" y="2324">v2</text>
                  <text x="132" y="2340">Identifiers:</text>
                  <text x="304" y="2340">id-pe-ipAddrBlocks-v2</text>
                  <text x="100" y="2356">OID:</text>
                  <text x="292" y="2356">1.3.6.1.5.5.7.1.28</text>
                  <text x="100" y="2372">DER:</text>
                  <text x="228" y="2372">06</text>
                  <text x="252" y="2372">08</text>
                  <text x="276" y="2372">2B</text>
                  <text x="300" y="2372">06</text>
                  <text x="324" y="2372">01</text>
                  <text x="348" y="2372">05</text>
                  <text x="372" y="2372">05</text>
                  <text x="396" y="2372">07</text>
                  <text x="420" y="2372">01</text>
                  <text x="444" y="2372">1C</text>
                  <text x="120" y="2388">Comments:</text>
                  <text x="144" y="2404">extensionValue:</text>
                  <text x="268" y="2404">IPAddrBlocks</text>
                  <text x="52" y="2436">35</text>
                  <text x="104" y="2436">Name:</text>
                  <text x="228" y="2436">AS</text>
                  <text x="280" y="2436">Resources</text>
                  <text x="332" y="2436">v2</text>
                  <text x="132" y="2452">Identifiers:</text>
                  <text x="320" y="2452">id-pe-autonomousSysIds-v2</text>
                  <text x="100" y="2468">OID:</text>
                  <text x="292" y="2468">1.3.6.1.5.5.7.1.29</text>
                  <text x="100" y="2484">DER:</text>
                  <text x="228" y="2484">06</text>
                  <text x="252" y="2484">08</text>
                  <text x="276" y="2484">2B</text>
                  <text x="300" y="2484">06</text>
                  <text x="324" y="2484">01</text>
                  <text x="348" y="2484">05</text>
                  <text x="372" y="2484">05</text>
                  <text x="396" y="2484">07</text>
                  <text x="420" y="2484">01</text>
                  <text x="444" y="2484">1D</text>
                  <text x="120" y="2500">Comments:</text>
                  <text x="144" y="2516">extensionValue:</text>
                  <text x="272" y="2516">ASIdentifiers</text>
                  <text x="52" y="2548">36</text>
                  <text x="104" y="2548">Name:</text>
                  <text x="236" y="2548">OCSP</text>
                  <text x="268" y="2548">No</text>
                  <text x="304" y="2548">Check</text>
                  <text x="132" y="2564">Identifiers:</text>
                  <text x="300" y="2564">id-pkix-ocsp-nocheck</text>
                  <text x="100" y="2580">OID:</text>
                  <text x="300" y="2580">1.3.6.1.5.5.7.48.1.5</text>
                  <text x="100" y="2596">DER:</text>
                  <text x="228" y="2596">06</text>
                  <text x="252" y="2596">09</text>
                  <text x="276" y="2596">2B</text>
                  <text x="300" y="2596">06</text>
                  <text x="324" y="2596">01</text>
                  <text x="348" y="2596">05</text>
                  <text x="372" y="2596">05</text>
                  <text x="396" y="2596">07</text>
                  <text x="420" y="2596">30</text>
                  <text x="444" y="2596">01</text>
                  <text x="468" y="2596">05</text>
                  <text x="120" y="2612">Comments:</text>
                  <text x="144" y="2628">extensionValue:</text>
                  <text x="236" y="2628">null</text>
                  <text x="52" y="2660">37</text>
                  <text x="104" y="2660">Name:</text>
                  <text x="276" y="2660">Precertificate</text>
                  <text x="368" y="2660">Signing</text>
                  <text x="448" y="2660">Certificate</text>
                  <text x="132" y="2676">Identifiers:</text>
                  <text x="100" y="2692">OID:</text>
                  <text x="312" y="2692">1.3.6.1.4.1.11129.2.4.3</text>
                  <text x="100" y="2708">DER:</text>
                  <text x="228" y="2708">06</text>
                  <text x="252" y="2708">0A</text>
                  <text x="276" y="2708">2B</text>
                  <text x="300" y="2708">06</text>
                  <text x="324" y="2708">01</text>
                  <text x="348" y="2708">04</text>
                  <text x="372" y="2708">01</text>
                  <text x="396" y="2708">D6</text>
                  <text x="420" y="2708">79</text>
                  <text x="444" y="2708">02</text>
                  <text x="468" y="2708">04</text>
                  <text x="492" y="2708">03</text>
                  <text x="120" y="2724">Comments:</text>
                  <text x="232" y="2724">RFC</text>
                  <text x="268" y="2724">6962</text>
                  <text x="144" y="2740">extensionValue:</text>
                  <text x="236" y="2740">null</text>
                  <text x="52" y="2772">38</text>
                  <text x="104" y="2772">Name:</text>
                  <text x="232" y="2772">TLS</text>
                  <text x="284" y="2772">Features</text>
                  <text x="132" y="2788">Identifiers:</text>
                  <text x="284" y="2788">id-pe-tlsfeature</text>
                  <text x="100" y="2804">OID:</text>
                  <text x="292" y="2804">1.3.6.1.5.5.7.1.24</text>
                  <text x="100" y="2820">DER:</text>
                  <text x="228" y="2820">06</text>
                  <text x="252" y="2820">08</text>
                  <text x="276" y="2820">2B</text>
                  <text x="300" y="2820">06</text>
                  <text x="324" y="2820">01</text>
                  <text x="348" y="2820">05</text>
                  <text x="372" y="2820">05</text>
                  <text x="396" y="2820">07</text>
                  <text x="420" y="2820">01</text>
                  <text x="444" y="2820">18</text>
                  <text x="120" y="2836">Comments:</text>
                  <text x="232" y="2836">RFC</text>
                  <text x="268" y="2836">7633</text>
                  <text x="144" y="2852">extensionValue:</text>
                  <text x="264" y="2852">TLSFeatures</text>
                  <text x="48" y="2884">255</text>
                  <text x="104" y="2884">Name:</text>
                  <text x="256" y="2884">Challenge</text>
                  <text x="332" y="2884">Password</text>
                  <text x="132" y="2900">Identifiers:</text>
                  <text x="288" y="2900">challengePassword</text>
                  <text x="100" y="2916">OID:</text>
                  <text x="300" y="2916">1.2.840.113549.1.9.7</text>
                  <text x="100" y="2932">DER:</text>
                  <text x="228" y="2932">06</text>
                  <text x="252" y="2932">09</text>
                  <text x="276" y="2932">2A</text>
                  <text x="300" y="2932">86</text>
                  <text x="324" y="2932">48</text>
                  <text x="348" y="2932">86</text>
                  <text x="372" y="2932">F7</text>
                  <text x="396" y="2932">0D</text>
                  <text x="420" y="2932">01</text>
                  <text x="444" y="2932">09</text>
                  <text x="468" y="2932">07</text>
                  <text x="120" y="2948">Comments:</text>
                  <text x="264" y="2948">Certificate</text>
                  <text x="344" y="2948">Request</text>
                  <text x="420" y="2948">Attributes</text>
                  <text x="144" y="2964">extensionValue:</text>
                  <text x="288" y="2964">ChallengePassword</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestamps              |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IP Resources                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Resources                             |
|       | Identifiers:     id-pe-autonomousSysIds                   |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IP Resources v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:                                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Resources v2                          |
|       | Identifiers:     id-pe-autonomousSysIds-v2                |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:                                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:                                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    37 | Name:            Precertificate Signing Certificate       |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.3                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 03      |
|       | Comments:        RFC 6962                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    38 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:        RFC 7633                                 |
|       | extensionValue:  TLSFeatures                              |
+-------+-----------------------------------------------------------+
|   255 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        Certificate Request Attributes           |
|       | extensionValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1648" width="560" viewBox="0 0 560 1648" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1632" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1632" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,1632" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,960 L 552,960" fill="none" stroke="black"/>
                <path d="M 8,1072 L 552,1072" fill="none" stroke="black"/>
                <path d="M 8,1184 L 552,1184" fill="none" stroke="black"/>
                <path d="M 8,1296 L 552,1296" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1520 L 552,1520" fill="none" stroke="black"/>
                <path d="M 8,1632 L 552,1632" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Certificate</text>
                  <text x="204" y="52">Policy</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="232" y="84">Any</text>
                  <text x="276" y="84">Policy</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="256" y="100">anyPolicy</text>
                  <text x="100" y="116">OID:</text>
                  <text x="264" y="116">2.5.29.32.0</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">04</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">20</text>
                  <text x="348" y="132">00</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="244" y="180">Domain</text>
                  <text x="316" y="180">Validation</text>
                  <text x="380" y="180">(DV)</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">domain-validated</text>
                  <text x="100" y="212">OID:</text>
                  <text x="276" y="212">2.23.140.1.2.1</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">06</text>
                  <text x="276" y="228">67</text>
                  <text x="300" y="228">81</text>
                  <text x="324" y="228">0C</text>
                  <text x="348" y="228">01</text>
                  <text x="372" y="228">02</text>
                  <text x="396" y="228">01</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="268" y="276">Organization</text>
                  <text x="364" y="276">Validation</text>
                  <text x="428" y="276">(OV)</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="308" y="292">organization-validated</text>
                  <text x="100" y="308">OID:</text>
                  <text x="276" y="308">2.23.140.1.2.2</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">06</text>
                  <text x="276" y="324">67</text>
                  <text x="300" y="324">81</text>
                  <text x="324" y="324">0C</text>
                  <text x="348" y="324">01</text>
                  <text x="372" y="324">02</text>
                  <text x="396" y="324">02</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="260" y="372">Individual</text>
                  <text x="348" y="372">Validation</text>
                  <text x="412" y="372">(IV)</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="300" y="388">individual-validated</text>
                  <text x="100" y="404">OID:</text>
                  <text x="276" y="404">2.23.140.1.2.3</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">06</text>
                  <text x="276" y="420">67</text>
                  <text x="300" y="420">81</text>
                  <text x="324" y="420">0C</text>
                  <text x="348" y="420">01</text>
                  <text x="372" y="420">02</text>
                  <text x="396" y="420">03</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="252" y="468">Extended</text>
                  <text x="332" y="468">Validation</text>
                  <text x="396" y="468">(EV)</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="272" y="484">ev-guidelines</text>
                  <text x="100" y="500">OID:</text>
                  <text x="268" y="500">2.23.140.1.1</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">05</text>
                  <text x="276" y="516">67</text>
                  <text x="300" y="516">81</text>
                  <text x="324" y="516">0C</text>
                  <text x="348" y="516">01</text>
                  <text x="372" y="516">01</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="56" y="564">7</text>
                  <text x="104" y="564">Name:</text>
                  <text x="252" y="564">Resource</text>
                  <text x="304" y="564">PKI</text>
                  <text x="348" y="564">(RPKI)</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="304" y="580">id-cp-ipAddr-asNumber</text>
                  <text x="100" y="596">OID:</text>
                  <text x="292" y="596">1.3.6.1.5.5.7.14.2</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">0E</text>
                  <text x="444" y="612">02</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="56" y="660">8</text>
                  <text x="104" y="660">Name:</text>
                  <text x="252" y="660">Resource</text>
                  <text x="304" y="660">PKI</text>
                  <text x="348" y="660">(RPKI)</text>
                  <text x="432" y="660">(Alternative)</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="316" y="676">id-cp-ipAddr-asNumber-v2</text>
                  <text x="100" y="692">OID:</text>
                  <text x="292" y="692">1.3.6.1.5.5.7.14.3</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">0E</text>
                  <text x="444" y="708">03</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="52" y="756">10</text>
                  <text x="104" y="756">Name:</text>
                  <text x="244" y="756">Remote</text>
                  <text x="288" y="756">SIM</text>
                  <text x="356" y="756">Provisioning</text>
                  <text x="428" y="756">Role</text>
                  <text x="264" y="772">Certificate</text>
                  <text x="340" y="772">Issuer</text>
                  <text x="132" y="788">Identifiers:</text>
                  <text x="272" y="788">id-rspRole-ci</text>
                  <text x="100" y="804">OID:</text>
                  <text x="284" y="804">2.23.146.1.2.1.0</text>
                  <text x="100" y="820">DER:</text>
                  <text x="228" y="820">06</text>
                  <text x="252" y="820">07</text>
                  <text x="276" y="820">67</text>
                  <text x="300" y="820">81</text>
                  <text x="324" y="820">12</text>
                  <text x="348" y="820">01</text>
                  <text x="372" y="820">02</text>
                  <text x="396" y="820">01</text>
                  <text x="420" y="820">00</text>
                  <text x="120" y="836">Comments:</text>
                  <text x="52" y="868">11</text>
                  <text x="104" y="868">Name:</text>
                  <text x="244" y="868">Remote</text>
                  <text x="288" y="868">SIM</text>
                  <text x="356" y="868">Provisioning</text>
                  <text x="428" y="868">Role</text>
                  <text x="240" y="884">eUICC</text>
                  <text x="132" y="900">Identifiers:</text>
                  <text x="284" y="900">id-rspRole-euicc</text>
                  <text x="100" y="916">OID:</text>
                  <text x="284" y="916">2.23.146.1.2.1.1</text>
                  <text x="100" y="932">DER:</text>
                  <text x="228" y="932">06</text>
                  <text x="252" y="932">07</text>
                  <text x="276" y="932">67</text>
                  <text x="300" y="932">81</text>
                  <text x="324" y="932">12</text>
                  <text x="348" y="932">01</text>
                  <text x="372" y="932">02</text>
                  <text x="396" y="932">01</text>
                  <text x="420" y="932">01</text>
                  <text x="120" y="948">Comments:</text>
                  <text x="52" y="980">12</text>
                  <text x="104" y="980">Name:</text>
                  <text x="244" y="980">Remote</text>
                  <text x="288" y="980">SIM</text>
                  <text x="356" y="980">Provisioning</text>
                  <text x="428" y="980">Role</text>
                  <text x="240" y="996">eUICC</text>
                  <text x="316" y="996">Manufacturer</text>
                  <text x="132" y="1012">Identifiers:</text>
                  <text x="276" y="1012">id-rspRole-eum</text>
                  <text x="100" y="1028">OID:</text>
                  <text x="284" y="1028">2.23.146.1.2.1.2</text>
                  <text x="100" y="1044">DER:</text>
                  <text x="228" y="1044">06</text>
                  <text x="252" y="1044">07</text>
                  <text x="276" y="1044">67</text>
                  <text x="300" y="1044">81</text>
                  <text x="324" y="1044">12</text>
                  <text x="348" y="1044">01</text>
                  <text x="372" y="1044">02</text>
                  <text x="396" y="1044">01</text>
                  <text x="420" y="1044">02</text>
                  <text x="120" y="1060">Comments:</text>
                  <text x="52" y="1092">13</text>
                  <text x="104" y="1092">Name:</text>
                  <text x="244" y="1092">Remote</text>
                  <text x="288" y="1092">SIM</text>
                  <text x="356" y="1092">Provisioning</text>
                  <text x="428" y="1092">Role</text>
                  <text x="244" y="1108">SM-DP+</text>
                  <text x="288" y="1108">TLS</text>
                  <text x="132" y="1124">Identifiers:</text>
                  <text x="288" y="1124">id-rspRole-dp-tls</text>
                  <text x="100" y="1140">OID:</text>
                  <text x="284" y="1140">2.23.146.1.2.1.3</text>
                  <text x="100" y="1156">DER:</text>
                  <text x="228" y="1156">06</text>
                  <text x="252" y="1156">07</text>
                  <text x="276" y="1156">67</text>
                  <text x="300" y="1156">81</text>
                  <text x="324" y="1156">12</text>
                  <text x="348" y="1156">01</text>
                  <text x="372" y="1156">02</text>
                  <text x="396" y="1156">01</text>
                  <text x="420" y="1156">03</text>
                  <text x="120" y="1172">Comments:</text>
                  <text x="52" y="1204">14</text>
                  <text x="104" y="1204">Name:</text>
                  <text x="244" y="1204">Remote</text>
                  <text x="288" y="1204">SIM</text>
                  <text x="356" y="1204">Provisioning</text>
                  <text x="428" y="1204">Role</text>
                  <text x="244" y="1220">SM-DP+</text>
                  <text x="332" y="1220">Authentication</text>
                  <text x="132" y="1236">Identifiers:</text>
                  <text x="292" y="1236">id-rspRole-dp-auth</text>
                  <text x="100" y="1252">OID:</text>
                  <text x="284" y="1252">2.23.146.1.2.1.4</text>
                  <text x="100" y="1268">DER:</text>
                  <text x="228" y="1268">06</text>
                  <text x="252" y="1268">07</text>
                  <text x="276" y="1268">67</text>
                  <text x="300" y="1268">81</text>
                  <text x="324" y="1268">12</text>
                  <text x="348" y="1268">01</text>
                  <text x="372" y="1268">02</text>
                  <text x="396" y="1268">01</text>
                  <text x="420" y="1268">04</text>
                  <text x="120" y="1284">Comments:</text>
                  <text x="52" y="1316">15</text>
                  <text x="104" y="1316">Name:</text>
                  <text x="244" y="1316">Remote</text>
                  <text x="288" y="1316">SIM</text>
                  <text x="356" y="1316">Provisioning</text>
                  <text x="428" y="1316">Role</text>
                  <text x="244" y="1332">SM-DP+</text>
                  <text x="304" y="1332">Profile</text>
                  <text x="368" y="1332">Binding</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="284" y="1348">id-rspRole-dp-pb</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="284" y="1364">2.23.146.1.2.1.5</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">07</text>
                  <text x="276" y="1380">67</text>
                  <text x="300" y="1380">81</text>
                  <text x="324" y="1380">12</text>
                  <text x="348" y="1380">01</text>
                  <text x="372" y="1380">02</text>
                  <text x="396" y="1380">01</text>
                  <text x="420" y="1380">05</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="52" y="1428">16</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="244" y="1428">Remote</text>
                  <text x="288" y="1428">SIM</text>
                  <text x="356" y="1428">Provisioning</text>
                  <text x="428" y="1428">Role</text>
                  <text x="240" y="1444">SM-DS</text>
                  <text x="280" y="1444">TLS</text>
                  <text x="132" y="1460">Identifiers:</text>
                  <text x="288" y="1460">id-rspRole-ds-tls</text>
                  <text x="100" y="1476">OID:</text>
                  <text x="284" y="1476">2.23.146.1.2.1.6</text>
                  <text x="100" y="1492">DER:</text>
                  <text x="228" y="1492">06</text>
                  <text x="252" y="1492">07</text>
                  <text x="276" y="1492">67</text>
                  <text x="300" y="1492">81</text>
                  <text x="324" y="1492">12</text>
                  <text x="348" y="1492">01</text>
                  <text x="372" y="1492">02</text>
                  <text x="396" y="1492">01</text>
                  <text x="420" y="1492">06</text>
                  <text x="120" y="1508">Comments:</text>
                  <text x="52" y="1540">17</text>
                  <text x="104" y="1540">Name:</text>
                  <text x="244" y="1540">Remote</text>
                  <text x="288" y="1540">SIM</text>
                  <text x="356" y="1540">Provisioning</text>
                  <text x="428" y="1540">Role</text>
                  <text x="240" y="1556">SM-DS</text>
                  <text x="324" y="1556">Authentication</text>
                  <text x="132" y="1572">Identifiers:</text>
                  <text x="292" y="1572">id-rspRole-ds-auth</text>
                  <text x="100" y="1588">OID:</text>
                  <text x="284" y="1588">2.23.146.1.2.1.7</text>
                  <text x="100" y="1604">DER:</text>
                  <text x="228" y="1604">06</text>
                  <text x="252" y="1604">07</text>
                  <text x="276" y="1604">67</text>
                  <text x="300" y="1604">81</text>
                  <text x="324" y="1604">12</text>
                  <text x="348" y="1604">01</text>
                  <text x="372" y="1604">02</text>
                  <text x="396" y="1604">01</text>
                  <text x="420" y="1604">07</text>
                  <text x="120" y="1620">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,256" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Certificate</text>
                  <text x="204" y="52">Policy</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="272" y="84">Certification</text>
                  <text x="364" y="84">Practice</text>
                  <text x="440" y="84">Statement</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="260" y="100">id-qt-cps,</text>
                  <text x="320" y="100">cps</text>
                  <text x="100" y="116">OID:</text>
                  <text x="288" y="116">1.3.6.1.5.5.7.2.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">02</text>
                  <text x="444" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="236" y="180">User</text>
                  <text x="284" y="180">Notice</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="276" y="196">id-qt-unotice,</text>
                  <text x="368" y="196">unotice</text>
                  <text x="100" y="212">OID:</text>
                  <text x="288" y="212">1.3.6.1.5.5.7.2.2</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">02</text>
                  <text x="444" y="228">02</text>
                  <text x="120" y="244">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="560" viewBox="0 0 560 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,736" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,736" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Information</text>
                  <text x="204" y="52">Access</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="236" y="84">OCSP</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="264" y="100">id-ad-ocsp,</text>
                  <text x="364" y="100">id-pkix-ocsp</text>
                  <text x="100" y="116">OID:</text>
                  <text x="292" y="116">1.3.6.1.5.5.7.48.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">30</text>
                  <text x="444" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="228" y="180">CA</text>
                  <text x="272" y="180">Issuers</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">id-ad-caIssuers,</text>
                  <text x="392" y="196">caIssuers</text>
                  <text x="100" y="212">OID:</text>
                  <text x="292" y="212">1.3.6.1.5.5.7.48.2</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">30</text>
                  <text x="444" y="228">02</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">3</text>
                  <text x="104" y="276">Name:</text>
                  <text x="236" y="276">Time</text>
                  <text x="292" y="276">Stamping</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="296" y="292">id-ad-timeStamping,</text>
                  <text x="428" y="292">timeStamping</text>
                  <text x="100" y="308">OID:</text>
                  <text x="292" y="308">1.3.6.1.5.5.7.48.3</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">30</text>
                  <text x="444" y="324">03</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">5</text>
                  <text x="104" y="372">Name:</text>
                  <text x="228" y="372">CA</text>
                  <text x="284" y="372">Repository</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="292" y="388">id-ad-caRepository</text>
                  <text x="100" y="404">OID:</text>
                  <text x="292" y="404">1.3.6.1.5.5.7.48.5</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">08</text>
                  <text x="276" y="420">2B</text>
                  <text x="300" y="420">06</text>
                  <text x="324" y="420">01</text>
                  <text x="348" y="420">05</text>
                  <text x="372" y="420">05</text>
                  <text x="396" y="420">07</text>
                  <text x="420" y="420">30</text>
                  <text x="444" y="420">05</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="52" y="468">10</text>
                  <text x="104" y="468">Name:</text>
                  <text x="236" y="468">RPKI</text>
                  <text x="292" y="468">Manifest</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="292" y="484">id-ad-rpkiManifest</text>
                  <text x="100" y="500">OID:</text>
                  <text x="296" y="500">1.3.6.1.5.5.7.48.10</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">08</text>
                  <text x="276" y="516">2B</text>
                  <text x="300" y="516">06</text>
                  <text x="324" y="516">01</text>
                  <text x="348" y="516">05</text>
                  <text x="372" y="516">05</text>
                  <text x="396" y="516">07</text>
                  <text x="420" y="516">30</text>
                  <text x="444" y="516">0A</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="232" y="532">RFC</text>
                  <text x="268" y="532">6487</text>
                  <text x="52" y="564">11</text>
                  <text x="104" y="564">Name:</text>
                  <text x="244" y="564">Signed</text>
                  <text x="300" y="564">Object</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="292" y="580">id-ad-signedObject</text>
                  <text x="100" y="596">OID:</text>
                  <text x="296" y="596">1.3.6.1.5.5.7.48.11</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">30</text>
                  <text x="444" y="612">0B</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="232" y="628">RFC</text>
                  <text x="268" y="628">6487</text>
                  <text x="52" y="660">13</text>
                  <text x="104" y="660">Name:</text>
                  <text x="236" y="660">RPKI</text>
                  <text x="284" y="660">Notify</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="284" y="676">id-ad-rpkiNotify</text>
                  <text x="100" y="692">OID:</text>
                  <text x="296" y="692">1.3.6.1.5.5.7.48.13</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">30</text>
                  <text x="444" y="708">0D</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">8182</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1712" width="544" viewBox="0 0 544 1712" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1696" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1696" fill="none" stroke="black"/>
                <path d="M 536,32 L 536,1696" fill="none" stroke="black"/>
                <path d="M 8,32 L 536,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 536,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 536,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 536,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 536,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 536,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 536,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 536,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 536,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 536,736" fill="none" stroke="black"/>
                <path d="M 8,832 L 536,832" fill="none" stroke="black"/>
                <path d="M 8,928 L 536,928" fill="none" stroke="black"/>
                <path d="M 8,1024 L 536,1024" fill="none" stroke="black"/>
                <path d="M 8,1120 L 536,1120" fill="none" stroke="black"/>
                <path d="M 8,1216 L 536,1216" fill="none" stroke="black"/>
                <path d="M 8,1312 L 536,1312" fill="none" stroke="black"/>
                <path d="M 8,1408 L 536,1408" fill="none" stroke="black"/>
                <path d="M 8,1504 L 536,1504" fill="none" stroke="black"/>
                <path d="M 8,1600 L 536,1600" fill="none" stroke="black"/>
                <path d="M 8,1696 L 536,1696" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="116" y="52">Extended</text>
                  <text x="168" y="52">Key</text>
                  <text x="208" y="52">Usage</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="232" y="84">Any</text>
                  <text x="284" y="84">Extended</text>
                  <text x="336" y="84">Key</text>
                  <text x="376" y="84">Usage</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="296" y="100">anyExtendedKeyUsage</text>
                  <text x="100" y="116">OID:</text>
                  <text x="264" y="116">2.5.29.37.0</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">04</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">25</text>
                  <text x="348" y="132">00</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">5280</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="232" y="180">TLS</text>
                  <text x="276" y="180">Server</text>
                  <text x="364" y="180">authentication</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">id-kp-serverAuth</text>
                  <text x="100" y="212">OID:</text>
                  <text x="288" y="212">1.3.6.1.5.5.7.3.1</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">03</text>
                  <text x="444" y="228">01</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="232" y="244">RFC</text>
                  <text x="268" y="244">5280</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="232" y="276">TLS</text>
                  <text x="276" y="276">Client</text>
                  <text x="364" y="276">Authentication</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="284" y="292">id-kp-clientAuth</text>
                  <text x="100" y="308">OID:</text>
                  <text x="288" y="308">1.3.6.1.5.5.7.3.2</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">03</text>
                  <text x="444" y="324">02</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="232" y="340">RFC</text>
                  <text x="268" y="340">5280</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="236" y="372">Code</text>
                  <text x="288" y="372">Signing</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="288" y="388">id-kp-codeSigning</text>
                  <text x="100" y="404">OID:</text>
                  <text x="288" y="404">1.3.6.1.5.5.7.3.3</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">08</text>
                  <text x="276" y="420">2B</text>
                  <text x="300" y="420">06</text>
                  <text x="324" y="420">01</text>
                  <text x="348" y="420">05</text>
                  <text x="372" y="420">05</text>
                  <text x="396" y="420">07</text>
                  <text x="420" y="420">03</text>
                  <text x="444" y="420">03</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="232" y="436">RFC</text>
                  <text x="268" y="436">5280</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="240" y="468">Email</text>
                  <text x="308" y="468">protection</text>
                  <text x="388" y="468">(S/MIME)</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="304" y="484">id-kp-emailProtection</text>
                  <text x="100" y="500">OID:</text>
                  <text x="288" y="500">1.3.6.1.5.5.7.3.4</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">08</text>
                  <text x="276" y="516">2B</text>
                  <text x="300" y="516">06</text>
                  <text x="324" y="516">01</text>
                  <text x="348" y="516">05</text>
                  <text x="372" y="516">05</text>
                  <text x="396" y="516">07</text>
                  <text x="420" y="516">03</text>
                  <text x="444" y="516">04</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="232" y="532">RFC</text>
                  <text x="268" y="532">5280</text>
                  <text x="56" y="564">8</text>
                  <text x="104" y="564">Name:</text>
                  <text x="236" y="564">Time</text>
                  <text x="292" y="564">Stamping</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="296" y="580">id-kp-timeStamping,</text>
                  <text x="428" y="580">timestamping</text>
                  <text x="100" y="596">OID:</text>
                  <text x="288" y="596">1.3.6.1.5.5.7.3.8</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">03</text>
                  <text x="444" y="612">08</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="56" y="660">9</text>
                  <text x="104" y="660">Name:</text>
                  <text x="236" y="660">OCSP</text>
                  <text x="288" y="660">Signing</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="288" y="676">id-kp-OCSPSigning</text>
                  <text x="100" y="692">OID:</text>
                  <text x="288" y="692">1.3.6.1.5.5.7.3.9</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">03</text>
                  <text x="444" y="708">09</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">5280</text>
                  <text x="52" y="756">10</text>
                  <text x="104" y="756">Name:</text>
                  <text x="252" y="756">Kerberos</text>
                  <text x="316" y="756">PKINIT</text>
                  <text x="372" y="756">Client</text>
                  <text x="420" y="756">Auth</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="308" y="772">id-pkinit-KPClientAuth</text>
                  <text x="100" y="788">OID:</text>
                  <text x="280" y="788">1.3.6.1.5.2.3.4</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">07</text>
                  <text x="276" y="804">2B</text>
                  <text x="300" y="804">06</text>
                  <text x="324" y="804">01</text>
                  <text x="348" y="804">05</text>
                  <text x="372" y="804">02</text>
                  <text x="396" y="804">03</text>
                  <text x="420" y="804">04</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="232" y="820">RFC</text>
                  <text x="268" y="820">4556</text>
                  <text x="52" y="852">11</text>
                  <text x="104" y="852">Name:</text>
                  <text x="252" y="852">Kerberos</text>
                  <text x="316" y="852">PKINIT</text>
                  <text x="360" y="852">KDC</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="280" y="868">id-pkinit-KPKdc</text>
                  <text x="100" y="884">OID:</text>
                  <text x="280" y="884">1.3.6.1.5.2.3.5</text>
                  <text x="100" y="900">DER:</text>
                  <text x="228" y="900">06</text>
                  <text x="252" y="900">07</text>
                  <text x="276" y="900">2B</text>
                  <text x="300" y="900">06</text>
                  <text x="324" y="900">01</text>
                  <text x="348" y="900">05</text>
                  <text x="372" y="900">02</text>
                  <text x="396" y="900">03</text>
                  <text x="420" y="900">05</text>
                  <text x="120" y="916">Comments:</text>
                  <text x="232" y="916">RFC</text>
                  <text x="268" y="916">4556</text>
                  <text x="52" y="948">12</text>
                  <text x="104" y="948">Name:</text>
                  <text x="232" y="948">SSH</text>
                  <text x="276" y="948">Client</text>
                  <text x="132" y="964">Identifiers:</text>
                  <text x="312" y="964">id-kp-secureShellClient</text>
                  <text x="100" y="980">OID:</text>
                  <text x="292" y="980">1.3.6.1.5.5.7.3.21</text>
                  <text x="100" y="996">DER:</text>
                  <text x="228" y="996">06</text>
                  <text x="252" y="996">08</text>
                  <text x="276" y="996">2B</text>
                  <text x="300" y="996">06</text>
                  <text x="324" y="996">01</text>
                  <text x="348" y="996">05</text>
                  <text x="372" y="996">05</text>
                  <text x="396" y="996">07</text>
                  <text x="420" y="996">03</text>
                  <text x="444" y="996">15</text>
                  <text x="120" y="1012">Comments:</text>
                  <text x="232" y="1012">RFC</text>
                  <text x="268" y="1012">6187</text>
                  <text x="52" y="1044">13</text>
                  <text x="104" y="1044">Name:</text>
                  <text x="232" y="1044">SSH</text>
                  <text x="276" y="1044">Server</text>
                  <text x="132" y="1060">Identifiers:</text>
                  <text x="312" y="1060">id-kp-secureShellServer</text>
                  <text x="100" y="1076">OID:</text>
                  <text x="292" y="1076">1.3.6.1.5.5.7.3.22</text>
                  <text x="100" y="1092">DER:</text>
                  <text x="228" y="1092">06</text>
                  <text x="252" y="1092">08</text>
                  <text x="276" y="1092">2B</text>
                  <text x="300" y="1092">06</text>
                  <text x="324" y="1092">01</text>
                  <text x="348" y="1092">05</text>
                  <text x="372" y="1092">05</text>
                  <text x="396" y="1092">07</text>
                  <text x="420" y="1092">03</text>
                  <text x="444" y="1092">16</text>
                  <text x="120" y="1108">Comments:</text>
                  <text x="232" y="1108">RFC</text>
                  <text x="268" y="1108">6187</text>
                  <text x="52" y="1140">14</text>
                  <text x="104" y="1140">Name:</text>
                  <text x="244" y="1140">Bundle</text>
                  <text x="308" y="1140">Security</text>
                  <text x="132" y="1156">Identifiers:</text>
                  <text x="300" y="1156">id-kp-bundleSecurity</text>
                  <text x="100" y="1172">OID:</text>
                  <text x="292" y="1172">1.3.6.1.5.5.7.3.35</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="228" y="1188">06</text>
                  <text x="252" y="1188">08</text>
                  <text x="276" y="1188">2B</text>
                  <text x="300" y="1188">06</text>
                  <text x="324" y="1188">01</text>
                  <text x="348" y="1188">05</text>
                  <text x="372" y="1188">05</text>
                  <text x="396" y="1188">07</text>
                  <text x="420" y="1188">03</text>
                  <text x="444" y="1188">23</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="232" y="1204">RFC</text>
                  <text x="268" y="1204">9174</text>
                  <text x="52" y="1236">15</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="232" y="1236">CMC</text>
                  <text x="304" y="1236">Certification</text>
                  <text x="400" y="1236">Authority</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="264" y="1252">id-kp-cmcCA</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="292" y="1268">1.3.6.1.5.5.7.3.27</text>
                  <text x="100" y="1284">DER:</text>
                  <text x="228" y="1284">06</text>
                  <text x="252" y="1284">08</text>
                  <text x="276" y="1284">2B</text>
                  <text x="300" y="1284">06</text>
                  <text x="324" y="1284">01</text>
                  <text x="348" y="1284">05</text>
                  <text x="372" y="1284">05</text>
                  <text x="396" y="1284">07</text>
                  <text x="420" y="1284">03</text>
                  <text x="444" y="1284">1B</text>
                  <text x="120" y="1300">Comments:</text>
                  <text x="232" y="1300">RFC</text>
                  <text x="268" y="1300">6402</text>
                  <text x="52" y="1332">16</text>
                  <text x="104" y="1332">Name:</text>
                  <text x="232" y="1332">CMC</text>
                  <text x="300" y="1332">Registration</text>
                  <text x="392" y="1332">Authority</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="264" y="1348">id-kp-cmcRA</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="292" y="1364">1.3.6.1.5.5.7.3.28</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">08</text>
                  <text x="276" y="1380">2B</text>
                  <text x="300" y="1380">06</text>
                  <text x="324" y="1380">01</text>
                  <text x="348" y="1380">05</text>
                  <text x="372" y="1380">05</text>
                  <text x="396" y="1380">07</text>
                  <text x="420" y="1380">03</text>
                  <text x="444" y="1380">1C</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="232" y="1396">RFC</text>
                  <text x="268" y="1396">6402</text>
                  <text x="52" y="1428">17</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="232" y="1428">CMC</text>
                  <text x="280" y="1428">Archive</text>
                  <text x="340" y="1428">Server</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="284" y="1444">id-kp-cmcArchive</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="292" y="1460">1.3.6.1.5.5.7.3.29</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">08</text>
                  <text x="276" y="1476">2B</text>
                  <text x="300" y="1476">06</text>
                  <text x="324" y="1476">01</text>
                  <text x="348" y="1476">05</text>
                  <text x="372" y="1476">05</text>
                  <text x="396" y="1476">07</text>
                  <text x="420" y="1476">03</text>
                  <text x="444" y="1476">1D</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="232" y="1492">RFC</text>
                  <text x="268" y="1492">6402</text>
                  <text x="52" y="1524">18</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="232" y="1524">CMC</text>
                  <text x="264" y="1524">Key</text>
                  <text x="324" y="1524">Generation</text>
                  <text x="408" y="1524">Authority</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="264" y="1540">id-kp-cmKGA</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="292" y="1556">1.3.6.1.5.5.7.3.32</text>
                  <text x="100" y="1572">DER:</text>
                  <text x="228" y="1572">06</text>
                  <text x="252" y="1572">08</text>
                  <text x="276" y="1572">2B</text>
                  <text x="300" y="1572">06</text>
                  <text x="324" y="1572">01</text>
                  <text x="348" y="1572">05</text>
                  <text x="372" y="1572">05</text>
                  <text x="396" y="1572">07</text>
                  <text x="420" y="1572">03</text>
                  <text x="444" y="1572">20</text>
                  <text x="120" y="1588">Comments:</text>
                  <text x="232" y="1588">RFC</text>
                  <text x="268" y="1588">9480</text>
                  <text x="52" y="1620">19</text>
                  <text x="104" y="1620">Name:</text>
                  <text x="264" y="1620">Certificate</text>
                  <text x="364" y="1620">Transparency</text>
                  <text x="132" y="1636">Identifiers:</text>
                  <text x="100" y="1652">OID:</text>
                  <text x="312" y="1652">1.3.6.1.4.1.11129.2.4.4</text>
                  <text x="100" y="1668">DER:</text>
                  <text x="228" y="1668">06</text>
                  <text x="252" y="1668">0A</text>
                  <text x="276" y="1668">2B</text>
                  <text x="300" y="1668">06</text>
                  <text x="324" y="1668">01</text>
                  <text x="348" y="1668">04</text>
                  <text x="372" y="1668">01</text>
                  <text x="396" y="1668">D6</text>
                  <text x="420" y="1668">79</text>
                  <text x="444" y="1668">02</text>
                  <text x="468" y="1668">04</text>
                  <text x="492" y="1668">04</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="232" y="1684">RFC</text>
                  <text x="268" y="1684">6962</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
|    15 | Name:            CMC Certification Authority            |
|       | Identifiers:     id-kp-cmcCA                            |
|       | OID:             1.3.6.1.5.5.7.3.27                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1B          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    16 | Name:            CMC Registration Authority             |
|       | Identifiers:     id-kp-cmcRA                            |
|       | OID:             1.3.6.1.5.5.7.3.28                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1C          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    17 | Name:            CMC Archive Server                     |
|       | Identifiers:     id-kp-cmcArchive                       |
|       | OID:             1.3.6.1.5.5.7.3.29                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1D          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    18 | Name:            CMC Key Generation Authority           |
|       | Identifiers:     id-kp-cmKGA                            |
|       | OID:             1.3.6.1.5.5.7.3.32                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 20          |
|       | Comments:        RFC 9480                               |
+-------+---------------------------------------------------------+
|    19 | Name:            Certificate Transparency               |
|       | Identifiers:                                            |
|       | OID:             1.3.6.1.4.1.11129.2.4.4                |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 04    |
|       | Comments:        RFC 6962                               |
+-------+---------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, General Name, and Reference, where Value is an integer, and the other columns are text strings. The fields Name and Value are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="720" width="560" viewBox="0 0 560 720" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,704" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,704" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,704" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,384 L 552,384" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,512 L 552,512" fill="none" stroke="black"/>
                <path d="M 8,576 L 552,576" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,704 L 552,704" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="112" y="52">General</text>
                  <text x="168" y="52">Names</text>
                  <text x="52" y="84">-2</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">otherName</text>
                  <text x="316" y="84">with</text>
                  <text x="400" y="84">SmtpUTF8Mailbox</text>
                  <text x="120" y="100">Comments:</text>
                  <text x="304" y="100">id-on-SmtpUTF8Mailbox</text>
                  <text x="296" y="116">(1.3.6.1.5.5.7.8.9)</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">08</text>
                  <text x="444" y="132">09</text>
                  <text x="108" y="148">Value:</text>
                  <text x="236" y="148">text</text>
                  <text x="52" y="180">-1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="256" y="180">otherName</text>
                  <text x="316" y="180">with</text>
                  <text x="412" y="180">hardwareModuleName</text>
                  <text x="120" y="196">Comments:</text>
                  <text x="316" y="196">id-on-hardwareModuleName</text>
                  <text x="296" y="212">(1.3.6.1.5.5.7.8.4)</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">08</text>
                  <text x="444" y="228">04</text>
                  <text x="108" y="244">Value:</text>
                  <text x="224" y="244">[</text>
                  <text x="256" y="244">~oid,</text>
                  <text x="304" y="244">bytes</text>
                  <text x="336" y="244">]</text>
                  <text x="56" y="276">0</text>
                  <text x="104" y="276">Name:</text>
                  <text x="256" y="276">otherName</text>
                  <text x="120" y="292">Comments:</text>
                  <text x="108" y="308">Value:</text>
                  <text x="224" y="308">[</text>
                  <text x="256" y="308">~oid,</text>
                  <text x="304" y="308">bytes</text>
                  <text x="336" y="308">]</text>
                  <text x="56" y="340">1</text>
                  <text x="104" y="340">Name:</text>
                  <text x="260" y="340">rfc822Name</text>
                  <text x="120" y="356">Comments:</text>
                  <text x="108" y="372">Value:</text>
                  <text x="236" y="372">text</text>
                  <text x="56" y="404">2</text>
                  <text x="104" y="404">Name:</text>
                  <text x="248" y="404">dNSName</text>
                  <text x="120" y="420">Comments:</text>
                  <text x="108" y="436">Value:</text>
                  <text x="236" y="436">text</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="272" y="468">directoryName</text>
                  <text x="120" y="484">Comments:</text>
                  <text x="108" y="500">Value:</text>
                  <text x="236" y="500">Name</text>
                  <text x="56" y="532">6</text>
                  <text x="104" y="532">Name:</text>
                  <text x="320" y="532">uniformResourceIdentifier</text>
                  <text x="120" y="548">Comments:</text>
                  <text x="108" y="564">Value:</text>
                  <text x="236" y="564">text</text>
                  <text x="56" y="596">7</text>
                  <text x="104" y="596">Name:</text>
                  <text x="256" y="596">iPAddress</text>
                  <text x="120" y="612">Comments:</text>
                  <text x="108" y="628">Value:</text>
                  <text x="240" y="628">bytes</text>
                  <text x="56" y="660">8</text>
                  <text x="104" y="660">Name:</text>
                  <text x="268" y="660">registeredID</text>
                  <text x="120" y="676">Comments:</text>
                  <text x="108" y="692">Value:</text>
                  <text x="236" y="692">~oid</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleName                 |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | Value:           [ ~oid, bytes ]                          |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | Value:           Name                                     |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | Value:           text                                     |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | Value:           ~oid                                     |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2752" width="560" viewBox="0 0 560 2752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2736" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2736" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2736" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,208 L 552,208" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,432 L 552,432" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,656 L 552,656" fill="none" stroke="black"/>
                <path d="M 8,768 L 552,768" fill="none" stroke="black"/>
                <path d="M 8,880 L 552,880" fill="none" stroke="black"/>
                <path d="M 8,992 L 552,992" fill="none" stroke="black"/>
                <path d="M 8,1104 L 552,1104" fill="none" stroke="black"/>
                <path d="M 8,1248 L 552,1248" fill="none" stroke="black"/>
                <path d="M 8,1392 L 552,1392" fill="none" stroke="black"/>
                <path d="M 8,1536 L 552,1536" fill="none" stroke="black"/>
                <path d="M 8,1648 L 552,1648" fill="none" stroke="black"/>
                <path d="M 8,1760 L 552,1760" fill="none" stroke="black"/>
                <path d="M 8,1872 L 552,1872" fill="none" stroke="black"/>
                <path d="M 8,2048 L 552,2048" fill="none" stroke="black"/>
                <path d="M 8,2224 L 552,2224" fill="none" stroke="black"/>
                <path d="M 8,2400 L 552,2400" fill="none" stroke="black"/>
                <path d="M 8,2512 L 552,2512" fill="none" stroke="black"/>
                <path d="M 8,2624 L 552,2624" fill="none" stroke="black"/>
                <path d="M 8,2736 L 552,2736" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="104" y="52">X.509</text>
                  <text x="168" y="52">Signature</text>
                  <text x="252" y="52">Algorithms</text>
                  <text x="44" y="84">-256</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="84">with</text>
                  <text x="392" y="84">SHA-1</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="284" y="100">sha1-with-rsa-signature,</text>
                  <text x="276" y="116">sha1WithRSAEncryption,</text>
                  <text x="276" y="132">sha-1WithRSAEncryption</text>
                  <text x="100" y="148">OID:</text>
                  <text x="268" y="148">1.2.840.113549.1.1.5</text>
                  <text x="128" y="164">Parameters:</text>
                  <text x="204" y="164">NULL</text>
                  <text x="100" y="180">DER:</text>
                  <text x="196" y="180">30</text>
                  <text x="220" y="180">0D</text>
                  <text x="244" y="180">06</text>
                  <text x="268" y="180">09</text>
                  <text x="292" y="180">2A</text>
                  <text x="316" y="180">86</text>
                  <text x="340" y="180">48</text>
                  <text x="364" y="180">86</text>
                  <text x="388" y="180">F7</text>
                  <text x="412" y="180">0D</text>
                  <text x="436" y="180">01</text>
                  <text x="460" y="180">01</text>
                  <text x="484" y="180">05</text>
                  <text x="508" y="180">05</text>
                  <text x="532" y="180">00</text>
                  <text x="120" y="196">Comments:</text>
                  <text x="208" y="196">Don't</text>
                  <text x="248" y="196">use</text>
                  <text x="44" y="228">-255</text>
                  <text x="104" y="228">Name:</text>
                  <text x="208" y="228">ECDSA</text>
                  <text x="252" y="228">with</text>
                  <text x="296" y="228">SHA-1</text>
                  <text x="132" y="244">Identifiers:</text>
                  <text x="248" y="244">ecdsa-with-SHA1</text>
                  <text x="100" y="260">OID:</text>
                  <text x="256" y="260">1.2.840.10045.4.1</text>
                  <text x="128" y="276">Parameters:</text>
                  <text x="212" y="276">Absent</text>
                  <text x="100" y="292">DER:</text>
                  <text x="196" y="292">30</text>
                  <text x="220" y="292">09</text>
                  <text x="244" y="292">06</text>
                  <text x="268" y="292">07</text>
                  <text x="292" y="292">2A</text>
                  <text x="316" y="292">86</text>
                  <text x="340" y="292">48</text>
                  <text x="364" y="292">CE</text>
                  <text x="388" y="292">3D</text>
                  <text x="412" y="292">04</text>
                  <text x="436" y="292">01</text>
                  <text x="120" y="308">Comments:</text>
                  <text x="208" y="308">Don't</text>
                  <text x="252" y="308">use.</text>
                  <text x="316" y="308">Compressed</text>
                  <text x="400" y="308">signature</text>
                  <text x="464" y="308">value</text>
                  <text x="56" y="340">0</text>
                  <text x="104" y="340">Name:</text>
                  <text x="208" y="340">ECDSA</text>
                  <text x="252" y="340">with</text>
                  <text x="304" y="340">SHA-256</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="256" y="356">ecdsa-with-SHA256</text>
                  <text x="100" y="372">OID:</text>
                  <text x="264" y="372">1.2.840.10045.4.3.2</text>
                  <text x="128" y="388">Parameters:</text>
                  <text x="212" y="388">Absent</text>
                  <text x="100" y="404">DER:</text>
                  <text x="196" y="404">30</text>
                  <text x="220" y="404">0A</text>
                  <text x="244" y="404">06</text>
                  <text x="268" y="404">08</text>
                  <text x="292" y="404">2A</text>
                  <text x="316" y="404">86</text>
                  <text x="340" y="404">48</text>
                  <text x="364" y="404">CE</text>
                  <text x="388" y="404">3D</text>
                  <text x="412" y="404">04</text>
                  <text x="436" y="404">03</text>
                  <text x="460" y="404">02</text>
                  <text x="120" y="420">Comments:</text>
                  <text x="228" y="420">Compressed</text>
                  <text x="312" y="420">signature</text>
                  <text x="376" y="420">value</text>
                  <text x="56" y="452">1</text>
                  <text x="104" y="452">Name:</text>
                  <text x="208" y="452">ECDSA</text>
                  <text x="252" y="452">with</text>
                  <text x="304" y="452">SHA-384</text>
                  <text x="132" y="468">Identifiers:</text>
                  <text x="256" y="468">ecdsa-with-SHA384</text>
                  <text x="100" y="484">OID:</text>
                  <text x="264" y="484">1.2.840.10045.4.3.3</text>
                  <text x="128" y="500">Parameters:</text>
                  <text x="212" y="500">Absent</text>
                  <text x="100" y="516">DER:</text>
                  <text x="196" y="516">30</text>
                  <text x="220" y="516">0A</text>
                  <text x="244" y="516">06</text>
                  <text x="268" y="516">08</text>
                  <text x="292" y="516">2A</text>
                  <text x="316" y="516">86</text>
                  <text x="340" y="516">48</text>
                  <text x="364" y="516">CE</text>
                  <text x="388" y="516">3D</text>
                  <text x="412" y="516">04</text>
                  <text x="436" y="516">03</text>
                  <text x="460" y="516">03</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="228" y="532">Compressed</text>
                  <text x="312" y="532">signature</text>
                  <text x="376" y="532">value</text>
                  <text x="56" y="564">2</text>
                  <text x="104" y="564">Name:</text>
                  <text x="208" y="564">ECDSA</text>
                  <text x="252" y="564">with</text>
                  <text x="304" y="564">SHA-512</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="256" y="580">ecdsa-with-SHA512</text>
                  <text x="100" y="596">OID:</text>
                  <text x="264" y="596">1.2.840.10045.4.3.4</text>
                  <text x="128" y="612">Parameters:</text>
                  <text x="212" y="612">Absent</text>
                  <text x="100" y="628">DER:</text>
                  <text x="196" y="628">30</text>
                  <text x="220" y="628">0A</text>
                  <text x="244" y="628">06</text>
                  <text x="268" y="628">08</text>
                  <text x="292" y="628">2A</text>
                  <text x="316" y="628">86</text>
                  <text x="340" y="628">48</text>
                  <text x="364" y="628">CE</text>
                  <text x="388" y="628">3D</text>
                  <text x="412" y="628">04</text>
                  <text x="436" y="628">03</text>
                  <text x="460" y="628">04</text>
                  <text x="120" y="644">Comments:</text>
                  <text x="228" y="644">Compressed</text>
                  <text x="312" y="644">signature</text>
                  <text x="376" y="644">value</text>
                  <text x="56" y="676">3</text>
                  <text x="104" y="676">Name:</text>
                  <text x="208" y="676">ECDSA</text>
                  <text x="252" y="676">with</text>
                  <text x="308" y="676">SHAKE128</text>
                  <text x="132" y="692">Identifiers:</text>
                  <text x="276" y="692">id-ecdsa-with-shake128</text>
                  <text x="100" y="708">OID:</text>
                  <text x="260" y="708">1.3.6.1.5.5.7.6.32</text>
                  <text x="128" y="724">Parameters:</text>
                  <text x="212" y="724">Absent</text>
                  <text x="100" y="740">DER:</text>
                  <text x="196" y="740">30</text>
                  <text x="220" y="740">0A</text>
                  <text x="244" y="740">06</text>
                  <text x="268" y="740">08</text>
                  <text x="292" y="740">2B</text>
                  <text x="316" y="740">06</text>
                  <text x="340" y="740">01</text>
                  <text x="364" y="740">05</text>
                  <text x="388" y="740">05</text>
                  <text x="412" y="740">07</text>
                  <text x="436" y="740">06</text>
                  <text x="460" y="740">20</text>
                  <text x="120" y="756">Comments:</text>
                  <text x="228" y="756">Compressed</text>
                  <text x="312" y="756">signature</text>
                  <text x="376" y="756">value</text>
                  <text x="56" y="788">4</text>
                  <text x="104" y="788">Name:</text>
                  <text x="208" y="788">ECDSA</text>
                  <text x="252" y="788">with</text>
                  <text x="308" y="788">SHAKE256</text>
                  <text x="132" y="804">Identifiers:</text>
                  <text x="276" y="804">id-ecdsa-with-shake256</text>
                  <text x="100" y="820">OID:</text>
                  <text x="260" y="820">1.3.6.1.5.5.7.6.33</text>
                  <text x="128" y="836">Parameters:</text>
                  <text x="212" y="836">Absent</text>
                  <text x="100" y="852">DER:</text>
                  <text x="196" y="852">30</text>
                  <text x="220" y="852">0A</text>
                  <text x="244" y="852">06</text>
                  <text x="268" y="852">08</text>
                  <text x="292" y="852">2B</text>
                  <text x="316" y="852">06</text>
                  <text x="340" y="852">01</text>
                  <text x="364" y="852">05</text>
                  <text x="388" y="852">05</text>
                  <text x="412" y="852">07</text>
                  <text x="436" y="852">06</text>
                  <text x="460" y="852">21</text>
                  <text x="120" y="868">Comments:</text>
                  <text x="228" y="868">Compressed</text>
                  <text x="312" y="868">signature</text>
                  <text x="376" y="868">value</text>
                  <text x="52" y="900">12</text>
                  <text x="104" y="900">Name:</text>
                  <text x="216" y="900">Ed25519</text>
                  <text x="132" y="916">Identifiers:</text>
                  <text x="232" y="916">id-Ed25519,</text>
                  <text x="336" y="916">id-EdDSA25519</text>
                  <text x="100" y="932">OID:</text>
                  <text x="232" y="932">1.3.101.112</text>
                  <text x="128" y="948">Parameters:</text>
                  <text x="212" y="948">Absent</text>
                  <text x="100" y="964">DER:</text>
                  <text x="196" y="964">30</text>
                  <text x="220" y="964">05</text>
                  <text x="244" y="964">06</text>
                  <text x="268" y="964">03</text>
                  <text x="292" y="964">2B</text>
                  <text x="316" y="964">65</text>
                  <text x="340" y="964">70</text>
                  <text x="120" y="980">Comments:</text>
                  <text x="52" y="1012">13</text>
                  <text x="104" y="1012">Name:</text>
                  <text x="208" y="1012">Ed448</text>
                  <text x="132" y="1028">Identifiers:</text>
                  <text x="224" y="1028">id-Ed448,</text>
                  <text x="312" y="1028">id-EdDSA448</text>
                  <text x="100" y="1044">OID:</text>
                  <text x="232" y="1044">1.3.101.113</text>
                  <text x="128" y="1060">Parameters:</text>
                  <text x="212" y="1060">Absent</text>
                  <text x="100" y="1076">DER:</text>
                  <text x="196" y="1076">30</text>
                  <text x="220" y="1076">05</text>
                  <text x="244" y="1076">06</text>
                  <text x="268" y="1076">03</text>
                  <text x="292" y="1076">2B</text>
                  <text x="316" y="1076">65</text>
                  <text x="340" y="1076">71</text>
                  <text x="120" y="1092">Comments:</text>
                  <text x="52" y="1124">14</text>
                  <text x="104" y="1124">Name:</text>
                  <text x="200" y="1124">PoP</text>
                  <text x="236" y="1124">with</text>
                  <text x="288" y="1124">SHA-256</text>
                  <text x="336" y="1124">and</text>
                  <text x="400" y="1124">HMAC-SHA256</text>
                  <text x="132" y="1140">Identifiers:</text>
                  <text x="304" y="1140">sa-ecdhPop-sha256-hmac-sha256</text>
                  <text x="100" y="1156">OID:</text>
                  <text x="260" y="1156">1.3.6.1.5.5.7.6.26</text>
                  <text x="128" y="1172">Parameters:</text>
                  <text x="212" y="1172">Absent</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="196" y="1188">30</text>
                  <text x="220" y="1188">0A</text>
                  <text x="244" y="1188">06</text>
                  <text x="268" y="1188">08</text>
                  <text x="292" y="1188">2B</text>
                  <text x="316" y="1188">06</text>
                  <text x="340" y="1188">01</text>
                  <text x="364" y="1188">05</text>
                  <text x="388" y="1188">05</text>
                  <text x="412" y="1188">07</text>
                  <text x="436" y="1188">06</text>
                  <text x="460" y="1188">1A</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="264" y="1204">Proof-of-possession</text>
                  <text x="388" y="1204">algorithm,</text>
                  <text x="464" y="1204">indexed</text>
                  <text x="516" y="1204">with</text>
                  <text x="200" y="1220">KDF</text>
                  <text x="232" y="1220">and</text>
                  <text x="268" y="1220">MAC,</text>
                  <text x="304" y="1220">see</text>
                  <text x="336" y="1220">RFC</text>
                  <text x="376" y="1220">6955.</text>
                  <text x="436" y="1220">Requires</text>
                  <text x="232" y="1236">recipient's</text>
                  <text x="308" y="1236">public</text>
                  <text x="364" y="1236">static</text>
                  <text x="452" y="1236">Diffie-Hellman</text>
                  <text x="528" y="1236">key</text>
                  <text x="52" y="1268">15</text>
                  <text x="104" y="1268">Name:</text>
                  <text x="200" y="1268">PoP</text>
                  <text x="236" y="1268">with</text>
                  <text x="288" y="1268">SHA-384</text>
                  <text x="336" y="1268">and</text>
                  <text x="400" y="1268">HMAC-SHA384</text>
                  <text x="132" y="1284">Identifiers:</text>
                  <text x="304" y="1284">sa-ecdhPop-sha384-hmac-sha384</text>
                  <text x="100" y="1300">OID:</text>
                  <text x="260" y="1300">1.3.6.1.5.5.7.6.27</text>
                  <text x="128" y="1316">Parameters:</text>
                  <text x="212" y="1316">Absent</text>
                  <text x="100" y="1332">DER:</text>
                  <text x="196" y="1332">30</text>
                  <text x="220" y="1332">0A</text>
                  <text x="244" y="1332">06</text>
                  <text x="268" y="1332">08</text>
                  <text x="292" y="1332">2B</text>
                  <text x="316" y="1332">06</text>
                  <text x="340" y="1332">01</text>
                  <text x="364" y="1332">05</text>
                  <text x="388" y="1332">05</text>
                  <text x="412" y="1332">07</text>
                  <text x="436" y="1332">06</text>
                  <text x="460" y="1332">1B</text>
                  <text x="120" y="1348">Comments:</text>
                  <text x="264" y="1348">Proof-of-possession</text>
                  <text x="388" y="1348">algorithm,</text>
                  <text x="464" y="1348">indexed</text>
                  <text x="516" y="1348">with</text>
                  <text x="200" y="1364">KDF</text>
                  <text x="232" y="1364">and</text>
                  <text x="268" y="1364">MAC,</text>
                  <text x="304" y="1364">see</text>
                  <text x="336" y="1364">RFC</text>
                  <text x="376" y="1364">6955.</text>
                  <text x="436" y="1364">Requires</text>
                  <text x="232" y="1380">recipient's</text>
                  <text x="308" y="1380">public</text>
                  <text x="364" y="1380">static</text>
                  <text x="452" y="1380">Diffie-Hellman</text>
                  <text x="528" y="1380">key</text>
                  <text x="52" y="1412">16</text>
                  <text x="104" y="1412">Name:</text>
                  <text x="200" y="1412">PoP</text>
                  <text x="236" y="1412">with</text>
                  <text x="288" y="1412">SHA-512</text>
                  <text x="336" y="1412">and</text>
                  <text x="400" y="1412">HMAC-SHA512</text>
                  <text x="132" y="1428">Identifiers:</text>
                  <text x="304" y="1428">sa-ecdhPop-sha512-hmac-sha512</text>
                  <text x="100" y="1444">OID:</text>
                  <text x="260" y="1444">1.3.6.1.5.5.7.6.28</text>
                  <text x="128" y="1460">Parameters:</text>
                  <text x="212" y="1460">Absent</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="196" y="1476">30</text>
                  <text x="220" y="1476">0A</text>
                  <text x="244" y="1476">06</text>
                  <text x="268" y="1476">08</text>
                  <text x="292" y="1476">2B</text>
                  <text x="316" y="1476">06</text>
                  <text x="340" y="1476">01</text>
                  <text x="364" y="1476">05</text>
                  <text x="388" y="1476">05</text>
                  <text x="412" y="1476">07</text>
                  <text x="436" y="1476">06</text>
                  <text x="460" y="1476">1C</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="264" y="1492">Proof-of-possession</text>
                  <text x="388" y="1492">algorithm,</text>
                  <text x="464" y="1492">indexed</text>
                  <text x="516" y="1492">with</text>
                  <text x="200" y="1508">KDF</text>
                  <text x="232" y="1508">and</text>
                  <text x="268" y="1508">MAC,</text>
                  <text x="304" y="1508">see</text>
                  <text x="336" y="1508">RFC</text>
                  <text x="376" y="1508">6955.</text>
                  <text x="436" y="1508">Requires</text>
                  <text x="232" y="1524">recipient's</text>
                  <text x="308" y="1524">public</text>
                  <text x="364" y="1524">static</text>
                  <text x="452" y="1524">Diffie-Hellman</text>
                  <text x="528" y="1524">key</text>
                  <text x="52" y="1556">23</text>
                  <text x="104" y="1556">Name:</text>
                  <text x="256" y="1556">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1556">with</text>
                  <text x="400" y="1556">SHA-256</text>
                  <text x="132" y="1572">Identifiers:</text>
                  <text x="280" y="1572">sha256WithRSAEncryption</text>
                  <text x="100" y="1588">OID:</text>
                  <text x="272" y="1588">1.2.840.113549.1.1.11</text>
                  <text x="128" y="1604">Parameters:</text>
                  <text x="204" y="1604">NULL</text>
                  <text x="100" y="1620">DER:</text>
                  <text x="196" y="1620">30</text>
                  <text x="220" y="1620">0B</text>
                  <text x="244" y="1620">06</text>
                  <text x="268" y="1620">09</text>
                  <text x="292" y="1620">2A</text>
                  <text x="316" y="1620">86</text>
                  <text x="340" y="1620">48</text>
                  <text x="364" y="1620">86</text>
                  <text x="388" y="1620">F7</text>
                  <text x="412" y="1620">0D</text>
                  <text x="436" y="1620">01</text>
                  <text x="460" y="1620">01</text>
                  <text x="484" y="1620">0B</text>
                  <text x="508" y="1620">05</text>
                  <text x="532" y="1620">00</text>
                  <text x="120" y="1636">Comments:</text>
                  <text x="52" y="1668">24</text>
                  <text x="104" y="1668">Name:</text>
                  <text x="256" y="1668">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1668">with</text>
                  <text x="400" y="1668">SHA-384</text>
                  <text x="132" y="1684">Identifiers:</text>
                  <text x="280" y="1684">sha384WithRSAEncryption</text>
                  <text x="100" y="1700">OID:</text>
                  <text x="272" y="1700">1.2.840.113549.1.1.12</text>
                  <text x="128" y="1716">Parameters:</text>
                  <text x="204" y="1716">NULL</text>
                  <text x="100" y="1732">DER:</text>
                  <text x="196" y="1732">30</text>
                  <text x="220" y="1732">0B</text>
                  <text x="244" y="1732">06</text>
                  <text x="268" y="1732">09</text>
                  <text x="292" y="1732">2A</text>
                  <text x="316" y="1732">86</text>
                  <text x="340" y="1732">48</text>
                  <text x="364" y="1732">86</text>
                  <text x="388" y="1732">F7</text>
                  <text x="412" y="1732">0D</text>
                  <text x="436" y="1732">01</text>
                  <text x="460" y="1732">01</text>
                  <text x="484" y="1732">0C</text>
                  <text x="508" y="1732">05</text>
                  <text x="532" y="1732">00</text>
                  <text x="120" y="1748">Comments:</text>
                  <text x="52" y="1780">25</text>
                  <text x="104" y="1780">Name:</text>
                  <text x="256" y="1780">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1780">with</text>
                  <text x="400" y="1780">SHA-512</text>
                  <text x="132" y="1796">Identifiers:</text>
                  <text x="280" y="1796">sha512WithRSAEncryption</text>
                  <text x="100" y="1812">OID:</text>
                  <text x="272" y="1812">1.2.840.113549.1.1.13</text>
                  <text x="128" y="1828">Parameters:</text>
                  <text x="204" y="1828">NULL</text>
                  <text x="100" y="1844">DER:</text>
                  <text x="196" y="1844">30</text>
                  <text x="220" y="1844">0B</text>
                  <text x="244" y="1844">06</text>
                  <text x="268" y="1844">09</text>
                  <text x="292" y="1844">2A</text>
                  <text x="316" y="1844">86</text>
                  <text x="340" y="1844">48</text>
                  <text x="364" y="1844">86</text>
                  <text x="388" y="1844">F7</text>
                  <text x="412" y="1844">0D</text>
                  <text x="436" y="1844">01</text>
                  <text x="460" y="1844">01</text>
                  <text x="484" y="1844">0D</text>
                  <text x="508" y="1844">05</text>
                  <text x="532" y="1844">00</text>
                  <text x="120" y="1860">Comments:</text>
                  <text x="52" y="1892">26</text>
                  <text x="104" y="1892">Name:</text>
                  <text x="228" y="1892">RSASSA-PSS</text>
                  <text x="292" y="1892">with</text>
                  <text x="344" y="1892">SHA-256</text>
                  <text x="132" y="1908">Identifiers:</text>
                  <text x="232" y="1908">rsassa-pss,</text>
                  <text x="336" y="1908">id-RSASSA-PSS</text>
                  <text x="100" y="1924">OID:</text>
                  <text x="272" y="1924">1.2.840.113549.1.1.10</text>
                  <text x="128" y="1940">Parameters:</text>
                  <text x="220" y="1940">SHA-256,</text>
                  <text x="280" y="1940">MGF-1</text>
                  <text x="324" y="1940">with</text>
                  <text x="380" y="1940">SHA-256,</text>
                  <text x="460" y="1940">saltLength</text>
                  <text x="512" y="1940">=</text>
                  <text x="532" y="1940">32</text>
                  <text x="100" y="1956">DER:</text>
                  <text x="196" y="1956">30</text>
                  <text x="220" y="1956">41</text>
                  <text x="244" y="1956">06</text>
                  <text x="268" y="1956">09</text>
                  <text x="292" y="1956">2A</text>
                  <text x="316" y="1956">86</text>
                  <text x="340" y="1956">48</text>
                  <text x="364" y="1956">86</text>
                  <text x="388" y="1956">F7</text>
                  <text x="412" y="1956">0D</text>
                  <text x="436" y="1956">01</text>
                  <text x="460" y="1956">01</text>
                  <text x="484" y="1956">0A</text>
                  <text x="508" y="1956">30</text>
                  <text x="532" y="1956">34</text>
                  <text x="196" y="1972">A0</text>
                  <text x="220" y="1972">0F</text>
                  <text x="244" y="1972">30</text>
                  <text x="268" y="1972">0D</text>
                  <text x="292" y="1972">06</text>
                  <text x="316" y="1972">09</text>
                  <text x="340" y="1972">60</text>
                  <text x="364" y="1972">86</text>
                  <text x="388" y="1972">48</text>
                  <text x="412" y="1972">01</text>
                  <text x="436" y="1972">65</text>
                  <text x="460" y="1972">03</text>
                  <text x="484" y="1972">04</text>
                  <text x="508" y="1972">02</text>
                  <text x="532" y="1972">01</text>
                  <text x="196" y="1988">05</text>
                  <text x="220" y="1988">00</text>
                  <text x="244" y="1988">A1</text>
                  <text x="268" y="1988">1C</text>
                  <text x="292" y="1988">30</text>
                  <text x="316" y="1988">1A</text>
                  <text x="340" y="1988">06</text>
                  <text x="364" y="1988">09</text>
                  <text x="388" y="1988">2A</text>
                  <text x="412" y="1988">86</text>
                  <text x="436" y="1988">48</text>
                  <text x="460" y="1988">86</text>
                  <text x="484" y="1988">F7</text>
                  <text x="508" y="1988">0D</text>
                  <text x="532" y="1988">01</text>
                  <text x="196" y="2004">01</text>
                  <text x="220" y="2004">08</text>
                  <text x="244" y="2004">30</text>
                  <text x="268" y="2004">0D</text>
                  <text x="292" y="2004">06</text>
                  <text x="316" y="2004">09</text>
                  <text x="340" y="2004">60</text>
                  <text x="364" y="2004">86</text>
                  <text x="388" y="2004">48</text>
                  <text x="412" y="2004">01</text>
                  <text x="436" y="2004">65</text>
                  <text x="460" y="2004">03</text>
                  <text x="484" y="2004">04</text>
                  <text x="508" y="2004">02</text>
                  <text x="532" y="2004">01</text>
                  <text x="196" y="2020">05</text>
                  <text x="220" y="2020">00</text>
                  <text x="244" y="2020">a2</text>
                  <text x="268" y="2020">03</text>
                  <text x="292" y="2020">02</text>
                  <text x="316" y="2020">01</text>
                  <text x="340" y="2020">20</text>
                  <text x="120" y="2036">Comments:</text>
                  <text x="52" y="2068">27</text>
                  <text x="104" y="2068">Name:</text>
                  <text x="228" y="2068">RSASSA-PSS</text>
                  <text x="292" y="2068">with</text>
                  <text x="344" y="2068">SHA-384</text>
                  <text x="132" y="2084">Identifiers:</text>
                  <text x="232" y="2084">rsassa-pss,</text>
                  <text x="336" y="2084">id-RSASSA-PSS</text>
                  <text x="100" y="2100">OID:</text>
                  <text x="272" y="2100">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2116">Parameters:</text>
                  <text x="220" y="2116">SHA-384,</text>
                  <text x="280" y="2116">MGF-1</text>
                  <text x="324" y="2116">with</text>
                  <text x="380" y="2116">SHA-384,</text>
                  <text x="460" y="2116">saltLength</text>
                  <text x="512" y="2116">=</text>
                  <text x="532" y="2116">48</text>
                  <text x="100" y="2132">DER:</text>
                  <text x="196" y="2132">30</text>
                  <text x="220" y="2132">41</text>
                  <text x="244" y="2132">06</text>
                  <text x="268" y="2132">09</text>
                  <text x="292" y="2132">2A</text>
                  <text x="316" y="2132">86</text>
                  <text x="340" y="2132">48</text>
                  <text x="364" y="2132">86</text>
                  <text x="388" y="2132">F7</text>
                  <text x="412" y="2132">0D</text>
                  <text x="436" y="2132">01</text>
                  <text x="460" y="2132">01</text>
                  <text x="484" y="2132">0A</text>
                  <text x="508" y="2132">30</text>
                  <text x="532" y="2132">34</text>
                  <text x="196" y="2148">A0</text>
                  <text x="220" y="2148">0F</text>
                  <text x="244" y="2148">30</text>
                  <text x="268" y="2148">0D</text>
                  <text x="292" y="2148">06</text>
                  <text x="316" y="2148">09</text>
                  <text x="340" y="2148">60</text>
                  <text x="364" y="2148">86</text>
                  <text x="388" y="2148">48</text>
                  <text x="412" y="2148">01</text>
                  <text x="436" y="2148">65</text>
                  <text x="460" y="2148">03</text>
                  <text x="484" y="2148">04</text>
                  <text x="508" y="2148">02</text>
                  <text x="532" y="2148">02</text>
                  <text x="196" y="2164">05</text>
                  <text x="220" y="2164">00</text>
                  <text x="244" y="2164">A1</text>
                  <text x="268" y="2164">1C</text>
                  <text x="292" y="2164">30</text>
                  <text x="316" y="2164">1A</text>
                  <text x="340" y="2164">06</text>
                  <text x="364" y="2164">09</text>
                  <text x="388" y="2164">2A</text>
                  <text x="412" y="2164">86</text>
                  <text x="436" y="2164">48</text>
                  <text x="460" y="2164">86</text>
                  <text x="484" y="2164">F7</text>
                  <text x="508" y="2164">0D</text>
                  <text x="532" y="2164">01</text>
                  <text x="196" y="2180">01</text>
                  <text x="220" y="2180">08</text>
                  <text x="244" y="2180">30</text>
                  <text x="268" y="2180">0D</text>
                  <text x="292" y="2180">06</text>
                  <text x="316" y="2180">09</text>
                  <text x="340" y="2180">60</text>
                  <text x="364" y="2180">86</text>
                  <text x="388" y="2180">48</text>
                  <text x="412" y="2180">01</text>
                  <text x="436" y="2180">65</text>
                  <text x="460" y="2180">03</text>
                  <text x="484" y="2180">04</text>
                  <text x="508" y="2180">02</text>
                  <text x="532" y="2180">02</text>
                  <text x="196" y="2196">05</text>
                  <text x="220" y="2196">00</text>
                  <text x="244" y="2196">A2</text>
                  <text x="268" y="2196">03</text>
                  <text x="292" y="2196">02</text>
                  <text x="316" y="2196">01</text>
                  <text x="340" y="2196">30</text>
                  <text x="120" y="2212">Comments:</text>
                  <text x="52" y="2244">28</text>
                  <text x="104" y="2244">Name:</text>
                  <text x="228" y="2244">RSASSA-PSS</text>
                  <text x="292" y="2244">with</text>
                  <text x="344" y="2244">SHA-512</text>
                  <text x="132" y="2260">Identifiers:</text>
                  <text x="232" y="2260">rsassa-pss,</text>
                  <text x="336" y="2260">id-RSASSA-PSS</text>
                  <text x="100" y="2276">OID:</text>
                  <text x="272" y="2276">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2292">Parameters:</text>
                  <text x="220" y="2292">SHA-512,</text>
                  <text x="280" y="2292">MGF-1</text>
                  <text x="324" y="2292">with</text>
                  <text x="380" y="2292">SHA-512,</text>
                  <text x="460" y="2292">saltLength</text>
                  <text x="512" y="2292">=</text>
                  <text x="532" y="2292">64</text>
                  <text x="100" y="2308">DER:</text>
                  <text x="196" y="2308">30</text>
                  <text x="220" y="2308">41</text>
                  <text x="244" y="2308">06</text>
                  <text x="268" y="2308">09</text>
                  <text x="292" y="2308">2A</text>
                  <text x="316" y="2308">86</text>
                  <text x="340" y="2308">48</text>
                  <text x="364" y="2308">86</text>
                  <text x="388" y="2308">F7</text>
                  <text x="412" y="2308">0D</text>
                  <text x="436" y="2308">01</text>
                  <text x="460" y="2308">01</text>
                  <text x="484" y="2308">0A</text>
                  <text x="508" y="2308">30</text>
                  <text x="532" y="2308">34</text>
                  <text x="196" y="2324">A0</text>
                  <text x="220" y="2324">0F</text>
                  <text x="244" y="2324">30</text>
                  <text x="268" y="2324">0D</text>
                  <text x="292" y="2324">06</text>
                  <text x="316" y="2324">09</text>
                  <text x="340" y="2324">60</text>
                  <text x="364" y="2324">86</text>
                  <text x="388" y="2324">48</text>
                  <text x="412" y="2324">01</text>
                  <text x="436" y="2324">65</text>
                  <text x="460" y="2324">03</text>
                  <text x="484" y="2324">04</text>
                  <text x="508" y="2324">02</text>
                  <text x="532" y="2324">03</text>
                  <text x="196" y="2340">05</text>
                  <text x="220" y="2340">00</text>
                  <text x="244" y="2340">A1</text>
                  <text x="268" y="2340">1C</text>
                  <text x="292" y="2340">30</text>
                  <text x="316" y="2340">1A</text>
                  <text x="340" y="2340">06</text>
                  <text x="364" y="2340">09</text>
                  <text x="388" y="2340">2A</text>
                  <text x="412" y="2340">86</text>
                  <text x="436" y="2340">48</text>
                  <text x="460" y="2340">86</text>
                  <text x="484" y="2340">F7</text>
                  <text x="508" y="2340">0D</text>
                  <text x="532" y="2340">01</text>
                  <text x="196" y="2356">01</text>
                  <text x="220" y="2356">08</text>
                  <text x="244" y="2356">30</text>
                  <text x="268" y="2356">0D</text>
                  <text x="292" y="2356">06</text>
                  <text x="316" y="2356">09</text>
                  <text x="340" y="2356">60</text>
                  <text x="364" y="2356">86</text>
                  <text x="388" y="2356">48</text>
                  <text x="412" y="2356">01</text>
                  <text x="436" y="2356">65</text>
                  <text x="460" y="2356">03</text>
                  <text x="484" y="2356">04</text>
                  <text x="508" y="2356">02</text>
                  <text x="532" y="2356">03</text>
                  <text x="196" y="2372">05</text>
                  <text x="220" y="2372">00</text>
                  <text x="244" y="2372">A2</text>
                  <text x="268" y="2372">03</text>
                  <text x="292" y="2372">02</text>
                  <text x="316" y="2372">01</text>
                  <text x="340" y="2372">40</text>
                  <text x="120" y="2388">Comments:</text>
                  <text x="52" y="2420">29</text>
                  <text x="104" y="2420">Name:</text>
                  <text x="228" y="2420">RSASSA-PSS</text>
                  <text x="292" y="2420">with</text>
                  <text x="348" y="2420">SHAKE128</text>
                  <text x="132" y="2436">Identifiers:</text>
                  <text x="276" y="2436">id-RSASSA-PSS-SHAKE128</text>
                  <text x="100" y="2452">OID:</text>
                  <text x="260" y="2452">1.3.6.1.5.5.7.6.30</text>
                  <text x="128" y="2468">Parameters:</text>
                  <text x="212" y="2468">Absent</text>
                  <text x="100" y="2484">DER:</text>
                  <text x="196" y="2484">30</text>
                  <text x="220" y="2484">0A</text>
                  <text x="244" y="2484">06</text>
                  <text x="268" y="2484">08</text>
                  <text x="292" y="2484">2B</text>
                  <text x="316" y="2484">06</text>
                  <text x="340" y="2484">01</text>
                  <text x="364" y="2484">05</text>
                  <text x="388" y="2484">05</text>
                  <text x="412" y="2484">07</text>
                  <text x="436" y="2484">06</text>
                  <text x="460" y="2484">1E</text>
                  <text x="120" y="2500">Comments:</text>
                  <text x="52" y="2532">30</text>
                  <text x="104" y="2532">Name:</text>
                  <text x="228" y="2532">RSASSA-PSS</text>
                  <text x="292" y="2532">with</text>
                  <text x="348" y="2532">SHAKE256</text>
                  <text x="132" y="2548">Identifiers:</text>
                  <text x="276" y="2548">id-RSASSA-PSS-SHAKE256</text>
                  <text x="100" y="2564">OID:</text>
                  <text x="260" y="2564">1.3.6.1.5.5.7.6.31</text>
                  <text x="128" y="2580">Parameters:</text>
                  <text x="212" y="2580">Absent</text>
                  <text x="100" y="2596">DER:</text>
                  <text x="196" y="2596">30</text>
                  <text x="220" y="2596">0A</text>
                  <text x="244" y="2596">06</text>
                  <text x="268" y="2596">08</text>
                  <text x="292" y="2596">2B</text>
                  <text x="316" y="2596">06</text>
                  <text x="340" y="2596">01</text>
                  <text x="364" y="2596">05</text>
                  <text x="388" y="2596">05</text>
                  <text x="412" y="2596">07</text>
                  <text x="436" y="2596">06</text>
                  <text x="460" y="2596">1F</text>
                  <text x="120" y="2612">Comments:</text>
                  <text x="52" y="2644">45</text>
                  <text x="104" y="2644">Name:</text>
                  <text x="200" y="2644">SM2</text>
                  <text x="236" y="2644">with</text>
                  <text x="272" y="2644">SM3</text>
                  <text x="132" y="2660">Identifiers:</text>
                  <text x="236" y="2660">sm2-with-sm3</text>
                  <text x="100" y="2676">OID:</text>
                  <text x="264" y="2676">1.2.156.10197.1.501</text>
                  <text x="128" y="2692">Parameters:</text>
                  <text x="212" y="2692">Absent</text>
                  <text x="100" y="2708">DER:</text>
                  <text x="196" y="2708">30</text>
                  <text x="220" y="2708">0A</text>
                  <text x="244" y="2708">06</text>
                  <text x="268" y="2708">08</text>
                  <text x="292" y="2708">2A</text>
                  <text x="316" y="2708">81</text>
                  <text x="340" y="2708">1C</text>
                  <text x="364" y="2708">CF</text>
                  <text x="388" y="2708">55</text>
                  <text x="412" y="2708">01</text>
                  <text x="436" y="2708">83</text>
                  <text x="460" y="2708">75</text>
                  <text x="120" y="2724">Comments:</text>
                  <text x="228" y="2724">Compressed</text>
                  <text x="312" y="2724">signature</text>
                  <text x="376" y="2724">value</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. Compressed signature value        |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        PoP with SHA-256 and HMAC-SHA256             |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    15 | Name:        PoP with SHA-384 and HMAC-SHA384             |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    16 | Name:        PoP with SHA-512 and HMAC-SHA512             |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    45 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    Compressed signature value                   |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the new heading "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1872" width="560" viewBox="0 0 560 1872" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1856" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1856" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,464 L 552,464" fill="none" stroke="black"/>
                <path d="M 8,608 L 552,608" fill="none" stroke="black"/>
                <path d="M 8,720 L 552,720" fill="none" stroke="black"/>
                <path d="M 8,832 L 552,832" fill="none" stroke="black"/>
                <path d="M 8,944 L 552,944" fill="none" stroke="black"/>
                <path d="M 8,1056 L 552,1056" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1376 L 552,1376" fill="none" stroke="black"/>
                <path d="M 8,1536 L 552,1536" fill="none" stroke="black"/>
                <path d="M 8,1696 L 552,1696" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="104" y="52">X.509</text>
                  <text x="156" y="52">Public</text>
                  <text x="200" y="52">Key</text>
                  <text x="260" y="52">Algorithms</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="200" y="84">RSA</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="240" y="100">rsaEncryption</text>
                  <text x="100" y="116">OID:</text>
                  <text x="268" y="116">1.2.840.113549.1.1.1</text>
                  <text x="128" y="132">Parameters:</text>
                  <text x="204" y="132">NULL</text>
                  <text x="100" y="148">DER:</text>
                  <text x="196" y="148">30</text>
                  <text x="220" y="148">0d</text>
                  <text x="244" y="148">06</text>
                  <text x="268" y="148">09</text>
                  <text x="292" y="148">2a</text>
                  <text x="316" y="148">86</text>
                  <text x="340" y="148">48</text>
                  <text x="364" y="148">86</text>
                  <text x="388" y="148">f7</text>
                  <text x="412" y="148">0d</text>
                  <text x="436" y="148">01</text>
                  <text x="460" y="148">01</text>
                  <text x="484" y="148">01</text>
                  <text x="508" y="148">05</text>
                  <text x="532" y="148">00</text>
                  <text x="120" y="164">Comments:</text>
                  <text x="228" y="164">Compressed</text>
                  <text x="340" y="164">subjectPublicKey</text>
                  <text x="56" y="196">1</text>
                  <text x="104" y="196">Name:</text>
                  <text x="196" y="196">EC</text>
                  <text x="236" y="196">Public</text>
                  <text x="280" y="196">Key</text>
                  <text x="348" y="196">(Weierstraß)</text>
                  <text x="420" y="196">with</text>
                  <text x="480" y="196">secp256r1</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="236" y="212">ecPublicKey,</text>
                  <text x="348" y="212">id-ecPublicKey</text>
                  <text x="100" y="228">OID:</text>
                  <text x="256" y="228">1.2.840.10045.2.1</text>
                  <text x="128" y="244">Parameters:</text>
                  <text x="228" y="244">namedCurve</text>
                  <text x="280" y="244">=</text>
                  <text x="328" y="244">secp256r1</text>
                  <text x="456" y="244">(1.2.840.10045.3.1.7)</text>
                  <text x="100" y="260">DER:</text>
                  <text x="196" y="260">30</text>
                  <text x="220" y="260">13</text>
                  <text x="244" y="260">06</text>
                  <text x="268" y="260">07</text>
                  <text x="292" y="260">2A</text>
                  <text x="316" y="260">86</text>
                  <text x="340" y="260">48</text>
                  <text x="364" y="260">CE</text>
                  <text x="388" y="260">3D</text>
                  <text x="412" y="260">02</text>
                  <text x="436" y="260">01</text>
                  <text x="460" y="260">06</text>
                  <text x="484" y="260">08</text>
                  <text x="508" y="260">2A</text>
                  <text x="532" y="260">86</text>
                  <text x="196" y="276">48</text>
                  <text x="220" y="276">CE</text>
                  <text x="244" y="276">3D</text>
                  <text x="268" y="276">03</text>
                  <text x="292" y="276">01</text>
                  <text x="316" y="276">07</text>
                  <text x="120" y="292">Comments:</text>
                  <text x="228" y="292">Compressed</text>
                  <text x="340" y="292">subjectPublicKey</text>
                  <text x="204" y="308">Also</text>
                  <text x="248" y="308">known</text>
                  <text x="284" y="308">as</text>
                  <text x="324" y="308">P-256,</text>
                  <text x="400" y="308">ansip256r1,</text>
                  <text x="492" y="308">prime256v1</text>
                  <text x="56" y="340">2</text>
                  <text x="104" y="340">Name:</text>
                  <text x="196" y="340">EC</text>
                  <text x="236" y="340">Public</text>
                  <text x="280" y="340">Key</text>
                  <text x="348" y="340">(Weierstraß)</text>
                  <text x="420" y="340">with</text>
                  <text x="480" y="340">secp384r1</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="236" y="356">ecPublicKey,</text>
                  <text x="348" y="356">id-ecPublicKey</text>
                  <text x="100" y="372">OID:</text>
                  <text x="256" y="372">1.2.840.10045.2.1</text>
                  <text x="128" y="388">Parameters:</text>
                  <text x="228" y="388">namedCurve</text>
                  <text x="280" y="388">=</text>
                  <text x="328" y="388">secp384r1</text>
                  <text x="428" y="388">(1.3.132.0.34)</text>
                  <text x="100" y="404">DER:</text>
                  <text x="196" y="404">30</text>
                  <text x="220" y="404">10</text>
                  <text x="244" y="404">06</text>
                  <text x="268" y="404">07</text>
                  <text x="292" y="404">2A</text>
                  <text x="316" y="404">86</text>
                  <text x="340" y="404">48</text>
                  <text x="364" y="404">CE</text>
                  <text x="388" y="404">3D</text>
                  <text x="412" y="404">02</text>
                  <text x="436" y="404">01</text>
                  <text x="460" y="404">06</text>
                  <text x="484" y="404">05</text>
                  <text x="508" y="404">2B</text>
                  <text x="532" y="404">81</text>
                  <text x="196" y="420">04</text>
                  <text x="220" y="420">00</text>
                  <text x="244" y="420">22</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="228" y="436">Compressed</text>
                  <text x="340" y="436">subjectPublicKey</text>
                  <text x="204" y="452">Also</text>
                  <text x="248" y="452">known</text>
                  <text x="284" y="452">as</text>
                  <text x="324" y="452">P-384,</text>
                  <text x="396" y="452">ansip384r1</text>
                  <text x="56" y="484">3</text>
                  <text x="104" y="484">Name:</text>
                  <text x="196" y="484">EC</text>
                  <text x="236" y="484">Public</text>
                  <text x="280" y="484">Key</text>
                  <text x="348" y="484">(Weierstraß)</text>
                  <text x="420" y="484">with</text>
                  <text x="480" y="484">secp521r1</text>
                  <text x="132" y="500">Identifiers:</text>
                  <text x="236" y="500">ecPublicKey,</text>
                  <text x="348" y="500">id-ecPublicKey</text>
                  <text x="100" y="516">OID:</text>
                  <text x="256" y="516">1.2.840.10045.2.1</text>
                  <text x="128" y="532">Parameters:</text>
                  <text x="228" y="532">namedCurve</text>
                  <text x="280" y="532">=</text>
                  <text x="328" y="532">secp521r1</text>
                  <text x="428" y="532">(1.3.132.0.35)</text>
                  <text x="100" y="548">DER:</text>
                  <text x="196" y="548">30</text>
                  <text x="220" y="548">10</text>
                  <text x="244" y="548">06</text>
                  <text x="268" y="548">07</text>
                  <text x="292" y="548">2A</text>
                  <text x="316" y="548">86</text>
                  <text x="340" y="548">48</text>
                  <text x="364" y="548">CE</text>
                  <text x="388" y="548">3D</text>
                  <text x="412" y="548">02</text>
                  <text x="436" y="548">01</text>
                  <text x="460" y="548">06</text>
                  <text x="484" y="548">05</text>
                  <text x="508" y="548">2B</text>
                  <text x="532" y="548">81</text>
                  <text x="196" y="564">04</text>
                  <text x="220" y="564">00</text>
                  <text x="244" y="564">23</text>
                  <text x="120" y="580">Comments:</text>
                  <text x="228" y="580">Compressed</text>
                  <text x="340" y="580">subjectPublicKey</text>
                  <text x="204" y="596">Also</text>
                  <text x="248" y="596">known</text>
                  <text x="284" y="596">as</text>
                  <text x="324" y="596">P-521,</text>
                  <text x="396" y="596">ansip521r1</text>
                  <text x="56" y="628">8</text>
                  <text x="104" y="628">Name:</text>
                  <text x="212" y="628">X25519</text>
                  <text x="292" y="628">(Montgomery)</text>
                  <text x="132" y="644">Identifiers:</text>
                  <text x="224" y="644">id-X25519</text>
                  <text x="100" y="660">OID:</text>
                  <text x="232" y="660">1.3.101.110</text>
                  <text x="128" y="676">Parameters:</text>
                  <text x="212" y="676">Absent</text>
                  <text x="100" y="692">DER:</text>
                  <text x="196" y="692">30</text>
                  <text x="220" y="692">05</text>
                  <text x="244" y="692">06</text>
                  <text x="268" y="692">03</text>
                  <text x="292" y="692">2B</text>
                  <text x="316" y="692">65</text>
                  <text x="340" y="692">6E</text>
                  <text x="120" y="708">Comments:</text>
                  <text x="56" y="740">9</text>
                  <text x="104" y="740">Name:</text>
                  <text x="204" y="740">X448</text>
                  <text x="276" y="740">(Montgomery)</text>
                  <text x="132" y="756">Identifiers:</text>
                  <text x="216" y="756">id-X448</text>
                  <text x="100" y="772">OID:</text>
                  <text x="232" y="772">1.3.101.111</text>
                  <text x="128" y="788">Parameters:</text>
                  <text x="212" y="788">Absent</text>
                  <text x="100" y="804">DER:</text>
                  <text x="196" y="804">30</text>
                  <text x="220" y="804">05</text>
                  <text x="244" y="804">06</text>
                  <text x="268" y="804">03</text>
                  <text x="292" y="804">2B</text>
                  <text x="316" y="804">65</text>
                  <text x="340" y="804">6F</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="52" y="852">10</text>
                  <text x="104" y="852">Name:</text>
                  <text x="216" y="852">Ed25519</text>
                  <text x="284" y="852">(Twisted</text>
                  <text x="356" y="852">Edwards)</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="232" y="868">id-Ed25519,</text>
                  <text x="336" y="868">id-EdDSA25519</text>
                  <text x="100" y="884">OID:</text>
                  <text x="232" y="884">1.3.101.112</text>
                  <text x="128" y="900">Parameters:</text>
                  <text x="212" y="900">Absent</text>
                  <text x="100" y="916">DER:</text>
                  <text x="196" y="916">30</text>
                  <text x="220" y="916">05</text>
                  <text x="244" y="916">06</text>
                  <text x="268" y="916">03</text>
                  <text x="292" y="916">2B</text>
                  <text x="316" y="916">65</text>
                  <text x="340" y="916">70</text>
                  <text x="120" y="932">Comments:</text>
                  <text x="52" y="964">11</text>
                  <text x="104" y="964">Name:</text>
                  <text x="208" y="964">Ed448</text>
                  <text x="272" y="964">(Edwards)</text>
                  <text x="132" y="980">Identifiers:</text>
                  <text x="224" y="980">id-Ed448,</text>
                  <text x="312" y="980">id-EdDSA448</text>
                  <text x="100" y="996">OID:</text>
                  <text x="232" y="996">1.3.101.113</text>
                  <text x="128" y="1012">Parameters:</text>
                  <text x="212" y="1012">Absent</text>
                  <text x="100" y="1028">DER:</text>
                  <text x="196" y="1028">30</text>
                  <text x="220" y="1028">05</text>
                  <text x="244" y="1028">06</text>
                  <text x="268" y="1028">03</text>
                  <text x="292" y="1028">2B</text>
                  <text x="316" y="1028">65</text>
                  <text x="340" y="1028">71</text>
                  <text x="120" y="1044">Comments:</text>
                  <text x="52" y="1076">24</text>
                  <text x="104" y="1076">Name:</text>
                  <text x="196" y="1076">EC</text>
                  <text x="236" y="1076">Public</text>
                  <text x="280" y="1076">Key</text>
                  <text x="348" y="1076">(Weierstraß)</text>
                  <text x="420" y="1076">with</text>
                  <text x="248" y="1092">brainpoolP256r1</text>
                  <text x="132" y="1108">Identifiers:</text>
                  <text x="236" y="1108">ecPublicKey,</text>
                  <text x="348" y="1108">id-ecPublicKey</text>
                  <text x="100" y="1124">OID:</text>
                  <text x="256" y="1124">1.2.840.10045.2.1</text>
                  <text x="128" y="1140">Parameters:</text>
                  <text x="228" y="1140">namedCurve</text>
                  <text x="280" y="1140">=</text>
                  <text x="352" y="1140">brainpoolP256r1</text>
                  <text x="276" y="1156">(1.3.36.3.3.2.8.1.1.7)</text>
                  <text x="100" y="1172">DER:</text>
                  <text x="196" y="1172">30</text>
                  <text x="220" y="1172">14</text>
                  <text x="244" y="1172">06</text>
                  <text x="268" y="1172">07</text>
                  <text x="292" y="1172">2A</text>
                  <text x="316" y="1172">86</text>
                  <text x="340" y="1172">48</text>
                  <text x="364" y="1172">CE</text>
                  <text x="388" y="1172">3D</text>
                  <text x="412" y="1172">02</text>
                  <text x="436" y="1172">01</text>
                  <text x="460" y="1172">06</text>
                  <text x="484" y="1172">09</text>
                  <text x="508" y="1172">2B</text>
                  <text x="532" y="1172">24</text>
                  <text x="196" y="1188">03</text>
                  <text x="220" y="1188">03</text>
                  <text x="244" y="1188">02</text>
                  <text x="268" y="1188">08</text>
                  <text x="292" y="1188">01</text>
                  <text x="316" y="1188">01</text>
                  <text x="340" y="1188">07</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="228" y="1204">Compressed</text>
                  <text x="340" y="1204">subjectPublicKey</text>
                  <text x="52" y="1236">25</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="196" y="1236">EC</text>
                  <text x="236" y="1236">Public</text>
                  <text x="280" y="1236">Key</text>
                  <text x="348" y="1236">(Weierstraß)</text>
                  <text x="420" y="1236">with</text>
                  <text x="248" y="1252">brainpoolP384r1</text>
                  <text x="132" y="1268">Identifiers:</text>
                  <text x="236" y="1268">ecPublicKey,</text>
                  <text x="348" y="1268">id-ecPublicKey</text>
                  <text x="100" y="1284">OID:</text>
                  <text x="256" y="1284">1.2.840.10045.2.1</text>
                  <text x="128" y="1300">Parameters:</text>
                  <text x="228" y="1300">namedCurve</text>
                  <text x="280" y="1300">=</text>
                  <text x="352" y="1300">brainpoolP384r1</text>
                  <text x="280" y="1316">(1.3.36.3.3.2.8.1.1.11)</text>
                  <text x="100" y="1332">DER:</text>
                  <text x="196" y="1332">30</text>
                  <text x="220" y="1332">14</text>
                  <text x="244" y="1332">06</text>
                  <text x="268" y="1332">07</text>
                  <text x="292" y="1332">2A</text>
                  <text x="316" y="1332">86</text>
                  <text x="340" y="1332">48</text>
                  <text x="364" y="1332">CE</text>
                  <text x="388" y="1332">3D</text>
                  <text x="412" y="1332">02</text>
                  <text x="436" y="1332">01</text>
                  <text x="460" y="1332">06</text>
                  <text x="484" y="1332">09</text>
                  <text x="508" y="1332">2B</text>
                  <text x="532" y="1332">24</text>
                  <text x="196" y="1348">03</text>
                  <text x="220" y="1348">03</text>
                  <text x="244" y="1348">02</text>
                  <text x="268" y="1348">08</text>
                  <text x="292" y="1348">01</text>
                  <text x="316" y="1348">01</text>
                  <text x="340" y="1348">0B</text>
                  <text x="120" y="1364">Comments:</text>
                  <text x="228" y="1364">Compressed</text>
                  <text x="340" y="1364">subjectPublicKey</text>
                  <text x="52" y="1396">26</text>
                  <text x="104" y="1396">Name:</text>
                  <text x="196" y="1396">EC</text>
                  <text x="236" y="1396">Public</text>
                  <text x="280" y="1396">Key</text>
                  <text x="348" y="1396">(Weierstraß)</text>
                  <text x="420" y="1396">with</text>
                  <text x="248" y="1412">brainpoolP512r1</text>
                  <text x="132" y="1428">Identifiers:</text>
                  <text x="236" y="1428">ecPublicKey,</text>
                  <text x="348" y="1428">id-ecPublicKey</text>
                  <text x="100" y="1444">OID:</text>
                  <text x="256" y="1444">1.2.840.10045.2.1</text>
                  <text x="128" y="1460">Parameters:</text>
                  <text x="228" y="1460">namedCurve</text>
                  <text x="280" y="1460">=</text>
                  <text x="352" y="1460">brainpoolP512r1</text>
                  <text x="280" y="1476">(1.3.36.3.3.2.8.1.1.13)</text>
                  <text x="100" y="1492">DER:</text>
                  <text x="196" y="1492">30</text>
                  <text x="220" y="1492">14</text>
                  <text x="244" y="1492">06</text>
                  <text x="268" y="1492">07</text>
                  <text x="292" y="1492">2A</text>
                  <text x="316" y="1492">86</text>
                  <text x="340" y="1492">48</text>
                  <text x="364" y="1492">CE</text>
                  <text x="388" y="1492">3D</text>
                  <text x="412" y="1492">02</text>
                  <text x="436" y="1492">01</text>
                  <text x="460" y="1492">06</text>
                  <text x="484" y="1492">09</text>
                  <text x="508" y="1492">2B</text>
                  <text x="532" y="1492">24</text>
                  <text x="196" y="1508">03</text>
                  <text x="220" y="1508">03</text>
                  <text x="244" y="1508">02</text>
                  <text x="268" y="1508">08</text>
                  <text x="292" y="1508">01</text>
                  <text x="316" y="1508">01</text>
                  <text x="340" y="1508">0D</text>
                  <text x="120" y="1524">Comments:</text>
                  <text x="228" y="1524">Compressed</text>
                  <text x="340" y="1524">subjectPublicKey</text>
                  <text x="52" y="1556">27</text>
                  <text x="104" y="1556">Name:</text>
                  <text x="196" y="1556">EC</text>
                  <text x="236" y="1556">Public</text>
                  <text x="280" y="1556">Key</text>
                  <text x="348" y="1556">(Weierstraß)</text>
                  <text x="420" y="1556">with</text>
                  <text x="220" y="1572">FRP256v1</text>
                  <text x="132" y="1588">Identifiers:</text>
                  <text x="236" y="1588">ecPublicKey,</text>
                  <text x="348" y="1588">id-ecPublicKey</text>
                  <text x="100" y="1604">OID:</text>
                  <text x="256" y="1604">1.2.840.10045.2.1</text>
                  <text x="128" y="1620">Parameters:</text>
                  <text x="228" y="1620">namedCurve</text>
                  <text x="280" y="1620">=</text>
                  <text x="324" y="1620">FRP256v1</text>
                  <text x="288" y="1636">(1.2.250.1.223.101.256.1)</text>
                  <text x="100" y="1652">DER:</text>
                  <text x="196" y="1652">30</text>
                  <text x="220" y="1652">15</text>
                  <text x="244" y="1652">06</text>
                  <text x="268" y="1652">07</text>
                  <text x="292" y="1652">2A</text>
                  <text x="316" y="1652">86</text>
                  <text x="340" y="1652">48</text>
                  <text x="364" y="1652">CE</text>
                  <text x="388" y="1652">3D</text>
                  <text x="412" y="1652">02</text>
                  <text x="436" y="1652">01</text>
                  <text x="460" y="1652">06</text>
                  <text x="484" y="1652">0A</text>
                  <text x="508" y="1652">2A</text>
                  <text x="532" y="1652">81</text>
                  <text x="196" y="1668">7A</text>
                  <text x="220" y="1668">01</text>
                  <text x="244" y="1668">81</text>
                  <text x="268" y="1668">5F</text>
                  <text x="292" y="1668">65</text>
                  <text x="316" y="1668">82</text>
                  <text x="340" y="1668">00</text>
                  <text x="364" y="1668">01</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="228" y="1684">Compressed</text>
                  <text x="340" y="1684">subjectPublicKey</text>
                  <text x="52" y="1716">28</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="196" y="1716">EC</text>
                  <text x="236" y="1716">Public</text>
                  <text x="280" y="1716">Key</text>
                  <text x="348" y="1716">(Weierstraß)</text>
                  <text x="420" y="1716">with</text>
                  <text x="224" y="1732">sm2p256v1</text>
                  <text x="132" y="1748">Identifiers:</text>
                  <text x="236" y="1748">ecPublicKey,</text>
                  <text x="348" y="1748">id-ecPublicKey</text>
                  <text x="100" y="1764">OID:</text>
                  <text x="256" y="1764">1.2.840.10045.2.1</text>
                  <text x="128" y="1780">Parameters:</text>
                  <text x="228" y="1780">namedCurve</text>
                  <text x="280" y="1780">=</text>
                  <text x="328" y="1780">sm2p256v1</text>
                  <text x="272" y="1796">(1.2.156.10197.1.301)</text>
                  <text x="100" y="1812">DER:</text>
                  <text x="196" y="1812">30</text>
                  <text x="220" y="1812">13</text>
                  <text x="244" y="1812">06</text>
                  <text x="268" y="1812">07</text>
                  <text x="292" y="1812">2A</text>
                  <text x="316" y="1812">86</text>
                  <text x="340" y="1812">48</text>
                  <text x="364" y="1812">CE</text>
                  <text x="388" y="1812">3D</text>
                  <text x="412" y="1812">02</text>
                  <text x="436" y="1812">01</text>
                  <text x="460" y="1812">06</text>
                  <text x="484" y="1812">08</text>
                  <text x="508" y="1812">2A</text>
                  <text x="532" y="1812">81</text>
                  <text x="196" y="1828">1C</text>
                  <text x="220" y="1828">CF</text>
                  <text x="244" y="1828">55</text>
                  <text x="268" y="1828">01</text>
                  <text x="292" y="1828">82</text>
                  <text x="316" y="1828">2D</text>
                  <text x="120" y="1844">Comments:</text>
                  <text x="228" y="1844">Compressed</text>
                  <text x="340" y="1844">subjectPublicKey</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstraß) with secp256r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstraß) with secp384r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstraß) with secp521r1    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstraß) with              |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstraß) with              |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    28 | Name:        EC Public Key (Weierstraß) with              |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <section anchor="suitability-of-different-public-key-algorithms-for-use-within-iot-scenarios">
          <name>Suitability of different public key algorithms for use within IoT scenarios</name>
          <t>The public key algorithms registry <xref target="pkalg"/> specifies a number of algorithms, not all which are suitable for usage with constrained devices. RSA requires large keys and large signature sizes compared to elliptic curve cryptography (ECC), which together with resource-efficient implementations of named elliptic curves (Montgomery, Edwards and Weierstraß curves) make them suitable candidates for IoT public key usage. These curves are represented by ids 1–11 and 24–28 in <xref target="pkalg"/>.</t>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry under the "CBOR Object Signing and Encryption (COSE)" heading with this document as reference.</t>
      </section>
      <section anchor="media-type-application-registry">
        <name>Media Type Application Registry</name>
        <t>IANA is requested to assign the following entries in to the "application" registry under the "Media Types" heading with this document as reference.</t>
        <section anchor="c509-cert">
          <name>Media Type application/cose-c509-cert</name>
          <t>When the application/cose-c509-cert media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-cert</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
            </li>
            <li>
              <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD8, TBD6</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pkcs10">
          <name>Media Type application/cose-c509-pkcs10</name>
          <t>When the application/cose-c509-pkcs10 media type is used, the data is a C509CertificateRequest structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pkcs10</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD9</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-crtemplate">
          <name>Media Type application/cose-c509-crtemplate</name>
          <t>When the application/cose-c509-crtemplate media type is used, the data is a C509CertificateRequestTemplate structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-crtemplate</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD18</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-privkey">
          <name>Media Type application/cose-c509-privkey</name>
          <t>When the application/cose-c509-privkey media type is used, the data is a C509PrivateKey structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-privkey</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD12</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pem">
          <name>Media Type application/cose-c509-pem</name>
          <t>When the application/cose-c509-pem media type is used, the data is a C509PEM structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pem</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD13</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="cose-certhash">
          <name>Media Type application/cose-certhash</name>
          <t>When the application/cose-certhash media type is used, the data is a COSE_CertHash structure, see <xref target="RFC9360"/>.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-certhash</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about what the hash value is calculated over.</t>
            </li>
            <li>
              <t>Can be set to "c509" to indicate that the hash value is calculated over a C509 certificate, see <xref target="cose-header-params"/>.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of <xref target="RFC9360"/>.</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use X.509 or C509 as certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): N/A</t>
            </li>
            <li>
              <t>File extension(s): N/A</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
      </section>
      <section anchor="content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to add entries for "application/cose-c509-cert", "application/cose-c509-pkcs10", "application/cose-c509-crtemplate", "application/cose-c509-privkey" and "application/cose-c509-pem" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters".
A dedicated Content-Format ID is requested for the "application/cose-c509-cert" media type in the case when the parameter "usage" is set to "chain", see <xref target="c509-cert"/>.</t>
        <t>IANA is requested to add entries for "application/cose-certhash" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters". A dedicated Content-Format ID is requested  in the case when the parameter "usage" is set to "c509", see <xref target="c509-cert"/>.</t>
        <t>IANA is requested to add entries for "application/cbor" to the "CoAP Content-Formats" registry under the registry group "Constrained RESTful Environments (CoRE) Parameters", in the case when the encoding is a CBOR text string containing a URI, see <xref target="RFC3986"/>.</t>
        <figure anchor="fig-format-ids">
          <name>CoAP Content-Format IDs</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="616" viewBox="0 0 616 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,496" fill="none" stroke="black"/>
                <path d="M 192,32 L 192,496" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,496" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,496" fill="none" stroke="black"/>
                <path d="M 488,32 L 488,496" fill="none" stroke="black"/>
                <path d="M 608,32 L 608,496" fill="none" stroke="black"/>
                <path d="M 8,32 L 608,32" fill="none" stroke="black"/>
                <path d="M 8,78 L 608,78" fill="none" stroke="black"/>
                <path d="M 8,82 L 608,82" fill="none" stroke="black"/>
                <path d="M 8,128 L 608,128" fill="none" stroke="black"/>
                <path d="M 8,192 L 608,192" fill="none" stroke="black"/>
                <path d="M 8,240 L 608,240" fill="none" stroke="black"/>
                <path d="M 8,288 L 608,288" fill="none" stroke="black"/>
                <path d="M 8,336 L 608,336" fill="none" stroke="black"/>
                <path d="M 8,384 L 608,384" fill="none" stroke="black"/>
                <path d="M 8,432 L 608,432" fill="none" stroke="black"/>
                <path d="M 8,496 L 608,496" fill="none" stroke="black"/>
                <g class="text">
                  <text x="48" y="52">Content</text>
                  <text x="232" y="52">Content</text>
                  <text x="304" y="52">Media</text>
                  <text x="444" y="52">ID</text>
                  <text x="536" y="52">Reference</text>
                  <text x="44" y="68">Format</text>
                  <text x="228" y="68">Coding</text>
                  <text x="300" y="68">Type</text>
                  <text x="68" y="100">application/</text>
                  <text x="208" y="100">-</text>
                  <text x="308" y="100">[[link</text>
                  <text x="348" y="100">to</text>
                  <text x="388" y="100">9.15]]</text>
                  <text x="452" y="100">TBD3</text>
                  <text x="524" y="100">[[this</text>
                  <text x="76" y="116">cose-c509-cert</text>
                  <text x="556" y="116">document]]</text>
                  <text x="68" y="148">application/</text>
                  <text x="524" y="148">[[this</text>
                  <text x="80" y="164">cose-c509-cert;</text>
                  <text x="208" y="164">-</text>
                  <text x="308" y="164">[[link</text>
                  <text x="348" y="164">to</text>
                  <text x="388" y="164">9.15]]</text>
                  <text x="456" y="164">TBD15</text>
                  <text x="556" y="164">document]]</text>
                  <text x="40" y="180">usage</text>
                  <text x="72" y="180">=</text>
                  <text x="104" y="180">chain</text>
                  <text x="68" y="212">application/</text>
                  <text x="208" y="212">-</text>
                  <text x="308" y="212">[[link</text>
                  <text x="348" y="212">to</text>
                  <text x="388" y="212">9.15]]</text>
                  <text x="452" y="212">TBD4</text>
                  <text x="524" y="212">[[this</text>
                  <text x="84" y="228">cose-c509-pkcs10</text>
                  <text x="556" y="228">document]]</text>
                  <text x="68" y="260">application/</text>
                  <text x="208" y="260">-</text>
                  <text x="308" y="260">[[link</text>
                  <text x="348" y="260">to</text>
                  <text x="388" y="260">9.15]]</text>
                  <text x="456" y="260">TBD19</text>
                  <text x="524" y="260">[[this</text>
                  <text x="100" y="276">cose-c509-crtemplate</text>
                  <text x="556" y="276">document]]</text>
                  <text x="68" y="308">application/</text>
                  <text x="208" y="308">-</text>
                  <text x="308" y="308">[[link</text>
                  <text x="348" y="308">to</text>
                  <text x="388" y="308">9.15]]</text>
                  <text x="456" y="308">TBD10</text>
                  <text x="524" y="308">[[this</text>
                  <text x="88" y="324">cose-c509-privkey</text>
                  <text x="556" y="324">document]]</text>
                  <text x="68" y="356">application/</text>
                  <text x="208" y="356">-</text>
                  <text x="308" y="356">[[link</text>
                  <text x="348" y="356">to</text>
                  <text x="388" y="356">9.15]]</text>
                  <text x="456" y="356">TBD11</text>
                  <text x="524" y="356">[[this</text>
                  <text x="72" y="372">cose-c509-pem</text>
                  <text x="556" y="372">document]]</text>
                  <text x="68" y="404">application/</text>
                  <text x="208" y="404">-</text>
                  <text x="308" y="404">[[link</text>
                  <text x="348" y="404">to</text>
                  <text x="388" y="404">9.15]]</text>
                  <text x="456" y="404">TBD16</text>
                  <text x="524" y="404">[[this</text>
                  <text x="72" y="420">cose-certhash</text>
                  <text x="556" y="420">document]]</text>
                  <text x="68" y="452">application/</text>
                  <text x="524" y="452">[[this</text>
                  <text x="76" y="468">cose-certhash;</text>
                  <text x="208" y="468">-</text>
                  <text x="308" y="468">[[link</text>
                  <text x="348" y="468">to</text>
                  <text x="388" y="468">9.15]]</text>
                  <text x="456" y="468">TBD17</text>
                  <text x="556" y="468">document]]</text>
                  <text x="40" y="484">usage</text>
                  <text x="72" y="484">=</text>
                  <text x="100" y="484">c509</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+----------------------+---------+------------------+-------+--------------+
| Content              | Content | Media            | ID    | Reference    |
| Format               | Coding  | Type             |       |              |
+======================+=========+==================+=======+==============+
| application/         | -       | [[link to 9.15]] | TBD3  | [[this       |
| cose-c509-cert       |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         |         |                  |       | [[this       |
| cose-c509-cert;      | -       | [[link to 9.15]] | TBD15 |   document]] |
| usage = chain        |         |                  |       |              |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD4  | [[this       |
| cose-c509-pkcs10     |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD19 | [[this       |
| cose-c509-crtemplate |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD10 | [[this       |
| cose-c509-privkey    |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD11 | [[this       |
| cose-c509-pem        |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD16 | [[this       |
| cose-certhash        |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         |         |                  |       | [[this       |
| cose-certhash;       | -       | [[link to 9.15]] | TBD17 |   document]] |
| usage = c509         |         |                  |       |              |
+----------------------+---------+------------------+-------+--------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. C509 is defined in the same way as X.509, but uses a different value and instead of the DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; in TLS 1.3 and opaque ASN.1Cert&lt;1..2^24-1&gt; in TLS 1.2, contains the CBOR sequence ~C509Certificate (an unwrapped C509Certificate). Similar to COSE_C509, the TLS handshake contains the length of each certificate. The TLS extensions client_certificate_type and server_certificate_type <xref target="RFC7250"/> are used to negotiate the use of C509.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,96" fill="none" stroke="black"/>
              <path d="M 336,32 L 336,96" fill="none" stroke="black"/>
              <path d="M 552,32 L 552,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="100" y="52">Name</text>
                <text x="280" y="52">Recommended</text>
                <text x="376" y="52">Comment</text>
                <text x="44" y="84">TBD5</text>
                <text x="100" y="84">C509</text>
                <text x="168" y="84">Certificate</text>
                <text x="320" y="84">N</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           N |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="tlsa">
        <name>TLSA Selectors Registry</name>
        <t>This document registers the following entries in the "TLSA Selectors" registry under the "DNS-Based Authentication of Named Entities (DANE) Parameters" heading.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="584" viewBox="0 0 584 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
              <path d="M 416,32 L 416,96" fill="none" stroke="black"/>
              <path d="M 576,32 L 576,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 576,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 576,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 576,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 576,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="112" y="52">Acronym</text>
                <text x="208" y="52">Short</text>
                <text x="280" y="52">Description</text>
                <text x="496" y="52">Reference</text>
                <text x="44" y="84">TBD7</text>
                <text x="124" y="84">C509</text>
                <text x="180" y="84">CBOR</text>
                <text x="232" y="84">encoded</text>
                <text x="284" y="84">PKIX</text>
                <text x="356" y="84">certificates</text>
                <text x="452" y="84">[[this</text>
                <text x="524" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+---------+--------------------------------+-------------------+
| Value | Acronym |    Short Description           |     Reference     |
+=======+=========+================================+===================+
|  TBD7 |    C509 | CBOR encoded PKIX certificates | [[this document]] |
+-------+---------+--------------------------------+-------------------+
]]></artwork>
        </artset>
        <t>The TLSA selectors registry defined in <xref target="RFC6698"/> originally only applied to PKIX <xref target="RFC5280"/> certificates in DER encoding. This specification updates <xref target="RFC6698"/> to accept the use of C509 certificates, which are essentially CBOR encoded PKIX certificates.</t>
      </section>
      <section anchor="edhoc-authentication-credential-types-registry">
        <name>EDHOC Authentication Credential Types Registry</name>
        <t>This document registers the following entry in the "EDHOC Authentication Credential Types" registry under the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" heading. This is used to identify supported authentication credential type, for example, during discovery of EDHOC resources, see <xref target="RFC9668"/>.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="424" viewBox="0 0 424 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 256,32 L 256,96" fill="none" stroke="black"/>
              <path d="M 416,32 L 416,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 416,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 416,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 416,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 416,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="128" y="52">Description</text>
                <text x="336" y="52">Reference</text>
                <text x="40" y="84">TBD14</text>
                <text x="100" y="84">C509</text>
                <text x="168" y="84">certificate</text>
                <text x="292" y="84">[[this</text>
                <text x="364" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+----------------------+-------------------+
| Value | Description          |     Reference     |
+=======+======================+===================+
| TBD14 | C509 certificate     | [[this document]] |
+-------+----------------------+-------------------+
]]></artwork>
        </artset>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2985">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5958">
          <front>
            <title>Asymmetric Key Packages</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document defines the syntax for private-key information and a content type for it. Private-key information includes a private key for a specified public-key algorithm and a set of attributes. The Cryptographic Message Syntax (CMS), as defined in RFC 5652, can be used to digitally sign, digest, authenticate, or encrypt the asymmetric key format content type. This document obsoletes RFC 5208. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5958"/>
          <seriesInfo name="DOI" value="10.17487/RFC5958"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>ASN.1 encoding rules. Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7468">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="18" month="October" year="2025"/>
            <abstract>
              <t>   RFC 7925 offers guidance to developers on using TLS/DTLS 1.2 for
   Internet of Things (IoT) devices with resource constraints.  This
   document is a companion to RFC 7925, defining TLS/DTLS 1.3 profiles
   for IoT devices.  Additionally, it updates RFC 7925 with respect to
   the X.509 certificate profile and ciphersuite requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-17"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="17" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a "compact" version of TLS 1.3 and DTLS 1.3.
   It saves bandwidth by trimming obsolete material, tighter encoding, a
   template-based specialization technique, and alternative
   cryptographic techniques. cTLS is not directly interoperable with TLS
   1.3 or DTLS 1.3 since the over-the-wire framing is different.  A
   single server can, however, offer cTLS alongside TLS or DTLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-rfc7030-csrattrs">
          <front>
            <title>Clarification and enhancement of RFC7030 CSR Attributes definition</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens</organization>
            </author>
            <author fullname="Dan Harkins" initials="D." surname="Harkins">
              <organization>The Industrial Lounge</organization>
            </author>
            <date day="28" month="June" year="2025"/>
            <abstract>
              <t>   This document updates RFC7030, Enrollment over Secure Transport
   (EST), clarifying how the Certificate Signiing Request (CSR)
   Attributes Response can be used by an EST server to specify both CSR
   attribute Object IDs (OID) and also CSR attribute values, in
   particular X.509 extension values, that the server expects the client
   to include in subsequent CSR request.  RFC9148 is derived from
   RFC7030, and it is also updated.

   RFC7030 (EST) is ambiguous in its specification of the CSR Attributes
   Response.  This has resulted in implementation challenges and
   implementor confusion.  As a result, there was not universal
   understanding of what was specified.  This document clarifies the
   encoding rules.

   This document therefore also provides a new straightforward approach:
   using a template for CSR contents that may be partially filled in by
   the server.  This also allows an EST server to specify a subject
   Distinguished Name (DN).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc7030-csrattrs-23"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 2.1.4"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 3.8.0"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/solutions-and-impact/technologies/esim/wp-content/uploads/2025/01/SGP.14-v2.2.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.2</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="https://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
        <reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
            <author initials="E." surname="Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
        </reference>
      </references>
    </references>
    <?line 2363?>

<section anchor="appA">
      <name>C509 Certificate Examples</name>
      <section anchor="rfc7925-prof">
        <name>Example: RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example: C509 Certificate Encoding</name>
          <t>This section shows the C509 encoding of the X.509 certificate in the previous section. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <t><xref target="fig-CBOR-diagnostic-7925"/> shows the diagnostic notation of the unwrapped CBOR sequence, ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-CBOR-diagnostic-7925">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  3,                   / version and certificate type /
  h'01f50d',           / serialNumber /
  0,                   / signatureAlgorithm /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  48(h'0123456789AB'), / subject, EUI-64 /
  1,                   / subjectPublicKeyAlgorithm /
  h'FEB1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,                   / single extension:
                         non-critical keyUsage
                         digitalSignature /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-7925"/> shows the plain hex format of the unwrapped CBOR sequence, the size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-7925">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
03
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 FE B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16
]]></artwork>
          </figure>
        </section>
        <section anchor="example-native">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>This section shows the natively signed C509 certificate corresponding to that of the previous section, which is identical except for c509CertificateType, encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <t><xref target="fig-CBOR-diagnostic-native"/> shows the diagnostic notation of the natively signed unwrapped CBOR sequence, ~C509Certificate.</t>
          <figure anchor="fig-CBOR-diagnostic-native">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  2,
  h'01f50d',
  0,
  "RFC test CA",
  1672531200,
  1767225600,
  48(h'0123456789AB'),
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  h'EB0D472731F689BC00F5880B12C68B3F9FD38B23FADFCA2095
    0F3F241B60A202579CAC28CD3B7494D5FA5D8BBAB4600357E5
    50AB9FA9A65D9BA2B3B82E668CC6'
]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-native"/> shows the plain hex format of the natively signed unwrapped CBOR sequence, the size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-native">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
        </section>
        <section anchor="app-DH-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate keyUsage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used to sign a certificate request.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstraß) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
        <section anchor="other-examples">
          <name>Examples: C509Certificate and C509CertData</name>
          <t>This section examplifies other CBOR objects defined in this specification, based on the natively signed C509 certificate in <xref target="example-native"/>.</t>
          <t><xref target="fig-C509Certificate"/> shows the encoding of the corresponding C509Certificate, i.e., the CBOR array wrapping of the CBOR sequence ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-C509Certificate">
            <name>C509Certificate: The CBOR array wrapping of ~C509Certificate</name>
            <artwork><![CDATA[
8B
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509Certificate is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 8B (which indicates that it is a CBOR array with 11 elements).</t>
          <t><xref target="fig-C509CertData"/> shows the encoding of the corresponding C509CertData, i.e., the CBOR byte string wrapping of the CBOR sequence ~C509Certificate, see <xref target="cose-header-params"/>.</t>
          <figure anchor="fig-C509CertData">
            <name>C509CertData: CBOR byte string wrapping of ~C509Certificate.</name>
            <artwork><![CDATA[
58 8C
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509CertData is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 58 8C (which indicates that it is a CBOR byte string of 140 bytes).</t>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example: IEEE 802.1AR profiled X.509 Certificate</name>
        <t>An example of an IEEE 802.1AR profiled X.509 certificate (Secure Device Identifier, DevID) is provided in Appendix C.2 of <xref target="RFC9148"/>. The certificate is shown below including details of the hardwareModuleName type of otherName in subjectAltName, see <xref target="ext-encoding"/>.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 9112578475118446130 (0x7e7661d7b54e4632)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: C=US, ST=CA, O=Example Inc, OU=certification, CN=802.1AR CA
        Validity
            Not Before: Jan 31 11:29:16 2019 GMT
            Not After : Dec 31 23:59:59 9999 GMT
        Subject: C=US, ST=CA, L=LA, O=example Inc, OU=IoT/serialNumber=Wt1234
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:c8:b4:21:f1:1c:25:e4:7e:3a:c5:71:23:bf:2d:
                    9f:dc:49:4f:02:8b:c3:51:cc:80:c0:3f:15:0b:f5:
                    0c:ff:95:8d:75:41:9d:81:a6:a2:45:df:fa:e7:90:
                    be:95:cf:75:f6:02:f9:15:26:18:f8:16:a2:b2:3b:
                    56:38:e5:9f:d9
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Subject Key Identifier:
                96:60:0D:87:16:BF:7F:D0:E7:52:D0:AC:76:07:77:AD:66:5D:02:A0
            X509v3 Authority Key Identifier:
                68:D1:65:51:F9:51:BF:C8:2A:43:1D:0D:9F:08:BC:2D:20:5B:11:60
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Subject Alternative Name:
                otherName:
                    type-id: 1.3.6.1.5.5.7.8.4 (id-on-hardwareModuleName)
                    value:
                        hwType: 1.3.6.1.4.1.6715.10.1
                        hwSerialNum: 01:02:03:04
    Signature Algorithm: ecdsa-with-SHA256
    Signature Value:
        30:46:02:21:00:c0:d8:19:96:d2:50:7d:69:3f:3c:48:ea:a5:
        ee:94:91:bd:a6:db:21:40:99:d9:81:17:c6:3b:36:13:74:cd:
        86:02:21:00:a7:74:98:9f:4c:32:1a:5c:f2:5d:83:2a:4d:33:
        6a:08:ad:67:df:20:f1:50:64:21:18:8a:0a:de:6d:34:92:36
]]></artwork>
        <t>The DER encoding of the certificate is 577 bytes:</t>
        <artwork><![CDATA[
30 82 02 3D 30 82 01 E2 A0 03 02 01 02 02 08 7E 76 61 D7 B5 4E 46 32
30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 5D 31 0B 30 09 06 03 55 04 06
13 02 55 53 31 0B 30 09 06 03 55 04 08 0C 02 43 41 31 14 30 12 06 03
55 04 0A 0C 0B 45 78 61 6D 70 6C 65 20 49 6E 63 31 16 30 14 06 03 55
04 0B 0C 0D 63 65 72 74 69 66 69 63 61 74 69 6F 6E 31 13 30 11 06 03
55 04 03 0C 0A 38 30 32 2E 31 41 52 20 43 41 30 20 17 0D 31 39 30 31
33 31 31 31 32 39 31 36 5A 18 0F 39 39 39 39 31 32 33 31 32 33 35 39
35 39 5A 30 5C 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0B 30 09 06
03 55 04 08 0C 02 43 41 31 0B 30 09 06 03 55 04 07 0C 02 4C 41 31 14
30 12 06 03 55 04 0A 0C 0B 65 78 61 6D 70 6C 65 20 49 6E 63 31 0C 30
0A 06 03 55 04 0B 0C 03 49 6F 54 31 0F 30 0D 06 03 55 04 05 13 06 57
74 31 32 33 34 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48
CE 3D 03 01 07 03 42 00 04 C8 B4 21 F1 1C 25 E4 7E 3A C5 71 23 BF 2D
9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C FF 95 8D 75 41 9D 81
A6 A2 45 DF FA E7 90 BE 95 CF 75 F6 02 F9 15 26 18 F8 16 A2 B2 3B 56
38 E5 9F D9 A3 81 8A 30 81 87 30 09 06 03 55 1D 13 04 02 30 00 30 1D
06 03 55 1D 0E 04 16 04 14 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07
77 AD 66 5D 02 A0 30 1F 06 03 55 1D 23 04 18 30 16 80 14 68 D1 65 51
F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20 5B 11 60 30 0E 06 03 55 1D 0F
01 01 FF 04 04 03 02 05 A0 30 2A 06 03 55 1D 11 04 23 30 21 A0 1F 06
08 2B 06 01 05 05 07 08 04 A0 13 30 11 06 09 2B 06 01 04 01 B4 3B 0A
01 04 04 01 02 03 04 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 30
46 02 21 00 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 02 21 00 A7 74 98 9F 4C 32 1A
5C F2 5D 83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34
92 36
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

 3,
 h'7E7661D7B54E4632',
 0,
 [
  -4, "US",
   6, "CA",
   8, "Example Inc",
   9, "certification",
   1, "802.1AR CA"
 ],
 1548934156,
 null,
 [
  -4, "US",
   6, "CA",
   5, "LA",
   8, "example Inc",
   9, "IoT",
  -3, "Wt1234"
 ],
 1,
 h'FDC8B421F11C25E47E3AC57123BF2D9FDC494F028BC351CC80C03F150BF50CFF95',
 [
   4, -2,
   1, h'96600D8716BF7FD0E752D0AC760777AD665D02A0',
   7, h'68D16551F951BFC82A431D0D9F08BC2D205B1160',
  -2, 5,
  3, [-1, [h'2B06010401B43B0A01', h'01020304']]
     / subjectAltName with hardwareModuleName /
 ],
 h'C0D81996D2507D693F3C48EAA5EE9491BDA6DB214099D98117C63B361374CD86A7
   74989F4C321A5CF25D832A4D336A08AD67DF20F1506421188A0ADE6D349236'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 275 bytes:</t>
          <artwork><![CDATA[
03 48 7E 76 61 D7 B5 4E 46 32 00 8A 23 62 55 53 06 62 43 41 08 6B 45
78 61 6D 70 6C 65 20 49 6E 63 09 6D 63 65 72 74 69 66 69 63 61 74 69
6F 6E 01 6A 38 30 32 2E 31 41 52 20 43 41 1A 5C 52 DC 0C F6 8C 23 62
55 53 06 62 43 41 05 62 4C 41 08 6B 65 78 61 6D 70 6C 65 20 49 6E 63
09 63 49 6F 54 22 66 57 74 31 32 33 34 01 58 21 FD C8 B4 21 F1 1C 25
E4 7E 3A C5 71 23 BF 2D 9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5
0C FF 95 8A 04 21 01 54 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07 77
AD 66 5D 02 A0 07 54 68 D1 65 51 F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D
20 5B 11 60 21 05 03 82 20 82 49 2B 06 01 04 01 B4 3B 0A 01 44 01 02
03 04 58 40 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 A7 74 98 9F 4C 32 1A 5C F2 5D
83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34 92 36
]]></artwork>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example: CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'047FA1E31928EE403BA0B83A395673FC',
0,
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'FD963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example: CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'A6A55C870E39B40E',
23,
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Corey Bonnell, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Rene Struik, Fraser Tweedale, and Paul Wouters for reviewing and commenting on intermediate versions of the draft and help with GitHub.</t>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Special acknowledgement goes to Lijun Liao for his careful review and many detailed improvement proposals.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y923bbSJIo+q6vwFatcyx1kTTvkthTM01TcllTvmhEuavn
VNfpBZKQhDYJsAFSstrlXvO6n+cDZr/sX9gfcOZP5ktOXDITmUDiQpmy5Z7S
1LhJEAhkRkRGxj3r9frOzcDp7Kz81dwbOLujZ2/OnZNgGs68mfOHRq955Iy8
aOVf+lN35cXO3ih9aX93ZxZOA3cBj88i93JV973VZX0axl59OgmjusfQ6lN4
qN7q77iTSeTBSzOQdnZuOu8X83Z0OR3sOE7sz+FRDz/WnefhOpg5499/79z6
q2v4Zwb/hpFz7flX1ysnXnpTAOPNdnYA1MCJV7OdeD1Z+HHsh8HqbgmDOz25
eL6zXs7wVQOn3z863IGB+cHVwFnDgA93lv7A+caZuoGzjj3HjSL3ztnzLx13
PnfuYKL0Pje+hpdGHoxqFU4H+AOONYxWkXcZq+93C/0r3DnzlqvrgdPeufGC
NU3qKgrXS4nyN5M/e9OVM/avAhiR48JkgQrR3XIF499FEDSH3R/D6B3e8D0+
jNcXrj+H64ju3yHiG2F0hdfdaAqv271erZbx4OlTvA0v+TdeQ972FC88nUTh
bew9RQBP8cErwO96IkDWb6+e4viIeJJOuzs77np1HUY4C/yrO0z+fw6vA+cX
5yzy1v/5H84rd7WK4zAQNzmAPkD1SeRP8aozfKZ+8HgSf4bHGwvx1O88cWNj
Gi5S7/n+P/9PBFQae3PAkxdVfsFVCI81YvFY0RvG1+61P3PO3b+6JvS3AWAw
iv3VnRNeOt/P3fgqvE2/J6anGxE8/bsrvqXhThvrdxl8eXPnxX/+n6s5MLf5
nvPT8YkVRd68cR3SA7+LfJhLCuQrF+gUOM/X0fraS8E8fc1s46WhLuihxiU/
9DvgL7qN8LKzE4QREAWmjeQ+fz5qHx32ko998bGTfOy2mofiY6992JQfj3ry
Kq49+fGo3xYfD5odee9Bq60+tnvy42GrLV9x2D6SYzjst9QNB10J7PCoeyQ+
HjV7bfXxSN571D44kB87fXW1pyAc9fswSPg8Phl9z5wuhOTJfO7Dupw6o3V0
4zkjXKXhVeQur+9qzngFzOVGs9i5BHFxcglrxveClXEXk6HmACc1QCIQaDe6
8kBwyfUae9MrWqPwoVW/aTeWs0u6EcUXiJFm8wjH9odGn2ekBjccv260HJK5
KCei9dyLG86Y5SMsXxAnyLnP3BgmcCJvO8fbnL1nJ+f7NWfkBmEA984zv4/g
d5JNx34MHHO19mNgmMxtx3CbdVa3t7cNf7Vu+MHqaeRNn17Uz09GdZrEzo4f
XKY4rd89PFB80uspjmhL7jno9tXHo7a64aij2KDbVSzTb3bkx8ODhDmaivat
7kHy8VB9TFimddRSfAJjcLzZdTiFC6f1YxKq9fXKra/mcatT98NVfRmFl7CH
DfQ74Nf6FP4xLs7dxTKuw7aHS6A+jSOQgRHcghQeDZ/VL16OB1Z8Tt0J4Gy9
IE6ZuCDZ/MCrR95f1n7kLYDt4jrszWv69FTnktHw6TOS+xHsrACg5uw+E487
59rjxMSra885jeO1C7sxUf+VG7hXdAOy0tl6Mven87v6RbSOV8AOhsLwe5SW
wHPtRqvR3aUxpDYPJY38IM6OTGP6V7hfAeu3exIxI1As7o0Z1ErqMW+4nxE5
8Fa1zVsx1WkcNpqfhqnh+grehqjqIqpOT05O6odNIMHw3I6uWEotYEjPY8Ej
Lj2FB/8ED9bbzdZh43q1mOu4QtBK5hFCXoYoORATC28Vhctw7sPPoI94rhN4
q1tQYOL/+rd/H3vTdeQ5x96ND4g7nQG+YFMl0DAj34tRHMiZm28RM6EBlaPp
NABRtVqvPCTHyRy0rMiXI+SvKOxiEGJXQGCggQ2P8CK4/P341bDuvT0djexY
RPF2FS9c3DifxuF8jdI2rsOb6v5i6U5XT1fe9DoI5+EVTPApzHHx9HYJjBis
YPpP18t56M7ip8jhT5utp+PvzxqtLgr/RPwLtONIHBqJc/bDqc5HzhkgfHqn
rbt2OY4QnDbtf3aDtRvdqaVGdkD9NLywT3sW+sQxrWaj1WwePD06OKx36p3W
Uf2oc3B0UD/4U6urD/4lquy3rLiziXHsg9YJNDHWg1pdgJ0IOAfpd3ENyyZu
5LDJ7ngZwe9eBHvYtbto7IIW+xIojIz2OkSYAIJBSp7Al4zCxRI+R84Yt+qp
F8MuHk59GM+p3JKAP5BfLjxgmHCxWAdiK03YBt4LG3o4d9rddqPC6n3ewFUb
T+7sP79qpHS41O9nDefMXbozf+GvYLsIY/tt40aiwwrarud3iqFHYJ+9ypOg
8Ftj4ZmSEU2Vs7l7hwqiUFmLZVTDeYYYDAJDjicjGJ+BYGrWe/1hKW/1m+3D
p69PxxeN8VlDPBR19OGdE3E8kBKk5iBtz1w/qv/ogz33g3dXPwGhBvI4vibx
PJ5eg5yOnbcxymJQaaaRByzxMrxyIzCCFobOlsdyOCDkM9KwgGVY4PMAxCBh
XDc+i/YKjHECKHOjd8qsSf38sgG87QX2H4dAbpAtQfwuh63ght+7MVrWN/Yb
zhvOsQuj1YUgLKq5IFi9XnfcSQwsN13t7MBqjB2pYCgbHJYKM4pSQmHV8TrX
rcgGLGbPibx4PUdV0vgNdwswxOdz3DDtD5pviNfLJZjg+Oo5chBcmMQsMkBb
c9AMqTnIHEAEDZYjVDRe3TAZ7z1I4tifzL0GTO82JLObxEZmGDTGmXcJq3/W
cN6AboD3IhDY7fzgBm8FODzQyKvr2AAF2fEMJ4sBmVwcKKdQO3FJfAFe5zOY
wdKHRy6jcEG/KzgAl9ESwuVIjcSnbRV3O+/91Fuu4CF3lYIMt4U3HotaE6nA
ECvPnUmhqb+s5rg3oU934U/oL4G7yPbAFY/Dl4gzZnbtgsFE7wdrFZYTSAYW
rrHAA9JB/R55s/UU5hv7f/WQektAOfwc8r1IIbhT8Z87j0ONCZO5wDPAya4D
bLumzYD3Fp0P9oQeuO+giujFK+YI/Rbxg7PyFss5TqYG6sytM3oDhvo1oAn2
2xrO49abz/F/XQfUdgMCUQXBug4yncN7C29BOB/HXE/CVUUMjBbzbwkxAHQI
iEPFBbYPGNUVmGKwV0vmnTGG/GA6X4OmmV09vIgX/mw293Z2vsHtNQoBzySx
Pnzj49ePOzvI0ILw02tcibCvCs6ceaCo3JGbSog7FK64WUauwrGzB4rJfsEm
7uyBQrGP42Z+/CvjBmgcGzJjyW94B28wWOnDB+Ff+PixBo+j+g1SlRx3nhOE
8Caw0RcAltVSULJQbOFqBa648UHrYyWe4KBN+fFjw3lJwkMnGkwe1gEBJQYD
iQGrmnQCQDK8KKjroOHnVTgN5zFIIDBWgA9OhmdowPF70Jr8+FF9bsHnW/Qm
0pbAa5XICqyCyxa26hmo0ChRAAyQndyZjnuJ2koYwM/dJujSvaZD+3EdVNsl
cOG/gGIo3gHmrXoH4hk5NwD1EPAFCjkAJElAkw1WAG8dgDQUJPEilAsx8FTs
iKswkNV15AEsH3dOmB6s4Dtncrfib2DUe2C/Ix58pHzo3LhzH/djISmmc/KG
uLMZLENcMEDyc1Rhabho8CcoQapezVPkgBFMPPSc3LGkbzivwkhIh+kqtWKX
8BJ4nVDVXMZB5F2GJLpjP3JRQgMZaRYoxaaIE9gD1x4Onka8jiIcMg5yHYNp
Vy7Aa8Ct3pI2NRwW7AP+HD2GtHqyj8ISCABvcYw6NwiEORCGxYLrAF/BfkRr
cwnKRwhbzYvw1rtBHVeTvK6z0LGgRLjaSUZhMEUt6Jkf4FuEu/ncwJCzhzJz
n0mBDjQgBYtgZggdt7ReDdapAdl8YPlrYIN3QXhLAyYRh0tz4gWwVcJyA2QD
8y5oa5h5zIQzx1CqaT9CkVpzljBXXrvrBbnCa5KDYc3DSgFy1BxvNeXNTyCD
JD8tVjl6xDYhZ+69B0LU+ALOoQZWKqDujknL/Dg6e8tfQVYSLNzTeQsRIht5
5yoQkgUMPpD4CiKB4GsLpOkVX27wsCZrfw7LKQwIo/88fvOaAS/g8Tn8uhJS
HBC1gmUFk2tcNWoJQSdMP3pm5sNyw0WLVA7hUfRz9LuIrhu2/hogd3GtMQMJ
hhYgjL2+piHtmjavme9eBWGMYg6EKdOFtAcfV7k7o5WDU/UAOn2Z3DnXa6C2
VNAExx3jUI9RT+JRvHSDqzViZW90fPxSclu/hXIKpOcN6Cz4/lswEmDA3nvk
0Di9d0sxK1HM2/Xw7DTmQSIn4IwatHsidJ6bRC7iwTJDSXBCrw87PQsNuVxh
PPBu4Fr6RloYSj4cHO1o65g3Rdzo67hjrq7rIP/Wnqaoks1R0yQyy9NrsIZR
uwgjUCSARCtlqxLeQIOjN6GrADYaR/lKcTeYIO3x1oX755CVP8FtSi2OUWIA
kJl/eemROFP6WTLXGi5OnVtAF/DAmoatGj7VnDX8u497La4jhyYGPyGDOsF6
PocbAqEPw10GYvZog9jn5bUCIiS/4Ld9nf0SVR4DcLHzx5/++HN6nAt3CT98
+ONH/GEJJl5mJrQIUWNDe978kQxvoBLLAxyl4Rwnnn7v4m8AJwbaaPKwprMr
v4UvHHTbqD/8iLuOMEIdwhMqGbSjhw4YtsiYxEcsDO4Eyyjde6lsa4DL1jmA
Ba4cPnPsPki4jT3EOB5kdnSEC6UGPuFV8p4Jpxn8onsD5SRGr0GrbDWacnrN
DqxGxsud3WBiYS+2Y3e5nPs8Mf3mCcl2TbVB/KKwkmJN6UXop8expDWXmnOs
6U7dA7xCGre4p9fGKyfHL97gY3VyyOMV4dXBvRCfbzU6OPG0Ex4pZkeZ+Djx
Y/05q3tforAQywmPoU7HTg6bTsyqNVG28Yn2tcA+KvUflAMPZ/x5zW42eHCD
1F8k9SKQI0pFkZRIMezesXdzeowiQl8DBtuLb+haJ+Kl9Mma8JR++JA4cHmz
QfrZFTjhD1Ab/QqVCYwaC8FhaFlpK5cWOcjSPJujwdj1Jb3pbrkm/KB+48Hi
Etur+FxfhfXpPFynVKWa8zZA7xpAGPrRFNMvnPFdTDvX3tvhWIjc7+fhBKT/
a/fGv+JVOIaBzkEp9cTtzt73r8fjfZBgsFaVlJJuC69U4c16D6bkBmHNmrRq
oY0l5p7gElp9ihgmC9+xb6LX/L9Q4MyFDWaaLAQW3yg0OTLclTamuw2Ef0Ii
H41EF6RyQFsjj14MHnWMofBzAYZg032PHmTGHZrGewRrP+1YQFGtSJuwDojI
xLOEF+QuC++99FzWa+QqrtHbxRYklxhdQ3+DO78KyTtJ2zUa+The/GUJukz9
L2tAynph3GaIanYYeBFzKJnmw9fDxI/gknIEJh1uY16SWCO3QpgUwKZNyRRP
s9BjlMptw7VtHCBFbtEojHw3WBk+NG0rJOePyU1IVFZeaMGh6QvDvxUK6cQj
aUT4HuzsAI2Hn+qDM9wLKQyidi3UwQmpYzhoQPeVjwQtBAxoazdgIWKUG+Yg
WCQjbHUF0XDVgXSertEEmlXw2qk7dNcdUlgM+RIUp5UkhnA/gV4Bj7GGHHjC
xOGkAgr8AyTpopG+OjeOMVyyYjtO2FhkyxAnSX/MxJ2+u6XMiLT0V4qSMNQ5
TEtO+TQuAX+lyEtrJTDbGYUZhXGAAyIOEuFgoqSmpdAKDUreok+CPSVqpSnR
wvo4rG0MOaqQBElE2Iv1zV4j9xKTcWCofhyvJZYBOqyozHYt56legfvMNIxJ
omcWaNo/mkq/I7USPZ9ypY/GoLj81nBw0viFlU2cZ3dd4yMSCmaRIZgcd2g1
gPgo4oHUwz26BM9Js1cTpul3IJEi9prtyxGR4vdb4YilF2reWNZyPtXJivvh
GrnN5s9lzaR/dEhC9Bu1r+AehJZ7wIvgwzfSKv3Ijm70gN6GuH52X70dX+zW
+H+d12/o8/kJYOf85Bg/j18MX75UH3bEHeMXb96+PE4+JU+O3rx6dfL6mB+G
q45xaWf31fBfd1mT2H1zdnH65vXw5S4LEYPBIk9sdmg4RkuMpgGO4x3YCqeR
P+Gl+Gx09v/9r1YX0PA/MIOs1Toih+j/oASvgy67/wJ+G61S/oqiZAdWtOdG
ZKaiRukuMWrMbvf4Gl1OuIoAqb/5CTHz88D5h8l02er+o7iAEzYuSpwZFwln
2SuZhxmJlkuW1yhsGtdTmDbHO/xX47vEu3bxH/6JVOF66/Cf/nFHrHbTll24
71gdlesLXW8+JSDQ/kmsiEl8yrKVO57mFc+1eckiFhpj5MHWTCJbGLc1Zo6U
bT2/RZOebiaT+NjjEWE6GdtGMveYHQJxooDgeMfelBdHt9EWGxJ+auP09DHh
ssrItw/faEv0o8QXQ9TkInk6OSODfQGBphPaNmppv4TkYpmDToC+Vf+GFsOS
Yisoo8llLU0H0zUtlTx8C9tRuAnEalaSKDQchLO65p3eNFqzpn3WEtISR0xz
SPgBcmwsw8Iir2JG8UCHLEVFKFQpHGdzf4aqoyczJqeUMbkM/UBE2DCOIF1J
bpQIbHzqzekxXQNkzV2MAxKqYaGDOqxcUxTakfqDvIdTquFxRTzhLzhSeESr
IZiB3qNpTlL7mTXQezDxA6GQxp7mOMO3hQFt2ps7x4VqAKp6nKg/0gJZrqMl
BrC0TcvQ43n7uvSv6vgCJowIgma1E1YNPJ/iwa5VA3aLVdUaa9is+cYlumhg
6ploj5LOyG43/tXyBnLElalamwxE+cTDNIuKKDAx7wQj1GyUpmknlz76/GfX
nhRpK3aaSEUudq5gyAEaqNoKlb6Vus5SHAsBEJj5lg0BmfYuaDMLyotKbuaI
/lTl5ErYcfZtygSjp1FePct5E7CNWMPJw2qTnnjz8JZNem8u3Iy45bI/liOh
JMclZEFfMtvYgQ2CWz0qo8hhBAiEpUNvG8POe/J6dIIcMD65kCCMhAaQ4t84
r0QM5TlLlQ/fCI9/ncWM0I2YtaTkYbvEj0wBJa1NTRdZaVsAiwXpuqEAQRK0
sCWA6AsSX4R7DYY01KK8DOeASMrzrBgLYVM4TjiXi1Dw1fpOJg0v9vELL7fu
iHYuno21B5hTFt5iAqTBOoFYi4OSjkV5GVKRw+gQiWQwo9GEkqluyFmJaSZk
CrrUHVBWki0tT4nPjvhv6YntrYPbCJW8WXrO+w3nRDjliYy8/ASh8AlgK8rc
Yyfahw+YTQ37InlpiSJ/S/6c6Ww230m//DvnJ8x6MlFXw0toinnRWIqc31NI
ZwBkuKvt/Lyz81tCb5rfE+pTNQWNWnKXwN1YIGKwY74UhrKH752aI7ygEiAM
xdCPyQ9jEFPu/PUa6TvQdR79B9tMhnJ3GTjqI6fiwlLSnxg4r3FxP+VAD16n
uD7Y+WC9PCNGGjh/w808/eMQcxXEb/rz8ZrUJAasX+GMkh+8uwqDSz8y4MUF
ygP+KlxuIWXVqc+1nf2dnRwcAeL/NvGvMNCFfoYFMYXzG2e4AsE/wXzRn2EO
ItXvAuDv7CQ/AdH2HFd+TYiVXCPGGejPO/vO06cqA4/+MjD+FvqzLBBOudiH
uViQA2OBN8NQ8Vkn9QLx91OiW8h3gNYJcwZ6xRI+cHeCOYEMdYGQQahKLhES
FOJPjwUK1BUxekEm6/SNp3lg/+SAzCYLYeCsojXzi/aXBp8gR8f1dxx6fCp+
fuqs3KudHTmU73A9Ow3Qe1UYc2cH7oAfvunr0mPnw8CJw3U0pThwHeXpd7u4
VBsoVnY/4u/fpDcFTlH9bpc+S0tCF9Hw3E5hjqGROaFrEJoCYnNkuuiKXrnk
XJd+PyWaKF7DGg1tt984InMANlrxSeywT8TXJyIV0c9s/08s4uqJ2CQC4Vjh
Z+13kn/KRzlO4yZzFV1EOa4h9iRzGDuNJt0tMSjVL+OahhHG4E3H2bMMEnih
vc+uI0OhVuozPIekMVIL7XA6iT8KLkjdMWAxBFPWNa/U7gCTu/Tfo2sFneLC
gka97U4hDXbuxCnGOFq4d+QsnGkku1zjLiAoH2uCUNBcv/TEOX19cfI9zI5T
GjJswJEDR9vCEUXrQGAd5CrMztmTAnYf2MAuhZ+g+/4O06BIVWy+bzY5nWBv
lTBIksoqcCZMq8C7InLLzEKp5Sz8FdgHcqpyA5TzlN8Fd9dkooWKSChzQwlN
LfqSyM1aCiGu4n9nz4yfUDWxS8nCrOSRjoS1xyb+0IpFKaQZsJTZiJQFlmbG
TYifDMUyDC0nQyCCd3dM+6QPH5VZIG1SNJJqIh1QaG3AnE/UrvfEPmGeEsY/
uVCQsoPVTil5u+Gce3OillFPSBsvoYOS2ijrECzuBAAuoWEwYz1M0F24UNB2
P3HBUkze5qdygV3MOgEINWbkfWUk4+g500XbNfYpv0RYqnu8HXE2i7NaLylP
/FRK1WhBlprEmDuhGiDh30jyeYTLQcg4tbGztNtLjAr8hYXDfpIXDYyIM0oi
tFLrFpm6GLHErM0VW66UCJ5jfv8W/RA+earIDb+6PByvuJBFriKRbAVjxhQv
/rWh4VZ4btg41yxDnCu++nTY44dY/YW9Eld/uI4p+iKGrmJ/LqXTqnfTrqG0
fulsp5rlIeePsgQM4Uowkm4ZiUG1Ke6Tyc8+SfTPGflHOKy3F8/rhwl7BCQe
SzcNgiVXd+ywj3jiGVMAoa6/jO8BTscM8RlHfEJSO5g2uoMBJEnDa9QMqSwA
kMUmM8GQsgfdukZ5lYIxHI9OT3GYUkCkCCki5etgFd3RmmPwZAty9prTbqSj
i7ECiKyR0BcbJdC+KxK6aZDyVl5uIpVRox/sgbYx6ZxIgTGxtWhMDRc8TN56
L+9bc2G+O5cXENBksdTYzxQTOyz7M9xwuY5IHCTp424sxGxM9eC/cU6lM109
ykmTAXpnA4m7Dx8+/Nf//N8fQV63BaaJYjGjhuZzt5hgqviT5pP/+rd/f3L0
BKXME5e+XD6pYQqoVboacjxnQOptmDv+9rTe7yaGabRwdl+8qNv+2xWRSA9l
6JMXJN7DpBRAG3FdjncIH58XjBZ2ryu48Go4kmnf6aw33N+6h1IfEk5+4L2u
SBHBqnxyO1/mzOH58/rzk2QO1rF0D+sTuKwNo8a+tVv0zNAt/W76lgbY6J7K
xSCHe9qxgPh/o+DkIiEhjfQOUbKA7o8lh5uypHjTQK0t0WImTGOxA9GmBLiT
okLbtQhXtKYTPpDp9E9EHRQaLk+07YcVEH2PBTX125ZE5qXwtIOUCZCG2hz/
jEWyOHrd2spoUPRy19w6ePesoKCLCgPcBYlZQOrTek68ilKUwqYiTQF9PRiZ
JIhVMjcmwieDk2NHq7kdk6OUKfOEVSTN/kmqq4SD+InwRygtUmZ0sd8aSBx7
88u6mGUmgSqwvYfilhMvrWWzI03LxCXPirPXfH/Z35emnPDCCCU3kJ6aJ4QD
/E7OmSdGxCZ5TUoR9Zbh9LrOSYUYyH5KHp09cuzs6/nM7pXhRA8SE0AEbWg/
PnszPv0DhX9qqOkv0Q0bBmIUcDuMcyaCa65+A25PRp5QAkjiRtw44TXjryia
oyIq9mRJ5aEkQO3OoHc06DdBNRiZdkRK1cSqYrZEVL7jAqvUEaS+tGfCpI3C
9RW/5w4D2e1m9whHDa+5IEwgYTCQEYkn4LfvWRPHnQjvYTuRSb57BH+tdgf+
6x31jv6fXWcvoJR5P+K4IgLZt9hodu6RxhEzsTSNDJbWYYFUpEjL3H/nCUOi
lqkzzL5JZccQeyoxoL1ZufOw/FoMw+LkUkOy2GF5c0bl+0muo/GJ1B2X7x6J
jQYLRVhiNUPCqLE/cZ6dXjjji/PT198XGOZZ4DUONrFTwGKxolsfY4QgUUmT
F4RVvjGJqtH5BanYluwDF3hCxBr0UaKq9FcvCgEWyV4sdqgpA0e7yMNFBUQY
75S4Dzpe0hmLtfVZ3ZsqjNTMsBYK3RTOaDezaXlGbOjDB+ABFVvjpAJlMb8N
fLCGT493dl6nlEqNj4tvSrzTYH7DFw5oSW9b8qtt5WkGq2Zuh5HpcqAsSIG7
EohCe10sV3caRBgp2dJPNJfsE2lOai8uGprm+gAowppVy6p8IWE2DyozqTHk
eFkSZSVZcvfj6JppcmvGu2Z9i+RoP627YUxaOaxH4pNOcX2rFXucMnvpffhy
qi2t9rAy5PHhhrQHTFcMq4FSaq9uQyfJwsj1VnCKqJh229kzo7iAgnfe3Vsu
nVNE1hbNfs3CK5Il5Zu1qaXpKrRGxUlqm7aPVuz8vkjdSVNPTUYylcZT2dVg
502hqVnYLFAy37LrYdSCtLMe+j0FUZ8kTHZ8cq5cycaUYIgc1eCNn10m08Qr
TsYFAhe7q4iIMq41Z7rYj608+lsHpS2glCAvPDfIe8Jgyb28+Pc+j1UN3Xkz
ujipsEupCWn7lLbwCdYTYT6B+YUls7L8Qo6paN34qWyyxNTscgpZksjB7xCl
v1iFLUREyjxjq4i9X6QjKmdj4uWbpUQXrt7UMMw1o5Anxy00SllJoDYSlX3C
CWAiMy9VeJQEy2PRoWQVee4K/a8wy1dcCY3hoVgUEuoIswwu5UBXulPak64p
VYrUwjmoVHdB8oz7Xa4K03eftL0wXFLpERGX2DQn44aKepOVI23pACUKkFhL
29OCKpjMRtxC+cpzCwiUfz+dO4KvOxkdj4dZzcqaGHEv7WqHkn1OirQ2Lsmy
vPDDNwYs5odCUB++gUvL9QQ2r3rqWZzt+XiotZ2InT1D5xR7mspgouI/ERpT
LT6ED1CzrAX5EhrjDmwJqcHrFuFsPV9jMst79mnvp21zZZHgNnAbVg+6SV/R
H39yxFucgcp5SF6oXXT++LNSKNTPQON+r9c5qGm7TbKdi5u0WXM9bpoMIj5E
4QLlFJXDKtyM8yfYYBKmM041agL3/eiB/YjVXf/5H+xK3DNtiP0a3yrMI8pX
1VJTmZtVuDlxWHYaHU7axZ6hKMm5ViUvIyozDHrpWqQ4htOVB7hpvm+2a/hv
h1kHPnVTA0jed5rO6tQj0Yn1qk1Fa68igzYmLjLxMwJjooTS55QHiwYO47z0
lK6sFSXhfMzIlfSb39WnYRjBOqScT8lOCtosB1onAy2czQxgjaxIsAkS5hwS
dYngjO+x2rUmQFuIY2vLSMQ2ZTJ/ngARjU4CZ8nRfqKYHAZuOl4sXZa0D3M2
AU+ilmS2aoOCN7IHFkvCbJFHTvtUmvb0bopcBSuek9+IbInyLnUD3lyEe53r
Hs/q7V6/Zn03lUXi/IUfEVHVaacLms2dukIU3OCLk7RVrm0N5YZ5ul6BtSc2
7D/y/OXWKJUu0fIik44q5FiMRZjJOzVzStcwU3YMydJETRSe+wVdJkoI5TUd
cyDHrHRVF6u6pWMwHKW1lCWRdmon8aAch4DlJYCgIb4FQ43GywN34WNTdx8v
i/QDhIPZ3+i+xv4RIdiBp8eqgu6SOi7AAyLJKZaycpYUmQXOExCMmKiEQS8f
+9k/QXMMFg/1faCwqfeegtQsufhH1QLLJIGmZhuSPMnl4kB0Am8h6oIzz3nz
2LsVlU+ZxgArI98rQ1RS1uY6uwzQNnbGvFdzY68kr3BP7OHonFVXOcCe1khN
ZdR4wBF1UhOudQipTwEPde5drog6rX6zrrdBGb8YomTgBvy68StZI61dNDgq
h11or8MZwWGDgBhiTb45IWIUHyBlUuaX0mm1NZ5EgzNJxY6Tmup3LLzwh7EF
d/C78X2jREMgFNKH/C/OnvTECOv7yQ/iu2HqYNjKKM6zBWgo/4Fb9bK0FEn9
shoq7XXjKKkp7KgzkrA4tdpkFi9yqEayQMKbYmOxJW0zfvnh76gjzaYYE/1x
X4GU4Q40S7ogvwP2PoH2ZwYsmVLuON+ChkkaxzElq/BtMrtVcG72J2qi/vOm
E+TW7iPZe2KF7XfwknZlnzTFJ9PhExjipTuPhb6Qmvl3Th1UT1/dSX4mih0u
3dX1Sy9IQD5RpU2JUmCD1xKtNSrDLIaXeSaHZ56lEMAJ0vdkHQO1zD0mbj+Z
gcyRCh4S1eon77Ekw19JRllzprdKrMdGrtf+RN4geDF738Z8dSIrnzWZAzP9
IRE7hfPWTdYkbUr4EE9+eEvOYkxDs2oAsVnBpyWp4LTgMVXtR/1x0JzhZn2i
qE6ZsCl3uHIxwzTO+NbTmW7Vao6XXHGkHjTy7vHHkwQ/oosI5tC3f2M+hXn0
+oVNKXPKBEdrQ7DonuCBobzyaVx5moJ2L9G7qWqCVgzWwWaUE6mbDOfYP4kt
bMp1kdoJ/IDf9xXRxXUwPJInAqpW01LpYpX0yiVSZqeUDx++fw3bmi1HRygP
ujaywVrgjFMg3b7oZKbxNl7QuFofn1w5OCqeqDn5bMQH07hmr8dUb2Nx2/gW
j012EninAFKS5WRrPWgi2K738tiu3Wh2C8N5hd4gj14niwEoT4euoA914sG+
IKrBUFu8DWgmM27giZfYfc49HilAoreXEuXrTxKg31re/US6HoSX448/OVom
sPPHn/WgoJ6ZSQTcc65vLygD8vpW5bk7+0mtatZsFKfooEvnjXSMmchLWJIC
Clpw2baARRKJKGna079Topco09Eua0Vuzn4KBFcCfWtA/VnTcCULfmc+9JT4
Y2Phxinq2cXOClWy1vNXnJGpYi6THHyd6rCd7UxkdP6Szs2h9DJcFGdcBr83
PX+pX+fLifDKe466kupZ+RkgvNQ1eWK9IyUEwTJCX+S5x/NJTJM4bcXfV/oV
7zX2MYptkwTMz5IAcPfIhjvBnnZIG+s9z0EDpd6cSIi9S/ENvlTnOSuFc1jv
efICmId1fpvOYEjnDWBTplOtb+hwigFUZ8+Vv+KPfJGZj5LlgeIG72P1avYB
3jmE/ziXgzZgIPJzugT7FRnwpYU1p0OZWVIprYQbBufyejrgkt7e8qjH6Dim
UBdnKKG41Scy0Esza8468gcMmKTsMItbTXH81gJ/Y36W6pONF4RwNDjhxMbR
Fh7Iwcg4DVLNJ3eu9+fvtLtKDTPjsBLWgHoSLQY/eTIxELCjyyX+rPMxOrdO
RcqjPCjAKCQGPvRFUMt4NGXSVlsMai1ip2BSi2WsI5VZwypK2Yvt5k0Vb9aQ
nlEWqfGCgXmrsEUVgkcKYwNDoNjuq1TPzjasvmQKHWs89Kef5m3LnLOEDYP2
NE+nvMgcFoQrf+qde5fSOUIqIjUeC9DfxYY8ZcunxM3bi+eqAqYym7xBj3ba
ahmdCRXRND9URS77L/5l7c4JI6eWtMC0pD37l40kbZGjI6dkPbkhGRjICNkX
wcmOWpeqgqX+In9l+UpXScaOsvQyPHWZsWEBOgpf25B+du7npSNdxPAk4W0Z
Hx3FwYQ5p241CsC2abRSnHot2+Jwjo4w4WLRNUlrgZMJQifZVI1Wo9U0U6q0
XHkK8/uBv8BGpVSO8Z4+a+FLY7VkUoE4bnh6dtOVhToyTuufydJArXxCouoS
jQcRVke4lwyknwZiebR1IB6sGYdpYMd2ik+bdeta5FKeeYBXvdXCjd81nCFn
28qwJ0ljMerJPJy+c1pH7UYTsNh82u6m1uOo6TThvzb+2zrUQ+H6L8+fi//g
c9LvM9Vdx7YshWiGTXsFm02uoffa5NVk+SyxGB1JJCEMMiANX6UMmFW6/d6q
zjFZ2ugCUKWribKjfkx+07QeFIHJM9h6n+1RLaElCWzLLmHThNEjtdTMYmaz
n0cONXB3S16e12DE2t7DyXQM+elbvT7rZ0vvDdWCo1IHEoBH7o+fsdEGPznO
xShyyLfJ140pORw7UkuPKVtn6dVBZwiDcBGuQW2MT2dINRSZ0cxPBSM2tTuG
Y9s2uKY980dJa04fFxVFSXYxPsvvG459WzqhziOhjBPf+DALeiLPrgCwb6Jz
N1BxL1gYP4EQHXDiFohQ+vSzvDmxZIThoAH4WSyqTyLCTTuPDvWbdoHZYNzK
idhnWdr6S5Tjz1Aa6nTFVTcePj9Ve8R9Kczi9owj9LlpIrFMJNmTaQDp5EyS
/vuZEp9kA9Bvzr6EeUofElMo312MST/pNJZYWrPJq6jRsB/I7dXMQJxYJkKt
2t8DLVRpPboVYWfDLteBV4HxZVGtqIbQ83CuXU2jEMlS4lLC/PJ5WjtiEGnK
rI0igKKlJOt3T1fYMXI9n3FtPqVR8wkxVAwq3pNAyha6IkzqxKKVkKoHIyIX
Ne2MWLi3/yFeL/+x3/2Hp/i/Tt1pOZmiCT2BhgLuiPqbvI2AlrR4n5ZOYPIw
bA4Kg0zXZ0BWDvvta7dLEUKyI0E6yg/5jWSIYoRE6pgvfGpANB4ZXYd4qC8L
ngwgJX30R567C39+R7N4fsqjrqUB7idPsGBIv0EA2XhzMQRQItd0GVQg07I3
k1Qbi8RszWTE+s14BVqfs2dcxjO+8JCCgOJ0mudtPLrghSi7Mt20RDvXo35b
djJlJYMFIj6RSRerZjxSsozKf4KljaBIbKypm0Q8DUW/bqO9UgPPS0XD0+Yw
02UUj2WlUGAVurS+94CKc1/WA/PRfpl2c6kCLdUL1CyMCoCfLL3jknCb0bsS
z5xy49wmebkZ6HmeL+IAvfWTmrwyZOeIPNGwTChyCkW6dgdzhHHkd8KjO4Ri
Rn0JpbGbPwi5fAqGufFKejMan4Ghh0fUghlD6+id/74eTuNlPQineHVfyyY3
+RKo9/rty5dUw2fl0Yt0zpc9PmlUNP/GOcNDCZPVZjl7/b6Qsdv8c3l8hxAa
q3ksTvTYr5BJpu/ssqVxOruBNgiVbSsPFk2SNu3MB/eooQGdfyPPGWHZuiFh
KXtaNMGwZ8tydqw8N4tbyFK8VSaPYu1OUgJakzkfsp84+ikouD9MarnSWUvO
npYztK8yMzM5QBalW2lNBKferTn1VoNfZ1SLqcQ0PuiUjyVXi93Za4LYgQfO
veV65otDE1tcLQB48ZdAOGqFv9fmlk1wfXgFZixf7O5jSZBHSbllY2zXnHYH
4JA20RTKxLdCu2ilvrdT36Xy8R3A2LfNU8vb0Rt1AAu/w/PoZ55cJaK+Gq7i
0pZXC6rrDzO6sOai/uNPTqfmHGFJiWVQ9gQGdd6LkXrAjNYAPa1oMB37YPS+
ILsaqF2q+1tntk32B1HH7HSraDFAESUgT84kvDFrWkVHNcpR4EzKW6mQ2gau
UMVsWmNWqDmHNQ1/NfxgjJ2RCguVDux4QQd2OGdJq4EP3+BRHHU+yaNOPQhk
92SOA60kvbXSStKFe5Ma/DPFf1Yi3NFb10zfn+8GroD98aPsIE0mhA+7uUtH
wb7vTbB+9n2PztTFDyv8Z51JBDnq9DEBOt1LItMZk49aSjxg2XbmoqUzqheA
lT/RA8kRxbrzDH/+Q3KqtO12dayXQojABR/3xHNwrXHtBNx3qvMnNYN+ynFt
49rPO8ZXofI7jekkjGLvL+nWoRtmYemg6ZQSkWNu7d4o0wtqmV7NvLnpRp6W
5asBFNYeFhTgfmbUI1ExAZVJ89EL4mAhmU5MOTl1uaeInOLEcZqhFFX4o6m5
8EA4i+qcpIH1U+J/REYdR6EOqJEX0Ed9rNr8O6NweIYOemxkU39OK8RsNDrz
qOs0iSdnl7INd4FYu8TduxgfAXMzOQaHAfFSw1c54xX2uNEPnzHhq7oB6lOP
G9JTueXtZV7H26Gzu3Cv8DxTTmvfdS6eHR8+hX/6WokF6hHRjaQwRmt6vYOj
5Oh101pNYwCAtXoIsoOn0t7AQl9ayzuTojhZWn3UPjhQpdWiKl6kdIFgkSoW
kxPI8QIT/ZPFZ5cR6mguGa7l3DF40iiitxyPYFbB2rh7HZvL0ggJ07kGyanN
mPYlQfJmfg0koN52ODmYNIqJ5HjbwEhFFGfdivDzHcfVYObxKlXBR7TGrYxO
UCHHh2gA8fZcHPTREae5FCbngYmVs0QmIbu2Ldzv9Jv7sthKvJ0CQiRuOBsp
tRYFnyV1X7mLUV+yFuaumQxGWyzW/xintcTMSbbNSnSflCj1g+VauAx5y9Jb
8gjLA6uHuJcJ+5XClUfna1GGcvJVPD9ZT995IqJKb4EJwdgDP15wHEnsqRT4
NfYxoR1k9xRtSNSMyxh8thmEm9dbzFGpiAKeI49CgqnKWlM+myppo0EWP0/E
DabXeAiWKoRawlyAs+kgAg69/1UenvwLhzV/cV66oALA/7LNQymGvzh61sov
cC/MGa62u/BPwji/YNOadUB6Eqpt7pX18AUBYIoAelkA8nFeMAUAVgigrQBI
ufOL80LUGbnZUwr4yTU+2YF/1pEP/+ICpKJY4eLTF4OuKFrGlhoWtg/X1CnV
Odyq1u0C8Hn83W7kzPH/cIdP4qyZw+JkzzuV6KIayDx558+eZFYDiho8Zp36
cNAdljP/iESRmA4dbjDjCDEIRtZIzyL/BhGH2TljdVam0YUfs3Rh0ScH1RlH
V6VO2dRbfgnQWDlNe21yAgQ2xuj2DznXSzvqST9kQzuiw6glU6+yKnNAUzEl
nJGIfZpXzeicrE1TP29wtoF6Rh04sZG+d6Hi2U+yI3xS1m9dQ6+uHKnDw+km
O3mlIBUbt1SEECISC8kykv1VamT8Znq5i+Ts7LgB582antmvkcPP6dqRrjzQ
HsltT5PJUD/qHaojz6zDahUMS4iEH07+VdNrdNmgozuTXaHOu9YzKRRAPjWI
jtn0kuOlQA7hCuI1jhXp6jQpfpxqVsUhiLZjJCQdkkOm9BnhFk/rqsouL+iu
bfSGAi5+Jo0OAaWV0Kw2YiAnq14PSXCZ+rVup2XVZdKWW+0NNOXUiPDx5r21
YruYOXllly8kIpIdRiZJ3EM4yNdsSE64OY+U3uLLk7HzaWRs3ZuMsN0Zhxoq
fym1JKJyflySbNT5Yi6xH7liveIRDeJjcpCyqFYecZNw4+hAUlHYt2Q7bPhH
OjXbchSjqCYUVj9vsyWnMYr0P3UsKRbs8Qy4pbkudpLuEDge1Awyo5PpXng8
r9pZsEGU2K9JYmLam1bioPnlJv4c83b13UqwB7vP8UhsKfOzm5F+xDZGuEWj
It1vl/Q7CEJVymwWsZH8pAokGXhOeoUR8kWmGIem9KO8XUUOzgflND6s2zXP
VKTNRN5pvlw2UeCidaORxq1oxZJ9bw4s6ouYTL6W08ki6deULB5EvNY141yc
lUusYQ7xNODDjdFMjooGqSEnqctSY93TDwig4IhqfUeDEQlkDtcryPHsZ8Yj
T5K22AZ0n+zVYMMZCSTk3obzIrzFMznFfGbyBHlxlkHOG5iwdDNF/+/4rG1c
9IwHg0NrVGirDkXKORMpfQoSn1JRz6OxrXUdxkv1N9nObhLnJSWAsUQNhawb
c49Am78W1rWIq6q+zBbOVkPDu5NMVvtxrnsiGLEvD652PnyDR1anDnY1tX2S
DyQy846/rrH5wac2svMkfaeMgsj37sFrQRRya2zRkzZ9xDm2h8aDds0jdzml
NtmpNEe81WY1N0vtNFt1Dqg8XkotTcsUabldc6Wk7N+IJu74XBxfmBzVFLOI
UxHyJAVGul70/V08ootk/Sg9oSSkDnCscjafHLj1iD5JOM1oMsPzD3hSXzIw
24F94lerLbjJGXyf9aw8MejMkXmbKJbqBLSErcoOQBOvpXPQqC29dui9ZlGZ
lBXtkIZ0AOUK02iojZrkPguhgArom9FWocaiPkZ26T5K7VeJYCupbNBSVk2F
yKc3I1uXl/xMxiQ0b6ZYx7ahxHm69btpjIaErlPTpe2p1TjIrNZ8pGvWn6I/
d++tPlMA0yKycA3FOzt5LgjLI4YnQSEzjuoyAwEN4mSSJN5MpYgOF6IXqhg0
HUTMFsjEw6vC30qdomjf02huemHlExEPT/QyuCiS06i0Cic0mgUor2/wtols
iVx4oLPacqY6g8v3U6+NJNEm3b0pKXLIPfLZ6B6qBf9UTNVScvAbET8QKLCg
KSjeukyUyIrTNk5GfumkDtbb2Ukf5s19mjFtAE0tqRusIxq8S0mgFErIE+ap
1aV4irMl5vM1JqKs5O8oCOU9cTu93+l/juvGN1c739bz/vJ/Sd2384u9JgD+
zF9EliKfWW/e9+DjMNRp4bvXGZgukbe9cC46m+RdAxjniummxo8CumQwHUfm
tZ1vv8v7s/1ivUaRA+uxkhpdmlZate5JF+u13HF0tHe2rePobHUcOStBaRDJ
wlEKRJ5ooC0C/cKYMkNLsdPYhU2A+pjV3TlwOmgpeN5cREoGiFM0rhbKlYJK
hN46UbkuknaJ+TJBnLGNrevE+UpaGxvv/ZLDheTgIcFfIF2+c5rCBSKO78t0
cS/S7FOSXKbJiicj6yoQhhHmTuSwpxiQEvORt4ANQFS7eSJbYTh+3WjR+3AZ
i2wOYeTUtR1CH4k4t2V11yjFSucTsJI+rrV4c4y3g7VOGmuoBLjTd7duBGZS
2kSce1fu9K5sZDSw7AFGXNQhNzQXbp+tMT5PSjExM+7XGN9jH6WsjEtyG7VO
7rkmitQWXOuBqOS5Qa9H8iOoyOFlHf5D36A4gEk9IEN1lkhH/6jXo37GgUqB
4cbK6rdaVjmJvOXcnXri0A86xY1YTzg6XdnrGJVI36u/8ObzBcxHtj6+9tjk
oMCH7LmBe+N6hTOYALCG8yxcXdsmH6uTBypOngXD3Bcx/YSBLRTRvWrmKbLi
1GDjtcVvJVajZpo04heApjp8bbN3V8isVrfe6jMxkvNqNUQmL2PXGwGNua/D
8TXMYIwidaolxRU1fdGf+M55xe6BY/8Kl+5THR4uq50d8wZZELOTuk/4CvTj
69HQjSu2FsAcIuE8MN63aYQlCdVxUzpXZQPjN6pAEE3GkxbJ9tVFzghd/ChF
nlkCbMn68Yu6iK3mGlJJDebOTmKJ9dRZiyB68CwJ6fyNKTKbOhSPJyTGrVrU
ykyW7BAHmmtPXGKL+RpsMA9rgpZuHMM2Lc9GMvzJdL/MLxfX5WxUB2bVfMuN
IjTTktYmfKqFPirNx0/xhGCFtr22H5mS9xYPJY5FbKZgtkbO1YmR/2txemGW
Svq8JW1To3PcJAiBlZFC15lA184Ol+1YcK5XLdORenLgicmrjTGJR2cO5TFQ
zfKGlKSw/M1mCMEoGyJjUs5HTqdmk4fW2EJy8oysKPi0tr2ZoYD40IqlN1vz
lmbIavfe4wXUJDy3MbEtObsp1UFbBU3KTX2JeQGddbDOfrJHGg29ATyqspkp
m7kglhOkjYMFMo/vpUx/GZ6gIkpfizzE+4O8k6d5Fy08fPpCOmusp3uKQJ4r
OlSgf42PUeQsdT7lvEA8XsCapCTOD9/gOWA7OydBBGxDLEseD5CYuEwulF61
dzK+kOlGzQ6eNy1jDrK25bR+3PC91WV9jlVXdTxAFm5E0wZXCiY2T+cuKR7w
yHV4i54eAMqR+Ih0LhkKZufTShgUTCi8dQrTDKhWVx6TTdsFnQWNnutVeQCj
obfYm9/JMtV1oGTDTEtqzPYr5MkjJoZLSox+7zwTe8ph+wj3FOkF5PxXTCPE
jHB59HchNXzcONDhGfOR2c73JxfOU4lBxf+iyCPBCLOLhkzKeI88mA4fjWx5
a52qOkOttcMNUAeLikV849IHzie9kCnMklD8eOv6MgUQG8vzraIQW9/YRaif
zmfIDpub/5P8u5UBCpmNwWiT2jDjtqEciRbrSSExTmJU9jCGFrmxBFg0qWvE
i4Tt8V7L+rd668VurY5xWsmBcYknKRVoS9LuJ89JMLIWtESkEn7Ji3DJO0Sk
q3LoSUEWIagcQ1XcZUZ8iqJCP32Lt2FJtDqHsCxKBI9YYjy5IFj3lSMrix5t
CFyLJqnfS8NJyVh+xhh8MjgqSP1NoqKq6/h+fTveyd6yYXOUTDcT/ehqbbL5
XVJy2qRUfR/X9Bhv2ofdJoMkgRP1g4ET7MG8k/2JcKHH8R1bIJ9buxZMz4CQ
k3SQN930u6zT/YSQor6OK4YW5SMUYjzh2rJ0mot+AovWC+pTwuD2YHWeLBX6
jZGqJY/7keQ1UqNVBMY4blI71LT5/vJg39FPHBLjg0u4PcH1BjUiQ9U76a6B
/pQ1pp4ERtuuzBle4sA+PtlP9vlID0Loj3IGIHatycQFEj2dwSWT0RCkiL6A
ujvjyOwaLTa1rZaLaplIJDqxkMqL1i0RXXaVJu5SupA6hVKvwDiWY0OHjJr9
fpKf5JZu0Vmvpqa85Gt9XMcBTxingFqMMyq+X+BRScgstpxfqvjM9cLqvdn1
1juVRhl7c9SpsP0Vcy4faSPachMnZ1nAUuoSaKwlJ2zFm3g1moGaB16UYSkt
VBSziMRvSp5xlb1r5NWJ1jbaZFWto5suXxaunHSn7aRBHWuEmZbb7BQwTuqm
1Zg6llVMTZykIxYyJUzqoigNfYP8BF2XyinciuSCNmsp1eWHzlfA/nfbSVho
Hd0/4VcWQaiiaaqf0xgZ255iVHln51Rky0YupuvD9DASwLIZBBDGjDPJrJSw
IkID7PbXyrNn68j0V3nk8MSXNWQBh7pZCNClFyFo1X/Cj0MO6F+ug6m+34yG
NXWkeOxhTRDuHfImWY4m6+qHUje3CPFLC40xVe+jdMlwQcYPo/E3raa8m47X
plRoV3TKB5lMZ5lI09QaINF9f8yWSVvKlrKaOPVHWE1DQg3uqnJTLbFGzYng
ceGcrqlKmTEZKIC9fR1Js4UqRqz+W45cTD2wumc1HfH5qK4JMwllGVOTE8vn
/sJXWRVLkyE5m4orAS0RAmuLquRsyJrM2gwQt3NjHvJULYQCeFwhHikQ0yBX
GC9IbCzkCToSZeRRUHlhaE4BFWG3ms6C6dkpPOHbJT5YKwtk3ySyOeUBGivP
EkHDORNk4vfJGtQKP6gDmPotDDo5GS8vfJ8ar1rG2kAV0YxVKBAbC59MxqlM
KUdU4+xSI4MVig7aeVhksItaFGsALwu3PB/USPLpJUsP0vFmglTYD2LmLeux
txJNAbLVgqRtLefhnTczIpTZ6COLvCGuvchNdCTycctsObHMULb7wVrVJlFf
vIKMOj4UkkVDTcWWs10eOD1LBvQ1UsLmGehUmLt3qOXgmSRLUcnFy0+4oci3
MD5XqYUqrZDLNTh/0JpnlZtIKLpQiN3bkkSIyzCZMasoGL9F+YzgsYWuZd56
qQeJsuwtXA0XJLMgscX1qRkQwxUfWOoif1Exq8bIZvm8Oi6Piz2meKa4OLY2
8q/8AGQED8As3dTOD9UEkvKKCb8XlleHWNfKDdYuXo6fHmPPo1ajLZsjZXqB
UK3JOvD4mGa5BF14q34AnUzNjqTYE2zOHVm1OpR5OBXrxGjzwFn7uCaIy2D1
rMgpbWiJeJPcqibe6tYTxYIGCql/7AqPpols0siUpKza9V+GP54NXzsTbiJz
BfeB1SVbILjJTip0U1ztpHavQCSsgwWgAPcmkZRA4gQLh/gZd3bjBivsByRP
YgxvVc6AljKvD5Ic4qoxNUmJCFT8GOkWvBNdKTUpDGPhmeISENpq8vBpeAG4
vfGpqQGps9N1RPcslmtO0QFSqjSGpPACNON4LTpeo4C/uhMqs88MxM5skolX
c2BO1Cko+SJiTuQdivMlMHdnHSjLO8mZeC6S6gXJpV6bDF8gnehKH+skkrBE
Hm2rqZv4FMSt9LuxKaBhgpjS6++snDMLPdHh1r7fSUwLWnPCI+LjxieVimpV
hAlhjlCleMhGVRMZ6iMDxL5CT384uYGlqS1UcVj1yfGLN6PcNZtarGiK0Vmg
arnqyKE1ymeVwnqsr8I6/A8+GIXrq2vqUy62T/n4U1WMI1UEl7K45dHHRAXa
IU+kdWhGSf7qib5m1qPLYq4ey/TniOVxVAFH5Yeg5/LxxEkncHHsqPJRP0dd
0YuFRyiGN9exuPPjxw8DoQ9/tzsN15y7JsJK6k7AuP3GRtLWSDeUUm2WaO9O
Gnekq0yAIhSuppx83IwOjto9pBXYnGSdUs7bbM0WIj2WBN/VCV2cLzZLmjbC
BVH2rJ+qQmxBreFdsmdxfiRGuP+7cMnJ0AAW7NHCFQaAO72WK0d2xdeFvYpe
YbXZlDrQPgM+nvsigHXUadMpzSB7gN9iGMIcG6P63G0/pR+DuSD5jdPeFHtQ
n2/RQLaRYh1cXNcst1jjQ8bBCng10DSKzZyzWKVEqVZ7NN0XFxdnYxsr7t3e
3lLwsRFGvP2tQli26tI+7Cbw/EiqUQIhUqzQOeY4NFarKNRK0SckgH5eAGzq
FvLTaWhiXuiiufFna9N6oG6HWKIqXswqonhEMZUBVKwhHE4k5mmUxGeU0yRL
nMLiKV8usxgKNR4C89g5tj6Zkr0hRtZpdBpNUvOTTB2du+ZA1LnTaolTo4MZ
7J/Eoe22HmYqzfHOz5o1PhdkRZt/v2hCwOiTspUxZLkVt3GjTq+1r/KHO60D
9bnVbW9pDCej4/FQLAH9zSPqSIKtGBkP9NduHakc51bn6GBbeCgaQXdf0YL+
eq2DnvzcOepsZwy27Gm1kagQCak9uIxpd0t73UcsNLCSFh6CVZWcY0Hxm72k
m1tG1uw3OEqTm3BdrdDhW8vk9Avp6/aF8ItQNOX/fitX8S+y0GBkXt7aWNSC
QLwq5u+0D8zCiw61PXJavbaZ5H/Q3OZYzn44TcbBeGk3j45axjuPWh0cy2G/
ryf/O73+QWuLYxGLQ1uS8K52u9k159/t4cpodVsGvlrNfv+hxtIVY+m1jppm
oUO7i4PrHPUNfLUPu4dbH8sz98rZO5Q0arV6B4fmWI4OkGkPDw97+vVOr50n
RDcfS64AQY1+I/lBeyM8takA0dw5rJBEpj9ZJFHGjfSqVk8kV/BRsTsbza0T
ICXi6htO9UKDIeM5i71pHW2/jznmgcVDpiw21EGvhP4hXwDG1nohitKEh0R0
E0BXA9UZ5roKYsq+mZELRp7clBw/IWO96P6Rxz+wv4AtXr4/8uN35GhLVcR4
URRGwo5Xg52a2JAudT7miUJFdyIWILzp6WTIrIZWUE2StMLgYVNXkIgah3Lj
QWxNL4d2s56j2k/Vur4XU+mfsomlKyYdGZW9N+UxPS5nz5Ft72Lg0l+Ilibk
kiNcUbvuRCWde+47l4jKxih5XpDQgTfHUYigm0yeyyTDKuZARzkoyOiFkwdv
kSGUvEp3XAgT/5nHjfyEXaqdiiEsKOrFIe0avUvLzMM2hjKoSCcEkhaXpJ/i
wIWjCRA+X4ueCkZwTPqRPyYlApojLuso9uVc0dlCR8pjL8fgjpP1hfhQtnsY
JZVEWWdIcrYH4HaG+qc8mwEUdcylJEuP+ThpuyzvVS1WDevO4lw1/Htuppe2
yG3HAjLMEb8KqGWRfyna48jZgr3316QWWTsuzTwpjRpbAu+tdBs81bhZ1L/o
rS/JWWTv/ZzqiilaFqd6SjIbLEME6FP3HxFKEFUxMsKqXNdmf0iswCWznC/j
CQKTuR9fE4MnvG+cJkGjNg6TGIt20XnSBqhqaSNNbIWdpEXCr0SxcnI0EmGe
FV8KcUlbT/LYZ9p8kkdx5sfTdRzrfhRuy4bF687p8PUwu19gO0fZmEQtevaZ
Y7rRDR/g592KpieRT0toJgqs8QccALUrp73mxPDx7+Gq2NebQjLDYoE7dvUS
3WaenMu2rU9E1s6ST0smf5hOBVlssUTVERsbebc4eblatEEaCT765NJVj7BC
1pGWR0QtXlGi3FDuBB3voRpj8W1TWq2ipR3diWt3xbEvCgprTaNq/Eyy3q5C
4ahJnAhYOg4sfyduxUa+QILZndZqJlP3p05TJFxlPMqyTUgSE+Dd8o4QIBxV
5BDSkUHnYIgsDjcSXayW6wi9n6pluWBMrfQQY0NMsgZ5LKNVLOUfhQo4rjMl
95/wEYl3MraxBiBgupF2QckvFPbiyYEWAqJrQTk90k2X6GvKs6qSbhLZe+v5
V+h6c69Q/1uldBBt4ADvUggahsXMB1/JVYJvRaGt+9VJUbqLkY/1bWwtm+1g
nPH3nJUkPEMYGY1giM4ff6q3u9g8/48/y1aHrTpl1iRaBcusm3wAvT5A6PUS
EO00iKxLMx9cv9frAED8Hw1kxwSJOwB2a1T0iImskfQ97p6eXDx3zmlh8m7J
7CAu7bIXFfUYRJBx+y6dqhGjg09LjDhM0slb7T45QbGtXhqq0kjmd3Krn6Ug
9VKQZPaWiOtyVys3AgAkKTFolWQ57kotlxRWWCIa5+xm3NcHrTYpnNiuSch9
Ec9l7672VnU0Mr2UWMiN34loHkcfSXPA6e7FlC3Ji4P1dB6wNlYRsxeCkHM8
0DErMQTKKtgUSUch3Km0M8XXESxHlgTA6Ot5slr59fw+kdyzkviLY9w85xIH
EucdLa2FUSKqW9JJ8lwfL2uoYFeitMmdHcIJFTHThoRJadpWdMem38zJFt4T
wN1P3KgukhxbJfHEixFdos2P1jqa15vay2RwSRV88eHGmM6ZrExRqwb66yJg
MhhHuTucl7VA5qNTQrXmi0LDoi2HfOEEgzfYAqkhxE5NnxHzjsGVZSs52ch1
OVUKNQ2EsAyiCfW6jM5o4Fuk1Qqb6ePH/UGR466q11I6O5hIZifw4r+k60Z+
9w17nw38Q4fOuUwGLP375d7zIh/VZ3wXOg1fS6t6rFnVqb4n23hXR3ZqOU+6
J/Byvulk33ffd9mcT6LWOKftB0ufEh+ORQya7UI0caj6+HyCSDSA/12IxmEi
9IRaIYRkVRH4IBLwwQTg1sSdbTltLv4sYuMe4rBYPNpam/h89gmf3NBu5IxF
eqIrCCOVzL8dQWjDLv61tjYjW9F1cWuWxoPMqF1tRp2vh0adrc3oy9OosGVV
tY5VFbcw/ZCFzNalDlXYcOvKAP08W9aI/L6yy1LmrIRft7GvYxvLsmTVv+1v
Y5KlBslLhvEdXFthU3Uc4Zk7pRjNHiVUH/VEtNUQKJYzVzhuWWVGW8Iu/rXs
MyInNR1Yws0JaCrofd5PjaVwRnxmCED5PDOyiUghrgwBmZVFn6Dbq6rRrNND
FYxuQ80337MN6SmF1H8PjX+XRpWRc9uQlY9KVD4mjX/MheLlTTQ+q0hQ67KC
2pRaddXkRNL4TBcH7mp1H2GQAPs8GhO1r3OSKm1Qnd6cHtew4CetThUIAz6S
InV6RnXBQGXNeLM2DtFb7JLLAmcJm8fG1Hj8NGRZwrWJaGluSQcTcaIPHz78
1//83x8/fsS8vP4hDUXVDFO9mdiL3sbedoTRfVD3htuAqWKCWYjpO5gYQdnx
5jlASf0X0y91Iqr3XnbKSvpyK28evujDhz80+kdNdZDEo5GcaqVtKDcfQnIi
FQf6K04Wrj93ZEF/4VgSlUxjAQaGYcO5AFJzvLr2NR/KG2zKov+1Gu3GYbfZ
aLU6ve5Ro9WA/y8dC7CBCaXZd0BQtYcOWNDdQ/z3+YHTPHaaLbzebFmhWFTV
in/bV5szNBpxN2ZagSVjKaAR93RmMTYt2sMLadRu9BrdRif7VBEUK406Tq/n
NLv4oRqUx0Kjto1G43UUlNInPaMMjWKGUnPiEiWrAo26m42lmEZFwB4jjTpW
GlGDXJnRW3FGWRppbXZLZlRKo14VvFSlURGwx0ijrl3WrSnBqcJYCmUdQRHC
riKUHBr1NxtLMY2KgD1GGvVsNHoZTrkMtXwsBTSaCyhMJPkNPhVByaHRQRW8
VKVREbDHSKO+VdatqLwdDQFMkJvm7kzFsg6hvIkkDCZVvCqGkkOjwyp4qUqj
ImCPkUYHdhpFnreqoHyX0AihKOWbv5ZByaHRURW8VKVREbDHSKNDG43eRFdu
ILoxl4ylgEahBoUXUVgOJYdGrWb2sQIoxTQaVoTyWGh0VEYj0O/eguFfPqNC
GrlzBCIotS6Akkcju92aB6WYRs8qQnkkNGpZ/QwX6HusNpYCGq3uAyWPRu3s
YwVQimk0qgjlsdDI6md4htUxuBONYNe/CvO18EIaTQSUMiCVaFRuIFWn0fOK
UB4Ljax+hrMQdLI5jHH2Kb6gJUEpB1KJRuXKd2UaFcrNx0gjq5/he/J3l7vr
imlEXvMKQCr5grYo69pfmc7QsvoZTjk6UJ4XUUgj/z5Q8mhU7lStTqOvTWew
+hm+T9py/svanXNz57IZZdeRglIMpBKNyp2q1Wn0tekMVj/D8esS2thmlKHR
rIw2Nih5NCp32FWn0UlFKI+FRlY/w1nsrWdhcLcoH0uRznAfKHk+1S3qdd2v
TWco9zNovewLZ1RowxYBqeQL2qJe1//aaGT1M5wG00Yl53chjf68jvx45lPp
45tLgBlGy5A3qJeaS7yERq1Gp9FvtFD/bnRarUa/2WjDxyyeS2n0DLUF/NAi
K6nlHLadzoHTGTnNNl1sOY+SRm2rn4FoVMX5fV8a5UPJ/I2z3vM8vGxO6axG
/+mUbjuPk9JWbwVRukq48L6UHiVBROd+NMpq9J9Oo47zOGlk9VYch9hPgNpY
hQHWIOePpUg7JCgKSM2Z5YR0C2nUbBw12p0u0OWo3Wx2ms1GC/+/0U7rIqU0
GmJs46jttPvOIXzoOM/bqM33iV6toyyUx0Ijq5VVxcWQmVGGRtWSX5wSGgkN
fove8/ZXFoVqW62sC2/uLa+xfXRJ3kmx91xCKUteqUCj9hajUK2vLLuobbWy
julkEHR4v3ID94oPcRAC0FhjxbJuMau2IKtkF23RW9H5yjJX2lYra43JWxV6
GxTTaF0JhFNCo7z9KCP8Pm0/kgmvj5FGVivrrX5cb9FaKKaRBqVwQW2akWz3
pH9KRnLbCuWR0KhjtbIMGhXlr1SmUWESzKY0smcHVVhHuTQ6dJrNLJQvTyNb
HRKe00rd4vUqJK3cp1qxkeXQeufDN+Ks+g1rjSywHlXRkXnUa3kRkjr6feMC
JHtBEQ3HncxSA0kXGF0Ys8SmYapExnYqm5uUi2lnVFrK0VSzSTrRrqSQqfW1
FzI9qtogtTLuI0G2WBtk9bCMufKa6pkre5MtNQ0EBYAUwqig0bZBupeqtNU0
2hZI9s8R20mgpI+TltitgpcHr15BCr+lDpsbzChD6XfeXSUg1ShdGiKqTunP
kfmTQBmmzklH7FbFy8PXwIg1PZyDROe25nYlu8qalgcFV8NLLqVLA02VKf1Z
8ofK13QVvDx4Jc0zN/an1MiZ+tCucpNUirP5EEoFINUoXZpfXp3Sn6NqsIDS
z6rj5cHrcUbnL51j6mc94e72Z6F9SMU1U+cvdSB5MKpRulPqwq1O6c8rvTOU
HlXHy4NX9ejK+1k496d+TmefYkonUAqBVKN0aWphZUoX+pQ/B6Wr4+XBa4OG
69V1SI3VS7TvQkq7EkqZllmJ0tvTyNpfWHoPq+PlwSuMyAREZ0eZEl5IaZhi
NTWzEqW3p5Floqt5UB6I0icJXsZ3wcp9nw/lweuUkjV9qh2HM5xO047Pamsa
gVgetkLJzVjowf8dWBOHLFCslD7UMhZ69N+BHnfIQnnoNZ3gxU7xz1DtJPuT
6s2e/QUeKLNYOi/9pIK2kNL3wkthbkqr1YLl3cb4bTGUPP+4mZty3HcOKICB
X9tZKA9lZRF2NeQq3Ga6zWwzWmW1sqQ9nUR/tS5deTPKs6cVkBwY1aR3eRFv
dc/J58ieKLenq+DlwfNkTvFor6jccVJMaTogLCp3EFSzp0tr6qtbWUVq/Geg
9Gl1vDx4tg0NYVOfhzUjqgqQahpZabpNdUp/Yb/36+p4efCcHTLzMGFnuaSz
2yvNyFJNiVDKgVSjdGkZWHXd+wt7Q8+q4+XBM38EpcsZrwKlN/Sp5lK6tFCp
OqU/RwZdKaUr4eXB84eeR158jfFvdItWnVGG0pcCShmQSpQuL0mrTukvLL2f
V8fLg2chnQbX/sTHozPvxPKuMCNLDS9BGZYBqUTp8pTLypT+LBmXRRpZdbxs
k9KFmQglfpNqVlaZ32RTz0neLntvz8mzPCgPa2WV+U22TWlrJsLpGR5BRudi
F1fVF6/pWX3p1f0lZhU+m4fTd1V2+1JK53pF703pgzwoD7Wmz0oxIqFsk9LW
TITheHuUdterMAgX4RpYNz6d2eBtROlcu/relD7Mg/JQ3tCx3qe7EMo2KW3v
taGv6ZsCR8OGa7puh7URpdt5pL4vpVujPCh/X2va6iMz1vQnUjq9pi3U3ozS
eb7Me1P6OA/K39eatvrI3ozGZ87r0BnRQeAVZ2Sl9Dv/fT2cxst6EE5zgW1A
6e4hfiyFklelkaE02B781QblgSgdrOeZNrg5ULZJabuPLPL07HIMvmCifvac
1i8Wy7J4zD4xltXJQslQGk+u6h/1N+us9VgobfWRXbwcO889F+txPlkjW83j
SwZVCUq59M4zrO8tvatrZEjpg365Y7aY0oDdSsjdKqXbPXvG4LU7n3vBleec
uXF8G0Z5BY3FeWQSSgmQMkpn6rfshlYV6Z1Xv3VghZKhtO2sJmvMsTiPrDpe
Hq4KjCu1jBowrQwL65WKJ3uPs+tU0pxWMDY6+5RT6jIQH1XZ2PYPrtveeVPb
O/Xz10ItLNTKcGWFIyrUIn/oQ5yGwV21QRUnlpV6ei1Q8tOCGyUh61Jx3k3S
gpu5sLaljD/4IU6iEwTwkz9j7t87/v2+dSwFNOJWOPUbhuLl9yEooVG702h1
qftNfuafU4FGfad/4By2sAE2N5BqWsA9RhpZnc9GEz6dUm9+n38+bWETvkJK
VadR1eScijQqSf57LDSyuo1Pg5l/48/WsCnoFDrNrKWSoJ+EUrKWqtOoakp7
RRqVGLWPhUZWh69KadcpdGKRdsUp7Tf1q7U/8+bYTr54RtVoVFyTVEqjnkmj
8qMJHwuNrG4d6ad1zn44dfbO4V/bZuSUraNZfboUTvm6G+c3ltrE2LdmJ2eg
VDf2T1IS7zHSyOqQsdFoT0tA3U/GsimNbLGTzWiUJ+/uTaNOHpRHQiN7qv+5
twjRLXr6iruNon2NFul5mDqpRJ9R5k83L0Sicd6MiikdxUt8c33qF+OlXGL2
WTssUONLKX0gJGarnWiHGVX+MVLaqsFvh9Le29NRUed3K5QiSntrf5p/xOEm
lM7fH+9H6TS8x0hpqx2wTUq/coP1pUtNrj51TXvrot7rm1A63564H6XT8B4j
pa3WxHYoPX5VPz77luInZTOqRunZEgMoVaCUUTrfKrkfpdPwHiOlrTbJVimN
tYZIvWnuuYAbUBoLOnPxUp3S+Zmn96N0Gt5jpLQ1uLVVSgOESx+ee4YeAwBi
m1FlSi8nBXipTun8kur7UbqoAfZjobQ1CWV7lB5XEN7VKR1vS3rnp4Dfj9Jp
eI+R0jneiu1Rulx4b0LpLUnv/I4L96N0Gt7jorQtYD1dGsFqWxi4YkxaRY3V
oVJGSPrsXzYNSRcB/DUi/WtE+r91RNrqK0kGR/3IIjCA/anHJ+Is9INAyiTt
X1YgGICzp+neDqkZVfZcFgQ87+e5TMc8H5ekLYh2wrKInNchEaZkLKU0WgcE
p+aIDyVQSmmU66C4N40ecQTAthsu/2LshpYdqOJmaCmZ0/bC0+Gme2EBvF+3
ws++Ff7d7WqlFZ5Fq/GhdzUqeqg2lmKJ6c6o5KFmFEAUQqlQ9FBhLJUlJhc9
5ED58hKzYFcbDUUArYxxKtBo6gpQoH+4dqib0WircW2k0SPe1QpyeLBfF+qC
i6XdpWadUQ6NVgBLgqo5+jcrlHIabTWujTR67HHtnKbCQ9gh6KCLsPh8xUrr
qBTUZjTK84Dem0a9PCiPhEY5uQeYF/LKDfxLL84/W9GpRKMI9qESUBvuRzmJ
A/em0TAPir00q3tY5QDjB88aEK0g33ADi8KxlNIoJliFoDakUY7ScG8aVW9d
8YVoZI8C4zpCS/iyxIdScR2VgNqQRjkb0r1pVL1sGWl02DqsUuL4cJaw7xqW
cNZA2OxIK6PTsmELn/zw9l4HW+VA/NUa/tUx/JlM6MyJUlXaiWeX8Cebz6VF
ShUGV1aiJEEUdTuvVKB0UFygVL08qZdbnlQqXHvtw7LGntsQrYVODQx8j3Ft
RNRaPC8yWrb1vVvWaYVFw3sGRM2Nr5Pnz7ifA7hjuDMeG12sjgyky2juY7Ck
KGJdgS5TgrItuuRoA/emS9sO4zHQxaosjmDfVl0wisZRTheAVAhoI7psU01E
unTsMB4DXexFRwvXn+M+vQLriCqOxk9fnb462U+Po5QuHkI6SwAV4rSULjl5
efemS9cO4zHQxd5VpJqzrwJdsq6+2AS7EV1yGn/dmy6Hdhj3dSBtky7WPrkU
zNiKHENI25NjOW267k2XIzuMR7Be7E69H7xo4kVhjEVfr08vdB0gDx85fbXA
IKn/cDbK3/0r0qWdL8Uq0OXApEs7LcScCnTp9nplLZS3SRernpymyw/H1jKe
ynT5YZZbtbMBXXJzge9Hl14ujMdAF6uePB6/kGukeBwV7JcpGPjja28+twPc
TE8uLxDeRI7p5+GWO1ZbpY7VbdLFftIs0EXYlcXj2IQudoCb0cVuwNybLn07
jMdAF/u5sOtgNgeNDJGKZ5HljqOULhOCVABoM/vlnj0bc+jS3sR+OWodlDVu
3yZd7AHXV6NU2mRyXlwOPvLsysV0ZATLinBavl7u2Y0tb708s8PICRDZepWk
xrE9utjPXAW6nOuuYCtZKtLlfIt0sRsw96bLyA7jMdDFWhKCdBlG02s8iKtg
n6lGFwkoby6b0MVuwNybLsd2GI+BLlZ7H+mC7v3vvcArWDGV6PLD99tbLzkH
Fd97f2naYdj3l+5ntSut9r5xGGXkBvHSxWhget8upEvFv0p0MXv4ZrbfUroU
d/DtpmHct3/vduhi7dD5bp1tz2kGkysGtnmpzYnmRkj7+9cfNwto2yF9nlC2
/u7PELGm5xjgr7nbnyRyZOjZZJ5N/raau123ugkIy0R3IsZ4sVq+vXh++Mr1
55PwvTGWAqEBG1MY1PMftkLJ/O2Ze9Nh46hC763MX+7mdJg6t1WHInsUqz9a
I1X+tpqHVbe62FI0unaj2S0w76twtp57+sGgFWiU/3A17GZo1N02jbp5UDI0
+sn5W+jPas7kDrtQ/2wfB0PZZl6w1T2d0Kjkb1tZtI8PL1bejS6nh+12BcR8
Brx8mTVtT2OYvR5X4Za/Z7xY3XAzeab1JgdBPxBeqhHI2TZerO6WdeBjgqds
fZiYIF8AL1+IX6zuDp+OeapQD/cZ8MLythKUB++RyVouGAez02PrGGwzeiC8
4G5UEcrD5UtfBYZVaSjlFe1JDObz2S3D+RU6bq4XhlkZ+1fu/GrTZGkb1G1Y
luptfjCdr2fAmRNQUpxYvc5NJoE2XwDaYfIj2FfhZR3+W4aYSo6NZbQHPjUN
OxnsF0vJ1ofwa7HyVoSRNHiZL62rpVwAbMvgrbd7mY30fDwcj4f1sx9G41b9
pvWnnjB6Xwzr2ah0rscvvnZbdXywHsVusmRqpYLR+EMoPwIQGBOs5+huiVS2
wyiGUs+CqQDF8D9mzhqq2kwtWUQA7PXblyWHX+dAMfyYXIpTdG6Rsheb+ZvX
cRg8WTnruJL+tsXtuG45WepkdDweFnFaHl4MrvOmM+A2YjuAUgykAqWbzW4P
fc1VoRiUHk7isrwSO5QMpY9kzo2k9OjE6RwLz3UeFDulG3h9iaogbI3JRkby
NIHyoI6AFKXbhVlAFSldDKQ6pXMz1NNQHojSQ+n0yVK6YrZ7OXmNsTyoayNF
6c5hUZ5ERUoXA9mE0gVnbnxxSlfJP/mClM44a1KU7rWqHjpTQOliIJtQuoBj
vjilq2Tkf0FKZ7LzTEr/cNLKPQTbKaC0P6trxAb97J2XD6iA0rqXvZ8Xpc9C
eWhKZ132/Wox/y9I6YyjMU3pwj12E0rnA6pO6aoHJn0RSlepFvxylM5mQp/M
QCFv5R1xXoCXNKUFoBp/BvbJhVtI6VYTszvKOwd8Dkr3iMAdpHS/5xxUO9Dk
sTR+yUrvWbdbIK/zZ5SlNABK6FwAtQKlyw9H/gKUrnagyWOhdEZ6n4Vnpo2F
7rsXr4Yjm7mU78VxUXpfn4VLFN3wWP164U7F5yK8FErvdlWL70tI79bQDsWg
9FmR47eGJwR670GyEwHy/VI/HD8nsgBVak7seSKtrNdr0JnKvnHady6UyJv6
S6w4eRI7y/Vk7k+deOWu4H+O/UugY/2FN58v3MB5591tmesyXhyD69BU07ku
bbpV5Dp4THGdxfqrznVF1RNfnOuqZLb/ynX45mymvcF1aDbqXJc2IytyHTym
uM5iiVbnuqLt9otzXZW8/V+5Dt/czuhSBXGS7OZYFCeBuysGJzaJTeS1Zyvg
uu3FJp6VxSaelcUmNvrbLqUzulQBpbMbUhGl4e6HoHSlhudfitKjR0zpjP5S
QOnsJlBEabj7ISidayk9BkofP2JK50a5x+MKoahcSkexG4PesIxjsoU1oCVQ
Simd62jIpbSYQc159f3zesuYFey47nz10guu4Np3TqddSOluq4zSQ7yt083f
p4fAL8+NKHW/KWDB82Bes+ubz7/IhcLsNGyhngKwWsOiceVDaaH+s52xuG0R
iINb21+VL6idSQy0rYDc6NpXswJgBpkVQNeMFQC0fzwroP2IVkD5WLQV0Pm6
VkAmBdS2AnKjjl/NCoAZZFYAXTNWQL/7iFZA5xGtgPKxaCug+3WtgExtr2UF
5Id0i+IBCaB6SVi4eoyvqOr5i3tOTuxQHgmlO5msKyul8xTeTSi9jWhuUYLd
F6f0czuUR0LpbsaGHb9qCxK/Kg+s5duwi7YI2S82g5LZ1Vq9Psb5jg6Q4s0C
Un/mXBzaUkbPsRMzjOqw4xxU6ZL1ReL2tlINrqOIjXoNa5VExXNP2ZuK7QPs
dRvLd/co27BC/bLN7X+tqvj7r6qwM3OZ3NjmEXC2/beiAHMKpDLYGqUFDFYo
pbZGJSgP5FmcSZ3eTXT6ywO63tKKGQo8i7pUXtMRN8wCyAGWsTxw1rPOf3s/
ekg6WEr/+R/7vAhjb7oErSlqpRGTSoZVU6hxFl3hlMpITcmwBefXpqEYpA7g
42y0jm48sByT4e+Z0Dt4FPl+IalbnZxSBnnEvMqTzTXCkmc61sPKc2f0KQyT
Z+LO49B5F4S3gQMb4hm7Wt0g9hlBNZCc/gLzHW9a22Y7Swp2BbbrHHa/Zrbj
4VN3jVan3Wg2OkljjUK2a5axXQ+V/8MiD0IXBVBO/8+iGX0GtiP/JrGdoq8O
5YHzwSuwXa/d+prZjoevs13vM7NdhQxJ57OzHaBFsJ2irw7lQav3/8CZxXuv
QOG8ChdedJfTYSc9o7Q74w+VU58rJLKW9elzCrjuoRJZ+yd2EE4Bv2z0t11K
Z1yUf8Dc4mp0LqF05dTnCpQuKS1NQ/k8lH5uB+E8SkpnDzCQZQh7F7fYlWMG
F27daBZbKf5rGUI5lMdC6ayJRGUIe0X0tc/o1zIEO5RHQuls6lypepg7JeNv
Erl+sAzD+ZkynIum9LUpmWXTy8UL6aSdPv6DoyJXzkHeeipUVbtlquoRcmS7
IN7Ldcv4wKF02uTb5o/Qk5PNBtw681rMsyLEfG3Ma5/eRszbalXolPl5mPeZ
k/f3GJk3k+C4debttdp/z8xrn95mzNt5NMyb387uMTJvJjdxS8z7/PxMOF8r
/H19zFs2vSLmbTfaPRhMo91m9beNUfpSSyvDvL0y5h2KWHvuWA6GFH5vOb3n
qPAettHhlZcm8BiZN+Ob2hLzxov2sjL3fn3MWza9YubVk0o6zTyloYR5Kwaj
CpjXyCBpO+3CLqKPi3ltOSWU42GmlNgzOMpySr5xxmt/5U78OR7cEl46M/+S
8ipWsmwPC/S03pqXYUSN6HB9+IFzGl44MQB0Iz+Md3YwxcD+nEow+PCBE1Q+
OvHSmyL3x5iZsl5MvAgHkDxTc4JwRVkPt9f+9JoyL2Ia7dwT48Cj4WmlTsMA
V64fAGlm3o0/9eIGhfIjWbM4dyO4GUbF/UH5a5IZFPt/hZumQGB4zcxZhY43
n/tLrFic0kKgYH54FbnLa5AVJ6PRfk2MC656lJZBI4lET+O6d3npT+mAQX+x
nHvIRZSlQTkXtMJSr4h172lNOtVotJpoEvfuOwv3nYe5G4sEKVO415+52LcX
8YPE0ahB6KI0EKCfeCPiNPKQqZEpZs7kDmRP7LT+69/+vdWiV7e78BlkJxBb
ka7B6UhvxifOC8/FFKFEfOipSNMw9mQmkh8TLTxyGAJ63RiRT8kn8OrI5wSa
Dx98N3Dr1wQVeARuxDt27e/aTdgqyVTi7KQ3tDzV0bc4Ey0hYw/h7e+qjCai
HDB07MzC6RpJhZGTSKYY8XxfeTPfdS7ulp4zXC7n8gA3Od/yeV6G83l4i+/T
Zixn6CYg7dNKXh9vNnBj5NprniJ56lMQHvUpJgoBveTnjzs/Xns86IIHFgR2
hWBhACAVZjV6BDjQpUQsYpE/kXiC2aynuNIazimnHC0lGZ1d4sxdfCT2VoiR
3ek1rOXdGk8tRnzCbLCEmY42QtBT7aQjuhvmSjMMaIvXhr2zM15PVslP5ix2
dkRZ8ywZEUj710+HOztviFvcufELDXZn5zfOyA2cCSCIPYow6mUU3vgzeE3o
XK4jEgl+gH3OmVHcSbheqRQxOgRo4bnEniILK4xm9Ax9ITZWU4c7tBnHjeT9
Jsrwo0QTgHH5hToYps7KA6EMuIXbJyJnDaQApQnmYZcS/nC0KGxhnpx0BhiZ
+CD/gf/VIZHpG8YeSarkOMqRcQPGbglDMLqffjK4+eef4cWnOLpwCbeLfSoN
n4hFG2B8jXszbyxM/UEW5M6Otn5jxhLuaXRbwtQDJ3ubB6I8vGPRhzIFHyP+
zmANIcDYn0fuFS1LP+lxbx3+cDbzBbdpTDNARjtGAT3lHM65D28K6OwdFPE0
ZB4sQfmN88q9AnnP++levD9wLp4dH9bw3z7+/NyHfcLDQ6iwPwDd0MC1wI9O
gRHC+Nq5xLtoyWCOJ93FOIYVAHT6vwEPrj93XNGsHpgIEwpdELg4KAvzDxwQ
d1e/873VZSOMrpimtARoOQ0Ao69evXmNixFzMqdiowzkz4wiOmFuwNj/8fud
ndG1G1x59O4IZKsHv2Em5U5Fqbd8N41bTSn3+Fup5BMPVZB9cLd2HNs5bwqa
INxcXvG7N5ZY9Muvqze7emnl6kfmCSJ99nVrX7ZHRev172m5VtNRohXSD8kk
NRV1pVxfSR6+78q9kAA+ZQUn4/h1Ff83WcWtw1+Xsb5/Rv4NWqNy1+Wv5duu
eKza6j2Du4Fi6Az5pP2WX3pfE+HXxfroFeacJdv+dcnqa89bqOXqLcqXKtxe
cZmevPq09ektfl2b/93WZufXtSkWGxDo2oWJsqNVfS9coPKZqr47uP8F3q+W
KTcF/PDh/PnoqNNvkjN4k3UrBvC53W630hVGs7+RtaJTdz5dz4kbwxsvsrnV
gK1yvGqFoISI05eRRB0hgl3cdZpiTFj8LCLJJNwjF0ZcJAqLUUqlxyiT+LJF
Isn7/37kEfDV8AyZC2uH689pHKmAD//EQ8wN/cxmKgKCU9vNjzHs1vJ+ZV9Y
/u+JpV0Ag/X7XWK4vHu8xW4ShrLM3xqtUZeuonC9xAeT+OT5yfjicj13ToIb
PwoDCi87e6Pw/MSsn98ZOkBLn/nSfKlzemxilVnVK0SlIfN5f5i6GMqVu0Wl
iIwQYSpSRGLknlQWe8EXwq+zAX7vgzDcOLaGr0kYfRk01exT9+RmxboCxqq0
jgosuXwOvTpvz081raFzdNgnLOQ3GUjnQFg+ZS6lfsKkH4GhVFqGuvyL0K6M
H/l82V+S9hIyIUQwRhYYYQE+kRJk/mhNRUn6F6RbElg+ZS6lfsJp6nyivbyu
Pv3009wP3iH3HDVavZ9/xsE+O+7wT7TBJXkvqRBvegapuaSnmWgCWvrLlqiZ
M81KIyuZ5m+r4owa6aem+YvIQ/mOA6Ubjsy8/JlwVjbNbgnORAxso2l+AdYo
peZRCWskQYOveprNEmoK1+rXTs1WyTS9RXZyX+E0+/nTlMb9VzDNSiMrnuZv
q+PsoFBso3G5Mc70y9vFmS3hkw2qOubmyaTPrA4IygtmfJKldvFybMTEKG9M
N9VW8/gjJmzqqWOsLmISXzZd7U7qgbtW0PactYvIDeJlCIrES/cOLioHxR4A
2XdOpL2cZLRxmyrsNpa29TG7ER0z6KvivDc3sehxTEbOksjURa8HaZ2HhwdH
oHWyJwHn7F2SFiwmFYO669y6d+hkIK9DzZmsyXeB6m2SFMveHjQXfdCkYcgy
dev45LzuGR3RDMdPuHRB1adrf0IX2z+0Go32/9vu1lv/iEPA4bcaHQIsbh2O
XzdaiGbrre2aVLFjS7LY31IRbGcPULcObiNYjN4sHd/ebzhjf+HP3QjXjUrZ
Y38gvu4ahkUHAprvnHOLWkCA506v9fkyEfFR5RGJnekck2H/pN32JyIrzjn2
ohsvyv5GpDto95ofP1KqKtEeBhl4V+HKZ2ccXcVR4KALzYqCRZh7gy7KZO8y
LCJIyYVzb0qJ4kh+lTRuESBFvcu+LfiW7V0GYg2V0UzwW5dNr21CLCu1Pg0v
urgSkmcIC33uTVdhlBY57kYyx0+66u2aYO3i5vj1uP7MRR5Brxa6A0WOLnDH
a8q4PoFrKwS7dzx8bRq6SgLZWMiCq9KsftsNOhsNp2B23y2YRuNrlJLHXjyN
/HTTOCaiYZFaOam0H57tBslMvEUyP/3C8kTKs7MfTv9gZJ8mW7NVc/hkHBks
JUTJEISE5ClFe02Kk6jo948OQVSEkX/lw7Ywv3PCAP4hHYQlB82F7u21D1Gs
GPMCONjjUTo3UI6hR0f3ejvrJWfY6y9E98106i1XaXlkgK9phQxYRRJgK0YY
XjGygR9pXZ0cv3gzSjP2KPJmDCe1w99va6/0DvvaO1leewsvgptSJzy9wWAI
eZf3CPy+sdf7sYw/UYyFffh3TrxeotqADnlzMNNkMLhD1MhV5r13scSi5szW
5H2a+fEUYzBU0cJzkmUZsR6/6vcPczxRZbU7ZWvbupCrruNKaxbV2q7cAHTV
h99UbX1uuhbhijNxp++AIbM7zwlTAVbGN7DghtyzVlwc0DFiB0ftHobrMBIi
1SQdwodvossp3lTHmwCAeFoFrvA3WG4pEPrsl26k9MM3Sy8Yj1+aBN7RXjjY
QWQdgz7Gn/Dv97BGKLbScfaa79v76oexFyHXvabIz8BptQ/b/SO8p3XZa860
+7K9fdMnprd7fXX7aRyvEd7o9XeIohXmCI+GyXDcuQ9a7p26QPt6uHKeecD5
gNd/hiXmtJxmc0D/Oe1mu+N8/+oi88DwEh3V1gf6xgNjLm2jITVb9Xan3u3V
nz+vPz+p9w/qh0f14bP0vXr12WlwGQ6Mt9tK0wapGkfjgeShOvw0cPawd/nE
X+1n7lquJ4PMRfxrdgeT1qDdGvTdweRo0PcGvcmgA/91Bt3m4LI3mMwGl81B
2xv0j+wQOpeDVh8hdNwBQOu1Bz1vMOsOuvC5icCbrcHRdNAGOLMcCIcD+M+d
DNzpoOsNWt3B7HDQnw6aR4PDzsCbIcAjb+BdDtpdO4Tu4WDaHxz2B63pYNod
NPuDXndw0BocHAy8/qDZHvSbg05zMGsOei07hMuDwcHRoO0Opm14PHMLWBkt
riBNOmBmbnp9Or5wRm/Pf38y4N6Z6o4/wPK76WhavjkI8TMS/i2FHDOgj2Gj
XsGqUouG7thwCQEGuoQNIBbwNNCoA5OdDFqzQf9w0D0aeB3EOfx6NEN0NTuD
A20src7gEPikP7hsI2UP24PuwWA2G8zcgXeA9JoCjdxBrzdo9gad6aAF92iP
HzW1V/eQEJf9wayP7AH0umwhA0y6g8PuYHo5mAC/wVv6yeNToObhwOsikwBz
ApPAu1pH9J83OJwgiQ9mA7c3cD1kYBhVq5/VkHS1Rdqk7iS88Qzp+P+3923N
kRvJue/4FQj5gZKDnKn7pSP0UEABlmzZVuxojx8UekADaA0tipwgOZrVKvzf
z5cJdDf6Qg512bOxJyxRLTS6UJWVmZX3KkAjaIml9PNkVyx70YK3dEtwLe25
DRLGVdmJ/Ss0prfOTIe5biwd+kunIHXb/bd0JHBhAoYr9cDHIfKDtH3XYVA6
PoGu1XxqEm3Fndr0pViXVpXGlUZDGhXe8IFKusSFEnTT8Cts5FhKPmxYo1vN
bzWRi8+Dv8J2i8bu+cYlGms+M1Tz26KmsbBajuBEh1MPagsDXWBeli4Ifre9
4Ds0ri/oAiiN/JMsDePExsONzdsDlWfsLTc2HyF2e5guLsy0Bd+Ua0nvsndd
uY6lG0u7LvWawDOCKLUeyg1mNxZQV3pD5EBj3dGDQLsdy8GUBteC+kHnsSdQ
NxPYAVwE27Y0I1FwCIXr6aCLgEU/0LMRpuyGDr0gCB3NQvZlz0dlWEOnYnlf
jo5m5BixA+Yui42HLUBT65kfOkxqM58wTZ/rPZPIgX4iEmw5CnMPTOJD3itP
eY9QFAlF9J4chkGR3qP5gnwYRQ6FC9Rm1Hx6B+Y+AQDeG4k6WAXOlRtFyMHq
ML4chnLoytGXwAOGGzsAWQhb6p4OygtAiFgMZDHZcuPKwc0E3UjC59qUwZT9
hsJZDp07SIHCh3I0hGoQDqhGzzLy31iGNWHPwxi2ZTcScQHDsRT4p6W1dWqc
zbJh9gu2FUEPb+8+zBEkeuJYgpzaV7On8O5+/On67v2uoyni8+7uGq5Gv98l
v9h9zOnu/UbjjkJwZCOvt+7bw/s1mqPpVXfz/dUWErbPf/mFYqDkJl0N1933
t3cP8AeuZmNwP4X9b7RzfOf5s0u2D34tI2WXJ6GyrXvwIyYAjXU1vRTg2Eso
Xk/eFbufuwT4m2387VOy5II36rPV6wKSXl+e0cyvy58mU5MjYCfRztd47u2F
YOPy4vLguQe2RCdDlNuJ8/3vdrfvtCi3/mRhZ35yuWt9zYYot5DOK6ulEsuO
XxNSJ6tzauTRCmr4tNFkaVIbEz6lOShtrPMhpuris0sCbLIaL8vmz19eOTN1
98Qcjs5ZOJzK24u2qaSSLlXRNbbSldZGtLbKrVCNi7qVTkmdhLHKNtkYYwVr
3orOpKhVbrMOOgCuy2dAABsui7vOG1r8z+3d7RV4mrzVG+J6tnqebj5M1s/e
3JnmlI1WopLZBRMbLaKSMWshtG+kDtK5VlkRlPE559R4V9cND9Eka4XVtRSh
iSJbK1uXnZDCtTJVlQmmbqvGgWS19KExqebHtJamSTLi3yZUTvicbGp0lZN0
F8XZbMS5lbjLS9BKeGIlHi82SlYs1va7m+769urt+JfTpc0/lfipnDIhH13X
HNS//iubPBJ68JzJI3RhWJ22UPK5EKJw1dISKc9ZIoVMpdNlJco6Q8bz10ia
qiJVU+Sw1TaSToOGIeCgr2IJn0nIwgbSDG0D/mONnegp15S2KnU1a2wAU+Wy
hcZuqGfdbjV2mjR2YZsybzV2NWnsmk40afOssXdjobc86bqqlLmcdF2z03V5
q+uava5rF7ou5yKnsoGuq+nElSaxNQRdV7Oua0jXZVZxrSvzVsW1EgCUFau4
ui2rpphUXA1bIJSNKVM9qzh0OKu4pgwVq7hcJlumhrCBoY9U3AH7HTLLAfed
Y5Zj1nu1Pf9kpzL/A2z603jzM3sf45ltZb/80xxnurrlpv/zpC693Xb1sOjq
MD11D0347u6WlS2Xde15+li3bsOGFCobplDYDaQRhxsp+tUfzuwbDostNfmh
WiZQP52U3FMq97PpdTc7/cFRrSf18IyNF2riY9y8WDP/Lg2sLg/UKevME1V4
qPkOVdwTyoy1xtS1+iMVEXfZVCIbr7yGIA+xqgU6DAGaQdUuVLqN9FCldJty
WyclouUuRatbZSREOe4p62OdahXqrCtvosm2TTaHqkqVwcS09c30mBWAvU0x
OZtjlRTmEAC6C3UNPfASNTCR9g9VBGd46ylV8GLGepFqUH8f1QDX4f+Zamgq
On4Qcl55cmohwwFMVZPjgoFCYK2hytqRcMZYsS2zpmsA36Yit1g0NPdo+f2h
LXmBksV44lCB9TQ6pL0KhBDMAriKhlRGC1WS0VVRJdIUjtUQ2jeWIIf6wFgJ
mHHULFbUYQXEBp444IE+epFqOMORv0o5sOAmGXuU0+BjpDjMfZW/uKJv/zOF
YR4/3O3l97gNiF/f3Lznl3SNO6PwxPajcuQTPUFDd1sv6hSG8sPd+5t9KcLb
7qdxf9ITXaXv70c+eWqXXup66J6t1vnlFxi1C7lffsruHW9mmXJYx7bvvp+H
7UvWiAcXxRCSgZ5nt1chn3E9Bb++7MM1+t5rMgw5UeIVhann7TVvZp1q6a2T
r9SUAHjz9VUQ4sq6ROUAlMEiwc8Hje3mSd/eddf388E228QSn8F0uKftfrdL
/MAMWGwT+Tei8rayfpuKWLDJQ1FUI6CY3idH5/pMLtQOhu3b52YnhmKsP81M
AOBu7m6/36n/bbRu5pnDDODkXO8fns7tOiDFlGGb0lrCKip1mQ76OoZpWUWz
RQy9ww4+5ebnqbT7DAjPTmUmxZPPLkhB/EXq9qc5k0vYnd5p9+7+7vGuv7t5
KG+ufxinrN2RUJ6mcsYVXBWSjmR76eu8PiuOu0IPpMFTY+pcCahbaXLT1h4a
XQXb5tq3tnZZZqPqaJ3xrXCySkIEkVsYAwH/Gdtc7Dre7z+nnnPtXKWNtLAc
soMSVrGyWimdW4//V7iRXSUaEdC/FlWdTC1S3UY84atKHarfgy9b//hoQC+D
lBKGQKxylFVULUwI71sdXJWrtm6SR9/KhTb7VrWVdU0jfY4RnqDL5uLJ0NLD
6rh8aHcGA92jXBoEI5P0aiv/jg3l6f509N9EfJbMdzyTo9Ks4/T7ZbnmAo+7
25dZ2hxaOrLbFyGlw6kc2BnHsbBDm/0kbHT9anx1ua/F6u7vO8hnskAWfTxf
pvXC2BPU5v+aJ/+g5snR0lkc4LlMS7O8f4KNzpnOe715PMCBzwg5fFIZeHZ9
LL3L2SPdXP+FcPvp7IruDuLjUa8fF9uAZpBJ4kpZjtPJlw+fnaw5EhW/YcHR
YyerjUz47daj37bmntiTuyQi2DLU/7v0/sGXHmuoo3XHFSDPc9JZF+F03eV5
+/wft+iY616y7paQkx2+9Wxp5R1U4nzZNE0ZhHol05+eqcYpinS7s+foYN7b
Z59cKt1Puc57LDOfxLs45/qSbn2ZPyOw5237rOcT/HRM7S9lvbX1yY6VJsx2
7HESm4TGLZvQH/B4f/OeRcQwPnbXN7t3Gr/t7ukI3fHf74b3NyMX7XJmBT+z
1cF3MPhsQqWbx+nVz5NAOPSMCIdLrvqDioiilMrCdPRWymCMkxADeMCP3jk5
+LU1o3Fa/f7ios///OayfPPN53W6LP/z860v8+Vtj69//nyPXbaw6v/4fEvk
X1uJRIl+uVJxReJHyPhsJVIee86m65WN+Csj/nmiEmkJ/1eff8WzGI9m8eXd
N6+XqbHP/+uRgnX/ELVKfaAaESWpXkT2K2WpIsSPVHvUW6r4AZLWGyo2OttD
3KyGnipdzIaKUcJ61WuqROn7VRCrXqyomMlSTczGPgFDv9psVtGuwrDydmW4
VibIVedWnVoZuxo2qw0XxERxvof1SI/3G3p8w+U4m0iDKreSYbUJVE2FrtaK
qljO9mAd1UuNdkXTiX+fWqWqewD5d/ukHx9OQa3Tqk1fvWnOPb7lMWaundg7
7SM6qusReRU84aVqV75dZbFqPBWa4SLVKw8keir1Spmqk2wmnCZxbtjpEAfa
WPOxgV1YZblyXKfURvrE2HVYqbQyeiUzwRTblQirql6pvFJiZasV1rQ7O/C+
tKvc5j0/XuN1yY81t/31O4hhMg+fQyXk8ng/B/L49Q0nA+yk+Xm2IqF/dT2s
+A1y7pV8ZfGvfxVemfJTLOy726tTTXG6eukf3v3zdPr37Ydv+KCQ7TgG/zn4
2a+keHXKqfun3myF1qqkojFFBWrC/NpKuH3T/3MI5lF5HKTBEKi8DDw4cMWb
H6gIEiJCQ4YEqj/rFlJixLo2qyipYhLSYFhTP0asYsQiJREhPRUpUm0lVrpe
eUizhZgKi6E7T7/GQAvc9FSlJ7uV7bnwbqCaSNWtzEBlcLvHXUe82AFCTyII
7AgJCZgdS0sIloAG3WoYVw4PonOIlxeWxx3ZFNb7yWBanS2MU/TGiV2RXKPK
dFobFyiV6l3pZJl9WdnSNGTVa0WdiHTw3vT9WywWpXKwaTW/0Yrax8NSOVdI
boavVj/dDMZ5Tc3msrnjwrtibpa4WUW+hg8EsMv0tkpXk/NCbgu7GI4Hkm7x
/iPNBU+GnqUeMrUhf0ex4xPJCKdPTX3Od1rqivrhoj0pDyHR3E+a6w61Ikse
jQE8vKpl/R+uqaSPUaTjVIpXaIZw/lN8X1LhnU2lDOx9xMWf3NYO7i4s7hf8
SY8QCepnSFA+TYLiGRKc781vm9U7ShVnSiS3lHIvoBRaUmFcOuxhohQXw4EW
1nDLlkHKhy3tXJJoPVVh7rFkztUsPv8yFvqpmH86V7NYB/LvqBpC0ttZlKXS
ACwfTWkQKhyEL1nBc8wFeZc1AW9aGgVuZq2p6KCuqRCwFuztWpomueR12bbk
eAZgyRJiI9xJWcBhhKsIbodz2nJRQ4Qj3FDLuqWWLRcItpG6Uo6Ypw3E+eRg
KnJRIWbBovBDCR54oFwxEdJcLBv8MYllZlyZeWlPZYgyF8sGoqEGGIU+4QI7
dngz9YabmL7HWIKgxVrABVxmT8gvIKtSprVmGfNp6rw9GF3x6DLMNbiBl7AL
ZZbEOVYWmCzQiFFqJhnYlUDKNEEQseL4ABjMVrRmp/JNAngJf1tM7zEDzg9q
NO0MkkqHCJHURrEcAOnTDHNBPFNxS8kvVrXMLYEaJ3EoN+KipaFPcBGoI1Ix
3zFbgczTf4ngXdSJFss6UbBWDlSfArpkrovxeY6u6Jr6aRKVq8AnjqCdpAgM
2CxXBR6H9w1nBnwC3oDUqh3HaliAYGXVmSDZDZQ8B0ACYR7SAItOpgKCiIpx
MtXaEnUyrUSXaCJEek+cDOpg+QAwx0sJtAZDYr65ISkB3ydS9fOhOvwVhaLj
YmsaKc5PjyMZn211Ke+fPlMteuyql8dVAXPq73fUdujLonx74RtymbOvrGnI
ZaY6Cqra+BaWxJW5LD/58xsu8CgdrudijzLgeuELTzcjbh44xNNtidt7r/iT
ovwOt6U1IVJix+HL7fubm4+NaHH91WL08dzocGT5y5XGl8mJ3Y7Hc21zHSqj
ZCtlrWxjfKNTbT3aVa3KET+baFqhQlVrK+s6iFroVlpRtVbUbRvtxQxnCTiv
1HZ+by+ic0Lk4KWrWt9m0Xirski1d8J7n7JzNguVBFeplJ4ecSFLR7WG0cqq
rYNKRsssAIbA+CorYSsp3fQIxgIKporYb68w5LdvL1QlqEjRCFkZXYkk5MUl
l+oIJbQwF999NxmDr48CNVOI+UyQ5/WEq7cXNaYiY3RZWeEzFeHo2oQmJds0
0URZ5eRypaQRMeYYpPS105V2UntT5+CS51maGGJraq1ksnWrbA4ak8xauyQC
cOJzqwSh14EmMoQkUm5c1iYqfVQ5w2uKa0+Wwen9+jqIVXOUTEE1nbNKSWY9
aW6STIEggJx1W2MFEtBtLRJIEEeWX/G8PYG17D5u3hWTeSc4MP28DScTWVek
yWrW0xyuZSCLM0Bavq73AH/MACoEA7azcpRiBcmydWnKANS5DjOfWiHFE1ZI
+WuskGJvhXD8XbGOtL9CwZfeF0cKHjftgf4uX6C/i6X+VpNy1fwGvKnI80lt
StdmVqXFpEqn3MDfWime04XlVhcWv0MXlud14UIVUtlq9zDeQOuUTZ3fpPKL
b775+s250Dit4w8fPrzanr05t5zOsaCNDjeU3J5OKTnQiHNud/pJnSnzOOep
bq7vHx6PFatUAOqZnVymXNtyd227M5u5JFviflN2krbAgKgqwN8HnQq9pvbr
QBuFyDdylNHa9Kd7vs7su6FcVkfOmVi/yIuSk2PhD5t11EwKyra5vnQbMtJB
WhJAPUsfxeu/34qAkRa/Go/2cC0cVs0d+vIjHS57E+QxkDzijWmTYKL9XPpk
P9q0lcxvfdBzW8y4caHVdg+aXzis6rgxPt3AjtoZHBZnPNGzqA5zs30wYO/K
F0tPlJoN1BWJ15En7hghckYFVjgYgC42S5IV50j2MQwfk6ygDkfusD/eHkgd
cjaVGkeirzvfeTF1TnlXbjC33DAaX7rhrjjD1eecV8g+PZb9UA6QiQNdyHUZ
Na2jfkN8AiaRHc0XRB8c7YyjTVsjcQ6mhpWlNmWA9bsmWqMTiEXT80Y8Rr7d
FJj1xtGqHBTv5gNgWJKO8BbXtFMPyxZCTW5oUxhE26YjqUf773iL3wC8KaIO
YZg9+81AWhNTWA+04W6KaW2GrYjA9YSizcHmO6WLUycSIxJyPG1SGwGMIFqI
kSQ+Ja4DbXDDwgFIQ+Tcryig8CLDRv0Mh/v7xgMnuJ82hAraZAfMYJRhTVvw
jC42ANsSUUAdx3sbCTORqsuAEzXt4hwPOp89TvbOFb21uHgZO5XPsBM6ET1t
bJz+FHdFjflx+rrhx6eQwCE8tJmRrYHNpji3q/EYOcrOyNlH4JgTtr5yMfvK
ehF9WZ940lux7A93VkreWek57OTVLJTAnJpZFLwaeOsubA5v+E+QOgDr4g/Y
oDnydkWasqHtpZjybB1uTcYl3vDU85LBwJrk9jupuxS5U1fzoM+BWjwJ6gTP
ZMh+BNSP6J2d+HoW1GIC1fSHNGUZYlg7Gz3PZYptgKsn4SN4LWN5un4OsRAD
TxweniY0yzHJm3CXVPO62GHjgG9fhAoCEuvRag5jT6M7XumSt29vzQniIvc0
bNML78Enk3ZjkaLOsPTcXosZCRA+JxxYEFknymq6+cK5EMLFbsTizIiKGck8
yfOkEBedA7G/Co1PcFTxYo5iZ0Yw2pcLmZZ/wVLlOOI45SvE9P73boFnNu6h
m3xk8pnpswi8YRlf6UJTJxuOURFlBf1ke5LzmM7Am7unjfMQTZbVhCCyFmgA
izGMpL8Mg0cGgy7XeGpDwBM+eaN3z1vLMQQQMvJw01vlgdjYU+jLbqif+f4k
LQWVJmm2zXYhtE0geKB3ukgKAv3DnjF9AQQCcgxKe66hmPqy96Q1aJUZaumH
cmQpDbbsA9uHA5U7YQ12gfawwWcAMwh2mVQkDJN5xnwbOmbgnou5BGkZDDGy
CQ253a1pFznUd78mqwCdOEo6kRDGpKAN1+yXAuBp5UJdEp49fQLJQ08MQJp9
pB306A0eu+HN/rTvviNrAUjGT5IFCGyJgXUu7VLvyRTB0gAh1rzHH81AO8xd
jEXfLfFc7vC8PsXzrjBti2fMDk5dL4voiZpQ/WSi8PEIa8c74h1hHuP2moaz
zCfAKpmpjmwkyf482TyhkIpmARTFgU+cWOydB/yw2fAs1gjV1nm6NmwPwKWH
JzLwcGYssJrGnrE6Mn96OpFgZDkJrhgt85gnTIIEauDTDPSRI1P8qgMEYEFh
MfZY0RsiMYgFGkFQgz1gpwGMzpMEBkUAJ1m2GwIPdwbWs3DaO+5qw3IYzNOD
gfm0hGFTwKbaD2TpJ8cnKsD9xhLbsPAETbGuiZ8lIX+9Jn5wHAmiYxkEWdQ0
0Jqs0Mm6A0KGju4Aq7D0LK3333qAwMvjwpPn+ncJDOtLquk3vk2y0TKq0DRG
6CqJKuiko3Vet/XFZSEui2+LZcT2igKz9c3d+2Fz01G1wpe3/Sv+QR78QPfL
pq7LOl3pT4rvLmFaRhuDCLRfUDrlaeegOO1/HxC+onjwm+62bO+7255OLfs4
AA+316/63Y8PDzev+rsfp+Fpxm2OTjd1zsHkOssq6iTr1miVZfJK+uwoyJkb
ra1NQrWhbiubcojR1NmYRlGkFgBzcDfZutG+SU1VCW9FEw1tdqiMsW3KURkp
go9Othccm6aQay0qtPM5aJ+rVhnd6mB1NsGJ1upKx6qJlUr0AMWA1ZMTuizp
t2WM5RNMkQLIFAQHhr7FgIoCvcDht5+8fXx8t3r9ur+/0a9o8xExG/Xzeo9H
YBHUImK9QrMp3F6WiyfNC5+kQR3Hrp0IzgQhg2uBVyE5dk2Aca8P6JYmcNjr
12/QQTmBHhet0fiuf3h30HoLpNq36Tv68eFFoD4yyuYYvxSXU8yfMgjO1tGo
NkvvtVBKGmskGFeLaKzDStEmSywaras2t6JWrRKiqmvTtNKZRk/xfwiviGej
mL7N/0PvAXxnUtRZtSKb2kjvclsZcE5de10BZ0ZnnxshGpfqIL0B/5mQQjDa
ucDdqNi2NmkjXEjKiNpFKxSYrwF0yqbKN1nVVd264Jq68ZVto6uMlikKD7ZO
F1tobJ1ro6NqGwxWYaKmkraJKWOmjZNC+7aiTbHG5zpJr6OplEXb1tVeNHVa
zlXpcDTXJkRZy+irthKNzlrUlavxtMhYT7r2FjiW3mrtopZYLphokCqbrGIO
Mk9FVQmCI0tXGwcgpMHasb6twVGNabxtasyuAcl80zZChTY0FqQAPC6onDC5
C+7lO5IBby+q7DQWfOvRqm1crSJWIO33wUJva8jC1leyzsIrKxPI13rvXaxF
a7zMbUMFn5WthcMQNljTJi0qFRSIJ7Ouqpicc7LJVmiJLiqZghKqETnZysY2
WiOO9yv96qSHhz2yjWw+GaH908fis493dzcPvzNCa35XhBbkfC5CC3293pro
HMc7c9wWmx+do5ALzIxA9htHPEwhxvnEpDkrvg1bkdvIYcnZ4Vqz8S/mOoXe
LaOFh+G708CsOI5g7IOKnnwT8oVj4Tv2cUYyP07KfA5jjB3HGNknmt0rza6Q
JE8ZThAFb9kvVvpcNLinxynMMg3t5sALPUubLQrLey+ofza2CSp2uGbXjOM5
ZyPGu/PEDuKiaxoUiH3SGdy7gdSP38NWHMHmF4AdeYVzoEkwTqZAq5kiSAWd
kcXh1qkAR58cnkbgrT+GEz0P7e0ixP18Vm9qI/kR8oWLOaLFsBFUggxpNTli
6lwwfHfMmtyWa2kqn9HsBRwczrar3hLbr+wqLhvTT1NgXxZHIcodmeB7GjNj
lZz0uI1j65k5CXI1sQRnxdhaduy7ObOfuDNPpySmU+A4DqPGYiLTxGMTAzwT
BpzccKWO1mxxfs3Kec1OuTr6ujl059lHmK/h+PPRbaPkkGygkCx+GnjXDsVg
1xQp7VVp1uRu0FlwPSVohpHBGwm3UhdOkIcFnxfAg5rwOLqBvCHNR7fBjdpw
9g4uCbkqHf0BcmAGrgocXpZL5NBtyNKnucDNxLiEE8mOpyHfBMNhLnIgHxyj
0FkzgTiKzqMbp5wxTGcKCKxZBjoOxVDAeaDeADbmjp4jJyC1JXHU83Ft8L7t
QB4WHGq42xtNAWT4gN2GY8iB/FN4YcNAYQ2070YCBm6s3xDy0SdANSN5iwPH
iOCLoUN0G/k8PUxt5LPs4OtRQpoPLfSMasg63xMy15r8ROC/l0QIj0FDgfn2
a6IOhcqZ9Ia9uWHyu9mbg+R37K/RTcl5Nw7+x5F7jgW1ibTSQ8fxCgwRCRuK
BeOURcIF+gdx4ZmCjhApPWcZAtMRfEJh/0ATl5zIoMzrQFRQhsQIMANCAFGW
g8nKEb2AQDi5GAssCqc+6IJQFGg6kgNcwdKsgWQ48sAnOiE0OrpjWJiDrGAV
8FLgMD7c8L4jyTZEwh64y2xmRxgY20TOHWxI/ltOiOATqwAwD3wUoWbqS4pX
EHWmv25X8CXnsMYuwTHKfYJjGE5DZ1xUOwfkT4r1XhqKL46D7S8IxZ/kBYoD
MBaVdN0kSA+BmUL388mWW+3QCRKPHYdDQS/VfyR0f6izdrqj+LjO0tvGLP+9
XpyKyQdO0WmTi1i904eY5BCT7fe5TjNhY30UAC82k8TgBJz0cxhcbxYIeTYM
zhmB4nndfVb9/W0V+jNRdLmtJ1VPza7YBtIpsKnFHBBW3ZPY2AfSxx0/FAfY
OAykn2OJs7MulrOeQ2TPwDCF1o+tqeK3UmQJW/FbKVJOFGF+Lnb8fBRsP0mJ
nqmrhXAwlgqNMTqFgh0bMKzmFMvkNeeLHadEoYnw03paRFMx7PpQKE1ZSzNH
14PaWR3li62OgljoV7Q/m5ktlplZkuEdyWdK03sKYw4cVg0cwV5DkXkKmEOR
ET846gSSH4LaDAvTxb0wE8EJCL+9MGTkbNQ+Qv6yTER5mIkofksmwpDx0/UU
niVlIYrnI+SU1rdsGlF5D42uOaEDHS2pPIBI2Q/FOhJfWbYZSIxHNg47mgsd
umsI/2NPrh/sDZhqaDxGtgN3weG+oDAyd+7oCFkKAoPxKD7PFtoUQAazkWvJ
tgcMD9iBG5glHanUDcXei6HjE24VWRojn11MNQb2o8mIcpGMKH5rMqJcJCOK
PaoVHaj70WQEzELYQlHMrhzwg7UD44HepLphTaoZw3FranKClVjXkTEM+MHP
VFkRiGSwJwEq7DoVuJhkWGSXesIqVTvwTVr1bCdDuIFnYGMEXpuWzb+eaxjo
lOORiAskSDZKSXSMbI1H6g2EAyEc4/xpR744deT3TgHDJtlagE6kei3ON42c
cejYBQZHyQ0VegY+zdv0xI2Wz1uePHTJiHKccKEpr/lsZzbPFPsOxJ+bMoJj
Na33kWtp0A/WUcdHFtOFpaXUec41K05qaGYAzo1adlgAmAefOCIE2gNjVJAX
iMlhHlPCjjNrPRfwWa6rsWyqrXelR4FTbOsCdISZMZBhTFxE3kTHpSyG04V8
uKThKk9wcuBcs+ILrLLA6CWFHolM5Hp4zltp8gU2zK5wECKfczByWgoIVxyH
wRSw4jAiLR9wuKOseph4OBLqgLQNV6QoZrCJAwdGPllHG+YuSe0BhufyIYhH
PEJLoyPIsdJjz2kjS3Y7NB34B8IZj0PA9lwMoydbtOPjxDuywAddwIsxbHhT
XVlPS3vN/jsduK1oRlgUeNyxb0WwwWzmpYc5QhiCjn4sRma2KZuGOxs+0nzD
u7SpfIiXv+CSpA2rVDLyB3KmRkWIgqMEEk81RZrFIA3N1UcgDdiPlttIDDNR
p+ccK3GUJOkK3SF4/00HSHpiEipUYDECeU6k4TsDh4l6zuSq4f//HFZyydo6
eNHoWBnRXFwWSp9NKqX767/e3Xb7zFJ/9/j4MHQ34y6t9Oaxu+dzhcpvxv7t
7d3N3ffX9FKcXYopLlINnGh42D7xiAc423A/vrt7uH68u//59S4rte93Pvth
iff99uSr8l/UlKtyQlo6o8rRtbYhyEjXvHuCYMh3P9JBffX0Gvrp9AF6U/d+
N8Y/vzqM8HK/gkPgspHaN6GpgsouxDblqrW1MpX3rVC1SbnxyjUazZzIMgUK
adNtnbXinc6NbUWMlW2NTz6ZYK2STUMkkKqNdSNynVrropO1F6bJrhEtxcdl
YwW9a5D2OCQ0lwZTbGUlhXLGhWTr3FqTRKpTjBETF6EGqMrbnEWKddtqgBZS
q2nzQQ6V81XOLSfhXBMBf+vr5KJp6joL4dBbVj5WGFk1vnFtI4KrrPKYuqRN
x772qtLGNVUtm+BDFURbV41sqioLZ4wNuQ4Ao1JJOGUrfJNV0EBObPAsTQQ/
RatDaigHFE1SSWpN6QxdZVXXbQJv1m2oA9AnZNIBTekIVe1klo2incwKk/Ax
B6uFBOKzCqatY8A8gsZUQiOlUU2wlU5tBrA54yeXWiMVpRMpKZGAjFZFVSd0
FH2llWkpd9GEFsvCtEoDt8bWQqcmh4SeasBpgR/6N0lOa26TYZxAJC5SvFdk
uy/lKJV4hvcfNtffqwd5pYw6yAWWy2TgZnCjkMJLTwnBeS/zMtF3kFR4foF9
d1nKcpsrLI+ThafPblOGBznDFw/H0+PMIY/JSWBlwSTSBQsW1gErpFKUemvq
7FKOldO50s45vc3p8sgni3PK5x7dnDc1UaaZSGZkLbyV4BQVovCVqHwwTqlW
O2t9wmLMF3+TRKb00h4l9kKNdRqsqhuLVWrA8FLWrRR1rqJsLdaUdjoqpRMG
CMnI3GBdtk1uZNtE0c5UqOqkgEAgqJYxKRdlDYkCGGzlrE5YhMYAqlCl1GB6
KqdWYfXWjcNM4rRT649MYyqsv6OZJtuIKNCJbqLMps25adtWaMwxsjiLToAs
zmCVBaxuFVobXa5dpQKkaJ5nSgf2QEhlocArEKjCmqaRIanGQvzUpq4tMFPp
NkkIOplVA6EcIU5tGxzme5DElEYYtBQVRAWICBEDgZRkSwngJEytLSRJK6Vw
ErA6QacWUmFHA9GgIO1JamndRrBm9o2w0RD6Q2PwaQVEiBdeeQ/etS2hGiBB
jKbsrEg2pKg0ZaEhYyvVitamGqLSBpMpMVpFD9K7oEiYRjAYpGTtIfwhurTB
bCD0DZSbIdkZBBrGIHQMmAPQFWs01yAwBKxvQaxWR2g/iCzQUEUhskqq9uAH
SuSS4AugHghU5dhWYADQgaiT8YzKugUVZJ1C8hnStW0r0D1hkTZQJTWAyI6U
QJswdK5E7QkhEKngV5OCzeAaA0GrPaWMKwktJCyWW8acHNQWhsoJ3Eq4ALVo
qyEILCkj3ZgWCq2ttWyzB1cKyvYrZyGzgfFGQZ9XnjAi0DW0J0FhBFiBNs1B
8UZCUQ2kgDpYfsGIKG1qMFcLoQ5GlgHYwXW2WtZAmsq/N60slbH7vHKZ+h9u
7z7cjMP3fEIdnRR2ywcHjcPnn9zefTIf6dux8fJQfuhuH+ej2m9/KL8Y8VFd
3//w9u7mr5cwU+7Hn8vq7vZ2vLnB1w4m43iLGzAAb28vyz+9f3gov7h7/3Az
/nxZ/ufNzVj+6x06enigA5eq8fa/ux9h7fxbN7z/AcbYTXd/XX51/f7hp667
7y7Lr7r30ysDv3p/O6xvumG8nEqGxgf4El93N3c/rq9vry/Lb97CbHoov+ZX
mlLX/37dv+3Gm/JP9P/7ge+9eRw33W35BhMaJwD+9frH8g0adAOAub+mH6+h
EwD3eDui/f376x94xIfxvvzmwziSTTkdEv919/6m/K+79/xuSTq7jE4/Hvnd
kvxek+lVuJwqv+Ujg+9/HAd+de/8+pPdeV3Dfbd55Ifejjfvpvz7v1w/fvF+
zeRiS/B6/Z7OjT1Hqzd0TGh3U3Y7sk4nAn9/Nx1B+9X1f7+/xWd3x2BOpxzf
jxuAP4HMQ4NcP88HidHRZD/SKWVTP7gCSjqor+L/AkLCWkSPyAIA

-->

</rfc>
