<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-17" category="std" consensus="true" submissionType="IETF" updates="6698" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-17"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>University of Glasgow</organization>
      <address>
        <email>shahid.raza@glasgow.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>IN Groupe</organization>
      <address>
        <email>martin.furuhed@ingroupe.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <abstract>
      <?line 188?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 certificates. The CBOR encoding supports a large subset of RFC 5280, common certificate profiles and is extensible.</t>
      <t>Two types of C509 certificates are defined. One type is an invertible CBOR re-encoding of DER-encoded X.509 certificates with the signature field copied from the DER encoding. The other type is identical except that the signature is over the CBOR encoding instead of the DER encoding, avoiding the use of ASN.1. Both types of certificates have the same semantics as X.509 and the same reduced size compared to X.509.</t>
      <t>The document also specifies CBOR encoded data structures for certificate (signing) requests and certificate request templates, new COSE headers, as well as a TLS certificate type and a file format for C509. This document updates RFC 6698; the TLSA selectors registry is extended to include C509 certificates.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 196?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40–50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and RPKI <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are therefore desirable in many use cases.</t>
      <t>X.509 certificates are defined with Abstract Syntax Notation One (ASN.1) and encoded using the Distinguished Encoding Rules (DER). This document specifies an alternative encoding of X.509 certificates, using the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/>, initially proposed in <xref target="X.509-IoT"/>. The use of a more compact encoding  reduces the certificate size, which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc. The re-encoding of X.509 is called C509 and the resulting certificates are termed C509 certificates. C509 is not a general CBOR encoding for ASN.1 data structures.</t>
      <t>CBOR is a data format designed for small code size and small message size to support systems with very limited memory, processor power, and instruction sets. CBOR builds on the JSON data model but extends it by, e.g., encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans, simplifying development and debugging. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. RFC 8610 also extends the diagnostic notation. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. Implementors can get familiar with CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>The C509 encoding supports a large subset of RFC 5280 and all certificates compatible with the RFC 7925, IEEE 802.1AR (DevID), CAB Baseline <xref target="CAB-TLS"/>,  <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates, and is designed to render a compact encoding of certificates used in constrained environments.  This document does not specify a certificate profile.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, RFC 7925 <xref target="RFC7925"/>, IEEE 802.1AR <xref target="IEEE-802.1AR"/>, and CNSA 1.0 <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="RFC9528"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. RFC 7925 <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target Internet of Things deployments.</t>
      <t>C509 is deployed in, e.g., in-vehicle and vehicle-to-cloud communication, Unmanned Aircraft Systems (UAS), and Global Navigation Satellite System (GNSS). When used to re-encode DER-encoded X.509 certificates, the CBOR encoding can in many cases reduce the size of RFC 7925 profiled certificates by over 50%.</t>
      <t>C509 is designed to be extensible to additional features of X.509, for example support for new algorithms, including new post-quantum algorithms, which can be registered in the IANA registry as they become specified, see <xref target="sigalg"/>.</t>
      <t>Two types of C509 are defined using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER-encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER-encoded X.509 certificate. Due to the widespread deployment of X.509 it is necessary to allow backward compatibility.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER-encoded X.509.</t>
        </li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document also specifies C509 Certificate Requests, see <xref target="CSR"/>; COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>; a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>; and a C509 file format. The TLSA selectors registry is extended to include C509 certificates, thus this document updates <xref target="RFC6698"/>.</t>
    </section>
    <section anchor="notation">
      <name>Notational Conventions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This specification makes use of the terminology in <xref target="RFC2986"/>, <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections 4.2.1 and 4.2.2 of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>. In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers or complemented with CBOR OID encoding <xref target="RFC9090"/>, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER-encoded X.509 certificate, in which case the signature is calculated on the DER-encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER-encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the elements in arrays are always encoded in the same order as elements of the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are described in this section, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>.</t>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item <bcp14>MAY</bcp14> represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate). Examples are given in the appendices, e.g., <xref target="rfc7925-prof"/>.</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
   issuer: Name / null,
   validityNotBefore: ~time,
   validityNotAfter: ~time / null,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   extensions: Extensions,
)

CertificateSerialNumber = ~biguint

Name = [ * RDNAttribute ] / SpecialText

RDNAttribute = (( attributeType: int, attributeValue: SpecialText ) //
                ( attributeType: ~oid, attributeValue: bytes ))

AlgorithmIdentifier = int / ~oid /
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = (( extensionID: int, extensionValue: Defined ) //
             ( extensionID: ~oid, extensionValue: bytes / [ bytes ] ))

SpecialText = text / bytes / tag

Defined = any .ne undefined

tag = #6
]]></sourcecode>
        </figure>
        <t>C509 certificates are defined in terms of DER-encoded X.509 certificates <xref target="RFC5280"/> as detailed in the following subsections.</t>
        <section anchor="version">
          <name>version</name>
          <t>The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Two types are defined in this document: natively signed C509 certificates, following X.509 v3 (c509CertificateType = 2); and CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 3), see <xref target="type"/>. The number of elements in TBSCertificate is fixed and determined by the type. Additional types may be added in the future.</t>
        </section>
        <section anchor="serialnumber">
          <name>serialNumber</name>
          <t>The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
        </section>
        <section anchor="signature">
          <name>signature</name>
          <t>The 'signature' field, containing the signature algorithm including parameters, is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
        </section>
        <section anchor="issuer">
          <name>issuer</name>
          <t>In the general case, the sequence of 'RDNAttribute' is encoded as a CBOR array consisting of RDNAttribute elements. RelativeDistinguishedName with more than one AttributeTypeAndValue is not supported. Each RDNAttribute is CBOR encoded as (type, value) either as a (int, SpecialText) pair, or a (~oid, bytes) tuple.</t>
          <t>In the former case, the absolute value of the int encodes the attribute type (see <xref target="fig-attrtype"/>) and the sign is used to represent the character string type in the X.509 certificate; positive for utf8String, negative for printableString. Attribute values which are always of type IA5String are unambiguously represented using a non-negative int. Examples include emailAddress and domainComponent (see <xref target="RFC5280"/>). In CBOR, all text strings are UTF-8 encoded and in natively signed C509 certificates all CBOR ints <bcp14>SHALL</bcp14> be non-negative. Text strings <bcp14>SHALL</bcp14> still adhere to any <xref target="RFC5280"/> restrictions. serialNumber <bcp14>SHALL</bcp14> only contain the 74-character subset of ASCII allowed by printableString and countryName <bcp14>SHALL</bcp14> have length 2. CBOR encoding is allowed for IA5String (if this is the only allowed type, e.g., emailAddress), printableString and utf8String, whereas the string types teletexString, universalString, and bmpString are not supported.</t>
          <t>The text strings are further optimized as follows:</t>
          <ul spacing="normal">
            <li>
              <t>If the text string has an even length <contact fullname="≥"/> 2 and contains only the symbols '0'–'9' or 'a'–'f', it is encoded as a CBOR byte string.</t>
            </li>
            <li>
              <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where each 'H' is one of the symbols '0'-'9' or 'A'-'F', it is encoded as a CBOR tagged MAC address using the CBOR tag 48, see <xref section="2.4" sectionFormat="of" target="RFC9542"/>. If of the form "HH-HH-HH-FF-FE-HH-HH-HH", it is encoded as a 48-bit MAC address, otherwise as a 64-bit MAC address. See example in <xref target="rfc7925-prof"/>.</t>
            </li>
            <li>
              <t>Otherwise it is encoded as a CBOR text string.</t>
            </li>
          </ul>
          <t>The final encoding of the extension value may therefore be text, bytes, or tag, i.e., SpecialText. If Name contains a single 'common name' attribute with attributeType = +1, it is for compactness encoded as just the SpecialText containing the single attribute value.</t>
          <t>In natively signed C509 certificates, bytes and tag 48 do not correspond to any predefined text string encoding and may also be used for other attribute types.</t>
          <t>If the 'issuer' field is identical to the 'subject' field, e.g., in case of self-signed certificates, then the 'issuer' field <bcp14>MUST</bcp14> be encoded as the CBOR simple value null (0xf6).</t>
        </section>
        <section anchor="validity">
          <name>validity</name>
          <t>The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as the CBOR simple value null.</t>
        </section>
        <section anchor="subject">
          <name>subject</name>
          <t>The 'subject' field is encoded exactly like issuer, except that the CBOR simple value is not a valid value.</t>
        </section>
        <section anchor="subjectpublickeyinfo">
          <name>subjectPublicKeyInfo</name>
          <t>The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          <t>In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string, but may be encoded as a CBOR item of any type except undefined (see <xref target="CRT"/>). This specification assumes the BIT STRING has zero unused bits, and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
        </section>
        <section anchor="issueruniqueid">
          <name>issuerUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="subjectuniqueid">
          <name>subjectUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="ext-field">
          <name>extensions</name>
          <t>The 'extensions' field is encoded either as a CBOR array or as a CBOR int. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
          <t>Each 'extensionID' in the CBOR array is encoded either as a CBOR int (see <xref target="extype"/>) or as an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          <ul spacing="normal">
            <li>
              <t>If 'extensionID' is encoded as a CBOR int, it is followed by a CBOR item of any type except undefined (see <xref target="CRT"/>), and the sign of the int is used to encode if the extension is critical: Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign. If the CBOR array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage, see <xref target="ext-encoding"/>), the CBOR array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int.</t>
            </li>
            <li>
              <t>If extensionID is encoded as an unwrapped CBOR OID tag, it is followed by the DER-encoded extnValue encoded in the following way:  </t>
              <ul spacing="normal">
                <li>
                  <t>if the extension is non-critical, the extnValue OCTET STRING value field is encoded as a CBOR byte string;</t>
                </li>
                <li>
                  <t>if the extension is critical, the extnValue OCTET STRING value field is encoded as a CBOR byte string and further wrapped in a CBOR array consisting of only this element.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>The processing of critical and non-critical extensions is specified in <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
          <t>The currently defined extension values for which there is CBOR int encoded 'extensionID' are specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment.</t>
          <t>More details about extensions in <xref target="ext-encoding"/>.</t>
        </section>
        <section anchor="signaturealgorithm">
          <name>signatureAlgorithm</name>
          <t>The 'signatureAlgorithm' field is always the same as the 'signature' field and therefore omitted from the CBOR encoding.</t>
        </section>
        <section anchor="signaturevalue">
          <name>signatureValue</name>
          <t>In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes that the BIT STRING has zero unused bits, and the unused bits byte is omitted. For natively signed C509 certificates, the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
        </section>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted, and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e., [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent are omitted and subjectPublicKey consists of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstrass form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstrass form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER-encoded certificate with an uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, then the octet 0xfe is used instead of 0x02 to represent an even y-coordinate, and the octet 0xfd is used instead of 0x03 to represent an odd y-coordinate.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as any leading 0x00 byte (to indicate that the number is not negative) are omitted. Each of the two INTEGER value fields are then padded with leading zeroes to the same fixed length, given by the number of bytes needed to represent the order n of the cyclic subgroup used with the algorithm. For example, for P-256, the number of bytes for each integer is 32. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>The 'extensions' field is encoded as specified in <xref target="ext-field"/> with further details provided in this section.</t>
        <t>For some extensions, the CBOR int encoded extensionID is only supported for commonly used values of the extension. In case of extension values for which the CBOR int encoded extensionID is not supported, the extension <bcp14>MUST</bcp14> be encoded using the unwrapped CBOR OID tag encoded extensionID.</t>
        <t>A note on extensionID naming: in existing OID databases, most IDs can be found in versions with and without an 'id-pe' or 'id-ce' prefix. We have excluded the prefix for the commonly used extensions defined in <xref target="RFC5280"/> and included them for extensions defined elsewhere.</t>
        <t>CBOR encoding of the following extension values is fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). In natively signed certificates, KeyIdentifier <bcp14>SHOULD</bcp14> be composed of the leftmost 160-bits of the SHA-256 hash of the CBOR encoded subjectPublicKey. Other methods of generating unique numbers can be used. The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="ext-field"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyUsage = uint
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: int/~oid, subjectDomainPolicy: int/~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyConstraints = [
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>), or unwrapped CBOR OID tags <xref target="RFC9090"/>, where each int or OID encodes a key usage purpose. If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the otherName with type-id id-on-hardwareModuleName, id-on-SmtpUTF8Mailbox and id-on-MACAddress haven been given their own int; such otherName are encoded as follows:
            </t>
            <ul spacing="normal">
              <li>
                <t>For id-on-hardwareModuleName, the value is a CBOR array [ hwType: ~oid, hwSerialNum: bytes ] as specified in <xref target="RFC4108"/>.</t>
              </li>
              <li>
                <t>For id-on-SmtpUTF8Mailbox, the value is a CBOR text as specified in <xref target="RFC8398"/>.</t>
              </li>
              <li>
                <t>For id-on-MACAddress, the value is a CBOR byte string containing 6 octets for EUI-48 and 8 octets for EUI-64 as specified in <xref target="I-D.ietf-lamps-macaddress-on"/>.</t>
              </li>
            </ul>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If all DistributionPoint elements contains the distributionPoint with fullName choice of uniformResourceIdentifier, optional reasons, and optional cRLIssuer with one directoryName, the extension value can be CBOR encoded. The 'reasons' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. If the CRLDistributionPoints consists of only one DistributionPointName, which in turn has only the fullName field of type CBOR text, it shall be encoded as CBOR text, otherwise as CBOR array.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   DistributionPointName = [
     fullName  [ 2 * text ] / text,
     reasons   uint / null,
     cRLIssuer Name / null,
   ]

   CRLDistributionPoints = [ + DistributionPointName ] / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumber or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid,
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, [ * PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contain general names registered in <xref target="GN"/> the extension value can be CBOR encoded. C509 uses the same additions and restrictions as defined in <xref section="4.2.1.10" sectionFormat="of" target="RFC5280"/>. Note that the minimum and maximum fields are not used and therefore omitted. For IPv4 addresses, the iPAddress field <bcp14>MUST</bcp14> contain five octets and for IPv6 addresses, the field <bcp14>MUST</bcp14> contain 17 octets, where the last octet indicates the number of bits in the netmask. As an example, the address block 192.0.2.0/24 is encoded as C0 00 02 00 18 instead of C0 00 02 00 FF FF FF 00 as in the DER encoding.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralSubtrees = [ + GeneralName ]
   NameConstraints = [
     permittedSubtrees: GeneralSubtrees / null,
     excludedSubtrees: GeneralSubtrees / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   RDNAttributes = (( attributeType: int,
                      attributeValue: [ + SpecialText] ) //
                    ( attributeType: ~oid, attributeValue: [+ bytes] ))
   SubjectDirectoryAttributes = [ + RDNAttributes ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Identifiers (id-pe-autonomousSysIds). The X.509 extension AS Identifiers is specified in <xref target="RFC3779"/>. If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as a CBOR uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   ASIdOrRange = uint / [min:uint, max:uint]
   ASIdentifiers = [ + ASIdOrRange ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Identifiers v2 (id-pe-autonomousSysIds-v2). The X.509 extension AS Identifiers v2 is specified in <xref target="RFC8360"/>. The extension value is encoded exactly like in the extension "AS Identifiers".</t>
          </li>
          <li>
            <t>IPAddrBlocks (id-pe-ipAddrBlocks). The X.509 extension IPAddrBlocks is specified in <xref target="RFC3779"/>. Each AddressPrefix is encoded as a CBOR bytes string (without the unused bits octet) followed by the number of unused bits encoded as a CBOR uint. Each AddressRange is encoded as an array of two CBOR byte strings. The unused bits for min and max are omitted, but the unused bits in max IPAddress are set to one. With the exception of the first Address, if the byte string has the same length as the previous Address, the Address is encoded as a uint with the difference to the previous Address. It should be noted that using address differences for compactness prevents encoding an address range larger than 2<sup>64</sup> - 1 corresponding to the CBOR integer max value.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   Address = bytes
   AddressPrefix = [ unusedBits: uint, Address ]
   AddressRange = [ min: Address, max: Address ]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice = [ + IPAddressOrRange ] / null
   IPAddressFamily = (AFI: uint, SAFI: uint / null, IPAddressChoice)
   IPAddrBlocks = [ + IPAddressFamily ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IPAddrBlocks v2 (id-pe-ipAddrBlocks-v2). The X.509 extension IPAddrBlocks v2 is specified in <xref target="RFC8360"/>. The extension value is encoded exactly like in the extension "IPAddrBlocks".</t>
          </li>
          <li>
            <t>Signed Certificate Timestamp (Certificate Transparency). If all the SCTs are version v1 <xref target="RFC6962"/>, and there are no SCT extensions, the extension value can be CBOR encoded. Other versions of SCT are out of scope for this document. LogIDs are encoded as CBOR byte strings, the timestamp is encoded as a CBOR uint (milliseconds since validityNotBefore), and the signature is encoded with an (AlgorithmIdentifier, any) pair in the same way as issuerSignatureAlgorithm and issuerSignatureValue.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   SignedCertificateTimestamp = (
     logID: bytes,
     timestamp: int,
     sigAlg: AlgorithmIdentifier,
     sigValue: any,
   )
   SignedCertificateTimestamps = [ + SignedCertificateTimestamp ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>OCSP No Check (id-pkix-ocsp-nocheck). If the extension value is NULL, it can be CBOR encoded. The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>Precertificate Signing Certificate. The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>TLS Features (id-pe-tlsfeature). The extensionValue is encoded as an array of integers, where each integer represents a TLS extension.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   TLSFeatures = [* feature: uint]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature (0), nonRepudiation (1), keyEncipherment (2) and keyAgreement (4) asserted is encoded as the two CBOR ints 2, 23 (2<sup>0</sup> + 2<sup>1</sup> + 2<sup>2</sup> + 2<sup>4</sup> = 23).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 9 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 23, 8, [ 3, 9 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-params">
        <name>COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, c5t, and c5u, defined in <xref target="iana-header"/> below, are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER-encoded X.509 and use a COSE_C509 structure instead of COSE_X509.</t>
        <t>The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
COSE_C509 = C509CertData / [ 2* C509CertData ]
C509CertData = bytes .cborseq C509Certificate
]]></sourcecode>
        <t>C509CertData thus includes the unwrapped CBOR sequence, ~C509Certificate. The byte string encoding includes the length of each certificate which simplifies parsing. See <xref target="other-examples"/> for an example.</t>
        <t>The COSE_C509 item has media type application/cose-c509-cert, see <xref target="c509-cert"/>. Different  CoAP Content-Formats are defined depending on "usage" = "chain" or not, see <xref target="content-format"/>.  Stored file formats are defined for the cases with/without ("usage" = "chain") with "magic numbers" TBD8/TBD6 using the reserved CBOR tag 55799 and the corresponding Content-Formats TBD15/TBD3, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <t>The value type of c5t is the COSE_CertHash structure defined in <xref target="RFC9360"/>, which contains the hash value of the C509 certificate calculated over ~C509Certificate. Thus C509CertData contains all data necessary to calculate the thumbprint c5t.</t>
        <t>c5u provides an alternative way to identify an untrusted certificate chain by reference with a URI <xref target="RFC3986"/>, encoded as a CBOR text string (media type application/cbor and CoAP Content-Format 60). The referenced resource is a COSE_C509 item served with the application/cose-c509-cert media type ("usage" = "chain"), as described above.</t>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism <bcp14>MUST</bcp14> process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter <bcp14>MUST NOT</bcp14> cause the update of the set of trust anchors without appropriate authorization.</t>
        <table anchor="iana-header">
          <name>COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">24</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">25</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">22</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a ~C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">23</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing an ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
      <section anchor="private-key-structures">
        <name>Private Key Structures</name>
        <t>Certificate management also makes use of data structures including private keys, see, e.g., <xref target="RFC7468"/>. This section defines the following CBOR encoded structures:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PrivateKey = [
   C509PrivateKeyType: int,
   subjectPrivateKeyAlgorithm: AlgorithmIdentifier,
   subjectPrivateKey: any,
]
]]></sourcecode>
        <t>The field 'C509PrivateKeyType' indicates the type of the C509 private key. Different types of C509 Private Key Structures can be defined, see <xref target="privkeys"/>. Currently, two types are defined. When C509PrivateKeyType = 0, the subjectPrivateKey is the CBOR byte string encoding of the PrivateKey OCTET STRING value field defined in <xref target="RFC5958"/>. When C509PrivateKeyType = 1, the subjectPrivateKey is a COSE_KEY structure containing a private key as defined in <xref target="RFC9052"/>. Note that COSE_KEY might not be possible to use with all algorithms that have a C509 AlgorithmIdentifier defined.</t>
        <t>The C509PrivateKey item is served with the application/cose-c509-privkey media type, see <xref target="c509-privkey"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD12 using the reserved CBOR tag 55799 and the Content-Format TBD10, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PEM = [
   C509PrivateKey,
   COSE_C509 / null,
]
]]></sourcecode>
        <t>The C509PEM item is served with the application/cose-c509-pem media type, see <xref target="c509-pem"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD13 using the reserved CBOR tag 55799 and the Content-Format TBD11, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
      <section anchor="deterministic-encoding">
        <name>Deterministic Encoding</name>
        <t>In some use cases it is desirable to be able to specify a unique C509 representation of a given X.509 certificate.</t>
        <t>While this specification requires the use of Deterministically Encoded CBOR (see <xref target="notation"/>), it is still possible to represent certain X.509 certificate fields in different ways. This is a consequence of the extensibility of the C509 format where new encodings can be defined, for example to optimize extensions for which no special CBOR encoding have been previously defined.</t>
        <t>Where there is support for a specific and a generic CBOR encoding, the specific CBOR encoding <bcp14>MUST</bcp14> be used. For example, when there is support for specific CBOR encoding of an extension, as specified in <xref target="ext-encoding"/> and the C509 Extensions Registry, it <bcp14>MUST</bcp14> be used. In particular, when there is support for a specific otherName encoding (negative integer value in C509 General Names Registry) it <bcp14>MUST</bcp14> be used.</t>
        <t>Native C509 certificates <bcp14>MUST</bcp14> only use specific CBOR encoded fields. However, when decoding a non-native C509 certificates, the decoder may need to support, for example, (extensionID: ~oid, extensionValue: bytes / [bytes])-encoding of an extension for which there is an (extensionID:int, extensionValue:Defined)-encoding. One reason is that the certificate was issued before the specific CBOR extension was registered.</t>
      </section>
      <section anchor="c509-name-in-tls-and-dtls">
        <name>C509 Name in TLS and DTLS</name>
        <t>In TLS and DTLS, the subject of trusted authory may be sent to the peer to help it selecting the certificate chain, as in the CertificateAuthoritiesExtension in <xref target="RFC8446"/>, in the certificate_authorities field of CertificateRequest in <xref target="RFC5246"/>, or in the TrustedAuthorities in <xref target="RFC6066"/>. For such usage in the TLS and DTLS, the C509 name is wrapped in a distinguished name <xref target="X.501"/> with exactly one RelativeDistinguishedName, which in turn contains exactly one AttributeTypeAndValue with the attribute C509Name. The attribute value is the raw byte string of the encoded C509 Name as in <xref target="subject"/>.</t>
        <t>The attribute for C509 Name has the following structure:</t>
        <artwork><![CDATA[
   id-at-c509Name OBJECT IDENTIFIER ::=
     { TBD30 }

   c509Name ATTRIBUTE ::= {
     WITH SYNTAX C509Name
     SINGLE VALUE TRUE
     ID id-at-c509Name }

   C509Name ::= OCTET STRING
]]></artwork>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certificate (Signing) Request</name>
      <t>This section defines the format of a C509 Certificate Request, also known as a C509 Certificate Signing Request (CSR), based on and compatible with <xref target="RFC2986"/>, and reusing the formatting of C509 certificates defined in <xref target="certificate"/>.</t>
      <t>The CDDL for the C509 Certificate Request is shown in <xref target="fig-C509CSRCDDL"/>. The fields have the same encoding as the corresponding fields of the C509 Certificate, see <xref target="message-fields"/>.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificateRequest.</name>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificateRequest = [
   TBSCertificateRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificateRequest = (
   c509CertificateRequestType: int,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   attributes: CRAttributes,
)

CRAttributes = [ * CRAttribute ]

CRAttribute = (( attributeType: int, attributeValue: Defined ) //
               ( attributeType: ~oid, attributeValue: bytes ))

]]></sourcecode>
      </figure>
      <t>After verifying the subjectSignatureValue, the CA <bcp14>MAY</bcp14> transform the C509CertificateRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and code.</t>
      <t>The media type of C509CertificateRequest is application/cose-c509-pkcs10, see <xref target="c509-pkcs10"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD9 is defined using the reserved CBOR tag 55799 and the Content-Format TBD4, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      <section anchor="certificate-request-types">
        <name>Certificate Request Types</name>
        <t>Two types of C509 Certificate Requests are defined, both using the same CBOR encoding and differing only in what is being signed, see <xref target="csr-type"/>.
The C509 Certificate Request can either be an invertible CBOR re-encoding of a DER-encoded certification request <xref target="RFC2986"/>, or it can be natively signed where the signature is calculated over the CBOR encoding instead of the DER encoding.</t>
        <ul spacing="normal">
          <li>
            <t>c509CertificateRequestType = 2. This type indicates that the C509 Certificate Request is natively signed, i.e., that subjectSignatureValue contains the signature over the CBOR Sequence
TBSCertificateRequest, see <xref target="fig-C509CSRCDDL"/>. This encoding removes the need for ASN.1 and DER parsing, and re-encoding in the requesting party.</t>
          </li>
          <li>
            <t>c509CertificateRequestType = 3. This type indicates that the C509 Certificate Request is a CBOR re-encoded RFC 2986 certification request, as defined in <xref target="CSR"/>. This encoding is backwards compatible with legacy RFC 2986 certification requests, and enables a reduced transport overhead.</t>
          </li>
        </ul>
        <t>The type of certificate issued after the request is decided by the application. The default type of issued certificate in case of C509 is that c509CertificateType = c509CertificateRequestType.</t>
        <t>An implementation <bcp14>MAY</bcp14> only support certain values of c509CertificateRequestType.</t>
      </section>
      <section anchor="subject-signature-algorithm">
        <name>Subject Signature Algorithm</name>
        <t>subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, e.g., as defined in <xref target="RFC6955"/>. In the case of <xref target="RFC6955"/>, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier distributed out-of-band. Both signature algorithms and non-signature proof-of-possession algorithms are listed in the C509 Signature Algorithms Registry, see <xref target="sigalg"/>. The non-signature roof-of-possession algorithms with SHA-2 and HMAC-SHA2 (see values 14-16 in <xref target="sigalg"/>) requires a signature value with syntax DhSigStatic defined as follows:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
DhSigStatic = MessageDigest / DhSigStaticType

MessageDigest = bytes

DhSigStaticType = [
  issuer: Name,
  serialNumber: CertificateSerialNumber
  hashValue: MessageDigest
]
]]></sourcecode>
        <t>Note that a key agreement key pair may be used with a signature algorithm in a certificate request, see <xref target="app-DH-keys"/>.</t>
      </section>
      <section anchor="certificate-request-attributes">
        <name>Certificate Request Attributes</name>
        <t>The 'attributes' field specifies the attributes contained in a certificate request. The 'attributes' field with no GeneralAttribute <bcp14>SHALL</bcp14> be encoded as an empty CBOR array.</t>
        <t>The remainder of this section specifies CBOR encoded attributes for Certificate Requests.</t>
        <section anchor="extension-request">
          <name>Extension Request</name>
          <t>The X.509 attribute "Extension Request" is defined in <xref target="RFC2985"/>. The 'attributeValue' field has type Extensions as in <xref target="message-fields"/>. An empty CBOR array indicates no extensions.</t>
        </section>
        <section anchor="challenge-password">
          <name>Challenge Password</name>
          <t>The X.509 attribute "Challenge Password" is defined in <xref target="RFC2985"/>. The 'attributeValue' field has type ChallengePassword. A UTF8 String is encoded as CBOR text, and a Printable String is tagged with number 121 (alternative 0 as defined in <xref section="9.1" sectionFormat="of" target="I-D.bormann-cbor-notable-tags"/>). All other string types are not supported. For certificate request type 2, only UTF8 String is allowed.</t>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
ChallengePassword = text / #6.121(text)
]]></sourcecode>
        </section>
        <section anchor="private-key-possession-statement">
          <name>Private Key Possession Statement</name>
          <t>The X.509 attribute "Statement of Possession of a Private Key" is defined in <xref target="RFC9883"/>. The 'attributeValue' field has type PrivateKeyPossessionStatement.</t>
          <sourcecode type="cddl"><![CDATA[
PrivateKeyPossessionStatement = [
  issuer: Name,
  serialNumber: CertificateSerialNumber,
  cert: C509Certificate / null,
]
]]></sourcecode>
        </section>
      </section>
      <section anchor="CRT">
        <name>Certificate Request Template</name>
        <t>Enrollment over Secure Transport (EST, <xref target="RFC7030"/>) defines, and <xref target="I-D.ietf-lamps-rfc7030-csrattrs"/> clarifies, how an EST server can specify what it expects the EST client to include in a subsequent Certificate Signing Request (CSR). Alternatively to the unstructured mechanism specified in <xref target="RFC7030"/>, <xref section="B" sectionFormat="of" target="RFC8295"/> describes an approach using a Certificate Request Template in response to a GET /csrattrs request by the EST client. The EST server thus returns an Certificate Request-like object with various fields filled out, and other fields waiting to be filled in and a signature to be added by the EST client.</t>
        <t>For C509 we follow the approach of <xref target="RFC8295"/>. The C509CertificateRequestTemplate is based on TBSCertificateRequest of the C509CertificateRequest, see <xref target="fig-C509CSRCDDL"/>, but excludes the subjectSignatureValue field from the template since that needs no further specification.</t>
        <t>The C509 Certificate Request Template is shown in <xref target="fig-C509CSRTemplateCDDL"/>.</t>
        <figure anchor="fig-C509CSRTemplateCDDL">
          <name>CDDL for C509CertificateRequestTemplate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificateRequestTemplate = [
   c509CertificateRequestTemplateType: int,
   c509CertificateRequestType: [+ int] / undefined,
   subjectSignatureAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subject: NameTemplate / undefined,
   subjectPublicKeyAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subjectPublicKey: undefined
   extensionsRequest: ExtensionsTemplate / undefined,
]

NameTemplate = [ * RDNAttributeTemplate ]

RDNAttributeTemplate = (( attributeType: uint, minOccurs: uint, maxOccurs: uint,
                          attributeValue: SpecialText / undefined ) //
                        ( attributeType: ~oid, minOccurs: uint, maxOccurs: uint,
                          attributeValue: bytes / undefined ))

ExtensionsTemplate = [ * ExtensionTemplate ]

ExtensionTemplate = (( extensionID: uint, optional: bool, extensionValue: any ) //
                     ( extensionID: ~oid, optional: bool, extensionValue: bytes / undefined ))
]]></sourcecode>
        </figure>
        <t>Except as specified in this section, the fields have the same encoding as the corresponding fields of the TBSCertificateRequest, see <xref target="fig-C509CSRCDDL"/>. The specification of the template makes use of the CBOR simple value undefined (0xf7) to indicate fields to fill in. Consistent with this rule, note that the subjectPublicKey field always has the value undefined in the template.</t>
        <t>Different types of Certificate Request Templates can be defined (see <xref target="temp-type"/>), distinguished by the c509CertificateRequestTemplateType integer. Each type may have its own CDDL structure.</t>
        <t>The presence of a Defined (non-undefined) value in a C509CertificateRequestTemplate indicates that the server expects the client to use that value in the certificate request. If multiple AlgorithmIdentifier or c509CertificateRequestType values are present, the server expects the client to select one of them for use in the Certificate Request. The presence of an undefined value indicates that the client is expected to provide an appropriate value for that field. For example, if the server includes a subjectAltName with a GeneralNameType iPAddress and a GeneralNameValue empty byte string, this means that the client <bcp14>SHOULD</bcp14> fill in a corresponding GeneralNameValue.</t>
        <t>For AttributeTemplate, the minOccurs and maxOccurs fields specify the minimal and maximal occurrences of attributes of the given attributeType; maximal shall not be less than minimal, and maximal shall be positive. Negative attributeType is not allowed.</t>
        <t>For ExtensionTemplate, the field "optional" specifies whether an extension of the given extensionID is optional. Negative extensionID is not allowed.</t>
        <t>The media type of C509CertificateRequestTemplate is application/cose-c509-crtemplate, see <xref target="c509-crtemplate"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD18 is defined using the reserved CBOR tag 55799 and the Content-Format TBD19, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certificate Request format defined in <xref target="CSR"/> follows the PKCS#10 format to enable a direct mapping to the certification request information, see Section 4.1 of <xref target="RFC2986"/>. The CA can make use of a Certificate Request Template defined in <xref target="CRT"/>, for simplified configuration.</t>
      <t>When a certificate request is received, the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession corresponding to the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 3 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 2 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with the CA may be needed.</t>
    </section>
    <section anchor="dep-set">
      <name>Legacy Considerations</name>
      <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER-encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 CSR, the CA transforms it into a DER-encoded CertificationRequestInfo <xref target="RFC2986"/> and uses that with existing processes and code to produce an RFC 5280 DER-encoded X.509 certificate. The DER-encoded X.509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
      <t>For protocols like TLS/DTLS 1.2, where certificates are sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway, which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over constrained wireless links. The conversion to X.509 within a constrained IoT device will incur a computational overhead. However, measured in energy, this is likely to be negligible compared to the reduced communication overhead.</t>
      <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
      <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
    </section>
    <section anchor="expected-certificate-sizes">
      <name>Expected Certificate Sizes</name>
      <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in Figures <xref target="fig-size-COSE" format="counter"/> and <xref target="fig-size-TLS" format="counter"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After RFC 7925 profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli <xref target="RFC7932"/> will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. In the examples with HTTPS certificate chains (www.ietf.org and tools.ietf.org) both C509 and Brotli perform well complementing each other. C509 uses dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 2 and 3 have the same size. For Brotli, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
      <figure anchor="fig-size-COSE">
        <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="528" viewBox="0 0 528 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,224" fill="none" stroke="black"/>
              <path d="M 328,32 L 328,224" fill="none" stroke="black"/>
              <path d="M 424,32 L 424,224" fill="none" stroke="black"/>
              <path d="M 520,32 L 520,224" fill="none" stroke="black"/>
              <path d="M 8,32 L 520,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 520,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 520,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 520,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 520,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 520,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 520,224" fill="none" stroke="black"/>
              <g class="text">
                <text x="376" y="52">COSE_X509</text>
                <text x="472" y="52">COSE_C509</text>
                <text x="32" y="84">RFC</text>
                <text x="68" y="84">7925</text>
                <text x="124" y="84">profiled</text>
                <text x="176" y="84">IoT</text>
                <text x="240" y="84">Certificate</text>
                <text x="304" y="84">(1)</text>
                <text x="400" y="84">317</text>
                <text x="496" y="84">142</text>
                <text x="40" y="116">ECDSA</text>
                <text x="88" y="116">HTTPS</text>
                <text x="160" y="116">Certificate</text>
                <text x="232" y="116">Chain</text>
                <text x="272" y="116">(2)</text>
                <text x="396" y="116">2193</text>
                <text x="492" y="116">1397</text>
                <text x="44" y="148">FN-DSA</text>
                <text x="96" y="148">HTTPS</text>
                <text x="168" y="148">Certificate</text>
                <text x="240" y="148">Chain</text>
                <text x="280" y="148">(2)</text>
                <text x="396" y="148">5127</text>
                <text x="492" y="148">4331</text>
                <text x="44" y="180">ML-DSA</text>
                <text x="96" y="180">HTTPS</text>
                <text x="168" y="180">Certificate</text>
                <text x="240" y="180">Chain</text>
                <text x="280" y="180">(2)</text>
                <text x="396" y="180">9465</text>
                <text x="492" y="180">8669</text>
                <text x="32" y="212">RSA</text>
                <text x="72" y="212">HTTPS</text>
                <text x="144" y="212">Certificate</text>
                <text x="216" y="212">Chain</text>
                <text x="256" y="212">(4)</text>
                <text x="396" y="212">5175</text>
                <text x="492" y="212">3937</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+---------------------------------------+-----------+-----------+
|                                       | COSE_X509 | COSE_C509 |
+---------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1) |       317 |       142 |
+---------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)     |      2193 |      1397 |
+---------------------------------------+-----------+-----------+
| FN-DSA HTTPS Certificate Chain (2)    |      5127 |      4331 |
+---------------------------------------+-----------+-----------+
| ML-DSA HTTPS Certificate Chain (2)    |      9465 |      8669 |
+---------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (4)       |      5175 |      3937 |
+---------------------------------------+-----------+-----------+
]]></artwork>
        </artset>
      </figure>
      <figure anchor="fig-size-TLS">
        <name>Comparing Sizes of Certificate Chains with TLS. Number of bytes (length of certificate chain). X.509 and C509 are Certificate messages. X.509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="560" viewBox="0 0 560 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,224" fill="none" stroke="black"/>
              <path d="M 168,32 L 168,224" fill="none" stroke="black"/>
              <path d="M 232,32 L 232,224" fill="none" stroke="black"/>
              <path d="M 368,32 L 368,224" fill="none" stroke="black"/>
              <path d="M 424,32 L 424,224" fill="none" stroke="black"/>
              <path d="M 552,32 L 552,224" fill="none" stroke="black"/>
              <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 552,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
              <path d="M 8,192 L 552,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 552,224" fill="none" stroke="black"/>
              <g class="text">
                <text x="200" y="52">X.509</text>
                <text x="264" y="52">X.509</text>
                <text x="296" y="52">+</text>
                <text x="332" y="52">Brotli</text>
                <text x="396" y="52">C509</text>
                <text x="452" y="52">C509</text>
                <text x="480" y="52">+</text>
                <text x="516" y="52">Brotli</text>
                <text x="32" y="84">RFC</text>
                <text x="68" y="84">7925</text>
                <text x="108" y="84">Cert</text>
                <text x="144" y="84">(1)</text>
                <text x="208" y="84">327</text>
                <text x="344" y="84">324</text>
                <text x="400" y="84">152</text>
                <text x="528" y="84">170</text>
                <text x="36" y="116">RPKI</text>
                <text x="76" y="116">Cert</text>
                <text x="112" y="116">(1)</text>
                <text x="200" y="116">20991</text>
                <text x="340" y="116">9134</text>
                <text x="396" y="116">8663</text>
                <text x="524" y="116">5671</text>
                <text x="40" y="148">HTTPS</text>
                <text x="88" y="148">Chain</text>
                <text x="128" y="148">(2)</text>
                <text x="204" y="148">2204</text>
                <text x="340" y="148">1455</text>
                <text x="396" y="148">1417</text>
                <text x="524" y="148">1066</text>
                <text x="40" y="180">HTTPS</text>
                <text x="88" y="180">Chain</text>
                <text x="128" y="180">(4)</text>
                <text x="204" y="180">5190</text>
                <text x="340" y="180">3244</text>
                <text x="396" y="180">3961</text>
                <text x="524" y="180">2848</text>
                <text x="40" y="212">HTTPS</text>
                <text x="80" y="212">Bag</text>
                <text x="112" y="212">(8)</text>
                <text x="200" y="212">11578</text>
                <text x="340" y="212">3979</text>
                <text x="396" y="212">8885</text>
                <text x="524" y="212">3522</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-------------------+-------+----------------+------+---------------+
|                   | X.509 | X.509 + Brotli | C509 | C509 + Brotli |
+-------------------+-------+----------------+------+---------------+
| RFC 7925 Cert (1) |   327 |            324 |  152 |           170 |
+-------------------+-------+----------------+------+---------------+
| RPKI Cert (1)     | 20991 |           9134 | 8663 |          5671 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (2)   |  2204 |           1455 | 1417 |          1066 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Chain (4)   |  5190 |           3244 | 3961 |          2848 |
+-------------------+-------+----------------+------+---------------+
| HTTPS Bag (8)     | 11578 |           3979 | 8885 |          3522 |
+-------------------+-------+----------------+------+---------------+
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR encoding of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors. The security considerations of <xref target="RFC5280"/> apply.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this document does not reveal any additional information compared to X.509. Because of the difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
      <t>Any issues with decoding or parsing a C509 certificate should be handled exactly as how such errors would be handled for the corresponding X.509 certificate. For example, a non-critical extension <bcp14>MAY</bcp14> be ignored if it is not recognized, see <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
      <t>As stated in <xref target="cose-header-params"/>, the contents of the COSE Header Parameters c5b, c5c, c5t, c5u is untrusted input that potentially may be verified using existing trust anchors or other trust establishment mechanism out of scope of this document. Similar security considerations as x5bag, x5chain, x5t and x5u applies, see <xref target="RFC9360"/>. Security considerations of the COSE protected and unprotected headers is discussed in <xref target="RFC9052"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries in the new registry group "CBOR Encoded X.509 (C509) Parameters". For all items, the 'Reference' field points to this document.</t>
      <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate an entry that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1-byte encoding, other values in the interval [-256, 255] have a 2-byte encoding, and the remaining values in the interval [-65536, 65535] have a 3-byte encoding.</t>
      <t>All assignments according to "IETF Review with Expert Review" are made on a "IETF Review" basis per Section 4.8 of <xref target="RFC8126"/> with "Expert Review" additionally required per Section 4.5 of <xref target="RFC8126"/>. The procedure for early IANA allocation of "standards track code points" defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, working group chairs are encouraged to consult the expert(s) early during the process outlined in Section 3.1 of <xref target="RFC7120"/>.</t>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. It is mandatory to specify content in all columns. For values in the interval [-24, 23], the registration procedure is "IETF Review with Expert Review". For all other values, the registration procedure is "Expert Review".  The initial contents of the registry are (see <xref target="version"/>):</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="432" viewBox="0 0 432 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,192" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,192" fill="none" stroke="black"/>
                <path d="M 8,32 L 424,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 424,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 424,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 424,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 424,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 424,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 424,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="116" y="84">Reserved</text>
                  <text x="56" y="116">1</text>
                  <text x="116" y="116">Reserved</text>
                  <text x="56" y="148">2</text>
                  <text x="116" y="148">Natively</text>
                  <text x="180" y="148">Signed</text>
                  <text x="228" y="148">C509</text>
                  <text x="296" y="148">Certificate</text>
                  <text x="56" y="180">3</text>
                  <text x="100" y="180">CBOR</text>
                  <text x="164" y="180">Re-encoded</text>
                  <text x="232" y="180">X.509</text>
                  <text x="268" y="180">v3</text>
                  <text x="328" y="180">Certificate</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-------------------------------------------+
| Value | Description                               |
+=======+===========================================+
|     0 | Reserved                                  |
+-------+-------------------------------------------+
|     1 | Reserved                                  |
+-------+-------------------------------------------+
|     2 | Natively Signed C509 Certificate          |
+-------+-------------------------------------------+
|     3 | CBOR Re-encoded X.509 v3 Certificate      |
+-------+-------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="csr-type">
        <name>C509 Certificate Request Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Types" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-csr-types">
          <name>C509 Certificate Request Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="560" viewBox="0 0 560 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,192" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,192" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 552,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="116" y="84">Reserved</text>
                  <text x="56" y="116">1</text>
                  <text x="116" y="116">Reserved</text>
                  <text x="56" y="148">2</text>
                  <text x="116" y="148">Natively</text>
                  <text x="180" y="148">Signed</text>
                  <text x="228" y="148">C509</text>
                  <text x="296" y="148">Certificate</text>
                  <text x="380" y="148">Request.</text>
                  <text x="56" y="180">3</text>
                  <text x="100" y="180">CBOR</text>
                  <text x="168" y="180">re-encoding</text>
                  <text x="228" y="180">of</text>
                  <text x="256" y="180">RFC</text>
                  <text x="292" y="180">2986</text>
                  <text x="368" y="180">certification</text>
                  <text x="460" y="180">request.</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Reserved                                                  |
+-------+-----------------------------------------------------------+
|     1 | Reserved                                                  |
+-------+-----------------------------------------------------------+
|     2 | Natively Signed C509 Certificate Request.                 |
+-------+-----------------------------------------------------------+
|     3 | CBOR re-encoding of RFC 2986 certification request.       |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="privkeys">
        <name>C509 Private Key Types Registry</name>
        <t>IANA has created a new registry titled "C509 Private Key Types" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Comments, and subjectPrivateKey, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-rivkeys">
          <name>C509 Private Key Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="560" viewBox="0 0 560 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,160" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 552,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="112" y="52">Private</text>
                  <text x="160" y="52">Key</text>
                  <text x="200" y="52">Types</text>
                  <text x="56" y="84">0</text>
                  <text x="120" y="84">Comments:</text>
                  <text x="276" y="84">Asymmetric</text>
                  <text x="336" y="84">Key</text>
                  <text x="384" y="84">Package</text>
                  <text x="436" y="84">(RFC</text>
                  <text x="480" y="84">5958)</text>
                  <text x="156" y="100">subjectPrivateKey:</text>
                  <text x="256" y="100">bytes</text>
                  <text x="56" y="132">1</text>
                  <text x="120" y="132">Comments:</text>
                  <text x="252" y="132">COSE</text>
                  <text x="288" y="132">Key</text>
                  <text x="332" y="132">Object</text>
                  <text x="380" y="132">(RFC</text>
                  <text x="424" y="132">9052)</text>
                  <text x="156" y="148">subjectPrivateKey:</text>
                  <text x="268" y="148">COSE_Key</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Private Key Types                                         |
+=======+===========================================================+
|     0 | Comments:          Asymmetric Key Package (RFC 5958)      |
|       | subjectPrivateKey: bytes                                  |
+-------+-----------------------------------------------------------+
|     1 | Comments:          COSE Key Object (RFC 9052)             |
|       | subjectPrivateKey: COSE_Key                               |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="temp-type">
        <name>C509 Certificate Request Templates Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Request Templates Types" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-temp-types">
          <name>C509 Certificate Request Templates Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,96" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="108" y="84">Simple</text>
                  <text x="156" y="84">C509</text>
                  <text x="224" y="84">Certificate</text>
                  <text x="304" y="84">Request</text>
                  <text x="372" y="84">Template</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Simple C509 Certificate Request Template                  |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="rdnatttype">
        <name>C509 RDN Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 RDN Attributes" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments and Reference, where Value is a non-negative integer, and the other columns are text strings. Name and Identifiers are informal descriptions. The fields Name, OID, and DER are mandatory. For values in the interval [0, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". Name and Identifiers are informal descriptions. If OID is present, the OID is given in dotted decimal representation, and the DER column contains the hex string of the DER-encoded OID <xref target="X.690"/>.</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-rdnattrtype">
          <name>C509 RDN Attributes</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2880" width="560" viewBox="0 0 560 2880" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2864" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2864" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2864" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,832 L 552,832" fill="none" stroke="black"/>
                <path d="M 8,928 L 552,928" fill="none" stroke="black"/>
                <path d="M 8,1024 L 552,1024" fill="none" stroke="black"/>
                <path d="M 8,1120 L 552,1120" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1312 L 552,1312" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1504 L 552,1504" fill="none" stroke="black"/>
                <path d="M 8,1600 L 552,1600" fill="none" stroke="black"/>
                <path d="M 8,1696 L 552,1696" fill="none" stroke="black"/>
                <path d="M 8,1792 L 552,1792" fill="none" stroke="black"/>
                <path d="M 8,1888 L 552,1888" fill="none" stroke="black"/>
                <path d="M 8,1984 L 552,1984" fill="none" stroke="black"/>
                <path d="M 8,2096 L 552,2096" fill="none" stroke="black"/>
                <path d="M 8,2192 L 552,2192" fill="none" stroke="black"/>
                <path d="M 8,2288 L 552,2288" fill="none" stroke="black"/>
                <path d="M 8,2384 L 552,2384" fill="none" stroke="black"/>
                <path d="M 8,2480 L 552,2480" fill="none" stroke="black"/>
                <path d="M 8,2576 L 552,2576" fill="none" stroke="black"/>
                <path d="M 8,2672 L 552,2672" fill="none" stroke="black"/>
                <path d="M 8,2768 L 552,2768" fill="none" stroke="black"/>
                <path d="M 8,2864 L 552,2864" fill="none" stroke="black"/>
                <circle cx="368" cy="864" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="96" y="52">RDN</text>
                  <text x="152" y="52">Attribute</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="240" y="84">Email</text>
                  <text x="296" y="84">Address</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="272" y="100">emailAddress,</text>
                  <text x="384" y="100">e-mailAddress</text>
                  <text x="100" y="116">OID:</text>
                  <text x="300" y="116">1.2.840.113549.1.9.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">09</text>
                  <text x="276" y="132">2A</text>
                  <text x="300" y="132">86</text>
                  <text x="324" y="132">48</text>
                  <text x="348" y="132">86</text>
                  <text x="372" y="132">F7</text>
                  <text x="396" y="132">0D</text>
                  <text x="420" y="132">01</text>
                  <text x="444" y="132">09</text>
                  <text x="468" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="244" y="180">Common</text>
                  <text x="292" y="180">Name</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="264" y="196">commonName,</text>
                  <text x="324" y="196">cn</text>
                  <text x="100" y="212">OID:</text>
                  <text x="248" y="212">2.5.4.3</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">03</text>
                  <text x="276" y="228">55</text>
                  <text x="300" y="228">04</text>
                  <text x="324" y="228">03</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="248" y="276">Surname</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="252" y="292">surname,</text>
                  <text x="300" y="292">sn</text>
                  <text x="100" y="308">OID:</text>
                  <text x="248" y="308">2.5.4.4</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">03</text>
                  <text x="276" y="324">55</text>
                  <text x="300" y="324">04</text>
                  <text x="324" y="324">04</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="244" y="372">Serial</text>
                  <text x="300" y="372">Number</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="268" y="388">serialNumber</text>
                  <text x="100" y="404">OID:</text>
                  <text x="248" y="404">2.5.4.5</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">03</text>
                  <text x="276" y="420">55</text>
                  <text x="300" y="420">04</text>
                  <text x="324" y="420">05</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="248" y="468">Country</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="268" y="484">countryName,</text>
                  <text x="328" y="484">c</text>
                  <text x="100" y="500">OID:</text>
                  <text x="248" y="500">2.5.4.6</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">03</text>
                  <text x="276" y="516">55</text>
                  <text x="300" y="516">04</text>
                  <text x="324" y="516">06</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="56" y="564">5</text>
                  <text x="104" y="564">Name:</text>
                  <text x="252" y="564">Locality</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="272" y="580">localityName,</text>
                  <text x="368" y="580">locality,</text>
                  <text x="416" y="580">l</text>
                  <text x="100" y="596">OID:</text>
                  <text x="248" y="596">2.5.4.7</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">03</text>
                  <text x="276" y="612">55</text>
                  <text x="300" y="612">04</text>
                  <text x="324" y="612">07</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="56" y="660">6</text>
                  <text x="104" y="660">Name:</text>
                  <text x="240" y="660">State</text>
                  <text x="276" y="660">or</text>
                  <text x="324" y="660">Province</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="300" y="676">stateOrProvinceName,</text>
                  <text x="396" y="676">st</text>
                  <text x="100" y="692">OID:</text>
                  <text x="248" y="692">2.5.4.8</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">03</text>
                  <text x="276" y="708">55</text>
                  <text x="300" y="708">04</text>
                  <text x="324" y="708">08</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="56" y="756">7</text>
                  <text x="104" y="756">Name:</text>
                  <text x="244" y="756">Street</text>
                  <text x="304" y="756">Address</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="276" y="772">streetAddress,</text>
                  <text x="364" y="772">street</text>
                  <text x="100" y="788">OID:</text>
                  <text x="248" y="788">2.5.4.9</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">03</text>
                  <text x="276" y="804">55</text>
                  <text x="300" y="804">04</text>
                  <text x="324" y="804">09</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="56" y="852">8</text>
                  <text x="104" y="852">Name:</text>
                  <text x="268" y="852">Organization</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="288" y="868">organizationName,</text>
                  <text x="100" y="884">OID:</text>
                  <text x="252" y="884">2.5.4.10</text>
                  <text x="100" y="900">DER:</text>
                  <text x="228" y="900">06</text>
                  <text x="252" y="900">03</text>
                  <text x="276" y="900">55</text>
                  <text x="300" y="900">04</text>
                  <text x="324" y="900">0A</text>
                  <text x="120" y="916">Comments:</text>
                  <text x="56" y="948">9</text>
                  <text x="104" y="948">Name:</text>
                  <text x="276" y="948">Organizational</text>
                  <text x="356" y="948">Unit</text>
                  <text x="132" y="964">Identifiers:</text>
                  <text x="312" y="964">organizationalUnitName,</text>
                  <text x="420" y="964">ou</text>
                  <text x="100" y="980">OID:</text>
                  <text x="252" y="980">2.5.4.11</text>
                  <text x="100" y="996">DER:</text>
                  <text x="228" y="996">06</text>
                  <text x="252" y="996">03</text>
                  <text x="276" y="996">55</text>
                  <text x="300" y="996">04</text>
                  <text x="324" y="996">0B</text>
                  <text x="120" y="1012">Comments:</text>
                  <text x="52" y="1044">10</text>
                  <text x="104" y="1044">Name:</text>
                  <text x="240" y="1044">Title</text>
                  <text x="132" y="1060">Identifiers:</text>
                  <text x="240" y="1060">title</text>
                  <text x="100" y="1076">OID:</text>
                  <text x="252" y="1076">2.5.4.12</text>
                  <text x="100" y="1092">DER:</text>
                  <text x="228" y="1092">06</text>
                  <text x="252" y="1092">03</text>
                  <text x="276" y="1092">55</text>
                  <text x="300" y="1092">04</text>
                  <text x="324" y="1092">0C</text>
                  <text x="120" y="1108">Comments:</text>
                  <text x="52" y="1140">11</text>
                  <text x="104" y="1140">Name:</text>
                  <text x="252" y="1140">Business</text>
                  <text x="324" y="1140">Category</text>
                  <text x="132" y="1156">Identifiers:</text>
                  <text x="284" y="1156">businessCategory</text>
                  <text x="100" y="1172">OID:</text>
                  <text x="252" y="1172">2.5.4.15</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="228" y="1188">06</text>
                  <text x="252" y="1188">03</text>
                  <text x="276" y="1188">55</text>
                  <text x="300" y="1188">04</text>
                  <text x="324" y="1188">0F</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="52" y="1236">12</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="244" y="1236">Postal</text>
                  <text x="292" y="1236">Code</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="260" y="1252">postalCode</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="252" y="1268">2.5.4.17</text>
                  <text x="100" y="1284">DER:</text>
                  <text x="228" y="1284">06</text>
                  <text x="252" y="1284">03</text>
                  <text x="276" y="1284">55</text>
                  <text x="300" y="1284">04</text>
                  <text x="324" y="1284">11</text>
                  <text x="120" y="1300">Comments:</text>
                  <text x="52" y="1332">13</text>
                  <text x="104" y="1332">Name:</text>
                  <text x="240" y="1332">Given</text>
                  <text x="284" y="1332">Name</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="256" y="1348">givenName</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="252" y="1364">2.5.4.42</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">03</text>
                  <text x="276" y="1380">55</text>
                  <text x="300" y="1380">04</text>
                  <text x="324" y="1380">2A</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="52" y="1428">14</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="252" y="1428">Initials</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="252" y="1444">initials</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="252" y="1460">2.5.4.43</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">03</text>
                  <text x="276" y="1476">55</text>
                  <text x="300" y="1476">04</text>
                  <text x="324" y="1476">2B</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="52" y="1524">15</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="260" y="1524">Generation</text>
                  <text x="344" y="1524">Qualifier</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="296" y="1540">generationQualifier</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="252" y="1556">2.5.4.44</text>
                  <text x="100" y="1572">DER:</text>
                  <text x="228" y="1572">06</text>
                  <text x="252" y="1572">03</text>
                  <text x="276" y="1572">55</text>
                  <text x="300" y="1572">04</text>
                  <text x="324" y="1572">2C</text>
                  <text x="120" y="1588">Comments:</text>
                  <text x="52" y="1620">16</text>
                  <text x="104" y="1620">Name:</text>
                  <text x="228" y="1620">DN</text>
                  <text x="280" y="1620">Qualifier</text>
                  <text x="132" y="1636">Identifiers:</text>
                  <text x="264" y="1636">dnQualifier</text>
                  <text x="100" y="1652">OID:</text>
                  <text x="252" y="1652">2.5.4.46</text>
                  <text x="100" y="1668">DER:</text>
                  <text x="228" y="1668">06</text>
                  <text x="252" y="1668">03</text>
                  <text x="276" y="1668">55</text>
                  <text x="300" y="1668">04</text>
                  <text x="324" y="1668">2E</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="52" y="1716">17</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="256" y="1716">Pseudonym</text>
                  <text x="132" y="1732">Identifiers:</text>
                  <text x="256" y="1732">pseudonym</text>
                  <text x="100" y="1748">OID:</text>
                  <text x="252" y="1748">2.5.4.65</text>
                  <text x="100" y="1764">DER:</text>
                  <text x="228" y="1764">06</text>
                  <text x="252" y="1764">03</text>
                  <text x="276" y="1764">55</text>
                  <text x="300" y="1764">04</text>
                  <text x="324" y="1764">41</text>
                  <text x="120" y="1780">Comments:</text>
                  <text x="52" y="1812">18</text>
                  <text x="104" y="1812">Name:</text>
                  <text x="268" y="1812">Organization</text>
                  <text x="364" y="1812">Identifier</text>
                  <text x="132" y="1828">Identifiers:</text>
                  <text x="308" y="1828">organizationIdentifier</text>
                  <text x="100" y="1844">OID:</text>
                  <text x="252" y="1844">2.5.4.97</text>
                  <text x="100" y="1860">DER:</text>
                  <text x="228" y="1860">06</text>
                  <text x="252" y="1860">03</text>
                  <text x="276" y="1860">55</text>
                  <text x="300" y="1860">04</text>
                  <text x="324" y="1860">61</text>
                  <text x="120" y="1876">Comments:</text>
                  <text x="52" y="1908">19</text>
                  <text x="104" y="1908">Name:</text>
                  <text x="236" y="1908">Inc.</text>
                  <text x="292" y="1908">Locality</text>
                  <text x="132" y="1924">Identifiers:</text>
                  <text x="376" y="1924">jurisdictionOfIncorporationLocalityName</text>
                  <text x="100" y="1940">OID:</text>
                  <text x="316" y="1940">1.3.6.1.4.1.311.60.2.1.1</text>
                  <text x="100" y="1956">DER:</text>
                  <text x="228" y="1956">06</text>
                  <text x="252" y="1956">0B</text>
                  <text x="276" y="1956">2B</text>
                  <text x="300" y="1956">06</text>
                  <text x="324" y="1956">01</text>
                  <text x="348" y="1956">04</text>
                  <text x="372" y="1956">01</text>
                  <text x="396" y="1956">82</text>
                  <text x="420" y="1956">37</text>
                  <text x="444" y="1956">3C</text>
                  <text x="468" y="1956">02</text>
                  <text x="492" y="1956">01</text>
                  <text x="516" y="1956">01</text>
                  <text x="120" y="1972">Comments:</text>
                  <text x="52" y="2004">20</text>
                  <text x="104" y="2004">Name:</text>
                  <text x="236" y="2004">Inc.</text>
                  <text x="280" y="2004">State</text>
                  <text x="316" y="2004">or</text>
                  <text x="364" y="2004">Province</text>
                  <text x="132" y="2020">Identifiers:</text>
                  <text x="328" y="2020">jurisdictionOfIncorporation</text>
                  <text x="296" y="2036">StateOrProvinceName</text>
                  <text x="100" y="2052">OID:</text>
                  <text x="316" y="2052">1.3.6.1.4.1.311.60.2.1.2</text>
                  <text x="100" y="2068">DER:</text>
                  <text x="228" y="2068">06</text>
                  <text x="252" y="2068">0B</text>
                  <text x="276" y="2068">2B</text>
                  <text x="300" y="2068">06</text>
                  <text x="324" y="2068">01</text>
                  <text x="348" y="2068">04</text>
                  <text x="372" y="2068">01</text>
                  <text x="396" y="2068">82</text>
                  <text x="420" y="2068">37</text>
                  <text x="444" y="2068">3C</text>
                  <text x="468" y="2068">02</text>
                  <text x="492" y="2068">01</text>
                  <text x="516" y="2068">02</text>
                  <text x="120" y="2084">Comments:</text>
                  <text x="52" y="2116">21</text>
                  <text x="104" y="2116">Name:</text>
                  <text x="236" y="2116">Inc.</text>
                  <text x="288" y="2116">Country</text>
                  <text x="132" y="2132">Identifiers:</text>
                  <text x="372" y="2132">jurisdictionOfIncorporationCountryName</text>
                  <text x="100" y="2148">OID:</text>
                  <text x="316" y="2148">1.3.6.1.4.1.311.60.2.1.3</text>
                  <text x="100" y="2164">DER:</text>
                  <text x="228" y="2164">06</text>
                  <text x="252" y="2164">0B</text>
                  <text x="276" y="2164">2B</text>
                  <text x="300" y="2164">06</text>
                  <text x="324" y="2164">01</text>
                  <text x="348" y="2164">04</text>
                  <text x="372" y="2164">01</text>
                  <text x="396" y="2164">82</text>
                  <text x="420" y="2164">37</text>
                  <text x="444" y="2164">3C</text>
                  <text x="468" y="2164">02</text>
                  <text x="492" y="2164">01</text>
                  <text x="516" y="2164">03</text>
                  <text x="120" y="2180">Comments:</text>
                  <text x="52" y="2212">22</text>
                  <text x="104" y="2212">Name:</text>
                  <text x="244" y="2212">Domain</text>
                  <text x="312" y="2212">Component</text>
                  <text x="132" y="2228">Identifiers:</text>
                  <text x="284" y="2228">domainComponent,</text>
                  <text x="364" y="2228">dc</text>
                  <text x="100" y="2244">OID:</text>
                  <text x="324" y="2244">0.9.2342.19200300.100.1.25</text>
                  <text x="100" y="2260">DER:</text>
                  <text x="228" y="2260">06</text>
                  <text x="252" y="2260">0A</text>
                  <text x="276" y="2260">09</text>
                  <text x="300" y="2260">92</text>
                  <text x="324" y="2260">26</text>
                  <text x="348" y="2260">89</text>
                  <text x="372" y="2260">93</text>
                  <text x="396" y="2260">F2</text>
                  <text x="420" y="2260">2C</text>
                  <text x="444" y="2260">64</text>
                  <text x="468" y="2260">01</text>
                  <text x="492" y="2260">19</text>
                  <text x="120" y="2276">Comments:</text>
                  <text x="52" y="2308">25</text>
                  <text x="104" y="2308">Name:</text>
                  <text x="236" y="2308">Name</text>
                  <text x="132" y="2324">Identifiers:</text>
                  <text x="236" y="2324">name</text>
                  <text x="100" y="2340">OID:</text>
                  <text x="252" y="2340">2.5.4.41</text>
                  <text x="100" y="2356">DER:</text>
                  <text x="228" y="2356">06</text>
                  <text x="252" y="2356">03</text>
                  <text x="276" y="2356">55</text>
                  <text x="300" y="2356">04</text>
                  <text x="324" y="2356">29</text>
                  <text x="120" y="2372">Comments:</text>
                  <text x="52" y="2404">26</text>
                  <text x="104" y="2404">Name:</text>
                  <text x="256" y="2404">Telephone</text>
                  <text x="324" y="2404">Number</text>
                  <text x="132" y="2420">Identifiers:</text>
                  <text x="280" y="2420">telephoneNumber</text>
                  <text x="100" y="2436">OID:</text>
                  <text x="252" y="2436">2.5.4.20</text>
                  <text x="100" y="2452">DER:</text>
                  <text x="228" y="2452">06</text>
                  <text x="252" y="2452">03</text>
                  <text x="276" y="2452">55</text>
                  <text x="300" y="2452">04</text>
                  <text x="324" y="2452">14</text>
                  <text x="120" y="2468">Comments:</text>
                  <text x="52" y="2500">27</text>
                  <text x="104" y="2500">Name:</text>
                  <text x="256" y="2500">Directory</text>
                  <text x="340" y="2500">Management</text>
                  <text x="412" y="2500">Domain</text>
                  <text x="460" y="2500">Name</text>
                  <text x="132" y="2516">Identifiers:</text>
                  <text x="248" y="2516">dmdName</text>
                  <text x="100" y="2532">OID:</text>
                  <text x="252" y="2532">2.5.4.54</text>
                  <text x="100" y="2548">DER:</text>
                  <text x="228" y="2548">06</text>
                  <text x="252" y="2548">03</text>
                  <text x="276" y="2548">55</text>
                  <text x="300" y="2548">04</text>
                  <text x="324" y="2548">36</text>
                  <text x="120" y="2564">Comments:</text>
                  <text x="52" y="2596">28</text>
                  <text x="104" y="2596">Name:</text>
                  <text x="244" y="2596">userid</text>
                  <text x="132" y="2612">Identifiers:</text>
                  <text x="232" y="2612">uid</text>
                  <text x="100" y="2628">OID:</text>
                  <text x="320" y="2628">0.9.2342.19200300.100.1.1</text>
                  <text x="100" y="2644">DER:</text>
                  <text x="228" y="2644">06</text>
                  <text x="252" y="2644">0A</text>
                  <text x="276" y="2644">09</text>
                  <text x="300" y="2644">92</text>
                  <text x="324" y="2644">26</text>
                  <text x="348" y="2644">89</text>
                  <text x="372" y="2644">93</text>
                  <text x="396" y="2644">F2</text>
                  <text x="420" y="2644">2C</text>
                  <text x="444" y="2644">64</text>
                  <text x="468" y="2644">01</text>
                  <text x="492" y="2644">01</text>
                  <text x="120" y="2660">Comments:</text>
                  <text x="52" y="2692">29</text>
                  <text x="104" y="2692">Name:</text>
                  <text x="268" y="2692">Unstructured</text>
                  <text x="340" y="2692">Name</text>
                  <text x="132" y="2708">Identifiers:</text>
                  <text x="284" y="2708">unstructuredName</text>
                  <text x="100" y="2724">OID:</text>
                  <text x="300" y="2724">1.2.840.113549.1.9.2</text>
                  <text x="100" y="2740">DER:</text>
                  <text x="228" y="2740">06</text>
                  <text x="252" y="2740">09</text>
                  <text x="276" y="2740">2A</text>
                  <text x="300" y="2740">86</text>
                  <text x="324" y="2740">48</text>
                  <text x="348" y="2740">86</text>
                  <text x="372" y="2740">F7</text>
                  <text x="396" y="2740">0D</text>
                  <text x="420" y="2740">01</text>
                  <text x="444" y="2740">09</text>
                  <text x="468" y="2740">02</text>
                  <text x="120" y="2756">Comments:</text>
                  <text x="52" y="2788">30</text>
                  <text x="104" y="2788">Name:</text>
                  <text x="268" y="2788">Unstructured</text>
                  <text x="352" y="2788">Address</text>
                  <text x="132" y="2804">Identifiers:</text>
                  <text x="296" y="2804">unstructuredAddress</text>
                  <text x="100" y="2820">OID:</text>
                  <text x="300" y="2820">1.2.840.113549.1.9.8</text>
                  <text x="100" y="2836">DER:</text>
                  <text x="228" y="2836">06</text>
                  <text x="252" y="2836">0A</text>
                  <text x="276" y="2836">2A</text>
                  <text x="300" y="2836">86</text>
                  <text x="324" y="2836">48</text>
                  <text x="348" y="2836">86</text>
                  <text x="372" y="2836">F7</text>
                  <text x="396" y="2836">0D</text>
                  <text x="420" y="2836">01</text>
                  <text x="444" y="2836">09</text>
                  <text x="468" y="2836">08</text>
                  <text x="492" y="2836">00</text>
                  <text x="120" y="2852">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | RDN Attribute                                             |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    19 | Name:            Inc. Locality                            |
|       | Identifiers:     jurisdictionOfIncorporationLocalityName  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    20 | Name:            Inc. State or Province                   |
|       | Identifiers:     jurisdictionOfIncorporation              |
|       |                  StateOrProvinceName                      |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    21 | Name:            Inc. Country                             |
|       | Identifiers:     jurisdictionOfIncorporationCountryName   |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08 00      |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="cratttype">
        <name>C509 CR Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 CR Attributes" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, attributeValue, and Reference, where Value is an integer, and the other columns are text strings. Name and Identifiers are informal descriptions. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". Name and Identifiers are informal descriptions. If OID is present, the OID is given in dotted decimal representation, and the DER column contains the hex string of the DER-encoded OID <xref target="X.690"/>.</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 CRAttributes</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="448" width="560" viewBox="0 0 560 448" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,432" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,432" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,432" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,432 L 552,432" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="92" y="52">CR</text>
                  <text x="144" y="52">Attribute</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">Extension</text>
                  <text x="328" y="84">Request</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="284" y="100">extensionRequest</text>
                  <text x="100" y="116">OID:</text>
                  <text x="304" y="116">1.2.840.113549.1.9.14</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">09</text>
                  <text x="276" y="132">2A</text>
                  <text x="300" y="132">86</text>
                  <text x="324" y="132">48</text>
                  <text x="348" y="132">86</text>
                  <text x="372" y="132">F7</text>
                  <text x="396" y="132">0D</text>
                  <text x="420" y="132">01</text>
                  <text x="444" y="132">09</text>
                  <text x="468" y="132">0E</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">2985</text>
                  <text x="144" y="164">attributeValue:</text>
                  <text x="260" y="164">Extensions</text>
                  <text x="56" y="196">1</text>
                  <text x="104" y="196">Name:</text>
                  <text x="256" y="196">Challenge</text>
                  <text x="332" y="196">Password</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="288" y="212">challengePassword</text>
                  <text x="100" y="228">OID:</text>
                  <text x="300" y="228">1.2.840.113549.1.9.7</text>
                  <text x="100" y="244">DER:</text>
                  <text x="228" y="244">06</text>
                  <text x="252" y="244">09</text>
                  <text x="276" y="244">2A</text>
                  <text x="300" y="244">86</text>
                  <text x="324" y="244">48</text>
                  <text x="348" y="244">86</text>
                  <text x="372" y="244">F7</text>
                  <text x="396" y="244">0D</text>
                  <text x="420" y="244">01</text>
                  <text x="444" y="244">09</text>
                  <text x="468" y="244">07</text>
                  <text x="120" y="260">Comments:</text>
                  <text x="232" y="260">RFC</text>
                  <text x="268" y="260">2985</text>
                  <text x="252" y="276">Negative</text>
                  <text x="312" y="276">value</text>
                  <text x="352" y="276">for</text>
                  <text x="408" y="276">Printable</text>
                  <text x="480" y="276">String,</text>
                  <text x="232" y="292">and</text>
                  <text x="284" y="292">positive</text>
                  <text x="344" y="292">value</text>
                  <text x="384" y="292">for</text>
                  <text x="420" y="292">UTF8</text>
                  <text x="468" y="292">String</text>
                  <text x="144" y="308">attributeValue:</text>
                  <text x="288" y="308">ChallengePassword</text>
                  <text x="56" y="340">2</text>
                  <text x="104" y="340">Name:</text>
                  <text x="248" y="340">Private</text>
                  <text x="296" y="340">Key</text>
                  <text x="356" y="340">Possession</text>
                  <text x="440" y="340">Statement</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="336" y="356">privateKeyPossessionStatement</text>
                  <text x="100" y="372">OID:</text>
                  <text x="304" y="372">1.3.6.1.4.1.22112.2.1</text>
                  <text x="100" y="388">DER:</text>
                  <text x="228" y="388">06</text>
                  <text x="252" y="388">0A</text>
                  <text x="276" y="388">2B</text>
                  <text x="300" y="388">06</text>
                  <text x="324" y="388">01</text>
                  <text x="348" y="388">04</text>
                  <text x="372" y="388">01</text>
                  <text x="396" y="388">81</text>
                  <text x="420" y="388">AC</text>
                  <text x="444" y="388">60</text>
                  <text x="468" y="388">02</text>
                  <text x="492" y="388">01</text>
                  <text x="120" y="404">Comments:</text>
                  <text x="232" y="404">RFC</text>
                  <text x="268" y="404">9883</text>
                  <text x="144" y="420">attributeValue:</text>
                  <text x="336" y="420">PrivateKeyPossessionStatement</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | CR Attribute                                              |
+=======+===========================================================+
|     0 | Name:            Extension Request                        |
|       | Identifiers:     extensionRequest                         |
|       | OID:             1.2.840.113549.1.9.14                    |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 0E         |
|       | Comments:        RFC 2985                                 |
|       | attributeValue:  Extensions                               |
+-------+-----------------------------------------------------------+
|     1 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        RFC 2985                                 |
|       |                  Negative value for Printable String,     |
|       |                  and positive value for UTF8 String       |
|       | attributeValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
|     2 | Name:            Private Key Possession Statement         |
|       | Identifiers:     privateKeyPossessionStatement            |
|       | OID:             1.3.6.1.4.1.22112.2.1                    |
|       | DER:             06 0A 2B 06 01 04 01 81 AC 60 02 01      |
|       | Comments:        RFC 9883                                 |
|       | attributeValue:  PrivateKeyPossessionStatement            |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is a positive integer, and the other columns are text strings. The fields Name, OID, DER, abd extensionValue are mandatory. For values in the interval [1, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2880" width="560" viewBox="0 0 560 2880" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2864" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2864" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2864" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,288 L 552,288" fill="none" stroke="black"/>
                <path d="M 8,400 L 552,400" fill="none" stroke="black"/>
                <path d="M 8,512 L 552,512" fill="none" stroke="black"/>
                <path d="M 8,624 L 552,624" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,960 L 552,960" fill="none" stroke="black"/>
                <path d="M 8,1072 L 552,1072" fill="none" stroke="black"/>
                <path d="M 8,1184 L 552,1184" fill="none" stroke="black"/>
                <path d="M 8,1296 L 552,1296" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1520 L 552,1520" fill="none" stroke="black"/>
                <path d="M 8,1632 L 552,1632" fill="none" stroke="black"/>
                <path d="M 8,1744 L 552,1744" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,1968 L 552,1968" fill="none" stroke="black"/>
                <path d="M 8,2080 L 552,2080" fill="none" stroke="black"/>
                <path d="M 8,2192 L 552,2192" fill="none" stroke="black"/>
                <path d="M 8,2304 L 552,2304" fill="none" stroke="black"/>
                <path d="M 8,2416 L 552,2416" fill="none" stroke="black"/>
                <path d="M 8,2528 L 552,2528" fill="none" stroke="black"/>
                <path d="M 8,2640 L 552,2640" fill="none" stroke="black"/>
                <path d="M 8,2752 L 552,2752" fill="none" stroke="black"/>
                <path d="M 8,2864 L 552,2864" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="120" y="52">Extension</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="248" y="84">Subject</text>
                  <text x="296" y="84">Key</text>
                  <text x="356" y="84">Identifier</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="300" y="100">subjectKeyIdentifier</text>
                  <text x="100" y="116">OID:</text>
                  <text x="256" y="116">2.5.29.14</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">03</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">0E</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="144" y="164">extensionValue:</text>
                  <text x="300" y="164">SubjectKeyIdentifier</text>
                  <text x="56" y="196">2</text>
                  <text x="104" y="196">Name:</text>
                  <text x="232" y="196">Key</text>
                  <text x="272" y="196">Usage</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="252" y="212">keyUsage</text>
                  <text x="100" y="228">OID:</text>
                  <text x="256" y="228">2.5.29.15</text>
                  <text x="100" y="244">DER:</text>
                  <text x="228" y="244">06</text>
                  <text x="252" y="244">03</text>
                  <text x="276" y="244">55</text>
                  <text x="300" y="244">1D</text>
                  <text x="324" y="244">0F</text>
                  <text x="120" y="260">Comments:</text>
                  <text x="144" y="276">AttributeValue:</text>
                  <text x="252" y="276">KeyUsage</text>
                  <text x="56" y="308">3</text>
                  <text x="104" y="308">Name:</text>
                  <text x="248" y="308">Subject</text>
                  <text x="328" y="308">Alternative</text>
                  <text x="396" y="308">Name</text>
                  <text x="132" y="324">Identifiers:</text>
                  <text x="276" y="324">subjectAltName</text>
                  <text x="100" y="340">OID:</text>
                  <text x="256" y="340">2.5.29.17</text>
                  <text x="100" y="356">DER:</text>
                  <text x="228" y="356">06</text>
                  <text x="252" y="356">03</text>
                  <text x="276" y="356">55</text>
                  <text x="300" y="356">1D</text>
                  <text x="324" y="356">11</text>
                  <text x="120" y="372">Comments:</text>
                  <text x="144" y="388">extensionValue:</text>
                  <text x="276" y="388">SubjectAltName</text>
                  <text x="56" y="420">4</text>
                  <text x="104" y="420">Name:</text>
                  <text x="240" y="420">Basic</text>
                  <text x="312" y="420">Constraints</text>
                  <text x="132" y="436">Identifiers:</text>
                  <text x="284" y="436">basicConstraints</text>
                  <text x="100" y="452">OID:</text>
                  <text x="256" y="452">2.5.29.19</text>
                  <text x="100" y="468">DER:</text>
                  <text x="228" y="468">06</text>
                  <text x="252" y="468">03</text>
                  <text x="276" y="468">55</text>
                  <text x="300" y="468">1D</text>
                  <text x="324" y="468">13</text>
                  <text x="120" y="484">Comments:</text>
                  <text x="144" y="500">extensionValue:</text>
                  <text x="284" y="500">BasicConstraints</text>
                  <text x="56" y="532">5</text>
                  <text x="104" y="532">Name:</text>
                  <text x="232" y="532">CRL</text>
                  <text x="300" y="532">Distribution</text>
                  <text x="380" y="532">Points</text>
                  <text x="132" y="548">Identifiers:</text>
                  <text x="304" y="548">cRLDistributionPoints</text>
                  <text x="100" y="564">OID:</text>
                  <text x="256" y="564">2.5.29.31</text>
                  <text x="100" y="580">DER:</text>
                  <text x="228" y="580">06</text>
                  <text x="252" y="580">03</text>
                  <text x="276" y="580">55</text>
                  <text x="300" y="580">1D</text>
                  <text x="324" y="580">1F</text>
                  <text x="120" y="596">Comments:</text>
                  <text x="144" y="612">extensionValue:</text>
                  <text x="304" y="612">CRLDistributionPoints</text>
                  <text x="56" y="644">6</text>
                  <text x="104" y="644">Name:</text>
                  <text x="264" y="644">Certificate</text>
                  <text x="348" y="644">Policies</text>
                  <text x="132" y="660">Identifiers:</text>
                  <text x="296" y="660">certificatePolicies</text>
                  <text x="100" y="676">OID:</text>
                  <text x="256" y="676">2.5.29.32</text>
                  <text x="100" y="692">DER:</text>
                  <text x="228" y="692">06</text>
                  <text x="252" y="692">03</text>
                  <text x="276" y="692">55</text>
                  <text x="300" y="692">1D</text>
                  <text x="324" y="692">20</text>
                  <text x="120" y="708">Comments:</text>
                  <text x="144" y="724">extensionValue:</text>
                  <text x="296" y="724">CertificatePolicies</text>
                  <text x="56" y="756">7</text>
                  <text x="104" y="756">Name:</text>
                  <text x="256" y="756">Authority</text>
                  <text x="312" y="756">Key</text>
                  <text x="372" y="756">Identifier</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="308" y="772">authorityKeyIdentifier</text>
                  <text x="100" y="788">OID:</text>
                  <text x="256" y="788">2.5.29.35</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">03</text>
                  <text x="276" y="804">55</text>
                  <text x="300" y="804">1D</text>
                  <text x="324" y="804">23</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="144" y="836">extensionValue:</text>
                  <text x="308" y="836">AuthorityKeyIdentifier</text>
                  <text x="56" y="868">8</text>
                  <text x="104" y="868">Name:</text>
                  <text x="252" y="868">Extended</text>
                  <text x="304" y="868">Key</text>
                  <text x="344" y="868">Usage</text>
                  <text x="132" y="884">Identifiers:</text>
                  <text x="264" y="884">extKeyUsage</text>
                  <text x="100" y="900">OID:</text>
                  <text x="256" y="900">2.5.29.37</text>
                  <text x="100" y="916">DER:</text>
                  <text x="228" y="916">06</text>
                  <text x="252" y="916">03</text>
                  <text x="276" y="916">55</text>
                  <text x="300" y="916">1D</text>
                  <text x="324" y="916">25</text>
                  <text x="120" y="932">Comments:</text>
                  <text x="144" y="948">extensionValue:</text>
                  <text x="288" y="948">ExtKeyUsageSyntax</text>
                  <text x="56" y="980">9</text>
                  <text x="104" y="980">Name:</text>
                  <text x="256" y="980">Authority</text>
                  <text x="344" y="980">Information</text>
                  <text x="420" y="980">Access</text>
                  <text x="132" y="996">Identifiers:</text>
                  <text x="296" y="996">authorityInfoAccess</text>
                  <text x="100" y="1012">OID:</text>
                  <text x="288" y="1012">1.3.6.1.5.5.7.1.1</text>
                  <text x="100" y="1028">DER:</text>
                  <text x="228" y="1028">06</text>
                  <text x="252" y="1028">08</text>
                  <text x="276" y="1028">2B</text>
                  <text x="300" y="1028">06</text>
                  <text x="324" y="1028">01</text>
                  <text x="348" y="1028">05</text>
                  <text x="372" y="1028">05</text>
                  <text x="396" y="1028">07</text>
                  <text x="420" y="1028">01</text>
                  <text x="444" y="1028">01</text>
                  <text x="120" y="1044">Comments:</text>
                  <text x="144" y="1060">extensionValue:</text>
                  <text x="320" y="1060">AuthorityInfoAccessSyntax</text>
                  <text x="52" y="1092">10</text>
                  <text x="104" y="1092">Name:</text>
                  <text x="244" y="1092">Signed</text>
                  <text x="320" y="1092">Certificate</text>
                  <text x="408" y="1092">Timestamp</text>
                  <text x="468" y="1092">List</text>
                  <text x="132" y="1108">Identifiers:</text>
                  <text x="100" y="1124">OID:</text>
                  <text x="312" y="1124">1.3.6.1.4.1.11129.2.4.2</text>
                  <text x="100" y="1140">DER:</text>
                  <text x="228" y="1140">06</text>
                  <text x="252" y="1140">0A</text>
                  <text x="276" y="1140">2B</text>
                  <text x="300" y="1140">06</text>
                  <text x="324" y="1140">01</text>
                  <text x="348" y="1140">04</text>
                  <text x="372" y="1140">01</text>
                  <text x="396" y="1140">D6</text>
                  <text x="420" y="1140">79</text>
                  <text x="444" y="1140">02</text>
                  <text x="468" y="1140">04</text>
                  <text x="492" y="1140">02</text>
                  <text x="120" y="1156">Comments:</text>
                  <text x="144" y="1172">extensionValue:</text>
                  <text x="328" y="1172">SignedCertificateTimestamps</text>
                  <text x="52" y="1204">24</text>
                  <text x="104" y="1204">Name:</text>
                  <text x="248" y="1204">Subject</text>
                  <text x="320" y="1204">Directory</text>
                  <text x="404" y="1204">Attributes</text>
                  <text x="132" y="1220">Identifiers:</text>
                  <text x="324" y="1220">subjectDirectoryAttributes</text>
                  <text x="100" y="1236">OID:</text>
                  <text x="252" y="1236">2.5.29.9</text>
                  <text x="100" y="1252">DER:</text>
                  <text x="228" y="1252">06</text>
                  <text x="252" y="1252">03</text>
                  <text x="276" y="1252">55</text>
                  <text x="300" y="1252">1D</text>
                  <text x="324" y="1252">09</text>
                  <text x="120" y="1268">Comments:</text>
                  <text x="144" y="1284">extensionValue:</text>
                  <text x="324" y="1284">SubjectDirectoryAttributes</text>
                  <text x="52" y="1316">25</text>
                  <text x="104" y="1316">Name:</text>
                  <text x="244" y="1316">Issuer</text>
                  <text x="320" y="1316">Alternative</text>
                  <text x="388" y="1316">Name</text>
                  <text x="132" y="1332">Identifiers:</text>
                  <text x="272" y="1332">issuerAltName</text>
                  <text x="100" y="1348">OID:</text>
                  <text x="256" y="1348">2.5.29.18</text>
                  <text x="100" y="1364">DER:</text>
                  <text x="228" y="1364">06</text>
                  <text x="252" y="1364">03</text>
                  <text x="276" y="1364">55</text>
                  <text x="300" y="1364">1D</text>
                  <text x="324" y="1364">12</text>
                  <text x="120" y="1380">Comments:</text>
                  <text x="144" y="1396">extensionValue:</text>
                  <text x="272" y="1396">IssuerAltName</text>
                  <text x="52" y="1428">26</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="236" y="1428">Name</text>
                  <text x="304" y="1428">Constraints</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="280" y="1444">nameConstraints</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="256" y="1460">2.5.29.30</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">03</text>
                  <text x="276" y="1476">55</text>
                  <text x="300" y="1476">1D</text>
                  <text x="324" y="1476">1E</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="144" y="1508">extensionValue:</text>
                  <text x="280" y="1508">NameConstraints</text>
                  <text x="52" y="1540">27</text>
                  <text x="104" y="1540">Name:</text>
                  <text x="244" y="1540">Policy</text>
                  <text x="308" y="1540">Mappings</text>
                  <text x="132" y="1556">Identifiers:</text>
                  <text x="276" y="1556">policyMappings</text>
                  <text x="100" y="1572">OID:</text>
                  <text x="256" y="1572">2.5.29.33</text>
                  <text x="100" y="1588">DER:</text>
                  <text x="228" y="1588">06</text>
                  <text x="252" y="1588">03</text>
                  <text x="276" y="1588">55</text>
                  <text x="300" y="1588">1D</text>
                  <text x="324" y="1588">21</text>
                  <text x="120" y="1604">Comments:</text>
                  <text x="144" y="1620">extensionValue:</text>
                  <text x="276" y="1620">PolicyMappings</text>
                  <text x="52" y="1652">28</text>
                  <text x="104" y="1652">Name:</text>
                  <text x="244" y="1652">Policy</text>
                  <text x="320" y="1652">Constraints</text>
                  <text x="132" y="1668">Identifiers:</text>
                  <text x="288" y="1668">policyConstraints</text>
                  <text x="100" y="1684">OID:</text>
                  <text x="256" y="1684">2.5.29.36</text>
                  <text x="100" y="1700">DER:</text>
                  <text x="228" y="1700">06</text>
                  <text x="252" y="1700">03</text>
                  <text x="276" y="1700">55</text>
                  <text x="300" y="1700">1D</text>
                  <text x="324" y="1700">24</text>
                  <text x="120" y="1716">Comments:</text>
                  <text x="144" y="1732">extensionValue:</text>
                  <text x="288" y="1732">PolicyConstraints</text>
                  <text x="52" y="1764">29</text>
                  <text x="104" y="1764">Name:</text>
                  <text x="252" y="1764">Freshest</text>
                  <text x="304" y="1764">CRL</text>
                  <text x="132" y="1780">Identifiers:</text>
                  <text x="264" y="1780">freshestCRL</text>
                  <text x="100" y="1796">OID:</text>
                  <text x="256" y="1796">2.5.29.46</text>
                  <text x="100" y="1812">DER:</text>
                  <text x="228" y="1812">06</text>
                  <text x="252" y="1812">03</text>
                  <text x="276" y="1812">55</text>
                  <text x="300" y="1812">1D</text>
                  <text x="324" y="1812">2E</text>
                  <text x="120" y="1828">Comments:</text>
                  <text x="144" y="1844">extensionValue:</text>
                  <text x="264" y="1844">FreshestCRL</text>
                  <text x="52" y="1876">30</text>
                  <text x="104" y="1876">Name:</text>
                  <text x="248" y="1876">Inhibit</text>
                  <text x="320" y="1876">anyPolicy</text>
                  <text x="132" y="1892">Identifiers:</text>
                  <text x="284" y="1892">inhibitAnyPolicy</text>
                  <text x="100" y="1908">OID:</text>
                  <text x="256" y="1908">2.5.29.54</text>
                  <text x="100" y="1924">DER:</text>
                  <text x="228" y="1924">06</text>
                  <text x="252" y="1924">03</text>
                  <text x="276" y="1924">55</text>
                  <text x="300" y="1924">1D</text>
                  <text x="324" y="1924">36</text>
                  <text x="120" y="1940">Comments:</text>
                  <text x="144" y="1956">extensionValue:</text>
                  <text x="284" y="1956">InhibitAnyPolicy</text>
                  <text x="52" y="1988">31</text>
                  <text x="104" y="1988">Name:</text>
                  <text x="248" y="1988">Subject</text>
                  <text x="328" y="1988">Information</text>
                  <text x="404" y="1988">Access</text>
                  <text x="132" y="2004">Identifiers:</text>
                  <text x="288" y="2004">subjectInfoAccess</text>
                  <text x="100" y="2020">OID:</text>
                  <text x="292" y="2020">1.3.6.1.5.5.7.1.11</text>
                  <text x="100" y="2036">DER:</text>
                  <text x="228" y="2036">06</text>
                  <text x="252" y="2036">08</text>
                  <text x="276" y="2036">2B</text>
                  <text x="300" y="2036">06</text>
                  <text x="324" y="2036">01</text>
                  <text x="348" y="2036">05</text>
                  <text x="372" y="2036">05</text>
                  <text x="396" y="2036">07</text>
                  <text x="420" y="2036">01</text>
                  <text x="444" y="2036">0B</text>
                  <text x="120" y="2052">Comments:</text>
                  <text x="144" y="2068">extensionValue:</text>
                  <text x="312" y="2068">SubjectInfoAccessSyntax</text>
                  <text x="52" y="2100">32</text>
                  <text x="104" y="2100">Name:</text>
                  <text x="268" y="2100">IPAddrBlocks</text>
                  <text x="132" y="2116">Identifiers:</text>
                  <text x="292" y="2116">id-pe-ipAddrBlocks</text>
                  <text x="100" y="2132">OID:</text>
                  <text x="288" y="2132">1.3.6.1.5.5.7.1.7</text>
                  <text x="100" y="2148">DER:</text>
                  <text x="228" y="2148">06</text>
                  <text x="252" y="2148">08</text>
                  <text x="276" y="2148">2B</text>
                  <text x="300" y="2148">06</text>
                  <text x="324" y="2148">01</text>
                  <text x="348" y="2148">05</text>
                  <text x="372" y="2148">05</text>
                  <text x="396" y="2148">07</text>
                  <text x="420" y="2148">01</text>
                  <text x="444" y="2148">07</text>
                  <text x="120" y="2164">Comments:</text>
                  <text x="232" y="2164">RFC</text>
                  <text x="268" y="2164">3779</text>
                  <text x="144" y="2180">extensionValue:</text>
                  <text x="268" y="2180">IPAddrBlocks</text>
                  <text x="52" y="2212">33</text>
                  <text x="104" y="2212">Name:</text>
                  <text x="228" y="2212">AS</text>
                  <text x="288" y="2212">Identifiers</text>
                  <text x="132" y="2228">Identifiers:</text>
                  <text x="308" y="2228">id-pe-autonomousSysIds</text>
                  <text x="100" y="2244">OID:</text>
                  <text x="288" y="2244">1.3.6.1.5.5.7.1.8</text>
                  <text x="100" y="2260">DER:</text>
                  <text x="228" y="2260">06</text>
                  <text x="252" y="2260">08</text>
                  <text x="276" y="2260">2B</text>
                  <text x="300" y="2260">06</text>
                  <text x="324" y="2260">01</text>
                  <text x="348" y="2260">05</text>
                  <text x="372" y="2260">05</text>
                  <text x="396" y="2260">07</text>
                  <text x="420" y="2260">01</text>
                  <text x="444" y="2260">08</text>
                  <text x="120" y="2276">Comments:</text>
                  <text x="232" y="2276">RFC</text>
                  <text x="268" y="2276">3779</text>
                  <text x="144" y="2292">extensionValue:</text>
                  <text x="272" y="2292">ASIdentifiers</text>
                  <text x="52" y="2324">34</text>
                  <text x="104" y="2324">Name:</text>
                  <text x="268" y="2324">IPAddrBlocks</text>
                  <text x="332" y="2324">v2</text>
                  <text x="132" y="2340">Identifiers:</text>
                  <text x="304" y="2340">id-pe-ipAddrBlocks-v2</text>
                  <text x="100" y="2356">OID:</text>
                  <text x="292" y="2356">1.3.6.1.5.5.7.1.28</text>
                  <text x="100" y="2372">DER:</text>
                  <text x="228" y="2372">06</text>
                  <text x="252" y="2372">08</text>
                  <text x="276" y="2372">2B</text>
                  <text x="300" y="2372">06</text>
                  <text x="324" y="2372">01</text>
                  <text x="348" y="2372">05</text>
                  <text x="372" y="2372">05</text>
                  <text x="396" y="2372">07</text>
                  <text x="420" y="2372">01</text>
                  <text x="444" y="2372">1C</text>
                  <text x="120" y="2388">Comments:</text>
                  <text x="232" y="2388">RFC</text>
                  <text x="268" y="2388">8360</text>
                  <text x="144" y="2404">extensionValue:</text>
                  <text x="268" y="2404">IPAddrBlocks</text>
                  <text x="52" y="2436">35</text>
                  <text x="104" y="2436">Name:</text>
                  <text x="228" y="2436">AS</text>
                  <text x="288" y="2436">Identifiers</text>
                  <text x="348" y="2436">v2</text>
                  <text x="132" y="2452">Identifiers:</text>
                  <text x="320" y="2452">id-pe-autonomousSysIds-v2</text>
                  <text x="100" y="2468">OID:</text>
                  <text x="292" y="2468">1.3.6.1.5.5.7.1.29</text>
                  <text x="100" y="2484">DER:</text>
                  <text x="228" y="2484">06</text>
                  <text x="252" y="2484">08</text>
                  <text x="276" y="2484">2B</text>
                  <text x="300" y="2484">06</text>
                  <text x="324" y="2484">01</text>
                  <text x="348" y="2484">05</text>
                  <text x="372" y="2484">05</text>
                  <text x="396" y="2484">07</text>
                  <text x="420" y="2484">01</text>
                  <text x="444" y="2484">1D</text>
                  <text x="120" y="2500">Comments:</text>
                  <text x="232" y="2500">RFC</text>
                  <text x="268" y="2500">8360</text>
                  <text x="144" y="2516">extensionValue:</text>
                  <text x="272" y="2516">ASIdentifiers</text>
                  <text x="52" y="2548">36</text>
                  <text x="104" y="2548">Name:</text>
                  <text x="236" y="2548">OCSP</text>
                  <text x="268" y="2548">No</text>
                  <text x="304" y="2548">Check</text>
                  <text x="132" y="2564">Identifiers:</text>
                  <text x="300" y="2564">id-pkix-ocsp-nocheck</text>
                  <text x="100" y="2580">OID:</text>
                  <text x="300" y="2580">1.3.6.1.5.5.7.48.1.5</text>
                  <text x="100" y="2596">DER:</text>
                  <text x="228" y="2596">06</text>
                  <text x="252" y="2596">09</text>
                  <text x="276" y="2596">2B</text>
                  <text x="300" y="2596">06</text>
                  <text x="324" y="2596">01</text>
                  <text x="348" y="2596">05</text>
                  <text x="372" y="2596">05</text>
                  <text x="396" y="2596">07</text>
                  <text x="420" y="2596">30</text>
                  <text x="444" y="2596">01</text>
                  <text x="468" y="2596">05</text>
                  <text x="120" y="2612">Comments:</text>
                  <text x="144" y="2628">extensionValue:</text>
                  <text x="236" y="2628">null</text>
                  <text x="52" y="2660">37</text>
                  <text x="104" y="2660">Name:</text>
                  <text x="276" y="2660">Precertificate</text>
                  <text x="368" y="2660">Signing</text>
                  <text x="448" y="2660">Certificate</text>
                  <text x="132" y="2676">Identifiers:</text>
                  <text x="100" y="2692">OID:</text>
                  <text x="312" y="2692">1.3.6.1.4.1.11129.2.4.3</text>
                  <text x="100" y="2708">DER:</text>
                  <text x="228" y="2708">06</text>
                  <text x="252" y="2708">0A</text>
                  <text x="276" y="2708">2B</text>
                  <text x="300" y="2708">06</text>
                  <text x="324" y="2708">01</text>
                  <text x="348" y="2708">04</text>
                  <text x="372" y="2708">01</text>
                  <text x="396" y="2708">D6</text>
                  <text x="420" y="2708">79</text>
                  <text x="444" y="2708">02</text>
                  <text x="468" y="2708">04</text>
                  <text x="492" y="2708">03</text>
                  <text x="120" y="2724">Comments:</text>
                  <text x="232" y="2724">RFC</text>
                  <text x="268" y="2724">6962</text>
                  <text x="144" y="2740">extensionValue:</text>
                  <text x="236" y="2740">null</text>
                  <text x="52" y="2772">38</text>
                  <text x="104" y="2772">Name:</text>
                  <text x="232" y="2772">TLS</text>
                  <text x="284" y="2772">Features</text>
                  <text x="132" y="2788">Identifiers:</text>
                  <text x="284" y="2788">id-pe-tlsfeature</text>
                  <text x="100" y="2804">OID:</text>
                  <text x="292" y="2804">1.3.6.1.5.5.7.1.24</text>
                  <text x="100" y="2820">DER:</text>
                  <text x="228" y="2820">06</text>
                  <text x="252" y="2820">08</text>
                  <text x="276" y="2820">2B</text>
                  <text x="300" y="2820">06</text>
                  <text x="324" y="2820">01</text>
                  <text x="348" y="2820">05</text>
                  <text x="372" y="2820">05</text>
                  <text x="396" y="2820">07</text>
                  <text x="420" y="2820">01</text>
                  <text x="444" y="2820">18</text>
                  <text x="120" y="2836">Comments:</text>
                  <text x="232" y="2836">RFC</text>
                  <text x="268" y="2836">7633</text>
                  <text x="144" y="2852">extensionValue:</text>
                  <text x="264" y="2852">TLSFeatures</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:                                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:                                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:                                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:                                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:                                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:                                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    10 | Name:            Signed Certificate Timestamp List        |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.2                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 02      |
|       | Comments:                                                 |
|       | extensionValue:  SignedCertificateTimestamps              |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:                                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:                                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:                                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:                                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:                                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:                                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:                                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IPAddrBlocks                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:        RFC 3779                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Identifiers                           |
|       | Identifiers:     id-pe-autonomousSysIds                   |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:        RFC 3779                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IPAddrBlocks v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:        RFC 8360                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Identifiers v2                        |
|       | Identifiers:     id-pe-autonomousSysIds-v2                |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:        RFC 8360                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:                                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    37 | Name:            Precertificate Signing Certificate       |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.3                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 03      |
|       | Comments:        RFC 6962                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    38 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:        RFC 7633                                 |
|       | extensionValue:  TLSFeatures                              |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1648" width="560" viewBox="0 0 560 1648" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1632" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1632" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,1632" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,960 L 552,960" fill="none" stroke="black"/>
                <path d="M 8,1072 L 552,1072" fill="none" stroke="black"/>
                <path d="M 8,1184 L 552,1184" fill="none" stroke="black"/>
                <path d="M 8,1296 L 552,1296" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1520 L 552,1520" fill="none" stroke="black"/>
                <path d="M 8,1632 L 552,1632" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Certificate</text>
                  <text x="204" y="52">Policy</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="232" y="84">Any</text>
                  <text x="276" y="84">Policy</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="256" y="100">anyPolicy</text>
                  <text x="100" y="116">OID:</text>
                  <text x="264" y="116">2.5.29.32.0</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">04</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">20</text>
                  <text x="348" y="132">00</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="244" y="180">Domain</text>
                  <text x="316" y="180">Validation</text>
                  <text x="380" y="180">(DV)</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">domain-validated</text>
                  <text x="100" y="212">OID:</text>
                  <text x="276" y="212">2.23.140.1.2.1</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">06</text>
                  <text x="276" y="228">67</text>
                  <text x="300" y="228">81</text>
                  <text x="324" y="228">0C</text>
                  <text x="348" y="228">01</text>
                  <text x="372" y="228">02</text>
                  <text x="396" y="228">01</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="268" y="276">Organization</text>
                  <text x="364" y="276">Validation</text>
                  <text x="428" y="276">(OV)</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="308" y="292">organization-validated</text>
                  <text x="100" y="308">OID:</text>
                  <text x="276" y="308">2.23.140.1.2.2</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">06</text>
                  <text x="276" y="324">67</text>
                  <text x="300" y="324">81</text>
                  <text x="324" y="324">0C</text>
                  <text x="348" y="324">01</text>
                  <text x="372" y="324">02</text>
                  <text x="396" y="324">02</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="260" y="372">Individual</text>
                  <text x="348" y="372">Validation</text>
                  <text x="412" y="372">(IV)</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="300" y="388">individual-validated</text>
                  <text x="100" y="404">OID:</text>
                  <text x="276" y="404">2.23.140.1.2.3</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">06</text>
                  <text x="276" y="420">67</text>
                  <text x="300" y="420">81</text>
                  <text x="324" y="420">0C</text>
                  <text x="348" y="420">01</text>
                  <text x="372" y="420">02</text>
                  <text x="396" y="420">03</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="252" y="468">Extended</text>
                  <text x="332" y="468">Validation</text>
                  <text x="396" y="468">(EV)</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="272" y="484">ev-guidelines</text>
                  <text x="100" y="500">OID:</text>
                  <text x="268" y="500">2.23.140.1.1</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">05</text>
                  <text x="276" y="516">67</text>
                  <text x="300" y="516">81</text>
                  <text x="324" y="516">0C</text>
                  <text x="348" y="516">01</text>
                  <text x="372" y="516">01</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="56" y="564">7</text>
                  <text x="104" y="564">Name:</text>
                  <text x="252" y="564">Resource</text>
                  <text x="304" y="564">PKI</text>
                  <text x="348" y="564">(RPKI)</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="304" y="580">id-cp-ipAddr-asNumber</text>
                  <text x="100" y="596">OID:</text>
                  <text x="292" y="596">1.3.6.1.5.5.7.14.2</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">0E</text>
                  <text x="444" y="612">02</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="232" y="628">RFC</text>
                  <text x="268" y="628">3779</text>
                  <text x="56" y="660">8</text>
                  <text x="104" y="660">Name:</text>
                  <text x="252" y="660">Resource</text>
                  <text x="304" y="660">PKI</text>
                  <text x="348" y="660">(RPKI)</text>
                  <text x="432" y="660">(Alternative)</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="316" y="676">id-cp-ipAddr-asNumber-v2</text>
                  <text x="100" y="692">OID:</text>
                  <text x="292" y="692">1.3.6.1.5.5.7.14.3</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">0E</text>
                  <text x="444" y="708">03</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">8360</text>
                  <text x="52" y="756">10</text>
                  <text x="104" y="756">Name:</text>
                  <text x="244" y="756">Remote</text>
                  <text x="288" y="756">SIM</text>
                  <text x="356" y="756">Provisioning</text>
                  <text x="428" y="756">Role</text>
                  <text x="264" y="772">Certificate</text>
                  <text x="340" y="772">Issuer</text>
                  <text x="132" y="788">Identifiers:</text>
                  <text x="272" y="788">id-rspRole-ci</text>
                  <text x="100" y="804">OID:</text>
                  <text x="284" y="804">2.23.146.1.2.1.0</text>
                  <text x="100" y="820">DER:</text>
                  <text x="228" y="820">06</text>
                  <text x="252" y="820">07</text>
                  <text x="276" y="820">67</text>
                  <text x="300" y="820">81</text>
                  <text x="324" y="820">12</text>
                  <text x="348" y="820">01</text>
                  <text x="372" y="820">02</text>
                  <text x="396" y="820">01</text>
                  <text x="420" y="820">00</text>
                  <text x="120" y="836">Comments:</text>
                  <text x="52" y="868">11</text>
                  <text x="104" y="868">Name:</text>
                  <text x="244" y="868">Remote</text>
                  <text x="288" y="868">SIM</text>
                  <text x="356" y="868">Provisioning</text>
                  <text x="428" y="868">Role</text>
                  <text x="240" y="884">eUICC</text>
                  <text x="132" y="900">Identifiers:</text>
                  <text x="284" y="900">id-rspRole-euicc</text>
                  <text x="100" y="916">OID:</text>
                  <text x="284" y="916">2.23.146.1.2.1.1</text>
                  <text x="100" y="932">DER:</text>
                  <text x="228" y="932">06</text>
                  <text x="252" y="932">07</text>
                  <text x="276" y="932">67</text>
                  <text x="300" y="932">81</text>
                  <text x="324" y="932">12</text>
                  <text x="348" y="932">01</text>
                  <text x="372" y="932">02</text>
                  <text x="396" y="932">01</text>
                  <text x="420" y="932">01</text>
                  <text x="120" y="948">Comments:</text>
                  <text x="52" y="980">12</text>
                  <text x="104" y="980">Name:</text>
                  <text x="244" y="980">Remote</text>
                  <text x="288" y="980">SIM</text>
                  <text x="356" y="980">Provisioning</text>
                  <text x="428" y="980">Role</text>
                  <text x="240" y="996">eUICC</text>
                  <text x="316" y="996">Manufacturer</text>
                  <text x="132" y="1012">Identifiers:</text>
                  <text x="276" y="1012">id-rspRole-eum</text>
                  <text x="100" y="1028">OID:</text>
                  <text x="284" y="1028">2.23.146.1.2.1.2</text>
                  <text x="100" y="1044">DER:</text>
                  <text x="228" y="1044">06</text>
                  <text x="252" y="1044">07</text>
                  <text x="276" y="1044">67</text>
                  <text x="300" y="1044">81</text>
                  <text x="324" y="1044">12</text>
                  <text x="348" y="1044">01</text>
                  <text x="372" y="1044">02</text>
                  <text x="396" y="1044">01</text>
                  <text x="420" y="1044">02</text>
                  <text x="120" y="1060">Comments:</text>
                  <text x="52" y="1092">13</text>
                  <text x="104" y="1092">Name:</text>
                  <text x="244" y="1092">Remote</text>
                  <text x="288" y="1092">SIM</text>
                  <text x="356" y="1092">Provisioning</text>
                  <text x="428" y="1092">Role</text>
                  <text x="244" y="1108">SM-DP+</text>
                  <text x="288" y="1108">TLS</text>
                  <text x="132" y="1124">Identifiers:</text>
                  <text x="288" y="1124">id-rspRole-dp-tls</text>
                  <text x="100" y="1140">OID:</text>
                  <text x="284" y="1140">2.23.146.1.2.1.3</text>
                  <text x="100" y="1156">DER:</text>
                  <text x="228" y="1156">06</text>
                  <text x="252" y="1156">07</text>
                  <text x="276" y="1156">67</text>
                  <text x="300" y="1156">81</text>
                  <text x="324" y="1156">12</text>
                  <text x="348" y="1156">01</text>
                  <text x="372" y="1156">02</text>
                  <text x="396" y="1156">01</text>
                  <text x="420" y="1156">03</text>
                  <text x="120" y="1172">Comments:</text>
                  <text x="52" y="1204">14</text>
                  <text x="104" y="1204">Name:</text>
                  <text x="244" y="1204">Remote</text>
                  <text x="288" y="1204">SIM</text>
                  <text x="356" y="1204">Provisioning</text>
                  <text x="428" y="1204">Role</text>
                  <text x="244" y="1220">SM-DP+</text>
                  <text x="332" y="1220">Authentication</text>
                  <text x="132" y="1236">Identifiers:</text>
                  <text x="292" y="1236">id-rspRole-dp-auth</text>
                  <text x="100" y="1252">OID:</text>
                  <text x="284" y="1252">2.23.146.1.2.1.4</text>
                  <text x="100" y="1268">DER:</text>
                  <text x="228" y="1268">06</text>
                  <text x="252" y="1268">07</text>
                  <text x="276" y="1268">67</text>
                  <text x="300" y="1268">81</text>
                  <text x="324" y="1268">12</text>
                  <text x="348" y="1268">01</text>
                  <text x="372" y="1268">02</text>
                  <text x="396" y="1268">01</text>
                  <text x="420" y="1268">04</text>
                  <text x="120" y="1284">Comments:</text>
                  <text x="52" y="1316">15</text>
                  <text x="104" y="1316">Name:</text>
                  <text x="244" y="1316">Remote</text>
                  <text x="288" y="1316">SIM</text>
                  <text x="356" y="1316">Provisioning</text>
                  <text x="428" y="1316">Role</text>
                  <text x="244" y="1332">SM-DP+</text>
                  <text x="304" y="1332">Profile</text>
                  <text x="368" y="1332">Binding</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="284" y="1348">id-rspRole-dp-pb</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="284" y="1364">2.23.146.1.2.1.5</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">07</text>
                  <text x="276" y="1380">67</text>
                  <text x="300" y="1380">81</text>
                  <text x="324" y="1380">12</text>
                  <text x="348" y="1380">01</text>
                  <text x="372" y="1380">02</text>
                  <text x="396" y="1380">01</text>
                  <text x="420" y="1380">05</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="52" y="1428">16</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="244" y="1428">Remote</text>
                  <text x="288" y="1428">SIM</text>
                  <text x="356" y="1428">Provisioning</text>
                  <text x="428" y="1428">Role</text>
                  <text x="240" y="1444">SM-DS</text>
                  <text x="280" y="1444">TLS</text>
                  <text x="132" y="1460">Identifiers:</text>
                  <text x="288" y="1460">id-rspRole-ds-tls</text>
                  <text x="100" y="1476">OID:</text>
                  <text x="284" y="1476">2.23.146.1.2.1.6</text>
                  <text x="100" y="1492">DER:</text>
                  <text x="228" y="1492">06</text>
                  <text x="252" y="1492">07</text>
                  <text x="276" y="1492">67</text>
                  <text x="300" y="1492">81</text>
                  <text x="324" y="1492">12</text>
                  <text x="348" y="1492">01</text>
                  <text x="372" y="1492">02</text>
                  <text x="396" y="1492">01</text>
                  <text x="420" y="1492">06</text>
                  <text x="120" y="1508">Comments:</text>
                  <text x="52" y="1540">17</text>
                  <text x="104" y="1540">Name:</text>
                  <text x="244" y="1540">Remote</text>
                  <text x="288" y="1540">SIM</text>
                  <text x="356" y="1540">Provisioning</text>
                  <text x="428" y="1540">Role</text>
                  <text x="240" y="1556">SM-DS</text>
                  <text x="324" y="1556">Authentication</text>
                  <text x="132" y="1572">Identifiers:</text>
                  <text x="292" y="1572">id-rspRole-ds-auth</text>
                  <text x="100" y="1588">OID:</text>
                  <text x="284" y="1588">2.23.146.1.2.1.7</text>
                  <text x="100" y="1604">DER:</text>
                  <text x="228" y="1604">06</text>
                  <text x="252" y="1604">07</text>
                  <text x="276" y="1604">67</text>
                  <text x="300" y="1604">81</text>
                  <text x="324" y="1604">12</text>
                  <text x="348" y="1604">01</text>
                  <text x="372" y="1604">02</text>
                  <text x="396" y="1604">01</text>
                  <text x="420" y="1604">07</text>
                  <text x="120" y="1620">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:        RFC 3779                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:        RFC 8360                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    15 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    16 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    17 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,256" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Certificate</text>
                  <text x="204" y="52">Policy</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="272" y="84">Certification</text>
                  <text x="364" y="84">Practice</text>
                  <text x="440" y="84">Statement</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="260" y="100">id-qt-cps,</text>
                  <text x="320" y="100">cps</text>
                  <text x="100" y="116">OID:</text>
                  <text x="288" y="116">1.3.6.1.5.5.7.2.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">02</text>
                  <text x="444" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="236" y="180">User</text>
                  <text x="284" y="180">Notice</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="276" y="196">id-qt-unotice,</text>
                  <text x="368" y="196">unotice</text>
                  <text x="100" y="212">OID:</text>
                  <text x="288" y="212">1.3.6.1.5.5.7.2.2</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">02</text>
                  <text x="444" y="228">02</text>
                  <text x="120" y="244">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="560" viewBox="0 0 560 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,736" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,736" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Information</text>
                  <text x="204" y="52">Access</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="236" y="84">OCSP</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="264" y="100">id-ad-ocsp,</text>
                  <text x="364" y="100">id-pkix-ocsp</text>
                  <text x="100" y="116">OID:</text>
                  <text x="292" y="116">1.3.6.1.5.5.7.48.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">30</text>
                  <text x="444" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="56" y="180">2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="228" y="180">CA</text>
                  <text x="272" y="180">Issuers</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">id-ad-caIssuers,</text>
                  <text x="392" y="196">caIssuers</text>
                  <text x="100" y="212">OID:</text>
                  <text x="292" y="212">1.3.6.1.5.5.7.48.2</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">30</text>
                  <text x="444" y="228">02</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="56" y="276">3</text>
                  <text x="104" y="276">Name:</text>
                  <text x="236" y="276">Time</text>
                  <text x="292" y="276">Stamping</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="296" y="292">id-ad-timeStamping,</text>
                  <text x="428" y="292">timeStamping</text>
                  <text x="100" y="308">OID:</text>
                  <text x="292" y="308">1.3.6.1.5.5.7.48.3</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">30</text>
                  <text x="444" y="324">03</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="56" y="372">5</text>
                  <text x="104" y="372">Name:</text>
                  <text x="228" y="372">CA</text>
                  <text x="284" y="372">Repository</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="292" y="388">id-ad-caRepository</text>
                  <text x="100" y="404">OID:</text>
                  <text x="292" y="404">1.3.6.1.5.5.7.48.5</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">08</text>
                  <text x="276" y="420">2B</text>
                  <text x="300" y="420">06</text>
                  <text x="324" y="420">01</text>
                  <text x="348" y="420">05</text>
                  <text x="372" y="420">05</text>
                  <text x="396" y="420">07</text>
                  <text x="420" y="420">30</text>
                  <text x="444" y="420">05</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="52" y="468">10</text>
                  <text x="104" y="468">Name:</text>
                  <text x="236" y="468">RPKI</text>
                  <text x="292" y="468">Manifest</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="292" y="484">id-ad-rpkiManifest</text>
                  <text x="100" y="500">OID:</text>
                  <text x="296" y="500">1.3.6.1.5.5.7.48.10</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">08</text>
                  <text x="276" y="516">2B</text>
                  <text x="300" y="516">06</text>
                  <text x="324" y="516">01</text>
                  <text x="348" y="516">05</text>
                  <text x="372" y="516">05</text>
                  <text x="396" y="516">07</text>
                  <text x="420" y="516">30</text>
                  <text x="444" y="516">0A</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="232" y="532">RFC</text>
                  <text x="268" y="532">6487</text>
                  <text x="52" y="564">11</text>
                  <text x="104" y="564">Name:</text>
                  <text x="244" y="564">Signed</text>
                  <text x="300" y="564">Object</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="292" y="580">id-ad-signedObject</text>
                  <text x="100" y="596">OID:</text>
                  <text x="296" y="596">1.3.6.1.5.5.7.48.11</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">30</text>
                  <text x="444" y="612">0B</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="232" y="628">RFC</text>
                  <text x="268" y="628">6487</text>
                  <text x="52" y="660">13</text>
                  <text x="104" y="660">Name:</text>
                  <text x="236" y="660">RPKI</text>
                  <text x="284" y="660">Notify</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="284" y="676">id-ad-rpkiNotify</text>
                  <text x="100" y="692">OID:</text>
                  <text x="296" y="692">1.3.6.1.5.5.7.48.13</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">30</text>
                  <text x="444" y="708">0D</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">8182</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1712" width="544" viewBox="0 0 544 1712" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1696" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1696" fill="none" stroke="black"/>
                <path d="M 536,32 L 536,1696" fill="none" stroke="black"/>
                <path d="M 8,32 L 536,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 536,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 536,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 536,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 536,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 536,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 536,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 536,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 536,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 536,736" fill="none" stroke="black"/>
                <path d="M 8,832 L 536,832" fill="none" stroke="black"/>
                <path d="M 8,928 L 536,928" fill="none" stroke="black"/>
                <path d="M 8,1024 L 536,1024" fill="none" stroke="black"/>
                <path d="M 8,1120 L 536,1120" fill="none" stroke="black"/>
                <path d="M 8,1216 L 536,1216" fill="none" stroke="black"/>
                <path d="M 8,1312 L 536,1312" fill="none" stroke="black"/>
                <path d="M 8,1408 L 536,1408" fill="none" stroke="black"/>
                <path d="M 8,1504 L 536,1504" fill="none" stroke="black"/>
                <path d="M 8,1600 L 536,1600" fill="none" stroke="black"/>
                <path d="M 8,1696 L 536,1696" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="116" y="52">Extended</text>
                  <text x="168" y="52">Key</text>
                  <text x="208" y="52">Usage</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="232" y="84">Any</text>
                  <text x="284" y="84">Extended</text>
                  <text x="336" y="84">Key</text>
                  <text x="376" y="84">Usage</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="296" y="100">anyExtendedKeyUsage</text>
                  <text x="100" y="116">OID:</text>
                  <text x="264" y="116">2.5.29.37.0</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">04</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">25</text>
                  <text x="348" y="132">00</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">5280</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="232" y="180">TLS</text>
                  <text x="276" y="180">Server</text>
                  <text x="364" y="180">authentication</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">id-kp-serverAuth</text>
                  <text x="100" y="212">OID:</text>
                  <text x="288" y="212">1.3.6.1.5.5.7.3.1</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">03</text>
                  <text x="444" y="228">01</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="232" y="244">RFC</text>
                  <text x="268" y="244">5280</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="232" y="276">TLS</text>
                  <text x="276" y="276">Client</text>
                  <text x="364" y="276">Authentication</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="284" y="292">id-kp-clientAuth</text>
                  <text x="100" y="308">OID:</text>
                  <text x="288" y="308">1.3.6.1.5.5.7.3.2</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">03</text>
                  <text x="444" y="324">02</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="232" y="340">RFC</text>
                  <text x="268" y="340">5280</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="236" y="372">Code</text>
                  <text x="288" y="372">Signing</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="288" y="388">id-kp-codeSigning</text>
                  <text x="100" y="404">OID:</text>
                  <text x="288" y="404">1.3.6.1.5.5.7.3.3</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">08</text>
                  <text x="276" y="420">2B</text>
                  <text x="300" y="420">06</text>
                  <text x="324" y="420">01</text>
                  <text x="348" y="420">05</text>
                  <text x="372" y="420">05</text>
                  <text x="396" y="420">07</text>
                  <text x="420" y="420">03</text>
                  <text x="444" y="420">03</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="232" y="436">RFC</text>
                  <text x="268" y="436">5280</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="240" y="468">Email</text>
                  <text x="308" y="468">protection</text>
                  <text x="388" y="468">(S/MIME)</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="304" y="484">id-kp-emailProtection</text>
                  <text x="100" y="500">OID:</text>
                  <text x="288" y="500">1.3.6.1.5.5.7.3.4</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">08</text>
                  <text x="276" y="516">2B</text>
                  <text x="300" y="516">06</text>
                  <text x="324" y="516">01</text>
                  <text x="348" y="516">05</text>
                  <text x="372" y="516">05</text>
                  <text x="396" y="516">07</text>
                  <text x="420" y="516">03</text>
                  <text x="444" y="516">04</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="232" y="532">RFC</text>
                  <text x="268" y="532">5280</text>
                  <text x="56" y="564">8</text>
                  <text x="104" y="564">Name:</text>
                  <text x="236" y="564">Time</text>
                  <text x="292" y="564">Stamping</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="296" y="580">id-kp-timeStamping,</text>
                  <text x="428" y="580">timestamping</text>
                  <text x="100" y="596">OID:</text>
                  <text x="288" y="596">1.3.6.1.5.5.7.3.8</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">03</text>
                  <text x="444" y="612">08</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="56" y="660">9</text>
                  <text x="104" y="660">Name:</text>
                  <text x="236" y="660">OCSP</text>
                  <text x="288" y="660">Signing</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="288" y="676">id-kp-OCSPSigning</text>
                  <text x="100" y="692">OID:</text>
                  <text x="288" y="692">1.3.6.1.5.5.7.3.9</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">03</text>
                  <text x="444" y="708">09</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">5280</text>
                  <text x="52" y="756">10</text>
                  <text x="104" y="756">Name:</text>
                  <text x="252" y="756">Kerberos</text>
                  <text x="316" y="756">PKINIT</text>
                  <text x="372" y="756">Client</text>
                  <text x="420" y="756">Auth</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="308" y="772">id-pkinit-KPClientAuth</text>
                  <text x="100" y="788">OID:</text>
                  <text x="280" y="788">1.3.6.1.5.2.3.4</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">07</text>
                  <text x="276" y="804">2B</text>
                  <text x="300" y="804">06</text>
                  <text x="324" y="804">01</text>
                  <text x="348" y="804">05</text>
                  <text x="372" y="804">02</text>
                  <text x="396" y="804">03</text>
                  <text x="420" y="804">04</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="232" y="820">RFC</text>
                  <text x="268" y="820">4556</text>
                  <text x="52" y="852">11</text>
                  <text x="104" y="852">Name:</text>
                  <text x="252" y="852">Kerberos</text>
                  <text x="316" y="852">PKINIT</text>
                  <text x="360" y="852">KDC</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="280" y="868">id-pkinit-KPKdc</text>
                  <text x="100" y="884">OID:</text>
                  <text x="280" y="884">1.3.6.1.5.2.3.5</text>
                  <text x="100" y="900">DER:</text>
                  <text x="228" y="900">06</text>
                  <text x="252" y="900">07</text>
                  <text x="276" y="900">2B</text>
                  <text x="300" y="900">06</text>
                  <text x="324" y="900">01</text>
                  <text x="348" y="900">05</text>
                  <text x="372" y="900">02</text>
                  <text x="396" y="900">03</text>
                  <text x="420" y="900">05</text>
                  <text x="120" y="916">Comments:</text>
                  <text x="232" y="916">RFC</text>
                  <text x="268" y="916">4556</text>
                  <text x="52" y="948">12</text>
                  <text x="104" y="948">Name:</text>
                  <text x="232" y="948">SSH</text>
                  <text x="276" y="948">Client</text>
                  <text x="132" y="964">Identifiers:</text>
                  <text x="312" y="964">id-kp-secureShellClient</text>
                  <text x="100" y="980">OID:</text>
                  <text x="292" y="980">1.3.6.1.5.5.7.3.21</text>
                  <text x="100" y="996">DER:</text>
                  <text x="228" y="996">06</text>
                  <text x="252" y="996">08</text>
                  <text x="276" y="996">2B</text>
                  <text x="300" y="996">06</text>
                  <text x="324" y="996">01</text>
                  <text x="348" y="996">05</text>
                  <text x="372" y="996">05</text>
                  <text x="396" y="996">07</text>
                  <text x="420" y="996">03</text>
                  <text x="444" y="996">15</text>
                  <text x="120" y="1012">Comments:</text>
                  <text x="232" y="1012">RFC</text>
                  <text x="268" y="1012">6187</text>
                  <text x="52" y="1044">13</text>
                  <text x="104" y="1044">Name:</text>
                  <text x="232" y="1044">SSH</text>
                  <text x="276" y="1044">Server</text>
                  <text x="132" y="1060">Identifiers:</text>
                  <text x="312" y="1060">id-kp-secureShellServer</text>
                  <text x="100" y="1076">OID:</text>
                  <text x="292" y="1076">1.3.6.1.5.5.7.3.22</text>
                  <text x="100" y="1092">DER:</text>
                  <text x="228" y="1092">06</text>
                  <text x="252" y="1092">08</text>
                  <text x="276" y="1092">2B</text>
                  <text x="300" y="1092">06</text>
                  <text x="324" y="1092">01</text>
                  <text x="348" y="1092">05</text>
                  <text x="372" y="1092">05</text>
                  <text x="396" y="1092">07</text>
                  <text x="420" y="1092">03</text>
                  <text x="444" y="1092">16</text>
                  <text x="120" y="1108">Comments:</text>
                  <text x="232" y="1108">RFC</text>
                  <text x="268" y="1108">6187</text>
                  <text x="52" y="1140">14</text>
                  <text x="104" y="1140">Name:</text>
                  <text x="244" y="1140">Bundle</text>
                  <text x="308" y="1140">Security</text>
                  <text x="132" y="1156">Identifiers:</text>
                  <text x="300" y="1156">id-kp-bundleSecurity</text>
                  <text x="100" y="1172">OID:</text>
                  <text x="292" y="1172">1.3.6.1.5.5.7.3.35</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="228" y="1188">06</text>
                  <text x="252" y="1188">08</text>
                  <text x="276" y="1188">2B</text>
                  <text x="300" y="1188">06</text>
                  <text x="324" y="1188">01</text>
                  <text x="348" y="1188">05</text>
                  <text x="372" y="1188">05</text>
                  <text x="396" y="1188">07</text>
                  <text x="420" y="1188">03</text>
                  <text x="444" y="1188">23</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="232" y="1204">RFC</text>
                  <text x="268" y="1204">9174</text>
                  <text x="52" y="1236">15</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="232" y="1236">CMC</text>
                  <text x="304" y="1236">Certification</text>
                  <text x="400" y="1236">Authority</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="264" y="1252">id-kp-cmcCA</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="292" y="1268">1.3.6.1.5.5.7.3.27</text>
                  <text x="100" y="1284">DER:</text>
                  <text x="228" y="1284">06</text>
                  <text x="252" y="1284">08</text>
                  <text x="276" y="1284">2B</text>
                  <text x="300" y="1284">06</text>
                  <text x="324" y="1284">01</text>
                  <text x="348" y="1284">05</text>
                  <text x="372" y="1284">05</text>
                  <text x="396" y="1284">07</text>
                  <text x="420" y="1284">03</text>
                  <text x="444" y="1284">1B</text>
                  <text x="120" y="1300">Comments:</text>
                  <text x="232" y="1300">RFC</text>
                  <text x="268" y="1300">6402</text>
                  <text x="52" y="1332">16</text>
                  <text x="104" y="1332">Name:</text>
                  <text x="232" y="1332">CMC</text>
                  <text x="300" y="1332">Registration</text>
                  <text x="392" y="1332">Authority</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="264" y="1348">id-kp-cmcRA</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="292" y="1364">1.3.6.1.5.5.7.3.28</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">08</text>
                  <text x="276" y="1380">2B</text>
                  <text x="300" y="1380">06</text>
                  <text x="324" y="1380">01</text>
                  <text x="348" y="1380">05</text>
                  <text x="372" y="1380">05</text>
                  <text x="396" y="1380">07</text>
                  <text x="420" y="1380">03</text>
                  <text x="444" y="1380">1C</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="232" y="1396">RFC</text>
                  <text x="268" y="1396">6402</text>
                  <text x="52" y="1428">17</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="232" y="1428">CMC</text>
                  <text x="280" y="1428">Archive</text>
                  <text x="340" y="1428">Server</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="284" y="1444">id-kp-cmcArchive</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="292" y="1460">1.3.6.1.5.5.7.3.29</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">08</text>
                  <text x="276" y="1476">2B</text>
                  <text x="300" y="1476">06</text>
                  <text x="324" y="1476">01</text>
                  <text x="348" y="1476">05</text>
                  <text x="372" y="1476">05</text>
                  <text x="396" y="1476">07</text>
                  <text x="420" y="1476">03</text>
                  <text x="444" y="1476">1D</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="232" y="1492">RFC</text>
                  <text x="268" y="1492">6402</text>
                  <text x="52" y="1524">18</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="232" y="1524">CMC</text>
                  <text x="264" y="1524">Key</text>
                  <text x="324" y="1524">Generation</text>
                  <text x="408" y="1524">Authority</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="264" y="1540">id-kp-cmKGA</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="292" y="1556">1.3.6.1.5.5.7.3.32</text>
                  <text x="100" y="1572">DER:</text>
                  <text x="228" y="1572">06</text>
                  <text x="252" y="1572">08</text>
                  <text x="276" y="1572">2B</text>
                  <text x="300" y="1572">06</text>
                  <text x="324" y="1572">01</text>
                  <text x="348" y="1572">05</text>
                  <text x="372" y="1572">05</text>
                  <text x="396" y="1572">07</text>
                  <text x="420" y="1572">03</text>
                  <text x="444" y="1572">20</text>
                  <text x="120" y="1588">Comments:</text>
                  <text x="232" y="1588">RFC</text>
                  <text x="268" y="1588">9480</text>
                  <text x="52" y="1620">19</text>
                  <text x="104" y="1620">Name:</text>
                  <text x="264" y="1620">Certificate</text>
                  <text x="364" y="1620">Transparency</text>
                  <text x="132" y="1636">Identifiers:</text>
                  <text x="100" y="1652">OID:</text>
                  <text x="312" y="1652">1.3.6.1.4.1.11129.2.4.4</text>
                  <text x="100" y="1668">DER:</text>
                  <text x="228" y="1668">06</text>
                  <text x="252" y="1668">0A</text>
                  <text x="276" y="1668">2B</text>
                  <text x="300" y="1668">06</text>
                  <text x="324" y="1668">01</text>
                  <text x="348" y="1668">04</text>
                  <text x="372" y="1668">01</text>
                  <text x="396" y="1668">D6</text>
                  <text x="420" y="1668">79</text>
                  <text x="444" y="1668">02</text>
                  <text x="468" y="1668">04</text>
                  <text x="492" y="1668">04</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="232" y="1684">RFC</text>
                  <text x="268" y="1684">6962</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
|    15 | Name:            CMC Certification Authority            |
|       | Identifiers:     id-kp-cmcCA                            |
|       | OID:             1.3.6.1.5.5.7.3.27                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1B          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    16 | Name:            CMC Registration Authority             |
|       | Identifiers:     id-kp-cmcRA                            |
|       | OID:             1.3.6.1.5.5.7.3.28                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1C          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    17 | Name:            CMC Archive Server                     |
|       | Identifiers:     id-kp-cmcArchive                       |
|       | OID:             1.3.6.1.5.5.7.3.29                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1D          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    18 | Name:            CMC Key Generation Authority           |
|       | Identifiers:     id-kp-cmKGA                            |
|       | OID:             1.3.6.1.5.5.7.3.32                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 20          |
|       | Comments:        RFC 9480                               |
+-------+---------------------------------------------------------+
|    19 | Name:            Certificate Transparency               |
|       | Identifiers:                                            |
|       | OID:             1.3.6.1.4.1.11129.2.4.4                |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 04    |
|       | Comments:        RFC 6962                               |
+-------+---------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Comments, GeneralNameValue, and Reference, where Value is an integer, and the other columns are text strings. The fields Name and GeneralNameValue are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="816" width="560" viewBox="0 0 560 816" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,800" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,800" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,800" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,416 L 552,416" fill="none" stroke="black"/>
                <path d="M 8,480 L 552,480" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,608 L 552,608" fill="none" stroke="black"/>
                <path d="M 8,672 L 552,672" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,800 L 552,800" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="112" y="52">General</text>
                  <text x="168" y="52">Names</text>
                  <text x="52" y="84">-3</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">otherName</text>
                  <text x="316" y="84">with</text>
                  <text x="380" y="84">MACAddress</text>
                  <text x="120" y="100">Comments:</text>
                  <text x="284" y="100">id-on-MACAddress</text>
                  <text x="248" y="116">(TBD90)</text>
                  <text x="240" y="132">TBD91</text>
                  <text x="108" y="148">Value:</text>
                  <text x="240" y="148">bytes</text>
                  <text x="52" y="180">-2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="256" y="180">otherName</text>
                  <text x="316" y="180">with</text>
                  <text x="400" y="180">SmtpUTF8Mailbox</text>
                  <text x="120" y="196">Comments:</text>
                  <text x="304" y="196">id-on-SmtpUTF8Mailbox</text>
                  <text x="296" y="212">(1.3.6.1.5.5.7.8.9)</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">08</text>
                  <text x="444" y="228">09</text>
                  <text x="152" y="244">GeneralNameValue:</text>
                  <text x="252" y="244">text</text>
                  <text x="52" y="276">-1</text>
                  <text x="104" y="276">Name:</text>
                  <text x="256" y="276">otherName</text>
                  <text x="316" y="276">with</text>
                  <text x="412" y="276">hardwareModuleName</text>
                  <text x="120" y="292">Comments:</text>
                  <text x="316" y="292">id-on-hardwareModuleName</text>
                  <text x="296" y="308">(1.3.6.1.5.5.7.8.4)</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">08</text>
                  <text x="444" y="324">04</text>
                  <text x="152" y="340">GeneralNameValue:</text>
                  <text x="240" y="340">[</text>
                  <text x="272" y="340">~oid,</text>
                  <text x="320" y="340">bytes</text>
                  <text x="352" y="340">]</text>
                  <text x="56" y="372">0</text>
                  <text x="104" y="372">Name:</text>
                  <text x="256" y="372">otherName</text>
                  <text x="120" y="388">Comments:</text>
                  <text x="152" y="404">GeneralNameValue:</text>
                  <text x="240" y="404">[</text>
                  <text x="272" y="404">~oid,</text>
                  <text x="320" y="404">bytes</text>
                  <text x="352" y="404">]</text>
                  <text x="56" y="436">1</text>
                  <text x="104" y="436">Name:</text>
                  <text x="260" y="436">rfc822Name</text>
                  <text x="120" y="452">Comments:</text>
                  <text x="152" y="468">GeneralNameValue:</text>
                  <text x="252" y="468">text</text>
                  <text x="56" y="500">2</text>
                  <text x="104" y="500">Name:</text>
                  <text x="248" y="500">dNSName</text>
                  <text x="120" y="516">Comments:</text>
                  <text x="152" y="532">GeneralNameValue:</text>
                  <text x="252" y="532">text</text>
                  <text x="56" y="564">4</text>
                  <text x="104" y="564">Name:</text>
                  <text x="272" y="564">directoryName</text>
                  <text x="120" y="580">Comments:</text>
                  <text x="152" y="596">GeneralNameValue:</text>
                  <text x="252" y="596">Name</text>
                  <text x="56" y="628">6</text>
                  <text x="104" y="628">Name:</text>
                  <text x="320" y="628">uniformResourceIdentifier</text>
                  <text x="120" y="644">Comments:</text>
                  <text x="152" y="660">GeneralNameValue:</text>
                  <text x="252" y="660">text</text>
                  <text x="56" y="692">7</text>
                  <text x="104" y="692">Name:</text>
                  <text x="256" y="692">iPAddress</text>
                  <text x="120" y="708">Comments:</text>
                  <text x="152" y="724">GeneralNameValue:</text>
                  <text x="256" y="724">bytes</text>
                  <text x="56" y="756">8</text>
                  <text x="104" y="756">Name:</text>
                  <text x="268" y="756">registeredID</text>
                  <text x="120" y="772">Comments:</text>
                  <text x="152" y="788">GeneralNameValue:</text>
                  <text x="252" y="788">~oid</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -3 | Name:            otherName with MACAddress                |
|       | Comments:        id-on-MACAddress                         |
|       |                  (TBD90)                                  |
|       |                  TBD91                                    |
|       | Value:           bytes                                    |
+-------+-----------------------------------------------------------+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | GeneralNameValue:  text                                   |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        id-on-hardwareModuleName                 |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | GeneralNameValue:  [ ~oid, bytes ]                        |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:                                                 |
|       | GeneralNameValue:  [ ~oid, bytes ]                        |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:                                                 |
|       | GeneralNameValue:  text                                   |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:                                                 |
|       | GeneralNameValue:  text                                   |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:                                                 |
|       | GeneralNameValue:  Name                                   |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:                                                 |
|       | GeneralNameValue:  text                                   |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:                                                 |
|       | GeneralNameValue:  bytes                                  |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments:                                                 |
|       | GeneralNameValue:  ~oid                                   |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. Alignment with the value of public key algorithm <bcp14>MUST</bcp14> be considered, see instruction in <xref target="pkalg"/>. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <!-- NOTE: Check referenced section number hardcoded in the table. -->

<figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2864" width="560" viewBox="0 0 560 2864" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2848" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2848" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2848" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,208 L 552,208" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,432 L 552,432" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,656 L 552,656" fill="none" stroke="black"/>
                <path d="M 8,768 L 552,768" fill="none" stroke="black"/>
                <path d="M 8,880 L 552,880" fill="none" stroke="black"/>
                <path d="M 8,992 L 552,992" fill="none" stroke="black"/>
                <path d="M 8,1104 L 552,1104" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1360 L 552,1360" fill="none" stroke="black"/>
                <path d="M 8,1504 L 552,1504" fill="none" stroke="black"/>
                <path d="M 8,1648 L 552,1648" fill="none" stroke="black"/>
                <path d="M 8,1760 L 552,1760" fill="none" stroke="black"/>
                <path d="M 8,1872 L 552,1872" fill="none" stroke="black"/>
                <path d="M 8,1984 L 552,1984" fill="none" stroke="black"/>
                <path d="M 8,2160 L 552,2160" fill="none" stroke="black"/>
                <path d="M 8,2336 L 552,2336" fill="none" stroke="black"/>
                <path d="M 8,2512 L 552,2512" fill="none" stroke="black"/>
                <path d="M 8,2624 L 552,2624" fill="none" stroke="black"/>
                <path d="M 8,2736 L 552,2736" fill="none" stroke="black"/>
                <path d="M 8,2848 L 552,2848" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="104" y="52">X.509</text>
                  <text x="168" y="52">Signature</text>
                  <text x="252" y="52">Algorithms</text>
                  <text x="44" y="84">-256</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="84">with</text>
                  <text x="392" y="84">SHA-1</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="284" y="100">sha1-with-rsa-signature,</text>
                  <text x="276" y="116">sha1WithRSAEncryption,</text>
                  <text x="276" y="132">sha-1WithRSAEncryption</text>
                  <text x="100" y="148">OID:</text>
                  <text x="268" y="148">1.2.840.113549.1.1.5</text>
                  <text x="128" y="164">Parameters:</text>
                  <text x="204" y="164">NULL</text>
                  <text x="100" y="180">DER:</text>
                  <text x="196" y="180">30</text>
                  <text x="220" y="180">0D</text>
                  <text x="244" y="180">06</text>
                  <text x="268" y="180">09</text>
                  <text x="292" y="180">2A</text>
                  <text x="316" y="180">86</text>
                  <text x="340" y="180">48</text>
                  <text x="364" y="180">86</text>
                  <text x="388" y="180">F7</text>
                  <text x="412" y="180">0D</text>
                  <text x="436" y="180">01</text>
                  <text x="460" y="180">01</text>
                  <text x="484" y="180">05</text>
                  <text x="508" y="180">05</text>
                  <text x="532" y="180">00</text>
                  <text x="120" y="196">Comments:</text>
                  <text x="208" y="196">Don't</text>
                  <text x="248" y="196">use</text>
                  <text x="44" y="228">-255</text>
                  <text x="104" y="228">Name:</text>
                  <text x="208" y="228">ECDSA</text>
                  <text x="252" y="228">with</text>
                  <text x="296" y="228">SHA-1</text>
                  <text x="132" y="244">Identifiers:</text>
                  <text x="248" y="244">ecdsa-with-SHA1</text>
                  <text x="100" y="260">OID:</text>
                  <text x="256" y="260">1.2.840.10045.4.1</text>
                  <text x="128" y="276">Parameters:</text>
                  <text x="212" y="276">Absent</text>
                  <text x="100" y="292">DER:</text>
                  <text x="196" y="292">30</text>
                  <text x="220" y="292">09</text>
                  <text x="244" y="292">06</text>
                  <text x="268" y="292">07</text>
                  <text x="292" y="292">2A</text>
                  <text x="316" y="292">86</text>
                  <text x="340" y="292">48</text>
                  <text x="364" y="292">CE</text>
                  <text x="388" y="292">3D</text>
                  <text x="412" y="292">04</text>
                  <text x="436" y="292">01</text>
                  <text x="120" y="308">Comments:</text>
                  <text x="208" y="308">Don't</text>
                  <text x="252" y="308">use.</text>
                  <text x="288" y="308">See</text>
                  <text x="336" y="308">Section</text>
                  <text x="396" y="308">3.2.2.</text>
                  <text x="56" y="340">0</text>
                  <text x="104" y="340">Name:</text>
                  <text x="208" y="340">ECDSA</text>
                  <text x="252" y="340">with</text>
                  <text x="304" y="340">SHA-256</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="256" y="356">ecdsa-with-SHA256</text>
                  <text x="100" y="372">OID:</text>
                  <text x="264" y="372">1.2.840.10045.4.3.2</text>
                  <text x="128" y="388">Parameters:</text>
                  <text x="212" y="388">Absent</text>
                  <text x="100" y="404">DER:</text>
                  <text x="196" y="404">30</text>
                  <text x="220" y="404">0A</text>
                  <text x="244" y="404">06</text>
                  <text x="268" y="404">08</text>
                  <text x="292" y="404">2A</text>
                  <text x="316" y="404">86</text>
                  <text x="340" y="404">48</text>
                  <text x="364" y="404">CE</text>
                  <text x="388" y="404">3D</text>
                  <text x="412" y="404">04</text>
                  <text x="436" y="404">03</text>
                  <text x="460" y="404">02</text>
                  <text x="120" y="420">Comments:</text>
                  <text x="200" y="420">See</text>
                  <text x="248" y="420">Section</text>
                  <text x="308" y="420">3.2.2.</text>
                  <text x="56" y="452">1</text>
                  <text x="104" y="452">Name:</text>
                  <text x="208" y="452">ECDSA</text>
                  <text x="252" y="452">with</text>
                  <text x="304" y="452">SHA-384</text>
                  <text x="132" y="468">Identifiers:</text>
                  <text x="256" y="468">ecdsa-with-SHA384</text>
                  <text x="100" y="484">OID:</text>
                  <text x="264" y="484">1.2.840.10045.4.3.3</text>
                  <text x="128" y="500">Parameters:</text>
                  <text x="212" y="500">Absent</text>
                  <text x="100" y="516">DER:</text>
                  <text x="196" y="516">30</text>
                  <text x="220" y="516">0A</text>
                  <text x="244" y="516">06</text>
                  <text x="268" y="516">08</text>
                  <text x="292" y="516">2A</text>
                  <text x="316" y="516">86</text>
                  <text x="340" y="516">48</text>
                  <text x="364" y="516">CE</text>
                  <text x="388" y="516">3D</text>
                  <text x="412" y="516">04</text>
                  <text x="436" y="516">03</text>
                  <text x="460" y="516">03</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="200" y="532">See</text>
                  <text x="248" y="532">Section</text>
                  <text x="308" y="532">3.2.2.</text>
                  <text x="56" y="564">2</text>
                  <text x="104" y="564">Name:</text>
                  <text x="208" y="564">ECDSA</text>
                  <text x="252" y="564">with</text>
                  <text x="304" y="564">SHA-512</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="256" y="580">ecdsa-with-SHA512</text>
                  <text x="100" y="596">OID:</text>
                  <text x="264" y="596">1.2.840.10045.4.3.4</text>
                  <text x="128" y="612">Parameters:</text>
                  <text x="212" y="612">Absent</text>
                  <text x="100" y="628">DER:</text>
                  <text x="196" y="628">30</text>
                  <text x="220" y="628">0A</text>
                  <text x="244" y="628">06</text>
                  <text x="268" y="628">08</text>
                  <text x="292" y="628">2A</text>
                  <text x="316" y="628">86</text>
                  <text x="340" y="628">48</text>
                  <text x="364" y="628">CE</text>
                  <text x="388" y="628">3D</text>
                  <text x="412" y="628">04</text>
                  <text x="436" y="628">03</text>
                  <text x="460" y="628">04</text>
                  <text x="120" y="644">Comments:</text>
                  <text x="200" y="644">See</text>
                  <text x="248" y="644">Section</text>
                  <text x="308" y="644">3.2.2.</text>
                  <text x="56" y="676">3</text>
                  <text x="104" y="676">Name:</text>
                  <text x="208" y="676">ECDSA</text>
                  <text x="252" y="676">with</text>
                  <text x="308" y="676">SHAKE128</text>
                  <text x="132" y="692">Identifiers:</text>
                  <text x="276" y="692">id-ecdsa-with-shake128</text>
                  <text x="100" y="708">OID:</text>
                  <text x="260" y="708">1.3.6.1.5.5.7.6.32</text>
                  <text x="128" y="724">Parameters:</text>
                  <text x="212" y="724">Absent</text>
                  <text x="100" y="740">DER:</text>
                  <text x="196" y="740">30</text>
                  <text x="220" y="740">0A</text>
                  <text x="244" y="740">06</text>
                  <text x="268" y="740">08</text>
                  <text x="292" y="740">2B</text>
                  <text x="316" y="740">06</text>
                  <text x="340" y="740">01</text>
                  <text x="364" y="740">05</text>
                  <text x="388" y="740">05</text>
                  <text x="412" y="740">07</text>
                  <text x="436" y="740">06</text>
                  <text x="460" y="740">20</text>
                  <text x="120" y="756">Comments:</text>
                  <text x="200" y="756">See</text>
                  <text x="248" y="756">Section</text>
                  <text x="308" y="756">3.2.2.</text>
                  <text x="56" y="788">4</text>
                  <text x="104" y="788">Name:</text>
                  <text x="208" y="788">ECDSA</text>
                  <text x="252" y="788">with</text>
                  <text x="308" y="788">SHAKE256</text>
                  <text x="132" y="804">Identifiers:</text>
                  <text x="276" y="804">id-ecdsa-with-shake256</text>
                  <text x="100" y="820">OID:</text>
                  <text x="260" y="820">1.3.6.1.5.5.7.6.33</text>
                  <text x="128" y="836">Parameters:</text>
                  <text x="212" y="836">Absent</text>
                  <text x="100" y="852">DER:</text>
                  <text x="196" y="852">30</text>
                  <text x="220" y="852">0A</text>
                  <text x="244" y="852">06</text>
                  <text x="268" y="852">08</text>
                  <text x="292" y="852">2B</text>
                  <text x="316" y="852">06</text>
                  <text x="340" y="852">01</text>
                  <text x="364" y="852">05</text>
                  <text x="388" y="852">05</text>
                  <text x="412" y="852">07</text>
                  <text x="436" y="852">06</text>
                  <text x="460" y="852">21</text>
                  <text x="120" y="868">Comments:</text>
                  <text x="200" y="868">See</text>
                  <text x="248" y="868">Section</text>
                  <text x="308" y="868">3.2.2.</text>
                  <text x="56" y="900">5</text>
                  <text x="104" y="900">Name:</text>
                  <text x="220" y="900">Unsigned</text>
                  <text x="132" y="916">Identifiers:</text>
                  <text x="248" y="916">id-alg-unsigned</text>
                  <text x="100" y="932">OID:</text>
                  <text x="260" y="932">1.3.6.1.5.5.7.6.36</text>
                  <text x="128" y="948">Parameters:</text>
                  <text x="212" y="948">Absent</text>
                  <text x="100" y="964">DER:</text>
                  <text x="196" y="964">30</text>
                  <text x="220" y="964">0A</text>
                  <text x="244" y="964">06</text>
                  <text x="268" y="964">08</text>
                  <text x="292" y="964">2B</text>
                  <text x="316" y="964">06</text>
                  <text x="340" y="964">01</text>
                  <text x="364" y="964">05</text>
                  <text x="388" y="964">05</text>
                  <text x="412" y="964">07</text>
                  <text x="436" y="964">06</text>
                  <text x="460" y="964">24</text>
                  <text x="120" y="980">Comments:</text>
                  <text x="208" y="980">bytes</text>
                  <text x="244" y="980">of</text>
                  <text x="276" y="980">size</text>
                  <text x="304" y="980">0</text>
                  <text x="52" y="1012">12</text>
                  <text x="104" y="1012">Name:</text>
                  <text x="216" y="1012">Ed25519</text>
                  <text x="132" y="1028">Identifiers:</text>
                  <text x="232" y="1028">id-Ed25519,</text>
                  <text x="336" y="1028">id-EdDSA25519</text>
                  <text x="100" y="1044">OID:</text>
                  <text x="232" y="1044">1.3.101.112</text>
                  <text x="128" y="1060">Parameters:</text>
                  <text x="212" y="1060">Absent</text>
                  <text x="100" y="1076">DER:</text>
                  <text x="196" y="1076">30</text>
                  <text x="220" y="1076">05</text>
                  <text x="244" y="1076">06</text>
                  <text x="268" y="1076">03</text>
                  <text x="292" y="1076">2B</text>
                  <text x="316" y="1076">65</text>
                  <text x="340" y="1076">70</text>
                  <text x="120" y="1092">Comments:</text>
                  <text x="52" y="1124">13</text>
                  <text x="104" y="1124">Name:</text>
                  <text x="208" y="1124">Ed448</text>
                  <text x="132" y="1140">Identifiers:</text>
                  <text x="224" y="1140">id-Ed448,</text>
                  <text x="312" y="1140">id-EdDSA448</text>
                  <text x="100" y="1156">OID:</text>
                  <text x="232" y="1156">1.3.101.113</text>
                  <text x="128" y="1172">Parameters:</text>
                  <text x="212" y="1172">Absent</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="196" y="1188">30</text>
                  <text x="220" y="1188">05</text>
                  <text x="244" y="1188">06</text>
                  <text x="268" y="1188">03</text>
                  <text x="292" y="1188">2B</text>
                  <text x="316" y="1188">65</text>
                  <text x="340" y="1188">71</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="52" y="1236">14</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="200" y="1236">PoP</text>
                  <text x="236" y="1236">with</text>
                  <text x="288" y="1236">SHA-256</text>
                  <text x="336" y="1236">and</text>
                  <text x="400" y="1236">HMAC-SHA256</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="304" y="1252">sa-ecdhPop-sha256-hmac-sha256</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="260" y="1268">1.3.6.1.5.5.7.6.26</text>
                  <text x="128" y="1284">Parameters:</text>
                  <text x="212" y="1284">Absent</text>
                  <text x="100" y="1300">DER:</text>
                  <text x="196" y="1300">30</text>
                  <text x="220" y="1300">0A</text>
                  <text x="244" y="1300">06</text>
                  <text x="268" y="1300">08</text>
                  <text x="292" y="1300">2B</text>
                  <text x="316" y="1300">06</text>
                  <text x="340" y="1300">01</text>
                  <text x="364" y="1300">05</text>
                  <text x="388" y="1300">05</text>
                  <text x="412" y="1300">07</text>
                  <text x="436" y="1300">06</text>
                  <text x="460" y="1300">1A</text>
                  <text x="120" y="1316">Comments:</text>
                  <text x="264" y="1316">Proof-of-possession</text>
                  <text x="388" y="1316">algorithm,</text>
                  <text x="464" y="1316">indexed</text>
                  <text x="516" y="1316">with</text>
                  <text x="200" y="1332">KDF</text>
                  <text x="232" y="1332">and</text>
                  <text x="268" y="1332">MAC,</text>
                  <text x="304" y="1332">see</text>
                  <text x="336" y="1332">RFC</text>
                  <text x="376" y="1332">6955.</text>
                  <text x="436" y="1332">Requires</text>
                  <text x="232" y="1348">recipient's</text>
                  <text x="308" y="1348">public</text>
                  <text x="364" y="1348">static</text>
                  <text x="452" y="1348">Diffie-Hellman</text>
                  <text x="528" y="1348">key</text>
                  <text x="52" y="1380">15</text>
                  <text x="104" y="1380">Name:</text>
                  <text x="200" y="1380">PoP</text>
                  <text x="236" y="1380">with</text>
                  <text x="288" y="1380">SHA-384</text>
                  <text x="336" y="1380">and</text>
                  <text x="400" y="1380">HMAC-SHA384</text>
                  <text x="132" y="1396">Identifiers:</text>
                  <text x="304" y="1396">sa-ecdhPop-sha384-hmac-sha384</text>
                  <text x="100" y="1412">OID:</text>
                  <text x="260" y="1412">1.3.6.1.5.5.7.6.27</text>
                  <text x="128" y="1428">Parameters:</text>
                  <text x="212" y="1428">Absent</text>
                  <text x="100" y="1444">DER:</text>
                  <text x="196" y="1444">30</text>
                  <text x="220" y="1444">0A</text>
                  <text x="244" y="1444">06</text>
                  <text x="268" y="1444">08</text>
                  <text x="292" y="1444">2B</text>
                  <text x="316" y="1444">06</text>
                  <text x="340" y="1444">01</text>
                  <text x="364" y="1444">05</text>
                  <text x="388" y="1444">05</text>
                  <text x="412" y="1444">07</text>
                  <text x="436" y="1444">06</text>
                  <text x="460" y="1444">1B</text>
                  <text x="120" y="1460">Comments:</text>
                  <text x="264" y="1460">Proof-of-possession</text>
                  <text x="388" y="1460">algorithm,</text>
                  <text x="464" y="1460">indexed</text>
                  <text x="516" y="1460">with</text>
                  <text x="200" y="1476">KDF</text>
                  <text x="232" y="1476">and</text>
                  <text x="268" y="1476">MAC,</text>
                  <text x="304" y="1476">see</text>
                  <text x="336" y="1476">RFC</text>
                  <text x="376" y="1476">6955.</text>
                  <text x="436" y="1476">Requires</text>
                  <text x="232" y="1492">recipient's</text>
                  <text x="308" y="1492">public</text>
                  <text x="364" y="1492">static</text>
                  <text x="452" y="1492">Diffie-Hellman</text>
                  <text x="528" y="1492">key</text>
                  <text x="52" y="1524">16</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="200" y="1524">PoP</text>
                  <text x="236" y="1524">with</text>
                  <text x="288" y="1524">SHA-512</text>
                  <text x="336" y="1524">and</text>
                  <text x="400" y="1524">HMAC-SHA512</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="304" y="1540">sa-ecdhPop-sha512-hmac-sha512</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="260" y="1556">1.3.6.1.5.5.7.6.28</text>
                  <text x="128" y="1572">Parameters:</text>
                  <text x="212" y="1572">Absent</text>
                  <text x="100" y="1588">DER:</text>
                  <text x="196" y="1588">30</text>
                  <text x="220" y="1588">0A</text>
                  <text x="244" y="1588">06</text>
                  <text x="268" y="1588">08</text>
                  <text x="292" y="1588">2B</text>
                  <text x="316" y="1588">06</text>
                  <text x="340" y="1588">01</text>
                  <text x="364" y="1588">05</text>
                  <text x="388" y="1588">05</text>
                  <text x="412" y="1588">07</text>
                  <text x="436" y="1588">06</text>
                  <text x="460" y="1588">1C</text>
                  <text x="120" y="1604">Comments:</text>
                  <text x="264" y="1604">Proof-of-possession</text>
                  <text x="388" y="1604">algorithm,</text>
                  <text x="464" y="1604">indexed</text>
                  <text x="516" y="1604">with</text>
                  <text x="200" y="1620">KDF</text>
                  <text x="232" y="1620">and</text>
                  <text x="268" y="1620">MAC,</text>
                  <text x="304" y="1620">see</text>
                  <text x="336" y="1620">RFC</text>
                  <text x="376" y="1620">6955.</text>
                  <text x="436" y="1620">Requires</text>
                  <text x="232" y="1636">recipient's</text>
                  <text x="308" y="1636">public</text>
                  <text x="364" y="1636">static</text>
                  <text x="452" y="1636">Diffie-Hellman</text>
                  <text x="528" y="1636">key</text>
                  <text x="52" y="1668">23</text>
                  <text x="104" y="1668">Name:</text>
                  <text x="256" y="1668">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1668">with</text>
                  <text x="400" y="1668">SHA-256</text>
                  <text x="132" y="1684">Identifiers:</text>
                  <text x="280" y="1684">sha256WithRSAEncryption</text>
                  <text x="100" y="1700">OID:</text>
                  <text x="272" y="1700">1.2.840.113549.1.1.11</text>
                  <text x="128" y="1716">Parameters:</text>
                  <text x="204" y="1716">NULL</text>
                  <text x="100" y="1732">DER:</text>
                  <text x="196" y="1732">30</text>
                  <text x="220" y="1732">0B</text>
                  <text x="244" y="1732">06</text>
                  <text x="268" y="1732">09</text>
                  <text x="292" y="1732">2A</text>
                  <text x="316" y="1732">86</text>
                  <text x="340" y="1732">48</text>
                  <text x="364" y="1732">86</text>
                  <text x="388" y="1732">F7</text>
                  <text x="412" y="1732">0D</text>
                  <text x="436" y="1732">01</text>
                  <text x="460" y="1732">01</text>
                  <text x="484" y="1732">0B</text>
                  <text x="508" y="1732">05</text>
                  <text x="532" y="1732">00</text>
                  <text x="120" y="1748">Comments:</text>
                  <text x="52" y="1780">24</text>
                  <text x="104" y="1780">Name:</text>
                  <text x="256" y="1780">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1780">with</text>
                  <text x="400" y="1780">SHA-384</text>
                  <text x="132" y="1796">Identifiers:</text>
                  <text x="280" y="1796">sha384WithRSAEncryption</text>
                  <text x="100" y="1812">OID:</text>
                  <text x="272" y="1812">1.2.840.113549.1.1.12</text>
                  <text x="128" y="1828">Parameters:</text>
                  <text x="204" y="1828">NULL</text>
                  <text x="100" y="1844">DER:</text>
                  <text x="196" y="1844">30</text>
                  <text x="220" y="1844">0B</text>
                  <text x="244" y="1844">06</text>
                  <text x="268" y="1844">09</text>
                  <text x="292" y="1844">2A</text>
                  <text x="316" y="1844">86</text>
                  <text x="340" y="1844">48</text>
                  <text x="364" y="1844">86</text>
                  <text x="388" y="1844">F7</text>
                  <text x="412" y="1844">0D</text>
                  <text x="436" y="1844">01</text>
                  <text x="460" y="1844">01</text>
                  <text x="484" y="1844">0C</text>
                  <text x="508" y="1844">05</text>
                  <text x="532" y="1844">00</text>
                  <text x="120" y="1860">Comments:</text>
                  <text x="52" y="1892">25</text>
                  <text x="104" y="1892">Name:</text>
                  <text x="256" y="1892">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1892">with</text>
                  <text x="400" y="1892">SHA-512</text>
                  <text x="132" y="1908">Identifiers:</text>
                  <text x="280" y="1908">sha512WithRSAEncryption</text>
                  <text x="100" y="1924">OID:</text>
                  <text x="272" y="1924">1.2.840.113549.1.1.13</text>
                  <text x="128" y="1940">Parameters:</text>
                  <text x="204" y="1940">NULL</text>
                  <text x="100" y="1956">DER:</text>
                  <text x="196" y="1956">30</text>
                  <text x="220" y="1956">0B</text>
                  <text x="244" y="1956">06</text>
                  <text x="268" y="1956">09</text>
                  <text x="292" y="1956">2A</text>
                  <text x="316" y="1956">86</text>
                  <text x="340" y="1956">48</text>
                  <text x="364" y="1956">86</text>
                  <text x="388" y="1956">F7</text>
                  <text x="412" y="1956">0D</text>
                  <text x="436" y="1956">01</text>
                  <text x="460" y="1956">01</text>
                  <text x="484" y="1956">0D</text>
                  <text x="508" y="1956">05</text>
                  <text x="532" y="1956">00</text>
                  <text x="120" y="1972">Comments:</text>
                  <text x="52" y="2004">26</text>
                  <text x="104" y="2004">Name:</text>
                  <text x="228" y="2004">RSASSA-PSS</text>
                  <text x="292" y="2004">with</text>
                  <text x="344" y="2004">SHA-256</text>
                  <text x="132" y="2020">Identifiers:</text>
                  <text x="232" y="2020">rsassa-pss,</text>
                  <text x="336" y="2020">id-RSASSA-PSS</text>
                  <text x="100" y="2036">OID:</text>
                  <text x="272" y="2036">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2052">Parameters:</text>
                  <text x="220" y="2052">SHA-256,</text>
                  <text x="280" y="2052">MGF-1</text>
                  <text x="324" y="2052">with</text>
                  <text x="380" y="2052">SHA-256,</text>
                  <text x="460" y="2052">saltLength</text>
                  <text x="512" y="2052">=</text>
                  <text x="532" y="2052">32</text>
                  <text x="100" y="2068">DER:</text>
                  <text x="196" y="2068">30</text>
                  <text x="220" y="2068">41</text>
                  <text x="244" y="2068">06</text>
                  <text x="268" y="2068">09</text>
                  <text x="292" y="2068">2A</text>
                  <text x="316" y="2068">86</text>
                  <text x="340" y="2068">48</text>
                  <text x="364" y="2068">86</text>
                  <text x="388" y="2068">F7</text>
                  <text x="412" y="2068">0D</text>
                  <text x="436" y="2068">01</text>
                  <text x="460" y="2068">01</text>
                  <text x="484" y="2068">0A</text>
                  <text x="508" y="2068">30</text>
                  <text x="532" y="2068">34</text>
                  <text x="196" y="2084">A0</text>
                  <text x="220" y="2084">0F</text>
                  <text x="244" y="2084">30</text>
                  <text x="268" y="2084">0D</text>
                  <text x="292" y="2084">06</text>
                  <text x="316" y="2084">09</text>
                  <text x="340" y="2084">60</text>
                  <text x="364" y="2084">86</text>
                  <text x="388" y="2084">48</text>
                  <text x="412" y="2084">01</text>
                  <text x="436" y="2084">65</text>
                  <text x="460" y="2084">03</text>
                  <text x="484" y="2084">04</text>
                  <text x="508" y="2084">02</text>
                  <text x="532" y="2084">01</text>
                  <text x="196" y="2100">05</text>
                  <text x="220" y="2100">00</text>
                  <text x="244" y="2100">A1</text>
                  <text x="268" y="2100">1C</text>
                  <text x="292" y="2100">30</text>
                  <text x="316" y="2100">1A</text>
                  <text x="340" y="2100">06</text>
                  <text x="364" y="2100">09</text>
                  <text x="388" y="2100">2A</text>
                  <text x="412" y="2100">86</text>
                  <text x="436" y="2100">48</text>
                  <text x="460" y="2100">86</text>
                  <text x="484" y="2100">F7</text>
                  <text x="508" y="2100">0D</text>
                  <text x="532" y="2100">01</text>
                  <text x="196" y="2116">01</text>
                  <text x="220" y="2116">08</text>
                  <text x="244" y="2116">30</text>
                  <text x="268" y="2116">0D</text>
                  <text x="292" y="2116">06</text>
                  <text x="316" y="2116">09</text>
                  <text x="340" y="2116">60</text>
                  <text x="364" y="2116">86</text>
                  <text x="388" y="2116">48</text>
                  <text x="412" y="2116">01</text>
                  <text x="436" y="2116">65</text>
                  <text x="460" y="2116">03</text>
                  <text x="484" y="2116">04</text>
                  <text x="508" y="2116">02</text>
                  <text x="532" y="2116">01</text>
                  <text x="196" y="2132">05</text>
                  <text x="220" y="2132">00</text>
                  <text x="244" y="2132">a2</text>
                  <text x="268" y="2132">03</text>
                  <text x="292" y="2132">02</text>
                  <text x="316" y="2132">01</text>
                  <text x="340" y="2132">20</text>
                  <text x="120" y="2148">Comments:</text>
                  <text x="52" y="2180">27</text>
                  <text x="104" y="2180">Name:</text>
                  <text x="228" y="2180">RSASSA-PSS</text>
                  <text x="292" y="2180">with</text>
                  <text x="344" y="2180">SHA-384</text>
                  <text x="132" y="2196">Identifiers:</text>
                  <text x="232" y="2196">rsassa-pss,</text>
                  <text x="336" y="2196">id-RSASSA-PSS</text>
                  <text x="100" y="2212">OID:</text>
                  <text x="272" y="2212">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2228">Parameters:</text>
                  <text x="220" y="2228">SHA-384,</text>
                  <text x="280" y="2228">MGF-1</text>
                  <text x="324" y="2228">with</text>
                  <text x="380" y="2228">SHA-384,</text>
                  <text x="460" y="2228">saltLength</text>
                  <text x="512" y="2228">=</text>
                  <text x="532" y="2228">48</text>
                  <text x="100" y="2244">DER:</text>
                  <text x="196" y="2244">30</text>
                  <text x="220" y="2244">41</text>
                  <text x="244" y="2244">06</text>
                  <text x="268" y="2244">09</text>
                  <text x="292" y="2244">2A</text>
                  <text x="316" y="2244">86</text>
                  <text x="340" y="2244">48</text>
                  <text x="364" y="2244">86</text>
                  <text x="388" y="2244">F7</text>
                  <text x="412" y="2244">0D</text>
                  <text x="436" y="2244">01</text>
                  <text x="460" y="2244">01</text>
                  <text x="484" y="2244">0A</text>
                  <text x="508" y="2244">30</text>
                  <text x="532" y="2244">34</text>
                  <text x="196" y="2260">A0</text>
                  <text x="220" y="2260">0F</text>
                  <text x="244" y="2260">30</text>
                  <text x="268" y="2260">0D</text>
                  <text x="292" y="2260">06</text>
                  <text x="316" y="2260">09</text>
                  <text x="340" y="2260">60</text>
                  <text x="364" y="2260">86</text>
                  <text x="388" y="2260">48</text>
                  <text x="412" y="2260">01</text>
                  <text x="436" y="2260">65</text>
                  <text x="460" y="2260">03</text>
                  <text x="484" y="2260">04</text>
                  <text x="508" y="2260">02</text>
                  <text x="532" y="2260">02</text>
                  <text x="196" y="2276">05</text>
                  <text x="220" y="2276">00</text>
                  <text x="244" y="2276">A1</text>
                  <text x="268" y="2276">1C</text>
                  <text x="292" y="2276">30</text>
                  <text x="316" y="2276">1A</text>
                  <text x="340" y="2276">06</text>
                  <text x="364" y="2276">09</text>
                  <text x="388" y="2276">2A</text>
                  <text x="412" y="2276">86</text>
                  <text x="436" y="2276">48</text>
                  <text x="460" y="2276">86</text>
                  <text x="484" y="2276">F7</text>
                  <text x="508" y="2276">0D</text>
                  <text x="532" y="2276">01</text>
                  <text x="196" y="2292">01</text>
                  <text x="220" y="2292">08</text>
                  <text x="244" y="2292">30</text>
                  <text x="268" y="2292">0D</text>
                  <text x="292" y="2292">06</text>
                  <text x="316" y="2292">09</text>
                  <text x="340" y="2292">60</text>
                  <text x="364" y="2292">86</text>
                  <text x="388" y="2292">48</text>
                  <text x="412" y="2292">01</text>
                  <text x="436" y="2292">65</text>
                  <text x="460" y="2292">03</text>
                  <text x="484" y="2292">04</text>
                  <text x="508" y="2292">02</text>
                  <text x="532" y="2292">02</text>
                  <text x="196" y="2308">05</text>
                  <text x="220" y="2308">00</text>
                  <text x="244" y="2308">A2</text>
                  <text x="268" y="2308">03</text>
                  <text x="292" y="2308">02</text>
                  <text x="316" y="2308">01</text>
                  <text x="340" y="2308">30</text>
                  <text x="120" y="2324">Comments:</text>
                  <text x="52" y="2356">28</text>
                  <text x="104" y="2356">Name:</text>
                  <text x="228" y="2356">RSASSA-PSS</text>
                  <text x="292" y="2356">with</text>
                  <text x="344" y="2356">SHA-512</text>
                  <text x="132" y="2372">Identifiers:</text>
                  <text x="232" y="2372">rsassa-pss,</text>
                  <text x="336" y="2372">id-RSASSA-PSS</text>
                  <text x="100" y="2388">OID:</text>
                  <text x="272" y="2388">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2404">Parameters:</text>
                  <text x="220" y="2404">SHA-512,</text>
                  <text x="280" y="2404">MGF-1</text>
                  <text x="324" y="2404">with</text>
                  <text x="380" y="2404">SHA-512,</text>
                  <text x="460" y="2404">saltLength</text>
                  <text x="512" y="2404">=</text>
                  <text x="532" y="2404">64</text>
                  <text x="100" y="2420">DER:</text>
                  <text x="196" y="2420">30</text>
                  <text x="220" y="2420">41</text>
                  <text x="244" y="2420">06</text>
                  <text x="268" y="2420">09</text>
                  <text x="292" y="2420">2A</text>
                  <text x="316" y="2420">86</text>
                  <text x="340" y="2420">48</text>
                  <text x="364" y="2420">86</text>
                  <text x="388" y="2420">F7</text>
                  <text x="412" y="2420">0D</text>
                  <text x="436" y="2420">01</text>
                  <text x="460" y="2420">01</text>
                  <text x="484" y="2420">0A</text>
                  <text x="508" y="2420">30</text>
                  <text x="532" y="2420">34</text>
                  <text x="196" y="2436">A0</text>
                  <text x="220" y="2436">0F</text>
                  <text x="244" y="2436">30</text>
                  <text x="268" y="2436">0D</text>
                  <text x="292" y="2436">06</text>
                  <text x="316" y="2436">09</text>
                  <text x="340" y="2436">60</text>
                  <text x="364" y="2436">86</text>
                  <text x="388" y="2436">48</text>
                  <text x="412" y="2436">01</text>
                  <text x="436" y="2436">65</text>
                  <text x="460" y="2436">03</text>
                  <text x="484" y="2436">04</text>
                  <text x="508" y="2436">02</text>
                  <text x="532" y="2436">03</text>
                  <text x="196" y="2452">05</text>
                  <text x="220" y="2452">00</text>
                  <text x="244" y="2452">A1</text>
                  <text x="268" y="2452">1C</text>
                  <text x="292" y="2452">30</text>
                  <text x="316" y="2452">1A</text>
                  <text x="340" y="2452">06</text>
                  <text x="364" y="2452">09</text>
                  <text x="388" y="2452">2A</text>
                  <text x="412" y="2452">86</text>
                  <text x="436" y="2452">48</text>
                  <text x="460" y="2452">86</text>
                  <text x="484" y="2452">F7</text>
                  <text x="508" y="2452">0D</text>
                  <text x="532" y="2452">01</text>
                  <text x="196" y="2468">01</text>
                  <text x="220" y="2468">08</text>
                  <text x="244" y="2468">30</text>
                  <text x="268" y="2468">0D</text>
                  <text x="292" y="2468">06</text>
                  <text x="316" y="2468">09</text>
                  <text x="340" y="2468">60</text>
                  <text x="364" y="2468">86</text>
                  <text x="388" y="2468">48</text>
                  <text x="412" y="2468">01</text>
                  <text x="436" y="2468">65</text>
                  <text x="460" y="2468">03</text>
                  <text x="484" y="2468">04</text>
                  <text x="508" y="2468">02</text>
                  <text x="532" y="2468">03</text>
                  <text x="196" y="2484">05</text>
                  <text x="220" y="2484">00</text>
                  <text x="244" y="2484">A2</text>
                  <text x="268" y="2484">03</text>
                  <text x="292" y="2484">02</text>
                  <text x="316" y="2484">01</text>
                  <text x="340" y="2484">40</text>
                  <text x="120" y="2500">Comments:</text>
                  <text x="52" y="2532">29</text>
                  <text x="104" y="2532">Name:</text>
                  <text x="228" y="2532">RSASSA-PSS</text>
                  <text x="292" y="2532">with</text>
                  <text x="348" y="2532">SHAKE128</text>
                  <text x="132" y="2548">Identifiers:</text>
                  <text x="276" y="2548">id-RSASSA-PSS-SHAKE128</text>
                  <text x="100" y="2564">OID:</text>
                  <text x="260" y="2564">1.3.6.1.5.5.7.6.30</text>
                  <text x="128" y="2580">Parameters:</text>
                  <text x="212" y="2580">Absent</text>
                  <text x="100" y="2596">DER:</text>
                  <text x="196" y="2596">30</text>
                  <text x="220" y="2596">0A</text>
                  <text x="244" y="2596">06</text>
                  <text x="268" y="2596">08</text>
                  <text x="292" y="2596">2B</text>
                  <text x="316" y="2596">06</text>
                  <text x="340" y="2596">01</text>
                  <text x="364" y="2596">05</text>
                  <text x="388" y="2596">05</text>
                  <text x="412" y="2596">07</text>
                  <text x="436" y="2596">06</text>
                  <text x="460" y="2596">1E</text>
                  <text x="120" y="2612">Comments:</text>
                  <text x="52" y="2644">30</text>
                  <text x="104" y="2644">Name:</text>
                  <text x="228" y="2644">RSASSA-PSS</text>
                  <text x="292" y="2644">with</text>
                  <text x="348" y="2644">SHAKE256</text>
                  <text x="132" y="2660">Identifiers:</text>
                  <text x="276" y="2660">id-RSASSA-PSS-SHAKE256</text>
                  <text x="100" y="2676">OID:</text>
                  <text x="260" y="2676">1.3.6.1.5.5.7.6.31</text>
                  <text x="128" y="2692">Parameters:</text>
                  <text x="212" y="2692">Absent</text>
                  <text x="100" y="2708">DER:</text>
                  <text x="196" y="2708">30</text>
                  <text x="220" y="2708">0A</text>
                  <text x="244" y="2708">06</text>
                  <text x="268" y="2708">08</text>
                  <text x="292" y="2708">2B</text>
                  <text x="316" y="2708">06</text>
                  <text x="340" y="2708">01</text>
                  <text x="364" y="2708">05</text>
                  <text x="388" y="2708">05</text>
                  <text x="412" y="2708">07</text>
                  <text x="436" y="2708">06</text>
                  <text x="460" y="2708">1F</text>
                  <text x="120" y="2724">Comments:</text>
                  <text x="52" y="2756">45</text>
                  <text x="104" y="2756">Name:</text>
                  <text x="200" y="2756">SM2</text>
                  <text x="236" y="2756">with</text>
                  <text x="272" y="2756">SM3</text>
                  <text x="132" y="2772">Identifiers:</text>
                  <text x="236" y="2772">sm2-with-sm3</text>
                  <text x="100" y="2788">OID:</text>
                  <text x="264" y="2788">1.2.156.10197.1.501</text>
                  <text x="128" y="2804">Parameters:</text>
                  <text x="212" y="2804">Absent</text>
                  <text x="100" y="2820">DER:</text>
                  <text x="196" y="2820">30</text>
                  <text x="220" y="2820">0A</text>
                  <text x="244" y="2820">06</text>
                  <text x="268" y="2820">08</text>
                  <text x="292" y="2820">2A</text>
                  <text x="316" y="2820">81</text>
                  <text x="340" y="2820">1C</text>
                  <text x="364" y="2820">CF</text>
                  <text x="388" y="2820">55</text>
                  <text x="412" y="2820">01</text>
                  <text x="436" y="2820">83</text>
                  <text x="460" y="2820">75</text>
                  <text x="120" y="2836">Comments:</text>
                  <text x="200" y="2836">See</text>
                  <text x="248" y="2836">Section</text>
                  <text x="308" y="2836">3.2.2.</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. See Section 3.2.2.                |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     5 | Name:        Unsigned                                     |
|       | Identifiers: id-alg-unsigned                              |
|       | OID:         1.3.6.1.5.5.7.6.36                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 24          |
|       | Comments:    bytes of size 0                              |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        PoP with SHA-256 and HMAC-SHA256             |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    15 | Name:        PoP with SHA-384 and HMAC-SHA384             |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    16 | Name:        PoP with SHA-512 and HMAC-SHA512             |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    45 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. If the public key can only be used with one signature algorithm and the OID of the public key algorithm is the same as the signature algorithm, then the value <bcp14>MUST</bcp14> be chosen equal to the value of signature algorithm, see <xref target="sigalg"/>. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1872" width="560" viewBox="0 0 560 1872" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1856" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1856" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,464 L 552,464" fill="none" stroke="black"/>
                <path d="M 8,608 L 552,608" fill="none" stroke="black"/>
                <path d="M 8,720 L 552,720" fill="none" stroke="black"/>
                <path d="M 8,832 L 552,832" fill="none" stroke="black"/>
                <path d="M 8,944 L 552,944" fill="none" stroke="black"/>
                <path d="M 8,1056 L 552,1056" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1376 L 552,1376" fill="none" stroke="black"/>
                <path d="M 8,1536 L 552,1536" fill="none" stroke="black"/>
                <path d="M 8,1696 L 552,1696" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="104" y="52">X.509</text>
                  <text x="156" y="52">Public</text>
                  <text x="200" y="52">Key</text>
                  <text x="260" y="52">Algorithms</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="200" y="84">RSA</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="240" y="100">rsaEncryption</text>
                  <text x="100" y="116">OID:</text>
                  <text x="268" y="116">1.2.840.113549.1.1.1</text>
                  <text x="128" y="132">Parameters:</text>
                  <text x="204" y="132">NULL</text>
                  <text x="100" y="148">DER:</text>
                  <text x="196" y="148">30</text>
                  <text x="220" y="148">0d</text>
                  <text x="244" y="148">06</text>
                  <text x="268" y="148">09</text>
                  <text x="292" y="148">2a</text>
                  <text x="316" y="148">86</text>
                  <text x="340" y="148">48</text>
                  <text x="364" y="148">86</text>
                  <text x="388" y="148">f7</text>
                  <text x="412" y="148">0d</text>
                  <text x="436" y="148">01</text>
                  <text x="460" y="148">01</text>
                  <text x="484" y="148">01</text>
                  <text x="508" y="148">05</text>
                  <text x="532" y="148">00</text>
                  <text x="120" y="164">Comments:</text>
                  <text x="228" y="164">Compressed</text>
                  <text x="340" y="164">subjectPublicKey</text>
                  <text x="56" y="196">1</text>
                  <text x="104" y="196">Name:</text>
                  <text x="196" y="196">EC</text>
                  <text x="236" y="196">Public</text>
                  <text x="280" y="196">Key</text>
                  <text x="352" y="196">(Weierstrass)</text>
                  <text x="428" y="196">with</text>
                  <text x="488" y="196">secp256r1</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="236" y="212">ecPublicKey,</text>
                  <text x="348" y="212">id-ecPublicKey</text>
                  <text x="100" y="228">OID:</text>
                  <text x="256" y="228">1.2.840.10045.2.1</text>
                  <text x="128" y="244">Parameters:</text>
                  <text x="228" y="244">namedCurve</text>
                  <text x="280" y="244">=</text>
                  <text x="328" y="244">secp256r1</text>
                  <text x="456" y="244">(1.2.840.10045.3.1.7)</text>
                  <text x="100" y="260">DER:</text>
                  <text x="196" y="260">30</text>
                  <text x="220" y="260">13</text>
                  <text x="244" y="260">06</text>
                  <text x="268" y="260">07</text>
                  <text x="292" y="260">2A</text>
                  <text x="316" y="260">86</text>
                  <text x="340" y="260">48</text>
                  <text x="364" y="260">CE</text>
                  <text x="388" y="260">3D</text>
                  <text x="412" y="260">02</text>
                  <text x="436" y="260">01</text>
                  <text x="460" y="260">06</text>
                  <text x="484" y="260">08</text>
                  <text x="508" y="260">2A</text>
                  <text x="532" y="260">86</text>
                  <text x="196" y="276">48</text>
                  <text x="220" y="276">CE</text>
                  <text x="244" y="276">3D</text>
                  <text x="268" y="276">03</text>
                  <text x="292" y="276">01</text>
                  <text x="316" y="276">07</text>
                  <text x="120" y="292">Comments:</text>
                  <text x="228" y="292">Compressed</text>
                  <text x="340" y="292">subjectPublicKey</text>
                  <text x="204" y="308">Also</text>
                  <text x="248" y="308">known</text>
                  <text x="284" y="308">as</text>
                  <text x="324" y="308">P-256,</text>
                  <text x="400" y="308">ansip256r1,</text>
                  <text x="492" y="308">prime256v1</text>
                  <text x="56" y="340">2</text>
                  <text x="104" y="340">Name:</text>
                  <text x="196" y="340">EC</text>
                  <text x="236" y="340">Public</text>
                  <text x="280" y="340">Key</text>
                  <text x="352" y="340">(Weierstrass)</text>
                  <text x="428" y="340">with</text>
                  <text x="488" y="340">secp384r1</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="236" y="356">ecPublicKey,</text>
                  <text x="348" y="356">id-ecPublicKey</text>
                  <text x="100" y="372">OID:</text>
                  <text x="256" y="372">1.2.840.10045.2.1</text>
                  <text x="128" y="388">Parameters:</text>
                  <text x="228" y="388">namedCurve</text>
                  <text x="280" y="388">=</text>
                  <text x="328" y="388">secp384r1</text>
                  <text x="428" y="388">(1.3.132.0.34)</text>
                  <text x="100" y="404">DER:</text>
                  <text x="196" y="404">30</text>
                  <text x="220" y="404">10</text>
                  <text x="244" y="404">06</text>
                  <text x="268" y="404">07</text>
                  <text x="292" y="404">2A</text>
                  <text x="316" y="404">86</text>
                  <text x="340" y="404">48</text>
                  <text x="364" y="404">CE</text>
                  <text x="388" y="404">3D</text>
                  <text x="412" y="404">02</text>
                  <text x="436" y="404">01</text>
                  <text x="460" y="404">06</text>
                  <text x="484" y="404">05</text>
                  <text x="508" y="404">2B</text>
                  <text x="532" y="404">81</text>
                  <text x="196" y="420">04</text>
                  <text x="220" y="420">00</text>
                  <text x="244" y="420">22</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="228" y="436">Compressed</text>
                  <text x="340" y="436">subjectPublicKey</text>
                  <text x="204" y="452">Also</text>
                  <text x="248" y="452">known</text>
                  <text x="284" y="452">as</text>
                  <text x="324" y="452">P-384,</text>
                  <text x="396" y="452">ansip384r1</text>
                  <text x="56" y="484">3</text>
                  <text x="104" y="484">Name:</text>
                  <text x="196" y="484">EC</text>
                  <text x="236" y="484">Public</text>
                  <text x="280" y="484">Key</text>
                  <text x="352" y="484">(Weierstrass)</text>
                  <text x="428" y="484">with</text>
                  <text x="488" y="484">secp521r1</text>
                  <text x="132" y="500">Identifiers:</text>
                  <text x="236" y="500">ecPublicKey,</text>
                  <text x="348" y="500">id-ecPublicKey</text>
                  <text x="100" y="516">OID:</text>
                  <text x="256" y="516">1.2.840.10045.2.1</text>
                  <text x="128" y="532">Parameters:</text>
                  <text x="228" y="532">namedCurve</text>
                  <text x="280" y="532">=</text>
                  <text x="328" y="532">secp521r1</text>
                  <text x="428" y="532">(1.3.132.0.35)</text>
                  <text x="100" y="548">DER:</text>
                  <text x="196" y="548">30</text>
                  <text x="220" y="548">10</text>
                  <text x="244" y="548">06</text>
                  <text x="268" y="548">07</text>
                  <text x="292" y="548">2A</text>
                  <text x="316" y="548">86</text>
                  <text x="340" y="548">48</text>
                  <text x="364" y="548">CE</text>
                  <text x="388" y="548">3D</text>
                  <text x="412" y="548">02</text>
                  <text x="436" y="548">01</text>
                  <text x="460" y="548">06</text>
                  <text x="484" y="548">05</text>
                  <text x="508" y="548">2B</text>
                  <text x="532" y="548">81</text>
                  <text x="196" y="564">04</text>
                  <text x="220" y="564">00</text>
                  <text x="244" y="564">23</text>
                  <text x="120" y="580">Comments:</text>
                  <text x="228" y="580">Compressed</text>
                  <text x="340" y="580">subjectPublicKey</text>
                  <text x="204" y="596">Also</text>
                  <text x="248" y="596">known</text>
                  <text x="284" y="596">as</text>
                  <text x="324" y="596">P-521,</text>
                  <text x="396" y="596">ansip521r1</text>
                  <text x="56" y="628">8</text>
                  <text x="104" y="628">Name:</text>
                  <text x="212" y="628">X25519</text>
                  <text x="292" y="628">(Montgomery)</text>
                  <text x="132" y="644">Identifiers:</text>
                  <text x="224" y="644">id-X25519</text>
                  <text x="100" y="660">OID:</text>
                  <text x="232" y="660">1.3.101.110</text>
                  <text x="128" y="676">Parameters:</text>
                  <text x="212" y="676">Absent</text>
                  <text x="100" y="692">DER:</text>
                  <text x="196" y="692">30</text>
                  <text x="220" y="692">05</text>
                  <text x="244" y="692">06</text>
                  <text x="268" y="692">03</text>
                  <text x="292" y="692">2B</text>
                  <text x="316" y="692">65</text>
                  <text x="340" y="692">6E</text>
                  <text x="120" y="708">Comments:</text>
                  <text x="56" y="740">9</text>
                  <text x="104" y="740">Name:</text>
                  <text x="204" y="740">X448</text>
                  <text x="276" y="740">(Montgomery)</text>
                  <text x="132" y="756">Identifiers:</text>
                  <text x="216" y="756">id-X448</text>
                  <text x="100" y="772">OID:</text>
                  <text x="232" y="772">1.3.101.111</text>
                  <text x="128" y="788">Parameters:</text>
                  <text x="212" y="788">Absent</text>
                  <text x="100" y="804">DER:</text>
                  <text x="196" y="804">30</text>
                  <text x="220" y="804">05</text>
                  <text x="244" y="804">06</text>
                  <text x="268" y="804">03</text>
                  <text x="292" y="804">2B</text>
                  <text x="316" y="804">65</text>
                  <text x="340" y="804">6F</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="52" y="852">12</text>
                  <text x="104" y="852">Name:</text>
                  <text x="216" y="852">Ed25519</text>
                  <text x="284" y="852">(Twisted</text>
                  <text x="356" y="852">Edwards)</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="232" y="868">id-Ed25519,</text>
                  <text x="336" y="868">id-EdDSA25519</text>
                  <text x="100" y="884">OID:</text>
                  <text x="232" y="884">1.3.101.112</text>
                  <text x="128" y="900">Parameters:</text>
                  <text x="212" y="900">Absent</text>
                  <text x="100" y="916">DER:</text>
                  <text x="196" y="916">30</text>
                  <text x="220" y="916">05</text>
                  <text x="244" y="916">06</text>
                  <text x="268" y="916">03</text>
                  <text x="292" y="916">2B</text>
                  <text x="316" y="916">65</text>
                  <text x="340" y="916">70</text>
                  <text x="120" y="932">Comments:</text>
                  <text x="52" y="964">13</text>
                  <text x="104" y="964">Name:</text>
                  <text x="208" y="964">Ed448</text>
                  <text x="272" y="964">(Edwards)</text>
                  <text x="132" y="980">Identifiers:</text>
                  <text x="224" y="980">id-Ed448,</text>
                  <text x="312" y="980">id-EdDSA448</text>
                  <text x="100" y="996">OID:</text>
                  <text x="232" y="996">1.3.101.113</text>
                  <text x="128" y="1012">Parameters:</text>
                  <text x="212" y="1012">Absent</text>
                  <text x="100" y="1028">DER:</text>
                  <text x="196" y="1028">30</text>
                  <text x="220" y="1028">05</text>
                  <text x="244" y="1028">06</text>
                  <text x="268" y="1028">03</text>
                  <text x="292" y="1028">2B</text>
                  <text x="316" y="1028">65</text>
                  <text x="340" y="1028">71</text>
                  <text x="120" y="1044">Comments:</text>
                  <text x="52" y="1076">24</text>
                  <text x="104" y="1076">Name:</text>
                  <text x="196" y="1076">EC</text>
                  <text x="236" y="1076">Public</text>
                  <text x="280" y="1076">Key</text>
                  <text x="352" y="1076">(Weierstrass)</text>
                  <text x="428" y="1076">with</text>
                  <text x="248" y="1092">brainpoolP256r1</text>
                  <text x="132" y="1108">Identifiers:</text>
                  <text x="236" y="1108">ecPublicKey,</text>
                  <text x="348" y="1108">id-ecPublicKey</text>
                  <text x="100" y="1124">OID:</text>
                  <text x="256" y="1124">1.2.840.10045.2.1</text>
                  <text x="128" y="1140">Parameters:</text>
                  <text x="228" y="1140">namedCurve</text>
                  <text x="280" y="1140">=</text>
                  <text x="352" y="1140">brainpoolP256r1</text>
                  <text x="276" y="1156">(1.3.36.3.3.2.8.1.1.7)</text>
                  <text x="100" y="1172">DER:</text>
                  <text x="196" y="1172">30</text>
                  <text x="220" y="1172">14</text>
                  <text x="244" y="1172">06</text>
                  <text x="268" y="1172">07</text>
                  <text x="292" y="1172">2A</text>
                  <text x="316" y="1172">86</text>
                  <text x="340" y="1172">48</text>
                  <text x="364" y="1172">CE</text>
                  <text x="388" y="1172">3D</text>
                  <text x="412" y="1172">02</text>
                  <text x="436" y="1172">01</text>
                  <text x="460" y="1172">06</text>
                  <text x="484" y="1172">09</text>
                  <text x="508" y="1172">2B</text>
                  <text x="532" y="1172">24</text>
                  <text x="196" y="1188">03</text>
                  <text x="220" y="1188">03</text>
                  <text x="244" y="1188">02</text>
                  <text x="268" y="1188">08</text>
                  <text x="292" y="1188">01</text>
                  <text x="316" y="1188">01</text>
                  <text x="340" y="1188">07</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="228" y="1204">Compressed</text>
                  <text x="340" y="1204">subjectPublicKey</text>
                  <text x="52" y="1236">25</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="196" y="1236">EC</text>
                  <text x="236" y="1236">Public</text>
                  <text x="280" y="1236">Key</text>
                  <text x="352" y="1236">(Weierstrass)</text>
                  <text x="428" y="1236">with</text>
                  <text x="248" y="1252">brainpoolP384r1</text>
                  <text x="132" y="1268">Identifiers:</text>
                  <text x="236" y="1268">ecPublicKey,</text>
                  <text x="348" y="1268">id-ecPublicKey</text>
                  <text x="100" y="1284">OID:</text>
                  <text x="256" y="1284">1.2.840.10045.2.1</text>
                  <text x="128" y="1300">Parameters:</text>
                  <text x="228" y="1300">namedCurve</text>
                  <text x="280" y="1300">=</text>
                  <text x="352" y="1300">brainpoolP384r1</text>
                  <text x="280" y="1316">(1.3.36.3.3.2.8.1.1.11)</text>
                  <text x="100" y="1332">DER:</text>
                  <text x="196" y="1332">30</text>
                  <text x="220" y="1332">14</text>
                  <text x="244" y="1332">06</text>
                  <text x="268" y="1332">07</text>
                  <text x="292" y="1332">2A</text>
                  <text x="316" y="1332">86</text>
                  <text x="340" y="1332">48</text>
                  <text x="364" y="1332">CE</text>
                  <text x="388" y="1332">3D</text>
                  <text x="412" y="1332">02</text>
                  <text x="436" y="1332">01</text>
                  <text x="460" y="1332">06</text>
                  <text x="484" y="1332">09</text>
                  <text x="508" y="1332">2B</text>
                  <text x="532" y="1332">24</text>
                  <text x="196" y="1348">03</text>
                  <text x="220" y="1348">03</text>
                  <text x="244" y="1348">02</text>
                  <text x="268" y="1348">08</text>
                  <text x="292" y="1348">01</text>
                  <text x="316" y="1348">01</text>
                  <text x="340" y="1348">0B</text>
                  <text x="120" y="1364">Comments:</text>
                  <text x="228" y="1364">Compressed</text>
                  <text x="340" y="1364">subjectPublicKey</text>
                  <text x="52" y="1396">26</text>
                  <text x="104" y="1396">Name:</text>
                  <text x="196" y="1396">EC</text>
                  <text x="236" y="1396">Public</text>
                  <text x="280" y="1396">Key</text>
                  <text x="352" y="1396">(Weierstrass)</text>
                  <text x="428" y="1396">with</text>
                  <text x="248" y="1412">brainpoolP512r1</text>
                  <text x="132" y="1428">Identifiers:</text>
                  <text x="236" y="1428">ecPublicKey,</text>
                  <text x="348" y="1428">id-ecPublicKey</text>
                  <text x="100" y="1444">OID:</text>
                  <text x="256" y="1444">1.2.840.10045.2.1</text>
                  <text x="128" y="1460">Parameters:</text>
                  <text x="228" y="1460">namedCurve</text>
                  <text x="280" y="1460">=</text>
                  <text x="352" y="1460">brainpoolP512r1</text>
                  <text x="280" y="1476">(1.3.36.3.3.2.8.1.1.13)</text>
                  <text x="100" y="1492">DER:</text>
                  <text x="196" y="1492">30</text>
                  <text x="220" y="1492">14</text>
                  <text x="244" y="1492">06</text>
                  <text x="268" y="1492">07</text>
                  <text x="292" y="1492">2A</text>
                  <text x="316" y="1492">86</text>
                  <text x="340" y="1492">48</text>
                  <text x="364" y="1492">CE</text>
                  <text x="388" y="1492">3D</text>
                  <text x="412" y="1492">02</text>
                  <text x="436" y="1492">01</text>
                  <text x="460" y="1492">06</text>
                  <text x="484" y="1492">09</text>
                  <text x="508" y="1492">2B</text>
                  <text x="532" y="1492">24</text>
                  <text x="196" y="1508">03</text>
                  <text x="220" y="1508">03</text>
                  <text x="244" y="1508">02</text>
                  <text x="268" y="1508">08</text>
                  <text x="292" y="1508">01</text>
                  <text x="316" y="1508">01</text>
                  <text x="340" y="1508">0D</text>
                  <text x="120" y="1524">Comments:</text>
                  <text x="228" y="1524">Compressed</text>
                  <text x="340" y="1524">subjectPublicKey</text>
                  <text x="52" y="1556">27</text>
                  <text x="104" y="1556">Name:</text>
                  <text x="196" y="1556">EC</text>
                  <text x="236" y="1556">Public</text>
                  <text x="280" y="1556">Key</text>
                  <text x="352" y="1556">(Weierstrass)</text>
                  <text x="428" y="1556">with</text>
                  <text x="220" y="1572">FRP256v1</text>
                  <text x="132" y="1588">Identifiers:</text>
                  <text x="236" y="1588">ecPublicKey,</text>
                  <text x="348" y="1588">id-ecPublicKey</text>
                  <text x="100" y="1604">OID:</text>
                  <text x="256" y="1604">1.2.840.10045.2.1</text>
                  <text x="128" y="1620">Parameters:</text>
                  <text x="228" y="1620">namedCurve</text>
                  <text x="280" y="1620">=</text>
                  <text x="324" y="1620">FRP256v1</text>
                  <text x="288" y="1636">(1.2.250.1.223.101.256.1)</text>
                  <text x="100" y="1652">DER:</text>
                  <text x="196" y="1652">30</text>
                  <text x="220" y="1652">15</text>
                  <text x="244" y="1652">06</text>
                  <text x="268" y="1652">07</text>
                  <text x="292" y="1652">2A</text>
                  <text x="316" y="1652">86</text>
                  <text x="340" y="1652">48</text>
                  <text x="364" y="1652">CE</text>
                  <text x="388" y="1652">3D</text>
                  <text x="412" y="1652">02</text>
                  <text x="436" y="1652">01</text>
                  <text x="460" y="1652">06</text>
                  <text x="484" y="1652">0A</text>
                  <text x="508" y="1652">2A</text>
                  <text x="532" y="1652">81</text>
                  <text x="196" y="1668">7A</text>
                  <text x="220" y="1668">01</text>
                  <text x="244" y="1668">81</text>
                  <text x="268" y="1668">5F</text>
                  <text x="292" y="1668">65</text>
                  <text x="316" y="1668">82</text>
                  <text x="340" y="1668">00</text>
                  <text x="364" y="1668">01</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="228" y="1684">Compressed</text>
                  <text x="340" y="1684">subjectPublicKey</text>
                  <text x="52" y="1716">28</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="196" y="1716">EC</text>
                  <text x="236" y="1716">Public</text>
                  <text x="280" y="1716">Key</text>
                  <text x="352" y="1716">(Weierstrass)</text>
                  <text x="428" y="1716">with</text>
                  <text x="224" y="1732">sm2p256v1</text>
                  <text x="132" y="1748">Identifiers:</text>
                  <text x="236" y="1748">ecPublicKey,</text>
                  <text x="348" y="1748">id-ecPublicKey</text>
                  <text x="100" y="1764">OID:</text>
                  <text x="256" y="1764">1.2.840.10045.2.1</text>
                  <text x="128" y="1780">Parameters:</text>
                  <text x="228" y="1780">namedCurve</text>
                  <text x="280" y="1780">=</text>
                  <text x="328" y="1780">sm2p256v1</text>
                  <text x="272" y="1796">(1.2.156.10197.1.301)</text>
                  <text x="100" y="1812">DER:</text>
                  <text x="196" y="1812">30</text>
                  <text x="220" y="1812">13</text>
                  <text x="244" y="1812">06</text>
                  <text x="268" y="1812">07</text>
                  <text x="292" y="1812">2A</text>
                  <text x="316" y="1812">86</text>
                  <text x="340" y="1812">48</text>
                  <text x="364" y="1812">CE</text>
                  <text x="388" y="1812">3D</text>
                  <text x="412" y="1812">02</text>
                  <text x="436" y="1812">01</text>
                  <text x="460" y="1812">06</text>
                  <text x="484" y="1812">08</text>
                  <text x="508" y="1812">2A</text>
                  <text x="532" y="1812">81</text>
                  <text x="196" y="1828">1C</text>
                  <text x="220" y="1828">CF</text>
                  <text x="244" y="1828">55</text>
                  <text x="268" y="1828">01</text>
                  <text x="292" y="1828">82</text>
                  <text x="316" y="1828">2D</text>
                  <text x="120" y="1844">Comments:</text>
                  <text x="228" y="1844">Compressed</text>
                  <text x="340" y="1844">subjectPublicKey</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstrass) with secp256r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstrass) with secp384r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstrass) with secp521r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstrass) with             |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    28 | Name:        EC Public Key (Weierstrass) with             |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <section anchor="suitability-of-different-public-key-algorithms-for-use-within-iot-scenarios">
          <name>Suitability of different public key algorithms for use within IoT scenarios</name>
          <t>The public key algorithms registry <xref target="pkalg"/> specifies a number of algorithms, not all which are suitable for usage with constrained devices. RSA requires large keys and large signature sizes compared to elliptic curve cryptography (ECC), which together with resource-efficient implementations of named elliptic curves (Montgomery, Edwards and Weierstrass curves) make them suitable candidates for IoT public key usage. These curves are represented by ids 1–11 and 24–28 in <xref target="pkalg"/>.</t>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry in the registry group "CBOR Object Signing and Encryption (COSE)" with this document as reference.</t>
      </section>
      <section anchor="media-type-application-registry">
        <name>Media Type Application Registry</name>
        <t>IANA is requested to assign the following entries in to the "application" registry in the registry group "Media Types" with this document as reference.</t>
        <section anchor="c509-cert">
          <name>Media Type application/cose-c509-cert</name>
          <t>When the application/cose-c509-cert media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-cert</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
            </li>
            <li>
              <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD8, TBD6</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pkcs10">
          <name>Media Type application/cose-c509-pkcs10</name>
          <t>When the application/cose-c509-pkcs10 media type is used, the data is a C509CertificateRequest structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pkcs10</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD9</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-crtemplate">
          <name>Media Type application/cose-c509-crtemplate</name>
          <t>When the application/cose-c509-crtemplate media type is used, the data is a C509CertificateRequestTemplate structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-crtemplate</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certificate Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD18</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-privkey">
          <name>Media Type application/cose-c509-privkey</name>
          <t>When the application/cose-c509-privkey media type is used, the data is a C509PrivateKey structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-privkey</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD12</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pem">
          <name>Media Type application/cose-c509-pem</name>
          <t>When the application/cose-c509-pem media type is used, the data is a C509PEM structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pem</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD13</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="cose-certhash">
          <name>Media Type application/cose-certhash</name>
          <t>When the application/cose-certhash media type is used, the data is a COSE_CertHash structure, see <xref target="RFC9360"/>.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-certhash</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about what the hash value is calculated over.</t>
            </li>
            <li>
              <t>Can be set to "c509" to indicate that the hash value is calculated over a C509 certificate, see <xref target="cose-header-params"/>.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of <xref target="RFC9360"/>.</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use X.509 or C509 as certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): N/A</t>
            </li>
            <li>
              <t>File extension(s): N/A</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
      </section>
      <section anchor="content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to add entries for "application/cose-c509-cert", "application/cose-c509-pkcs10", "application/cose-c509-crtemplate", "application/cose-c509-privkey" and "application/cose-c509-pem" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters".
A dedicated Content-Format ID is requested for the "application/cose-c509-cert" media type in the case when the parameter "usage" is set to "chain", see <xref target="c509-cert"/>.</t>
        <t>IANA is requested to add entries for "application/cose-certhash" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters". A dedicated Content-Format ID is requested  in the case when the parameter "usage" is set to "c509", see <xref target="c509-cert"/>.</t>
        <t>IANA is requested to add entries for "application/cbor" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters", in the case when the encoding is a CBOR text string containing a URI, see <xref target="RFC3986"/>.</t>
        <figure anchor="fig-format-ids">
          <name>CoAP Content-Format IDs</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="616" viewBox="0 0 616 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,496" fill="none" stroke="black"/>
                <path d="M 192,32 L 192,496" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,496" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,496" fill="none" stroke="black"/>
                <path d="M 488,32 L 488,496" fill="none" stroke="black"/>
                <path d="M 608,32 L 608,496" fill="none" stroke="black"/>
                <path d="M 8,32 L 608,32" fill="none" stroke="black"/>
                <path d="M 8,78 L 608,78" fill="none" stroke="black"/>
                <path d="M 8,82 L 608,82" fill="none" stroke="black"/>
                <path d="M 8,128 L 608,128" fill="none" stroke="black"/>
                <path d="M 8,192 L 608,192" fill="none" stroke="black"/>
                <path d="M 8,240 L 608,240" fill="none" stroke="black"/>
                <path d="M 8,288 L 608,288" fill="none" stroke="black"/>
                <path d="M 8,336 L 608,336" fill="none" stroke="black"/>
                <path d="M 8,384 L 608,384" fill="none" stroke="black"/>
                <path d="M 8,432 L 608,432" fill="none" stroke="black"/>
                <path d="M 8,496 L 608,496" fill="none" stroke="black"/>
                <g class="text">
                  <text x="48" y="52">Content</text>
                  <text x="232" y="52">Content</text>
                  <text x="304" y="52">Media</text>
                  <text x="444" y="52">ID</text>
                  <text x="536" y="52">Reference</text>
                  <text x="44" y="68">Format</text>
                  <text x="228" y="68">Coding</text>
                  <text x="300" y="68">Type</text>
                  <text x="68" y="100">application/</text>
                  <text x="208" y="100">-</text>
                  <text x="308" y="100">[[link</text>
                  <text x="348" y="100">to</text>
                  <text x="388" y="100">9.15]]</text>
                  <text x="452" y="100">TBD3</text>
                  <text x="524" y="100">[[this</text>
                  <text x="76" y="116">cose-c509-cert</text>
                  <text x="556" y="116">document]]</text>
                  <text x="68" y="148">application/</text>
                  <text x="524" y="148">[[this</text>
                  <text x="80" y="164">cose-c509-cert;</text>
                  <text x="208" y="164">-</text>
                  <text x="308" y="164">[[link</text>
                  <text x="348" y="164">to</text>
                  <text x="388" y="164">9.15]]</text>
                  <text x="456" y="164">TBD15</text>
                  <text x="556" y="164">document]]</text>
                  <text x="40" y="180">usage</text>
                  <text x="72" y="180">=</text>
                  <text x="104" y="180">chain</text>
                  <text x="68" y="212">application/</text>
                  <text x="208" y="212">-</text>
                  <text x="308" y="212">[[link</text>
                  <text x="348" y="212">to</text>
                  <text x="388" y="212">9.15]]</text>
                  <text x="452" y="212">TBD4</text>
                  <text x="524" y="212">[[this</text>
                  <text x="84" y="228">cose-c509-pkcs10</text>
                  <text x="556" y="228">document]]</text>
                  <text x="68" y="260">application/</text>
                  <text x="208" y="260">-</text>
                  <text x="308" y="260">[[link</text>
                  <text x="348" y="260">to</text>
                  <text x="388" y="260">9.15]]</text>
                  <text x="456" y="260">TBD19</text>
                  <text x="524" y="260">[[this</text>
                  <text x="100" y="276">cose-c509-crtemplate</text>
                  <text x="556" y="276">document]]</text>
                  <text x="68" y="308">application/</text>
                  <text x="208" y="308">-</text>
                  <text x="308" y="308">[[link</text>
                  <text x="348" y="308">to</text>
                  <text x="388" y="308">9.15]]</text>
                  <text x="456" y="308">TBD10</text>
                  <text x="524" y="308">[[this</text>
                  <text x="88" y="324">cose-c509-privkey</text>
                  <text x="556" y="324">document]]</text>
                  <text x="68" y="356">application/</text>
                  <text x="208" y="356">-</text>
                  <text x="308" y="356">[[link</text>
                  <text x="348" y="356">to</text>
                  <text x="388" y="356">9.15]]</text>
                  <text x="456" y="356">TBD11</text>
                  <text x="524" y="356">[[this</text>
                  <text x="72" y="372">cose-c509-pem</text>
                  <text x="556" y="372">document]]</text>
                  <text x="68" y="404">application/</text>
                  <text x="208" y="404">-</text>
                  <text x="308" y="404">[[link</text>
                  <text x="348" y="404">to</text>
                  <text x="388" y="404">9.15]]</text>
                  <text x="456" y="404">TBD16</text>
                  <text x="524" y="404">[[this</text>
                  <text x="72" y="420">cose-certhash</text>
                  <text x="556" y="420">document]]</text>
                  <text x="68" y="452">application/</text>
                  <text x="524" y="452">[[this</text>
                  <text x="76" y="468">cose-certhash;</text>
                  <text x="208" y="468">-</text>
                  <text x="308" y="468">[[link</text>
                  <text x="348" y="468">to</text>
                  <text x="388" y="468">9.15]]</text>
                  <text x="456" y="468">TBD17</text>
                  <text x="556" y="468">document]]</text>
                  <text x="40" y="484">usage</text>
                  <text x="72" y="484">=</text>
                  <text x="100" y="484">c509</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+----------------------+---------+------------------+-------+--------------+
| Content              | Content | Media            | ID    | Reference    |
| Format               | Coding  | Type             |       |              |
+======================+=========+==================+=======+==============+
| application/         | -       | [[link to 9.15]] | TBD3  | [[this       |
| cose-c509-cert       |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         |         |                  |       | [[this       |
| cose-c509-cert;      | -       | [[link to 9.15]] | TBD15 |   document]] |
| usage = chain        |         |                  |       |              |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD4  | [[this       |
| cose-c509-pkcs10     |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD19 | [[this       |
| cose-c509-crtemplate |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD10 | [[this       |
| cose-c509-privkey    |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD11 | [[this       |
| cose-c509-pem        |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         | -       | [[link to 9.15]] | TBD16 | [[this       |
| cose-certhash        |         |                  |       |   document]] |
+----------------------+---------+------------------+-------+--------------+
| application/         |         |                  |       | [[this       |
| cose-certhash;       | -       | [[link to 9.15]] | TBD17 |   document]] |
| usage = c509         |         |                  |       |              |
+----------------------+---------+------------------+-------+--------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry in the registry group "Transport Layer Security (TLS) Extensions". The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. For TLS 1.3, the C509 certificate type is defined as a new case in the CertificateEntry struct specified in <xref section="4.4.2" sectionFormat="of" target="RFC8446"/>:</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="64" width="248" viewBox="0 0 248 64" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <g class="text">
                <text x="20" y="36">case</text>
                <text x="64" y="36">C509:</text>
                <text x="44" y="52">opaque</text>
                <text x="160" y="52">c509_data&lt;1..2^24-1&gt;;</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
case C509:
  opaque c509_data<1..2^24-1>;
]]></artwork>
        </artset>
        <t>where c509_data is the CBOR sequence ~C509Certificate (an unwrapped C509Certificate). For TLS 1.2 the same construction is applied with a similar union type defined for the Certificate struct in <xref section="7.4.2" sectionFormat="of" target="RFC5246"/>. Note that, similar to COSE_C509, the TLS handshake contains the length of each certificate. The TLS extensions client_certificate_type and server_certificate_type <xref target="RFC7250"/> are used to negotiate the use of C509.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,96" fill="none" stroke="black"/>
              <path d="M 336,32 L 336,96" fill="none" stroke="black"/>
              <path d="M 552,32 L 552,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="100" y="52">Name</text>
                <text x="280" y="52">Recommended</text>
                <text x="376" y="52">Comment</text>
                <text x="44" y="84">TBD5</text>
                <text x="100" y="84">C509</text>
                <text x="168" y="84">Certificate</text>
                <text x="320" y="84">N</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           N |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="tlsa">
        <name>TLSA Selectors Registry</name>
        <t>This document registers the following entry in the "TLSA Selectors" registry in the registry group "DNS-Based Authentication of Named Entities (DANE) Parameters". The C509 certificate data, C509CertData, is defined in <xref target="cose-header-params"/>.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="520" viewBox="0 0 520 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
              <path d="M 352,32 L 352,96" fill="none" stroke="black"/>
              <path d="M 512,32 L 512,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 512,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 512,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 512,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 512,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="112" y="52">Acronym</text>
                <text x="200" y="52">Short</text>
                <text x="272" y="52">Description</text>
                <text x="432" y="52">Reference</text>
                <text x="44" y="84">TBD7</text>
                <text x="124" y="84">C509</text>
                <text x="180" y="84">C509</text>
                <text x="248" y="84">certificate</text>
                <text x="316" y="84">data</text>
                <text x="388" y="84">[[this</text>
                <text x="460" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+---------+------------------------+-------------------+
| Value | Acronym |   Short Description    |     Reference     |
+=======+=========+========================+===================+
|  TBD7 |    C509 | C509 certificate data  | [[this document]] |
+-------+---------+------------------------+-------------------+
]]></artwork>
        </artset>
        <t>The TLSA selectors registry defined in <xref target="RFC6698"/> originally only applied to PKIX <xref target="RFC5280"/> certificates in DER encoding. This specification updates <xref target="RFC6698"/> to accept the use of C509 certificates.</t>
      </section>
      <section anchor="edhoc-authentication-credential-types-registry">
        <name>EDHOC Authentication Credential Types Registry</name>
        <t>This document registers the following entry in the "EDHOC Authentication Credential Types" registry in the registry group "Ephemeral Diffie-Hellman Over COSE (EDHOC)". This is useful to identify C509 certificates as a supported authentication credential type to use with EDHOC <xref target="RFC9528"/>, for example, during discovery of EDHOC resources, see <xref target="RFC9668"/>.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="424" viewBox="0 0 424 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 256,32 L 256,96" fill="none" stroke="black"/>
              <path d="M 416,32 L 416,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 416,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 416,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 416,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 416,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="128" y="52">Description</text>
                <text x="336" y="52">Reference</text>
                <text x="40" y="84">3</text>
                <text x="100" y="84">C509</text>
                <text x="168" y="84">certificate</text>
                <text x="292" y="84">[[this</text>
                <text x="364" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+----------------------+-------------------+
| Value | Description          |     Reference     |
+=======+======================+===================+
|   3   | C509 certificate     | [[this document]] |
+-------+----------------------+-------------------+
]]></artwork>
        </artset>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2985">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5958">
          <front>
            <title>Asymmetric Key Packages</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document defines the syntax for private-key information and a content type for it. Private-key information includes a private key for a specified public-key algorithm and a set of attributes. The Cryptographic Message Syntax (CMS), as defined in RFC 5652, can be used to digitally sign, digest, authenticate, or encrypt the asymmetric key format content type. This document obsoletes RFC 5208. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5958"/>
          <seriesInfo name="DOI" value="10.17487/RFC5958"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC8360">
          <front>
            <title>Resource Public Key Infrastructure (RPKI) Validation Reconsidered</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="C. Martinez" initials="C." surname="Martinez"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="D. Shaw" initials="D." surname="Shaw"/>
            <date month="April" year="2018"/>
            <abstract>
              <t>This document specifies an alternative to the certificate validation procedure specified in RFC 6487 that reduces aspects of operational fragility in the management of certificates in the Resource Public Key Infrastructure (RPKI), while retaining essential security features.</t>
              <t>The procedure specified in RFC 6487 requires that Resource Certificates are rejected entirely if they are found to overclaim any resources not contained on the issuing certificate, whereas the validation process defined here allows an issuing Certification Authority (CA) to chose to communicate that such Resource Certificates should be accepted for the intersection of their resources and the issuing certificate.</t>
              <t>It should be noted that the validation process defined here considers validation under a single trust anchor (TA) only. In particular, concerns regarding overclaims where multiple configured TAs claim overlapping resources are considered out of scope for this document.</t>
              <t>This choice is signaled by a set of alternative Object Identifiers (OIDs) per "X.509 Extensions for IP Addresses and AS Identifiers" (RFC 3779) and "Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI)" (RFC 6484). It should be noted that in case these OIDs are not used for any certificate under a trust anchor, the validation procedure defined here has the same outcome as the procedure defined in RFC 6487.</t>
              <t>Furthermore, this document provides an alternative to Route Origin Authorization (ROA) (RFC 6482) and BGPsec Router Certificate (BGPsec PKI Profiles -- publication requested) validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8360"/>
          <seriesInfo name="DOI" value="10.17487/RFC8360"/>
        </reference>
        <reference anchor="RFC8398">
          <front>
            <title>Internationalized Email Addresses in X.509 Certificates</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov"/>
            <author fullname="W. Chuang" initials="W." role="editor" surname="Chuang"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a new name form for inclusion in the otherName field of an X.509 Subject Alternative Name and Issuer Alternative Name extension that allows a certificate subject to be associated with an internationalized email address.</t>
              <t>This document updates RFC 5280.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8398"/>
          <seriesInfo name="DOI" value="10.17487/RFC8398"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="RFC9883">
          <front>
            <title>An Attribute for Statement of Possession of a Private Key</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>This document specifies an attribute for a statement of possession of a private key by a certificate subject. As part of X.509 certificate enrollment, a Certification Authority (CA) typically demands proof that the subject possesses the private key that corresponds to the to-be-certified public key. In some cases, a CA might accept a signed statement from the certificate subject. For example, when a certificate subject needs separate certificates for signature and key establishment, a statement that can be validated with the previously issued signature certificate for the same subject might be adequate for subsequent issuance of the key establishment certificate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9883"/>
          <seriesInfo name="DOI" value="10.17487/RFC9883"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="X.501" target="https://www.itu.int/rec/T-REC-X.501/en">
          <front>
            <title>Information Technology - Open Systems Interconnection - The Directory: Models, ITU-T X.501</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>ASN.1 encoding rules. Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7468">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Daniel Migault" initials="D." surname="Migault">
              <organization>Ericsson</organization>
            </author>
            <date day="20" month="February" year="2026"/>
            <abstract>
              <t>   RFC 7925 offers guidance to developers on using TLS/DTLS 1.2 for
   Internet of Things (IoT) devices with resource constraints.  This
   document is a companion to RFC 7925, defining TLS/DTLS 1.3 profiles
   for IoT devices.  Additionally, it updates RFC 7925 with respect to
   the X.509 certificate profile and ciphersuite requirements.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/thomas-fossati/draft-tls13-iot.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-19"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="17" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a "compact" version of TLS 1.3 and DTLS 1.3.
   It saves bandwidth by trimming obsolete material, tighter encoding, a
   template-based specialization technique, and alternative
   cryptographic techniques. cTLS is not directly interoperable with TLS
   1.3 or DTLS 1.3 since the over-the-wire framing is different.  A
   single server can, however, offer cTLS alongside TLS or DTLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-rfc7030-csrattrs">
          <front>
            <title>Clarification and enhancement of RFC7030 CSR Attributes definition</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens</organization>
            </author>
            <author fullname="Dan Harkins" initials="D." surname="Harkins">
              <organization>The Industrial Lounge</organization>
            </author>
            <date day="28" month="June" year="2025"/>
            <abstract>
              <t>   This document updates RFC7030, Enrollment over Secure Transport
   (EST), clarifying how the Certificate Signiing Request (CSR)
   Attributes Response can be used by an EST server to specify both CSR
   attribute Object IDs (OID) and also CSR attribute values, in
   particular X.509 extension values, that the server expects the client
   to include in subsequent CSR request.  RFC9148 is derived from
   RFC7030, and it is also updated.

   RFC7030 (EST) is ambiguous in its specification of the CSR Attributes
   Response.  This has resulted in implementation challenges and
   implementor confusion.  As a result, there was not universal
   understanding of what was specified.  This document clarifies the
   encoding rules.

   This document therefore also provides a new straightforward approach:
   using a template for CSR contents that may be partially filled in by
   the server.  This also allows an EST server to specify a subject
   Distinguished Name (DN).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc7030-csrattrs-23"/>
        </reference>
        <reference anchor="I-D.bormann-cbor-notable-tags">
          <front>
            <title>Notable CBOR Tags</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="25" month="February" year="2026"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949) is a data
   format whose design goals include the possibility of extremely small
   code size, fairly small message size, and extensibility without the
   need for version negotiation.

   In CBOR, one point of extensibility is the definition of CBOR tags.
   RFC 8949's original edition, RFC 7049, defined a basic set of 16 tags
   as well as a registry that can be used to contribute additional tag
   definitions [IANA.cbor-tags].  Since RFC 7049 was published, at the
   time of writing some 250 definitions of tags and ranges of tags have
   been added to that registry.

   The present document provides a roadmap to a large subset of these
   tag definitions.  Where applicable, it points to an IETF standards or
   standard development document that specifies the tag.  Where no such
   document exists, the intention is to collect specification
   information from the sources of the registrations.  After some more
   development, the present document is intended to be useful as a
   reference document for the IANA registrations of the CBOR tags the
   definitions of which have been collected.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-notable-tags-16"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-macaddress-on">
          <front>
            <title>Media Access Control (MAC) Addresses in X.509 Certificates</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Corey Bonnell" initials="C." surname="Bonnell">
              <organization>DigiCert, Inc.</organization>
            </author>
            <author fullname="Joe Mandel" initials="J." surname="Mandel">
              <organization>AKAYLA, Inc.</organization>
            </author>
            <author fullname="Tomofumi Okubo" initials="T." surname="Okubo">
              <organization>Penguin Securities Pte. Ltd.</organization>
            </author>
            <author fullname="Michael StJohns" initials="M." surname="StJohns">
              <organization>NthPermutation Security LLC</organization>
            </author>
            <date day="18" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a new GeneralName.otherName for inclusion in
   the X.509 Subject Alternative Name (SAN) and Issuer Alternative Name
   (IAN) extensions to carry an IEEE Media Access Control (MAC) address.
   The new name form makes it possible to bind a layer-2 interface
   identifier to a public key certificate.  Additionally, this document
   defines how constraints on this name form can be encoded and
   processed in the X.509 Name Constraints extension (NCE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-macaddress-on-06"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 2.1.4"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 3.8.0"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/solutions-and-impact/technologies/esim/wp-content/uploads/2025/01/SGP.14-v2.2.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.2</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="https://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
        <reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
            <author initials="E." surname="Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
        </reference>
      </references>
    </references>
    <?line 2461?>

<section anchor="appA">
      <name>C509 Certificate Examples</name>
      <section anchor="rfc7925-prof">
        <name>Example: RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example: C509 Certificate Encoding</name>
          <t>This section shows the C509 encoding of the X.509 certificate in the previous section. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <t><xref target="fig-CBOR-diagnostic-7925"/> shows the diagnostic notation of the unwrapped CBOR sequence, ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-CBOR-diagnostic-7925">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  3,                   / version and certificate type /
  h'01f50d',           / serialNumber /
  0,                   / signatureAlgorithm /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  48(h'0123456789AB'), / subject, EUI-64 /
  1,                   / subjectPublicKeyAlgorithm /
  h'FEB1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,                   / single extension:
                         non-critical keyUsage
                         digitalSignature /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-7925"/> shows the plain hex format of the unwrapped CBOR sequence, the size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-7925">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
03
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 FE B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16
]]></artwork>
          </figure>
        </section>
        <section anchor="example-native">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>This section shows the natively signed C509 certificate corresponding to that of the previous section, which is identical except for c509CertificateType, encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <t><xref target="fig-CBOR-diagnostic-native"/> shows the diagnostic notation of the natively signed unwrapped CBOR sequence, ~C509Certificate.</t>
          <figure anchor="fig-CBOR-diagnostic-native">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  2,
  h'01f50d',
  0,
  "RFC test CA",
  1672531200,
  1767225600,
  48(h'0123456789AB'),
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  h'EB0D472731F689BC00F5880B12C68B3F9FD38B23FADFCA2095
    0F3F241B60A202579CAC28CD3B7494D5FA5D8BBAB4600357E5
    50AB9FA9A65D9BA2B3B82E668CC6'
]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-native"/> shows the plain hex format of the natively signed unwrapped CBOR sequence, the size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-native">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
        </section>
        <section anchor="app-DH-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate keyUsage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used to sign a certificate request.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstrass) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
        <section anchor="other-examples">
          <name>Examples: C509Certificate and C509CertData</name>
          <t>This section examplifies other CBOR objects defined in this specification, based on the natively signed C509 certificate in <xref target="example-native"/>.</t>
          <t><xref target="fig-C509Certificate"/> shows the encoding of the corresponding C509Certificate, i.e., the CBOR array wrapping of the CBOR sequence ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-C509Certificate">
            <name>C509Certificate: The CBOR array wrapping of ~C509Certificate</name>
            <artwork><![CDATA[
8B
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509Certificate is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 8B (which indicates that it is a CBOR array with 11 elements).</t>
          <t><xref target="fig-C509CertData"/> shows the encoding of the corresponding C509CertData, i.e., the CBOR byte string wrapping of the CBOR sequence ~C509Certificate, see <xref target="cose-header-params"/>.</t>
          <figure anchor="fig-C509CertData">
            <name>C509CertData: CBOR byte string wrapping of ~C509Certificate.</name>
            <artwork><![CDATA[
58 8C
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509CertData is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 58 8C (which indicates that it is a CBOR byte string of 140 bytes).</t>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example: IEEE 802.1AR profiled X.509 Certificate</name>
        <t>An example of an IEEE 802.1AR profiled X.509 certificate (Secure Device Identifier, DevID) is provided in Appendix C.2 of <xref target="RFC9148"/>. The certificate is shown below including details of the hardwareModuleName type of otherName in subjectAltName, see <xref target="ext-encoding"/>.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 9112578475118446130 (0x7e7661d7b54e4632)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: C=US, ST=CA, O=Example Inc, OU=certification, CN=802.1AR CA
        Validity
            Not Before: Jan 31 11:29:16 2019 GMT
            Not After : Dec 31 23:59:59 9999 GMT
        Subject: C=US, ST=CA, L=LA, O=example Inc, OU=IoT/serialNumber=Wt1234
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:c8:b4:21:f1:1c:25:e4:7e:3a:c5:71:23:bf:2d:
                    9f:dc:49:4f:02:8b:c3:51:cc:80:c0:3f:15:0b:f5:
                    0c:ff:95:8d:75:41:9d:81:a6:a2:45:df:fa:e7:90:
                    be:95:cf:75:f6:02:f9:15:26:18:f8:16:a2:b2:3b:
                    56:38:e5:9f:d9
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Subject Key Identifier:
                96:60:0D:87:16:BF:7F:D0:E7:52:D0:AC:76:07:77:AD:66:5D:02:A0
            X509v3 Authority Key Identifier:
                68:D1:65:51:F9:51:BF:C8:2A:43:1D:0D:9F:08:BC:2D:20:5B:11:60
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Subject Alternative Name:
                otherName:
                    type-id: 1.3.6.1.5.5.7.8.4 (id-on-hardwareModuleName)
                    value:
                        hwType: 1.3.6.1.4.1.6715.10.1
                        hwSerialNum: 01:02:03:04
    Signature Algorithm: ecdsa-with-SHA256
    Signature Value:
        30:46:02:21:00:c0:d8:19:96:d2:50:7d:69:3f:3c:48:ea:a5:
        ee:94:91:bd:a6:db:21:40:99:d9:81:17:c6:3b:36:13:74:cd:
        86:02:21:00:a7:74:98:9f:4c:32:1a:5c:f2:5d:83:2a:4d:33:
        6a:08:ad:67:df:20:f1:50:64:21:18:8a:0a:de:6d:34:92:36
]]></artwork>
        <t>The DER encoding of the certificate is 577 bytes:</t>
        <artwork><![CDATA[
30 82 02 3D 30 82 01 E2 A0 03 02 01 02 02 08 7E 76 61 D7 B5 4E 46 32
30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 5D 31 0B 30 09 06 03 55 04 06
13 02 55 53 31 0B 30 09 06 03 55 04 08 0C 02 43 41 31 14 30 12 06 03
55 04 0A 0C 0B 45 78 61 6D 70 6C 65 20 49 6E 63 31 16 30 14 06 03 55
04 0B 0C 0D 63 65 72 74 69 66 69 63 61 74 69 6F 6E 31 13 30 11 06 03
55 04 03 0C 0A 38 30 32 2E 31 41 52 20 43 41 30 20 17 0D 31 39 30 31
33 31 31 31 32 39 31 36 5A 18 0F 39 39 39 39 31 32 33 31 32 33 35 39
35 39 5A 30 5C 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0B 30 09 06
03 55 04 08 0C 02 43 41 31 0B 30 09 06 03 55 04 07 0C 02 4C 41 31 14
30 12 06 03 55 04 0A 0C 0B 65 78 61 6D 70 6C 65 20 49 6E 63 31 0C 30
0A 06 03 55 04 0B 0C 03 49 6F 54 31 0F 30 0D 06 03 55 04 05 13 06 57
74 31 32 33 34 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48
CE 3D 03 01 07 03 42 00 04 C8 B4 21 F1 1C 25 E4 7E 3A C5 71 23 BF 2D
9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C FF 95 8D 75 41 9D 81
A6 A2 45 DF FA E7 90 BE 95 CF 75 F6 02 F9 15 26 18 F8 16 A2 B2 3B 56
38 E5 9F D9 A3 81 8A 30 81 87 30 09 06 03 55 1D 13 04 02 30 00 30 1D
06 03 55 1D 0E 04 16 04 14 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07
77 AD 66 5D 02 A0 30 1F 06 03 55 1D 23 04 18 30 16 80 14 68 D1 65 51
F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20 5B 11 60 30 0E 06 03 55 1D 0F
01 01 FF 04 04 03 02 05 A0 30 2A 06 03 55 1D 11 04 23 30 21 A0 1F 06
08 2B 06 01 05 05 07 08 04 A0 13 30 11 06 09 2B 06 01 04 01 B4 3B 0A
01 04 04 01 02 03 04 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 30
46 02 21 00 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 02 21 00 A7 74 98 9F 4C 32 1A
5C F2 5D 83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34
92 36
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

 3,
 h'7E7661D7B54E4632',
 0,
 [
  -4, "US",
   6, "CA",
   8, "Example Inc",
   9, "certification",
   1, "802.1AR CA"
 ],
 1548934156,
 null,
 [
  -4, "US",
   6, "CA",
   5, "LA",
   8, "example Inc",
   9, "IoT",
  -3, "Wt1234"
 ],
 1,
 h'FDC8B421F11C25E47E3AC57123BF2D9FDC494F028BC351CC80C03F150BF50CFF95',
 [
   4, -2,
   1, h'96600D8716BF7FD0E752D0AC760777AD665D02A0',
   7, h'68D16551F951BFC82A431D0D9F08BC2D205B1160',
  -2, 5,
  3, [-1, [h'2B06010401B43B0A01', h'01020304']]
     / subjectAltName with hardwareModuleName /
 ],
 h'C0D81996D2507D693F3C48EAA5EE9491BDA6DB214099D98117C63B361374CD86A7
   74989F4C321A5CF25D832A4D336A08AD67DF20F1506421188A0ADE6D349236'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 275 bytes:</t>
          <artwork><![CDATA[
03 48 7E 76 61 D7 B5 4E 46 32 00 8A 23 62 55 53 06 62 43 41 08 6B 45
78 61 6D 70 6C 65 20 49 6E 63 09 6D 63 65 72 74 69 66 69 63 61 74 69
6F 6E 01 6A 38 30 32 2E 31 41 52 20 43 41 1A 5C 52 DC 0C F6 8C 23 62
55 53 06 62 43 41 05 62 4C 41 08 6B 65 78 61 6D 70 6C 65 20 49 6E 63
09 63 49 6F 54 22 66 57 74 31 32 33 34 01 58 21 FD C8 B4 21 F1 1C 25
E4 7E 3A C5 71 23 BF 2D 9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5
0C FF 95 8A 04 21 01 54 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07 77
AD 66 5D 02 A0 07 54 68 D1 65 51 F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D
20 5B 11 60 21 05 03 82 20 82 49 2B 06 01 04 01 B4 3B 0A 01 44 01 02
03 04 58 40 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 A7 74 98 9F 4C 32 1A 5C F2 5D
83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34 92 36
]]></artwork>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example: CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'047FA1E31928EE403BA0B83A395673FC',
0,
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'FD963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
     "http://crl4.digicert.com/CloudflareIncECCCA-3.crl"],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],  2],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    77922190,
    0,
    h'F8D1B4A93D2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668
    29FF5A34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    77922238,
    0,
    h'E891C197BFB0E3D30CB6CEE60D94C3C75FD1175336931108D89812D4D29D81D0
    A159D16C4647D1483757FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
    ]
],
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 783 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example: CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'A6A55C870E39B40E',
23,
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, ["http://crl.starfieldtech.com/sfig2s1-242.crl"],
 6, [ h'6086480186fd6e01071701',
      [1, "http://certificates.starfieldtech.com/repository/"], 1 ],
 9, [ 1, "http://ocsp.starfieldtech.com/",
      2, "http://certificates.starfieldtech.com/repository/sfig2.crt" ],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
10, [
    h'F65C942FD1773022145418083094568EE34D131933BFDF0C2F200BCC4EF164E3',
    1715,
    0,
    h'8CF54852CE5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F
      BCA2254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE6454995',
    h'5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA',
    2012,
    0,
    h'A5E0906E63E91D4FDDEFFF0352B91E50896007564B448A3828F596DC6B28726D
      FC91EAED02168866054EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
    ]
],
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1245 bytes.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Corey Bonnell, Carsten Bormann, Russ Housley, Olle Johansson, Benjamin Kaduk, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Rene Struik, Fraser Tweedale, and Paul Wouters for reviewing and commenting on intermediate versions of the draft and help with GitHub.</t>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Special acknowledgement goes to Lijun Liao for his careful review and many detailed improvement proposals.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
