<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc3709bis-04" category="std" consensus="true" submissionType="IETF" obsoletes="3709, 6170" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.1 -->
  <front>
    <title abbrev="Logotypes in X.509 Certificates">Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc3709bis-04"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <postalLine>Forskningsbyn Ideon</postalLine>
          <postalLine>SE-223 70 Lund</postalLine>
          <postalLine>SE</postalLine>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="T." surname="Freeman" fullname="Trevor Freeman">
      <organization>Amazon Web Services</organization>
      <address>
        <postal>
          <street>1918 8th Ave</street>
          <city>Seattle, WA</city>
          <code>98101</code>
          <country>US</country>
        </postal>
        <email>frtrevor@amazon.com</email>
      </address>
    </author>
    <author initials="L." surname="Rosenthol" fullname="Leonard Rosenthol">
      <organization>Adobe</organization>
      <address>
        <postal>
          <street>345 Park Avenue</street>
          <city>San Jose, CA</city>
          <code>95110</code>
          <country>US</country>
        </postal>
        <email>lrosenth@adobe.com</email>
      </address>
    </author>
    <date year="2022" month="August" day="27"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a certificate extension for including
logotypes in public key certificates and attribute certificates.
This document obsoletes RFC 3709 and RFC 6170.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>This specification supplements <xref target="RFC5280"/>, which profiles
public-key certificates and certificate revocation lists (CRLs) for use in
the Internet, and it supplements <xref target="RFC5755"/> which profiles
attribute certificates for use in the Internet.</t>
      <t>This document obsoletes RFC 3709 <xref target="RFC3709"/> and RFC 6170 <xref target="RFC6170"/>.
<xref target="changes"/> provides a summary of the changes since the publication of
RFC 3709 and RFC 6170.</t>
      <t>The basic function of a certificate is to bind a public key to the
identity of an entity (the subject).  From a strictly technical
viewpoint, this goal could be achieved by signing the identity of the
subject together with its public key.  However, the art of Public Key
Infrastructure (PKI) has developed certificates far beyond this
functionality in order to meet the needs of modern global networks and
heterogeneous information technology structures.</t>
      <t>Certificate users must be able to determine certificate policies,
appropriate key usage, assurance level, and name form constraints.
Before a relying party can make an informed decision whether a
particular certificate is trustworthy and relevant for its intended
usage, a certificate may be examined from several different
perspectives.</t>
      <t>Systematic processing is necessary to determine whether a particular
certificate meets the predefined prerequisites for an intended usage.
Much of the information contained in certificates is appropriate and
effective for machine processing; however, this information is not
suitable for a corresponding human trust and recognition process.</t>
      <t>Humans prefer to structure information into categories and
symbols.  Most humans associate complex structures of reality with easily
recognizable logotypes and marks.  Humans tend to trust things that
they recognize from previous experiences.  Humans may examine
information to confirm their initial reaction.  Very few consumers
actually read all terms and conditions they agree to in
accepting a service, rather they commonly act on trust derived from
previous experience and recognition.</t>
      <t>A big part of this process is branding.  Service providers and product
vendors invest a lot of money and resources into creating a strong
relation between positive user experiences and easily recognizable
trademarks, servicemarks, and logotypes.</t>
      <t>Branding is also pervasive in identification instruments, including
identification cards, passports, driver's licenses, credit cards,
gasoline cards, and loyalty cards.  Identification instruments are
intended to identify the holder as a particular person or as a member
of the community.  The community may represent the subscribers of a
service or any other group.  Identification instruments, in physical
form, commonly use logotypes and symbols, solely to enhance human
recognition and trust in the identification instrument itself.  They
may also include a registered trademark to allow legal recourse for
unauthorized duplication.</t>
      <t>Since certificates play an equivalent role in electronic exchanges,
we examine the inclusion of logotypes in certificates.  We consider
certificate-based identification and certificate selection.</t>
      <section anchor="cert-ident">
        <name>Certificate-based Identification</name>
        <t>The need for human recognition depends on the manner in which
certificates are used and whether certificates need to be visible to
human users.  If certificates are to be used in open environments and
in applications that bring the user in conscious contact with the
result of a certificate-based identification process, then human
recognition is highly relevant, and may be a necessity.</t>
        <t>Examples of such applications include:</t>
        <ul spacing="normal">
          <li>Web server identification where a user identifies the owner
of the web site.</li>
          <li>Peer e-mail exchange in B2B, B2C, and private communications.</li>
          <li>Exchange of medical records, and system for medical prescriptions.</li>
          <li>Unstructured e-business applications (i.e., non-EDI applications).</li>
          <li>Wireless client authenticating to a service provider.</li>
        </ul>
        <t>Most applications provide the human user with an opportunity to view
the results of a successful certificate-based identification
process.  When the user takes the steps necessary to view these results,
the
user is presented with a view of a certificate.  This solution has two
major problems.  First, the function to view a certificate is often
rather hard to find for a non-technical user.  Second, the
presentation of the certificate is too technical and is not user
friendly.  It contains no graphic symbols or logotypes to enhance
human recognition.</t>
        <t>Many investigations have shown that users of today's applications do
not take the steps necessary to view certificates.  This could be due
to poor user interfaces.  Further, many applications are structured to
hide certificates from users.  The application designers do not want
to expose certificates to users at all.</t>
      </section>
      <section anchor="cert-select">
        <name>Selection of Certificates</name>
        <t>One situation where software applications must expose human users to
certificates is when the user must select a single certificate from a
portfolio of certificates.  In some cases, the software application
can use information within the certificates to filter the list for
suitability; however, the user must be queried if more than one
certificate is suitable.  The human user must select one of them.</t>
        <t>This situation is comparable to a person selecting a suitable plastic
card from his wallet.  In this situation, substantial assistance is
provided by card color, location, and branding.</t>
        <t>In order to provide similar support for certificate selection, the
users need tools to easily recognize and distinguish
certificates.  Introduction of logotypes into certificates provides
the necessary graphic.</t>
      </section>
      <section anchor="cert-combo">
        <name>Combination of Verification Techniques</name>
        <t>The use of logotypes will, in many cases, affect the users decision to
trust and use a certificate.  It is therefore important that there be
a distinct and clear architectural and functional distinction between
the processes and objectives of the automated certificate
verification and human recognition.</t>
        <t>Since logotypes are only aimed for human interpretation and contain
data that is inappropriate for computer based verification schemes,
the logotype extension <bcp14>MUST NOT</bcp14> be an active component in automated
certification path validation as specified in <xref section="6" sectionFormat="of" target="RFC5280"/>.</t>
        <t>Automated certification path verification determines whether the
end-entity certificate can be verified according to defined
policy.  The algorithm for this verification is specified in <xref target="RFC5280"/>.</t>
        <t>The automated processing provides assurance that the certificate is
valid.  It does not indicate whether the subject is entitled to any
particular information, or whether the subject ought to be trusted to
perform a particular service.  These are authorization
decisions.  Automatic processing will make some authorization decisions,
but others, depending on the application context, involve the human user.</t>
        <t>In some situations, where automated procedures have failed to
establish the suitability of the certificate to the task, the human
user is the final arbitrator of the post certificate verification
authorization decisions.  In the end, the human will decide whether
or not to accept an executable email attachment, to release personal
information, or follow the instructions displayed by a web browser.
This decision will often be based on recognition and previous
experience.</t>
        <t>The distinction between systematic processing and human processing is
rather straightforward.  They can be complementary.  While the
systematic process is focused on certification path construction and
verification, the human acceptance process is focused on recognition
and related previous experience.</t>
        <t>There are some situations where systematic processing and human
processing interfere with each other.  These issues are discussed in
the <xref target="sec-cons"/>.</t>
      </section>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="logotypes">
      <name>Different Types of Logotypes in Certificates</name>
      <t>This specification defines the inclusion of three standard logotype types:</t>
      <ul spacing="normal">
        <li>Community logotype</li>
        <li>Issuer organization logotype</li>
        <li>Subject organization logotype</li>
      </ul>
      <t>The community logotype is the general mark for a community.  It
identifies a service concept for entity identification and
certificate issuance.  Many issuers may use a community logotype to
co-brand with a global community in order to gain global recognition
of its local service provision.  This type of community branding is
very common in the credit card business, where local independent card
issuers include a globally recognized brand (such as VISA and
MasterCard).  Certificate issuers may include more than one community
logotype to indicate participation in more than one global community.</t>
      <t>Issuer organization logotype is a logotype representing the
organization identified as part of the issuer name in the
certificate.</t>
      <t>Subject organization logotype is a logotype representing the
organization identified in the subject name in the certificate.</t>
      <t>In addition to the standard logotype types, this specification
accommodates inclusion of other logotype types where each class of
logotype is defined by an object identifier.  The object identifier
can be either locally defined or an identifier defined in <xref target="extn-other"/>
of this document.</t>
    </section>
    <section anchor="logotype-data">
      <name>Logotype Data</name>
      <t>This specification defines two types of logotype data: image data and
audio data.  Implementations <bcp14>MUST</bcp14> support image data; however, support
for audio data is <bcp14>OPTIONAL</bcp14>.</t>
      <t>Image and audio data for logotypes can be remote by including a
URI that identifies the location to the logotype data and a one-way hash
of the referenced data in the certificate.  The privacy-related properties
for remote logotype data depend on four parties: the certificate relying
parties that use the information in the certificate extension to fetch
the logotype data, the certificate issuers that populate the certificate
extension, certificate subscribers that request certificates that include
the certificate extension, and server operators that provides the logotype
data.</t>
      <t>Alternatively, embedding the logotype data  in the certificate with direct
addressing (as defined in <xref target="embedded-image"/>) provides improved privacy
properties and depends upon fewer parties.  However, this approach can
significantly increase the size of the certificate.</t>
      <t>Several image objects, representing the same visual content in different
formats, sizes, and color palates, may represent each logotype image.
At least one of the image objects representing a logotype <bcp14>SHOULD</bcp14>
contain an image with a width between of 60 pixels and 200 pixels and a
height between 45 pixels and 150 pixels.</t>
      <t>Several instances of audio data may further represent the same audio
sequence in different formats, resolutions, and languages.  At least one
of the audio objects representing a logotype <bcp14>SHOULD</bcp14> provide text-based
audio data suitable for processing by text-to-speech software.</t>
      <t>A typical use of text based audio data is inclusion in web applications where the
audio text is placed as the "alt" atttribute value of an html image (img) element
and the language value obtained from LogotypeAudioInfo is included as the "lang"
attribute of that image.</t>
      <t>If a logotype of a certain type (as defined in <xref target="logotypes"/>) is
represented by more than one image object, then each image objects <bcp14>MUST</bcp14>
contain variants of roughly the same visual content. Likewise, if a
logotype of a certain type is represented by more than one audio object,
then the audio objects <bcp14>MUST</bcp14> contain variants of the same audio information.
A spoken message in different languages is considered a variation of
the same audio information.  Compliant applications <bcp14>MUST NOT</bcp14> display
more than one of the image objects and <bcp14>MUST NOT</bcp14> play more than one of the
audio object for any logotype type (see <xref target="logotypes"/>) at the same time.</t>
      <t>A client <bcp14>MAY</bcp14> simultaneously display multiple logotypes of different
logotype types.  For example, it may display one subject organization
logotype while also displaying a community logotype, but it <bcp14>MUST NOT</bcp14>
display multiple image variants of the same community logotype.</t>
      <t>Each logotype present in a certificate <bcp14>MUST</bcp14> be represented by at
least one image data object.</t>
      <t>Client applications <bcp14>SHOULD</bcp14> enhance processing and off-line
functionality by caching logotype data.</t>
    </section>
    <section anchor="extn">
      <name>Logotype Extension</name>
      <t>This section specifies the syntax and semantics of the logotype
certificate extension.</t>
      <section anchor="extn-format">
        <name>Extension Format</name>
        <t>The logotype extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/> or attribute certificates <xref target="RFC5755"/>.
The logotype extension <bcp14>MUST</bcp14> be identified by the following object
identifier:</t>
        <artwork><![CDATA[
   id-pe-logotype  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-pe(1) 12 }
]]></artwork>
        <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
        <t>Logotype data may be referenced through either direct or indirect
addressing.  Client applications <bcp14>SHOULD</bcp14> support both direct and indirect
addressing.  Certificate issuing applications <bcp14>MUST</bcp14> support direct
addressing, and certificate issuing applications <bcp14>SHOULD</bcp14> support
indirect addressing.</t>
        <t>The direct addressing includes information about each logotype in the
certificate, and URIs point to the image and audio data object.  Direct
addressing supports cases where just one or a few alternative images and
audio objects are referenced.</t>
        <t>The indirect addressing includes one reference to an external hashed
data structure that contains information on the type, content, and
location of each image and audio object.  Indirect addressing supports
cases where each logotype is represented by many alternative audio or
image objects.</t>
        <t>Both direct and indirect addressing accommodate alternative URIs to
obtain exactly the same logotype data.  This opportunity for replication is
intended to improve availability.  Therefore, if a client is unable to
fetch the item from one URI, the client <bcp14>SHOULD</bcp14> try another URI in the
sequence.  All direct addressing URIs <bcp14>SHOULD</bcp14> use either the
HTTP scheme (http://...) or the HTTPS scheme (https://...) or the
DATA scheme (data://...) <xref target="RFC3986"/>.  However, the "data" URI
scheme <bcp14>MUST NOT</bcp14> be used with the indirect addressing.  Clients <bcp14>MUST</bcp14>
support retrieval of referenced LogoTypeData with the
HTTP <xref target="I-D.ietf-httpbis-semantics"/> and the HTTP with TLS <xref target="RFC8446"/>, or
subsequent versions of these protocols.  Client applications <bcp14>SHOULD</bcp14> also
support the "data" URI scheme <xref target="RFC2397"/> for direct addressing with embedded
logotype data within the extension.</t>
        <t>The logotype extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <artwork><![CDATA[
LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified,
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }
]]></artwork>
        <t>When using indirect addressing, the URI (refStructURI) pointing to
the external data structure <bcp14>MUST</bcp14> point to a resource that contains
the DER-encoded data with the syntax LogotypeData.</t>
        <t>At least one of the optional elements in the LogotypeExtn structure
<bcp14>MUST</bcp14> be present.</t>
        <t>When using direct addressing, at least one of the optional elements
in the LogotypeData structure <bcp14>MUST</bcp14> be present.</t>
        <t>The LogotypeReference and LogotypeDetails structures explicitly
identify one or more one-way hash functions employed to authenticate
referenced image or audio objects.  CAs <bcp14>MUST</bcp14> include a hash value for each
referenced object, calculated on the whole object.  CAs <bcp14>SHOULD</bcp14> include
a hash value that computed with the one-way hash function associated
with the certificate signature, and CAs <bcp14>MAY</bcp14> include other hash
values.  Clients <bcp14>MUST</bcp14> compute a one-way hash value using one of the
identified functions, and clients <bcp14>MUST</bcp14> discard the logotype data if
the computed hash value does not match the hash value in the
certificate extension.</t>
        <t>A MIME type is used to specify the format of the image or audio object
containing the logotype data.  The mediaType field <bcp14>MUST</bcp14> contain a string
that is constructed according to the ABNF <xref target="RFC5234"/> provided in
Section 4.2 of <xref target="RFC6838"/>.  MIME types <bcp14>MAY</bcp14> include parameters.</t>
        <t>Image format requirements are specified in <xref target="image-format"/>, and audio
format requirements are specified in <xref target="audio-format"/>.</t>
        <t>When language is specified, the language tag <bcp14>MUST</bcp14> use the <xref target="RFC5646"/> syntax.</t>
        <t>Logotype types defined in this specification are:</t>
        <ul empty="true">
          <li>
            <t>Community Logotype:  If communityLogos is present, the logotypes
  <bcp14>MUST</bcp14> represent one or more communities with which the certificate
  issuer is affiliated.  The communityLogos <bcp14>MAY</bcp14> be present in an end
  entity certificate, a CA certificate, or an attribute
  certificate.  The communityLogos contains a sequence of Community Logotypes,
  each representing a different community.  If more than one Community
  logotype is present, they <bcp14>MUST</bcp14> be placed in order of preferred
  appearance.  Some clients <bcp14>MAY</bcp14> choose to display a subset of the
  present community logos; therefore the placement within the
  sequence aids the client selection.  The most preferred logotype
  <bcp14>MUST</bcp14> be first in the sequence, and the least preferred logotype
  <bcp14>MUST</bcp14> be last in the sequence.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Issuer Organization Logotype:  If issuerLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the issuer's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  issuer field (for either a public key certificate or attribute
  certificate).  The issuerLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Subject Organization Logotype:  If subjectLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the subject's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  subject field (for either a public key certificate or attribute
  certificate).  The subjectLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <t>The relationship between the subject organization and the subject
organization logotype, and the relationship between the issuer and
either the issuer organization logotype or the community logotype,
are relationships asserted by the issuer.  The policies and practices
employed by the issuer to check subject organization logotypes or
claims its issuer and community logotypes is outside the scope of
this document.</t>
      </section>
      <section anchor="image-info">
        <name>Conventions for LogotypeImageInfo</name>
        <t>When the optional LogotypeImageInfo is included with a logotype
image, the parameters <bcp14>MUST</bcp14> be used with the following semantics and
restrictions.</t>
        <t>The xSize and ySize fields represent the recommended display size for
the logotype image.  When a value of 0 (zero) is present, no recommended
display size is specified.  When non-zero values are present and these
values differ from corresponding size values in the referenced image object,
then the referenced image <bcp14>SHOULD</bcp14> be scaled to fit within the size parameters
of LogotypeImageInfo, while preserving the x and y ratio.</t>
        <t>The resolution field is redundant for all logotype image formats
listed in <xref target="image-format"/>. The optional resolution field <bcp14>SHOULD</bcp14>
be omitted when the image format already contains this information.</t>
      </section>
      <section anchor="embedded-image">
        <name>Embedded Images</name>
        <t>If the logotype image is provided through direct addressing, then
the image <bcp14>MAY</bcp14> be stored within the logotype certificate extension using the
"data" scheme <xref target="RFC2397"/>.   The syntax of the "data" URI scheme
defined is included here for convenience:</t>
        <artwork><![CDATA[
   dataurl    := "data:" [ mediatype ] [ ";base64" ] "," data
   mediatype  := [ type "/" subtype ] *( ";" parameter )
   data       := *urlchar
   parameter  := attribute "=" value
]]></artwork>
        <t>When including the image data in the logotype extension using the
"data" URI scheme, the following conventions apply:</t>
        <ul spacing="normal">
          <li>The value of mediaType in LogotypeDetails <bcp14>MUST</bcp14> be identical to the
media type value in the "data" URL.</li>
          <li>The hash of the image <bcp14>MUST</bcp14> be included in logotypeHash and <bcp14>MUST</bcp14> be
calculated over the same data as it would have been, had the image
been referenced through a link to an external resource.</li>
        </ul>
        <t>NOTE: As the "data" URI scheme is processed as a data source rather
than as a URL, the image data is typically not limited by any
URL length limit settings that otherwise apply to URLs in general.</t>
        <t>NOTE: Implementations need to be cautious about the size of images
included in a certificate in order to ensure that the size of
the certificate does not prevent the certificate from being
used as intended.</t>
      </section>
      <section anchor="extn-other">
        <name>Other Logotypes</name>
        <t>Logotypes identified by otherLogos (as defined in <xref target="extn-format"/>) can be used to
enhance the display of logotypes and marks that represent partners,
products, services, or any other characteristic associated with the
certificate or its intended application environment when the standard
logotype types are insufficient.</t>
        <t>The conditions and contexts of the intended use of these logotypes
are defined at the discretion of the local client application.</t>
        <t>Three other logotype types are defined in the follow subsections.</t>
        <section anchor="extn-other-1">
          <name>Loyalty Logotype</name>
          <t>When a loyalty logotype appears in the otherLogos, it <bcp14>MUST</bcp14> be identified
by the id-logo-loyalty object identifier.</t>
          <artwork><![CDATA[
   id-logo OBJECT IDENTIFIER ::= { id-pkix 20 }

   id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }
]]></artwork>
          <t>A loyalty logotype, if present, <bcp14>MUST</bcp14> contain a logotype associated
with a loyalty program related to the certificate or its use.  The
relation between the certificate and the identified loyalty program
is beyond the scope of this document.  The logotype extension <bcp14>MAY</bcp14>
contain more than one Loyalty logotype.</t>
          <t>If more than one loyalty logotype is present, they <bcp14>MUST</bcp14> be
placed in order of preferred appearance.  Some clients <bcp14>MAY</bcp14> choose
to display a subset of the present loyalty logotype data; therefore the
placement within the sequence aids the client selection.  The most
preferred loyalty logotype data <bcp14>MUST</bcp14> be first in the sequence, and the
least preferred loyalty logotype data <bcp14>MUST</bcp14> be last in the sequence.</t>
        </section>
        <section anchor="extn-other-2">
          <name>Certificate Background Logotype</name>
          <t>When a certificate background logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-background object identifier.</t>
          <artwork><![CDATA[
   id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }
]]></artwork>
          <t>The certificate background logotype, if present, <bcp14>MUST</bcp14> contain a
graphical image intended as a background image for the certificate,
and/or a general audio sequence for the certificate.  The background
image <bcp14>MUST</bcp14> allow black text to be clearly read when placed on top of
the background image.  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate background logotype.</t>
        </section>
        <section anchor="extn-other-3">
          <name>Certificate Image Logotype</name>
          <t>When a certificate image logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-certImage object identifier.</t>
          <artwork><![CDATA[
   id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 }
]]></artwork>
          <t>The certificate image logotype, if present, aids human interpretation
of a certificate by providing meaningful visual information to the
user interface (UI).  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate image logotype.</t>
          <t>Typical situations when a human needs to examine
the visual representation of a certificate are:</t>
          <ul spacing="normal">
            <li>A person establishes a secured channel with an authenticated
service.  The person needs to determine the identity of the
service based on the authenticated credentials.</li>
            <li>A person validates the signature on critical information, such as
signed executable code, and needs to determine the identity of the
signer based on the signer's certificate.</li>
            <li>A person is required to select an appropriate certificate to be
used when authenticating to a service or Identity Management
infrastructure.  The person needs to see the available
certificates in order to distinguish between them in the selection
process.</li>
          </ul>
          <t>The display of certificate information to humans is challenging due
to lack of well-defined semantics for critical identity attributes.
Unless the application has out-of-band knowledge about a particular
certificate, the application will not know the exact nature of the
data stored in common identification attributes such as serialNumber,
organizationName, country, etc.  Consequently, the application can
display the actual data, but faces the problem of labeling that data
in the UI and informing the human about the exact nature (semantics)
of that data.  It is also challenging for the application to
determine which identification attributes are important to display
and how to organize them in a logical order.</t>
          <t>When present, the certificate image <bcp14>MUST</bcp14> be a complete visual
representation of the certificate.  This means that the display of
this certificate image represents all information about the
certificate that the issuer subjectively defines as relevant to show
to a typical human user within the typical intended use of the
certificate, giving adequate information about at least the following
three aspects of the certificate:</t>
          <ul spacing="normal">
            <li>Certificate Context</li>
            <li>Certificate Issuer</li>
            <li>Certificate Subject</li>
          </ul>
          <t>Certificate Context information is visual marks and/or textual
information that helps the typical user to understand the typical
usage and/or purpose of the certificate.</t>
          <t>It is up to the issuer to decide what information -- in the form of
text, graphical symbols, and elements -- represents a complete visual
representation of the certificate.  However, the visual
representation of Certificate Subject and Certificate Issuer
information from the certificate <bcp14>MUST</bcp14> have the same meaning as the
textual representation of that information in the certificate itself.</t>
          <t>Applications providing a Graphical User Interface (GUI) to the
certificate user <bcp14>MAY</bcp14> present a certificate image as the only visual
representation of a certificate; however, the certificate user <bcp14>SHOULD</bcp14>
be able to easily obtain the details of the certificate content.</t>
        </section>
      </section>
    </section>
    <section anchor="cert-types">
      <name>Type of Certificates</name>
      <t>Logotypes <bcp14>MAY</bcp14> be included in public key certificates and attribute
certificates at the discretion of the certificate issuer; however, the
relying party <bcp14>MUST NOT</bcp14> use the logotypes as part of certification path
validation or automated trust decision.  The sole purpose of logotypes is
to enhance the display of a particular certificate, regardless of its
position in a certification path.</t>
    </section>
    <section anchor="use-in-clients">
      <name>Use in Clients</name>
      <t>All PKI implementations require relying party software to have some
mechanism to determine whether a trusted CA issues a particular
certificate.  This is an issue for certification path validation,
including consistent policy and name checking.</t>
      <t>After a certification path is successfully validated, the replying
party trusts the information that the CA includes in the certificate,
including any certificate extensions.  The client software can choose
to make use of such information, or the client software can ignore
it.  If the client is unable to support a provided logotype, the client
<bcp14>MUST NOT</bcp14> report an error, rather the client <bcp14>MUST</bcp14> behave as though no
logotype extension was included in the certificate.  Current standards
do not provide any mechanism for cross-certifying CAs to constrain
subordinate CAs from including private extensions (see <xref target="sec-cons"/>).</t>
      <t>Consequently, if relying party software accepts a CA, then it should
be prepared to (unquestioningly) display the associated logotypes to
its human user, given that it is configured to do so.  Information
about the logotypes is provided so that the replying party software
can select the one that will best meet the needs of the human
user.  This choice depends on the abilities of the human user, as well as
the
capabilities of the platform on which the replaying party software is
running.  If none of the provided logotypes meets the needs of the
human user or matches the capabilities of the platform, then the
logotypes can be ignored.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose to display none, one, or
any number of the logotypes in the logotype extension.  In many cases,
a client will be used in an environment with a good
network connection and also used in an environment with little or no
network connectivity.  For example, a laptop computer can be docked
with a high-speed LAN connection, or it can be disconnected from the
network altogether.  In recognition of this situation, the client <bcp14>MUST</bcp14>
include the ability to disable the fetching of logotypes.  However,
locally cached logotypes can still be displayed when the user
disables the fetching of additional logotypes.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose any combination of
audio and image presentation for each logotype.  That is, the client
<bcp14>MAY</bcp14> display an image with or without playing a sound, and it <bcp14>MAY</bcp14> play
a sound with or without displaying an image.  A client <bcp14>MUST NOT</bcp14> play
more than one logotype audio sequence at the same time.</t>
      <t>The logotype is to be displayed in conjunction with other identity
information contained in the certificate.  The logotype is not a
replacement for this identity information.</t>
      <t>Care is needed when designing replying party software to ensure that an
appropriate context of logotype information is provided.  This is
especially difficult with audio logotypes.  It is important that the
human user be able to recognize the context of the logotype, even if
other audio streams are being played.</t>
      <t>If the relying party software is unable to successfully validate a
particular certificate, then it <bcp14>MUST NOT</bcp14> display any logotype data
associated with that certificate.</t>
    </section>
    <section anchor="image-format">
      <name>Image Formats</name>
      <t>Animated images <bcp14>SHOULD NOT</bcp14> be used.</t>
      <t>The following table lists many commons image formats and their
corresponding MIME type.  The table also indicates the support
requirements these image formats.  The filename extensions commonly used
for each of these formats is also provided.  Implementations <bcp14>MAY</bcp14> support
other image formats.</t>
      <table anchor="image-format-table">
        <name>Image Formats</name>
        <thead>
          <tr>
            <th align="left">Format</th>
            <th align="left">MIME Type</th>
            <th align="left">.ext</th>
            <th align="left">References</th>
            <th align="left">Implement?</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">JPEG</td>
            <td align="left">image/jpeg</td>
            <td align="left">.jpg<br/>.jpeg</td>
            <td align="left">
              <xref target="JPEG"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">GIF</td>
            <td align="left">image/gif</td>
            <td align="left">.gif</td>
            <td align="left">
              <xref target="GIF"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG</td>
            <td align="left">image/svg+xml</td>
            <td align="left">.svg</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG + GZIP</td>
            <td align="left">image/svg+xml+gzip</td>
            <td align="left">.svgz<br/>.svg.gz</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGZR"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PNG</td>
            <td align="left">image/png</td>
            <td align="left">.png</td>
            <td align="left">
              <xref target="ISO15948"/><br/><xref target="PNGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PDF</td>
            <td align="left">application/pdf</td>
            <td align="left">.pdf</td>
            <td align="left">
              <xref target="ISO32000"/><br/><xref target="ISO19005"/><br/><xref target="RFC8118"/></td>
            <td align="left">
              <bcp14>MAY</bcp14> support</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: The image/svg+xml-compressed media type is widely implemented, but it
has not yet been registered with IANA.</t>
      <t>When a Scalable Vector Graphics (SVG) image is used, whether the image is
compressed or not, the SVG Tiny profile <xref target="SVGT"/> <bcp14>MUST</bcp14> be followed, with
these additional restrictions:</t>
      <ul spacing="normal">
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any Internationalized Resource
Identifier (IRI) references to information stored outside of the
SVG image of type B, C, or D, according to Section 14.1.4 of <xref target="SVGT"/>.</li>
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any 'script' element, according to
Section 15.2 of <xref target="SVGT"/>.</li>
        <li>The XML structure in the SVG file <bcp14>MUST</bcp14> use linefeed (0x0A) as
the end-of-line (EOL) character when calculating a hash over the
SVG image.</li>
      </ul>
      <t>When a GZIP-compressed SVG image is fetched with HTTP, the
client will receive response that includes these headers:</t>
      <artwork><![CDATA[
   Content-Type: image/svg+xml
   Content-Encoding: gzip
]]></artwork>
      <t>In this case, the octet stream of type image/svg+xml is compressed with
GZIP <xref target="RFC1952"/> as specified in <xref target="SVGR"/>.</t>
      <t>When a uncompressed SVG image is fetched with HTTP, the client will receive
response with the same Content-Type header, but no Content-Encoding header.</t>
      <t>Whether the SVG image is GZIP-compressed or uncompressed, the hash value for
the SVG image is calculated over the uncompressed SVG content with
canonicalized EOL characters as specified above.</t>
      <t>When a SVG image is embedded in the certificate extension using the
"data" URL scheme, the SVG image data <bcp14>MUST</bcp14> be provided in GZIP-compressed
form, and the XML structure, prior to compression, <bcp14>SHOULD</bcp14> use linefeed
(0x0A) as the end-of-line (EOL) character.</t>
      <t>When a bitmapped image is used, the PNG <xref target="ISO15948"/> format <bcp14>SHOULD</bcp14> be used.</t>
      <t>When a Portable Document Format (PDF) document according to <xref target="ISO32000"/>
is used, it <bcp14>MUST</bcp14> also be formatted according to the profile PDF/A <xref target="ISO19005"/>.</t>
    </section>
    <section anchor="audio-format">
      <name>Audio Formats</name>
      <t>Implementations that support audio <bcp14>MUST</bcp14> support the MP3 audio format
<xref target="MP3"/> with a MIME type of "audio/mpeg" <xref target="RFC3003"/>. Implementations <bcp14>SHOULD</bcp14> support
text-based audio data with a MIME type of "text/plain;charset=UTF-8".
Implementations <bcp14>MAY</bcp14> support other audio formats.</t>
      <t>Text-based audio data using the MIME type of "text/plain;charset=UTF-8" is
intended to be used by text-to-speech software. When this audio type is used,
the following requirements apply:</t>
      <ul spacing="normal">
        <li>LogotypeAudioInfo <bcp14>MUST</bcp14> be present and specify the language of the text.</li>
        <li>The fileSize, playTime, and channels elements of LogotypeAudioInfo <bcp14>MUST</bcp14> have the value of 0.</li>
        <li>The sampleRate element of LogotypeAudioInfo <bcp14>MUST</bcp14> be absent.</li>
      </ul>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Implementations that simultaneously display multiple logotype types
(subject organization, issuer, community, or other), <bcp14>MUST</bcp14> ensure that
there is no ambiguity as to the binding between the image and the
type of logotype that the image represents.  "Logotype type" is
defined in <xref target="cert-ident"/>, and it refers to the type
of entity or affiliation represented by the logotype, not the
of binary format if the image or audio.</t>
      <t>Logotypes are very difficult to securely and accurately define.  Names
are also difficult in this regard, but logotypes are even worse.  It
is quite difficult to specify what is, and what is not, a legitimate
logotype of an organization.  There is an entire legal structure around
this issue, and it will not be repeated here.  However, issuers should
be aware of the implications of including images associated with a
trademark or servicemark before doing so.  As logotypes can be
difficult (and sometimes expensive) to verify, the possibility of errors
related to assigning wrong logotypes to organizations is increased.</t>
      <t>This is not a new issue for electronic identification instruments.  It
is already dealt with in a number of similar situations in the
physical world, including physical employee identification cards.  In
addition, there are situations where identification of logotypes is
rather simple and straightforward, such as logotypes for well-known
industries and institutes.  These issues should not stop those service
providers who want to issue logotypes from doing so, where relevant.</t>
      <t>It is impossible to prevent fraudulent creation of certificates by
dishonest or badly performing issuers, containing names and logotypes
that the issuer has no claim to or has failed to check correctly.  Such
certificates could be created in an attempt to socially engineer a user
into accepting a certificate.  The premise used for the logotype work is
thus that logotype graphics in a certificate are trusted only if the
certificate is successfully validated within a valid path.  It is thus
imperative that the representation of any certificate that fails to
validate is not enhanced in any way by using the logotype data.</t>
      <t>This underlines the necessity for CAs to provide reliable services,
and the relying party's responsibility and need to carefully select
which CAs are trusted to provide public key certificates.</t>
      <t>This also underlines the general necessity for relying parties to use
up-to-date software libraries to render or dereference data from
external sources, including logotype data in certificates, to minimize
risks related to processing potentially malicious data before it has been
adequately verified and validated.</t>
      <t>Referenced image objects are hashed in order to bind the image to the
signature of the certificate.  Some image types, such as SVG, allow
part of the image to be collected from an external source by
incorporating a reference to an external file that contains the image.  If
this feature were used within a logotype image, the hash of the image
would only cover the URI reference to the external image file, but
not the referenced image data.  Clients <bcp14>SHOULD</bcp14> verify that SVG
images meet all requirements listed in <xref target="image-format"/> and reject
images that contain references to external data.</t>
      <t>CAs issuing certificates with embedded logotype images should be
cautious when accepting graphics from the certificate requestor for
inclusion in the certificate if the hash algorithm used to sign the
certificate is vulnerable to collision attacks.  In such a case, the
accepted image may contain data that could help an attacker to obtain
colliding certificates with identical certificate signatures.</t>
      <t>Certification paths may also impose name constraints that are
systematically checked during certification path processing, which,
in theory, may be circumvented by logotypes.</t>
      <t>Certificate path processing as defined in <xref target="RFC5280"/> does not constrain
the inclusion of logotype data in certificates.  A parent CA can
constrain certification path validation such that subordinate CAs cannot
issue valid certificates to end-entities outside a limited name space or
outside specific certificate polices.  A malicious CA can comply with
these name and policy requirements and still include inappropriate
logotypes in the certificates that it issues.  These certificates will
pass the certification path validation algorithm, which means the client
will trust the logotypes in the certificates.  Since there is no
technical mechanism to prevent or control subordinate CAs from including
the logotype extension or its contents, where appropriate, a parent CA
could employ a legal agreement to impose a suitable restriction on the
subordinate CA.  This situation is not unique to the logotype extension.</t>
      <t>When a relying party fetches remote logotype data, a mismatch between the
media type provided in the mediaType field of the LogotypeDetails and the
Content-Type HTTP header of the retrieved object <bcp14>MUST</bcp14> be treated as a
failure and the fetched logotype data should not be presented to the
user.  However, if more than one location for the remote logotype data is
provided in the certificate extension, the relying party <bcp14>MAY</bcp14> try to fetch
the remote logotype data from an alternate location to resolve the failure.</t>
      <t>When a subscriber requests the inclusion of remote logotype data in a
certificate, the CA cannot be sure that any logotype data will be
available at the provided URI for the entire validity period of the
certificate.  To mitigate this concern, the CA may provide the logotype
data from a server under its control, rather than a subscriber-controlled
server.</t>
      <t>The controls available to a parent CA to protect itself from rogue
subordinate CAs are non-technical.  They include:</t>
      <ul spacing="normal">
        <li>Contractual agreements of suitable behavior, including
terms of liability in case of material breach.</li>
        <li>Control mechanisms and procedures to monitor and follow the behavior of
subordinate CAs, including Certificate Transparency <xref target="RFC9162"/>.</li>
        <li>Use of certificate policies to declare an assurance level
of logotype data, as well as to guide applications on how
to treat and display logotypes.</li>
        <li>Use of revocation functions to revoke any misbehaving CA.</li>
      </ul>
      <t>There is not a simple, straightforward, and absolute technical
solution.  Rather, involved parties must settle some aspects of PKI
outside the scope of technical controls.  As such, issuers need to
clearly identify and communicate the associated risks.</t>
    </section>
    <section anchor="priv-cons">
      <name>Privacy Considerations</name>
      <t>Certificates are commonly public objects, so the inclusion of
privacy-sensitive information in certificates should be avoided.  The more
information that is included in a certificate, the greater the likelihood
that the certificate will reveal privacy-sensitive information.  The
inclusion of logotype data needs to be considered in this context.</t>
      <t>Logotype data might be fetched from a server when it is needed.  By
watching activity on the network, an observer can determine which clients
are making use of certificates that contain particular logotype data.
Since clients are expected to locally cache logotype data, network
traffic to the server containing the logotype data will not be generated
every time the certificate is used.  Further, when logotype data is not
cached, activity on the network would reveal certificate usage frequency.
Even when logotype data is cached, regardless of whether direct or
indirect addressing is employed, network traffic monitoring could reveal
when logotype data is fetched for the first time.  Implementations <bcp14>MAY</bcp14>
encrypt fetches of logotype data using HTTPS and pad them to a common size
to reduce visibility into the data that is being fetched.  Likewise, servers
<bcp14>MAY</bcp14> reduce visibility into the data that is being returned by encrypting with
HTTPS and padding to a few common sizes.</t>
      <t>Similarly, when fetching logotype data from a server, the server operator
can determine which clients are making use of certificates that contain
particular logotype data.  As above, locally caching logotype data will
eliminate the need to fetch the logotype data each time the certificate
is used, and lack of caching would reveal usage frequency.  Even when
implementations cache logotype data is cached, regardless of whether
direct or indirect addressing is employed, the server operator could
observe when logotype data is fetched for the first time.</t>
      <t>When the "data" URI scheme is used with direct addressing, there is no
network traffic to fetch logotype data, which avoids the observations of
network traffic or server operations described above.  To obtain this
benefit, the certificate will be larger than one that contains a URL.
Due to the improved privacy posture, the "data" URI scheme with direct
addressing will be the only one that is supported by some CAs.
Privacy-aware certificate subscribers <bcp14>MAY</bcp14> wish to insist on their
logotype data being embedded in the certificate with the "data" URI
scheme with direct addressing.</t>
      <t>In cases where logotype data is cached by the relying party, the cache
index should include the hash values of the associated logotype data with the
goal of fetching the logotype data only once, even when it is referenced by
multiple URIs.  The index should include hash values for all supported
hash algorithms.  The cached data should include the media type as well as
the logotype data.  Implementations should give preference to logotype data
that is already in the cache when multiple alternatives are offered in the
LogotypeExtn certificate extension.</t>
      <t>When the "data" URI scheme is used, the relying party <bcp14>MAY</bcp14> add the embedded
logotype data to the local cache, which could avoid the need to fetch the
logotype data if it is referenced by a URL in another certificate.</t>
      <t>When fetching remote logotype data, relying parties should use the most
privacy-preserving options that are available to minimize the opportunities
for servers to "fingerprint" clients. For example, avoid cookies, e-tags, and
client certificates.</t>
      <t>When a relying party encounters a new certificate, the lack of network traffic
to fetch logotype data might indicate that a certificate with references to the
same logotype data has been previously processed and cached.</t>
      <t>TLS 1.3 <xref target="RFC8446"/> includes the ability to encrypt the server's certificate
in the TLS handshake, which helps hide the server's identity from anyone that
is watching activity on the network.  If the server's certificate includes
remote logotype data, the client fetching that data might disclose the
otherwise protected server identity.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the new ASN.1 Module in <xref target="asn1-mod-new"/>, IANA
is requested to assign an object identifier (OID) for the module
identifier. The OID for the module should be allocated in the "SMI
Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acks">
      <name>Acknowledgments</name>
      <section anchor="acks-rfc3709">
        <name>Acknowledgments from RFC 3709</name>
        <t>This document is the result of contributions from many
professionals.  The authors appreciate contributions from all members
of the IETF PKIX Working Group.  We extend a special thanks to Al
Arsenault, David Cross, Tim Polk, Russel Weiser, Terry Hayes, Alex
Deacon, Andrew Hoag, Randy Sabett, Denis Pinkas, Magnus Nystrom, Ryan
Hurst, and Phil Griffin for their efforts and support.</t>
        <t>Russ Housley thanks the management at RSA Laboratories, especially
Burt Kaliski, who supported the development of this specification.  The
vast majority of the work on this specification was done while
Russ was employed at RSA Laboratories.</t>
      </section>
      <section anchor="acks-rfc6170">
        <name>Acknowledgments from RFC 6170</name>
        <t>The authors recognize valuable contributions from members of the PKIX
working group, the CA Browser Forum, and James Manger, for their
review and sample data.</t>
      </section>
      <section anchor="acks-additional">
        <name>Additional Acknowledgments</name>
        <t>Combining RFC 3709 and RFC 6170 has produced an improved
specification.  The authors appreciate contributions from all members
of the IETF LAMPS Working Group.  We extend a special thanks to
Alexey Melnikov for his guidance on media types.  We extend a special
thanks to Tim Geiser for his careful checking of the new examples in
Appendix B.4 and B.5.  We extend a special thanks to Corey Bonnell and
Daniel Kahn Gillmor for their careful review and comments.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5755" target="https://www.rfc-editor.org/info/rfc5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols.  Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements.  The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements.  The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications.  This document obsoletes RFC 3281.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC2397" target="https://www.rfc-editor.org/info/rfc2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein">
              <organization/>
            </author>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3003" target="https://www.rfc-editor.org/info/rfc3003">
          <front>
            <title>The audio/mpeg Media Type</title>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>The audio layers of the MPEG-1 and MPEG-2 standards are in frequent use on the internet, but there is no uniform Multipurpose Internet Mail Extension (MIME) type for these files.  The intention of this document is to define the media type audio/mpeg to refer to this kind of contents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3003"/>
          <seriesInfo name="DOI" value="10.17487/RFC3003"/>
        </reference>
        <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips">
              <organization/>
            </author>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object.  It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange.  This document  specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
              <organization/>
            </author>
            <author fullname="P. Overell" initials="P." surname="Overell">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC1952" target="https://www.rfc-editor.org/info/rfc1952">
          <front>
            <title>GZIP file format specification version 4.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch">
              <organization/>
            </author>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1952"/>
          <seriesInfo name="DOI" value="10.17487/RFC1952"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-semantics" target="https://www.ietf.org/archive/id/draft-ietf-httpbis-semantics-19.txt">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="Roy T. Fielding">
              <organization>Adobe</organization>
            </author>
            <author fullname="Mark Nottingham">
              <organization>Fastly</organization>
            </author>
            <author fullname="Julian Reschke">
              <organization>greenbytes GmbH</organization>
            </author>
            <date day="12" month="September" year="2021"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.

 This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-semantics-19"/>
        </reference>
        <reference anchor="NEW-ASN1" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="SVGT" target="http://www.w3.org/TR/2008/PR-SVGTiny12-20081117">
          <front>
            <title>Scalable Vector Graphics (SVG) Tiny 1.2 Specification</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date year="2008" month="November" day="17"/>
          </front>
          <seriesInfo name="W3C" value="PR-SVGTiny12-20081117"/>
        </reference>
        <reference anchor="ISO15948">
          <front>
            <title>Information technology -- Computer graphics and image processing -- Portable Network Graphics (PNG): Functional specification</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2004"/>
          </front>
          <seriesInfo name="ISO/IEC" value="15948:2004"/>
        </reference>
        <reference anchor="JPEG">
          <front>
            <title>Information technology -- Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2011" month="May"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="T.871"/>
          <seriesInfo name="ISO/IEC" value="10918-5:2013"/>
        </reference>
        <reference anchor="GIF" target="https://www.w3.org/Graphics/GIF/spec-gif89a.txt">
          <front>
            <title>Graphics Interchange Format</title>
            <author>
              <organization>CompuServe Incorporated</organization>
            </author>
            <date year="1990" month="July" day="31"/>
          </front>
          <seriesInfo name="Version" value="89a"/>
        </reference>
        <reference anchor="MP3">
          <front>
            <title>Information technology -- Generic coding of moving pictures and associated audio information -- Part 3: Audio</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="ISO/IEC" value="13818-3:1998"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC8118" target="https://www.rfc-editor.org/info/rfc8118">
          <front>
            <title>The application/pdf Media Type</title>
            <author fullname="M. Hardy" initials="M." surname="Hardy">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <author fullname="D. Markovic" initials="D." surname="Markovic">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="M. Bailey" initials="M." surname="Bailey">
              <organization/>
            </author>
            <date month="March" year="2017"/>
            <abstract>
              <t>The Portable Document Format (PDF) is an ISO standard (ISO 32000-1:2008) defining a final-form document representation language in use for document exchange, including on the Internet, since 1993. This document provides an overview of the PDF format and updates the media type registration of "application/pdf".  It obsoletes RFC 3778.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8118"/>
          <seriesInfo name="DOI" value="10.17487/RFC8118"/>
        </reference>
        <reference anchor="RFC3709" target="https://www.rfc-editor.org/info/rfc3709">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="T. Freeman" initials="T." surname="Freeman">
              <organization/>
            </author>
            <date month="February" year="2004"/>
            <abstract>
              <t>This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3709"/>
          <seriesInfo name="DOI" value="10.17487/RFC3709"/>
        </reference>
        <reference anchor="RFC6170" target="https://www.rfc-editor.org/info/rfc6170">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Image</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Bajaj" initials="S." surname="Bajaj">
              <organization/>
            </author>
            <author fullname="L. Rosenthol" initials="L." surname="Rosenthol">
              <organization/>
            </author>
            <date month="May" year="2011"/>
            <abstract>
              <t>This document specifies a method to bind a visual representation of a certificate in the form of a certificate image to a public key certificate as defined in RFC 5280, by defining a new "otherLogos" image type according to RFC 3709.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6170"/>
          <seriesInfo name="DOI" value="10.17487/RFC6170"/>
        </reference>
        <reference anchor="RFC9162" target="https://www.rfc-editor.org/info/rfc9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie">
              <organization/>
            </author>
            <author fullname="E. Messeri" initials="E." surname="Messeri">
              <organization/>
            </author>
            <author fullname="R. Stradling" initials="R." surname="Stradling">
              <organization/>
            </author>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962.  It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9216" target="https://www.rfc-editor.org/info/rfc9216">
          <front>
            <title>S/MIME Example Keys and Certificates</title>
            <author fullname="D. K. Gillmor" initials="D. K." role="editor" surname="Gillmor">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>The S/MIME development community benefits from sharing samples of signed or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9216"/>
          <seriesInfo name="DOI" value="10.17487/RFC9216"/>
        </reference>
        <reference anchor="OLD-ASN1" target="https://www.itu.int/rec/T-REC-X.208/en">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
            <author>
              <organization>CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <refcontent>CCITT Recommendation X.208</refcontent>
        </reference>
        <reference anchor="ISO19005">
          <front>
            <title>Document management -- Electronic document file format for long-term preservation -- Part 1: Use of PDF 1.4 (PDF/A-1)</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="ISO" value="19005-1:2005"/>
        </reference>
        <reference anchor="ISO32000">
          <front>
            <title>Document management -- Portable document format -- Part 1: PDF 1.7</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2008"/>
          </front>
          <seriesInfo name="ISO" value="32000-1:2008"/>
        </reference>
        <reference anchor="SVGR" target="https://www.iana.org/assignments/media-types/image/svg+xml">
          <front>
            <title>Media Type Registration for image/svg+xml</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SVGZR" target="https://github.com/w3c/svgwg/issues/701">
          <front>
            <title>A separate MIME type for svgz files is needed</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PNGR" target="https://www.iana.org/assignments/media-types/image/png">
          <front>
            <title>Media Type Registration for image/png</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="asn1-mods">
      <name>ASN.1 Modules</name>
      <section anchor="asn1-mod-old">
        <name>ASN.1 Modules with 1988 Syntax</name>
        <t>This appendix contains two ASN.1 modules, both using the old
syntax <xref target="OLD-ASN1"/>.</t>
        <t>The first ASN.1 module provides the syntax for the Logotype certificate
extension.  Only comments have changed in the module from RFC 3709, and
the IMPORTS now come from <xref target="RFC5280"/>.</t>
        <t>The second ASN.1 module provides the Certificate Image
object identifier.  The module is unchanged from RFC 6170.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(22) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
   AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-pkix1-explicit(18) };

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }


-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits per pixel
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified, 
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

END


CERT-IMAGE-MODULE { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype-certimage(68) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

EXPORTS ALL;   -- export all items from this module

id-logo-certImage  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-logo(20) 3 }

END
]]></sourcecode>
      </section>
      <section anchor="asn1-mod-new">
        <name>ASN.1 Module with 2002 Syntax</name>
        <t>Some developers like to use the latest version of ASN.1 standards.  This
appendix provides an ASN.1 module to assist in that goal.  It uses the ASN.1
syntax defined in <xref target="NEW-ASN1"/>, and it follows the conventions
established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <t>This ASN.1 module incorporates the module from RFC 3709 and the module
from RFC 6170.</t>
        <t>Note that <xref target="NEW-ASN1"/> was published in 2021, and all of the features
used in this module are backward compatible with the specification
that was published in 2002.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  AlgorithmIdentifier{}, DIGEST-ALGORITHM
  FROM AlgorithmInformation-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;


-- Logotype Extension

ext-logotype EXTENSION ::= {
   SYNTAX LogotypeExtn
   IDENTIFIED BY id-pe-logotype }

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }

-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }
      -- At least one of the OPTIONAL components MUST be present
      ( WITH COMPONENTS { ..., communityLogos PRESENT } |
        WITH COMPONENTS { ..., issuerLogo PRESENT } |
        WITH COMPONENTS { ..., subjectLogo PRESENT } |
        WITH COMPONENTS { ..., otherLogos PRESENT } )

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }
      -- At least one image component MUST be present
      ( WITH COMPONENTS { ..., image PRESENT } )

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets, 0=unspecified
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets, 0=unspecified
   playTime        INTEGER,  -- In milliseconds, 0=unspecified
   channels        INTEGER,  -- 0=unspecified
                             -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contains a
--       DER-encoded LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

id-logo-certImage  OBJECT IDENTIFIER  ::= { id-logo 3 }

END
]]></sourcecode>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="example-rfc3709">
        <name>Example from RFC 3709</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/gif.  The logotype image is referenced through
one URI and the image is hashed with SHA-1.  This example
is unchanged from RFC 3709, except that shallow indenting is used to
keep the example within traditional margins.  The use of SHA-1 was
reasonable at the time that RFC 3709 was published, but many better
choices are available today.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 106: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04  94:  OCTET STRING, encapsulates {
30  92:   SEQUENCE {
A1  90:    [1] {
A0  88:     [0] {
30  86:      SEQUENCE {
30  84:       SEQUENCE {
30  82:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  33:         SEQUENCE {
30  31:          SEQUENCE {
30   7:           SEQUENCE {
06   5:            OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
      :             }
04  20:           OCTET STRING
      :            8F E5 D3 1A 86 AC 8D 8E 6B C3 CF 80 6A D4 48 18
      :            2C 7B 19 2E
      :            }
      :           }
30  34:         SEQUENCE {
16  32:          IA5String 'http://logo.example.com/logo.gif'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-new">
        <name>Issuer Logotype Example</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/jpeg.  The logotype image is referenced through
one URI and the image is hashed with SHA-256.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 124: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 112:  OCTET STRING, encapsulates {
30 110:   SEQUENCE {
A1 108:    [1] {
A0 106:     [0] {
30 104:      SEQUENCE {
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            1E 8F 96 FD D3 50 53 EF C6 1C 9F FC F0 00 2E 53
      :            B4 9C 24 9A 32 C5 E9 0C 2C 39 39 D3 AD 6D A9 09
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://logo.example.com/logo.jpeg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-embed">
        <name>Embedded Image Example</name>
        <t>The following example displays a logotype extension containing one
Subject logotype using direct addressing.  The subject logotype image
uses image/svg+xml-compressed.  The logotype image is embedded in the
certificate extension with a "data:" URI and the image is hashed by
SHA-256.  This technique produces a large certificate extension, but
offers reduced latency and improved privacy.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2160: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2146:  OCTET STRING, encapsulates {
30 2142:   SEQUENCE {
A2 2138:    [2] {
A0 2134:     [0] {
30 2130:      SEQUENCE {
30 2126:       SEQUENCE {
30 2122:        SEQUENCE {
16   24:         IA5String 'image/svg+xml-compressed'
30   49:         SEQUENCE {
30   47:          SEQUENCE {
30   11:           SEQUENCE {
06    9:            OBJECT IDENTIFIER
       :             sha-256 (2 16 840 1 101 3 4 2 1)
       :             }
04   32:           OCTET STRING
       :           C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49
       :           9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7
       :            }
       :           }
30 2041:         SEQUENCE {
16 2037:          IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICIGpy2E'
       :          'AA2xvZ28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLe'
       :          'wHDROUBRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUkt'
       :          'yLmfOzPD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5'
       :          'cmPNvXv16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/'
       :          '7j+KtdXawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t6'
       :          '9vmxxon08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKy'
       :          'W082s8SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly35'
       :          '53ARpd7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8d'
       :          'pvpxP8wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8d'
       :          'p3Mn7cb3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwf'
       :          'bnj9a+Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqT'
       :          'hd/PpRpaz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3H'
       :          'p+B4InjVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VU'
       :          'FfYC01pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS7'
       :          '4DANjguwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxK'
       :          'ExEEWMJLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1'
       :          'Qsr6IUxlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQ'
       :          'M63xoPlWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gt'
       :          'WWm4M1rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr'
       :          '1idG0gahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0'
       :          'eB6DRA10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHC'
       :          'MNM0qlDRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAI'
       :          'tTABTkp5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI'
       :          '0QQ8CbzCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpL'
       :          'vsJbCALUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4H'
       :          'mYGKaiiJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXD'
       :          'Yr/aTqfxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V'
       :          '6JZhh/lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el'
       :          '0NJWO8mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyI'
       :          'p4ljDkoaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68'
       :          'bPF3uS1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH'
       :          '+yQxhzQsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4b'
       :          'reSaxZ/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1R'
       :          'fn/xQXywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiU'
       :          'tQZAWzmkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQ'
       :          'FiYcqviSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPE'
       :          'Vu6HaN6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3'
       :          'Dlf3Aj70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUa'
       :          'psK2T8SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5'
       :          'ZFerdjksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9H'
       :          'K5B3ELjSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6'
       :          '401+YfwDria4WoQwAAA=='
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-rfc6170">
        <name>Embedded Certificate Image Example</name>
        <t>The following example displays a logotype extension containing one
Certificate Image logotype using direct addressing.  The Certificate
Image logotype uses image/svg+xml-compressed.  The logotype image
is embedded in the certificate extension with a "data:" URI and the
image is hashed by SHA-256.  This example contains the image from
Appendix B of RFC 6170, however, the media type used here is explicit
about the use of GZIP compression <xref target="RFC1952"/>.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2914: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2900:  OCTET STRING, encapsulates {
30 2896:   SEQUENCE {
A3 2892:    [3] {
30 2888:     SEQUENCE {
30 2884:      SEQUENCE {
06    8:       OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3'
A0 2870:       [0] {
30 2866:        SEQUENCE {
30 2862:         SEQUENCE {
30 2858:          SEQUENCE {
16   24:           IA5String 'image/svg+xml-compressed'
30   49:           SEQUENCE {
30   47:            SEQUENCE {
30   11:             SEQUENCE {
06    9:              OBJECT IDENTIFIER
       :               sha-256 (2 16 840 1 101 3 4 2 1)
       :               }
04   32:             OCTET STRING
       :           83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57
       :           7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6
       :              }
       :             }
30 2777:           SEQUENCE {
16 2773:            IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICLXutU0'
       :          'AA0NlcnRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdo'
       :          'S7xK9jmeapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em'
       :          '8C9d9iERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJt'
       :          'eOv/661M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySS'
       :          'Jwkqj21k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysP'
       :          'Uo7QPK/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDj'
       :          'GiGHQ914n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKm'
       :          'SbLVWNoo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06m'
       :          'e6awqPeISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkb'
       :          'R4GtefENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5u'
       :          'F1Wqu7R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9Br'
       :          'FrMbeVuWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo'
       :          '5xb7YusvFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8'
       :          'IF2WZhNlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1bo'
       :          'UJvQFsvi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5'
       :          'Ls2ORfwM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hAR'
       :          'SXDR6Fzqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpc'
       :          'OcOb9u63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZL'
       :          'H96SH4R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMn'
       :          'WOqZJpmsXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLI'
       :          'il470zfSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KM'
       :          'k+l0SOXlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXP'
       :          'oTe0pnu4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekB'
       :          'cAUFPSGkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIq'
       :          'xT4CKsPlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugq'
       :          'zb7c3Q89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITz'
       :          'OH5uZSThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd6'
       :          '1WtUhDVJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAX'
       :          'NB8sm9Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs'
       :          '8C1Okb2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf'
       :          '6BC4SylWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LY'
       :          'sFzpGVY5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53X'
       :          'StSh1eogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7Oam'
       :          'hjU1HB3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA'
       :          '3Ne3P8lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjE'
       :          'Ed9EUhkwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8i'
       :          'HPud16wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+'
       :          'Ydaj6iwJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujp'
       :          'A2+wPmQR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGeb'
       :          'cMg7OgQKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwW'
       :          'Y1F0HlBUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAy'
       :          'GuEB3VR59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0G'
       :          'XECqedQQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3'
       :          '+av4Jcj78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfR'
       :          'VjwfmOnNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo'
       :          '6J2iYxP4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkB'
       :          'YwETNPt/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjk'
       :          'ji8quL3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7Sh'
       :          'Sev4oXicPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YF'
       :          'Up+Yn7WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnT'
       :          'W61zjQ7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9T'
       :          'eNGUHibE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe'
       :          '6sHxR3KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8u'
       :          'R0R+LDEqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz'
       :          '31cuocvoO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlD'
       :          'pE/oylpy+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol'
       :          '74Z+eHfpHNc7OjffQ/HeV0X8BopoDkGEkAAA='
       :             }
       :            }
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-full-cert">
        <name>Full Certificate Example</name>
        <t>The following example contains a certificate for Alice; it is
essentially a renewal of the certificate that appears in <xref target="RFC9216"/>.
Of course, the serial number and issue dates are different.  In
addition, Alice's certificate now has a logotype extension.  The
extension contains URLs for two community logotype images, both at
fictional URLs.  The extension also contains URLs for two subject
logotype images, both at fictional URLs.  An implementation would
display at most three of these images, both of the community logotype
images and one of the subject logotype images.  Direct addressing is
used for all of the images, and the images are hashed by SHA-256.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The following  displays the logotype extension from Alice's
certificate.  The values on the left are the ASN.1 tag (in hexadecimal)
and the length (in decimal).</t>
        <artwork><![CDATA[
30 464: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 450:  OCTET STRING, encapsulates {
30 446:   SEQUENCE {
A0 227:    [0] {
30 224:     SEQUENCE {
A0 111:      [0] {
30 109:       SEQUENCE {
30 107:        SEQUENCE {
30 105:         SEQUENCE {
16  10:          IA5String 'image/jpeg'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            AF FC 10 16 46 CB 56 25 B4 99 7D E5 89 3E AE 3A
      :            84 6F 5A 02 D3 82 D6 DA 8E D4 EE F8 7C BD 1D ED
      :             }
      :            }
30  40:          SEQUENCE {
16  38:           IA5String 'http://www.example.net/images/logo.jpg'
      :            }
      :           }
      :          }
      :         }
      :        }
A0 109:      [0] {
30 107:       SEQUENCE {
30 105:        SEQUENCE {
30 103:         SEQUENCE {
16   9:          IA5String 'image/gif'
30  49:          SEQUENCE {
30  47:           SEQUENCE {
30  11:            SEQUENCE {
06   9:             OBJECT IDENTIFIER
      :              sha-256 (2 16 840 1 101 3 4 2 1)
      :              }
04  32:            OCTET STRING
      :            88 90 81 81 AD FB 66 AE 2F 66 D0 49 A0 4D 8E A0
      :            EC 4E A8 64 42 38 5B 36 4A BF 2C 8B D2 E9 E9 66
      :             }
      :            }
30  39:          SEQUENCE {
16  37:           IA5String 'http://www.example.org/logo-image.gif'
      :            }
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
A2 213:    [2] {
A0 210:     [0] {
30 207:      SEQUENCE {
30 101:       SEQUENCE {
30  99:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            6A 58 50 2E 59 67 F9 DD D1 8A FE BD 0D B1 FE 60
      :            A5 13 1B DF 0F B2 BE F0 B5 73 45 50 BA 1B BF 19
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.gif'
      :           }
      :          }
      :         }
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            BD CB 7B 75 72 6D 8C 1B 33 A4 2C DE AC 79 72 DA
      :            4A D9 F2 79 84 0A 58 58 6A CE 2F 02 80 EA D7 A5
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://www.smime.example/logo.jpg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
    </section>
    <section anchor="changes">
      <name>Changes Since RFC 3709 and RFC 6170</name>
      <t>This appendix summarizes the changes since RFC 3709.  The changes are:</t>
      <ul spacing="normal">
        <li>Combine RFC 3709 and RFC 6170 into one document, and encourage
implementers to support the "data" URI scheme (data:...) that was
originally specified in RFC 6170.  Merging RFC 3709 and RFC 6170 lead
to many editoral changes throughout the document.</li>
        <li>Drop SHA-1 as the mandatory-to-implement hash algorithm, and encourage
use of the one-way hash function that is employed by the certificate
signature algorithm.</li>
        <li>RFC 3709 required client applications to support both direct and indirect
addressing.  This requirement is changed to <bcp14>SHOULD</bcp14> support both direct and
indirect addressing to allow implementations to be more privacy preserving.</li>
        <li>Update the reference for language tags to be RFC 5646 instead of
the now obsolete RFC 3066.</li>
        <li>Update the reference for the URI Generic Syntax to be RFC 3986 instead
of the now obsolete RFC 2396.</li>
        <li>Update the reference for the application/pdf media type to be RFC 8118
instead of the now obsolete RFC 3778.</li>
        <li>No longer require support for the FTP scheme (ftp://...) URI.</li>
        <li>Require support for the HTTP scheme (http://...) URI and the
HTTPS scheme (https://...) URI.</li>
        <li>Require support for the compressed SVG image format with the
image/svg+xml+gzip media type.</li>
        <li>Media types <bcp14>MUST</bcp14> follow the ABNF <xref target="RFC5234"/> that is
provided in Section 4.2 of <xref target="RFC6838"/>.  This change resolves
Errata ID 2679.</li>
        <li>Remove the requirement that the LogotypeData file name have
a file extension of ".LTD".  This change resolves Errata ID 2325.</li>
        <li>Encourage, instead of requiring, each logotype to be represented by
at least one image.</li>
        <li>Encourage the inclusion of text-based audio data suitable for
processing by a text-to-speech software using the MIME type of
"text/plain;charset=UTF-8".</li>
        <li>Require that the logotype extension not contain more than one certificate
image logotype.</li>
        <li>Privacy-related topics that were previously discussed in the Security
Considerations section are now covered in a separate Privacy Considerations
section.  Additional topics are covered in both sections.</li>
        <li>Provide ASN.1 modules for both the older syntax <xref target="OLD-ASN1"/> and the most
recent ASN.1 syntax <xref target="NEW-ASN1"/>.</li>
        <li>Provide additional references.</li>
        <li>Provide additional examples.</li>
        <li>Several editorial changes to improve clarity.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAF82CmMAA+y9a3fiWJIo+l2/QjfrQznHYN4Ysk/NHZ42NhgM+Nmr110C
BMgWEpYEGGfn+S33t9xfdiNiP7QlhCurumfmnHU6Z1a1kbRfsWPHO2Kn02nN
Dwxn9v8YtuuY3/TA25iatfboLz/IZ7PVbF6buVPHWMHrmWfMg7RlBvO0bazW
ftqbTwvn2erE8tPZojY1gm+6H8w0d+K7thmY/jcdX6f0cu48q01dxzcdfwNP
f8WBftXW1jdN1wN3Ck/2pv8r/PBdL/DMua882a/UB4EV2DCVXztOYHqOGeiP
Z6VsVR9sJrY11a/Nvd5x5p7hwwjTYOPBp1134Qb7tenrlsO/bpheYM0tmDB2
aUwmnrn93Q81fzNZWb5vuc4Yvvqmd1rjtmZ4pvFNH5nTjWcFe+11B8/51NJN
hJc2g8bf9Hw2n09nK+n8uaYZm2Dpet+0tM7gOgrMueHoIwMa+r7rwKpdbwEd
NX1zqo9cexPAoL5eq8MbMdvYS3izdmEzbQRpWm+7nv/qWM7Cn+wdvTMzqde0
Pmql8/mCfp7VuxtnBo+m7sYJvD1MogW/zJVh2biJ/n8YhpGGEc6m7kpOdLjx
ff3S3fi2uReTvLcWli0BkNK73YYyy+hb3E7YXhPwpJQr6wAfx/S3lm2b+tA1
aDrw1Tf9EuA3c52Ufl+jKc4IgIhEyoTvRuGEl2xO/7HF4eKzHsNMXE9vw8Ar
QwK3tjI+XEd/MCcwPW9rTU1fmV6umqvolWCp17amnNbINALAvpT+EE6rWsll
c8emNUdkhrH/w6DBIrPqwpYY3gwWDqcC8MGWE5u5E1OZSqFY0geG94pTcTbK
bABlrqBxSm8o0ynlckehZHtsrP8wcAiajWY5c9dbGYG1NRFzhu1GqZrL8z/L
+XKF/1nJ5cSfeKbFB7An/M9qriyaVfO5Mv7Z7zbTtdFNDv+Gc254C1zPMgjW
/rdMZrfbnVnB5sxygoxnTjPj9LDVSD+e5bOVjOmwJuywj9bmlJ1CwHTdneu1
CQDHmAb6aO8Exrt+4wbsXd8x9RMY8iz3lToQJw3/TjPwNhqd8ZgesIOZq1Yq
6VyOngChASoVAIxEE/paH5oAq5XpzNgoNEf4oDPq56rZbOmbOtl/px+63nSn
G2gS6IBzxsKkP4Hespct25wGnusAyZqJ7+YWHAO2Gfg/OpDkRRooyUpfe6YP
KMoGl30ATgR6DnbYNxEmg2Zbz50V9RP4I1NLHwcAzFpZPtD4Ev2EESzTR3T4
xgeADxE88EE6941/B88K8Gf2jy95AJTdmMASwwWztR4siK3k/KfnX/ls/jRb
Nn/8bnR/MfwEHWHeZzBIxgAyv3Bwln5mZc4sI02MIWOtYF0Zf7s4fV/ZKgh6
+JGOfAGQZWEhetJu4UYeNkpY1YPr2TP9wZqZRJIaQNIBYNZmpax1bgBtY4t4
PrKKhRUsNxM82pldYYqD7hYZYFobmPx5NqdOuQYgWxswT1PvdXotHVdI84VG
H4SNwAh93THNmTlLmMXg5p8AyrWz+GNgFA3+IRA6cZKXrwgyVjovlQSdq1bK
/M98oXou/swWxdNCNlsQzcryablSqMh+C0X+Z65aEuSxUmTfdtLNMxKmEG4o
Q/nInwJr6uPbm9bDnyCe5Uo26WR2BJUHWAbmdOm4trvYh0fvZwiqOFYH1Hhi
+EDHHN7k6LEd36VVugsCUS4N0uWRs4tfx+juNz1cH53uTKfV+KZXKvkiHfB8
jp2N8SHIOMR2BULJ8TCD5CAzGKbxc8vZ5/JpfJLL5c4jjGdq2ESz7oFcAwpe
eMZ6Cfujn0C7rzq2BEqVj4LkH0FPnAQwozSfxiFcHgqw4mPzRn5UqhYricT5
91Cg4a7WG2A3+kIsEhQDduiAAbkgHsFEFgn0/MYMdi6IJyFwgDJIbGlvnCmO
adi6/zNQ4tsahUnxOIVnOMCWzb+8GrQu/hQImiA9ggQNwtMKWS5K+gQEEK1w
6YDqKB1YzgakzXQAGhPIaCC8MiD5YlI4vN5GZk6KwHRpOADCNmN2J1ftTvs4
az44I4ALx/lz4hkZn1XOcwfwyYI8my4BhHIFeHfRaR8nK/yQiO3MwMcZ3Lr0
wppXqsZZ8B6owJXbfrjaoyIYohoK3QiiqeutXeRCKo/JVavZdPY8XcgdWfu9
6fm0XJgRPOoNCn9qxy9MB7qeKju8crf419oi7ZEdAmBh7tTCKcJqZparW0q3
UfGlAHwVP/l59IalfiLA8O0rVGD7Ct/oWy2dToN+xQi2po2XwKSlTMXPGE5c
n4bKq26+g1TrS1bqTO0NrlizVZ13zZToV1CilbYcBkHgWRMgEJFXZ7HhpeaP
fI6Uf2qMP1BVOGOTX1mzmW1q2i+IM5472xCF0L//YuHPH3xNEXKh+5v12iaR
0te/f+c8+8ePlL4D5FsihSKJRWNrSCeuQQUI6mW8axvkDKBajWHX/0rg2YBE
bTlasDSlLp9i1DBImAcIDD9+xKeRDC6ld13t/Sy+jQlwpMHwLxhMhSl7gX/9
+HGmff/OTqAPX8FktsBtEBX8zWpleHtEcByXf6MDtk1NesLAJli6dmz3xvAp
Y/dzTtexyyiqwToCV59YiDQqSsFDGEmDGQENDWguoMHyHyc4CX8zeQFG+/UM
2IbnrnDeAMVpYO/Z4YX+bW1rmbu1C5iSgu5grIVLFHsDvHVi6sZ0aZlbOKiT
vY5yJ55l7FodFWfBh4JJAf1bAtfbgeAM++srM4ZpXLo76M1LUR94vlHRkqYm
LWpqAsZ33fmqLw3YSGhlu2tzFtt+w4NJ7l0ADc5dm0vmiFMDpHC9GcwFILUC
1Z8GRfHbZ4QJXjn6wnYnsGCHMV3Ca20JmOLBQhwTGFOEOCk0T04TDq2m2LUQ
Hz1fX238gACILB0mMMM+V5YTQWB97cLSgbqkNGMN6LX2kCrS7m584IEpJJUb
z0CsshEE7NigwYO0PeSfSLdg92AWdROewYhwFu09EV2AMBxbwIqV8WoidrC1
ABhnQAuIfO2WbL8MDb+2phsbYBpHPzReAniC5Z7Gh/7NrcE0TtpjC3V81GrE
rCM9rIw9QsJ8N3D9M32OuOgjHgDgZ9Z8bnqATNoawAYkCtUIBOlo7wcmgn2q
ikukQOEPPH0RsMqF6OFCtMg0AAV8djg9UMHmNBf40zPfNgALQU4ISmw5bBPO
tN4GSBE/6io2oPRiUDeAahHEhGmqG4pIZcI6aXE0ygoPlqNKgn/Rl+HhsKJo
h6t2AzhkFhMRaZ4wvAfYtwbsR8gsN6DssK3imzR14bxSez4KQPUSv/Jx2XN2
MMLTFhnQgVe4lIXrWYzaa/5+NXFtH05xz4UxlqwnyctJyrPNd+VgIMw8kx1G
ogcmkDp7r/GpfdBaQo6Jswaq+opD8HniPhCho2UBXJwFbiGIQrAXe7HGD5Ph
FKxqa+GRNd/XyPzh2Ch9IRpyHNQiZ9rFjZxbcJygUwu5OUANUBOmTtTkjMSj
vT43d3TggKV4wJFgjYZt4yQMoMwgtiImcsaIe8JszDRPY+GZRAWACxrTqbkO
cMcMFFHQUJrSQV5D3KWPUfx0HegY9UdXbCkQK2vLD4+WsND4nsNe14BpMCLA
kNfyBSIgQk2ArCDiwOq4vVYwOI8tYs0kCW0Le+B6iJBwMAG3YMcCRkAdU9AD
3914UxJ6EJoAEbFANMotYMNtBusJkFnTdNC0btFZQGKpbhf1x9BEV9FEAyo3
Mwk7UgJs/Be2kEgEy67zhdEhtH1XX6Otz8fR4JgyxiXFIAvpJ8kI0FMoxsW+
mhreDN6vAdlBtsZPZ7gb3q8+CDtTEASBguOyYdP5t9rCAImDyD1ry2a5N2yi
yPAI4N45OhfgjYiknAwh4rBP90SDlq6NbM3wI8QO1+mjAMHfrMzVxPQ0IaIA
Vm0ANZALj9XfdC48k2yiDuORwMz9KYhbiAkoVWgc4NQ1qOguIevCczfrT1eR
IiF4ufdJ0MATlwqxG8W26NnnBAb2F2Q1m8i76SyJ+RGx0VSShg3YyeCy39GN
RQ5l2nO27r2GyyW0YLvN+CWaxoARYJcczXB0ONTuDhjvgogByESeT7RX2zhM
FQHKA6x0sxaiHrItEgEjzGBt45AgmgGf2Ro2TsmDFeLEzdBubb5zKTKl7SSz
5CwHJupz2TCiYERUB11/MIk+4RFWOV8aJEzkUVEAxQV4n+bCFqH98ovqquMd
xDb6+y/YPE3d/mCiLApXxJwYM1L3a2auAZl9ImhLlAkc0BRxDSToa1HdwiPC
MKM5Cr4e+YIGQqnY1LfAu5mMpbFRSf5CvJzrB72yJtQ3SocwJUCxrQU7wI8d
8Dl4AbxbbCljN0AtheRLFMsi5u9PiQiTGAC0mlgcCsNwlDZ2cCDJJ+8DJ8kk
EjsJiA5UbGktlkQPmdiV4pySpCqDy0N4sjWtBWizthnn9VFqiayEY/w3Tfs3
MpnhscbFRCcEACcpki2UvzOZ5OTuYNdAm+ZEZYedgOR0hj0OTCTlaXSNSWRG
QNXz9RT8p5HiXAXOQCDpD58addASjZC5AC2d8mMn6adPIiGTn/h7JFtAqtZh
L3eOFECAk6QncHIcZHkRSJxYZ+ZZCoQqJ91qdiLvvlIvDxZCG5pNbQsPLJ53
hMSUcTYkDoINSbYJDUkyiozEXzK6LfGT4YqBKIgMhRFi6BSVMdKTGQox8os7
iVs839i/i06aEPWAGiA+SYwNQANgewgwXMekaBwW3/ly4BTOQmMo4OucOcBo
bN6sQRy/icKioYH70ElzA70BSO4LbBnMDM7pCqfWtjw/YEqg1HvFNA6UX3cO
bFDjEtISXbzw6RzVYSYG4yZKdZYWSyINymA0hMZnL+3rxA7jCrYbqsTMNEEi
N3WnzVE4mdnIOjuBkPrxvbDtCtalk5tREOiQf2kH9BBxBVkpE6qsBceWpQFS
ig+KgMPIDtMlcc7uzNj/GsPimavhHHFrP93ZGJugTZIa/mwDwhUISS4zpXik
/Xhzg8nO7Y2HcE8hwd5HR0d6qhw1pL+I6FEFHcVyQZCRQyg9AEtAiwIucOYS
sHdA3HAuIA+6fqwneMyAAVABvsyZ1EgwLYSRGlwiuBPjasCe0PECpGqj0jgf
UGuHy4isizR3PgWFo+AC4zreLnLEqCEbEA8t0Ak7imgEDVC04cTPQTh0yQIe
3ZuOA7NaodRIMiXtasIstSmbVkRpw7PJhaE46OaWHTD9gqxzJMQwbdJC7Syi
e6qrAfx426BsDgcCJX5koUskW6BDxY6QUE75Riu0ToULGvnZEVwJI124K4SW
K/ShcqOJIWRaLpwwnUJowSBXwdGZaihOM9hidzvADjNgoAwi/adIsA3QJYiH
HHgm/pji7DVOpsnORf1NXdsFcNjcqMkYkNSZNK2jGJcEjfetlYWCONo0YY+J
PiWKWIwuMbTiogxSD0T9qOrD1LoZTBRG3Vh+VFCiRSoG35h4iKpYRA7l9kuN
2cEEleA0TIh97mpiOZJWguIbSgZjopCAEPJ4wXZNXC78bVjcRDiDnWXbpAIQ
7eAYbZAZRKKZH1qi4HyF1gvsLM5cgPZaxMI8ZuiyVghlg5QWI2AvAGM1gwNs
yrqa2ibsieFNlyCpILHiFD40FsrvFRVVY4YiYqZcP3HJxInmKcFFQCpwV+TH
UGYKCrMXFbOTqD/TExQFCObOtH5rFRGiiRwDCwsUsZ1xIIyEM9jayV6kWpwI
9YQHkgkKkWn5UziBJmPzchaKV6N3NxrrN/0xiZgOmiJQf8Ye4QQ7pHTJxSs4
SQItcGod9ByLR/cY0vXApO7v30ecZpcRjtL1gBaLBHiGXarzl3Y/XyoIeKSA
Tae5YVo9eEgtUVWgHlCvmKJUyQU5bgrUyBYr1GPDRstXsGTSJtGRyPjWwaLU
dYwjuKGYL0MXgrTrCtyNiSQaQZBh/cw1mTQCQg97r6xZWPlxSrR0m6lGcOZU
k67CKFIopiT14G4Wy4DrSHQUGVsHGkzG5oixgQu/DFx4WD1TF0oxY1HiYCOZ
4hsbteUifWCWaWJ5kdaSLACKTjYBMzmg3YXUSPItMk6nChQUa/YeIM3ZuvY2
LnQzqk1jSZ7gp4S+E92uGdkvSRybg0LDAAGSGjAeoMIcapJ/JkmVzD0Dwpn/
mgonIkVqkn0tJD6GN7EwLgc2hXeDgaeRvlTU047ASXA8OMVc8OVLJzDjZzOJ
NxqMRZKjqzNzJJkn3s3phnFWim9EF6UxXaJinMIvUSECQsJZsmFrcZQCmQbt
JcxkwSRDJqZaPppAGHM1SGmceO6OdoS56aQzAqdK8j6iICNbbtSOwHRIZv7U
QsMhP3QJhJxrjXHkC+lyxLsg9AzyqsBpgBWC7DXjxiNBSJipGyEDDJRULQxP
ID/YwWC42XN3uuFrSSBszInDeThaINTtVneS7RVRjeTOFUBp3FHDUfrAXswA
5rGDGzsTQjz+HHCaCjjSGbARt/OjwwQBKekDi5mj0WCTYMbMBkP85/t335ym
EQxEPVEMGRN1Z56277+QZZ2LGegc26FNQP+CTOpLiv0vMiv8e9i6vesMW038
e3RZ63blHxr/YnTZv+s2w7/Clo1+r9e6abLGyPwij7QvvdrTFyYIfukPxp3+
Ta37hZkfVV9zaGeSrBtZjg8EkVlViWHUG4P/7//NFWHt/xcGweVy6IdmPyq5
8yJ5wE0udpJcwH6ihwB9hSaRdHI7TI01RtmgbOVz3RG3D80Yf0XI/O2b/j8m
03Wu+O/8AS448lDALPKQYHb45KAxA2LCo4RhJDQjz2OQjs639hT5LeCuPESE
0ZvCjUjBjiSgRdIPYrqhlLuSgyOYSOAfWl+DJTpyKMcDlQQpOFFfZFdrSLu6
eIlPO4j9HoasGI6g3Or7keDAyR9EDfZyVM5G0FGNQi2ZrYVrMLT2dwJNseKF
Zis4b0T6sQWXmQ5NxDEtz98g9UEXIBkvaFXMs8YF9sNJotrspklzEtYj7nMP
P1Y99QuQbMUXKj0D6KOrGRUyO2p685mPjvaRhqTAMtH3JHQHIWEV/jXhNlC8
NrqwFQqZgI0FQhcJHYhc+Jkmlh06ENh0Vb2N64r6CbPC+vp9Z1QjgPYMdDU0
oCOMy2jEwCvAKfqOqNzhqjQFvKFUyMQzay08ILHWcbCjPPQJXpL/LPwlXUTc
EK5FGkkMQ0qn+BzFqljMAoO5ilOoCX2G+392Enx3hWSrjK5HRweZyZgxZ60Q
2Y4cb+6Xj0ZdoiYB6DRjFiGVVDAnWbQLjlfEHqc26AAYG6QuVYQlTMhh5HLB
XiyLc9PD5xqXS0yLDzolbBS98agG+bl8QYoLSMxOmmb744cmHMWCmxE7lqRU
b6LGGZLPNGqgv0NCdy5fu2IbwFA94xsPhiUtFk8GiwXEn0i1pITFRBJiXMKw
EjZULFf8pUYUUHaFUBVMA7ebWlIAXvjJPGK25bD0zJULZ2oiziLJPtrdsMM1
7qhjRNiJBA5FVsrGwzOY3sHZXhr+UrhlKQ4D5bEZn+0hjrI9J7/JdJ8ORTp3
jR+ZPi2YzzY6LKNbOgUpbjxGHjCJMK6q8HghjX8gTc8HAS+Hs1NMBmhmNIPp
UjtYfypBv2WkjkZau+uNTSpT9CtN9p2KmtEU9zR1gBE8ZlRl4m84GdWOzpo7
lpgjDCGKepiYl1DW1QWR0QVNFWhQdSjpwd6ndPS1z2bCRxjdhiSwESecWcAv
Ag3oj8fl6BPDjx1O6tecpQnlf/z4Gs7KWuGf5kyghhaiBLMaco/rZo0IYO5M
iQHRQDwRq0RECcR6CvPDaToYKAgQ9EjtI8qIFslDXReJOA/nYieTESigmHF6
rftIiIFlb4gRUWoYLjSMAmPIhkEAMBb3+5EtFiaPSOKnYgELRExDGrqiiK1a
oKOyqtqbo1OLzkzhMEx21biJjegmteOiy86awf8K1RJ6Lmf1tfVu2gzm+Wzk
p6EtTdQiZYNiSX2dK4mvVQg6zCrNfH8hkcJVz5k3Jh6uYZD1BKOkfTwJZNJW
YKpLmGKgDs9v5REphrPYYLA92mgUmGnSwInj/xzMQlcnnC7mnFRIuh4JXlNU
x8meNQjcNHAQEzZTODwohAkGEH492kj4lBsGojQ+5L0YU2BOoj4dxndRYGCt
qBuLQjOmTGTB1X4x7OALmj1ErPHWsDcmD6xdBiuB3ifWavEVYzeQP5GiTYee
w1K0mvDYQPJMCA5KwewYRS/nPFPGxy6+KLHOtAtGILBa68xVsEv/KyIqPTkg
H6GeA5QDrRtm6MoFwEflQ/WA8HAEOlzRg4OMWB6PreFZhsP81B6aD+39sWN+
pnetV3NnYYKthUFFn6zDUnAtaaYqWpIJ20nAVpIYkiYaPTMqgwPCAWKM+wr9
rdA7sogdJHlcmKuKhdrg/rH+RbT3JwOwvCAb5xLFUGlw59YyLbriRBqGmCfb
UZRRUiNNBQsPcd1HBVNQU0wzji6GQl0Ca8WOIw+HALUcvV0bG0gVBkmjsMnm
reNDax0J7IR5hAQ+KhGjixn1Txa3ksKMACR0ojPKCUrQD8JedmR6o4Au3ogR
p0NNNKWjIRkGECDTDqbMwJuIK4f9YbhNhPcImoxsI8LsacCJGcdpA4AhmZQi
C7OdwqhyHnui4gmntSIwLmaYc+fzNEYdxiLhyamJAceLqGgSk+5bUpb7/gtq
BVKy5/6aMBmGwMJSG5n8xBMtBciktJQodHEbXzgcT+Zio6bZaeHmviTfFCDf
xAyp5/FMG01xy5AWlJxFouSdnB0dlO+homNOGK1jZm9ySdDGhdYW75um/U/4
h+lH1iwN+pLsWO/Xr1qNsd5ptm7GnXanNdT1b99+44lK34G+uCe5r8poaRX9
TwpfQUObnZS/MhujYwYnPEGdZT6x8hAnpa9AxzCoyvJXPv5av1rvJ+df2Wxw
gFxe/8HmyLY62QOIliV0ykGnyIxh/7oRCZfHoinKTLAkdiA0Uibp6pQqdSD1
IlE8julC55u4UmJmATrJHcWUDDoYB3RW9HnQQ+ogLDKxk+jUNDEVXZmK8EfE
ngusjcb3GxN3cyDJHthK2ORAAwW5BRN2hK5pJem0nIhgEmZcyeDT9plLnstG
LxshLaP9EEPdjVDD4RmZipYuWZCnbjtfdQI8wnXjGLIFc1QS1nnoC0PVGMRG
JjDKzASSgWTYlQo47gRk5J0LGgQmTSrkQJEUKSaEkgRQJ2G2AkSaCqLY/hzK
KBQipUCND+RpEbaNIepHcFmdgmJZinRK+x+4GpMvkXOyhC7BqKIEnptF1TBD
Zi4IvaYgFkYizZlaqRtbw7K5f5PZIFjYBZPehCAAfW8cHq6jkfrPUJLiNFHw
xe2GKXMTAGvEj0/goZWL2cnQrsIxXugwqJKg5/IAMgQB3geqBZzGYNvL8XjA
Yxv0E56ofnZ29lV3macb348iH/jRL7RmbVyTH5CZir9n+YLVShmYRCyR7Qt+
9wXnpfGWKvEk55yIDU7aakn/uHAtqJNnArcyQZtgeTSStiLtRS8HGeNk0DEt
/fv340UQeJ6jAANrOe6O2MqwiAKmf1Jg2ITtQYCOZ3Iuc77uk8ARuFOWB/QJ
1UaBTC4kCiMBXRoWC0HAxBAnDzea+RK5BUSLGlWUYDdVrviMe5M3P8qxmQwj
2LRgaiCYOMiN9VHr9q5102jp35G3ShEQv/N1/a/Zv+mtx0G30+iMw0/7bSlQ
kZ4njI8pkgLI7oXvGaf+a07p4ngzLgLLdn/N/1QzOlp8stSscGTCffGh6EeK
Eof/xAggN2iRoRFgjct+R4CL76f8h+ASDRB1GUCc6GcIEPHRUHIJZShC+sO9
YRQ2/Je4HfRNBEKMQitzhOGTmpLanrx06vTIhJom0GiboC/nzx6l5DcEO/Yv
0mdkO9UR2VwOR6S1/M6IhjQ/REcMzRJJI4pOD8ekAjRUXoZn2NdKo8AjQSqd
ZmVw6BOmZZIXhtSUNdNNPkEz/AddYDDoCmO9sJiYPNmXICZEdnnUeW7pJ7mz
s17t8StuHH5Rsxc1Z3aP1piU2hpp0Oet5TIOdlpiehQOQQiCA1yndgSjZqtd
u+uOeWwptsPk9hEaVQX8bsati9YwRWvHENNpYKLhLvvbxpHxZtjwXW0Vb3iJ
4UEoLtnMYosKEpkZseX+s5b3KG1OE9uFtsMEZB2GLyPnS9rEBFyKf1OAG+Ia
DY558Vj3R++KVmNjEYM/wRHhz6cNqtLCM/ZYWMY8yX5NMdiiZhPfOWWKcUrl
bFZ19C2rVCAEC00tbAxAmVBeO9rTETq0/ygCKYBFAi1myBZ3s8FsPOaattHF
4GIGHaXxO6Coaocn8RDL/jS2oJVjbK2ONlxZtm35lDKR1Bw1SMe0/cTmka9T
n59o+Dz328p13JSe/40y7uCv4m9vG6pViPLr2jaHKPEyKBZCKEq0ol5GPM0J
N4HN+5+FbQesMGEfBCERhO9Al+esba6yliifVrAzZHOHI4HUNyI1iFO8P0bw
ZGtO8X6O4B3ZuAGayilGfWEqlkGVLx9rytUfL6J5aVpsygnLX7IvZF81EZXb
kSaWlPiO9cH+9RvjFkg442Hn5kLaNygfasOV0QNhk0nyCKgTFWxfmarNQoU1
IW2SrhpTUknElHq5IZOio9orddFsDdOw4e5MeH2ldsBtaipQ0eya4M0SLFS4
IXzhZYwIsXJ6mrBfcY31LAKPBGgYPzOmFhuzmQCSyJhj5eMQ71EkiMsaShUB
8x31Cwu0XGFa2wtLBdm7Vb+6jOqHZkAi3D0Phg7T9zA9U6pSiZhJqk2Nm4rC
IB/qnvl2KGTKmC7VroTfBDjRdMN89Nw6sVtitq+0N2DXXEsS7ulI5xxfKHZf
URwTV6mUUtLklxFfubVwDAQjMx7RsmpPclVM+aaABBrcj+miYh6x6AU+U4Y8
iqdBMY7KfeAmNbVTDAClPL4DV7nFnCdy9cpgMgh+ZQgrg/L20FoWUQtrSklG
NFn4DC0Y3xJmXLJBRx0tMZLFT3Gim5/HaYQSMYDBnkW9UKwAj7PQRNKGDP2N
JyVg97X6TVskFhSKYQEiipsVORTFszzOmRUtqhQqZJ2Qi43udihMy0gYvmqq
geKZsvZAPLmBwCEM8z9SoRlN+8kO6GPZgaA+kmGr6RSpqDc1MBYMiCIghUGk
jOYKTi9VezRbteIEPQzawvmByv/vSqymaP6NpY1HFf0wATYV2XYUi2lmoTte
JUuiF4tSoeBsspJW8SAXYRSgSLc5iHh0muNVGthMuOdDdTRhAjsKP4dZL1iG
p1GLPmGRYNINAu0OI41iY0q7K0aO8ugCTLY8gB1pmGQjjcUJhP7TSFhqLJ8w
7FHTI1ZWFfb7kKcwz72MHIUpsaI2HsmsLESaB6uOKKNSUCCA4XTpYnZnIH2G
lFY48U1x/qEHAeSo48//C77mCWi4lTQPivsOLVKaHoLKsGa+avsMyyxweoG5
HnLmoeNMlyudY7K0DGjk/aakLY9x6U97wDzJeAdneAB4+GdfDaKMHgXFYBXb
CnWXYqcgDPv81Y+4bfmaE6ZIznQ/EHBM8boyRFQYnKlvwj18qenReFEyLfiB
64Wxn5H3oedPbhE/doxMnxBLZ4Zk44g7MeJBjB6dr3xlCriOnVV+UqPtf+Ks
xgKu/l3GjH+ye6rd8I9tH2/5v/L+ibiAf+oGqhD7T97BMYV/ssJI/tJayyAx
Bf4xIPAjz19qiRHTIWU42jnHfKpKJn0n4mlyGDb3nyREVWjMBRgORcmNsNLQ
Q856FoGsvOQdz+TCzFK8KkBK65E2VJxraU5fkwGihJh42tQ2rJXP6tHJBSbM
mBi6uwl8UZbDn7oUhaQdRj5jPrSzxf1GjQJR7NAa+P0XJh2hvv+DCzYRbemw
iRr7xQML5ZmizpigEcpr8pxFnUmKI0NGYOCuAsZSoUeLFUVBsDODIUKEGQDp
1PixU++J2rfmTHJGsgRivYCIxMsi0niRESMMlMvqJx+m536NkBvHVXvWIj2r
kp/oDyt6YC+sWyZPimly5PZNrrBw6YI5G6MV8ah//hWnKYeqXzyG7OALrqpN
EE8Mnls7t1R2zwZSLNVK8pHc8xSPVOJ3DwgVgsXP7HWqyy6JgjQ2MtpGrubZ
xpmJmouY9hXdChHjqWF5h2Sp/YzlDgisPBiFR77CQt2VFZDuKYCiDgGDY8W7
fSgYxssVivAe7rjTOyx44PsvsWBmimc8xCqGOlzTEXEkyfYalj7IWnFqzXmI
sjuy9+SwdabEIkvhLspD9yTgJWMOzDrDVcQDj6YmtQ7leFPkAMvGR0JCuZdK
WBD2sfFsNFp9+411+e2L/lemRtKs/wa/vvwFQ17LxS/w60vqC7WS7hfme4DW
f2X67ZfMF6SWvPG/nUDrLyF26l/FsNxWBg3/DWYwXRoemYrlh/gm5F1ffvvC
zpJqTQszI8J9UNMYEjyxB+AO4ZeK0bSpQnrRx7ynBDvcCEluQm3bcg5MSNGQ
LfRq8JK5uuqUUu0H4Z52z8RYZGSIWAVkv0oAWsQzJeMy6d4Z1SC0FRn3KO6w
1BDkWPqOqvGQg3piYp7n0piFI0In+DQpvgoYh+W8xsNohO0RT+JNf9z6ptf8
I174sCgki0M2uF2T2S5ZNrRGOhq9BMikDjbbF1Ha9p4sNLYFBERkMe01aANa
irMApkVvgFkFgazkyWxQGBfMNhnXAi2IZPPMxjOxinhSkFIGbmogLdv4PJZK
kmVMGyT6o6nbFSsypaQf4o1aIuRI6eQgg0SaozC3WvDPg2I/ExOtPRsOWxFm
wwkkuRqUNFUe/shSsUKThh+LOVS8+ofpIkr85I+vIpWJm7s0ETQaUGQaj7BV
K7bICqw6z6sRXBcTR7BSU0rjVUHDKpx+KloWEgkJCHWmh6n4U7XWuwxViYnk
agXhSD0HpTRfyItEdl4skJiEBOBGm/kcxUtpbVZKsYrSKQAkGaiqlPo1wyCX
0MJD+eocwhwj0HrpmWoxMZYnOj2IhqEpYMJwYi6g2jUnP7yCApkipPQGqIIx
uqx0qLRzqciSzgm505A1RuVgzBIiJaAQe1IyFjoS1qoJAXxG0app0eFhMmIk
uBW/TQhqRZ/Odwo3fbXe9XwWHV9hA9l5khMtbEt956Qjp3awSIpJk+JmzOQa
QiJmKw+BBUi9ALYn6yVwA2wCngKaMD3msKZtvIVQw5TTGxtPwzK8onx5qIfo
UT0kqnNH46BlIkbUlNaNwYeljkS/OUCUY6Y27TNT208Z2rTjhjYp1x9Mh2V3
RoxtWpKx7Y+Z2jTVUJYw4k9a3bRDq9tnnR0xwNHJViOW68b0FcvqKv6w6EHP
hwddRbVJ2O7nzr12PJxdHE2lz584+urnv3eS1ZBz8/fW8dnR1njpMpl3GHIR
lFWU3qQCEz+lKUzfylDMsyijwDw+EqsSGnF8CvvXFMGQFQ2eAKa+sjQzLp9g
FTJRLZyYGT9WlDm7FiJGfM6fnH4RYqqSAC0sFfA5WJOwj3mEkhGvkIx4bN3/
NJzDrjuKXv45yoVf/x7GFY5iXHQBUWQjepJUhE07uKNjsucqK+otK9NAFyGW
a+UpcLFy84EsrSpKbeond52v/5S9ji4IJRCeQBkt74MbyZbGLsSgqpusNj5u
CJ+3FABlKH102cyR9m96TdRplBWyeKWRKZUG5fFDsuit6o2fkbNEqSUmupLz
Cq94CLlpePGIbB2Wi8LPIkNQkQ+Tyj6yGsFyvrxMnchoEs5yKtTEk12ildN4
OQ8cFmuXztSqWRjQwS/o+Om5UwHU6NTZs1/9mLlYmTXZg8i0zrzYvOSoE7lz
IlaLjFRRZj2k3f+knjEQvI6YaU/ePKlRRJNyPcuR7cJMQtoBlj9gxwztfkTb
UipbqnLUKmSWnIWTQ05cYjGO6i9RVS5y0vglFehpX2JdUGdB4S6s5C2RaGi/
M207LSTx0JBKRhuJBAIg0iICE7lzqEQ0rVZRW7DsMeigaXcOXBGw4dVxd7Y5
w+wT0k2P3VCSOuiJ6qGhkold0FtK99AFljI04oFIwnci6tvEavnIeQscpguy
DJsFJqYizoQbY0X5NHTnbUo3gyklrjo8LQALHsSnipUDxJ7QO7oeg5d/wMTL
OQsfI5GPCkGT6mlMTJsZhEC7IrMW3/m7Ds+Mwf0UFiZeBk1q+BFonMit+6qJ
xGlRTCSQl0GoeCBYu7oOUJPVO2XQY38ckka0CqmUciknfIlb5gqHhSnxmjQS
Qio6BiIWIhJicEjRBfM0ePG5QBBp7ZBIJ4krsH7kS35o2QhPEHN8HI4pe/bJ
4nyYsRZX5mXf3AHDnTZUI0NWhDH88AIhpBcAJ43oDzcixcukWzLHi5PjA409
eogWFlnXjRkga5wk8AMoYtsi9kaNFfcy6BIiPwGOrL6XstwGMybEHzOvevwp
d9dG74riPUSLrPiC/TJTDBdQ8btNtOoig/fStNd+BESs4Lurg8AHxDkQiih/
zS5pEt2uNx5Vuk6s6sHOzWYtMw2lU07WkzSik8doT2HL8FaEW1SRM5TU5S0f
dNOLCF6Ediq2/Skkj+RkHW2XsCcsNO5wB9WFkTkvfjSjaUVk1OXCHy/poPFd
S5CkgjjoEqrE8JtLNK12eKUAi625kHC9w03vhALlBUiUQthU+yTkQN1cetQS
Tj4vSEGFB49CMtIwVkL8YMTQuySKe/NS1zyPkSgSN9wnVFMVRSQoYZ0M/kcK
vpNtLWI9/fl08ejFjLE7SY4Z/w7LGkVBoUVvY5OivAhnU6yvYeG0wyqhmlJR
mcISRblacT3UNKyDZ9INOurRVn3fmnKvTswSHKnwGyGqnrkwvBmJO6wQn8au
cGJ4ayRMmG3VHbucUcSUfv8Flp22nDQ3Ev3AQkq2PrjuIB+N2PZF8EgUfLIY
Pgp3dFmCuzI1meR+7Eo4Uc24UZOFSI8IYYJZorzgsI9jddzFApUa1ykt9IQp
kTCsonR4ZR9FMrDk8No8oIkldEu19MWFH3j+uI7CAyMxdVdW69qzlYlKlTHO
gA9xxWHK+aH5Qylu5kSDZaT6Ke5uEGY1sQXoXQgNfFTImfNkkjDj5YGDI12A
uoParBWwoEDlMzW5WObsG6FzOFTbw0aaPGAAKPoetFLPw1r+4SVrsowJE6oI
kYjkkU/NcbUEHXxn+BEacsh/GhuPohyFh8LX+L0WojASQjhEVaZfuL6fZt0Q
lmOANruQjt3riMm4FBVM0kKN36gRbpq4TifcLFHLJSypizfaRIV3a37sWLES
wz4FM/EaQOiwW6J/UmPBUNCC6Z0nG4fqrsGoeNfF/qseUQBCx09IfUC6Rit6
KOGRuGZyfLVETPTcWvA7RfBqEN89i9w8rIUKQCSmR+KF74b4L45LbKFUMZEr
zozTcemVVK4JVpM7vDJUqiAav2WG3aSydFFrjl1wxTLnLTPakK8ZUAmVTjQk
EHs21gefAxwDJkI5SuAwrsZI2jes7bRxHJZNDqfIUdI2Ds6Lr9yFqS5OuUCL
opgx0J7rbJ9NkeMJmcXlCNz1yA73LFY7KKWH98Vy7xmjlamE0FxcSkpn//E0
PEOOzKWL4cCxqANWG125hkKTBQz4fss7wYyY25FXrHXdmcbviEUEdUxZrZup
lZ81B6gFNplVgLLEO9myaOhIESTQEI01GoXlDQ4cmjN3+hp6r/BaMKqZNtO7
tRtlWinmrZKtQGZh70Q1MtwqMRHDFnf2MiipxdaFL0q5QiVGPYVXXcH5Pd88
RrhRE8CyEPw6cLlZiryuiXqlWKMogqZ0SAO+Q2EZ+ci1Oxofyj8YS9R1NWxl
2D+KiIQzkTtReAUUQ7oVInKxSA0KTbBIJijbI8qmQCqVPrFIkUGXqb1I4sJy
Vj5a7+Wl2SS+k52BvThoqJbCcqQnoRbhe6JomBb3CwpjftQPklAOLGKt5tdU
q/vEbsl7EblKbJLEg4U5LaJiRa7TTXa5qKMhZzU0oojcKSiv6pDWumhUWoNR
SqJ5Ao3YJVQIqCOcIh4UAtQ/YmblGrxa3TamzQv6G4qWmkkxj6xIr4URC3hf
IDvWBHX1mDAl/PCyG5VaK2pVeHVQsIxMTyWNKR2DVjDdiu0H3+vAM40VM2tR
5IrONvJMRuodkRpiglqC8Hr0fulQyIhXwIuWqSPb4GEwiRHETBagczCfEKsp
5svwXFlVrOZYTHPiRY3CavWCD3DUDiPRmH2f3Wu/4hRhRTcqqrGXwjlsgUIR
CUSV6Vgci1l3/BLSmaxXa8qCUpFsqoDdn6COxPvBfHBSLBTpT71fdaZJaiRD
W8Rc5eW4IXIelFzGIn98RvzYRiahaX8Xldvw39/ZOpVqEPTwDNEv8u/vukz9
9PWf+Pf3cGb/N3sAA18NWhfyPc0r87I2F0qjs5f14n9MvMy/n4kXfwexGNv9
+EHPWYRnlhLJjgwcqRbGBr7otMP3bOAFyNPqwJHfYmBo97PjJg88ur8I37OB
/e3i9H1ly4Hh9+HA0G4sR4Yfw6PD4vexqmti4FP94rkziA98uviw1nzgDwZr
+Ots8ZE48PMnIyeueHBzsOK1s1AbnUV+ixV3Rv1cqVqsyMGho2NjJ6540FT2
WPEOZNazuRh4lrDHMHAhn81m5cA4k2o2W1J3vpLLwcxwxeH5og6079/0CLFK
M0JBdzr99iVC1r78EDGRYxGMKTYFL2VDkQQlUiXOFa/Gg4OOJZ3FaUKTAquJ
qaHPChnq3gxErKm8E5lIbad2UzuTMQBYb4Pmdg+yE9AYboYE5RP2+WsYx41E
KBW5a0q80pRZstuImHiEyDa2HPKnI32TeBRG5hBZpn5hYhoja4qspyY/yIhh
7FZxpKi+dKTnZDdlEh4wLLy+YchDaLXwgmtYwUkHSwJ4IfkKIuVdhRdOZJdI
P284PD7C7ain9AbJ6c1UNPNXJPbmime5syLL7WUQOPvJxfzKbsT9VVjXowNo
ejhESSQPxwZ47HWVNH4ujeGotCMyGxcrjc5R/TjJvmdrX5lfnPxyzgy9n3T/
+Umr3/0aRoUyqUvERDPhloVY89hoFVohwiH1URE7BAHegIRCv0BUrG3GDK+q
hgdSkYnV8xhX9k1hfueWMYZES9NAhwkLz8dIkwazOqfHlFEXOWXq6xbWcoCl
fNORHlJjTdw+ifomw2yqzsJlLIkGUTrOL8DkayT0JrJLdCNXLeWxhtvhdXpE
00NYgbz9hwClJwBKk4AKa1OgpKFChMOL0RDHPQAHf88mJglAZELxbcU7aJXZ
88uvIoUXtINOkgLsD2Agis0TUEGvdOmqXzrqgKAhfvpRABsT6FKhe+q4Ip3l
82sREhIeupGEh7DPSMygkuwfB5PGrC7Crxc5rSk0CboscY43IL1dqZcojq0m
j+3vHdoQABMrWGGU1yxO47EH5Ncq9xUZQ2EKFZeueWcD1GiQizTF3VlcnDwB
BvxVuVFLpY8ql9Xk8EJ/IJl2ImTUxLIKgrHAGJmarvLoM9QeWHm1UHuIVC7A
sglRIZnoiLRNU9uIJIMj9gYF/op1o33/Do/wii9myAlrUwBZ+EJfZlYgs37h
RSez2QImIcWHjlWhDcvuq3VgE4fATzOgY1nOX3CPfTP47W7cTle+nB2sTxVS
VF0xVALGieNKtP/ZoeN1SIVN7pP7AcQV56jLsLL+Sn0PdrVpqMNFK1TwdKJ0
QgW8WNUaVuBaKRQiK1NwnRpnd4ZdCZUM8ytTsuYWr38iSmhJj7eSJBgbWzqU
w6xK2b9SIov39ElHZBXglXfwrmxWFZoCebBwPd/h779IV8Ex9P7JSu8ssUE7
ScrVTXHnaCrMyCXxh3DqK4/sVewsuHvcWuPqxmpiLTYUfuWLYzyxmHIdSWyW
NX7J985xLpyeDE+JhbeA8vslUkGEsDGSWUPOZbIrifonVsAEQTkjSt/FcsM8
yM+T9TwsupsxUiw4ao2hyziX1Botjd5ekE4rqRzNmereRvsL3WsWGpIoCg9D
L23mfAQSuIHdDoNwYL0Y4sXSW3jtfNFYlExhHl/G3O3IaGQ62rmeb/Lb5Xwd
jhbmREVmwI/MThg/6QI4XveGxH1Dt0HJCMgaE70NwkmoOsCQgezrAfqFoS1G
k0gp1WCR2Mz+h6gmd0lG0bES/CZJCnRFohIzIm4kCl1dBpm2ZOafEoCBHnDp
gROlsWOmKUMLPJB+6E4+V16XSz8nLKFh5lKSMjq3av7B/VNaCMwTokDuykSz
K7vDEw7w1qTwDrorlMfjrV1g9uGNtOT29DUlqQXvPGfGzp3nKpcB+EqgGl8j
y2Glq39m4qZ2YXTVHXOnuMbJi+ahQBUPlWPXwK74EWOoItKHZ6YhbJ4UQRA6
deQ16mHEMi/6sF7ufQp2AeyzkeuHflDxhtcRMONTwYJT7I5cTeiKBDRxA2r8
8tNY83gMhbgmlnRpxiKiN8bKUGGlHQKLgk0xnNPBsvEbVFV54AkCC2bB7nUf
q5emMpwk2PvoFgqW6JngKCWurvdw5q6+42F1bHuUsdHvI1BOXHAo4vBkqBda
mRGHmCVXpDbOPSA7G5uq4cDmCYBE4mMme3TELLGYJdX5nxgzIDf86mh2/SId
sJRQVfEZGi/Z4sOMu3gMIbNM6FTdgaEpPZK3MvP6EGRxxUromIYEkI9G70wJ
gBOTzV+66lBCXK0ZuXK5PZ5iQ00KziD3Esgk4pZkfrNIwt1s5grzV0leEUGl
kqCRlw3DbpYbzk/lq4UwmxykpJLjgQetkDnXOoh0PB4oIsImDfaIheMIRwJO
Q4N9Jv6/VZhiQoBXLCKEPp1TiFbgatK0z8kCjynisAXCb9DFI6EgGC2XxmkK
xSja8rZVx6TrTHiZeh4NIeInAF0t0hdk6qm8fCnimPjVF3q+oIYiKJ/wBWDL
AMb8/xpzr+NYKtSVcY+Ei4klMAdwdB0imSi6HnWWFqO6gDPaZo3SLcFSulRs
a+IZHv/IQ6mYfPJ435Aom8juLoRzrcnEb2az8lXKGCuw50SWQBd7w/EEivsB
Or/lv/pqEqR6c70bsAwKGy86wBIumGxNfXJ+BpwWDyZaDzURfItYSZdZo3IA
eyBRFGA3TK7FwXaBXQQRyRVAgU8Rhnhoo5KzkRQTShmJvAHVKJNkGdTuFEvW
0iLXlYrOqaiRbSteczXDnufHT9CDCaQH1CNhzDp6t8Wc3RGuXmUhB6SgDSa7
zE22nB0SaFnuJZrJqtSIOShPoLFaAkQ0ptIeghn/kZmRxi+mxv06ls0uSdK4
OHpYDIXH04twPq6BMhmErQ3AqnGRiAJoDLIpKarX8QIlvGYUu0OHdaGCK2Z2
jdRhReduzZeXtURof+QWgRgMJW+dYBQOryDAEmQkxZdEOjEEmN89CUcTbVOR
W+jin3JZnnbMEJVsw1qUgMhJJH67sZGUcJaMKEmBnsi7jOkrE2k4UofGRo1N
X+4bXtAjwEhnlgOWqk6Y9pozQ+iQnTUWlKvRaLNkiIZVNRLrjSJ1bBwEN7LL
jZnnc0XBqSwwUoS7BXzLMUIrvH6eBYcgm8e6RBsvOiEZOBlSqxQLmUrxZBIX
k1j4HUVTy5tuVluph6mRIWoIeKxHPV5pIbxXSlaCCIP26DCqlwF/SoQpMgOj
6kC+whJiBgKed/V53Cnbd26CisYJQi8wJ3ZXNRcDotejumTwI12VYrq4y8KQ
1TtYSba1QRlhmngvKmlGdp1iZvhCQubA1sJC+feqs0beA8ADZKOmGZKlLco3
YaFFsKgw4EIJMTs8YuLW14BLzlKQjqGvbQPN55lbnwNYnlOOUjKJRgbykHbJ
grATo9FiOz2yeNy1MG5ogTldkjFaj4QxC+GblQ4C/co+2ONoLGi0QFdogOaV
C7gBXF5ursA0xaKhGf5pjCowPYrp6JgUvfBMZm4K5NFV7vRUfG48ADIWuCpi
X6SeJaTGjWO9bSRHSgjdk9biaOwJc2X4iRcf43pAIGeFghX7kKa4Q1XzOo4c
r9vLWWq8ppCwLUX8IHSdDnN2iHb87h5TJs8Lg1zAFRDMUNdQlibbBZdshH8m
Si4U9S80S8oqFSIWNbRkHFZ6mIaxaWxyCZdFg4YSh8mRG5MPA4HQSIy3OUWu
gE4cRQhS4kar6M3ZVJNMXNLDYBPuf3jts2C6IuxdIbTJS8NaAQeJlow8caiq
8V3xKg48RFSTGa0iFk7CC6UrAVxuniIagnI/KFqWK/ApnmmAwndgLZhyxWKf
4QtHThCZlrxWVzkfmgJMcXs1aSDyqAO9UCLejSgA0/wL0KA11jqsloPP/TB7
l6UGh9yJaQUBJedTdhKbhecuNvEzzyR5LOYnSRwjyOJKdZ5Rh2PydFFJZnyW
RsDJC4XoWxjDH1I7Xcc0D3atvCUiT5FhGiwHAa2KmN+qTzyMgDqTQ7kKoRVV
KIHNz6jWPKpDrmMFLqseyQvykL2ZzwEjQPU4KVYVLlWKGHvALQh4wOZIaKjm
ynnuab9jEz1gpFzpm5lTm+yzVOV9QzVWgBpv6caRuEyhxpTTHQ0bYuZq2hhm
JoOyoxPdQCrEbgnnxnxVDpJTAxYkaYesq0/ndOu+8nwGy2eQoeQFhkaeGZoK
mYUsdWgeI8P0hGoQog+FI4gmihICpgwJexG0W6QKM6k2r5DZYhExm+X/qDmb
g+uOllTcMxxCIjkzvKIIFZp/uZFAE+U65IUDSi1RbguJpDiQ6szCDwfsOvZD
Nwvmagg/SyR1zeDVwkln48YGeYW67x5QOY3f+J72kSSzCxqjiYQReUeqOHCq
XRmIarIiEgdJQ1Y0zcU4CNbEa2vwbDGCZL2atrXE8HhpSFIRmscUbE2MrP5s
1ryq0idSs6wwIMoNs7uXhb+CR7oe3k3KL2CXzDVKNXc8+lSGBcNE6nttZ/A4
coPH6Iu8Dh42nyInxYR3gmJuPGucZ7iRi2VlYNqXyI46FFiFaqaEyMaMZUxs
FKWVyAvzvma2CRG5LgLo44SBzxj9EehREKKWmPonVxpEPCfMooUFO0xyN6Ez
4lDFZb5XTGhgV9WnGIDjogZ2qrFw/9QxEPOiiBx5ogmlZK7wWGj6/kxrkUcq
cSAxSDSBUUSkyXtpk+5wZTEerCyxBKMuwMjZBEv5CyeqJU9DIh+XElh5KYqj
Twy81WBh3n4dSDn34Dgwuyq70JKYGKsYuWIMmxeBwOqFGhHs2WZKSdGW5JQc
D0JzAFUjo7oIbLIws/DKdoYuPuUt/LHeQBTeeA7TtvmqxOWOWmT6IkiDXT+r
rAAJ64g5hTB7jSAsEz2S5Es+25SK6C5ZvLFO9PHDqv+Bw6odPazEVihwKBU5
mYezJU3URIXbETxFWKnDu1SjTSiaO+nshbEw5E/htU3EuJGzFD8/ui4PkBZP
w00gKb97rLTD656PHquEHWLnSePU9ci5/uRAKTW4E+udhjW0k6sKS808fuTl
tsQoLMMhYq48b56mLr3FBx1xh7BcM303M5l0LoLOSD2Q2fGgnk2AAs+thAoh
IocNUHEhxH2Z0Kjc30FlbZuhts2v+p0JzowOZBZDlgw7BWZa5JpWNjytHEUY
OTZ5qCh2iB1/EtZAXD7TuJCUZk72iAVRaiks+GiHtYEozBbTqjmPsLzYdbCM
1HwWkSfjGA9v603GhTMK4lQvgD5yCkQ4R0Qn5ruEHyBvMd+FGKYmzIWRjTKp
MiFtNnpHmLZw2Y3AkgIeEgm+C1OR56MIOYpJf7LXZAgP3qks7rBImq06U1GB
XG6tFjVpy3xxBh3VhqEuXjHGRPNhD8hpnD/yzjBzmJdgFF6NaLqQwEERciCw
gkgawUSuX7lhm3EBl+6sEZgUvRr42C1Tv092jhlPAOuY8SD5smNpHSP1Bacv
iA4TPYj0JLOPWE/WPAkPGG1gjltexVdNqtJ1tjSJcclGt7h3k2+TKHTBy2+y
c6+UwWcV6UPDf9T2IJyTjLrIa8yhf0pu4mIJfvllDr1hlT4QRr4Ijn4Wy6wl
QE1d99VCX6CZDowFC00S0eIxB2+i7RHv7ts4LFiYYmEOVCTBfmOEX0vmIFxH
EblgHBKH1CvqACMj68GN79IHSwZki0XsKRW+UY2lc4mqenek584K6gXgkZB4
NaFXyKMhv45WqBN1u7BP4D8zf2m8SixlJYqWUicX7WWeJjcL7gXnQGHm91Sw
sFxE0nzkQrRkZA0t+Coh5SXD+IZg4rTtMvTVwjLl3P5FxeKIiYtlnOks/7B2
UzvU/i3DMUDxb3N5BdGmNro5y+k9F2NrmFfJ8J1ceuXO0vAa4wyxK42X+zP9
SBQXU0BjVTL1k36n+VUKRSvqOryWz2N3QMA3sU9UG4FNFtmQiX4Z9TqaDB7F
doPrzqOYdpgc84XnDIFueAJYdVY+y52V4P/Oz7JfmWWkNhWl8Fa8Ggx6MH9Q
MfT4O8IIvKO1cJ6t8i/T3nyKP3/wwAsZIG75nK76GC9Hd+w6rIoPAZ/6wrxN
tHDPWUS8YQs2haUQ8UJedIiYU5nUG2uODG+F5Jnd74HDdVrjNoPFA6AjItCF
527WeIsJ5wszVEVYpi9JZa90cGu2VvN80zFgsim9aWyBJDWwEEhKH1srfeDa
ryl9uIHzakNPFlWMGJsewPXS2CPZqtnmu9YETQCt8TUHBJadfukaIL0O4eTt
9ZExMQPs2nQAMgPLeTWgVc9YOBtfv9nDFrkr+HZvONrlBsRmpjIMlpYNK8Cw
Q+kqsIB2zuFv4ZdjHB+DN2B6MCZQF3Mvl4boJOtFopF8OKrpXZBmSaxnFFcm
Pmv1jRfo14Zt+a9WimLXQlmRVEk0dbprEeN8eI8fNxltsZLbynhxvbC0Jgu6
chNv/8NCLjOXqX5wOGgl+EzeQJQwcV6x/yiSlnPnWQVJ8ecPZlEX2BWmZaMU
xeuFHiIpwzCxCkQubceRCyv4rqVnoO65O8z8Bnqy4bkgVxRN1zOQC6bCHdSQ
DwCG0AYSHxQhE7SkMHEu+Ximw9Q6tFtSKQScjjyb2K+EAXIfdkUAMRupYmgJ
O/cPnrxurTcY/bGjp+HJwcrmpu1Yr+6WgIQYguZysq8DfoRyqZ/cnxYeZTyv
F3REZVc8vEwWexJ7iQSfyyFoYcWSbtCr9a7Xz4oEwzrQyt8jHQ0XrwyvYzUP
FJdBbGkajgV04tpYOvoFKGIrFonCD6+YjIIC7B4mytzQ0uk0FYcm4qwwI9p7
zooEfY68JnEkV61U9BG7Eyf8Pu3aM0GgDbHGMOJp5/KuGOMBkjABzqpECUJz
jV+08/17v9tMw+c58piMpZqv9iD8YzyDnrUU3E2aglVJRS0L02dhUgwkLPMC
XUMLxTHMRonwIyYxEib2Bv3heKRjfdYparf0nRIewufNLin/ZOIHhbi1wxLY
wmzP5AWMnRRzjRAiXiob5ATnLCc1FxwAtReQ5r9DY/ck91WpxJ1Wo79PCph8
NTspf2UVqkHggq/pdm+fywEnpa+KFw1/4QUPJ+fYJ2LBSZZ9z36lhfB1ks9/
xSsgmq1256aD97GPEITdTqMz1se1ixEW7tbqrYvODWjfDLbYT8LF33p72O8R
hcy1+AXRgI7iYneAPbuN/B9Y659YLlsxvsulxbXVJ7kKrPkveNpCfGzJ8AwQ
xjQNG5kSSkmXYRBg/sH1/NRqYJOg9xwW6T82ZXbmtahSfHh7e+wiWf2v2b/p
rUe+2fLTfju8LA0zl/oDRItaly52V+7TpH9/zSldHG+m3uJIzfI/1Uy5WYc1
KxyZcF98KPoRm5/wT4yA8ARw3oDu8E1PutFdfogBU/BcXpcdBn2EIKfJI8gb
l/2OADg3Ycl/CHAZwIJaD4HUiX6GIBUfhVeyKxU06VL3w91lgYXhv8QNZdX5
VRizRD1ljjB8UlOWhvmfBDya1pEliUgf+BcL/knJbwj67F+kzwhKqTBkqzkc
kaDxOyMaMqkvOmKY7Jc0ouj0cMww0on969RKI7qVPIXUk7I1FdOcjNUTFwd+
gur4D7pQbkLUw1tm6WY0FU9GnecWaopnvdrjV9x6/AIIPSg092hoTKmt0ZT2
eWu5DBUK4a4cwiGIFKqJnhZqRzACTlW762KBBdv1aEoixVO069yMWxetYYrW
3nFYnj/INdnfNo5MJMeG72qreMNL4G8fKCXZ/F5MR19b76ZNMNx/1vIeJYdp
YjvljsdDZB2GLyMnVOa3CrgU/6YAN8Q1XTLbcrEM2hJvNTYWMfgTHBH+fNrA
wxaesccaIiYwzhSDLXKd+M4pU4zTOmezqmOsk0pHQrDQ1MLGAJQJfrwGsYGg
Q/uPSpgCWGQSYoZscTcyJY1miLfMYvAD2sMc04+d7iNY9qexReQPH2u4sjAS
nMTKpOYy4TipeeTrlP75kYbvc7+tXMdN6fnfqCQM/FX87W1j0EBKRjIDYyEE
o8Qr6mXElR/cBTbxfxa6HfDjhI0QlERQvgMRi3PHucqdosKCgp4hpzwcCVSu
EaWlcpL3xyiebM1J3s9RvCMbN7ANbi1emEr9PpW1H2saTTnmpkaFC4+j+SER
aUHkMFvcysH8j9iW/Wu2hmk0os/iDSm2UYuBJQHES/aFnG+CfpAS37E+2L9+
Y9wCUW487NxccJmC3cIYSWFHmdwnoRwfH79d6PcEcZLJDmTxnxDD2T15f/KS
PO1PXsmltW5AE9EareE43enVLlrpXr951239AZWDqXx/aKmfqousMjIi4km5
cqA4StE8rjjCC1LKa93uXxgygy5G9TkwqyAwVzKXB2/FYDZy7fBWqf9OLQyn
cpLPfqWrq2hn6P6q79945hmenTRmk4OU9duvQC/MX39oB4YaZqfJZ7P5BDsN
uhg0jRLkuKkVLY8Y0MfzErknK8CMXnSy8ag8NoAscs0j+zVp65FmDcOJ2ju4
60JchWcEOrqyWWLqxud2EGohDECRjJub1gO3BcnMfhaey9MxwtuCtfAaKiVb
p5rL8xwz+l3OlyvcPANYEJlomNLHJ5VkA5JB+xyB4iYYpJJslerUydJMIZ5i
cvlsPsejYW1bqDM8CdDXRF1hBVVZeU442xhHS/oOoNzEVis1qbZW5gVPGDab
/1/ZUDSuN/+Mpaj1OG7djOBr+FsaiNINiiVDzu+nYeHVUJYApKDh/yEz0R+3
EvHV4ms2t3Q2f1I6/8quR03gZt8B6Zudi9ZonK51L/rDzviyJ5YYfh6G09Iy
/xtXZiTNCdeIZFz/yzHTkobG2dAOJneTsSscYvR0M649yqYcUUMa3dTrT3rM
nPbjf0fb279Mb/9M05sUa/+s8Yh1cKI/wMnTG30gODeAHyPAibOzs1Qc4INh
awSvAdX/Lud3pKUC5z/QSgXzH2imgDls9fX/ZLNiMmKwWUh0+KPYwJonQ/hf
tsd/2R7/ZXv8P872+C+LY/TrT0/xv+yN/7I3/u9mb/weV89S+ncQBn78+Jch
8o8aIn/aFBe74v0P2MlApeLUAa+5Z3+yQCf+4iAAlX8ViUFV68vy9yKh2lfr
NYXFOJR0S6DoGrtoNPyQhUEdpqLwzIzY17KWvqhEKx/ilRQHV+aIgs3KKQqW
Hl55p6HMi+df2LTkt7wOF5mWRpe1dE4U8uDL1ZLDkFiQlPmORYiYEcxfUq0t
yi5xAp4Gxmsfaa+muWb5DxyI4t5fz5DRibCJC0veRciz82hKaNzSsFKl66jV
GXiSHEZzil2MWMFYaVO6zgXDZU1PYze5+QdJCDNjz8O4RK4Ov2jMnLOMBWm4
BBa/0E9g5ktYCd7JuTLsrzJYDO+dBjjie/GOm+C0QlbPZcvfVLKTLcM5q3xL
wn25pyc5QPwynLYS/N85/G8u/1XLFnW9WvwWJTIpjOA31j4VSgesxxH1av6b
SvG/a7UcPMx+I74IQg08gK8qlW+MU2b/xttVyuyJ2pSeF/nzgxd58UJ9k8MV
VuUbhcH8KrH4V2pfKIRfxbou5MJX8Xf6ufLuALYl9WUClAFlcwzCuSL8J6/n
y8LKFWkJlAdBns+qT1XYJzWqtPVWSW9C3zUAp15r6JWmXmnp5breKOiNtl7J
6uWa3izqxYqeqyR1kW/o53U9V9XzraTXPxIe/mAgKyZCE7ejkFc+V/ZjGQTr
b5kMIt4ZP6RnoB6zB7RNSYMdPDt8dPAk/iD2O/oz8kv98YMdK6LonMgq1jRG
ZEKazlwh/yvTc7zC6D+FoOdL5f8K2pYv/tNoWy6X/wnalstlD2lbLluJ0jai
ufRE0LZctphI23LZfDJty2Wzx2hbLvsJbcMdZcStWD1K3Irnx4lbLvcZcat+
TtwS6RgQPMQH/SSvw/QrxSwCPYvbUATql/uM+EXoxu8Sv1wL6V+1rLebSAJL
Wb1U0FttvQHb3dCrbR0YdjurZ7NA2uBVUhf1ol5t6Hn4bw0G1xslvVXVsw0k
ioUq/j/0W2vq5aZeg+fVP0ggS8cJZOFPEEi210mjHTz7b6GQLZE3zaTtQwJJ
ean/HBI54pcD/CSN9OOfsyKn5C8+du3VUUIZyw/XEhN5xZUZlMT77cunZHSy
1wQR5XIxKzOEJe14GgxBBRPzj5VTw4KrlG3s88IaM3K6O/zm8HiS/n8Btc7n
ytlDcv1n6XU+Vyz/BMGGzw6kURC5cgVOsvOcZMOTYoxmw6NsItHO5/LlZKoN
b46LpPniJ3T7EN0YFf+MjH9Kx3+HkP8kJf9zpDyRlv8+MY80A9IL0mu1iJJs
tqbnS3qurdcLOG4ZiPw5flDK6zCFah2AlNRFtYWSbDWvlwF7ano9q8PWlxso
29ahLyDmFaDh2FGzqrfOEyf/I+kpkfN8tpg7Rs/z2cJ5EkFP6OxXogfHkOAv
eANOuZi6LPqdRudivc+3fk3qpFbLv2+f85XgKV/dmaPSx2w1ra3vJ5PJ0i+0
LgvOfXZf6O7yt9X5df6qayZ2srtsDvt39aGbt+rvD6fDoT028nft1/2683Bf
2gTnH3Y9f/fWrk43XfvuNUjsZN9dzfsfg2bl3ZhPgtl+sMnk3jal19y5v8v7
68xqdXpf2c7yPT9vfEzuS4mdTFeDm+3jNlc254/L84ftcyGX6earVTOz/Riv
x8Mgl8kOu952k5vdgZiaSezk/OX0Opg9GjvfDMxMtfNkPJRXZfP83Hvxp82V
eTntTmaPj7PH84/1phyUEzupblfv766TrdSGrdmwGZwH6/1DczgcfZyfBot1
fpIxd5ll67pTerhwB9f7xE4espW8XxmtzId5rnDzcb/vlcubSfn5+fX0/fHy
tPpYPL20q0Hf9x+69r6QDJNSoTZcz86D98Hp+eb9PZOfnd5Y5os5vw+C58qp
c2NsX+sv1X2/CKCZVGaJnay36/dBZRd8bIZbJ3tu3Q0ypw+b03x2ta9eTB/m
/cF63py83N8Ui0/HOyn0nPPppGA8Xtw0ap1GY3pqVE73XTfTXu/m3UFmc1OY
fSzfZp51Wdrs5omdTJyXqnF695G3MivjGuAR1E4/nouF0qb9tn2u5AvDQuU2
FxTy3V1h/fw2TuxkOcsM1sO18VFy892bV3e6bXwYnVV2691uR2t3UShV7e6+
sNpnF8apWbhMXs5pvdhxXu7bg2bV2M2WjnfRaj8UsiM7M3DW28DI39bv3+9a
9+/tyVX+/i6xk/b8qZHNre/8037x4rpSvM+8lhuXd+39cru0mve37cpTyRg0
JyvH9x4no/PETorN2s3LYrNbtG6eu4Pdy93T/Xh4dbtora3uMDsNrIeX086i
4jW2z7Wa936d2EnrvdV66F1133q1XPt0sXD82+bjYn1ruqurQeN+GTSG++mN
V3t4X9Q6p4tcYie3vlfu3L3b7qru7172s6d6a9E37xtNd+iZ9Rer/fKYH81G
tXK2Pig1F7eJnfTKhXd3YD9cTm7eTs1FrWXWPt73N7VZ4/bj1G+2ev2lcWH5
11ezkT0qL5LpycPDqtjLebe7QdZctOqd5bLddR83javlsLgal4ZXdcPqXr+9
tYF0tT6evMROctbsAlBguWt8tJzX0xqAZ7bOts3t7W35/vl0dN3fXdj9zlV/
mevdv7jZxE7Merk5rOWyo+F69FS27IzZbl/XVqe961Hn4ab9NnKL/bbTH853
l6Xd1WUjGSY3veyb3Rza087urvXatBfWqL60Wuv6onfdfy+1Z7Wnt07h+snc
XV+/1jqJnQTjWn38ui69LjuV8uti0l8M97tWfZi9v5juai/zSlDdvW1nd72L
8qJbmyR3kr29rTQmH41x0Bg5mWZr2ZisTk9nm1vDGl7kVrevs4dLZ2U5l7VT
r7RbdxM72fpXk0ate3ftNx9KN7WXYuHqtNYsbddzY3X3cfVmDa9qjVXjYdfp
LW/fiskHcPV0cW1Y1tVg1dmuR5Xs3cc4qL3MRp5RW98+uwvfXrSnV5e77L70
4LYem4mdPHkZY/w2f3/Nvy2ni8JHuTW+7Z6OchXb3l72n2+3dqt/37pff7w1
3I9W9T6xk/LV83KZsRsw4vnqrv1UrA3POzZw0tXivrz4KDQbo6ZZKs9vAQlG
56adDNibq4d+ZXVbXr1Oy3t7sDa657d3z6XOMNPLzFo79wq2+7RbtsbF6Wy0
T96dddF+ab66xvP61l703I9sbW0sX8bW+GHy/LSpbk97d2/3L0/l3Eu+/u6V
K8k0dtAubEa5fCH/VtvXbpu9pVfsDff3z28lO387BULzlHHH7sdk4Xau99Pk
3Tnd374vP279wdVtxjGr/dXwevt0mauZ17VM63YYfHgr4+nOurxbrq/6D8VJ
YieeOTLenzPj+2nhuXZ7dd03FrUra1deDy/vX+u9Tt0otU5Hd70HK/t885Ab
JnYydzLvt4/73eXjvnd5U7qoPLTLi+d85/6ldnPZ61zd5uza1W2r0rt6eb68
spIJdXD7XHv4WL1afnO/G98/jN66r6+3F/mbm3pht9sbpvc2vOjeXK+3uzug
T8mUrW09Td+21uhlu845lQdnOPx4bPvVzmPz3bKas8rlXWbYd2sXTvX0djEe
JMts95vypXFTtrL3g802N2p87PbP5uWuXsu1XtpPbu01/3JV6LfNq9LFOtc6
LSR20rTnhdrLeXYy2YIIWXL315cb535/MXgrn7ac7XhjZK7unIJlzHqX9tud
kYxs/nV+XBntGvWru3buymmtlpusE9SD5ZV7C8x3s/Lrr6VVLbccTrPdYbJ8
8tw2vdnLq2803oJC5+7hcfr4kCtvJ+X32cP+sjteNIzrx4fru+vr3Gt/XU1G
tutSvdDqvoxmj5Os7dZLw6dglM11y8vqfjx4KOUe1m+7het7pU41f27skmW2
YjZ3+jTfNT3LKD64t7tarfbbb0lfJkr3Cc8OHx08iT+I/Y7+jPxKtJgc5O0n
WE+iFUH+QfvJ4YA/aUlRGmoHDf+oNUX76ftvj1tTtENrih6zpggIHd6Ywy4+
CotooDdQRN+nsNC1KQuAKhFl5HAUFR5Fgr5mTNwN8xlytyJduqxcn6tewPxf
YX+p5hLM5X/a/lIlC/Xv2l8q1XLc/lLAp8wYgGE2/DvhD4xZVCqVBMt5OHP6
dzj9X6Ozzmd1IJ9o5qmcS+t5aOiplKU952D4smK1iL8rVRS68Zm5588afH7H
5PN7Rp/fNfv8tOHnz5p+jhh/ft/8UyH3aB1QpYwGnmZBr9T1bF3P1/RWWS+3
9GJePy/qrbxeO9dLibab8xpah+rneivHDP7YpljUGw39vKHXWjhAuaLnoN+W
Xi8fWUCiAUiYgM7Pj7mC0Qh0fl6INPonmYG6j5vgLllFqdWyN/bUGV5NHtrO
893QnjxUNiByObWbe+Mhn5n068+nTq5af6tbi93MTexkdP5+XX1Zmca6nm09
XN5efpgf+YfnZ3eYC5571m3pZbv1qqXGqHt+Yedaq8ROKo3qrGq1hqNBf1Yp
nfZLrXrhtPqy7Gafepu9NR50lwXraTFfd3vey9VVsu5n9reZcjnXy0zb9efl
/et07axW3VLWnxWKk8y441+Wn1xrdDozcrm7/WiU2MnV7vXtJZ97LeZuy43m
5GZ/1xuNR6fm6dvmqfmRA2p1Wh5tHl/fq0/L0d4fJHZy557fDq4znn39tm28
F0oP29Xm1MhsLp7cXbXVtxbL7O3Wy3QvR7vpy0vzJbGTC+vi8haIsJPN+Nd2
b168302D13Or/Hie8S9aT7ObWqmbeTCH41LnrnmdDNjRpHv/cOO6+enbTWOZ
e9y71zeVG3/zkbXedvcPldtJbt5vZ+/f1qeDTrac3IlZNnZvA7Mz+nh3qgv3
6ePx6f79AYS29fyh2+jtphdud73YVwpOZfdx8Zos0w+LF4E5b92sevUPp3He
bHnu9bpfX/cqq87D/dug9XQR1E7rW7c3H+VbpU2yJJ17eNucD8vt7vam3TLt
h6F549pr675g5+/XF07Qe6g6r+Xh9WyePa3Wk9X7ttebmPebh2XwMbnc9obl
O9udDPb36/rDy2P99dy33vPby5LT2D2VncdGMtqX3ifnTxt/274fvDX6F8tc
eT56H70v7NXgdTTtzrerZnPVKLbt5jS3c7fJGlenDSdleWPfb1aL1mBoWxa0
KgyWF4P9eHF312uUAYOuay/vxjp4y02SZ3J3tb1t+1vrtNu/2r8/vw5amW1j
d7mprR5X7kuuZnjOsG4EH2+vk+359DpZHO/6eTRF9DJbv39Rsu+Gz2+P732n
+Ti4ft6VgtLL/Udn2b7uZ+vlZnlZS9a4Ro9N2JqPt7fzy/PVrXlV699ad6PB
tt3x7i77883GKnx47U5p9nRv1lbraWIn/Wl/Ut2UC9vui2EWX58ei/uhNX8a
eGMjP7J71uJp1j+dth7Mi1qz131ONjRcVsujy+Kw+j58qq3t8lvhKZufn958
2MOafTp9Hl0v6+W3UefeqGTn/lvPSbYl9d+er9Yr/3FXG7j7G+O2WtrcdC4M
/3qwW75ffNx+9B8/ep3OR/3amKy6yZq5ZRfPsx/z0cvDg3P6ul1vu7fVRc4u
7IedaWWxef3IbvZ+a2q8TpvzfeG6l9jJ66mdHfUf7b67toOr7nlrENzZH8/z
QTFweufZ18r763VjPwqq+d5u3nlMJkru2MyunU1x9jRZny+vMq/vD/vRTdbc
Z91M7m1iNfz35uNV7+HBLZzfmq/1ZFN77a49GF28DhrO3VW7tNvVjWnzujS9
sFvrYr2Rt5/cq6l3c3NxPz1vfnTeEjt5Hxcb1/7A9moXlVW3slsOzRfr1qy2
Vp1Vp+Z+FPyZX715HxSHz62PzSK5k4/J+bRwW6luCg+3109Vw1xM/FqmdndV
z0yu/PJ6fhVU65ft1ua11HzojD+Ske2ytHkejZfdO7/5clu6aJWHPX9vLXtj
47Y7r5XrHat226stncvLm5w/S1Ygcw/B3bJ5f2Vtlq/erP44Oy9mT5fdevV+
lbt8uTWL+123X+8+9Hs9a39be0zs5KZe8VfVi/f82+xicfHauyjvnipGd/62
uCzO5s7Ku5+ergdeK/OcuXWe+/4RNprrv07ymcVi1529281GrllutgfPzWa1
ErxvK++389K4NT2vvZef90Yz2dRerjeKo739cN3ovQXWx7qSPb3rTZe1sWGX
C2+Xb9le4XnsVwr9SeaxX+4+JXbitz/WF/dPpVOrCwr9dvd0emNcu8NM1rrq
PHYLs/rLOL+8ON31T28eV6VCMkxGwWiZM93F3HRf7gul+rhvvC0z09Xgzsz3
Zutqbn27zjdeHvr9/Ot530hmXsuXu9xlvdDsXqzKZadsGS8fxcmbk3c7jdVN
+705zLznV42Sf+pdL+3Xu1piJ4UbszCo2ItB9u1q/jKvbrab08uHx9G8vbtx
L4ubt4u71diYPfWC/vR8/5JswWnNqq275euu1epPm6PL69vT/dIZbe+ehpeV
lXXr5tvXpTEs5/n54uG6XrGSKdtgM8uVd7W109iO+x8vnXbtpTq+nTXejdPZ
rD+2Pgwj9361bWbfet71+2my9XNmvJSt3dXtRXZrjGZPD+vxtni5ux/WBoXn
cv/mpX+1cVod83p4v1puXtbJ0mP+dDdY3Q6rD+3bWnu5rE4ubj/arcfH04dd
33l8q6xhzwb52nTmZNcXZrJUMO0tzvuL22ujNetft2qvbfs1U73ctK4v6ve7
zXRarL04V5lu/ekuW13e7x6Sl5NrZy/t+h2Qn8m+s3lqlyr9yvrUmPV2d0H1
qeY+Zjq7YVBrVG9qs3ot2et2sQGZ835Yqm4qmfHF03s18/jyUZkM6nDi2tV6
drRY1q9Pi+/vc2sXeNmLxE4eW403c3Z7Wx0M79et2u1pvtyzZpOL0Wqwqgx3
w4/prT/OAf0erVzXu0w20p0a2+LV9OW80s9sO+vM5qPXer28rrXKmfb5/eXl
6KVyOZsNs7eF/Wp68TxP5sX3L7v5qu/cOIWLzcPwtP2xnA5WgzdrHVxOjb0x
Hecr48pLoeFnM93bxi5ZtChf5a0npMOlSs13Jy9tc7Hx3avl5u38/maUN7fD
wfStNtrevlqni8kRlvG0a41vBkEmV8uvx+W7ljfMffQ+7jrj5+G2XequS6Ct
9HPz1/xd0aiPXl4TO3mxKm+bbmHa3D+cj9edwsZ5Nz9609H4Znl7tZyvL6bB
9eL6Jl9bueeZ89EymZ6Y26L7aE0Ho6fRafnitbGqGrnbXeG+NV027mqnH6XL
YDyd3C6vy+1c8amdLG6tT5+c84fF6mO3fm4056Vm03ocV+vnd+Xh7LJ2uZ5N
zjtvq+79y9vzqOskeyIfyrmPl9vzzMV5s7BcVVuVYnkzbj67N71ac9W1V+ed
i7xlPs7vgk3ublRN7sS8ubi7tCat6s02k8m/DK8AGW5X14Xt+f716qq/zXUe
X+p+szFYrxYP63WyF7/sX74PC9f3o9tr0AEeOm/GarW5mgRvr+/Pq96lty+6
o0x13V3OGo/Xb5VksXz4/7d3bU2KImn0nV9BzLzsrtMlIAruxD4kN0VFRfEC
byqIFwQEBHVj/vtmJqBWlfbUTnTsbMRuR1W3DXnPL79MM/OcQ40qPUk+it3R
+biqT+d2OkzVYQXOQ/DV/iKsB81t10qjWQt0p/bzubhGr07BKg0G1aNzED1F
M2VFbnOBWknDvbNnY3YpasKxW6kf2vrEe36uE8rV4OKFlwpTbYSzebdGwy8W
C+i3WSec0iu5Tk20S0PVLUfXuMrg+ZEMx1oVp70O2/0VN9it13q17UypOS8E
YSDtW/IebRE/3SF+tQHw4l7I54d/5naycvK8d1vJnzeRkWQ9RsS83EZ+UHp5
3IpFXLgA6fP+mks/EGijopRyR9IGvpMtbswjjzFzHQJovosovvGoNBm6gXZB
BwijeIoKwWlEhY+oiv0cwIgvrmHpYfumcGdvsaSGn2DJaqKklf4lL9wH9n7E
p4u4pJ/tiBe83592yGMkYpHLkyCa4Rsk/6Pmd0E5vEiIdS5ZC8uNYhYb3fd0
sU7188SLa4nEq6TJT0kDTIb9oGOSazIRpQAjjIMUMtANbqdkJog/pFv20aea
lXrpGCx9JzZ4fnkSlUZ6osqUk82U6i6PmvK5RMbD/3GHft61L7awv6E/mJqF
RGxSqqKKwJDxUwJ+aVNCQxQFlXFBpgrAVY0+JSuOQ9NrqhsGXtZoDjfHa3g8
01fQF9z9cbPftpoZJQCdUgggCVNNpzIxM6WprnflbNQZTUctbSRnUv6sJ2cb
TZ/Q+uQizEdX+ayJfAvQExmctYCYMEqyap09VT4LxlSAxesY+liQrHmHWsys
0GQU+G/zpMoKbbc26ergUY4BXCWjLtoOMIRmTM4DSWY1Y7NoAf6iSRP4u7/0
r4DpG/p5oATZ4CrDCSXGuYobTR5PppPRTh5pgG8R+OFZUw1Z6U8UzZ1Sq7Ny
BVPB7U8FoBnSXokXsz4qYWofprEJP8N2E9Rd3h7EvUFkBYCBCHQeoACi24Wf
ZZAMx52G4rLKrt4/+M3hPjIDamfs12LKGmtQJUJ7UO32QmvZGQA5omKVA7vF
gBPo1kmbKB1nbJy8xaG/FjNpJe3NRm2oz7yKpPZirnWeZnPiFG1M2/IW0/pm
NTlOwWo/TB1bElbVWnRlpaoTK+u4InO6piQHu9Kl2LgCeEPsD2hGGk0FQgqX
Q7ajSM1NvOLDSErC1kHZc5FNHXn36G/OwowZWcDpHa+dgba4iHqSxfSR2yf7
vjBiMsKa11URWrdCmx1lM2d3kd/OwupW7rWOx0V/bteqJlz8crrirPocX2uo
w6G9NrTxdjiqhI5IRJuOlfXGTraczXsdpzbV0mWq7wJBC2XTW3SEidrdD+ir
Tg+PTcrfeXGnN8hUCehACFhVJDaSKIIAZBKAVjeiDKC3qwJQMyCBOerK9hjI
sgQGGsha4kFsjYHiIZPXgJy1XVMiYKSRIKwyxZQNc3aGlgcbkqHD5Wxysuab
zXIuxJYBjDyxiSxJoCu4biS4siLoK4kQYOr4pc4LYM3L0HhEIQZZW8clGggC
nMh7KXPtqQl8Nm53nFN3dtShbbrWwboSmoAHhq1muqkJC6B05GznZ20lu/i8
vg8sw1xY53NgpyMLGRgFTLWbmYKgT9pAz2TCddsiepEeRYG9wt+ukGotKltc
hVBxwxBvb4+bx1Vr6muSnPWuoCe4nrvZu4KlazIBXFlWu1VYdqt1oU0v6XjN
urmvRLujvKQDkWJ7MybgJly64dNRLdFEd9Y5bCi43mv0Ls0aYddW98Ya1+Fn
PV3M6I3FTK+9/K7laeELflCUSmutZuLMS8yZ7fUYOySsHUAOAjmUjqlaKphN
JNiNgiCK6l5tCdE6OUTb5oGSD65hNlxObgSWrLKzq9VNL5ceQZ38ECbiK9tp
YLdH2WDLp3bNrvUOU9ac0dmyNTktax2/KE2Slw52MePBryLtKRGo7bGmtoda
a5KZZ7NTBEhRgGeNhtusFZoTsW5ZVd8mKDOqpDpzrsLFG/QZa4nrVvje9Dqa
io0Wx1uaqM3U2b3RUJs9GhqRN14zXjJ22jvYsDrCQWvpM/FQNlSYWbNVphkg
RW5NnJXmrEOHo7tEuko4e95J4Kr3GopXJ2p7F2YfWbx/kEVvYy5iNgWBdKQb
k0w9m5tFe0StpCDtwbLYl/qVWMIugd3nOa3cOz92nQaoljg+tsbqsibpsiDp
EwBYOHfownJni/2pAl0aXLiu6qfuvD4bDyNor4o1juvcWN7IVGCf040RDWIa
DnJ+cKCM86bfoYZew26KHXs5OSdKRozH/vjUXPvuRhpwA0vq+MOtavb6Zt0x
jKvZiM98/WA7TaO3EAyZG1lrasb1p9TmKB1Xa61CNNu+Hk1YA3rfFP7Wo6g+
To/7haZRe765DJd71/I2zXabZitn6Ewdg7J7l2SznXfSPTQd4iivL5axskNP
b+tsfJ0NOC/eHdJ2NFGXYzqxQcdfbHhgwbyP2w6cNLeTkGpsUjDzh6vahaAN
LTNVPvDX2VCdXi9Gw+y5u63RGJ562VioZom3gWv62dpW+4u2HSSOu1tkvUO1
trMqK6dPJKdaU0mXU+rU7eTTuNyXPk/i+cL1/Sr0foshebwtcF9NYXBwsdb7
qIP+Rw/UiXJZ8v0Ddbbx4+BnbP0rp+ks++kwnSIZJj+EvJ9nl0fP78PRt8Ph
B1ja7Tz4I/zsfrD58c1rFNMjMu2r0LTvYtO+D077HXTaF+Fpfwyf9hSg9rsI
NYAxaDSFMmIbpCiQMF+mjmFnTZKTEHiXb5I1GR1P18CzJHgW4R/qgKQYfCoO
/26QEkAgX4klZZlUeHS8LUgkDZOTnhb+GUStwKix1POuwSC1x+sOT1BqWZbd
QGq+k1TzRX2JVXsKVXuBlvv07Ev4NfBo0A82zr2y8fpLG38ODP+ILP8OtPx/
1sR5nmxSJE+jHyCRikA2GsiaGQV9kKAPa5Kwo1gMSwfUsyRkkWThO55ssOjK
Ro0n6wJZgyMGINwOI6KrIBKDkJnwp9H4d0289qJrsIlzXzfxIHKxbX/DXf8K
rv5DLfz9g08IzRzZlk8Gd2BbMaLv08NtQHy0evr5QIG+6dlA+TrPwv8eFLkB
yDqPEMjo4hE0Uo5UmqQkkRIcF4BUZOSfKYkUaPS58XQUgDpJ19DtJEkhKYUU
GFKQEXxZgOsGWN46Sl0AKAAcFPR/DIqMRkB8QILYxTj4EWQN/0fC/1jzg9YF
1xYc/IHGwiC4Oi8iS6nVSMAiDyrJCF3JNdFb6ek6AzpbqUkqDAoE1xxUbtA8
smwRe3O4/uApUobBOGirf7L5vVhe/Dcg4X8mRcxjFJPjLWJae65w+M+fc7aj
+JPIXXw6HBbR9lqQhhfByPhdYqU2dvESfsX5O0H8jcx1FV/lufWTAO/rloqn
+X4s1iGO0G1s8r63XKghF1qaL+So/4IvMb69vf2VLOnBYRpBtHW3Pj4XuHH1
oX3/G6s5SWoOYmF6pf7oOZijD8k2I1olx94mQYQkq4vaFuwk5W3rsjZvqAWk
KAgLPqfFTUvURvqbl28JmrqL+pHvxcY/t0RxhxtrCfrOt2xxyaOsTz7ekr9J
098EPwv99keNQOgCtq6PSdjveeFy3mqONHm3SCK8kBGGduAVnOvvegDv3JeX
8tG5SMGUC/P4cEe/EPqFb0tV25JYCyY3bg8mPelVqsQDA+/Dpj6i3M9ptz5I
qMMXS0RdHzklrwB5l+TG9ZyEdn4G9EC7hw8HbgSKSDu7SOjGk7j14wQaAewA
ZAeb/CAnWMaB5ySFdVONxvczQE+QrbYc34m2q1K64J5TrcnfckJmu36eE1Nr
fiGnh26rhvb6ES1wz5GnMQXTvXYv6sZxPM6xj6TokQ5r2aG3fiuzVYzhbTCu
scPEoxHWO7eyF9HaxkO8wtOWEW+4ChIHG78LF381h/tdZnI8bZVgC8zhflMY
IMj3aJGKe92GDy2HM9DuOqo5f3K+V5Tv6Ah9pVTJrLG//VaOSZhwIR+BHc/Y
yUcs+8agNs91G/ga0m0oxks+QHKy2dRB8eUoQsyOqkQyDa5ZVPUQpGX/38cX
zvNRJRRTQmISScw8jNRA0SDNH903smBJfnrrGdJPLwrxWIQaU8dFkEsH9cuj
EeWlwfTHzuJRFT63vMgp+KZzphESnRF+4Kh+n3h+QoeEz8uCJohPH91Jtwte
TSxvHp+2mIsW9Wve5KvCYSzRkTCOBH0unAQcWKo4WCcZ2ou7i7RipmZcUjzQ
f0IxqqG32Pq/wsaIYif5x8RQvvE/vcG3D8Z2a/In+4N+kJSHrbljQrK3uKbv
HfP2HXYJN8Awd2HfIsdb5CLp4XYVF1Obg32ck26RWvUFi7qf4vgOWyqlzWHS
H0Tb48L8UN1zgdfUifKIsA0dxDUNB36R+YfIBFlGR2e/d5HlomgoyYfksDcv
wsdFlfAweC+WiwcpDlso5SJm289auQ/SJDGaZuCsgOy9EG4pw99FSd5leJd7
vjvL+FWIkjoTvx8jyBV6iKf97eO8H5Q0NnCyXKDGfiP+Bet/ctktRwEA

-->

</rfc>
