<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-app-profiles-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="EDHOC Application Profiles">Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-app-profiles-03"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 71?>

<t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. In order to ensure the applicability of such parameters and information beyond transport- or setup-specific scenarios, this document defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Furthermore, In order to facilitate interoperability between EDHOC implementations and support EDHOC extensibility for additional integrations, this document defines a number of means to coordinate the use of EDHOC application profiles. Finally, this document defines a set of well-known EDHOC application profiles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/lake-wg/app-profiles"/>.</t>
    </note>
  </front>
  <middle>
    <?line 75?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios. A main use case for EDHOC is the establishment of a Security Context for Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.</t>
      <t>In order to successfully run EDHOC, the two peers acting as Initiator and Responder have to agree on certain parameters. Some of those are in-band and communicated through the protocol execution, during which a few of them may even be negotiated. However, other parameters have to be known out-of-band, before running the EDHOC protocol.</t>
      <t>As discussed in <xref section="3.9" sectionFormat="of" target="RFC9528"/>, applications can use EDHOC application profiles, which specify the intended usage of EDHOC to allow for the relevant processing and verifications to be made. In particular, an EDHOC application profile may include both in-band and out-of-band parameters.</t>
      <t>In order to ensure the applicability of such parameters and information beyond transport- or setup-specific scenarios, this document also defines the EDHOC_Application_Profile object, i.e., a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles as CBOR data items (see <xref target="sec-app-profile-cbor"/>). The defined representation is transport- and setup-independent, and avoids the need to reinvent an encoding for the available options to run the EDHOC protocol or the selection logic to apply on those.</t>
      <t>The CBOR-based representation of an EDHOC application profile can be, for example: retrieved as a result of a discovery process; or retrieved/provided during the retrieval/provisioning of an EDHOC peer's public authentication credential; or obtained during the execution of a device on-boarding/registration workflow.</t>
      <t>Furthermore, in order to facilitate interoperability between EDHOC implementations and to support EDHOC extensibility for additional integrations (e.g., of external security applications, handling of authentication credentials, and message transports), this document defines a number of means to coordinate the use of EDHOC application profiles, that is:</t>
      <ul spacing="normal">
        <li>
          <t>The new IANA registry "EDHOC Application Profiles" defined in <xref target="iana-edhoc-application-profiles"/>, where to register integer identifiers of EDHOC application profiles to use as corresponding Profile IDs.</t>
        </li>
        <li>
          <t>The new parameter "ed-prof" defined in <xref target="web-linking"/>. This parameter is employed to specify an EDHOC application profile identified by its Profile ID and can be used as target attribute in a web link <xref target="RFC8288"/> to an EDHOC resource, or as filter criterion in a discovery request to discover EDHOC resources.  </t>
          <t>
For instance, the target attribute can be used in a CoRE link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over the Constrained Application Protocol (CoAP) <xref target="RFC7252"/> (see <xref section="A.2" sectionFormat="of" target="RFC9528"/> as well as <xref target="RFC9668"/>).</t>
        </li>
        <li>
          <t>The new parameter "app_prof" defined in <xref target="sec-edhoc-information-object"/> for the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter is employed to specify a set of EDHOC application profiles, each identified by its Profile ID.  </t>
          <t>
For instance, the parameter can be used in the EDHOC and OSCORE profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>, in order to indicate the EDHOC application profiles supported by an ACE resource server.  </t>
          <t>
This parameter is also used in the EDHOC_Application_Profile object defined in this document, in order to encode the Profile ID of the EDHOC application profile described by an instance of that object.</t>
        </li>
        <li>
          <t>Additional parameters that provide information about an EDHOC application profile. These parameters correspond to elements of the EDHOC_Information object and are to be used as target attributes in a web link to an EDHOC resource, or as filter criteria in a discovery request to discover EDHOC resources (see <xref target="sec-parameters-web-linking"/>).</t>
        </li>
        <li>
          <t>A new EDHOC External Authorization Data (EAD) item (see <xref target="sec-app-profile-edhoc-message_1_2"/>) and a new error code for the EDHOC error message (see <xref target="sec-app-profile-edhoc-error-message"/>). When running EDHOC, a peer can use those in order to advertise the EDHOC application profiles that it supports to the other peer.</t>
        </li>
        <li>
          <t>The use of SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/> to advertise the support for EDHOC and for EDHOC application profiles of a given server (see <xref target="sec-svcb"/>).</t>
        </li>
      </ul>
      <t>Finally, this document defines a set of well-known EDHOC application profiles (see <xref target="sec-well-known-app-profiles"/>). These application profiles are meant to reflect what is most common and expected to be supported by EDHOC peers, while they are not to be intended as "default" application profiles or as a deviation from what is mandatory to support for EDHOC peers (see <xref section="8" sectionFormat="of" target="RFC9528"/>). On the other hand, they provide implementers and users with a quick overview of the several available options to run the EDHOC protocol and of their most expected combinations.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>The reader is expected to be familiar with terms and concepts defined in EDHOC <xref target="RFC9528"/> and with the use of EDHOC with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> defined in <xref target="RFC9668"/>.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
        <t>CBOR data items are represented using the CBOR extended diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/> ("diagnostic notation"). Diagnostic notation comments are used to provide a textual representation of the parameters' keys and values.</t>
        <t>In the CBOR diagnostic notation used in this document, constructs of the form e'SOME_NAME' are replaced by the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. For example, {e'methods' : [0, 1, 2, 3], e'cipher_suites': 3} stands for {1 : [0, 1, 2, 3], 2 : 3}.</t>
        <t>Note to RFC Editor: Please delete the paragraph immediately preceding this note. Also, in the CBOR diagnostic notation used in this document, please replace the constructs of the form e'SOME_NAME' with the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. Finally, please delete this note.</t>
      </section>
    </section>
    <section anchor="sec-app-profile-cbor">
      <name>EDHOC_Application_Profile</name>
      <t>This section defines the EDHOC_Application_Profile object, which can be used as a canonical representation of EDHOC application profiles for their description, distribution, and storage.</t>
      <t>An EDHOC_Application_Profile object is encoded as a CBOR map <xref target="RFC8949"/>. All elements that can be included in the EDHOC_Application_Profile object are elements that can be included in the CBOR-encoded EDHOC_Information object specified in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>. In particular, they use the same CBOR abbreviations from the 'CBOR label' column of the IANA registry "EDHOC Information" defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The CBOR map encoding an EDHOC_Application_Profile object <bcp14>MUST</bcp14> include the element "app_prof" defined in <xref target="sec-edhoc-information-object"/> of this document, as well as the elements "methods" and "cred_types" defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The value of the element "app_prof" is the unique identifier of the EDHOC application profile described by the instance of the EDHOC_Application_Profile object in question. The identifier is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in this document and encoded as a CBOR integer.</t>
      <t>The CBOR map <bcp14>MUST NOT</bcp14> include the following elements: "session_id", "uri_path", "initiator", "responder", and "trust_anchors". Also, the CBOR map <bcp14>MUST NOT</bcp14> include the element "exporter_out_len" defined in <xref target="exporter-out-length"/> of this document. A consumer <bcp14>MUST</bcp14> ignore those elements if they are included in the EDHOC_Application_Profile object.</t>
      <t>The CBOR map <bcp14>MAY</bcp14> include other elements.</t>
      <t>Furthermore, consistent with Sections <xref target="RFC9528" section="8" sectionFormat="bare"/> and <xref target="RFC9528" section="A.1" sectionFormat="bare"/> of <xref target="RFC9528"/> and with <xref section="5.4" sectionFormat="of" target="RFC8613"/>, the following applies:</t>
      <ul spacing="normal">
        <li>
          <t>If the element "cipher_suites" is not present in the CBOR map, this indicates that the EDHOC application profile uses the EDHOC cipher suites 2 and 3, and possibly other cipher suites.</t>
        </li>
        <li>
          <t>If the element "id_cred_types" is not present in the CBOR map, this indicates that the EDHOC application profile uses "kid" as type of authentication credential identifiers for EDHOC, and possibly other types of authentication credential identifiers.</t>
        </li>
        <li>
          <t>The absence of any other elements in the CBOR map <bcp14>MUST NOT</bcp14> result in assuming any value.</t>
        </li>
      </ul>
      <t>If an element is present in the CBOR map and the corresponding entry in the IANA registry "EDHOC Information" specifies "NP" (non-prescriptive) in the 'Type' column and "True or False" in the 'CBOR type' column, then the following applies. An EDHOC peer that adheres to the EDHOC application profile in question is required or not to support the property or feature of EDHOC associated with the element in the CBOR map, if that element encodes the CBOR simple value <tt>true</tt> (0xf5) or <tt>false</tt> (0xf4), respectively. For example, the presence of the parameter "comb_req" denotes whether EDHOC peers adhering to the EDHOC application profile have to support the EDHOC + OSCORE combined request defined in <xref target="RFC9668"/>, or instead do not have to but might if they are willing to.</t>
      <t>If an element present in the CBOR map specifies an information that is intrinsically a set of one or more co-existing alternatives, then all the specified alternatives apply for the EDHOC application profile in question. For example, the element "cipher_suites" with value the CBOR array [0, 2] means that, in order to adhere to the EDHOC application profile in question, an EDHOC peer has to implement both the EDHOC cipher suites 0 and 2, because either of them can be used by another EDHOC peer also adhering to the same EDHOC application profile.</t>
      <t>The CDDL grammar describing the EDHOC_Application_Profile object is:</t>
      <figure anchor="fig-cddl-edhoc_application-profile-object">
        <name>CDDL Definition of the EDHOC_Application_Profile object</name>
        <artwork type="CDDL" align="left"><![CDATA[
EDHOC_Application_Profile = {
      1 => int / array,    ; methods
      6 => int / array,    ; cred_types
     23 => int,            ; app_prof
   * int / tstr => any
}
]]></artwork>
      </figure>
    </section>
    <section anchor="identifying-edhoc-application-profiles-by-profile-id">
      <name>Identifying EDHOC Application Profiles by Profile ID</name>
      <t>This document introduces the concept of Profile IDs, i.e., integer values that uniquely identify EDHOC application profiles, for which an IANA registry is defined in <xref target="iana-edhoc-application-profiles"/>.</t>
      <t>This section defines two parameters to convey such Profile IDs, i.e.:</t>
      <ul spacing="normal">
        <li>
          <t>The parameter "ed-prof" for web linking <xref target="RFC8288"/> (see <xref target="web-linking"/>).</t>
        </li>
        <li>
          <t>The parameter "app_prof" of the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> (see <xref target="sec-edhoc-information-object"/>).  </t>
          <t>
As defined in <xref target="sec-app-profile-cbor"/>, Profile IDs are also conveyed by the parameter "app_prof" in the EDHOC_Application_Profile object, in order to identify the EDHOC application profile described by a given instance of that object.</t>
        </li>
      </ul>
      <t>As defined later in this document, Profile IDs can be used to identify EDHOC application profiles also:</t>
      <ul spacing="normal">
        <li>
          <t>Within certain EDHOC messages sent during an EDHOC session by a peer that supports such EDHOC application profiles (see <xref target="sec-app-profile-edhoc-messages"/>).</t>
        </li>
        <li>
          <t>When using SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/> to advertise the support for EDHOC and for EDHOC application profiles of a given server (see <xref target="sec-svcb"/>).</t>
        </li>
      </ul>
      <section anchor="web-linking">
        <name>In Web Linking</name>
        <t><xref section="6" sectionFormat="of" target="RFC9668"/> defines a number of target attributes that can be used in a web link <xref target="RFC8288"/> with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>). This is the case, e.g., when using a CoRE link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> as defined in <xref section="A.2" sectionFormat="of" target="RFC9528"/>. This allows a client to obtain relevant information about the EDHOC application profile(s) to be used with a certain EDHOC resource.</t>
        <t>In the same spirit, this section defines the following additional parameter, which can be optionally specified as a target attribute with the same name in the link to the respective EDHOC resource, or among the filter criteria in a discovery request from a client.</t>
        <ul spacing="normal">
          <li>
            <t>'ed-prof', specifying an EDHOC application profile supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying an EDHOC application profile.</t>
          </li>
        </ul>
        <t>When specifying the parameter 'ed-prof' in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
        <t>If a link to an EDHOC resource includes occurrences of the target attribute 'ed-prof', then the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The link <bcp14>MUST NOT</bcp14> include other target attributes that provide information about an EDHOC application profile (see, e.g., <xref section="6" sectionFormat="of" target="RFC9668"/> and <xref target="sec-parameters-web-linking"/> of this document), with the exception of the target attribute 'ed-ead' that <bcp14>MAY</bcp14> be included.  </t>
            <t>
The recipient <bcp14>MUST</bcp14> ignore other target attributes that provide information about an EDHOC application profile, with the exception of the target attribute 'ed-ead'.</t>
          </li>
          <li>
            <t>If the link includes occurrences of the target attribute 'ed-ead', the link provides the following information: when using the target EDHOC resource as per the EDHOC application profile indicated by any occurrence of the target attribute 'ed-prof', the server supports the External Authorization Data (EAD) items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the occurrences of the target attribute 'ed-ead'.</t>
          </li>
        </ul>
        <t>The example in <xref target="fig-web-link-example"/> shows how a CoAP client discovers two EDHOC resources at a CoAP server, and obtains information about the application profile corresponding to each of those resources. The CoRE Link Format notation from <xref section="5" sectionFormat="of" target="RFC6690"/> is used.</t>
        <t>The example assumes the existence of an EDHOC application profile identified by the integer Profile ID 500, which is supported by the EDHOC resource at /edhoc-alt and whose definition includes the support for the EAD items with EAD label 111 and 222.</t>
        <t>Therefore, the link to the EDHOC resource at /edhoc-alt indicates that, when using that EDHOC resource as per the EDHOC application profile with Profile ID 500, the server supports the EAD items with EAD label 111, 222, and 333.</t>
        <figure anchor="fig-web-link-example">
          <name>The Web Link.</name>
          <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=1;ed-cred-t=3;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req,
    </edhoc-alt>;rt=core.edhoc;ed-prof=500;ed-ead=333
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-edhoc-information-object">
        <name>In the EDHOC_Information Object</name>
        <t><xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines the EDHOC_Information object and an initial set of its parameters. The object can be used to convey information that guides two peers about executing the EDHOC protocol.</t>
        <t>This document defines the new parameter "app_prof" of the EDHOC_Information object. The parameter is of type non-prescriptive (NP) and is summarized in <xref target="_table-cbor-key-edhoc-params"/>. The parameter is specified further below.</t>
        <table align="center" anchor="_table-cbor-key-edhoc-params">
          <name>EDHOC_Information Parameter "app_prof"</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">CBOR label</th>
              <th align="left">CBOR type</th>
              <th align="left">Registry</th>
              <th align="left">Description</th>
              <th align="left">Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">app_prof</td>
              <td align="left">23</td>
              <td align="left">int or array</td>
              <td align="left">EDHOC Application Profiles Registry</td>
              <td align="left">Set of supported EDHOC Application Profiles</td>
              <td align="left">NP</td>
            </tr>
          </tbody>
        </table>
        <ul spacing="normal">
          <li>
            <t>app_prof: This parameter specifies a set of supported EDHOC application profiles, identified by their Profile ID. If the set is composed of a single EDHOC application profile, its Profile ID is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one Profile ID. In JSON, the "app_prof" value is an integer or an array of integers. In CBOR, "app_prof" is an integer or an array of integers, and has label 23. The integer values are taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
          </li>
        </ul>
        <section anchor="use-in-the-edhoc-and-oscore-profile-of-the-ace-framework">
          <name>Use in the EDHOC and OSCORE Profile of the ACE Framework</name>
          <t><xref section="3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines how the EDHOC_Information object can be used within the workflow of the EDHOC and OSCORE transport profile of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>.</t>
          <t>In particular, the AS-to-C Access Token Response includes the parameter "edhoc_info", with value an EDHOC_Information object. This allows the ACE authorization server (AS) to provide the ACE client (C) with information about how to run the EDHOC protocol with the ACE resource server (RS) for which the access token is issued.</t>
          <t>Similarly, the access token includes the corresponding claim "edhoc_info", with value an EDHOC_Information object. This allows the AS to provide the ACE RS with information about how to run the EDHOC protocol with the ACE client, according to the issued access token.</t>
          <t>In turn, the EDHOC_Information object can include the parameter "app_prof" defined in this document. This parameter indicates a set of EDHOC application profiles associated with the EDHOC resource to use at the RS, which is either implied or specified by the parameter "uri_path" within the same EDHOC_Information object.</t>
          <t>If the EDHOC_Information object specified as the value of the parameter/claim "edhoc_info" includes the "app_prof" parameter, then the following applies.</t>
          <ul spacing="normal">
            <li>
              <t>In addition to the "app_prof" parameter, the object <bcp14>MUST NOT</bcp14> include other parameters, with the exception of the following parameters that <bcp14>MAY</bcp14> be included:  </t>
              <ul spacing="normal">
                <li>
                  <t>The parameter "eads".</t>
                </li>
                <li>
                  <t>Any parameter that is not allowed in the EDHOC_Application_Profile object defined in <xref target="sec-app-profile-cbor"/>, unless its inclusion in the EDHOC_Information object is explicitly forbidden by the parameter's definition.      </t>
                  <t>
For example, the parameter "session_id" is not allowed in the EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) and thus can be included in the EDHOC_Information object, where in fact it has to be present (see Sections <xref target="I-D.ietf-ace-edhoc-oscore-profile" section="3.3" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-edhoc-oscore-profile" section="3.3.1" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
                </li>
              </ul>
              <t>
C and RS <bcp14>MUST</bcp14> ignore other parameters that are not admitted if they are present in the EDHOC_Information object.</t>
            </li>
            <li>
              <t>The object might provide an information that corresponds to an EDHOC_Information prescriptive parameter (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>), e.g., "message_4" or "max_msgsize". The type of a parameter is indicated in the 'Type' column of the corresponding entry in the IANA registry "EDHOC Information" (see <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).  </t>
              <t>
If the object specifies such an information multiple times, then each occurrence of that information <bcp14>MUST</bcp14> convey exactly the same content. This <bcp14>MUST</bcp14> take into account prescriptive parameters that are included: i) as elements of the EDHOC_Information object; or ii) as elements of an EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) encoding an EDHOC application profile, which is identified by its Profile ID specified in the "app_prof" parameter of the EDHOC_Information object.  </t>
              <t>
A consumer <bcp14>MUST</bcp14> treat as malformed an EDHOC_Information object that does not comply with the restriction above.</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the parameter "edhoc_info" of the AS-to-C Access Token Response includes the parameter "eads", then the following applies.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE RS for which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the claim "edhoc_info" of the access token includes the parameter "eads", then the following applies.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE client to which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-parameters-web-linking">
      <name>Additional Parameters for Web Linking</name>
      <t>Building on what is defined and prescribed in <xref section="6" sectionFormat="of" target="RFC9668"/>, this section defines additional parameters for web linking <xref target="RFC8288"/>, which can be used to obtain relevant pieces of information from the EDHOC application profile associated with an EDHOC resource.</t>
      <t>These parameters can be optionally specified as target attributes with the same name in a link with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>) targeting an EDHOC resource, or as filter criteria in a discovery request from a client.</t>
      <t>When specifying any of the parameters defined below in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
      <ul spacing="normal">
        <li>
          <t>'ed-max-msgsize', specifying the admitted maximum size of EDHOC messages in bytes. This parameter <bcp14>MUST</bcp14> specify a single unsigned integer value.</t>
        </li>
        <li>
          <t>'ed-coap-ct', specifying that CoAP messages have to include the CoAP Content-Format Option with value 64 (application/edhoc+cbor-seq) or 65 (application/cid-edhoc+cbor-seq) as appropriate, when the message payload includes exclusively an EDHOC message possibly prepended by an EDHOC connection identifier (see Sections <xref target="RFC9528" section="3.4.1" sectionFormat="bare"/> and <xref target="RFC9528" section="A.2" sectionFormat="bare"/> of <xref target="RFC9528"/>). A value <bcp14>MUST NOT</bcp14> be given to this parameter and any present value <bcp14>MUST</bcp14> be ignored by the recipient.</t>
        </li>
        <li>
          <t>'ed-epid-t', specifying a type of endpoint identity for EDHOC supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'CBOR Label' column of the "EDHOC Endpoint Identity Types" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying a type of endpoint identity for EDHOC.</t>
        </li>
        <li>
          <t>'ed-tp', specifying a means for transporting EDHOC messages supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Transport ID' column of the "EDHOC Transports" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying a means for transporting EDHOC messages.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-uuid', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a UUID <xref target="RFC9562"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the UUID in its string format (see Section 4 of <xref target="RFC9562"/>). This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-kid', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a binary key identifier. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the key identifier. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-c5t', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a hash of a C509 certificate <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the certificate hash encoded as a COSE_CertHash <xref target="RFC9360"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-c5u', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a URI <xref target="RFC3986"/> pointing to a C509 certificate <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the URI pointing to the certificate. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-x5t', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a hash of an X.509 certificate <xref target="RFC5280"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the base64url-encoded text string of the binary representation of the certificate hash encoded as a COSE_CertHash <xref target="RFC9360"/>. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
        <li>
          <t>'ed-ta-edcred-x5u', specifying the identifier of a trust anchor supported by the server for verifying authentication credentials of other EDHOC peers, as a URI <xref target="RFC3986"/> pointing to an X.509 certificate <xref target="RFC5280"/>. This parameter <bcp14>MUST</bcp14> specify a single value, which is the URI pointing to the certificate. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying one trust anchor identifier.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-app-profile-edhoc-messages">
      <name>Advertising Supported EDHOC Application Profiles during an EDHOC Session</name>
      <t>The rest of this section defines means that an EDHOC peer can use in order to advertise the EDHOC application profiles that it supports to another EDHOC peer, when running EDHOC with that other peer.</t>
      <t>Such means are an EDHOC EAD item (see <xref target="sec-app-profile-edhoc-message_1_2"/>) and an error code for the EDHOC error message (see <xref target="sec-app-profile-edhoc-error-message"/>).</t>
      <section anchor="sec-app-profile-edhoc-message_1_2">
        <name>In EDHOC Message 1 and Message 2</name>
        <t>This section defines the EDHOC EAD item "Supported EDHOC application profiles", which is registered in <xref target="iana-edhoc-ead-registry"/> of this document.</t>
        <t>The EAD item <bcp14>MAY</bcp14> be included:</t>
        <ul spacing="normal">
          <li>
            <t>In the EAD_1 field of EDHOC message_1, in order to specify EDHOC application profiles supported by the Initiator.</t>
          </li>
          <li>
            <t>In the EAD_2 field of EDHOC message_2, in order to specify EDHOC application profiles supported by the Responder.</t>
          </li>
        </ul>
        <t>When the EAD item is present, its ead_label TBD_EAD_LABEL <bcp14>MUST</bcp14> be used only with negative sign, i.e., the use of the EAD item is always critical (see <xref section="3.8" sectionFormat="of" target="RFC9528"/>).</t>
        <t>The EAD item <bcp14>MUST NOT</bcp14> occur more than once in the EAD fields of EDHOC message_1 or message_2. The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if the EAD item occurs multiple times in the EAD fields of EDHOC message_1 or message_2.</t>
        <t>The EAD item <bcp14>MUST NOT</bcp14> be included in the EAD fields of EDHOC message_3 or message_4. In case the recipient peer supports the EAD item, the recipient peer <bcp14>MUST</bcp14> silently ignore the EAD item if this is included in the EAD fields of EDHOC message_3 or message_4.</t>
        <t>The EAD item <bcp14>MUST</bcp14> specify an ead_value, as a CBOR byte string with value the binary representation of a CBOR sequence <xref target="RFC8742"/>. In particular:</t>
        <ul spacing="normal">
          <li>
            <t>When the EAD item is included in the EAD_1 field, the value of the CBOR byte string is the binary representation of the CBOR sequence OUTER_SEQ. In turn, OUTER_SEQ is composed of the following elements:  </t>
            <ul spacing="normal">
              <li>
                <t>The CBOR data item reply_flag, which <bcp14>MAY</bcp14> be present. If present, it <bcp14>MUST</bcp14> encode the CBOR simple value true (0xf5) or false (0xf4). The semantics of this element is as follows.      </t>
                <ul spacing="normal">
                  <li>
                    <t>If reply_flag is present and encodes the CBOR simple value true (0xf5), the Initiator is asking the Responder to advertise the EDHOC application profiles that it supports, within the EDHOC message sent in reply to EDHOC message_1.          </t>
                    <t>
If such a message is EDHOC message_2, the Responder relies on the EAD item "Supported EDHOC application profiles" included in the EAD_2 field. If such a message is an EDHOC error message with error code TBD_ERROR_CODE (see <xref target="sec-app-profile-edhoc-error-message"/>), the Responder relies on ERR_INFO.          </t>
                    <t>
If the Responder sends either of those messages in reply to such an EDHOC message_1, the Responder <bcp14>MUST</bcp14> honor the request from the Initiator and accordingly advertise the EDHOC application profiles that it supports.</t>
                  </li>
                  <li>
                    <t>If reply_flag is present and encodes the CBOR simple value false (0xf4), the Initiator is suggesting the Responder to not advertise the EDHOC application profiles that it supports, within the EDHOC message sent in reply to EDHOC message_1. This is relevant when the Initiator already knows what EDHOC application profiles are supported by the Responder, e.g., based on previous interactions with that Responder or on the outcome of a discovery process.          </t>
                    <t>
In spite of the suggestion from the Initiator, the Responder <bcp14>MAY</bcp14> still advertise the EDHOC application profiles that it supports, when replying to EDHOC message_1 with EDHOC message_2 or with an EDHOC error message with error code TBD_ERROR_CODE (see <xref target="sec-app-profile-edhoc-error-message"/>). For example, when sending EDHOC message_2, the Responder might wish to steer the rest of the EDHOC session in a specific way, by including the EAD item "Supported EDHOC application profiles" that specifies information corresponding to EDHOC_Information prescriptive parameters (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>The CBOR sequence APP_PROF_SEQ, which is specified further below.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>When the EAD item is included in the EAD_2 field, the value of the CBOR byte string is the binary representation of the CBOR sequence APP_PROF_SEQ.</t>
          </li>
        </ul>
        <t>The CBOR sequence APP_PROF_SEQ is composed of one or more elements, whose order has no meaning. Each element of the CBOR sequence <bcp14>MUST</bcp14> be either of the following:</t>
        <ul spacing="normal">
          <li>
            <t>A CBOR integer, specifying the Profile ID of an EDHOC application profile. The integer value is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.  </t>
            <t>
This element of the CBOR sequence indicates that the message sender supports the EDHOC application profile identified by the Profile ID.</t>
          </li>
          <li>
            <t>A CBOR array including at least two elements. In particular:  </t>
            <ul spacing="normal">
              <li>
                <t>The first element <bcp14>MUST</bcp14> be a CBOR integer, specifying the Profile ID of an EDHOC application profile. The integer value is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry.</t>
              </li>
              <li>
                <t>Each of the elements following the first one <bcp14>MUST</bcp14> be a CBOR unsigned integer, specifying the ead_label of an EAD item.</t>
              </li>
            </ul>
            <t>
This element of the CBOR sequence indicates that the message sender supports:  </t>
            <ul spacing="normal">
              <li>
                <t>The EDHOC application profile PROFILE identified by the Profile ID in the first element of the array; and</t>
              </li>
              <li>
                <t>The EAD items identified by the ead_label in the elements following the first one, in addition to the EAD items that are specified in the definition of the EDHOC application profile PROFILE.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>An EDHOC_Information object encoded in CBOR, i.e., as a CBOR map (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>).  </t>
            <t>
The EDHOC_Information object <bcp14>MUST NOT</bcp14> include the element "app_prof". Also, it <bcp14>MUST NOT</bcp14> include elements that are not allowed within the EDHOC_Application_Profile object defined in <xref target="sec-app-profile-cbor"/>, with the exception of the following elements that <bcp14>MAY</bcp14> be included:  </t>
            <ul spacing="normal">
              <li>
                <t>"trust_anchors".</t>
              </li>
              <li>
                <t>"exporter_out_len" (see <xref target="exporter-out-length"/>).</t>
              </li>
            </ul>
            <t>
This element of the CBOR sequence indicates that the message sender supports an EDHOC application profile consistent with the pieces of information specified by the EDHOC_Information object.</t>
          </li>
        </ul>
        <t>The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if ead_value is malformed or does not conform with the format defined above.</t>
        <t>It is possible that ead_value provides information corresponding to EDHOC_Information prescriptive parameters (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>), e.g., "message_4" or "max_msgsize". The type of such parameters is indicated in the 'Type' column of the corresponding entry in the IANA registry "EDHOC Information" (see <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
        <t>If the EAD item "Supported EDHOC application profiles" is included in EDHOC message_1 and/or message_2 during an EDHOC session, the peers participating in that session <bcp14>MUST NOT</bcp14> act in violation of what is indicated by prescriptive parameters that are specified in those EAD items. Upon receiving an EDHOC message, a peer <bcp14>MUST</bcp14> check whether the other peer has violated such indications. If any violation is found, the peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1.</t>
        <t>When composing ead_value, the sender peer <bcp14>MUST</bcp14> comply with the content restrictions specified in <xref target="sec-app-profile-edhoc-message_1_2-restrictions"/>.</t>
        <t>The CDDL grammar describing ead_value for the EAD item "Supported EDHOC application profiles" is shown in <xref target="fig-cddl-ead-value"/>.</t>
        <figure anchor="fig-cddl-ead-value">
          <name>CDDL Definition of ead_value for the EAD Item "Supported EDHOC application profiles"</name>
          <artwork type="CDDL" align="left"><![CDATA[
ead_value = ead_1_value / ead_2_value

ead_1_value = bytes .cborseq OUTER_SEQ

ead_2_value = bytes .cborseq APP_PROF_SEQ

; This defines an array, the elements of which
; are to be used in the CBOR Sequence OUTER_SEQ:
OUTER_SEQ = [?reply_flag, APP_PROF_SEQ]

reply_flag = bool

; This defines an array, the elements of which
; are to be used in the CBOR Sequence APP_PROF_SEQ:
APP_PROF_SEQ = [1* element]

element = profile_id / profile_id_with_eads / EDHOC_Information

profile_id = int

profile_id_with_eads = [profile_id, 1* uint]

; The full definition is provided in
; draft-ietf-ace-edhoc-oscore-profile
EDHOC_Information : map
]]></artwork>
        </figure>
        <section anchor="sec-app-profile-edhoc-message_1_2-restrictions">
          <name>Content Restrictions</name>
          <t>When the sender peer composes ead_value of the EDHOC EAD item "Supported EDHOC application profiles", the following applies.</t>
          <t>It is possible that ead_value provides an information corresponding to an EDHOC_Information prescriptive parameter (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>).</t>
          <t>If ead_value specifies such an information multiple times, then each occurrence of that information <bcp14>MUST</bcp14> convey exactly the same content. With reference to the CBOR sequence APP_PROF_SEQ defined in <xref target="sec-app-profile-edhoc-message_1_2"/>, the enforcement of these content restrictions <bcp14>MUST</bcp14> take into account prescriptive parameters that are included:</t>
          <ul spacing="normal">
            <li>
              <t>As elements of an EDHOC_Information object specified within APP_PROF_SEQ; or</t>
            </li>
            <li>
              <t>As elements of an EDHOC_Application_Profile object encoding an EDHOC application profile, which is identified by its Profile ID specified within APP_PROF_SEQ.</t>
            </li>
          </ul>
          <t>If the Responder receives the EAD item in the EAD_1 field of EDHOC message_1 and intends to include the EAD item in the EAD_2 field of EDHOC message_2, then the Responder <bcp14>MUST</bcp14> further take into account the presence of such information in the received EAD item when composing ead_value.</t>
          <t>A consumer <bcp14>MUST</bcp14> treat as malformed an EDHOC_Information object that does not comply with the restrictions above.</t>
        </section>
        <section anchor="exporter-out-length">
          <name>Agreeing on EDHOC_Exporter Output Lengths</name>
          <t>The main output of a successfully completed EDHOC session is the shared secret session key PRK_out (see <xref section="4.1.3" sectionFormat="of" target="RFC9528"/>).</t>
          <t>After having established PRK_out, the two peers can use the EDHOC_Exporter interface defined in <xref section="4.2.1" sectionFormat="of" target="RFC9528"/>, e.g., to derive keying material for an application protocol. Among its inputs, the EDHOC_Exporter interface includes "exporter_label" as a registered numeric identifier of the intended output and "length" as the length in bytes of the intended output.</t>
          <t>When using the EDHOC_Exporter interface, it is crucial that the two peers agree about the length in bytes of each intended output, in order to ensure the correctness of their operations. To this end, the two peers can rely on pre-defined default lengths, or agree out-of-band on alternative lengths.</t>
          <t>However, the two peers might need or prefer to explicitly agree about specific output lengths to use on a per-session basis. As described below, this can be achieved in-band, by using the EDHOC EAD item "Supported EDHOC application profiles" defined in <xref target="sec-app-profile-edhoc-message_1_2"/>.</t>
          <t>This document defines the new parameter "exporter_out_len" of the EDHOC_Information object (see <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>). The parameter is of type prescriptive (P) and is summarized in <xref target="_table-cbor-key-edhoc-params-2"/>. The parameter is specified further below.</t>
          <table align="center" anchor="_table-cbor-key-edhoc-params-2">
            <name>EDHOC_Information Parameter "exporter_out_len"</name>
            <thead>
              <tr>
                <th align="left">Name</th>
                <th align="left">CBOR label</th>
                <th align="left">CBOR type</th>
                <th align="left">Registry</th>
                <th align="left">Description</th>
                <th align="left">Type</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">exporter_out_len</td>
                <td align="left">22</td>
                <td align="left">array</td>
                <td align="left">EDHOC Exporter Labels</td>
                <td align="left">Set of output lengths to use with the EDHOC_Exporter interface</td>
                <td align="left">P</td>
              </tr>
            </tbody>
          </table>
          <ul spacing="normal">
            <li>
              <t>exporter_out_len: This parameter specifies a set of pairs (X, Y), where:  </t>
              <ul spacing="normal">
                <li>
                  <t>The first element X specifies a value to use as first argument "exporter_label" when invoking the EDHOC_Exporter interface (see <xref section="4.2.1" sectionFormat="of" target="RFC9528"/>).      </t>
                  <t>
The value of X is taken from the 'Label' column of the "EDHOC Exporter Labels" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group <xref target="EDHOC.Exporter.Labels"/>.</t>
                </li>
                <li>
                  <t>The second element Y specifies the value to use as third argument "length" when invoking the EDHOC_Exporter interface using the value specified by X as first argument "exporter_label" (see <xref section="4.2.1" sectionFormat="of" target="RFC9528"/>).      </t>
                  <t>
The value specified by Y <bcp14>MUST</bcp14> be a valid value to use as "length" when using the value specified by X as "exporter_label". For example, when X specifies 0 as the "exporter_label" to derive an OSCORE Master Secret <xref target="RFC8613"/>, Y is required to be not less than the "length" default value defined in <xref section="A.1" sectionFormat="of" target="RFC9528"/>, i.e., the key length (in bytes) of the application AEAD Algorithm of the selected cipher suite for the EDHOC session.</t>
                </li>
              </ul>
              <t>
The set is encoded as an array, each element of which <bcp14>MUST</bcp14> be an array of exactly two elements, hence encoding one pair (X, Y). That is, each inner array includes X encoded as an unsigned integer and Y encoded as an unsigned integer, in this order.  </t>
              <t>
Within the set of pairs (X, Y), the order of the inner arrays encoding the pairs is not relevant. The set <bcp14>MUST NOT</bcp14> specify multiple pairs that have the same unsigned integer value as their first element X.  </t>
              <t>
In JSON, the "exporter_out_len" value is an array, each element of which is an array including two unsigned integers. In CBOR, "exporter_out_len" is an array, each element of which is an array including two unsigned integers, and has label 22.</t>
            </li>
          </ul>
          <t>Within ead_value of the EAD item "Supported EDHOC application profiles", the parameter "exporter_out_len" can be included within instances of the EDHOC_Information object that are specified within the CBOR sequence APP_PROF_SEQ (see <xref target="sec-app-profile-edhoc-message_1_2"/>).</t>
          <t>The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if any of the following occurs:</t>
          <ul spacing="normal">
            <li>
              <t>The recipient peer does not recognize the value encoded by the first element X of a pair (X, Y) as a valid "exporter_label" to be used when invoking the EDHOC_Exporter interface.</t>
            </li>
            <li>
              <t>In a pair (X, Y), the value encoded by the second element Y is not valid to be used as "length" when invoking the EDHOC_Exporter interface using the value encoded by the first element X as "exporter_label".</t>
            </li>
            <li>
              <t>For a pair (X, Y), the recipient peer is not going to be able to invoke the EDHOC_Exporter interface using the values encoded by X and Y as the first argument "exporter_label" and the third argument "length", respectively.</t>
            </li>
          </ul>
          <t>If the Responder has received an EDHOC message_1 including the EAD item "Supported EDHOC application profiles" and specifying the parameter "exporter_out_len", then the following applies if the Responder includes the EAD item "Supported EDHOC application profiles" in EDHOC message_2, with ead_value specifying the parameter "exporter_out_len". Within ead_value of the EAD item included in EDHOC message_2, the Responder <bcp14>MUST NOT</bcp14> specify any pair (X, Y) such that the unsigned integer value encoded by X was encoded by the first element of a pair within the EAD item included in the received EDHOC message_1.</t>
          <t>If the Initiator receives an EDHOC message_2 including the EAD item "Supported EDHOC application profiles" and specifying the parameter "exporter_out_len", then the following applies if the Initiator included the EAD item "Supported EDHOC application profiles" in EDHOC message_1, with ead_value specifying the parameter "exporter_out_len". The Initiator <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if ead_value of the EAD item included in EDHOC message_2 specifies any pair (X, Y) such that the unsigned integer value encoded by X was encoded by the first element of a pair of the EAD item included in the sent EDHOC message_1.</t>
          <t>Since the parameter "exporter_out_len" is of type prescriptive, the restrictions compiled in <xref target="sec-app-profile-edhoc-message_1_2-restrictions"/> apply. In particular, the "information" corresponding to the prescriptive parameter "exporter_out_len" is the "length" Y to use when invoking the EDHOC_Exporter interface using the paired "exporter_label" X.</t>
          <t>That is, if ead_value provides the length of the EDHOC_Exporter output for a given "exporter_label" multiple times, then each of such occurrences <bcp14>MUST</bcp14> specify the same "length" value. Within this constraint, it remains possible for ead_value to specify multiple instances of the EDHOC_Information object within APP_PROF_SEQ and for each of such instances to include the parameter "exporter_out_len", which can overall encode a value different from that of the same parameter in another instance of the EDHOC_Information object.</t>
          <t>The recipient peer <bcp14>MUST</bcp14> abort the EDHOC session and <bcp14>MUST</bcp14> reply with an EDHOC error message with error code (ERR_CODE) 1, if the parameter "exporter_out_len" is malformed or does not conform with the format and constraints defined above.</t>
          <t>In an EDHOC session during which the EAD item "Supported EDHOC application profiles" has been included in EDHOC message_1 and/or message_2 as specifying the parameter "exporter_out_len", the following applies.</t>
          <ul spacing="normal">
            <li>
              <t>The Initiator (Responder) considers the successful verification of EDHOC message_2 (message_3) as a confirmed agreement with the other peer about how to invoke the EDHOC_Exporter interface, once the session key PRK_out for the present EDHOC session is available.  </t>
              <t>
That is, for each pair (X, Y) specified by the exchanged EAD items, the two peers <bcp14>MUST</bcp14> use the unsigned integer values encoded by X and Y as the first argument "exporter_label" and the third argument "length", respectively.</t>
            </li>
            <li>
              <t>If a particular "exporter_label" value is not specified by the exchanged EAD items, then a possible invocation of the EDHOC_Exporter interface using that value as its first argument takes as value for its third argument "length" a pre-defined default value, or an alternative value agreed out-of-band.</t>
            </li>
          </ul>
          <t>When using the EDHOC and OSCORE transport profile of the ACE framework <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>, the parameter "exporter_out_len" <bcp14>MUST NOT</bcp14> be included within the EDHOC_Information object specified as the value of the parameter/claim "edhoc_info".</t>
        </section>
      </section>
      <section anchor="sec-app-profile-edhoc-error-message">
        <name>In the EDHOC Error Message</name>
        <t>This section defines the error code TBD_ERROR_CODE, which is registered in <xref target="iana-edhoc-error-codes-registry"/> of this document.</t>
        <t>Error code TBD_ERROR_CODE <bcp14>MUST</bcp14> only be used when replying to EDHOC message_1. If an EDHOC error message with error code TBD_ERROR_CODE is received as reply to an EDHOC message different from EDHOC message_1, then the recipient of the error message <bcp14>MUST</bcp14> ignore what is specified in ERR_INFO.</t>
        <t>The Responder <bcp14>MUST NOT</bcp14> abort an EDHOC session exclusively due to the wish of sending an error message with error code TBD_ERROR_CODE. Instead, the Responder can advertise the EDHOC application profiles that it supports to the Initiator by means of the EAD item "Supported EDHOC application profiles" defined in <xref target="sec-app-profile-edhoc-message_1_2"/>, specifying it in the EAD_2 field of the EDHOC message_2 to send in the EDHOC session.</t>
        <t>When replying to an EDHOC message_1 with an error message, the Responder has to consider the reason for which it is aborting the EDHOC session and <bcp14>MUST NOT</bcp14> specify error code TBD_ERROR_CODE if a different, more appropriate error code can be specified instead. For example, if the negotiation of the selected cipher suite fails (see <xref section="6.3" sectionFormat="of" target="RFC9528"/>), the error message <bcp14>MUST NOT</bcp14> specify error code TBD_ERROR_CODE, since the error message intended to be used in that case specifies error code 2 (Wrong selected cipher suite) and conveys SUITES_R as ERR_INFO.</t>
        <t>When using error code TBD_ERROR_CODE, the error information specified in ERR_INFO <bcp14>MUST</bcp14> be a CBOR byte string with value the binary representation of a CBOR sequence APP_PROF_SEQ.</t>
        <t>In particular, APP_PROF_SEQ has the same format and semantics specified in <xref target="sec-app-profile-edhoc-message_1_2"/>, except for the following difference: for each element of the CBOR sequence that is an EDHOC_Information object, such an object <bcp14>MUST NOT</bcp14> include the element "exporter_out_len" defined in <xref target="exporter-out-length"/>.</t>
        <t>The recipient peer <bcp14>MUST</bcp14> silently ignore elements of the CBOR sequence APP_PROF_SEQ that are malformed or do not conform with the intended format of APP_PROF_SEQ.</t>
      </section>
    </section>
    <section anchor="sec-svcb">
      <name>Advertising Supported EDHOC Application Profiles using SVCB Resource Records</name>
      <t>Given a server, its support for EDHOC and for EDHOC application profiles can be advertised using SVCB Resource Records (RR) <xref target="RFC9460"/><xref target="RFC9461"/>.</t>
      <t>To this end, this document specifies the SvcParamKeys "edhocpath" and "edhoc-app-prof", which are defined below and are registered in <xref target="iana-svcb"/>.</t>
      <ul spacing="normal">
        <li>
          <t>"edhocpath" - The SvcParamKey "edhocpath" is single-valued and specifies a list of one or more absolute paths to EDHOC resources at the server.  </t>
          <ul spacing="normal">
            <li>
              <t>The wire-format value of "edhocpath" is the binary representation of the CBOR data item edhocpath-value, which <bcp14>MUST</bcp14> exactly fill the SvcParamValue.      </t>
              <t>
In particular, edhocpath-value <bcp14>MUST</bcp14> be a CBOR byte string PATH_BSTR or a CBOR array. In the latter case, the array <bcp14>MUST</bcp14> include at least two elements, each of which <bcp14>MUST</bcp14> be a CBOR byte string PATH_BSTR. The SVCB RR <bcp14>MUST</bcp14> be considered malformed if the SvcParamValue ends within edhocpath-value or if edhocpath-value is malformed.      </t>
              <t>
The value of each CBOR byte string PATH_BSTR is the binary representation of a CBOR sequence PATH_SEQ composed of zero or more CBOR text strings. In particular, each PATH_SEQ specifies the URI path of an EDHOC resource at the server, with each CBOR text string within that PATH_SEQ specifying a URI path segment.      </t>
              <t>
If edhocpath-value is a CBOR array, it <bcp14>MUST NOT</bcp14> include any two elements that specify the same URI path.      </t>
              <t>
The CDDL grammar describing the CBOR data item edhocpath-value is shown in <xref target="fig-cddl-edhocpath-value"/>.</t>
            </li>
            <li>
              <t>The presentation format value of "edhocpath" <bcp14>SHALL</bcp14> be a comma-separated list (see <xref section="A.1" sectionFormat="of" target="RFC9460"/>) of one or more absolute paths to EDHOC resources at the server. The same considerations for the "," and "\" characters in paths for zone-file implementations as for the alpn-ids in an "alpn" SvcParam apply (see <xref section="7.1.1" sectionFormat="of" target="RFC9460"/>).      </t>
              <t>
The i-th path in the presentation format value is the textual representation of the path specified by the i-th CBOR sequence PATH_SEQ in the wire-format value (see above).      </t>
              <t>
The textual representation of each path follows the semantics of path-absolute shown in the ABNF definition in <xref target="fig-edhocpath-value-path-abnf"/>, which is provided by the ABNF for path-absolute in <xref section="3.3" sectionFormat="of" target="RFC3986"/>. In particular, given the path specified by a CBOR sequence PATH_SEQ, segment-nz is the value of the first CBOR text string in PATH_SEQ (if any), while each segment is the value of a CBOR text string following the first one in PATH_SEQ (if any).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>"edhoc-app-prof" - The SvcParamKey "edhoc-app-prof" is single-valued and specifies a set of EDHOC application profiles that the server supports.  </t>
          <ul spacing="normal">
            <li>
              <t>The wire-format value of "edhoc-app-prof" is the binary representation of the CBOR data item edhoc-app-prof-value, which <bcp14>MUST</bcp14> exactly fill the SvcParamValue.      </t>
              <t>
In particular, edhoc-app-prof-value <bcp14>MUST</bcp14> be a CBOR byte string APP_BSTR or a CBOR array. In the latter case, the array <bcp14>MUST</bcp14> include at least two elements, each of which <bcp14>MUST</bcp14> be a CBOR byte string APP_BSTR. The SVCB RR <bcp14>MUST</bcp14> be considered malformed if the SvcParamValue ends within edhoc-app-prof-value or if edhoc-app-prof-value is malformed.      </t>
              <t>
The value of each CBOR byte string APP_BSTR is the binary representation of a CBOR sequence APP_PROF_SEQ. In particular, APP_PROF_SEQ has the same format and semantics specified in <xref target="sec-app-profile-edhoc-message_1_2"/>, except for the following difference: for each element of the CBOR sequence that is an EDHOC_Information object, such an object <bcp14>MUST NOT</bcp14> include the element "exporter_out_len" defined in <xref target="exporter-out-length"/>.      </t>
              <t>
The SVCB RR <bcp14>MUST</bcp14> be considered malformed if APP_PROF_SEQ is malformed or does not conform with the intended format.      </t>
              <t>
The CDDL grammar describing the CBOR data item edhoc-app-prof-value is shown in <xref target="fig-cddl-edhoc-app-prof-value"/>.</t>
            </li>
            <li>
              <t>The presentation format value of "edhoc-app-prof" <bcp14>SHALL</bcp14> be the CBOR extended diagnostic notation (see <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>) of edhoc-app-prof-value in the wire-format value (see above). When producing the presentation format value, care ought to be taken in representing Unicode with the limited ASCII character subset (e.g., by means of Punycode <xref target="RFC3492"/>) and in removing unnecessary common blank spaces within the CBOR extended diagnostic notation.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>If the SvcParamKey "edhoc-app-prof" is not present in the SVCB RR, then the SvcParamKey "edhocpath", if present, specifies the URI paths of EDHOC resources at the server.</t>
      <t>If the SvcParamKey "edhoc-app-prof" is present in the SVCB RR, then the following applies.</t>
      <ul spacing="normal">
        <li>
          <t>If the SvcParamKey "edhocpath" is not present in the SVCB RR, then the value of the SvcParamKey "edhoc-app-prof" <bcp14>MUST</bcp14> be a CBOR byte string.  </t>
          <t>
The information specified by the SvcParamKey "edhoc-app-prof" pertains to the EDHOC resource at the server with URI path "/.well-known/edhoc".</t>
        </li>
        <li>
          <t>If the SvcParamKey "edhocpath" is present in the SVCB RR, then the following applies.  </t>
          <ul spacing="normal">
            <li>
              <t>If the value of the SvcParamKey "edhocpath" is a CBOR byte string, then the value of the SvcParamKey "edhoc-app-prof" <bcp14>MUST</bcp14> also be a CBOR byte string.      </t>
              <t>
The information specified by the SvcParamKey "edhoc-app-prof" pertains to the EDHOC resource at the server with URI path specified by the SvcParamKey "edhocpath".</t>
            </li>
            <li>
              <t>If the value of the SvcParamKey "edhocpath" is a CBOR array including N elements, then the value of the SvcParamKey "edhoc-app-prof" <bcp14>MUST</bcp14> also be a CBOR array including N elements.      </t>
              <t>
The information specified by the i-th element of the CBOR array within the SvcParamKey "edhoc-app-prof" pertains to the EDHOC resource at the server with URI path specified by the i-th element of the CBOR array within the SvcParamKey "edhocpath".</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>A consumer <bcp14>MUST</bcp14> treat as malformed an SVCB RR, in case the SvcParamKeys "edhocpath" and "edhoc-app-prof", if present, do not comply with the format and restrictions defined above.</t>
      <figure anchor="fig-cddl-edhocpath-value">
        <name>CDDL Definition of the value of the SvcParamKey "edhocpath"</name>
        <artwork type="CDDL" align="left"><![CDATA[
edhocpath-value = PATH_BSTR / [2* PATH_BSTR]

PATH_BSTR = bytes .cborseq PATH_SEQ

; This defines an array, the elements of which
; are to be used in the CBOR Sequence PATH_SEQ:
PATH_SEQ = [* path_segment]

path_segment = tstr
]]></artwork>
      </figure>
      <figure anchor="fig-edhocpath-value-path-abnf">
        <name>ABNF Definition of path-absolute</name>
        <artwork type="ABNF" align="left"><![CDATA[
path-absolute = "/" [ segment-nz *( "/" segment ) ]

segment       = *pchar
segment-nz    = 1*pchar

pchar = unreserved / pct-encoded / sub-delims / ":" / "@"

unreserved    = ALPHA / DIGIT / "-" / "." / "_" / "~"
pct-encoded   = "%" HEXDIG HEXDIG
sub-delims    = "!" / "$" / "&" / "'" / "(" / ")"
             / "*" / "+" / "," / ";" / "="
]]></artwork>
      </figure>
      <figure anchor="fig-cddl-edhoc-app-prof-value">
        <name>CDDL Definition of the value of the SvcParamKey "edhoc-app-prof"</name>
        <artwork type="CDDL" align="left"><![CDATA[
edhoc-app-prof-value = APP_BSTR / [2* APP_BSTR]

; The full definition of APP_PROF_SEQ
; is provided in Section 5.1
APP_BSTR = bytes .cborseq APP_PROF_SEQ
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-well-known-app-profiles">
      <name>Well-known EDHOC Application Profiles</name>
      <t>This section defines a set of well-known EDHOC application profiles that are meant to reflect what is most common and expected to be supported by EDHOC peers.</t>
      <t>The well-known application profiles are <em>not</em> to be intended as "default" profiles to use, in case no other indication is provided to EDHOC peers.</t>
      <t>In particular, an EDHOC peer <bcp14>MUST NOT</bcp14> assume that, unless otherwise indicated, any of such profiles is used when running EDHOC through a well-known EDHOC resource, such as the resource at /.well-known/edhoc when EDHOC messages are transported as payload of CoAP messages (see <xref section="A.2" sectionFormat="of" target="RFC9528"/>).</t>
      <t>Building on the above, the well-known application profiles are <em>not</em> intended to deviate from what is mandatory to support for EDHOC peers, which is defined by the compliance requirements in <xref section="8" sectionFormat="of" target="RFC9528"/>.</t>
      <t>The rest of this section defines the well-known application profiles, each of which is represented by means of an EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) using the CBOR extended diagnostic notation.</t>
      <t>An entry for each well-known application profile is also registered at the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
      <section anchor="well-known-application-profile-minimalcs2">
        <name>Well-Known Application Profile MINIMAL_CS_2</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-MINIMAL-CS-2'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-minimalcs0">
        <name>Well-Known Application Profile MINIMAL_CS_0</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-MINIMAL-CS-0'
}
]]></sourcecode>
      </section>
      <section anchor="well-known-application-profile-basiccs2x509">
        <name>Well-Known Application Profile BASIC_CS_2_X509</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                             and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-2-X509'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-basiccs0x509">
        <name>Well-Known Application Profile BASIC_CS_0_X509</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                             and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-0-X509'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-basiccs2c509">
        <name>Well-Known Application Profile BASIC_CS_2_C509</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                        and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-2-C509'
}
]]></sourcecode>
      </section>
      <section anchor="well-known-application-profile-basiccs0c509">
        <name>Well-Known Application Profile BASIC_CS_0_C509</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                        and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-BASIC-CS-0-C509'
}
]]></sourcecode>
      </section>
      <section anchor="well-known-application-profile-intermediatecs2">
        <name>Well-Known Application Profile INTERMEDIATE_CS_2</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                           X.509 certificate,
                                           and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                      x5t, x5chain,
                                                      c5t, and c5c /
       e'app_prof' : e'APP-PROF-INTERMEDIATE-CS-2'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-intermediatecs0">
        <name>Well-Known Application Profile INTERMEDIATE_CS_0</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                             X.509 certificate,
                                             and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                      x5t, x5chain,
                                                      c5t, and c5c /
       e'app_prof' : e'APP-PROF-INTERMEDIATE-CS-0'
}
]]></sourcecode>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-extensive">
        <name>Well-Known Application Profile EXTENSIVE</name>
        <sourcecode type="CDDL"><![CDATA[
{
        e'methods' : [0, 1, 2, 3], / EDHOC Method Types
                                     0, 1, 2, and 3 /
  e'cipher_suites' : [0, 1, 2, 3], / EDHOC Cipher Suites
                                     0, 1, 2, and 3 /
     e'cred_types' : [1, 0, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                              CWT, X.509 certificate,
                                              and C509 certificate /
  e'id_cred_types' : [4, 14, 13, 34, 33, e'c5t', e'c5c'], / kid,
                                                          kccs, kcwt,
                                                          x5t,
                                                          x5chain,
                                                          c5t, and
                                                          c5c /
       e'app_prof' : e'APP-PROF-EXTENSIVE'
}
]]></sourcecode>
        <t>This application profile is aligned with the example traces of EDHOC compiled in Sections <xref target="RFC9529" section="2" sectionFormat="bare"/> and <xref target="RFC9529" section="3" sectionFormat="bare"/> of <xref target="RFC9529"/>.</t>
      </section>
    </section>
    <section anchor="sec-edhoc-well-known-app-profiles">
      <name>Identifiers of Well-known EDHOC Application Profiles</name>
      <t>This document defines the following identifiers of well-known EDHOC application profiles.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <table align="center" anchor="_table-edhoc-well-known-app-profiles">
        <name>EDHOC Well-known Application Profiles</name>
        <thead>
          <tr>
            <th align="left">Profile ID</th>
            <th align="left">Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">MINIMAL-CS-2</td>
            <td align="left">Method 3; Cipher Suite 2; CCS; kid</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">MINIMAL-CS-0</td>
            <td align="left">Method 3; Cipher Suite 0; CCS; kid</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">BASIC-CS-2-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">BASIC-CS-0-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">BASIC-CS-2-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">BASIC-CS_0-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">INTERMEDIATE-CS-2</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">INTERMEDIATE-CS-0</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">EXTENSIVE</td>
            <td align="left">Methods (0, 1, 2, 3); Cipher Suites (0, 1, 2, 3); (CCS, CWT, X.509/C509 certificates); (kid, kccs, kcwt, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-media-type">
        <name>Media Type Registrations</name>
        <t>IANA is asked to register the media type "application/edhoc-app-profile+cbor-seq". This registration follows the procedures specified in <xref target="RFC6838"/>.</t>
        <t>Type name: application</t>
        <t>Subtype name: edhoc-app-profile+cbor-seq</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: Must be encoded as a CBOR sequence <xref target="RFC8742"/> of CBOR maps <xref target="RFC8949"/>. Each element of each CBOR map is also defined as an element of the CBOR-encoded EDHOC_Information object from <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>Security considerations: See <xref target="sec-security-considerations"/> of [RFC-XXXX].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [RFC-XXXX]</t>
        <t>Applications that use this media type: Applications that need to describe, distribute, and store a representation of an EDHOC application profile (see [RFC-XXXX] and <xref section="3.9" sectionFormat="of" target="RFC9528"/>).</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information: N/A</t>
        <t>Person &amp; email address to contact for further information: LAKE WG mailing list (lake@ietf.org) or IETF Applications and Real-Time Area (art@ietf.org)</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: None</t>
        <t>Author/Change controller: IETF</t>
        <t>Provisional registration: No</t>
      </section>
      <section anchor="iana-content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is asked to add the following entry to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Content Type: application/edhoc-app-profile+cbor-seq</t>
        <t>Content Coding: -</t>
        <t>ID: TBD (range 0-255)</t>
        <t>Reference: [RFC-XXXX]</t>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entries in the "Target Attributes" registry within the "Constrained RESTful Environments (CoRE) Parameters", as per <xref target="RFC9423"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-max-msgsize</t>
          </li>
          <li>
            <t>Brief Description: The admitted maximum size of EDHOC messages in bytes</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-coap-ct</t>
          </li>
          <li>
            <t>Brief Description: Requested use of the CoAP Content-Format Option in CoAP messages whose payload includes exclusively an EDHOC message, possibly prepended by an EDHOC connection identifier</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-epid-t</t>
          </li>
          <li>
            <t>Brief Description: A supported type of endpoint identity for EDHOC</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-tp</t>
          </li>
          <li>
            <t>Brief Description: A supported means for transporting EDHOC messages</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-prof</t>
          </li>
          <li>
            <t>Brief Description: A supported EDHOC application profile</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-uuid</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a UUID</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-kid</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a binary key identifier</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-c5t</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a hash of a C509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-c5u</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a URI pointing to a C509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-x5t</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a hash of an X.509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-ta-edcred-x5u</t>
          </li>
          <li>
            <t>Brief Description: Identifier of a supported trust anchor for verifying authentication credentials of other EDHOC peers, as a URI pointing to an X.509 certificate</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-information-registry">
        <name>EDHOC Information Registry</name>
        <t>IANA is asked to register the following entries in the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: exporter_out_len</t>
          </li>
          <li>
            <t>CBOR label: 22 (suggested)</t>
          </li>
          <li>
            <t>CBOR type: array</t>
          </li>
          <li>
            <t>Registry: EDHOC Exporter Labels</t>
          </li>
          <li>
            <t>Description: Set of output lengths to use with the EDHOC_Exporter interface</t>
          </li>
          <li>
            <t>Type: P</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: app_prof</t>
          </li>
          <li>
            <t>CBOR label: 23 (suggested)</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Application Profiles registry</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Type: NP</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-ead-registry">
        <name>EDHOC External Authorization Data Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC External Authorization Data" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Label: TBD_EAD_LABEL (range 0-23)</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-error-codes-registry">
        <name>EDHOC Error Codes Registry</name>
        <t>IANA is asked to register the following entry in the "EDHOC Error Codes" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <ul spacing="normal">
          <li>
            <t>ERR_CODE: TBD_ERROR_CODE (range -24 to 23)</t>
          </li>
          <li>
            <t>ERR_INFO Type: app_profiles</t>
          </li>
          <li>
            <t>Description: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-svcb">
        <name>DNS SVCB Service Parameter Keys (SvcParamKeys)</name>
        <t>IANA is asked to add the following entries to the "Service Parameter Keys (SvcParamKeys)" registry within the "DNS Service Bindings (SVCB)" registry group. The definition of these parameters can be found in <xref target="sec-svcb"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Number: 11 (suggested)</t>
          </li>
          <li>
            <t>Name: edhocpath</t>
          </li>
          <li>
            <t>Meaning: EDHOC resource path</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Number: 12 (suggested)</t>
          </li>
          <li>
            <t>Name: edhoc-app-prof</t>
          </li>
          <li>
            <t>Meaning: Supported EDHOC application profiles</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-application-profiles">
        <name>EDHOC Application Profiles Registry</name>
        <t>IANA is requested to create a new "EDHOC Application Profiles" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Profile ID: This field contains the value used to identify the EDHOC application profile. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Name: This field contains the name of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the EDHOC application profile.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-well-known-app-profiles"/>.</t>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>"Standards Action with Expert Review" and "Specification Required" are two of the registration policies defined for the IANA registry established in this document. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts need to make sure that the object of registration is clearly defined in the corresponding specification. Entries that do not meet these objective of clarity and completeness must not be registered.</t>
          </li>
          <li>
            <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as "Private Use" are intended for testing purposes and closed environments. Code points in other ranges should not be assigned for testing.</t>
          </li>
          <li>
            <t>Specifications are required for the "Standards Action With Expert Review" range of point assignment. Specifications should exist for "Specification Required" ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
          </li>
          <li>
            <t>Experts should take into account the expected usage of fields when approving point assignment. Documents published via Standards Action can also register points outside the Standards Action range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth client and resource
   server, and it binds an authentication credential of the client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications between the client and resource
   server when accessing protected resources according to the
   authorization information indicated in the access token.  This
   profile can be used to delegate management of authorization
   information from a resource-constrained server to a trusted host with
   less severe limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-08"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA 1.0, RPKI,
   GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles.
   C509 is deployed in different settings including, in-vehicle and
   vehicle-to-cloud communication, Unmanned Aircraft Systems (UAS), and
   Global Navigation Satellite System (GNSS).  When used to re-encode
   DER encoded X.509 certificates, the CBOR encoding can in many cases
   reduce the size of RFC 7925 profiled certificates by over 50% while
   also significantly reducing memory and code size compared to ASN.1.
   The CBOR encoded structure can alternatively be signed directly
   ("natively signed"), which does not require re-encoding for the
   signature to be verified.  The TLSA selectors registry defined in RFC
   6698 is extended to include C509 certificates.  The document also
   specifies C509 Certificate Requests, C509 COSE headers, a C509 TLS
   certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-15"/>
        </reference>
        <reference anchor="EDHOC.Exporter.Labels" target="https://www.iana.org/assignments/edhoc/edhoc.xhtml#edhoc-exporter-labels">
          <front>
            <title>EDHOC Exporter Labels</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3492">
          <front>
            <title>Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)</title>
            <author fullname="A. Costello" initials="A." surname="Costello"/>
            <date month="March" year="2003"/>
            <abstract>
              <t>Punycode is a simple and efficient transfer encoding syntax designed for use with Internationalized Domain Names in Applications (IDNA). It uniquely and reversibly transforms a Unicode string into an ASCII string. ASCII characters in the Unicode string are represented literally, and non-ASCII characters are represented by ASCII characters that are allowed in host name labels (letters, digits, and hyphens). This document defines a general algorithm called Bootstring that allows a string of basic code points to uniquely represent any string of code points drawn from a larger set. Punycode is an instance of Bootstring that uses particular parameter values specified by this document, appropriate for IDNA. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3492"/>
          <seriesInfo name="DOI" value="10.17487/RFC3492"/>
        </reference>
        <reference anchor="RFC9423">
          <front>
            <title>Constrained RESTful Environments (CoRE) Target Attributes Registry</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>The Constrained RESTful Environments (CoRE) specifications apply web technologies to constrained environments. One such important technology is Web Linking (RFC 8288), which CoRE specifications use as the basis for a number of discovery protocols, such as the Link Format (RFC 6690) in the Constrained Application Protocol's (CoAP's) resource discovery process (Section 7.2 of RFC 7252) and the Resource Directory (RD) (RFC 9176).</t>
              <t>Web Links can have target attributes, the names of which are not generally coordinated by the Web Linking specification (Section 2.2 of RFC 8288). This document introduces an IANA registry for coordinating names of target attributes when used in CoRE. It updates the "RD Parameters" IANA registry created by RFC 9176 to coordinate with this registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9423"/>
          <seriesInfo name="DOI" value="10.17487/RFC9423"/>
        </reference>
        <reference anchor="RFC9529">
          <front>
            <title>Traces of Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Serafin" initials="M." surname="Serafin"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="M. Vučinić" initials="M." surname="Vučinić"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document contains example traces of Ephemeral Diffie-Hellman Over COSE (EDHOC).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9529"/>
          <seriesInfo name="DOI" value="10.17487/RFC9529"/>
        </reference>
        <reference anchor="I-D.serafin-lake-ta-hint">
          <front>
            <title>Trust Anchor Hints in Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Marek Serafin" initials="M." surname="Serafin">
              <organization>ASSA ABLOY</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a format for transport of hints about Trust
   Anchors of trusted third parties when using the lightweight
   authenticated key exchange protocol Ephemeral Diffie-Hellman Over
   COSE (EDHOC).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-serafin-lake-ta-hint-00"/>
        </reference>
      </references>
    </references>
    <?line 1013?>

<section anchor="sec-cddl-model" removeInRFC="true">
      <name>CDDL Model</name>
      <figure anchor="fig-cddl-model">
        <name>CDDL model</name>
        <artwork type="CDDL" align="left"><![CDATA[
; EDHOC Information
methods = 1
cipher_suites = 2
cred_types = 6
id_cred_types = 7
app_prof = 23

; EDHOC Application Profiles
APP-PROF-MINIMAL-CS-2 = 0
APP-PROF-MINIMAL-CS-0 = 1
APP-PROF-BASIC-CS-2-X509 = 2
APP-PROF-BASIC-CS-0-X509 = 3
APP-PROF-BASIC-CS-2-C509 = 4
APP-PROF-BASIC-CS-0-C509 = 5
APP-PROF-INTERMEDIATE-CS-2 = 6
APP-PROF-INTERMEDIATE-CS-0 = 7
APP-PROF-EXTENSIVE = 8

; COSE Header Parameters
c5t = 22
c5c = 25

; EDHOC Authentication Credential Types
c509_cert = 3
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>
            <t>Removed restrictions on the scope of the EDHOC_Application_Profile object.</t>
          </li>
          <li>
            <t>Forbidden violations of prescriptive indications in the EAD item. The EDHOC session fails if such a violation is detected.</t>
          </li>
          <li>
            <t>Extended semantics of ead_value: optional boolean flag when the EAD item is used in EDHOC message_1.</t>
          </li>
          <li>
            <t>Defined parameter "exporter_out_len", for in-band negotiation of EDHOC_Exporter output lengths through the EAD item "Supported EDHOC application profiles".</t>
          </li>
          <li>
            <t>Specified wire-format and presentation format for the SvcParamKeys.</t>
          </li>
          <li>
            <t>Fixed errors in CDDL notations.</t>
          </li>
          <li>
            <t>Specified type of "app_prof" in the IANA registration request.</t>
          </li>
          <li>
            <t>Clarifications and editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Revised order of sections.</t>
          </li>
          <li>
            <t>Use of parameters aligned with corresponding updates in draft-ietf-ace-edhoc-oscore-profile.</t>
          </li>
          <li>
            <t>EAD item "Supported EDHOC application profiles":  </t>
            <ul spacing="normal">
              <li>
                <t>It can be used only in a critical way.</t>
              </li>
              <li>
                <t>Improved semantics of ead_value.</t>
              </li>
              <li>
                <t>Content restrictions to avoid inconsistent information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Use of the parameter "app_prof" in draft-ietf-ace-edhoc-oscore-profile:  </t>
            <ul spacing="normal">
              <li>
                <t>Improved co-existence with other parameters.</t>
              </li>
              <li>
                <t>Content restrictions to avoid inconsistent information.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Error handling:  </t>
            <ul spacing="normal">
              <li>
                <t>EAD item "Supported EDHOC application profiles" occurring multiple times in EDHOC message_1 or message_2.</t>
              </li>
              <li>
                <t>EAD item "Supported EDHOC application profiles" in EDHOC message_3 or message_4.</t>
              </li>
              <li>
                <t>Invalid ead_value in EAD item "Supported EDHOC application profiles".</t>
              </li>
              <li>
                <t>Invalid information in EDHOC error message with new error code.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Fixed encoding of ERR_INFO for the EDHOC error message with the new error code.</t>
          </li>
          <li>
            <t>EDHOC_Application_Profile object  </t>
            <ul spacing="normal">
              <li>
                <t>Clarified scope.</t>
              </li>
              <li>
                <t>Clarified meaning of boolean parameters that are non-prescriptive.</t>
              </li>
              <li>
                <t>Forbid the presence of the element "trust_anchors".</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Advertisement of Supported EDHOC Application Profiles using SVCB Resource Records.</t>
          </li>
          <li>
            <t>Updated integer abbreviations for the EDHOC_Information parameters.</t>
          </li>
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Clarified motivation in the abstract and introduction.</t>
          </li>
          <li>
            <t>Moved definition of EDHOC_Information parameters to draft-ietf-ace-edhoc-oscore-profile.</t>
          </li>
          <li>
            <t>Renamed ed-idep-t x as ed-epid-t.</t>
          </li>
          <li>
            <t>Content-Format abbreviated as "ct" (not "cf").</t>
          </li>
          <li>
            <t>CBOR abbreviation of "app_prof" changed to 23.</t>
          </li>
          <li>
            <t>Added preamble on identifying application profiles by Profile ID.</t>
          </li>
          <li>
            <t>Defined target attributes "ed-ta-*" for specifying supported trust anchors.</t>
          </li>
          <li>
            <t>Defined new EAD item and error code to advertise supported EDHOC application profiles.</t>
          </li>
          <li>
            <t>Defined how to handle non admitted parameters.</t>
          </li>
          <li>
            <t>Renamed well-known EDHOC application profiles.</t>
          </li>
          <li>
            <t>Updated IANA considerations:  </t>
            <ul spacing="normal">
              <li>
                <t>Suggested range 0-255 for CoAP Content-Format ID.</t>
              </li>
              <li>
                <t>Requested registration for target attributes "ed-ta-*".</t>
              </li>
              <li>
                <t>Removed requests for registration of removed parameters.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Updated references.</t>
          </li>
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Carsten Bormann"/>, <contact fullname="Geovane Fedrecheski"/>, <contact fullname="Martine Lenders"/>, <contact fullname="Elsa Lopez-Perez"/>, <contact fullname="Michael Richardson"/>, <contact fullname="Göran Selander"/>, <contact fullname="Brian Sipos"/>, and <contact fullname="Mališa Vučinić"/> for their feedback and comments.</t>
      <t>The target attributes "ed-ta-*" for specifying supported trust anchors build on a proposal originally described in <xref target="I-D.serafin-lake-ta-hint"/>.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+192XbbyJLgO78ih55pS74kLVGyy5bbt5uW6SrNtSW3JNdy
ynXUIAlSaIMALwBKVvm6X+dp/mHmJ/ppnqZ7/mtiyR0LKclbndM6p1wSCWRG
RkbGHpHdbrd1sSd2Wq0iKuJwT+ynaTaJkqCIkpkozkPxJg9FOhWDxSKOxvBx
mojXWTqN4jAX0zQTw8V5OA+zIBbPo+k0Crs/hHE8DxJxdBFmYv/oZCg2hs9/
ONrfbAWjURbCbPRn5YitSTpOgjnAMcmCadGNwmLajYN3YTdYLLoL+RR8UoR5
0YKX90ReTFr5cjSP8hxGKq4W8PLB8PRFqxUtsj1RZMu86G9tPd7qt4IsDPbE
STheZlFx1bqc7YmXg78MxU9p9g6X+32WLhetd5cwQFKEWRIW3ecIRqs1TgEn
8PgSwHnUagXL4jzN9lqiKwSD+yrIxqk4jeJ0HLQE/KQZPH58AKsfPKMP8iIL
Q4D3IA+m/wI4zmdBAVjq9+nbMQC0J/4S5QW/DhPCqCfD7vbD3d0tcVKk43fn
aTyXXy6TIoPnTy7DSZjQZ+E8iOI9MUc4egXB8Y9Z1MtDC8jj6F2QTcQP//5v
s3iZTL4mnBmB0jtPCRIJaStJszkQxEUIqBXHL/Z3Hj96KH990H+0JX99+PCx
/vXRziP563fbffXpd/0Hffnro+2+GuFR/5F69tHD7S3z64769btd/drj3cfy
18dAPOrXnYf611371231K0Cpf32oBnv88CF9etB93iOCDsZhN5ycp+Numo/T
LFSE7Tw0TvOwOx6lWTdMEMuT7jjMCnyEjk9v+H6RZkClvZfBKIzzPcKuJkyh
9/ZgcDigvydwaPbENIiRJuBHHng+jGo0waPxA0E2Q0o4L4pFvnf//uXlZS8K
kqAH494P4LjNknmYFPl9Wgv/23t/XszjO7y6UA4K55UGbUXJ1N/h3ccaTbv9
HYPHxwoZOfCWaZQwFyiC7nmUABZaMDGSIjx0Mnz5Yk+0f4X3uj/Dz2/tVqvb
7YpgBKQcjOH0ngIbi6PZeXEZ4r+EJXwf+Ec4Ee/CKxG+H58HySwUsBNAwml8
DbYmsvCvyygDdogbFESJWAQZnDdYeC6KVIxCEczgTE1Euiy66bQ7CpJJR8Bz
cLpgLHgkTPJlFoqoyEW+HI/DPJ8uYzg+80UcIn/sidMUmHGUw5PwamBxTsUT
Rb4Ix9H0ing2oAgehBmXzLx5j2GiII7TS2Lb+FgWxuFFkBQ4CE6KPBBgE7DC
aConUEuYB5OwB3yxBDQOJAEaRTHsCU4Iqzi30YCj6s0HqEfhVQofwf4kOdJI
F4YVeVgsF11eRzQW+ThMgixK8w4vHUTDEulNTEKgB1hxIMZBkiYwcdwR+8+O
jgGzOSw6CxewG/Akz1WcBwU+iatY4vcA+yTMx1k0CjtiAqwMflsW8DtCmRdw
ICXCqvDcEy+WGaw5m8NzHQch02CMCACiog3I0gXQj8TJKATiCxM5cIQbO1cQ
Mnry5QIxIZ8I38MO5pF8GzcsmEwifBooEkefZfxuPXKS5XwEgMFuzMOA93Gs
hDtvm0MdNYuFp+P4qn4W2DQc4xJOR/ddkl4mTcPxwZxHk0kM3P4OitksnSzH
9NQd8eFOhB98bLWucfo+fJCM9+NHESFE1zzpHRESyeEyzcFBjCN64JSOActA
qLDeiaHJnhjAkYBv8aExkB3rQry7OWEXNJRgFEf5OWEMcBRo1QO0LJjofUEv
HY3+JRwX5jv8bN+a83h4corsYJhcRFnKLFdsHJ3sHx0P5fJRiH38COi1ydFw
ElhYtpQb0yHYistULEI6mWPS9IIcNgPoKyiQ1IAcjwErcERhqPPgIiTegUxM
wEaV2VxPnKRzoiUQP4CLAJlZQoyOBgNONl8mcheKc1CzZucEh2a34XtYPpIB
nEhAA0B0eR4BDwnENLzkgcM5YBw28CKko5yEsxThDSc98UN6CR9nHZHiybQZ
jwIeXmDqdHjwKJziaQfkJErd5S1UcAFKBznyiPEyR9YBq/7wAXaKCHan9xgh
0+TnMOacWA5SR/156MhF1rDuYPbJmTdgBg7DMg4y5Hb1oBGmo2QcLyehGAFW
ne20cGgTgUt+X008gIKTagalt/TMMjfOpLkhUjp6IIt7Ya/zdeQJnjycC9Wz
ADSAcA6HO4eD9uFDHo5ts4eUwY8fN0EZgEXxAkvAIe8xWCMACG0R0NQCCSsp
GK7gIo0mjJ8k5EVkYZRcEAYTQTonkpQit+AC9HbgZ4C0hSYt5CrlQyPkKzlQ
KJ+UOJ3BjiEJAwauBCER+ESPVbN6VCPTbKJS3oUOARm+D1CqgmkRwgYAO5gg
agP4M1/Gkv/iQU7hgFypQ/MEYdUv3IdPLyI8fJIH8Tmjb4OYv0UjE7+yQUNO
ejcXiyWw+7EtcxDWcYa2D3CqmCZLRwWzdWsKzfwklOFFNEZO2x2lAcrr2f0s
nCFd8YiXYK5OgRUA+hxdJPpkughJjxupI2Ij7M3gLMFC8J0Mv8+VZLPZYwdY
czKJFSrrcJYztc5hr5AdatrONz+r4tPhUx6BWdW6R+ctATGEppSQW3El2vVu
jLY+niQw0GiSBp81mXZnoOS4hF0M+RDi8AA+YRX/T5gAHQj4ZCPM+DYuDKge
jMqM5TfiV3G7g+fIo81yNAMWbbAucRgP7stw1IUdQt8IaBfwHuDbvITWCNBO
esXcQwmxxgOrFzMRoyuydwxwrClYfBUWwiaoCArJUxGuAJTNkUC4pPIDdj3o
fshd1NSw+HSZjeFMIKXmAmZAiIFFw/+ITSYON0ALDtQ14uTyQ28kxJwQL1Lc
F9DrEhybFCkfQHsBNMt+ejwkaLss3wzFEvTozADopQDB7fImhrFJzc5IwQE6
SSw1E4/DNITNBqGMQCNItu7oESez5439dPBaao7oKoHppcRRms2g13c0G8Qh
avj4f9a3Hz58hKKohpxg688q6AkFGh8DS9h3WQjDJErUsLw+sPQBfkSSWKSG
W+lPuQbRKjumiSWEAWgtTRRcQyNmdo84jOhE0meNXh+VtdYnNWMx2B+KKc6C
soH5s8tRSeSTcyj6XWoKrmUTOtYFjKcsq/7WFjIoW7iAMkG6vL2ASpcEyxBG
FSwdoVR0LSmaUFbeI9LhSmhq0OFsQnPkgu9oQVcajWgxHonEeral1Du1ELW/
/CYcUAaCjsPACEbbD4RPSfXCUXWDEWjTjUyT9L08tEcz/J0WxfI7d9ZRdX6I
CDJlD9Xx2Nxjsusz1uAGfNVWds0Ku47oYT4zIC6j3JVStxg4NP0cdeiN4eD5
JmnSdYo0nyWpU5xtnwEH3GTk0BTAT2F1RCgOS5JfKF2kcXB6VE1BSvtPyLmV
pSlN8YBUR20psvFs02swAZQVUb7yqLG6UqgjR8oAviIN4pBOGvNqqfyc/Lj/
DK18Po3H4Rh9/WLj+Fgd/N2HcPDVr9tSwjrwKB3RuD4QidZfVZCSijuL0Ipn
FmAjMr8Yj3i/P6njyZ7CvODElJRhlYc1ZhqcG1QnC1bSpmjagDQmJVHMUyBy
dHJIThu+B7lSsIgZhS4fNCYD2/8x4fKKJkjSQr6i3QBwyNqw6ABsmHYNQjM2
dNBs4K+mWTo3sAFA6NW5srV6s0fsBfLk/yNH+gNijhKLms7Jd0JAa46mjAhl
zQORwW+XUYEunL8uo/E7UlAuIu3NgQ28IA/fdSxL8j7Q61HGWNeoBvSPKG4J
IwD93LkjTsEwipIUjM8rcQe9i4X54CObnugRvCTCb796c3La7vD/xeER/X48
/Kc3B8fD5/j7yQ+Dly/1Ly35xMkPR29ePje/mTf3j169Gh4+55fhU+F81Gq/
GvzSZuOmffT69ODocPCyXZJeFrsmMw6s44KIomVEErzzbP/1//1f27uwg/8F
dq2/vf0Yjiv/8Wj7u134A/VGni1NwALnP3ELW0BTYZAR5wYFbxwswGokswvk
9zkeK7RMkHn8ipj5bU/8/Wi82N79s/wAF+x8qHDmfEg4K39SepmRWPFRxTQa
m87nHqZdeAe/OH8rvFsf/v0/gNQJRXf70T/8ucU0koXBRGqO7rGeBnOwhwF3
ROZIXLn0doJqsAAebOkkTMe2rxqf5Bd9g5Q+RR3dUdEtFdHy+boKttbMYb/A
DBgjo34GhwIOv/QyH7sOlg30vSgn8uPdx3Ie9S7J0+c4A6k04mWQzJYk+/af
P39pnM9owSClGo3NouGewIfhDIcKVgzSU0g6d5zvGK9j7zf6w0ZXoGCiLy2Z
SaeE8zW5z+XXHTO5dFRchOTM9wABpHieNnxP+5zI6ap8MvQkjUb+oCiYJcBu
ojHyaKm55S7yfeZp4dN8+b36kpG20a4YuQ0M93nFhChgSM/TqwU6VBw4IIws
gZ+WfWiOEZLfRa7HKL0I4mUoHbd60VVrrdzYjjQglmOje6LOKcK7J0evhmeH
g1fDuwrFMRgxJP/wKZpXcAiZl6FfUAo/0cwcdLBYsiHC8TSadceTSdylb9j+
YbFuf9ojI0w6BDviQ3gXVn6eTmDpe+Ltr1sdsd0R/Y7YefsbEODdcbQAHneW
L4Em8rt7YuejQPV+wvktH7YrXuoLfAwQd5gWxKBhS8UQFP802xOv4xADQgBK
KG0kRP4sCxZgPsIWTjBqEaPwDAEnTHCAVkA26PoDsHw6GgnX3I8FzyzRTUOs
s0WaDX3+fVFa3cLDkVo/RgWJC761jb232tpDMV7pF0deDYPk8pxdz//PYRjP
92SFAyrOVIOyKY0G0FBYSC9kXEtFBugvFRsAbopBpmS1hUvRf8oEYeiIOObB
wubeSD+xMQjtUIWM5qxvUePBXWsk8t8r0NZ13pgg2i6icy1fjhfAIg10qWwR
4G6MEs4yi6Q/mnRhfOAufUmZKHfhVMTLueaNlX5dawmeG2sdWE1kg7ZIh1OC
NTaa1CoVfKP4AO/CTf1qtEqHT1juPGt8UIIln2yzXopu+DMU1r5D+wabxwhh
BiPRXrEsGTpfJtFfl5a3OLumi4YDqbaPZg16h5WRt4Lzbc6d6RGu4F2YWORk
/Ec+OTUGBjSZ1Tms2IAsHXQZDvAJS6ngDr1MU4wUI7mpnd0T7TykBMmzaIIG
yTKLzhZBcY6/Ryrwj39kKu6vjBNKoDwDTJ6nWd5WAqpYCYTeXZUFdpYui7M4
9E+TThLDqDJ8PSvOK2gW8y1QlMEfmTwgIBQz5TPRFBxNjTV9XY5Xwu3gF70i
tnzVNH7kDSHDqA0sl2SpPiE5aIOIxUFv23OoK+3fHKYHfJi0at/x9pKoPuSI
1IF3ghwVho4RuhKkzHK0CViY9KkoL65k7s3HC9isJUwFzyd4PtCGcDk7TDCL
FOhshFFeQpnzZK8K9mhyZjOazwR7+x0QPjE8ND6aQo5OxE07SioXRyCvPZj2
wAUjWBpzpiC58mjLX7E5XTKSjZZ6DgeBxckV81TU4SkirdCKHvVqFLIxRaqh
HSUMMVVXPbtaIipxDpg9fN0WGwkFNJW+cxFuqqHungKSNIsklnKaoRDIxAvM
RW3rB9mus56mE5BUHwNgCHb4nekgmKCzQjs/G+KQhtcjpmQG5wSBkj445SmT
WUqLMMPUFTBAw6DAvBajAuZ5OqY8JKNH603wiTeS8QL1APP53DyVkydNysl/
Bt4b/rPY2Ho/fbCJk/8zZe/yJ7ubHaQI9EiQuesZPQx3qAnNDUS10Vt2BstG
ZoyKd44uIaJD2y1I+CQDZRVCVZ6VjTZ++k/Ka8EOOkry4KhAteuCQgsovMMA
7O6U9kNncS0LMafEPpvPX0ZxzECWTkHdETDUS9Eco6zKsD+KW1h4jsp/bIUH
04QIF7k+rKcbvocDQkQZUzwCdyKXVIveNFJMtd5rPyQzYdz4wgpKrdjhOgFA
lMhEpNcdZFlwxZZs/+1vKjcC1uuGyPgMXesIWblkdBbPAzqC2inMGWR10mOL
mEIfs/HGAarzYUSEqJL+bLOMwm+pR6ccLfRplQyC+qCalPVozYJlPp8HmR2D
X09hRFn8rxU/NGyr/v2n4oPM0N8WT/+MtCbu8/Z08MMnQqrh8qGH1Q8ZocnP
9Xfkcx1h/TwRSrvGp+7JcciXBk+D/Gh9rFxD68OeuKPNelLqzyqSV6SVwcUE
T9uET8thuKbuDYI5KzB03Q1i0OuetuNwWrQ/Uoowy88rkxlRWYkEhGEUcukL
0Bp1JNOMJaOV/lkEzkqNUVmAKu+GfWPMENgeQZeihKYxTwAPtcxeTTxJGuXX
zAzq1fk1MIHXKTOAVV0AQ6TUytKydBpTVc4PwSujvYhmO6tGBoYqwrHeaMaG
WxWFvn4Whx2+q7dzNymXYJCXbeNyEmXHRhEJEeIhjENjQ1aub01rwkuZUIRz
nUQDGSatzzawFoslcVmFS9Bep5e0ugYxE1qIeH4CphyZ3G9+Rca3kTwxNssZ
jVoWSIuTl2KUNB2iJlJdL2hbG73PFTlSeJ3d9994ZPsO1j2In+DAvZQHDp2a
9glrtYxV+FDZjaQcVWY5lhM4SinK9WlzpCnopBwyjtp4+nqE5rYfGd7e6m1v
+dFh4lDSdYO1EB3BSaCXZk++cB5cOXpWE6zxM93kYijVnlzAYGtwzJ8Td03a
fTmJp/Fob+Sbdt6NjIy7x0mt1QRkSInJF1EWFdLyrXJwW8ZRRfKR597mIDup
tZZqimst5TJqe4bAwICdYn4qMaig+KgyQiqThOap1KfWzBUiD5tCPB3tu1JS
3e2ofD2HzVTxUSfjgpMNKNvMTzUj29pKAoSBlfWl0PZ5XX9rqAAVvjB/FYNf
RDoeL8EwWcZFhAZkEVF0lXaQ8hbp+4yswTWRCLgnpmo97spEvS+8lQ3JYkVV
pmxWPHU4De2FFV6Qxlz9uOrJ3FqcjnKVprOoqMGroDQbmrTk15Ren2p+e7Ps
PmKwimHWsn0OIjflyJWoZLNj+SPeo8JrKeSV2AGD+y4vBQnK3QkhOBUCTDdi
iLYL9jNg5Uaw295F2r9r0weO0jHvS9h9JmstZc+WcdawHqECe12Eqy39iayQ
Iyv3yj6y6xG1UjtMEiBOuFaqpNwt1IQd/RxHmHj2XFA0bZwXW4IZ5ATO+vCr
6+yKtNel88MEndUZ6Mpv4CBgWDoX8A8pHaAHSBmuRA0bT5XaBT2uVAxKliKh
n9cI+8qSJMepitm5xH1VZaSpJ6ADRUoRqoHo2kGlSEf4SdpYwQHJD6SaBOcc
1QgPK+QWluRKrinjZV67JoNDZ2wCWynSD7a2LIFYEq8+vRfivhRpMQe0Lmn1
FiXps+mr2y7REBvAPylwK7a3t9lb1O/z2jOq4LTOrOO3qgHIjR503DMc3Oz0
EqA+wmrPZMP6Org4pr6dnZ1ehYepdTz8pz3x/fBU3O+ZbNb7KEtb8N3Jnuj3
th5wjXFSkHPo7++DhZanWX4fZl38+QlY2B3vCyqb/vOTaPqUP1Hf21MQCv/8
BCS3EdxPsDMFufKeblm/95+0lAsKPmSHlnwAtPRu8XTb+n0Hf48m8q9d59UI
v8vo4XQ+6oKaqCDTG1oBEW7LU9iDJ8w/ngIqKxCpfFw+F1HuLDxcylDrlZxU
Y8p3JTcVmXTVXg+ZeKcSV2r9F7bRt35cvSLRpS7xH89cRDEp6czG4hW7hhtX
K1/wPAXSt1RylM+WLB5NNTnxRlnPWFdRfVqZ0Y2PlsuI3q7nVOp57qiIJQrl
GXqBKbFx+Jqz/YmRoec3+l0p41ixL7uuvAuvJM5p2JxtQ28SIyunHA8GrHFl
5t/EIdpL+PM3YVJP1B8EGn13rKyChp+/iecmk6jpQfk0htzE3wAG5bWCz/o7
1gPoBUbjjEICf2tyrGrw/iZOmGwM8294DZb/GmeiI9aAVXXSyhv7WuP5rXa+
vW3DIfQP3z2h6WTPt4ysOI+ieh/8ah9uSShGtjjsKTUTx4xy6tSS4lkhF5C0
Iht0JK/w0cvsSnSyhzhCmrqM8rBjT+c+zJuI55nfylU1KWke/K0fb8Q4lrOc
RPz3k6NDnsU+dxxDimyoiHAqpqVRkLg7zghrvcvyDuNGfEr6OzIFx3XGUzb8
N2aMI/e/Q13S6ir6tF/Y1Oq9ULV6Dte/Ls9HHbeR79ts/JIduPi8KiD3sqoM
xLrMWqs3X6jOkD1fXpKfGJx0i7QLO0kNTcRpihTADUry0NUknfgGxqxQZrU7
dkBUp+BVixHj/VMLdtejXLuDk007/1o9LI2Njf1NnrNsOdCu1Va4aLu3olhS
bBzDpCa8RDYI46QgnJAbNl+SYXASzSPAIJdQ+c/ZKHMtlnEcRPNPhbyTKgwd
n3wCzDCaO7gsquzXYV9ev7Nc6U5dZpxQ0nxc7BS2VRXNzV45Y2WsUV1cmUbi
2SGqvp+Nz+MTyyCTIXOMuEecxmI0k3IsSyf/2UzBxMur9pZ8cWuG9aTl7+R6
6tnvlwnMJUcL1ZYLe4XLDvZXub4VIdSO46TZlr17RiNuckIZMPwiX893toe+
s3LsNZjk7R5/NUiurK9UAgqmvdBR8vIXa/Liy1XQ9aHPZRLj2Ygo1wygzCWb
btxeLn+CiUFfo7yVUTSZhEmJuu7mlpVPKxQViUkGE1Za6s2X3dwwRya8LfPm
VPjyopUiBY9NgzHV18rUllGoU4vcAFkOttsOG++9HU76XEOic+iaRTCwx7Jz
1ScyVSwaTOZRgTzDzofykp4azvQ92+bjxCpdT1SRF2UkRW475J2xHVPL7LMX
RlzfwN1UvvG2qtfebSN/a8+D92fzfJaD8dZmZVFndro2mvE7VmYkygN9q2RI
ubq1d1ryUo9zyoi4h3k/pEOc0A/pKL+s/SJRkbTc4fSN8dxqRj9m55AUWvQo
KtaocKckVJcye668lxYJaiYnok1k++t2IqBOSFH5nXWqI1ac9VKlRU14QUnO
xo40JVd4lVBZ6ZugtBQve73IQsQhlmfH+EI4aVKtGOOTNGQGSY1Br4x0gm0q
smisNKmL0I6ErJeHU687a9X/Zko4CroV4lvYyRsrgygYGVkziFKnw3VsXXQd
dbrOe/vlYyYVOsQNdrpCB5O7XG8m/HE21eRs/KH39Y7dSua14b5IsH72UENk
uNV6toxiYokAmuoKoRRFKmrI7F4CdTHomvyTqoyTvCmlsKrasiK9ZhGFMi5o
yzTt9qknFt+QKqUNcODIa6jTnBtTjm1Xp8bIZIXb51TJGR05dsPeO34+jZ/T
QZFmv0Zc0we5sz9bfgfn9oAm15WanJviQwdXabjwVDRfzgU+ZmxpnYEYJdQx
IF8zxWeZyBpnx8OoQRqnwaI7Lnxw4OxQiFjPqgoTbK8BPSGDb10Z1j1i49Fy
pDzcFRsW+XIw60/kI8/Dv1K1x8MH7iPjaNL1HwuokiBLFxmSvAxlIhSqS9Ei
uIrTYGJ4OZiyaPJRh4TAS+Q09U3AExbc+mBkPQY6TCKJ1iqOLFtAu71tWfbm
ZtdtYhkfr19b30ARnDNZyBbnZus4bHWlDRrrTaQjMpA0B9W5KXoTwwUgzNvD
QFsJsLpFinEQXolsaykzVz9r+hgFgF5WFSJL22KoQDtQoJ1ybVy10/omffBu
kTK2Dgb1HhQLH/9cd0KRfuVlNtmeJqH4s+7AqfZv10YN9CPfDNrXQpxBPMYx
KKC+XEaTMl91a6sDvidFcJlvHfZpcuovzSDVNm2lUqnCqybrcJbpmzdgWMlG
OA/7VThab0sBKhoK9oLuTaBWMELmFhNLUvJ1l7tR6Bk3P+G2YCDNQZ3Ba8VW
vPumdmLEnYGwB5YF9c23A1s4P9xdZrFuBmE16VHHS05a3aRmFShfaJvGD0qS
/ytu03mQn/OU+w+2HlPKODd4d1xO1dfF3Op43X4/bVhpGW5fg6OT4dk+PPID
fsUHdAdLM77ixi+/oY1/c3zAWMFrkD5+FCRsZajrixMDAmMD4G3vV9uy99/m
WU3Ez73yBsl7rP7zVF5zi/8wp/Lzbfu3cv7QK8WVclRqt04umF8XeCLrAqt6
eXnFfaoDY17oxBvfAWXq2L0qdNVV95P10y1Xnkt72+nqq1xDWKdZWM13TzC2
w8BSvamCVTkFr9+sOPk8nYpVOiuP9EqOwQa9+qu/evMI1FVd2czq2z4pVW1L
2zoU6qKEitStMJh0lc1WnbJ1anljKyL293Q67+D52bYA0o8nJZ/T2bZb4quO
cQNVlfiSvnOp503ar5u0f/tJ9dVOyhto+6atxjGcpwjIPOOkvNNnz88QtpeD
Z8OX2g1DDlxuKouEn4Qz6nAh0L+maupxAtni1J8riC+Dq5y8mNRprxQo9nsR
+5un/EiS2XFPKDgbWOSvQ+DwNOEzr9hFYU7KWb/n1TkRJ6E5gpHb10RVN9Ox
wAew6+KV53N2zyFzXnNmN4bHx2f7R8+Hm9hbMvKQQwvKPfZ9gxXVIawqEaJh
1B171F1K9qR7z4oyviqjKp2qJ1n+AZkmGJ3WLb1sEpGHN8pvA20VDqwLS5DG
pdA1HdesBrR+P5Va9Uq+mqPvHemP4x7f7fZL7Qv3dNG6fyIqlql4EOPQSawq
garUxCYN0AXy6M3p8PjsZPhPBCLnyenP/PRmN96n+8thwK/LJU1Oi10+FWfT
OJgp3i3ZrYSLUqkthsN7Y93TUG6LhF2RrKZI1BNJtkTi45uH8wD1ulyzfqsr
FkZOCP5cZid1EQIDpt05y7Tiq2vRZMHScTk6z/VO6avmPr3bqCEdO2PPdd2r
lB9mQ0XqMwW5Wko+4TwT/SpAWhIyLsxZiGFdvrgrvK7QrqRoKeB61eCsyUBJ
Ih0fHzEXvZ6eU79E5MoHhy+ObIy5zwKuJ7nTpwir2+xYlN4FldJTUh3cEYnq
z9NEX+5nBe9csiLVT2W9YgznprT0KcjfPnsV9J8vZ7MwLyrPAKevfYVzoNtV
6FizDppZWI6x7fsVXRqZc9S8KXk3q2g5oFerMtj4ijvOkbuI0iV1GQvximIK
mxm7weAJL4yTVy8si7G8Y7PiHjtDqhjbhbOpWLXaATt2rldZIkLgzPAsJizc
YmPIIkLkS0vVV0645NHlN7jQ62hOtzn4Xhs1ghcPdCmYUmaDnCJ5GeXndLSL
MFTHVRmovnZIkXN9Z+UlNu8aqZs1dYHcNdkpd9HRSYN2fkSp+njdBM3SFSDX
yNDsecJfKxaD16/PXh8fvUA9wq4eri2au4ZG1P+cGpENuN0VtvIBX0OyewQq
/agjC6DZbsMk4iQlZwDA1xNDdMYoFaUSIGVsOa3xjB62x/cj2Y2CSw4zK61x
RUV4RenVt9gFRd8c1oi5ik6xlqSYlKyVa5TJWwV0Fv65ts2ccJgUe90XVCWr
GwiXjAFVJDCNstz0B1X7Hvyx9lZWNgx16wOrQ7MxHgq9XDwy3lL9BJ3Smo1f
Qi5ZMoxPThfW5tRTBzKDg5fDRipR7MvdYpV4iWTzBFUuazqTL1ga1ixfjroK
weQ38otkbpLyuAYa+Dw05DOriEOkKkblDczOvQa3lEh6w6oAaG5ZrpNK9X0c
FW+4dyPoigxZvOLrp2veXVhftbNOLZILUlUlUrfU0J3JraJLu0R/ZX/2zU/P
fZsvevYarONA1Rmipbq3hrT8r+nq0y4nvqNNFQHA81aaPwFtVqwa56ncXZnq
f8Ddvjl1L2RMm+F1E6Ovridev5LHvyf+W6zmOfDctuv6RFy11jeSgNTu217c
uuaasp6Omm+wPhEtgoK7VElDQRKv5l8B33UBFmisVWCVFu7kpa8s//FEBSq4
WqD0xBtAPx6vMLpwIJdr0rdfcp3SeTh+p3uQk8Grg2ekLzO4lLKPVgTDiXYz
eZCoD75eUIRCcCkvKfxy51qFU9gYIMIzfmUyxpnlWav2CnlkVZZd0JO7WF4j
Pti13zZX0dR0ujaMwm++dA1KrroJCoNwNDCBUN8m2wDwlIDZln/dp7/6/Fer
ZX/1lFO9RQ9lI8ga463m5/p1z9lmW6v1hAWYrmRIVHttR52i0wGWKzzu3Z1r
N5U/KTnT91rGh/5U/PoPtiPchuO3VsvyvgHIaRp/Jtjsafdajg0LEG7fUwMD
SEqqP1UbfRZNYEvMH2dItGdYqwIfl6RHq2W99hR1ePsT612Y13zeEQDDMiIA
nrA1tIxjp2tYruQZLhEemmTBtOg2sulWWbbtoX65TttzRcMN/c2rD9ABHqC3
a50gampT0/78zh1VSYBeKMMT1oq+u4zAivXafEh6LnJrHY6Wf+0AvauRmoKw
NbUUr/q1pKh8maJjlusGvK9aovsTlxNNQx5Imm4NDqlGe6Iin0RyFQRsbCvz
eY1EunW5MJmHNaW/jfWL0qqyV4u1xE3jNdhdn6lWuAJIoyfaASdUjUI3Sl4R
9K0K8FP7MroiOvfLj6pGasomKRRX8IJRyjdb3mdSqqyrZaRGZrZNziwXODEg
XdaoR9jK/gsVSOfabELmOphlYShLI3nsoTR3xdGyWCwL8ZIs3pwvkK6yhVm9
mmPxYsqvcBOwJVWcogC7YnhCwzp1dEC2vzwPMI0JTmoWGoUdk+FfH/8FDXKf
k+32tns7pbyYwbQgZZnUbVhxMIqj/BwGlqPIOj3drM9cOx/6i6fA1BTvEK3s
mr7b63sXminbDsgEKAgZAICPcMwDqk6MuVlU4p8w7gkoBtQlnDuSAArzTjNQ
upjNuC3IF9ZmD5KVGpYgRUXjiqsE9Q3rctfoZire07Yq2OU/dW1hzatK7ze1
znWAkyMJwwXZEu88Nk4Rq4MiUqTVY7YCBJIsHgxuVlgIJylT97+C/BkXCVY/
p+rmdLzOSllPp7LsLlT2kksgGdYJsojtKlqQ99FL2HIuSCW48Vyk0+6ILxq3
bzxSDwOyfkgvwwvVjMfMxsG1JGQvyIIEHi3GtJ2xkaODanL/5PiqSxLOjqXl
XX0LRZBHeGtYbl+ygXEnWdgsS4ABt1F4QQRPy6B4nbez1zaRriuQr9MkU52A
t3jE37LrbkVHitsoRvWNNt0mmzfqsdnt37zLpmluWdNts67V5vWaazb32/S9
qNh3s289yMEh/l2SkmISVBCamzab1WTt9gar4o1/E6/FOp03u/31em/6S6rp
wVkmw3WacS6CCF2KP3fEL5uy25KVSuYGSn52BpBmmWyJlstng2y29G4dlYKB
VI8ouUjfrWLSZWHrC7tNmW5xaoeef66KozVW+bo7b0VGrdhBe7g4h+VnICye
R1NYe/eHMI7nwKuO6J6To5Oh2KDxNq0BZlm6xHuhuRZXTdTjiYi9KBQDM0ox
y0fi+BcLxyawbrAMcGUTC8tKXl4Du4aXuqYV6dQ/r7OVN9gfZ5JfrFgjfB1N
Sst017UaYh/EqhQTm3y3lIJRWpvRn3CLuRvnqwCVGSxnRfWQU0rlDbG/OLdX
sv8HFWBq8EZp0DSLWo4S3LwORyqBmYQ5MO9LV9XaOdyokkqFZENpJJs6gmmJ
vgFKyEE8SzMg5blORgIyG6OstC8A9CoXpLjWEbz6lrcdVoSs+JPML1Wba/WZ
1ca1FYPviHOyYLQViFFoZEiSH6EgIq94R2lcSZg54X3YyZ89yEp9JVAI/rLi
oY5QzSRJg+PuOVZnxipeSS5y0ve0UqrBy82ayFajF2VzPZX01tPY1YEBlRCt
3Rn8Iimp3OhCuSaqu2dIogYEeoybe545LYartBa713DjDluP2KlUsLc+YE5T
4qo5P+1spTbGmH0vd7LsX7uJZ22F4uc3OJSSRN0gt7IxW1Vsx5JGDT6na1Qv
feXIq9XwxvgpudhCX5PowaYdC/B5OkuwA40RB+psy3izr7TIhoSarbCJynKn
iv3rfs1ri1TdAdWeplMPYUnmS9bAMFkglCThzST8CgRVyU9cEYrQiiV5WyNh
n6XSP4yMn/zLKUO7wr3hwZrbwP4smbeU1avUEnWtdo2O5N3WXOEQRL6hfWbl
lPFbZo0ieLVXeVUxk6YGb6pYyQAf2b3irl8gUPZLyjJV1wO/Jug9sZLp1gff
S1m/JQFJPYmsE00OUO3LqRGODmFdBnnzsTBcw04kqgLe9bSWaj4klZnMdu12
LlFY/1ukMKueQC36k1DY9m0p7NQB7ivkDV2Dop37zr8g7TaBKAORRQXNnkQU
51qt7tR4n5SgsJz+6IEHSrhhDgXf1u4l7UpNNrJTh0rhShUrqYhO1q3Isdh+
0Y6fm8hf3ISwQs34mVQwadw4RLWwr7yTpp6jM+r5pH+K3Pqyg1tpnobAqAwb
2XfAOVWZ2tbQqOBIkTGMKO1eXizBpYNZOKfb2nSQGYEza7PKpTVg62vGFVE9
oS4FdpZkhvQic6uYoemLibU9QRyrMkjl7ZpEUwoC67qwQKddEqrsuwd0twL3
9uhvNh9yvdN+vURJhM+QSF5OnExK+XQqz850jr2upEEtbhSa7rnrpfcF+Q1E
Z8P9pUYybWhFZpPTaCcckw+tECU3RVFrKUeJxYauq5b2C6I84qgsxmTmTmau
lbrnXOyxhkLe4bp9Fg7lOKjyFakKxVI4NbgIohgNAOlAkjxOH1JH9PmpwuH7
8XmQzKyIde4HqYjcVdC0Wlp+SRuCej8HllAqD6m9KnhS1l4yWZOKjeK+GdpY
S/YEhfEJYVjXWzj6yakU22RORUW9ezmoDD/KzEoZV7ZCjXJmJMyJHZKsCdTe
4OajtbKD1/LYVLZjKBUPfNL7VnqlCwvFkDiz6u5Sn13m1lI2dHeprdVcs4ML
zUOVxys6uQxri0IJs9SYxHGpNJSmylTim1SgRrbpnpvi41KHXU+GV5WFa5tO
CmJVQeXAY98RorK3nUxhq4r9tNqcZbFekoB2g+DJUuebUdUr6jiyVFa3H1oP
Q6g8w2YHE9+6Rn3nVm2ZXCsR+Bo3WbqZl/UGuXOW3I7MpStu1pVZlpGpqI6G
iXsJjRX++Mkn1gqPkNK4nI3wESyvrFGyXxJXkGNJuL77gPNSiCJc3ljS9WxH
SMN54DJ1Sesdroa1OlXbr0qntU29RCleFE0qiUk4S3GvLWlUE1cCTaBUrvLQ
z5vq1J2ttdbZwZZtUl9xx9D5OX5SNt6jg31zjElujQ6a1k8ZpkJVLmlTabQX
4VUuTt4cnA5Pzo6R31iH3ZJwDWAbgKuLpywG4ldmfoq+OH5upGtXOzbWuRRv
ZOFYir1p8nLdAgnKVqMiOq1PGkVa0ew43DNaY2ONm7qxqyE9saPThtcqPyzX
4jlcqbIir8F88/sr+bf0NER1dDjIM7yqzS5N83KbYHxvo2/QPZBJ+eTH/WfI
0/hKheMQ+5+YNPj8YjwCbeR78kIE+gZ36gttXS1utD3rryoxo3LBlFiaNEKx
cXysLrHcxUaZ6tdt3hU3v87O6nJzLU4uxpR38xc83Kyv8SV9lJmoa+O78rYT
5tu4N+5dDdQfJgurtStC1EcyHOwZOBfEAsD5FjULakzJtRATy9HLuThxxO0v
7M4HwShPY7wGAsfIjbKlLo3I1T2GsrG7SUm5jECJlhSkdVoPnkZmo2nadKHS
b3ed3prca0rmBkyx8Ym9ET/K1GTZV8XmUN54TSzy9eD0h7NnJ6fHZKhYPQJ6
SgWPg4Iu8gjUNb8ca2YNT/KHyi4CHe148jIfGqBgxzUT8rF+QykH4cQ66VLg
OugQlHIu7RMfCyhNpqVPbbdNVeIUraEBbau225ct9CYyL7spx+9hlmra5JxA
0zXXb8cg8aoHcs8pdWINCtXn1yVrl6rtZqv+pMbIg1e8qWTHfz1THs50ywtq
R1WBY5u0qgvW0fVvk4+wGslYDlc1q7VXdcWDq09abXWg+5iTk+ZscBMjOPlh
8PIlEzzs9RzYW4h2LwoUYkme7mdlNhGf3rwtz+IUGlmrQ+eHk6q1WtHuSO79
9m1bjM8D7PVEdcyJnAIf/B1A6HKLEVR052rpslUdjxTEi6QbTXL27Io2/t3W
R5PjE/56v+tt+yu29jTqFudMXer6t1q0yxOIxLsM4hqOy4Tq+5dolprzKect
83taBzlpbYDrp5eePZhJdvaTm2R1ASRS0/urKZI8O88OXzg1hopQPRrtyjGS
qbnEyq5HlCum4XDb3Cmd+okdbYVwE+kS/5E34lSitY7fdRSb6Ca/qy1zfELs
gyvxIYBMb8kG58dQLi5SJGFWDlsaMyiPVdfcpWoOSwsxek2tKmI9slIfWX3b
sg54ysbgTk+8lWqIC8uNdBE9xKdUSLxBm/QB1Mu/ulKigPjkOomPCEsx8b+6
mXai0Xdd5cSxh/xN/E+790Z2r9qzdQnIb962ZlDRs25voR5V0GCtjuQ9e11F
yWJVWlvSYAHj5hVNomCWpDlQFS6dx/OUCdWG+9Hj3ceYEAGUaL78Xn35cFvp
VdULXUficw9AeGuyHOtgaN1KO8Ch8JbsJdaOsauNazC4Ayi/hqO8SSJyhOnt
jKN5hJri4GT/4MAoZ0CxI5QfG7Jnp+VOfr1MrmgMvv5h97FuxU+TzVMqvFzi
FXl46DKq+5xj6VkcJO/guAbjMC+l0zZtgsnfWiUQkWK9e7/lcbBCCjUGPrlW
dQvmamPHarFdb8GvCetKOKvD2rWja6/AWkhwVKJGUOsll65OaOw81Tj4IswK
SlZRndgazEgmWm0Ntu/38FbZLvamlRdHttfE0I1Qj/3B5NArkKfnKaPs5jsQ
xHnasA1fcSPWmIgwcisc+oUHh5am9YlQWj/FuhgmM69KW+ChLZ73xfbiNiCp
XVuvKYE+RZF1JcI1vbk2B9budbeJgaUDOqmNflZTQ6slzzfz1PKy3Re/9u+Z
v39rtcx3pT5Kypb7TH2K1PB7LW00PhW/3qONPpPWKABo/wkPFICTdXr6eEio
7+zTeLDemj1taOBTuRfoIWi53oGnwNTb4lfbgr+3QZ+p9W0KWLH6g3+einsL
1Fta1lv08bb8vEX/gw+WCdJWhskJ98ViXOirw+6jutOdhKAMYR+n9l4b//3H
dqtlvUJjDl6+/mEAXz4/+P7gFB/q0qM9+veM/v3XdsseG99q/7e2+GH4M7wk
/9ey5uMn/gu9+1/p37+jf+/Svxv072a75dRaw0f36Is/0b8d+vcJ/fu03bz7
te4cRQLkuXFJwNml6+2yOXG+FvzUmI986tSftW2vvEAaPOU2wtJXnT7obbf0
4M3tz9Y8KT7wtzsuerSmplfiJ63dNAUGVfDP6EK2+ZvXZSdp99ClP0u9p4gi
oCFeFQCsKwunMSUES/t3Djq70vTpxoT3Cw7dM5tz7gXgiSiVUAZsLShqrxa4
B+LgnhxOW6FYNiUz4doWuJQtbkRRkgqVBqw6Jjq0o33cCibPJeFeqWZSh3KU
ioScDnAXKjemeS6j3HR9nXRUsR038lRARrmdj+VcnlacZ2jLwS6VtsdcN89O
hVxmshjloKwX8xRO2gyjVOf5MSbVLekAqnvBeymE4F9o3mo9W0axrB9mRxnK
YRaA62+unS4yCS8oRYYSxDSVAWlhgpO8VMQPassbCrVXWseEWRkiXSKiNHBZ
Lc6C2fFKuzdt9da4e2+NNfruQEqUk6oOw6ft63VadtWUmXKT5E0rs3Md23qQ
yNaw2uHVvBi+ryxP7di61Em/VMv7O5I7/oVgrJhOvDo4PHg1eHm2f3LWbxJN
H7RgDe/Ow+I8neR3xZ7Y6ah+juIVfcrNTXbE/RY+yelIZ5SORM/3zfP7nKp0
QtlXfXqBRseLNc+wSIde2MYX9n86FfuYmJpTu5ON/f2TTTlDNDlzX9jFF95h
+8mWBlg16Mbvw7sg17oo17py7d39k27/butjtYxjsVC7vZzRbXXbpvQzZBhc
Q8FrdeuJdFzHnKDHdIKutV1bX2C7tmq2a+srb9dW/XatxuGzwcnBPhH82c8P
th7fAI2/Al52fqvEJXXrALH+6U7Ar4DT/m91eHX1Xf8HISlfMVuzFb/CXuzs
/qY2BN99/6BYY2MIoXSKuojQP8hR0mSw9TXI4Non6w9EBltfjQz6tyCD/tn+
H4QbwGcA6Rnu5d0bUoRHHKXb4RtoA2eX8yr6GF+XTew30se1zu5X2LQbnd0/
+qZt3XrTDg5Ph8evhs8PBqfDm+qbX17yrrlznbW3Dn5KvPhab19377eJocN/
O4oO+P9jTQ8d8W48zq8FhPUD0qED/4zPgyi56RhjHIOpcrwGVdqk9EdS3/0j
cBMd/strHZ/jCNz2EPznMag4Bg1m0Telcw1/Ph0enhz8OLwh+TNR1h2C9XCv
h2k8MNWz2Wfn5tOJ6uO29dlOHI7RufW5u9HB295ZefhueGTwh44t/HtZ3GYU
PMC3ev1WRx9/1PG/1RDrMA59AD8Hw8hXcIwcWAafAp9xiAPdd50GuV5kh52j
K+I7lT2yTRpL5AKwVtAHID9MC4pTw2rEcBIVabYnXmOya0g1uchFsUGL3b4G
c+7e/govdH+Gn7e/tQ02cZRkOR+pbp2mVlvOjNibhHhFAH+LZQyzLFicU49r
65aJiobXt29gffsf7K2t7ifBPthb9le2V1Z/xux954mnucPf+ydPyKT53BB/
+PB3J8OXLz5+JIi3ayDeWgHx1leDuG9/5XnsLIhzsYH65WYZ0yhxKqRHDo9u
kPIE/HPzU0K8Uwnx1poQb30FiHcrIWZ3x2qINY594WoAHt8S4BLED6ogPtta
E+KtrwDxQ/urkh14PTq+Xw83qxSOTs/iGQTsigX5EH/XBPHW9ej4y0D8yP5K
6wrWZzbEUj324Pa/k3SiFdCVCyFtrnY5LsTm7oJGHcC5wcBWLqrjsKVrC+5g
4swyi4orvGbNruDTleXy+65b4YfKx7PnpODgdaLuy75ioio5rNzasakTxAFu
rnBopH0qbQNsvVfhJAo4jihvzJBI+XCHYtZz/L6LFgGggdaPGmT+jrMXVGyc
QKFHuUFj29K07rvJQLA7f6I7KvLwr9RZUzcHylTGvynrgxfG4WSZhaUCGFj3
w0c7MnUBp0xAVdqzNbxW62Q5KsxX9WC0Wseqq765yWxPHN4ftFpHpGgFcfmb
oWq77lLLnni1zAvM3rH7wHvlNNzX/7vdPgf+1S3YufyCyi56fKW6ldVqypPw
xmyVn6BTQikjsyIJVifp1baXouSTm1wRg/071aHy0XCikzfqzhWtXRM15SMB
fum+olEUV41JiH+9VHddOZS+Z4ZqtSyeINO6uI8bJtdoMt0T5cfoSiLKy+F7
gzpigqQZjZZFyOZ/XlD5cFX9V9Ot1jKZRbE9t6Zmp/e4lGr0As4pl2Ka66wq
8TGQ97wHsZ23rZAFBAsT/J3Adpkx3gmf0XUR1COowOuBkS+pq3ac918O/jIU
P32P153FSOdcZh0H78J/RLLopdlsE6uoDoanL1xM4uKOwyDunkZgvwyyMBAb
QVaY13irKVtniblXe2L/6NWro0M8iVa2c5qorw/TJISVLkFwZff3qYsdLSAD
ZhEC90QYYLGY6ZYzKmyegu8Tt6N8L3nJZvcFLTU3NwVJlievQZRFS1VsD7Do
MXlOLZKZ7O2qaWqufNlXLSth5OPhySk2aBwmF1GWJpy1tbGfHg83zS09uX/1
C5CKujb0lIh6Pd5r3tonNrYnurDS53vYPUhsZIThrW7/wYNN3BRdLmidMcDn
aZDNwkIMCnlCLGTSHXqEz4Ie6gb6oZWSxMUrNYiW6CpN+OnQ2qHcQIBAtnTp
78jmKXoyMsdRkHTnwfuuvMUcHngGIE5tu3yPEnuDyTwqCipIfB/Nl3OBj5ca
bub6ujcYSVL2vk/Z90T1Fvz9KPtzDYjjNFh0x0U1eCjv4KDR8dMpvBVUK1j8
IYhuquQlXQCuMil1P3i7nVz5DnDZY5IuG1/w6R9Zz8G5SyQ/NCzv0yIlXEST
bg1OBlb2rrqTHoBcpJHmwcWVycL8tIAVi9VAce4kVfOqhFaTS6t25tOChUxj
NWC1Qu8T4wgzKNFB3V0uo0k1WAfO1Y+BvaUZqmVBMj5HeQf/URtcbr6yxNqq
QgGPU+CfoF1R0xCSjE7mLWl0b94cPP9cC3z3DaxPlrljR97PdRzNgsE2/OoL
BtPtXJbxe9bt51v18quvmorqkMepzpNfbPXvv6U9T8qexs+37m9w1z/N+kHp
47lsI7NCJWS11LI2TOPfm+uGpZnrkvHXM2zvqb3zGlUgWvSlo3t45edGvpzN
SJ3aVF+yeUnlkYQsBmOv+h5QeMKhg9tdCopN4Wn21/DbSY2FzDou2ZqGag+V
C+VMyn1nnTv160QNKc1ql1sZ91NbU7P4NbSLXK/0cO2lagIdvqcW4rFgmzL6
nYd+js07agk2DCY3JdQrj0wb5v/0l4M61G8X/ag9X6ddMjz8kkmB+ssOnp+9
HDwbvrRsxZ3N223mCp7C3b/3sU94wxZVNRO/5VaZeb/o1qhbM/b8fssS493+
Lq6E0a4b+GofwJmFWXdT1tuNG/D+54cnXCB/EmYXERZ36374VBq/YRfKb1p7
J3u6ruloiULdNKC91kw120bgyvefRdTpHN+EBZT2ibtWTfwa2Nxqvq87yU7T
ZWK1abLasB6So35PbG97vPTQeKixChk+eQXGHnllvLYI8uubKiYaAl9qHVb4
yG0wPh/RNMiI2lNeWUNn6CfT7g30c2IfB3TY4l3q65Xufe6zzbWWVsxjkQI4
V3T3bUQaW/t1Fl0g2G/ysN0BMi+wJBQbEA/YQ0JqAAh/UNcATRdReNmm2zHa
jhgUKrDRlp4tc4/yQ9XGabtPTQnb7mBiBjZ2GHMVdRY6BeiqnJFeAC6LL9C6
BnGM1cLRTDrZgjE2TZYq5lprkP2nJyH6foPyO20xCvIoL63msbOaTsXQyEuk
mzy+Mtco+wM98NByakehZO1oBgMQqcFQ1l0pBtbTLBi/417spGTnJVL4bru/
hVEADOCo5jvcC4vrna05ZQF1h6e8jAjH74g4QSIBrqkHKm/GBnDVIuXe+/IO
XwbXgnQUTtPMpT9qTqfw00GfP4ZsM955jB4ts2AmTxP2SIkLmTem5uRJ5HVK
OnCHdeLLIjYLN+EO1aqU8SCPBN+cnutApj5OAd0Uf8/KjZL3zfOdCxTJoE4y
uisBlZzjLURsUl1ZHWYqOBdtc66vBVW9oJZJ9NclfymHVb3C0ZUZ0fUz6jYg
aq2YhLPA/rRHPINvACGZTWuTs6Ayby4IKbMDlHIcDpSkeOBePERBO60DyObg
mh6wY0DpwP1UPnA1wz588GDnIY7c7T/gJur4MU+G3z2onK+a9ZSmyOcBigZB
d5bLqXCOGXFq+bmZZR5k7+QMNle01Nc6WsDAr3sjR9Xmt3wFqWq4ALv2ZYWM
Cy4sHWDFyJbcqx6XOASuWl4giNHNsRfEd69Nr57q1Dky1s1keFsK8rxFuljG
tFnahpQbQodzjRQMlSDuMla86yVbypCdJakd8dBqrcn/sWNSnQyjZg6XqUJ8
9ZlRrFbhjNimxguoBYEKH6ubBXXJvXCaiMzo5tQ8BRqahQmpAJZQ5OtUApsT
UmfHZYzN+UWc8uWN8FhHjJb0GDEy+JJacDpHR73PFyzKC1vylF8yg3KnYGxa
WATk48HOrVGxnOD+S0QyvlEdle9hi0RkSKkbPfb0apZTxGX344AC+nz/SJYB
OhLi5VMH4yCwhhJsEhNWJ5TxeThmCTWWY2F7nWWGHdppWCvqZHQ1qdqbYVUs
fo4ryFEW6la+MnHBAwll5TiWwshIXG6KYV/W6ZwumFAZFTi87Mg1D8NCqvg8
GfJ1mG/sYAfzpouQ0DNHFx2+ObLvYyAe8JpiSPlfl0FBDjezo5MoV9K1J89A
WCl3MeqZL0EBHUfc08/416Z00a+FBYlSMpLCxEXcki+s8S7SniyZo4TUwFk3
e42BEidXTgcMurNOjiVDY7mIo3chX4FltfqahIs4veLOciRCsfc5wBTMZhXc
nJZsd10VBSyBKJPphrMKxjE1+Q+tUG6PTHOlaMHE7POU8laiWu4LK6fuBLRD
DsfJ5Z0aUkXUDd7Xkac8L9E7Yceowz1/Egla+B7zKqZNujuvhfmI1Of0sEqf
CzyRYd+PKOT1qbJBLu8TQD2P+NI/pXqWkcBdNln17yidUwtAbRTgSSVyOw8u
wjo6tdWxyxINMVsk4oFX2AHiclXDyNCuWCaG9Y4LlUiCiCcJm3M3INaENYNz
tuO5ZPs5y1wSCRdRIErbTLeW2a1gFLGBdos45QZY/lu0aUz57t26Kh1L3kSt
ecFlGM0QhmCGmgFfpDnHnkq2IUFjBMorTHuEvbR4b1SCATYVGod4LwSZC+pQ
om6vLp00OYP26DgUjy9voyWlBC+OgJFhT7rdLhhg43eYDEldwV7BQ7FOoKRO
YnP86GPrwx51yYVdzabjxr5pT8oxg5YsGcP+di2nrAs+6bdMlRL8+bDl1C3B
J9+1lPsLn95p6RmqzP5WZUMZeHGr8pstAqmueQZBV9dSAb7cqXxzn7/crXxT
fvmgVV8+S0ioLyskjJSLh+DjR4gacmH8AIweyMGkw7SwwBxWA8h+MMZfHlho
dENO+zrkJCv4dO0brbiyQMnpPUcU4zSbo08amsapoyveLCaYfawpUKly3SV/
UaZDUFB/hPUh4N0tupivu7XDaisOsNWHPz+y4o6vef03pd4EQnvhXbJc38eK
eNmLNBtFE8ATsJg0lhw2nbr3hZu+bTqqpa40ZEbiXtPHl95FU+Uz0CNzU7CC
+KLkpFKwOvdk6Nuy90Sq0lxHaQoKFIwdBzNmoTYUuptb+ZpjaUax0lVxD6ru
884X9EYJ3dLq3/BXfe+4DoHJhnEOSOvd9WhLebKATFdyBKOq57iS+7Yrmfcy
eo86CIYFaJ+IZFWrsdybSaUStRVPaquttQ0TR3HraS3cEsbYbJBSxfGcRXNy
8Ki2vQ5NbzNN9y2a3oY/JU1f0A1naTZh5i9tHQb6DWvllkfbKRV0VWh5wEjT
y4Jp0W2MqDIVXm/L9mQn5UK5XaQQiylAEwg4NsiDYnEZXKmuy4yXOjqXT6nE
R+dko1pxkUaUzIaqUl54+ouNItJcDI07W7sGNvY8aMdpl7RAyg0nXMtbtfVO
3B5yjmKdAx1hMq+E4LoXpnJFAm7/fBkXERWNRnOmAv++UvvK897NpiuNumOP
uqs2PYHNheXrbab3rs0e7KFstTVquCMYQwrm4k2bOajiAORpKjTnenEqhiPF
rDzkKgEjaYMZBhI/Sqee/+mcQzkIkWLy1knXrU8TCqkYoSTHYfklfbvIK8f6
IOgrPShL5YyzVCTHVTdA6qKE214DyaeQeI+5ij0YjTLqoxnZF3KVyx2c83RP
lt6s4qdbzE+3LX66BX9+tJg0Yhek2IUmGG4Ninx9XMhLIwq640Ifx1d08N2A
YhPAZKWvyWePQ3R8orzognWy6BbiPTmZVP4ryxc30VejUNrm46ItNtD6a4+n
bb6+iRuqW6j2xJq6XJ780XL3UecAegnmaIWaxN4rfemA3yV1dGV5+R2dgtPI
hUkjx87qmFZ1r01bbt2mV504lTvD4TnTTIKkq7lAlyLP6pbqdZIXnJHRbiNT
GFgtnSeTCe4RoNqodQvVDeWT7uBVg/BdMScqqiusHH5CUFV+N+EYXzMZ4V4x
VtaEeP2yUpWl46nkkiJHHT/k4UCtKFN+8lVnE+xrRFUcTmZsveOxDNzPUO1n
CzecPG1PwXgP2x85yBRQvk3Odzln5LY6xxtbPnz4sH+eAcQRMMbBPP/3/5Pn
HzGUiF8EGQpV8QyRliTq4+/D9CJIQvEinGTh+DzM30Xqq1fYVhm+eolqd6YH
GsZ5IF4Cd/69+xom/10/HsHhARvoGP8PXC41c/z7v2V47UAYBziS+vhZhmCe
RIuUx+ZyIpg2jv7f/w7Ej8v/+J/AWP7jf8CXih9GmZiG4QTNd+W8VDhFvNz+
eIkRNkfmwC1sGYAGuwd7OIs45qpKqqwsvByIFw5NF4uKcK5z4JMyHAiWBtp+
oNzlblttUskv0eS8m4PATlLJdgczoJ4r8ePB4eHRjwM7hj98czz8y0DsD1+e
glV9CBYwwkcO5P1fXh8PT056rf8PJATwkRw5AQA=

-->

</rfc>
