<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-18" category="std" consensus="true" submissionType="IETF" updates="6698" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-18"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>University of Glasgow</organization>
      <address>
        <email>shahid.raza@glasgow.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>IN Groupe</organization>
      <address>
        <email>martin.furuhed@ingroupe.com</email>
      </address>
    </author>
    <author initials="L." surname="Liao" fullname="Lijun Liao">
      <organization>NIO</organization>
      <address>
        <email>lijun.liao@nio.io</email>
      </address>
    </author>
    <date year="2026" month="April" day="22"/>
    <abstract>
      <?line 223?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 certificates. The CBOR encoding supports a large subset of RFC 5280, common certificate profiles and is extensible.</t>
      <t>Two types of C509 certificates are defined. One type is an invertible CBOR re-encoding of DER-encoded X.509 certificates with the signature field copied from the DER encoding. The other type is identical except that the signature is over the CBOR encoding instead of the DER encoding, avoiding the use of ASN.1. Both types of certificates have the same semantics as X.509 and the same reduced size compared to X.509.</t>
      <t>The document also specifies CBOR encoded data structures for certificate (signing) requests and certification request templates, new COSE headers, as well as a TLS certificate type and a file format for C509. This document updates RFC 6698; the TLSA selectors registry is extended to include C509 certificates.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 231?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40–50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and Resource Public Key Infrastructure (RPKI) <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are, therefore, desirable in many use cases.</t>
      <t>X.509 certificates are defined with Abstract Syntax Notation One (ASN.1) and encoded using the Distinguished Encoding Rules (DER) <xref target="X.690"/>. This document specifies an alternative encoding of X.509 certificates, using the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/>, initially proposed in <xref target="X.509-IoT"/>. The use of a more compact encoding  reduces the certificate size, which has known performance benefits in terms of decreased communication overhead, power consumption, latency, storage, etc. The re-encoding of X.509 is called C509 and the resulting certificates are termed C509 certificates. C509 is not a general CBOR encoding for ASN.1 data structures.</t>
      <t>CBOR is a data format designed for small code size and small message size to support systems with very limited memory, processor power, and instruction sets. CBOR builds on the JSON data model but extends it by, e.g., encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is readable and editable by humans, simplifying development and debugging. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. <xref target="RFC8610"/> also extends the diagnostic notation. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. Implementors can get familiar with CBOR by using the CBOR playground <xref target="CborMe"/>.</t>
      <t>The C509 encoding supports a large subset of <xref target="RFC5280"/> and all certificates compatible with the <xref target="RFC7925"/>, IEEE 802.1AR (DevID) <xref target="IEEE-802.1AR"/>, CAB Baseline <xref target="CAB-TLS"/>,  <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, Wi-SUN <xref target="Wi-SUN"/>, and eUICC <xref target="GSMA-eUICC"/> profiled X.509 certificates, and is designed to render a compact encoding of certificates used in constrained environments.  This document does not specify a certificate profile.</t>
      <t>CAB Baseline Requirements <xref target="CAB-TLS"/>, <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, and CNSA 1.0 <xref target="RFC8603"/> specify certificate profiles which can be applied to certificate-based authentication with, e.g., TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/>, EDHOC <xref target="RFC9528"/>, or Compact TLS 1.3 <xref target="I-D.ietf-tls-ctls"/>. <xref target="RFC7925"/>, RFC7925bis <xref target="I-D.ietf-uta-tls13-iot-profile"/>, and IEEE 802.1AR <xref target="IEEE-802.1AR"/> specifically target IoT deployments.</t>
      <t>At the time of publishing there are several implementations of C509 targeting, e.g., in-vehicle and vehicle-to-cloud communication, Uncrewed Aircraft Systems (UAS), and Global Navigation Satellite System (GNSS). When used to re-encode DER-encoded X.509 certificates, the CBOR encoding can reduce the size of <xref target="RFC7925"/>-profiled certificates by over 50%, see <xref target="appA"/>.</t>
      <t>C509 is designed to be extensible to additional features of X.509, for example, support for new algorithms, including new Post-Quantum (PQ) algorithms, which can be registered in the IANA registry as they become specified, see <xref target="sigalg"/>.</t>
      <t>This document defines two types of C509 using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER-encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER-encoded X.509 certificate. Due to the widespread deployment of X.509, it is necessary to allow backward compatibility.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER-encoded X.509.</t>
        </li>
      </ol>
      <t>Natively signed C509 certificates can be applied in devices that are only required to authenticate to natively signed C509 certificate compatible servers, which is not a major restriction for many IoT deployments where the parties issuing and verifying certificates can be a restricted ecosystem.</t>
      <t>This document also specifies C509 Certification Requests, see <xref target="CSR"/>; COSE headers for use of the C509 certificates with COSE, see <xref target="cose"/>; a TLS certificate type for use of the C509 certificates with TLS and QUIC (with or without additional TLS certificate compression), see <xref target="tls"/>; and a C509 file format. The TLSA selectors registry is extended to include C509 certificates, thus this document updates <xref target="RFC6698"/>.</t>
    </section>
    <section anchor="notation">
      <name>Notational Conventions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This specification makes use of the terminology in <xref target="RFC2986"/>, <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections <xref target="RFC8949" section="4.2.1" sectionFormat="bare"/> and <xref target="RFC8949" section="4.2.2" sectionFormat="bare"/> of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding for C509 certificates, with the overall objective to produce a very compact representation supporting large parts of <xref target="RFC5280"/>, and everything in <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>.</t>
      <t>In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OID are replaced with short integers or complemented with CBOR OID encoding <xref target="RFC9090"/>, and redundant encoding is removed. Combining these different components reduces the certificate size significantly, which is not possible with general purpose compression algorithms, see <xref target="fig-size-TLS"/>.</t>
      <t>The C509 certificate can be either a CBOR re-encoding of a DER-encoded X.509 certificate, in which case the signature is calculated on the DER-encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR encoded data. In both cases the certificate content is adhering to the restrictions given by <xref target="RFC5280"/>. The re-encoding is known to work with DER-encoded certificates but might work with other canonical encodings. The re-encoding does not work for BER encoded certificates.</t>
      <t>In the encoding described below, the elements in arrays are always encoded in the same order as elements of the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>The X.509 fields and their CBOR encodings are described in this section, and used in the definition of C509 certificates, see <xref target="fig-CBORCertCDDL"/>. While much of <xref target="RFC5280"/> encodings used in practice is supported, there are a few instances indicated with "not supported" where no alternative is provided and hence no C509 encoding can be generated.</t>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR Sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore only have documentary value. Applications not requiring a CBOR item <bcp14>MAY</bcp14> represent C509 certificates with the CBOR sequence ~C509Certificate (unwrapped C509Certificate). Examples are given in the appendices, e.g., <xref target="rfc7925-prof"/>.</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
   issuer: Name / null,
   validityNotBefore: ~time,
   validityNotAfter: ~time / null,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   extensions: Extensions,
)

CertificateSerialNumber = ~biguint

Name = [ * RDNAttribute ] / SpecialText

RDNAttribute = (
    ( attributeType: int, attributeValue: SpecialText ) //
    ( attributeType: ~oid, attributeValue: bytes )
)

AlgorithmIdentifier = int / ~oid /
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = (
    ( extensionID: int, extensionValue: Defined ) //
    ( extensionID: ~oid, extensionValue: bytes / [ bytes ] )
)

SpecialText = text / bytes / tag

Defined = any .ne undefined

tag = #6
]]></sourcecode>
        </figure>
        <t>C509 certificates are defined in terms of DER-encoded X.509 certificates <xref target="RFC5280"/> as detailed in the following subsections.</t>
        <section anchor="version">
          <name>version</name>
          <t>The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Two types are defined in this document: natively signed C509 certificates, following X.509 v3 (c509CertificateType = 2); and CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 3), see <xref target="type"/>. The number of elements in TBSCertificate is fixed and determined by the type. Additional types may be added in the future.</t>
        </section>
        <section anchor="serialnumber">
          <name>serialNumber</name>
          <t>The 'serialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'certificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
        </section>
        <section anchor="signature">
          <name>signature</name>
          <t>The 'signature' field, containing the signature algorithm including parameters, is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
        </section>
        <section anchor="issuer">
          <name>issuer</name>
          <t>In the general case, the sequence of 'RDNAttribute' is encoded as a CBOR array consisting of RDNAttribute elements. RelativeDistinguishedName with more than one AttributeTypeAndValue is not supported. Each RDNAttribute is CBOR encoded as (type, value) either as a (int, SpecialText) pair, or a (~oid, bytes) tuple.</t>
          <t>In the former case, the absolute value of the int encodes the attribute type (see <xref target="fig-attrtype"/>) and the sign is used to represent the character string type in the X.509 certificate; positive for utf8String, negative for printableString. Attribute values which are always of type IA5String are unambiguously represented using a non-negative int. Examples include emailAddress and domainComponent (see <xref target="RFC5280"/>). In CBOR, all text strings are UTF-8 encoded and in natively signed C509 certificates all CBOR ints <bcp14>SHALL</bcp14> be non-negative. Text strings <bcp14>SHALL</bcp14> still adhere to any <xref target="RFC5280"/> restrictions. serialNumber <bcp14>SHALL</bcp14> only contain the 74-character subset of ASCII allowed by printableString and countryName <bcp14>SHALL</bcp14> have length 2. CBOR encoding is allowed for IA5String (if this is the only allowed type, e.g., emailAddress), printableString and utf8String, whereas the string types teletexString, universalString, and bmpString are not supported.</t>
          <t>The text strings are further optimized as follows:</t>
          <ul spacing="normal">
            <li>
              <t>If the text string has an even length <contact fullname="≥"/> 2 and contains only the symbols '0'–'9' or 'a'–'f', it is encoded as a CBOR byte string.</t>
            </li>
            <li>
              <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where each 'H' is one of the symbols '0'-'9' or 'A'-'F', it is encoded as a CBOR tagged MAC address using the CBOR tag 48, see <xref section="2.4" sectionFormat="of" target="RFC9542"/>. If of the form "HH-HH-HH-FF-FE-HH-HH-HH", it is encoded as a 48-bit MAC address, otherwise as a 64-bit MAC address. See example in <xref target="rfc7925-prof"/>.</t>
            </li>
            <li>
              <t>Otherwise, it is encoded as a CBOR text string.</t>
            </li>
          </ul>
          <t>The final encoding of the extension value may therefore be text, bytes, or tag, i.e., SpecialText. If Name contains a single 'common name' attribute with attributeType = +1, it is for compactness encoded as just the SpecialText containing the single attribute value.</t>
          <t>In natively signed C509 certificates, bytes and tag 48 do not correspond to any predefined text string encoding and may also be used for other attribute types.</t>
          <t>If the 'issuer' field is identical to the 'subject' field, e.g., in case of self-signed certificates, then the 'issuer' field <bcp14>MUST</bcp14> be encoded as the CBOR simple value null (0xf6).</t>
        </section>
        <section anchor="validity">
          <name>validity</name>
          <t>The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as the CBOR simple value null.</t>
        </section>
        <section anchor="subject">
          <name>subject</name>
          <t>The 'subject' field is encoded exactly like issuer, except that the CBOR simple value is not a valid value.</t>
        </section>
        <section anchor="subjectpublickeyinfo">
          <name>subjectPublicKeyInfo</name>
          <t>The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          <t>In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string, but may be encoded as a CBOR item of any type except undefined (see <xref target="CRT"/>). This specification assumes the BIT STRING has zero unused bits, and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
        </section>
        <section anchor="issueruniqueid">
          <name>issuerUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="subjectuniqueid">
          <name>subjectUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="ext-field">
          <name>extensions</name>
          <t>The 'extensions' field is encoded either as a CBOR array or as a CBOR int. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
          <t>Each 'extensionID' in the CBOR array is encoded either as a CBOR int (see <xref target="extype"/>) or as an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          <ul spacing="normal">
            <li>
              <t>If 'extensionID' is encoded as a CBOR int, it is followed by a CBOR item of any type except undefined (see <xref target="CRT"/>), and the sign of the int is used to encode if the extension is critical: Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign. If the CBOR array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage, see <xref target="ext-encoding"/>), the CBOR array is omitted and the extensions is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int.</t>
            </li>
            <li>
              <t>If extensionID is encoded as an unwrapped CBOR OID tag, it is followed by the DER-encoded extnValue encoded in the following way:  </t>
              <ul spacing="normal">
                <li>
                  <t>if the extension is non-critical, the extnValue OCTET STRING value field is encoded as a CBOR byte string;</t>
                </li>
                <li>
                  <t>if the extension is critical, the extnValue OCTET STRING value field is encoded as a CBOR byte string and further wrapped in a CBOR array consisting of only this element.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>The processing of critical and non-critical extensions is specified in <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
          <t>The currently defined extension values for which there is CBOR int encoded 'extensionID' are specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment.</t>
          <t>More details about extensions in <xref target="ext-encoding"/>.</t>
        </section>
        <section anchor="signaturealgorithm">
          <name>signatureAlgorithm</name>
          <t>The 'signatureAlgorithm' field is always the same as the 'signature' field and therefore omitted from the CBOR encoding.</t>
        </section>
        <section anchor="signaturevalue">
          <name>signatureValue</name>
          <t>In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes that the BIT STRING has zero unused bits, and the unused bits byte is omitted. For natively signed C509 certificates, the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/></t>
        </section>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted, and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e., [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent are omitted and subjectPublicKey consists of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstrass form (id-ecPublicKey), keys may be point compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstrass form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER-encoded certificate with an uncompressed public key of type id-ecPublicKey is CBOR encoded with point compression, then the octet 0xfe is used instead of 0x02 to represent an even y-coordinate, and the octet 0xfd is used instead of 0x03 to represent an odd y-coordinate.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>For ECDSA signatures, the SEQUENCE and INTEGER type and length fields as well as any leading 0x00 byte (to indicate that the number is not negative) are omitted. Each of the two INTEGER value fields are then padded with leading zeroes to the same fixed length, given by the number of bytes needed to represent the order n of the cyclic subgroup used with the algorithm. For example, for P-256, the number of bytes for each integer is 32. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>The 'extensions' field is encoded as specified in <xref target="ext-field"/> with further details provided in this section.</t>
        <t>For some extensions, the CBOR int encoded extensionID is only supported for commonly used values of the extension. In case of extension values for which the CBOR int encoded extensionID is not supported, the extension <bcp14>MUST</bcp14> be encoded using the unwrapped CBOR OID tag encoded extensionID.</t>
        <t>A note on extensionID naming: in existing OID databases, most IDs can be found in versions with and without an 'id-pe' or 'id-ce' prefix. We have excluded the prefix for the commonly used extensions defined in <xref target="RFC5280"/> and included them for extensions defined elsewhere.</t>
        <t>CBOR encoding of the following extension values is fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). In natively signed certificates, KeyIdentifier can, for example, be composed of the leftmost 160-bits of the SHA-256 hash of the CBOR encoded subjectPublicKey. Other methods of generating unique numbers can be used. The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="ext-field"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyUsage = uint
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: int/~oid, subjectDomainPolicy: int/~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyConstraints = [
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>), or unwrapped CBOR OID tags <xref target="RFC9090"/>, where each int or OID encodes a key usage purpose. If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the otherName with type-id id-on-hardwareModuleName, id-on-SmtpUTF8Mailbox and id-on-MACAddress have been given their own ints; such otherName are encoded as follows:
            </t>
            <ul spacing="normal">
              <li>
                <t>For id-on-hardwareModuleName, the value is a CBOR array [ hwType: ~oid, hwSerialNum: bytes ] as specified in <xref target="RFC4108"/>.</t>
              </li>
              <li>
                <t>For id-on-SmtpUTF8Mailbox, the value is a CBOR text as specified in <xref target="RFC8398"/>.</t>
              </li>
              <li>
                <t>For id-on-MACAddress, the value is a CBOR byte string containing 6 octets for EUI-48 and 8 octets for EUI-64 as specified in <xref target="I-D.ietf-lamps-macaddress-on"/>.</t>
              </li>
            </ul>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If all DistributionPoint elements contain the distributionPoint with fullName choice of uniformResourceIdentifier, optional reasons, and optional cRLIssuer with one directoryName, the extension value can be CBOR encoded. The 'reasons' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR uint. If the CRLDistributionPoints consists of only one DistributionPointName, which in turn has only the fullName field of type CBOR text, it shall be encoded as CBOR text, otherwise as CBOR array.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   DistributionPointName = [
     fullName  [ 2 * text ] / text,
     reasons   uint / null,
     cRLIssuer Name / null,
   ]

   CRLDistributionPoints = [ + DistributionPointName ] / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, certIssuer, and certSerialNumber or if only keyIdentifier is present the extension value can be CBOR encoded. If all three are present a CBOR array is used, if only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText are encoded as UTF8String, the extension value can be CBOR encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as an CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid,
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, [ * PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contain general names registered in <xref target="GN"/> the extension value can be CBOR encoded. C509 uses the same additions and restrictions as defined in <xref section="2.2" sectionFormat="of" target="RFC9549"/>. Note that the minimum and maximum fields are not used and therefore omitted. For IPv4 addresses, the iPAddress field <bcp14>MUST</bcp14> contain five octets and for IPv6 addresses, the field <bcp14>MUST</bcp14> contain 17 octets, where the last octet indicates the number of bits in the prefix. As an example, the address block 192.0.2.0/24 is encoded as C0 00 02 00 18 instead of C0 00 02 00 FF FF FF 00 as in the DER encoding.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralSubtrees = [ + GeneralName ]
   NameConstraints = [
     permittedSubtrees: GeneralSubtrees / null,
     excludedSubtrees: GeneralSubtrees / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
RDNAttributes = (
    ( attributeType: int, attributeValue: [ + SpecialText] ) //
    ( attributeType: ~oid, attributeValue: [+ bytes] )
)
   SubjectDirectoryAttributes = [ + RDNAttributes ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Identifiers (id-pe-autonomousSysIds). The X.509 extension AS Identifiers is specified in <xref target="RFC3779"/>. If rdi is not present, the extension value can be CBOR encoded. Each ASId is encoded as a CBOR uint. With the exception of the first ASId, the ASid is encoded as the difference to the previous ASid.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   ASIdOrRange = uint / [min:uint, max:uint]
   ASIdentifiers = [ + ASIdOrRange ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Identifiers v2 (id-pe-autonomousSysIds-v2). The X.509 extension AS Identifiers v2 is specified in <xref target="RFC8360"/>. The extension value is encoded exactly like in the extension "AS Identifiers".</t>
          </li>
          <li>
            <t>IPAddrBlocks (id-pe-ipAddrBlocks). The X.509 extension IPAddrBlocks is specified in <xref target="RFC3779"/>. The ASN.1 BIT STRING value of IPAddress is converted to a byte sequence defined as:  </t>
            <t><tt>
unusedBits || value
</tt>  </t>
            <t>
where unusedBits is a single octet indicating the number of unused bits in the final octet of the BIT STRING, and value is the sequence of octets containing the BIT STRING value. This byte sequence preserves the exact information contained in the ASN.1 BIT STRING.  </t>
            <t>
For each IPAddressFamily, the representation is selected as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>If inherit is present, <tt>null</tt> <bcp14>SHALL</bcp14> be used.</t>
              </li>
              <li>
                <t>Otherwise, if the byte sequence of any IPAddress (including addressPrefix, and the min and max fields of addressRange) exceeds 8 octets in length, the IPAddressChoice representation <bcp14>SHALL</bcp14> be used.</t>
              </li>
              <li>
                <t>Otherwise, the IntIPAddressChoice representation <bcp14>SHALL</bcp14> be used.</t>
              </li>
            </ul>
            <t>
For IntIPAddressChoice, IntAddressPrefix and the min and max values of IntAddressRange <bcp14>SHALL</bcp14> be encoded as big-endian integers representing the following byte sequence:  </t>
            <t><tt>
(unusedBits + 1) || value
</tt>  </t>
            <t>
The first byte is encoded as (unusedBits + 1) instead of unusedBits in order to guarantee a non-zero value. With the exception of the first IPAddress, each subsequent IPAddress <bcp14>SHALL</bcp14> be encoded as a CBOR integer representing the difference from the previous IPAddress.  </t>
            <t>
As specified in <xref target="RFC3779"/>, the IPAddressFamily element contains an Address Family Identifier (AFI) and, optionally, a Subsequent Address Family Identifier (SAFI). AFIs and SAFIs are defined in <xref target="IANA-AFI"/> and <xref target="IANA-SAFI"/>, respectively. The limitations specified in <xref target="RFC3779"/> apply here as well.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   IntAddressPrefix = int
   IntAddressRange  = [ min: int, max: int ]
   IntIPAddressOrRange = IntAddressPrefix / IntAddressRange
   IntIPAddressChoice  = [ + IntIPAddressOrRange ]

   AddressPrefix = bytes
   AddressRange  = [ min: bytes, max: bytes ]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice  = [ + IPAddressOrRange ]

   IPAddressFamily = (AFI: uint, SAFI: uint / null,
                      IntIPAddressChoice / IPAddressChoice / null)
   IPAddrBlocks = [ + IPAddressFamily ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IPAddrBlocks v2 (id-pe-ipAddrBlocks-v2). The X.509 extension IPAddrBlocks v2 is specified in <xref target="RFC8360"/>. The extension value is encoded exactly like in the extension "IPAddrBlocks".</t>
          </li>
          <li>
            <t>OCSP No Check (id-pkix-ocsp-nocheck). If the extension value is NULL, it can be CBOR encoded. The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>Precertificate Signing Certificate. The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>TLS Features (id-pe-tlsfeature). The extensionValue is encoded as an array of integers, where each integer represents a TLS extension.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   TLSFeatures = [* feature: uint]
]]></sourcecode>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature (0), nonRepudiation (1), keyEncipherment (2) and keyAgreement (4) asserted is encoded as the two CBOR ints 2, 23 (2<sup>0</sup> + 2<sup>1</sup> + 2<sup>2</sup> + 2<sup>4</sup> = 23).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 9 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 23, 8, [ 3, 9 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-params">
        <name>C509 COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, c5t, and c5u, defined in <xref target="iana-header"/> below, are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER-encoded X.509 and use a COSE_C509 structure instead of COSE_X509.</t>
        <t>The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
COSE_C509 = C509CertData / [ 2* C509CertData ]
C509CertData = bytes .cborseq C509Certificate
]]></sourcecode>
        <t>C509CertData thus includes the unwrapped CBOR sequence, ~C509Certificate. The byte string encoding includes the length of each certificate which simplifies parsing. See <xref target="other-examples"/> for an example.</t>
        <t>The COSE_C509 item has media type application/cose-c509-cert, see <xref target="c509-cert"/>. Different  CoAP Content-Formats are defined depending on "usage" = "chain" or not, see <xref target="content-format"/>.  Stored file formats are defined for the cases with/without ("usage" = "chain") with "magic numbers" TBD8/TBD6 using the reserved CBOR tag 55799 and the corresponding Content-Formats TBD15/TBD3, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <t>The value type of c5t is the COSE_CertHash structure defined in <xref target="RFC9360"/>, which contains the hash value of the C509 certificate calculated over ~C509Certificate. Thus C509CertData contains all data necessary to calculate the thumbprint c5t.</t>
        <t>c5u provides an alternative way to identify an untrusted certificate chain by reference with a URI <xref target="RFC3986"/>, encoded as a CBOR text string (media type application/cbor and CoAP Content-Format 60). The referenced resource is a COSE_C509 item served with the application/cose-c509-cert media type ("usage" = "chain"), as described above.</t>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism <bcp14>MUST</bcp14> process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter <bcp14>MUST NOT</bcp14> cause the update of the set of trust anchors without appropriate authorization.</t>
        <table anchor="iana-header">
          <name>C509 COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">24</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">25</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">22</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a ~C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">23</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing an ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Note that certificates can also be identified with a 'kid' header parameter by storing 'kid' and the associated bag or chain in a dictionary.</t>
      </section>
      <section anchor="cose-header-alg-params">
        <name>C509 COSE Header Algorithm Parameters</name>
        <t>This section defines the COSE header parameters used for identifying or transporting the sender's key for static-static key agreement algorithms corresponding to <xref section="3" sectionFormat="of" target="RFC9360"/>, see <xref target="iana-sender"/>.</t>
        <ul spacing="normal">
          <li>
            <t>c5c-sender contains the chain of certificates starting with the sender's key exchange certificate. The structure is the same as 'c5c'.</t>
          </li>
          <li>
            <t>c5t-sender contains the hash value for the sender's key exchange certificate. The structure is the same as 'c5t'.</t>
          </li>
          <li>
            <t>c5u-sender contains a URI for the sender's key exchange certificate. The structure and processing are the same as 'c5u'.</t>
          </li>
        </ul>
        <table anchor="iana-sender">
          <name>Static ECDH Algorithm Values</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Algorithm</th>
              <th align="left">Label</th>
              <th align="left">Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5c-sender</td>
              <td align="left">ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW</td>
              <td align="left">-30 (suggested)</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t-sender</td>
              <td align="left">ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW</td>
              <td align="left">-31 (suggested)</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a ~C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u-sender</td>
              <td align="left">ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW</td>
              <td align="left">-32 (suggested)</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing an ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="private-key-structures">
        <name>Private Key Structures</name>
        <t>Certificate management also makes use of data structures including private keys, see, e.g., <xref target="RFC7468"/>. This section defines the following CBOR encoded structures:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PrivateKey = [
   C509PrivateKeyType: int,
   subjectPrivateKeyAlgorithm: AlgorithmIdentifier,
   subjectPrivateKey: any,
]
]]></sourcecode>
        <t>The field 'C509PrivateKeyType' indicates the type of the C509 private key. Different types of C509 Private Key Structures can be defined, see <xref target="privkeys"/>. Currently, two types are defined. When C509PrivateKeyType = 0, the subjectPrivateKey is the CBOR byte string encoding of the PrivateKey OCTET STRING value field defined in <xref target="RFC5958"/>. When C509PrivateKeyType = 1, the subjectPrivateKey is a COSE_KEY structure containing a private key as defined in <xref target="RFC9052"/>. Note that COSE_KEY might not be possible to use with all algorithms that have a C509 AlgorithmIdentifier defined.</t>
        <t>The C509PrivateKey item is served with the application/cose-c509-privkey media type, see <xref target="c509-privkey"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD12 using the reserved CBOR tag 55799 and the Content-Format TBD10, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PEM = [
   C509PrivateKey,
   COSE_C509 / null,
]
]]></sourcecode>
        <t>The C509PEM item is served with the application/cose-c509-pem media type, see <xref target="c509-pem"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD13 using the reserved CBOR tag 55799 and the Content-Format TBD11, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
      <section anchor="deterministic-encoding">
        <name>Deterministic Encoding</name>
        <t>In some use cases it is desirable to be able to specify a unique C509 representation of a given X.509 certificate.</t>
        <t>While this specification requires the use of Deterministically Encoded CBOR (see <xref target="notation"/>), it is still possible to represent certain X.509 certificate fields in different ways. This is a consequence of the extensibility of the C509 format where new encodings can be defined, for example to optimize extensions for which no special CBOR encoding have been previously defined.</t>
        <t>Where there is support for a specific and a generic CBOR encoding, the specific CBOR encoding <bcp14>MUST</bcp14> be used. For example, when there is support for specific CBOR encoding of an extension, as specified in <xref target="ext-encoding"/> and the C509 Extensions Registry, it <bcp14>MUST</bcp14> be used. In particular, when there is support for a specific otherName encoding (negative integer value in C509 General Names Registry) it <bcp14>MUST</bcp14> be used.</t>
        <t>Native C509 certificates <bcp14>MUST</bcp14> only use specific CBOR encoded fields. However, when decoding a non-native C509 certificates, the decoder may need to support, for example, (extensionID: ~oid, extensionValue: bytes / [bytes])-encoding of an extension for which there is an (extensionID:int, extensionValue:Defined)-encoding. One reason is that the certificate was issued before the specific CBOR extension was registered.</t>
      </section>
      <section anchor="c509-name-in-tls-and-dtls">
        <name>C509 Name in TLS and DTLS</name>
        <t>In TLS and DTLS, the subject of trusted authory may be sent to the peer to help it selecting the certificate chain, as in the CertificateAuthoritiesExtension in <xref target="RFC8446"/>, in the certificate_authorities field of CertificateRequest in <xref target="RFC5246"/>, or in the TrustedAuthorities in <xref target="RFC6066"/>. For such usage in the TLS and DTLS, the C509 name is wrapped in a distinguished name <xref target="X.501"/> with exactly one RelativeDistinguishedName, which in turn contains exactly one AttributeTypeAndValue with the attribute C509Name. The attribute value is the raw byte string of the encoded C509 Name as in <xref target="subject"/>.</t>
        <t>The attribute for C509 Name has the following structure:</t>
        <artwork><![CDATA[
id-rdna-c509Name OBJECT IDENTIFIER ::= { 1 3 6 1 5 5 7 25 TBD30 }

c509Name ATTRIBUTE ::= {
   WITH SYNTAX C509Name
   SINGLE VALUE TRUE
   ID id-rdna-c509Name }

C509Name ::= OCTET STRING
]]></artwork>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certification Request</name>
      <t>This section defines the format of a C509 Certification Request based on <xref target="RFC2986"/>. It reuses the formatting of C509 certificates defined in <xref target="certificate"/>. A Certification Request is commonly referred to as a Certificate Signing Request (CSR).</t>
      <t>The CDDL for the C509 Certification Request is shown in <xref target="fig-C509CSRCDDL"/>. The fields have the same encoding as the corresponding fields of the C509 Certificate, see <xref target="message-fields"/>.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificationRequest.</name>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificationRequest = [
   TBSCertificationRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificationRequest = (
   c509CertificationRequestType: int,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   attributes: CRAttributes,
)

CRAttributes = [ * CRAttribute ]

CRAttribute = (( attributeType: int, attributeValue: Defined ) //
               ( attributeType: ~oid, attributeValue: bytes ))
]]></sourcecode>
      </figure>
      <t>After verifying the subjectSignatureValue, the Certification Authority (CA) <bcp14>MAY</bcp14> transform the C509CertificationRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and code.</t>
      <t>The media type of C509CertificationRequest is application/cose-c509-pkcs10, see <xref target="c509-pkcs10"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD9 is defined using the reserved CBOR tag 55799 and the Content-Format TBD4, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      <section anchor="certification-request-types">
        <name>Certification Request Types</name>
        <t>Two types of C509 Certification Requests are defined, both using the same CBOR encoding and differing only in what is being signed, see <xref target="csr-type"/>.
The C509 Certification Request can either be an invertible CBOR re-encoding of a DER-encoded certification request <xref target="RFC2986"/>, or it can be natively signed where the signature is calculated over the CBOR encoding instead of the DER encoding.</t>
        <ul spacing="normal">
          <li>
            <t>c509CertificationRequestType = 2. This type indicates that the C509 Certification Request is natively signed, i.e., that subjectSignatureValue contains the signature over the CBOR Sequence
TBSCertificationRequest, see <xref target="fig-C509CSRCDDL"/>. This encoding removes the need for ASN.1 and DER parsing, and re-encoding in the requesting party.</t>
          </li>
          <li>
            <t>c509CertificationRequestType = 3. This type indicates that the C509 Certification Request is a CBOR re-encoded <xref target="RFC2986"/> certification request, as defined in <xref target="CSR"/>. This encoding is backwards compatible with legacy RFC 2986 certification requests, and enables a reduced transport overhead.</t>
          </li>
        </ul>
        <t>The type of certificate issued after the request is decided by the application. The default type of issued certificate in case of C509 is that c509CertificateType = c509CertificationRequestType.</t>
        <t>An implementation <bcp14>MAY</bcp14> only support certain values of c509CertificationRequestType.</t>
      </section>
      <section anchor="subject-signature-algorithm">
        <name>Subject Signature Algorithm</name>
        <t>subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, e.g., as defined in <xref target="RFC6955"/>. In the case of <xref target="RFC6955"/>, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier distributed out-of-band. Both signature algorithms and non-signature proof-of-possession algorithms are listed in the C509 Signature Algorithms Registry, see <xref target="sigalg"/>. The non-signature proof-of-possession algorithms with SHA-2 and HMAC-SHA2 (see values 14-16 in <xref target="sigalg"/>) require a signature value with syntax DhSigStatic defined as follows:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
DhSigStatic = MessageDigest / DhSigStaticType

MessageDigest = bytes

DhSigStaticType = [
  issuer: Name,
  serialNumber: CertificateSerialNumber
  hashValue: MessageDigest
]
]]></sourcecode>
        <t>Note that a key agreement key pair may be used with a signature algorithm in a certification request, see <xref target="app-DH-keys"/>.</t>
      </section>
      <section anchor="certification-request-attributes">
        <name>Certification Request Attributes</name>
        <t>The 'attributes' field specifies the attributes contained in a certification request. The 'attributes' field with no GeneralAttribute <bcp14>SHALL</bcp14> be encoded as an empty CBOR array.</t>
        <t>The remainder of this section specifies CBOR encoded attributes for Certification Requests.</t>
        <section anchor="extension-request">
          <name>Extension Request</name>
          <t>The X.509 attribute "Extension Request" is defined in <xref target="RFC2985"/>. The 'attributeValue' field has type Extensions as in <xref target="message-fields"/>. An empty CBOR array indicates no extensions.</t>
        </section>
        <section anchor="challenge-password">
          <name>Challenge Password</name>
          <t>The X.509 attribute "Challenge Password" is defined in <xref target="RFC2985"/>. The 'attributeValue' field has type ChallengePassword. A UTF8 String is encoded as CBOR text, and a Printable String is tagged with number 121 (alternative 0 as defined in <xref target="IANA-CBOR-TAGS"/>). All other string types are not supported. For certification request type 2, only UTF8 String is allowed.</t>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
ChallengePassword = text / #6.121(text)
]]></sourcecode>
        </section>
        <section anchor="private-key-possession-statement">
          <name>Private Key Possession Statement</name>
          <t>The X.509 attribute "Statement of Possession of a Private Key" is defined in <xref target="RFC9883"/>. The 'attributeValue' field has type PrivateKeyPossessionStatement.</t>
          <sourcecode type="cddl"><![CDATA[
PrivateKeyPossessionStatement = [
  issuer: Name,
  serialNumber: CertificateSerialNumber,
  cert: C509Certificate / null,
]
]]></sourcecode>
        </section>
      </section>
      <section anchor="CRT">
        <name>Certification Request Template</name>
        <t>Enrollment over Secure Transport (EST, <xref target="RFC7030"/>) defines, and <xref target="I-D.ietf-lamps-rfc7030-csrattrs"/> clarifies, how an EST server can specify what it expects the EST client to include in a subsequent Certification Request. Alternatively to the unstructured mechanism specified in <xref target="RFC7030"/>, <xref section="B" sectionFormat="of" target="RFC8295"/> describes an approach using a Certification Request Template in response to a GET /csrattrs request by the EST client. The EST server thus returns a Certification Request-like object with various fields filled out, and other fields waiting to be filled in and a signature to be added by the EST client.</t>
        <t>The approach of <xref target="RFC8295"/> is also followed for C509. The C509CertificationRequestTemplate is based on TBSCertificationRequest of the C509CertificationRequest, see <xref target="fig-C509CSRCDDL"/>, but excludes the subjectSignatureValue field from the template since that needs no further specification.</t>
        <t>The C509 Certification Request Template is shown in <xref target="fig-C509CSRTemplateCDDL"/>.</t>
        <figure anchor="fig-C509CSRTemplateCDDL">
          <name>CDDL for C509CertificationRequestTemplate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificationRequestTemplate = [
   c509CertificationRequestTemplateType: int,
   c509CertificationRequestType: [+ int] / undefined,
   subjectSignatureAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subject: NameTemplate / undefined,
   subjectPublicKeyAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subjectPublicKey: undefined,
   extensionsRequest: ExtensionsTemplate / undefined,
]

NameTemplate = [ * RDNAttributeTemplate ]

RDNAttributeTemplate = (
    ( attributeType: uint, minOccurs: uint, maxOccurs: uint,
      attributeValue: SpecialText / undefined ) //
    ( attributeType: ~oid, minOccurs: uint, maxOccurs: uint,
      attributeValue: bytes / undefined )
)

ExtensionsTemplate = [ * ExtensionTemplate ]

ExtensionTemplate = (
    ( extensionID: uint, optional: bool, extensionValue: any ) //
    ( extensionID: ~oid, optional: bool,
    extensionValue: bytes / undefined )
)
]]></sourcecode>
        </figure>
        <t>Except as specified in this section, the fields have the same encoding as the corresponding fields of the TBSCertificationRequest, see <xref target="fig-C509CSRCDDL"/>. The specification of the template makes use of the CBOR simple value undefined (0xf7) to indicate fields to fill in. Consistent with this rule, note that the subjectPublicKey field always has the value undefined in the template.</t>
        <t>Different types of Certification Request Templates can be defined (see <xref target="temp-type"/>), distinguished by the c509CertificationRequestTemplateType integer. Each type may have its own CDDL structure.</t>
        <t>The presence of a Defined (non-undefined) value in a C509CertificationRequestTemplate indicates that the server expects the client to use that value in the certification request. If multiple AlgorithmIdentifier or c509CertificationRequestType values are present, the server expects the client to select one of them for use in the Certification Request. The presence of an undefined value indicates that the client is expected to provide an appropriate value for that field. For example, if the server includes a subjectAltName with a GeneralNameType iPAddress and a GeneralNameValue empty byte string, this means that the client <bcp14>SHOULD</bcp14> fill in a corresponding GeneralNameValue.</t>
        <t>For AttributeTemplate, the minOccurs and maxOccurs fields specify the minimal and maximal occurrences of attributes of the given attributeType; maximal shall not be less than minimal, and maximal shall be positive. Negative attributeType is not allowed.</t>
        <t>For ExtensionTemplate, the field "optional" specifies whether an extension of the given extensionID is optional. Negative extensionID is not allowed.</t>
        <t>The media type of C509CertificationRequestTemplate is application/cose-c509-crtemplate, see <xref target="c509-crtemplate"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD18 is defined using the reserved CBOR tag 55799 and the Content-Format TBD19, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certification Request format defined in <xref target="CSR"/> follows the PKCS#10 format to enable a direct mapping to the certification request information, see <xref section="4.1" sectionFormat="of" target="RFC2986"/>. The CA can make use of a Certification Request Template defined in <xref target="CRT"/>, for simplified configuration.</t>
      <t>When a certification request is received, the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession corresponding to the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 3 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 2 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with the CA may be needed.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="dep-set">
        <name>Legacy Considerations</name>
        <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER-encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 Certification Request, the CA transforms it into a DER-encoded CertificationRequestInfo <xref target="RFC2986"/> and uses that with existing processes and code to produce an RFC 5280 DER-encoded X.509 certificate. The DER-encoded X.509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
        <t>For protocols like TLS/DTLS 1.2, where certificates are sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway, which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over constrained wireless links. The conversion to X.509 within a constrained IoT device will incur a computational overhead. However, measured in energy, this is likely to be negligible compared to the reduced communication overhead.</t>
        <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
        <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
      </section>
      <section anchor="expected-certificate-sizes">
        <name>Expected Certificate Sizes</name>
        <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in Figures <xref target="fig-size-COSE" format="counter"/> and <xref target="fig-size-TLS" format="counter"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After <xref target="RFC7925"/> profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli <xref target="RFC7932"/> will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. In the examples with HTTPS certificate chains (www.ietf.org (ECDSA) and cabforum.org (RSA)) both C509 and Brotli perform well complementing each other. C509 uses dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 2 and 3 have the same size. For Brotli, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
        <t>In the examples using FN-DSA and ML-DSA certificate chains, the largest portion of the certificate size consists of the public keys and signatures, which are essentially random. As a result, both Brotli and C509 achieve only very limited size reduction. However, C509 still performs slightly better.</t>
        <figure anchor="fig-size-COSE">
          <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="288" width="536" viewBox="0 0 536 288" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 336,32 L 336,256" fill="none" stroke="black"/>
                <path d="M 432,32 L 432,256" fill="none" stroke="black"/>
                <path d="M 528,32 L 528,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 528,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 528,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 528,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 528,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 528,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 528,192" fill="none" stroke="black"/>
                <path d="M 8,224 L 528,224" fill="none" stroke="black"/>
                <path d="M 8,256 L 528,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="64" y="52">Description</text>
                  <text x="144" y="52">(number</text>
                  <text x="188" y="52">of</text>
                  <text x="228" y="52">certs)</text>
                  <text x="384" y="52">COSE_X509</text>
                  <text x="480" y="52">COSE_C509</text>
                  <text x="32" y="84">RFC</text>
                  <text x="68" y="84">7925</text>
                  <text x="124" y="84">profiled</text>
                  <text x="176" y="84">IoT</text>
                  <text x="240" y="84">Certificate</text>
                  <text x="304" y="84">(1)</text>
                  <text x="408" y="84">319</text>
                  <text x="504" y="84">142</text>
                  <text x="36" y="116">RPKI</text>
                  <text x="104" y="116">Certificate</text>
                  <text x="168" y="116">(1)</text>
                  <text x="400" y="116">20981</text>
                  <text x="496" y="116">11523</text>
                  <text x="40" y="148">ECDSA</text>
                  <text x="88" y="148">HTTPS</text>
                  <text x="160" y="148">Certificate</text>
                  <text x="232" y="148">Chain</text>
                  <text x="272" y="148">(2)</text>
                  <text x="404" y="148">1644</text>
                  <text x="500" y="148">1012</text>
                  <text x="32" y="180">RSA</text>
                  <text x="72" y="180">HTTPS</text>
                  <text x="144" y="180">Certificate</text>
                  <text x="216" y="180">Chain</text>
                  <text x="256" y="180">(2)</text>
                  <text x="404" y="180">2909</text>
                  <text x="500" y="180">2240</text>
                  <text x="60" y="212">FN-DSA-512</text>
                  <text x="128" y="212">HTTPS</text>
                  <text x="200" y="212">Certificate</text>
                  <text x="272" y="212">Chain</text>
                  <text x="312" y="212">(2)</text>
                  <text x="404" y="212">4417</text>
                  <text x="500" y="212">3897</text>
                  <text x="56" y="244">ML-DSA-65</text>
                  <text x="120" y="244">HTTPS</text>
                  <text x="192" y="244">Certificate</text>
                  <text x="264" y="244">Chain</text>
                  <text x="304" y="244">(2)</text>
                  <text x="400" y="244">11863</text>
                  <text x="496" y="244">11318</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+----------------------------------------+-----------+-----------+
| Description (number of certs)          | COSE_X509 | COSE_C509 |
+----------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1)  |       319 |       142 |
+----------------------------------------+-----------+-----------+
| RPKI Certificate (1)                   |     20981 |     11523 |
+----------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)      |      1644 |      1012 |
+----------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (2)        |      2909 |      2240 |
+----------------------------------------+-----------+-----------+
| FN-DSA-512 HTTPS Certificate Chain (2) |      4417 |      3897 |
+----------------------------------------+-----------+-----------+
| ML-DSA-65 HTTPS Certificate Chain (2)  |     11863 |     11318 |
+----------------------------------------+-----------+-----------+

]]></artwork>
          </artset>
        </figure>
        <figure anchor="fig-size-TLS">
          <name>Comparing Sizes of Certificate Chains with TLS 1.3. Number of bytes (length of certificate chain). X.509 and C509 are Certificate messages. X.509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="368" width="488" viewBox="0 0 488 368" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,352" fill="none" stroke="black"/>
                <path d="M 200,32 L 200,352" fill="none" stroke="black"/>
                <path d="M 264,32 L 264,352" fill="none" stroke="black"/>
                <path d="M 344,32 L 344,352" fill="none" stroke="black"/>
                <path d="M 408,32 L 408,352" fill="none" stroke="black"/>
                <path d="M 480,32 L 480,352" fill="none" stroke="black"/>
                <path d="M 8,32 L 480,32" fill="none" stroke="black"/>
                <path d="M 8,80 L 480,80" fill="none" stroke="black"/>
                <path d="M 8,128 L 480,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 480,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 480,208" fill="none" stroke="black"/>
                <path d="M 8,256 L 480,256" fill="none" stroke="black"/>
                <path d="M 8,304 L 480,304" fill="none" stroke="black"/>
                <path d="M 8,352 L 480,352" fill="none" stroke="black"/>
                <g class="text">
                  <text x="64" y="52">Description</text>
                  <text x="232" y="52">X.509</text>
                  <text x="296" y="52">X.509</text>
                  <text x="328" y="52">+</text>
                  <text x="372" y="52">C509</text>
                  <text x="436" y="52">C509</text>
                  <text x="464" y="52">+</text>
                  <text x="48" y="68">(number</text>
                  <text x="92" y="68">of</text>
                  <text x="132" y="68">certs)</text>
                  <text x="300" y="68">Brotli</text>
                  <text x="444" y="68">Brotli</text>
                  <text x="32" y="100">RFC</text>
                  <text x="68" y="100">7925</text>
                  <text x="124" y="100">profiled</text>
                  <text x="240" y="100">325</text>
                  <text x="320" y="100">317</text>
                  <text x="376" y="100">149</text>
                  <text x="456" y="100">158</text>
                  <text x="32" y="116">IoT</text>
                  <text x="96" y="116">Certificate</text>
                  <text x="160" y="116">(1)</text>
                  <text x="36" y="148">RPKI</text>
                  <text x="104" y="148">Certificate</text>
                  <text x="168" y="148">(1)</text>
                  <text x="232" y="148">20987</text>
                  <text x="316" y="148">9109</text>
                  <text x="376" y="148">11529</text>
                  <text x="452" y="148">7020</text>
                  <text x="40" y="180">ECDSA</text>
                  <text x="88" y="180">HTTPS</text>
                  <text x="236" y="180">1651</text>
                  <text x="316" y="180">1181</text>
                  <text x="380" y="180">1019</text>
                  <text x="456" y="180">930</text>
                  <text x="64" y="196">Certificate</text>
                  <text x="136" y="196">Chain</text>
                  <text x="176" y="196">(2)</text>
                  <text x="32" y="228">RSA</text>
                  <text x="72" y="228">HTTPS</text>
                  <text x="236" y="228">2656</text>
                  <text x="316" y="228">2195</text>
                  <text x="380" y="228">2071</text>
                  <text x="452" y="228">1913</text>
                  <text x="64" y="244">Certificate</text>
                  <text x="136" y="244">Chain</text>
                  <text x="176" y="244">(2)</text>
                  <text x="60" y="276">FN-DSA-512</text>
                  <text x="128" y="276">HTTPS</text>
                  <text x="236" y="276">4437</text>
                  <text x="316" y="276">4026</text>
                  <text x="380" y="276">3917</text>
                  <text x="452" y="276">3776</text>
                  <text x="64" y="292">Certificate</text>
                  <text x="136" y="292">Chain</text>
                  <text x="176" y="292">(2)</text>
                  <text x="56" y="324">ML-DSA-65</text>
                  <text x="120" y="324">HTTPS</text>
                  <text x="232" y="324">11869</text>
                  <text x="312" y="324">11420</text>
                  <text x="376" y="324">11325</text>
                  <text x="448" y="324">11148</text>
                  <text x="64" y="340">Certificate</text>
                  <text x="136" y="340">Chain</text>
                  <text x="176" y="340">(2)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-----------------------+-------+---------+-------+--------+
| Description           | X.509 | X.509 + | C509  | C509 + |
| (number of certs)     |       | Brotli  |       | Brotli |
+-----------------------+-------+---------+-------+--------+
| RFC 7925 profiled     |   325 |     317 |  149  |    158 |
| IoT Certificate (1)   |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
| RPKI Certificate (1)  | 20987 |    9109 | 11529 |   7020 |
+-----------------------+-------+---------+-------+--------+
| ECDSA HTTPS           |  1651 |    1181 |  1019 |    930 |
| Certificate Chain (2) |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
| RSA HTTPS             |  2656 |    2195 |  2071 |   1913 |
| Certificate Chain (2) |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
| FN-DSA-512 HTTPS      |  4437 |    4026 |  3917 |   3776 |
| Certificate Chain (2) |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
| ML-DSA-65 HTTPS       | 11869 |   11420 | 11325 |  11148 |
| Certificate Chain (2) |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR encoding of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates but decreases the number of fields transmitted, which reduces the risk for implementation errors. The security considerations of <xref target="RFC5280"/> apply.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this document does not reveal any additional information compared to X.509. Because of the difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates and is not recommended.</t>
      <t>Any issues with decoding or parsing a C509 certificate should be handled exactly as how such errors would be handled for the corresponding X.509 certificate. For example, a non-critical extension <bcp14>MAY</bcp14> be ignored if it is not recognized, see <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
      <t>As stated in <xref target="cose-header-params"/>, the contents of the COSE Header Parameters c5b, c5c, c5t, c5u is untrusted input that potentially may be verified using existing trust anchors or other trust establishment mechanism out of scope of this document. Similar security considerations as x5bag, x5chain, x5t and x5u applies, see <xref target="RFC9360"/>. Security considerations of the COSE protected and unprotected headers is discussed in <xref target="RFC9052"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries in the new registry group "CBOR Encoded X.509 (C509) Parameters". For all items, the 'Reference' field points to this document.</t>
      <t>Editor's note: Add informative reference to the newly created IANA registries and updated existing registries.</t>
      <section anchor="designated-expert-guidance">
        <name>Designated Expert Guidance</name>
        <t>The expert reviewers for the registries defined in this document are expected to ensure that the usage solves a valid use case that could not be solved better in a different way, that it is not going to duplicate an entry that is already registered, and that the registered point is likely to be used in deployments. They are furthermore expected to check the clarity of purpose and use of the requested code points. Experts should take into account the expected usage of entries when approving point assignment, and the length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1-byte encoding, other values in the interval [-256, 255] have a 2-byte encoding, and the remaining values in the interval [-65536, 65535] have a 3-byte encoding.</t>
        <t>All assignments according to "IETF Review with Expert Review" are made on a "IETF Review" basis per <xref section="4.8" sectionFormat="of" target="RFC8126"/> with "Expert Review" additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of "standards track code points" defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, working group chairs are encouraged to consult the expert(s) early during the process outlined in Section 3.1 of <xref target="RFC7120"/>.</t>
      </section>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. It is mandatory to specify content in all columns. For values in the interval [-24, 23], the registration procedure is "IETF Review with Expert Review". For all other values, the registration procedure is "Expert Review".  The initial contents of the registry are (see <xref target="version"/>):</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="432" viewBox="0 0 432 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,192" fill="none" stroke="black"/>
                <path d="M 424,32 L 424,192" fill="none" stroke="black"/>
                <path d="M 8,32 L 424,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 424,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 424,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 424,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 424,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 424,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 424,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="116" y="84">Reserved</text>
                  <text x="56" y="116">1</text>
                  <text x="116" y="116">Reserved</text>
                  <text x="56" y="148">2</text>
                  <text x="116" y="148">Natively</text>
                  <text x="180" y="148">Signed</text>
                  <text x="228" y="148">C509</text>
                  <text x="296" y="148">Certificate</text>
                  <text x="56" y="180">3</text>
                  <text x="100" y="180">CBOR</text>
                  <text x="164" y="180">Re-encoded</text>
                  <text x="232" y="180">X.509</text>
                  <text x="268" y="180">v3</text>
                  <text x="328" y="180">Certificate</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-------------------------------------------+
| Value | Description                               |
+=======+===========================================+
|     0 | Reserved                                  |
+-------+-------------------------------------------+
|     1 | Reserved                                  |
+-------+-------------------------------------------+
|     2 | Natively Signed C509 Certificate          |
+-------+-------------------------------------------+
|     3 | CBOR Re-encoded X.509 v3 Certificate      |
+-------+-------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="csr-type">
        <name>C509 Certification Request Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certification Request Types" under the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-csr-types">
          <name>C509 Certification Request Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="560" viewBox="0 0 560 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,192" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,192" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,192" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
                <path d="M 8,128 L 552,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,192 L 552,192" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="116" y="84">Reserved</text>
                  <text x="56" y="116">1</text>
                  <text x="116" y="116">Reserved</text>
                  <text x="56" y="148">2</text>
                  <text x="116" y="148">Natively</text>
                  <text x="180" y="148">Signed</text>
                  <text x="228" y="148">C509</text>
                  <text x="304" y="148">Certification</text>
                  <text x="396" y="148">Request.</text>
                  <text x="56" y="180">3</text>
                  <text x="100" y="180">CBOR</text>
                  <text x="168" y="180">re-encoding</text>
                  <text x="228" y="180">of</text>
                  <text x="256" y="180">RFC</text>
                  <text x="292" y="180">2986</text>
                  <text x="368" y="180">certification</text>
                  <text x="460" y="180">request.</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Reserved                                                  |
+-------+-----------------------------------------------------------+
|     1 | Reserved                                                  |
+-------+-----------------------------------------------------------+
|     2 | Natively Signed C509 Certification Request.               |
+-------+-----------------------------------------------------------+
|     3 | CBOR re-encoding of RFC 2986 certification request.       |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="privkeys">
        <name>C509 Private Key Types Registry</name>
        <t>IANA has created a new registry titled "C509 Private Key Types" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Comments, and subjectPrivateKey, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-rivkeys">
          <name>C509 Private Key Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="560" viewBox="0 0 560 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,160" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,112 L 552,112" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="112" y="52">Private</text>
                  <text x="160" y="52">Key</text>
                  <text x="200" y="52">Types</text>
                  <text x="56" y="84">0</text>
                  <text x="120" y="84">Comments:</text>
                  <text x="276" y="84">Asymmetric</text>
                  <text x="336" y="84">Key</text>
                  <text x="384" y="84">Package</text>
                  <text x="436" y="84">(RFC</text>
                  <text x="480" y="84">5958)</text>
                  <text x="156" y="100">subjectPrivateKey:</text>
                  <text x="256" y="100">bytes</text>
                  <text x="56" y="132">1</text>
                  <text x="120" y="132">Comments:</text>
                  <text x="252" y="132">COSE</text>
                  <text x="288" y="132">Key</text>
                  <text x="332" y="132">Object</text>
                  <text x="380" y="132">(RFC</text>
                  <text x="424" y="132">9052)</text>
                  <text x="156" y="148">subjectPrivateKey:</text>
                  <text x="268" y="148">COSE_Key</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Private Key Types                                         |
+=======+===========================================================+
|     0 | Comments:          Asymmetric Key Package (RFC 5958)      |
|       | subjectPrivateKey: bytes                                  |
+-------+-----------------------------------------------------------+
|     1 | Comments:          COSE Key Object (RFC 9052)             |
|       | subjectPrivateKey: COSE_Key                               |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="temp-type">
        <name>C509 Certification Request Templates Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certification Request Templates Types" under the new registry group "CBOR Encoded X.509 (C509) Parameters". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review" and "Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-temp-types">
          <name>C509 Certification Request Templates Types</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,96" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Description</text>
                  <text x="56" y="84">0</text>
                  <text x="108" y="84">Simple</text>
                  <text x="156" y="84">C509</text>
                  <text x="232" y="84">Certification</text>
                  <text x="320" y="84">Request</text>
                  <text x="388" y="84">Template</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Simple C509 Certification Request Template                |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="rdnatttype">
        <name>C509 RDN Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 RDN Attributes" in the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments and Reference, where Value is a non-negative integer, and the other columns are text strings. Name and Identifiers are informal descriptions. The fields Name, OID, and DER are mandatory. For values in the interval [0, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". Name and Identifiers are informal descriptions. If OID is present, the OID is given in dotted decimal representation, and the DER column contains the hex string of the DER-encoded OID <xref target="X.690"/>.</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-rdnattrtype">
          <name>C509 RDN Attributes</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2864" width="560" viewBox="0 0 560 2864" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2848" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2848" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2848" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,832 L 552,832" fill="none" stroke="black"/>
                <path d="M 8,928 L 552,928" fill="none" stroke="black"/>
                <path d="M 8,1024 L 552,1024" fill="none" stroke="black"/>
                <path d="M 8,1120 L 552,1120" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1312 L 552,1312" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1504 L 552,1504" fill="none" stroke="black"/>
                <path d="M 8,1600 L 552,1600" fill="none" stroke="black"/>
                <path d="M 8,1696 L 552,1696" fill="none" stroke="black"/>
                <path d="M 8,1792 L 552,1792" fill="none" stroke="black"/>
                <path d="M 8,1888 L 552,1888" fill="none" stroke="black"/>
                <path d="M 8,1984 L 552,1984" fill="none" stroke="black"/>
                <path d="M 8,2080 L 552,2080" fill="none" stroke="black"/>
                <path d="M 8,2176 L 552,2176" fill="none" stroke="black"/>
                <path d="M 8,2272 L 552,2272" fill="none" stroke="black"/>
                <path d="M 8,2368 L 552,2368" fill="none" stroke="black"/>
                <path d="M 8,2464 L 552,2464" fill="none" stroke="black"/>
                <path d="M 8,2560 L 552,2560" fill="none" stroke="black"/>
                <path d="M 8,2656 L 552,2656" fill="none" stroke="black"/>
                <path d="M 8,2752 L 552,2752" fill="none" stroke="black"/>
                <path d="M 8,2848 L 552,2848" fill="none" stroke="black"/>
                <circle cx="368" cy="864" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="96" y="52">RDN</text>
                  <text x="152" y="52">Attribute</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="240" y="84">Email</text>
                  <text x="296" y="84">Address</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="272" y="100">emailAddress,</text>
                  <text x="384" y="100">e-mailAddress</text>
                  <text x="100" y="116">OID:</text>
                  <text x="300" y="116">1.2.840.113549.1.9.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">09</text>
                  <text x="276" y="132">2A</text>
                  <text x="300" y="132">86</text>
                  <text x="324" y="132">48</text>
                  <text x="348" y="132">86</text>
                  <text x="372" y="132">F7</text>
                  <text x="396" y="132">0D</text>
                  <text x="420" y="132">01</text>
                  <text x="444" y="132">09</text>
                  <text x="468" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">2985</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="244" y="180">Common</text>
                  <text x="292" y="180">Name</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="264" y="196">commonName,</text>
                  <text x="324" y="196">cn</text>
                  <text x="100" y="212">OID:</text>
                  <text x="248" y="212">2.5.4.3</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">03</text>
                  <text x="276" y="228">55</text>
                  <text x="300" y="228">04</text>
                  <text x="324" y="228">03</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="240" y="244">X.520</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="248" y="276">Surname</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="252" y="292">surname,</text>
                  <text x="300" y="292">sn</text>
                  <text x="100" y="308">OID:</text>
                  <text x="248" y="308">2.5.4.4</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">03</text>
                  <text x="276" y="324">55</text>
                  <text x="300" y="324">04</text>
                  <text x="324" y="324">04</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="240" y="340">X.520</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="244" y="372">Serial</text>
                  <text x="300" y="372">Number</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="268" y="388">serialNumber</text>
                  <text x="100" y="404">OID:</text>
                  <text x="248" y="404">2.5.4.5</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">03</text>
                  <text x="276" y="420">55</text>
                  <text x="300" y="420">04</text>
                  <text x="324" y="420">05</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="240" y="436">X.520</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="248" y="468">Country</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="268" y="484">countryName,</text>
                  <text x="328" y="484">c</text>
                  <text x="100" y="500">OID:</text>
                  <text x="248" y="500">2.5.4.6</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">03</text>
                  <text x="276" y="516">55</text>
                  <text x="300" y="516">04</text>
                  <text x="324" y="516">06</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="240" y="532">X.520</text>
                  <text x="56" y="564">5</text>
                  <text x="104" y="564">Name:</text>
                  <text x="252" y="564">Locality</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="272" y="580">localityName,</text>
                  <text x="368" y="580">locality,</text>
                  <text x="416" y="580">l</text>
                  <text x="100" y="596">OID:</text>
                  <text x="248" y="596">2.5.4.7</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">03</text>
                  <text x="276" y="612">55</text>
                  <text x="300" y="612">04</text>
                  <text x="324" y="612">07</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="240" y="628">X.520</text>
                  <text x="56" y="660">6</text>
                  <text x="104" y="660">Name:</text>
                  <text x="240" y="660">State</text>
                  <text x="276" y="660">or</text>
                  <text x="324" y="660">Province</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="300" y="676">stateOrProvinceName,</text>
                  <text x="396" y="676">st</text>
                  <text x="100" y="692">OID:</text>
                  <text x="248" y="692">2.5.4.8</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">03</text>
                  <text x="276" y="708">55</text>
                  <text x="300" y="708">04</text>
                  <text x="324" y="708">08</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="240" y="724">X.520</text>
                  <text x="56" y="756">7</text>
                  <text x="104" y="756">Name:</text>
                  <text x="244" y="756">Street</text>
                  <text x="304" y="756">Address</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="276" y="772">streetAddress,</text>
                  <text x="364" y="772">street</text>
                  <text x="100" y="788">OID:</text>
                  <text x="248" y="788">2.5.4.9</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">03</text>
                  <text x="276" y="804">55</text>
                  <text x="300" y="804">04</text>
                  <text x="324" y="804">09</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="240" y="820">X.520</text>
                  <text x="56" y="852">8</text>
                  <text x="104" y="852">Name:</text>
                  <text x="268" y="852">Organization</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="288" y="868">organizationName,</text>
                  <text x="100" y="884">OID:</text>
                  <text x="252" y="884">2.5.4.10</text>
                  <text x="100" y="900">DER:</text>
                  <text x="228" y="900">06</text>
                  <text x="252" y="900">03</text>
                  <text x="276" y="900">55</text>
                  <text x="300" y="900">04</text>
                  <text x="324" y="900">0A</text>
                  <text x="120" y="916">Comments:</text>
                  <text x="240" y="916">X.520</text>
                  <text x="56" y="948">9</text>
                  <text x="104" y="948">Name:</text>
                  <text x="276" y="948">Organizational</text>
                  <text x="356" y="948">Unit</text>
                  <text x="132" y="964">Identifiers:</text>
                  <text x="312" y="964">organizationalUnitName,</text>
                  <text x="420" y="964">ou</text>
                  <text x="100" y="980">OID:</text>
                  <text x="252" y="980">2.5.4.11</text>
                  <text x="100" y="996">DER:</text>
                  <text x="228" y="996">06</text>
                  <text x="252" y="996">03</text>
                  <text x="276" y="996">55</text>
                  <text x="300" y="996">04</text>
                  <text x="324" y="996">0B</text>
                  <text x="120" y="1012">Comments:</text>
                  <text x="240" y="1012">X.520</text>
                  <text x="52" y="1044">10</text>
                  <text x="104" y="1044">Name:</text>
                  <text x="240" y="1044">Title</text>
                  <text x="132" y="1060">Identifiers:</text>
                  <text x="240" y="1060">title</text>
                  <text x="100" y="1076">OID:</text>
                  <text x="252" y="1076">2.5.4.12</text>
                  <text x="100" y="1092">DER:</text>
                  <text x="228" y="1092">06</text>
                  <text x="252" y="1092">03</text>
                  <text x="276" y="1092">55</text>
                  <text x="300" y="1092">04</text>
                  <text x="324" y="1092">0C</text>
                  <text x="120" y="1108">Comments:</text>
                  <text x="240" y="1108">X.520</text>
                  <text x="52" y="1140">11</text>
                  <text x="104" y="1140">Name:</text>
                  <text x="252" y="1140">Business</text>
                  <text x="324" y="1140">Category</text>
                  <text x="132" y="1156">Identifiers:</text>
                  <text x="284" y="1156">businessCategory</text>
                  <text x="100" y="1172">OID:</text>
                  <text x="252" y="1172">2.5.4.15</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="228" y="1188">06</text>
                  <text x="252" y="1188">03</text>
                  <text x="276" y="1188">55</text>
                  <text x="300" y="1188">04</text>
                  <text x="324" y="1188">0F</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="240" y="1204">X.520</text>
                  <text x="52" y="1236">12</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="244" y="1236">Postal</text>
                  <text x="292" y="1236">Code</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="260" y="1252">postalCode</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="252" y="1268">2.5.4.17</text>
                  <text x="100" y="1284">DER:</text>
                  <text x="228" y="1284">06</text>
                  <text x="252" y="1284">03</text>
                  <text x="276" y="1284">55</text>
                  <text x="300" y="1284">04</text>
                  <text x="324" y="1284">11</text>
                  <text x="120" y="1300">Comments:</text>
                  <text x="240" y="1300">X.520</text>
                  <text x="52" y="1332">13</text>
                  <text x="104" y="1332">Name:</text>
                  <text x="240" y="1332">Given</text>
                  <text x="284" y="1332">Name</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="256" y="1348">givenName</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="252" y="1364">2.5.4.42</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">03</text>
                  <text x="276" y="1380">55</text>
                  <text x="300" y="1380">04</text>
                  <text x="324" y="1380">2A</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="240" y="1396">X.520</text>
                  <text x="52" y="1428">14</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="252" y="1428">Initials</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="252" y="1444">initials</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="252" y="1460">2.5.4.43</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">03</text>
                  <text x="276" y="1476">55</text>
                  <text x="300" y="1476">04</text>
                  <text x="324" y="1476">2B</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="240" y="1492">X.520</text>
                  <text x="52" y="1524">15</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="260" y="1524">Generation</text>
                  <text x="344" y="1524">Qualifier</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="296" y="1540">generationQualifier</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="252" y="1556">2.5.4.44</text>
                  <text x="100" y="1572">DER:</text>
                  <text x="228" y="1572">06</text>
                  <text x="252" y="1572">03</text>
                  <text x="276" y="1572">55</text>
                  <text x="300" y="1572">04</text>
                  <text x="324" y="1572">2C</text>
                  <text x="120" y="1588">Comments:</text>
                  <text x="240" y="1588">X.520</text>
                  <text x="52" y="1620">16</text>
                  <text x="104" y="1620">Name:</text>
                  <text x="228" y="1620">DN</text>
                  <text x="280" y="1620">Qualifier</text>
                  <text x="132" y="1636">Identifiers:</text>
                  <text x="264" y="1636">dnQualifier</text>
                  <text x="100" y="1652">OID:</text>
                  <text x="252" y="1652">2.5.4.46</text>
                  <text x="100" y="1668">DER:</text>
                  <text x="228" y="1668">06</text>
                  <text x="252" y="1668">03</text>
                  <text x="276" y="1668">55</text>
                  <text x="300" y="1668">04</text>
                  <text x="324" y="1668">2E</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="240" y="1684">X.520</text>
                  <text x="52" y="1716">17</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="256" y="1716">Pseudonym</text>
                  <text x="132" y="1732">Identifiers:</text>
                  <text x="256" y="1732">pseudonym</text>
                  <text x="100" y="1748">OID:</text>
                  <text x="252" y="1748">2.5.4.65</text>
                  <text x="100" y="1764">DER:</text>
                  <text x="228" y="1764">06</text>
                  <text x="252" y="1764">03</text>
                  <text x="276" y="1764">55</text>
                  <text x="300" y="1764">04</text>
                  <text x="324" y="1764">41</text>
                  <text x="120" y="1780">Comments:</text>
                  <text x="240" y="1780">X.520</text>
                  <text x="52" y="1812">18</text>
                  <text x="104" y="1812">Name:</text>
                  <text x="268" y="1812">Organization</text>
                  <text x="364" y="1812">Identifier</text>
                  <text x="132" y="1828">Identifiers:</text>
                  <text x="308" y="1828">organizationIdentifier</text>
                  <text x="100" y="1844">OID:</text>
                  <text x="252" y="1844">2.5.4.97</text>
                  <text x="100" y="1860">DER:</text>
                  <text x="228" y="1860">06</text>
                  <text x="252" y="1860">03</text>
                  <text x="276" y="1860">55</text>
                  <text x="300" y="1860">04</text>
                  <text x="324" y="1860">61</text>
                  <text x="120" y="1876">Comments:</text>
                  <text x="240" y="1876">X.520</text>
                  <text x="52" y="1908">19</text>
                  <text x="104" y="1908">Name:</text>
                  <text x="268" y="1908">Jurisdiction</text>
                  <text x="356" y="1908">Locality</text>
                  <text x="412" y="1908">Name</text>
                  <text x="132" y="1924">Identifiers:</text>
                  <text x="316" y="1924">jurisdictionLocalityName</text>
                  <text x="100" y="1940">OID:</text>
                  <text x="316" y="1940">1.3.6.1.4.1.311.60.2.1.1</text>
                  <text x="100" y="1956">DER:</text>
                  <text x="228" y="1956">06</text>
                  <text x="252" y="1956">0B</text>
                  <text x="276" y="1956">2B</text>
                  <text x="300" y="1956">06</text>
                  <text x="324" y="1956">01</text>
                  <text x="348" y="1956">04</text>
                  <text x="372" y="1956">01</text>
                  <text x="396" y="1956">82</text>
                  <text x="420" y="1956">37</text>
                  <text x="444" y="1956">3C</text>
                  <text x="468" y="1956">02</text>
                  <text x="492" y="1956">01</text>
                  <text x="516" y="1956">01</text>
                  <text x="120" y="1972">Comments:</text>
                  <text x="264" y="1972">Proprietary</text>
                  <text x="352" y="1972">Microsoft</text>
                  <text x="432" y="1972">Attribute</text>
                  <text x="52" y="2004">20</text>
                  <text x="104" y="2004">Name:</text>
                  <text x="268" y="2004">Jurisdiction</text>
                  <text x="344" y="2004">State</text>
                  <text x="380" y="2004">or</text>
                  <text x="428" y="2004">Province</text>
                  <text x="132" y="2020">Identifiers:</text>
                  <text x="344" y="2020">jurisdictionStateOrProvinceName</text>
                  <text x="100" y="2036">OID:</text>
                  <text x="316" y="2036">1.3.6.1.4.1.311.60.2.1.2</text>
                  <text x="100" y="2052">DER:</text>
                  <text x="228" y="2052">06</text>
                  <text x="252" y="2052">0B</text>
                  <text x="276" y="2052">2B</text>
                  <text x="300" y="2052">06</text>
                  <text x="324" y="2052">01</text>
                  <text x="348" y="2052">04</text>
                  <text x="372" y="2052">01</text>
                  <text x="396" y="2052">82</text>
                  <text x="420" y="2052">37</text>
                  <text x="444" y="2052">3C</text>
                  <text x="468" y="2052">02</text>
                  <text x="492" y="2052">01</text>
                  <text x="516" y="2052">02</text>
                  <text x="120" y="2068">Comments:</text>
                  <text x="264" y="2068">Proprietary</text>
                  <text x="352" y="2068">Microsoft</text>
                  <text x="432" y="2068">Attribute</text>
                  <text x="52" y="2100">21</text>
                  <text x="104" y="2100">Name:</text>
                  <text x="268" y="2100">Jurisdiction</text>
                  <text x="352" y="2100">Country</text>
                  <text x="404" y="2100">Name</text>
                  <text x="132" y="2116">Identifiers:</text>
                  <text x="312" y="2116">jurisdictionCountryName</text>
                  <text x="100" y="2132">OID:</text>
                  <text x="316" y="2132">1.3.6.1.4.1.311.60.2.1.3</text>
                  <text x="100" y="2148">DER:</text>
                  <text x="228" y="2148">06</text>
                  <text x="252" y="2148">0B</text>
                  <text x="276" y="2148">2B</text>
                  <text x="300" y="2148">06</text>
                  <text x="324" y="2148">01</text>
                  <text x="348" y="2148">04</text>
                  <text x="372" y="2148">01</text>
                  <text x="396" y="2148">82</text>
                  <text x="420" y="2148">37</text>
                  <text x="444" y="2148">3C</text>
                  <text x="468" y="2148">02</text>
                  <text x="492" y="2148">01</text>
                  <text x="516" y="2148">03</text>
                  <text x="120" y="2164">Comments:</text>
                  <text x="264" y="2164">Proprietary</text>
                  <text x="352" y="2164">Microsoft</text>
                  <text x="432" y="2164">Attribute</text>
                  <text x="52" y="2196">22</text>
                  <text x="104" y="2196">Name:</text>
                  <text x="244" y="2196">Domain</text>
                  <text x="312" y="2196">Component</text>
                  <text x="132" y="2212">Identifiers:</text>
                  <text x="284" y="2212">domainComponent,</text>
                  <text x="364" y="2212">dc</text>
                  <text x="100" y="2228">OID:</text>
                  <text x="324" y="2228">0.9.2342.19200300.100.1.25</text>
                  <text x="100" y="2244">DER:</text>
                  <text x="228" y="2244">06</text>
                  <text x="252" y="2244">0A</text>
                  <text x="276" y="2244">09</text>
                  <text x="300" y="2244">92</text>
                  <text x="324" y="2244">26</text>
                  <text x="348" y="2244">89</text>
                  <text x="372" y="2244">93</text>
                  <text x="396" y="2244">F2</text>
                  <text x="420" y="2244">2C</text>
                  <text x="444" y="2244">64</text>
                  <text x="468" y="2244">01</text>
                  <text x="492" y="2244">19</text>
                  <text x="120" y="2260">Comments:</text>
                  <text x="232" y="2260">RFC</text>
                  <text x="268" y="2260">1274</text>
                  <text x="52" y="2292">25</text>
                  <text x="104" y="2292">Name:</text>
                  <text x="236" y="2292">Name</text>
                  <text x="132" y="2308">Identifiers:</text>
                  <text x="236" y="2308">name</text>
                  <text x="100" y="2324">OID:</text>
                  <text x="252" y="2324">2.5.4.41</text>
                  <text x="100" y="2340">DER:</text>
                  <text x="228" y="2340">06</text>
                  <text x="252" y="2340">03</text>
                  <text x="276" y="2340">55</text>
                  <text x="300" y="2340">04</text>
                  <text x="324" y="2340">29</text>
                  <text x="120" y="2356">Comments:</text>
                  <text x="240" y="2356">X.520</text>
                  <text x="52" y="2388">26</text>
                  <text x="104" y="2388">Name:</text>
                  <text x="256" y="2388">Telephone</text>
                  <text x="324" y="2388">Number</text>
                  <text x="132" y="2404">Identifiers:</text>
                  <text x="280" y="2404">telephoneNumber</text>
                  <text x="100" y="2420">OID:</text>
                  <text x="252" y="2420">2.5.4.20</text>
                  <text x="100" y="2436">DER:</text>
                  <text x="228" y="2436">06</text>
                  <text x="252" y="2436">03</text>
                  <text x="276" y="2436">55</text>
                  <text x="300" y="2436">04</text>
                  <text x="324" y="2436">14</text>
                  <text x="120" y="2452">Comments:</text>
                  <text x="240" y="2452">X.520</text>
                  <text x="52" y="2484">27</text>
                  <text x="104" y="2484">Name:</text>
                  <text x="256" y="2484">Directory</text>
                  <text x="340" y="2484">Management</text>
                  <text x="412" y="2484">Domain</text>
                  <text x="460" y="2484">Name</text>
                  <text x="132" y="2500">Identifiers:</text>
                  <text x="248" y="2500">dmdName</text>
                  <text x="100" y="2516">OID:</text>
                  <text x="252" y="2516">2.5.4.54</text>
                  <text x="100" y="2532">DER:</text>
                  <text x="228" y="2532">06</text>
                  <text x="252" y="2532">03</text>
                  <text x="276" y="2532">55</text>
                  <text x="300" y="2532">04</text>
                  <text x="324" y="2532">36</text>
                  <text x="120" y="2548">Comments:</text>
                  <text x="240" y="2548">X.520</text>
                  <text x="52" y="2580">28</text>
                  <text x="104" y="2580">Name:</text>
                  <text x="244" y="2580">userid</text>
                  <text x="132" y="2596">Identifiers:</text>
                  <text x="232" y="2596">uid</text>
                  <text x="100" y="2612">OID:</text>
                  <text x="320" y="2612">0.9.2342.19200300.100.1.1</text>
                  <text x="100" y="2628">DER:</text>
                  <text x="228" y="2628">06</text>
                  <text x="252" y="2628">0A</text>
                  <text x="276" y="2628">09</text>
                  <text x="300" y="2628">92</text>
                  <text x="324" y="2628">26</text>
                  <text x="348" y="2628">89</text>
                  <text x="372" y="2628">93</text>
                  <text x="396" y="2628">F2</text>
                  <text x="420" y="2628">2C</text>
                  <text x="444" y="2628">64</text>
                  <text x="468" y="2628">01</text>
                  <text x="492" y="2628">01</text>
                  <text x="120" y="2644">Comments:</text>
                  <text x="232" y="2644">RFC</text>
                  <text x="268" y="2644">1274</text>
                  <text x="52" y="2676">29</text>
                  <text x="104" y="2676">Name:</text>
                  <text x="268" y="2676">Unstructured</text>
                  <text x="340" y="2676">Name</text>
                  <text x="132" y="2692">Identifiers:</text>
                  <text x="284" y="2692">unstructuredName</text>
                  <text x="100" y="2708">OID:</text>
                  <text x="300" y="2708">1.2.840.113549.1.9.2</text>
                  <text x="100" y="2724">DER:</text>
                  <text x="228" y="2724">06</text>
                  <text x="252" y="2724">09</text>
                  <text x="276" y="2724">2A</text>
                  <text x="300" y="2724">86</text>
                  <text x="324" y="2724">48</text>
                  <text x="348" y="2724">86</text>
                  <text x="372" y="2724">F7</text>
                  <text x="396" y="2724">0D</text>
                  <text x="420" y="2724">01</text>
                  <text x="444" y="2724">09</text>
                  <text x="468" y="2724">02</text>
                  <text x="120" y="2740">Comments:</text>
                  <text x="232" y="2740">RFC</text>
                  <text x="268" y="2740">2985</text>
                  <text x="52" y="2772">30</text>
                  <text x="104" y="2772">Name:</text>
                  <text x="268" y="2772">Unstructured</text>
                  <text x="352" y="2772">Address</text>
                  <text x="132" y="2788">Identifiers:</text>
                  <text x="296" y="2788">unstructuredAddress</text>
                  <text x="100" y="2804">OID:</text>
                  <text x="300" y="2804">1.2.840.113549.1.9.8</text>
                  <text x="100" y="2820">DER:</text>
                  <text x="228" y="2820">06</text>
                  <text x="252" y="2820">0A</text>
                  <text x="276" y="2820">2A</text>
                  <text x="300" y="2820">86</text>
                  <text x="324" y="2820">48</text>
                  <text x="348" y="2820">86</text>
                  <text x="372" y="2820">F7</text>
                  <text x="396" y="2820">0D</text>
                  <text x="420" y="2820">01</text>
                  <text x="444" y="2820">09</text>
                  <text x="468" y="2820">08</text>
                  <text x="492" y="2820">00</text>
                  <text x="120" y="2836">Comments:</text>
                  <text x="232" y="2836">RFC</text>
                  <text x="268" y="2836">2985</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | RDN Attribute                                             |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:        RFC 2985                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    19 | Name:            Jurisdiction Locality Name               |
|       | Identifiers:     jurisdictionLocalityName                 |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:        Proprietary Microsoft Attribute          |
+-------+-----------------------------------------------------------+
|    20 | Name:            Jurisdiction State or Province           |
|       | Identifiers:     jurisdictionStateOrProvinceName          |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:        Proprietary Microsoft Attribute          |
+-------+-----------------------------------------------------------+
|    21 | Name:            Jurisdiction Country Name                |
|       | Identifiers:     jurisdictionCountryName                  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:        Proprietary Microsoft Attribute          |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:        RFC 1274                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:        RFC 1274                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:        RFC 2985                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08 00      |
|       | Comments:        RFC 2985                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="cratttype">
        <name>C509 CR Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 CR Attributes" under the registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, attributeValue, and Reference, where Value is an integer, and the other columns are text strings. Name and Identifiers are informal descriptions. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". Name and Identifiers are informal descriptions. If OID is present, the OID is given in dotted decimal representation, and the DER column contains the hex string of the DER-encoded OID <xref target="X.690"/>.</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-attrtype">
          <name>C509 CRAttributes</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="416" width="560" viewBox="0 0 560 416" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,400" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,400" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,400" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,288 L 552,288" fill="none" stroke="black"/>
                <path d="M 8,400 L 552,400" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="92" y="52">CR</text>
                  <text x="144" y="52">Attribute</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">Extension</text>
                  <text x="328" y="84">Request</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="284" y="100">extensionRequest</text>
                  <text x="100" y="116">OID:</text>
                  <text x="304" y="116">1.2.840.113549.1.9.14</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">09</text>
                  <text x="276" y="132">2A</text>
                  <text x="300" y="132">86</text>
                  <text x="324" y="132">48</text>
                  <text x="348" y="132">86</text>
                  <text x="372" y="132">F7</text>
                  <text x="396" y="132">0D</text>
                  <text x="420" y="132">01</text>
                  <text x="444" y="132">09</text>
                  <text x="468" y="132">0E</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">2985</text>
                  <text x="144" y="164">attributeValue:</text>
                  <text x="260" y="164">Extensions</text>
                  <text x="56" y="196">1</text>
                  <text x="104" y="196">Name:</text>
                  <text x="256" y="196">Challenge</text>
                  <text x="332" y="196">Password</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="288" y="212">challengePassword</text>
                  <text x="100" y="228">OID:</text>
                  <text x="300" y="228">1.2.840.113549.1.9.7</text>
                  <text x="100" y="244">DER:</text>
                  <text x="228" y="244">06</text>
                  <text x="252" y="244">09</text>
                  <text x="276" y="244">2A</text>
                  <text x="300" y="244">86</text>
                  <text x="324" y="244">48</text>
                  <text x="348" y="244">86</text>
                  <text x="372" y="244">F7</text>
                  <text x="396" y="244">0D</text>
                  <text x="420" y="244">01</text>
                  <text x="444" y="244">09</text>
                  <text x="468" y="244">07</text>
                  <text x="120" y="260">Comments:</text>
                  <text x="232" y="260">RFC</text>
                  <text x="268" y="260">2985</text>
                  <text x="144" y="276">attributeValue:</text>
                  <text x="288" y="276">ChallengePassword</text>
                  <text x="56" y="308">2</text>
                  <text x="104" y="308">Name:</text>
                  <text x="248" y="308">Private</text>
                  <text x="296" y="308">Key</text>
                  <text x="356" y="308">Possession</text>
                  <text x="440" y="308">Statement</text>
                  <text x="132" y="324">Identifiers:</text>
                  <text x="336" y="324">privateKeyPossessionStatement</text>
                  <text x="100" y="340">OID:</text>
                  <text x="304" y="340">1.3.6.1.4.1.22112.2.1</text>
                  <text x="100" y="356">DER:</text>
                  <text x="228" y="356">06</text>
                  <text x="252" y="356">0A</text>
                  <text x="276" y="356">2B</text>
                  <text x="300" y="356">06</text>
                  <text x="324" y="356">01</text>
                  <text x="348" y="356">04</text>
                  <text x="372" y="356">01</text>
                  <text x="396" y="356">81</text>
                  <text x="420" y="356">AC</text>
                  <text x="444" y="356">60</text>
                  <text x="468" y="356">02</text>
                  <text x="492" y="356">01</text>
                  <text x="120" y="372">Comments:</text>
                  <text x="232" y="372">RFC</text>
                  <text x="268" y="372">9883</text>
                  <text x="144" y="388">attributeValue:</text>
                  <text x="336" y="388">PrivateKeyPossessionStatement</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | CR Attribute                                              |
+=======+===========================================================+
|     0 | Name:            Extension Request                        |
|       | Identifiers:     extensionRequest                         |
|       | OID:             1.2.840.113549.1.9.14                    |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 0E         |
|       | Comments:        RFC 2985                                 |
|       | attributeValue:  Extensions                               |
+-------+-----------------------------------------------------------+
|     1 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        RFC 2985                                 |
|       | attributeValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
|     2 | Name:            Private Key Possession Statement         |
|       | Identifiers:     privateKeyPossessionStatement            |
|       | OID:             1.3.6.1.4.1.22112.2.1                    |
|       | DER:             06 0A 2B 06 01 04 01 81 AC 60 02 01      |
|       | Comments:        RFC 9883                                 |
|       | attributeValue:  PrivateKeyPossessionStatement            |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions Registry" under the new registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is a positive integer, and the other columns are text strings. The fields Name, OID, DER, and extensionValue are mandatory. For values in the interval [1, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2768" width="560" viewBox="0 0 560 2768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2752" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2752" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2752" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,288 L 552,288" fill="none" stroke="black"/>
                <path d="M 8,400 L 552,400" fill="none" stroke="black"/>
                <path d="M 8,512 L 552,512" fill="none" stroke="black"/>
                <path d="M 8,624 L 552,624" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,960 L 552,960" fill="none" stroke="black"/>
                <path d="M 8,1072 L 552,1072" fill="none" stroke="black"/>
                <path d="M 8,1184 L 552,1184" fill="none" stroke="black"/>
                <path d="M 8,1296 L 552,1296" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1520 L 552,1520" fill="none" stroke="black"/>
                <path d="M 8,1632 L 552,1632" fill="none" stroke="black"/>
                <path d="M 8,1744 L 552,1744" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,1968 L 552,1968" fill="none" stroke="black"/>
                <path d="M 8,2080 L 552,2080" fill="none" stroke="black"/>
                <path d="M 8,2192 L 552,2192" fill="none" stroke="black"/>
                <path d="M 8,2304 L 552,2304" fill="none" stroke="black"/>
                <path d="M 8,2416 L 552,2416" fill="none" stroke="black"/>
                <path d="M 8,2528 L 552,2528" fill="none" stroke="black"/>
                <path d="M 8,2640 L 552,2640" fill="none" stroke="black"/>
                <path d="M 8,2752 L 552,2752" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="120" y="52">Extension</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="248" y="84">Subject</text>
                  <text x="296" y="84">Key</text>
                  <text x="356" y="84">Identifier</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="300" y="100">subjectKeyIdentifier</text>
                  <text x="100" y="116">OID:</text>
                  <text x="256" y="116">2.5.29.14</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">03</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">0E</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">5280</text>
                  <text x="144" y="164">extensionValue:</text>
                  <text x="300" y="164">SubjectKeyIdentifier</text>
                  <text x="56" y="196">2</text>
                  <text x="104" y="196">Name:</text>
                  <text x="232" y="196">Key</text>
                  <text x="272" y="196">Usage</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="252" y="212">keyUsage</text>
                  <text x="100" y="228">OID:</text>
                  <text x="256" y="228">2.5.29.15</text>
                  <text x="100" y="244">DER:</text>
                  <text x="228" y="244">06</text>
                  <text x="252" y="244">03</text>
                  <text x="276" y="244">55</text>
                  <text x="300" y="244">1D</text>
                  <text x="324" y="244">0F</text>
                  <text x="120" y="260">Comments:</text>
                  <text x="232" y="260">RFC</text>
                  <text x="268" y="260">5280</text>
                  <text x="144" y="276">AttributeValue:</text>
                  <text x="252" y="276">KeyUsage</text>
                  <text x="56" y="308">3</text>
                  <text x="104" y="308">Name:</text>
                  <text x="248" y="308">Subject</text>
                  <text x="328" y="308">Alternative</text>
                  <text x="396" y="308">Name</text>
                  <text x="132" y="324">Identifiers:</text>
                  <text x="276" y="324">subjectAltName</text>
                  <text x="100" y="340">OID:</text>
                  <text x="256" y="340">2.5.29.17</text>
                  <text x="100" y="356">DER:</text>
                  <text x="228" y="356">06</text>
                  <text x="252" y="356">03</text>
                  <text x="276" y="356">55</text>
                  <text x="300" y="356">1D</text>
                  <text x="324" y="356">11</text>
                  <text x="120" y="372">Comments:</text>
                  <text x="232" y="372">RFC</text>
                  <text x="268" y="372">5280</text>
                  <text x="144" y="388">extensionValue:</text>
                  <text x="276" y="388">SubjectAltName</text>
                  <text x="56" y="420">4</text>
                  <text x="104" y="420">Name:</text>
                  <text x="240" y="420">Basic</text>
                  <text x="312" y="420">Constraints</text>
                  <text x="132" y="436">Identifiers:</text>
                  <text x="284" y="436">basicConstraints</text>
                  <text x="100" y="452">OID:</text>
                  <text x="256" y="452">2.5.29.19</text>
                  <text x="100" y="468">DER:</text>
                  <text x="228" y="468">06</text>
                  <text x="252" y="468">03</text>
                  <text x="276" y="468">55</text>
                  <text x="300" y="468">1D</text>
                  <text x="324" y="468">13</text>
                  <text x="120" y="484">Comments:</text>
                  <text x="232" y="484">RFC</text>
                  <text x="268" y="484">5280</text>
                  <text x="144" y="500">extensionValue:</text>
                  <text x="284" y="500">BasicConstraints</text>
                  <text x="56" y="532">5</text>
                  <text x="104" y="532">Name:</text>
                  <text x="232" y="532">CRL</text>
                  <text x="300" y="532">Distribution</text>
                  <text x="380" y="532">Points</text>
                  <text x="132" y="548">Identifiers:</text>
                  <text x="304" y="548">cRLDistributionPoints</text>
                  <text x="100" y="564">OID:</text>
                  <text x="256" y="564">2.5.29.31</text>
                  <text x="100" y="580">DER:</text>
                  <text x="228" y="580">06</text>
                  <text x="252" y="580">03</text>
                  <text x="276" y="580">55</text>
                  <text x="300" y="580">1D</text>
                  <text x="324" y="580">1F</text>
                  <text x="120" y="596">Comments:</text>
                  <text x="232" y="596">RFC</text>
                  <text x="268" y="596">5280</text>
                  <text x="144" y="612">extensionValue:</text>
                  <text x="304" y="612">CRLDistributionPoints</text>
                  <text x="56" y="644">6</text>
                  <text x="104" y="644">Name:</text>
                  <text x="264" y="644">Certificate</text>
                  <text x="348" y="644">Policies</text>
                  <text x="132" y="660">Identifiers:</text>
                  <text x="296" y="660">certificatePolicies</text>
                  <text x="100" y="676">OID:</text>
                  <text x="256" y="676">2.5.29.32</text>
                  <text x="100" y="692">DER:</text>
                  <text x="228" y="692">06</text>
                  <text x="252" y="692">03</text>
                  <text x="276" y="692">55</text>
                  <text x="300" y="692">1D</text>
                  <text x="324" y="692">20</text>
                  <text x="120" y="708">Comments:</text>
                  <text x="232" y="708">RFC</text>
                  <text x="268" y="708">5280</text>
                  <text x="144" y="724">extensionValue:</text>
                  <text x="296" y="724">CertificatePolicies</text>
                  <text x="56" y="756">7</text>
                  <text x="104" y="756">Name:</text>
                  <text x="256" y="756">Authority</text>
                  <text x="312" y="756">Key</text>
                  <text x="372" y="756">Identifier</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="308" y="772">authorityKeyIdentifier</text>
                  <text x="100" y="788">OID:</text>
                  <text x="256" y="788">2.5.29.35</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">03</text>
                  <text x="276" y="804">55</text>
                  <text x="300" y="804">1D</text>
                  <text x="324" y="804">23</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="232" y="820">RFC</text>
                  <text x="268" y="820">5280</text>
                  <text x="144" y="836">extensionValue:</text>
                  <text x="308" y="836">AuthorityKeyIdentifier</text>
                  <text x="56" y="868">8</text>
                  <text x="104" y="868">Name:</text>
                  <text x="252" y="868">Extended</text>
                  <text x="304" y="868">Key</text>
                  <text x="344" y="868">Usage</text>
                  <text x="132" y="884">Identifiers:</text>
                  <text x="264" y="884">extKeyUsage</text>
                  <text x="100" y="900">OID:</text>
                  <text x="256" y="900">2.5.29.37</text>
                  <text x="100" y="916">DER:</text>
                  <text x="228" y="916">06</text>
                  <text x="252" y="916">03</text>
                  <text x="276" y="916">55</text>
                  <text x="300" y="916">1D</text>
                  <text x="324" y="916">25</text>
                  <text x="120" y="932">Comments:</text>
                  <text x="232" y="932">RFC</text>
                  <text x="268" y="932">5280</text>
                  <text x="144" y="948">extensionValue:</text>
                  <text x="288" y="948">ExtKeyUsageSyntax</text>
                  <text x="56" y="980">9</text>
                  <text x="104" y="980">Name:</text>
                  <text x="256" y="980">Authority</text>
                  <text x="344" y="980">Information</text>
                  <text x="420" y="980">Access</text>
                  <text x="132" y="996">Identifiers:</text>
                  <text x="296" y="996">authorityInfoAccess</text>
                  <text x="100" y="1012">OID:</text>
                  <text x="288" y="1012">1.3.6.1.5.5.7.1.1</text>
                  <text x="100" y="1028">DER:</text>
                  <text x="228" y="1028">06</text>
                  <text x="252" y="1028">08</text>
                  <text x="276" y="1028">2B</text>
                  <text x="300" y="1028">06</text>
                  <text x="324" y="1028">01</text>
                  <text x="348" y="1028">05</text>
                  <text x="372" y="1028">05</text>
                  <text x="396" y="1028">07</text>
                  <text x="420" y="1028">01</text>
                  <text x="444" y="1028">01</text>
                  <text x="120" y="1044">Comments:</text>
                  <text x="232" y="1044">RFC</text>
                  <text x="268" y="1044">5280</text>
                  <text x="144" y="1060">extensionValue:</text>
                  <text x="320" y="1060">AuthorityInfoAccessSyntax</text>
                  <text x="52" y="1092">24</text>
                  <text x="104" y="1092">Name:</text>
                  <text x="248" y="1092">Subject</text>
                  <text x="320" y="1092">Directory</text>
                  <text x="404" y="1092">Attributes</text>
                  <text x="132" y="1108">Identifiers:</text>
                  <text x="324" y="1108">subjectDirectoryAttributes</text>
                  <text x="100" y="1124">OID:</text>
                  <text x="252" y="1124">2.5.29.9</text>
                  <text x="100" y="1140">DER:</text>
                  <text x="228" y="1140">06</text>
                  <text x="252" y="1140">03</text>
                  <text x="276" y="1140">55</text>
                  <text x="300" y="1140">1D</text>
                  <text x="324" y="1140">09</text>
                  <text x="120" y="1156">Comments:</text>
                  <text x="232" y="1156">RFC</text>
                  <text x="268" y="1156">5280</text>
                  <text x="144" y="1172">extensionValue:</text>
                  <text x="324" y="1172">SubjectDirectoryAttributes</text>
                  <text x="52" y="1204">25</text>
                  <text x="104" y="1204">Name:</text>
                  <text x="244" y="1204">Issuer</text>
                  <text x="320" y="1204">Alternative</text>
                  <text x="388" y="1204">Name</text>
                  <text x="132" y="1220">Identifiers:</text>
                  <text x="272" y="1220">issuerAltName</text>
                  <text x="100" y="1236">OID:</text>
                  <text x="256" y="1236">2.5.29.18</text>
                  <text x="100" y="1252">DER:</text>
                  <text x="228" y="1252">06</text>
                  <text x="252" y="1252">03</text>
                  <text x="276" y="1252">55</text>
                  <text x="300" y="1252">1D</text>
                  <text x="324" y="1252">12</text>
                  <text x="120" y="1268">Comments:</text>
                  <text x="232" y="1268">RFC</text>
                  <text x="268" y="1268">5280</text>
                  <text x="144" y="1284">extensionValue:</text>
                  <text x="272" y="1284">IssuerAltName</text>
                  <text x="52" y="1316">26</text>
                  <text x="104" y="1316">Name:</text>
                  <text x="236" y="1316">Name</text>
                  <text x="304" y="1316">Constraints</text>
                  <text x="132" y="1332">Identifiers:</text>
                  <text x="280" y="1332">nameConstraints</text>
                  <text x="100" y="1348">OID:</text>
                  <text x="256" y="1348">2.5.29.30</text>
                  <text x="100" y="1364">DER:</text>
                  <text x="228" y="1364">06</text>
                  <text x="252" y="1364">03</text>
                  <text x="276" y="1364">55</text>
                  <text x="300" y="1364">1D</text>
                  <text x="324" y="1364">1E</text>
                  <text x="120" y="1380">Comments:</text>
                  <text x="232" y="1380">RFC</text>
                  <text x="268" y="1380">9549</text>
                  <text x="144" y="1396">extensionValue:</text>
                  <text x="280" y="1396">NameConstraints</text>
                  <text x="52" y="1428">27</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="244" y="1428">Policy</text>
                  <text x="308" y="1428">Mappings</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="276" y="1444">policyMappings</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="256" y="1460">2.5.29.33</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">03</text>
                  <text x="276" y="1476">55</text>
                  <text x="300" y="1476">1D</text>
                  <text x="324" y="1476">21</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="232" y="1492">RFC</text>
                  <text x="268" y="1492">5280</text>
                  <text x="144" y="1508">extensionValue:</text>
                  <text x="276" y="1508">PolicyMappings</text>
                  <text x="52" y="1540">28</text>
                  <text x="104" y="1540">Name:</text>
                  <text x="244" y="1540">Policy</text>
                  <text x="320" y="1540">Constraints</text>
                  <text x="132" y="1556">Identifiers:</text>
                  <text x="288" y="1556">policyConstraints</text>
                  <text x="100" y="1572">OID:</text>
                  <text x="256" y="1572">2.5.29.36</text>
                  <text x="100" y="1588">DER:</text>
                  <text x="228" y="1588">06</text>
                  <text x="252" y="1588">03</text>
                  <text x="276" y="1588">55</text>
                  <text x="300" y="1588">1D</text>
                  <text x="324" y="1588">24</text>
                  <text x="120" y="1604">Comments:</text>
                  <text x="232" y="1604">RFC</text>
                  <text x="268" y="1604">5280</text>
                  <text x="144" y="1620">extensionValue:</text>
                  <text x="288" y="1620">PolicyConstraints</text>
                  <text x="52" y="1652">29</text>
                  <text x="104" y="1652">Name:</text>
                  <text x="252" y="1652">Freshest</text>
                  <text x="304" y="1652">CRL</text>
                  <text x="132" y="1668">Identifiers:</text>
                  <text x="264" y="1668">freshestCRL</text>
                  <text x="100" y="1684">OID:</text>
                  <text x="256" y="1684">2.5.29.46</text>
                  <text x="100" y="1700">DER:</text>
                  <text x="228" y="1700">06</text>
                  <text x="252" y="1700">03</text>
                  <text x="276" y="1700">55</text>
                  <text x="300" y="1700">1D</text>
                  <text x="324" y="1700">2E</text>
                  <text x="120" y="1716">Comments:</text>
                  <text x="232" y="1716">RFC</text>
                  <text x="268" y="1716">5280</text>
                  <text x="144" y="1732">extensionValue:</text>
                  <text x="264" y="1732">FreshestCRL</text>
                  <text x="52" y="1764">30</text>
                  <text x="104" y="1764">Name:</text>
                  <text x="248" y="1764">Inhibit</text>
                  <text x="320" y="1764">anyPolicy</text>
                  <text x="132" y="1780">Identifiers:</text>
                  <text x="284" y="1780">inhibitAnyPolicy</text>
                  <text x="100" y="1796">OID:</text>
                  <text x="256" y="1796">2.5.29.54</text>
                  <text x="100" y="1812">DER:</text>
                  <text x="228" y="1812">06</text>
                  <text x="252" y="1812">03</text>
                  <text x="276" y="1812">55</text>
                  <text x="300" y="1812">1D</text>
                  <text x="324" y="1812">36</text>
                  <text x="120" y="1828">Comments:</text>
                  <text x="232" y="1828">RFC</text>
                  <text x="268" y="1828">5280</text>
                  <text x="144" y="1844">extensionValue:</text>
                  <text x="284" y="1844">InhibitAnyPolicy</text>
                  <text x="52" y="1876">31</text>
                  <text x="104" y="1876">Name:</text>
                  <text x="248" y="1876">Subject</text>
                  <text x="328" y="1876">Information</text>
                  <text x="404" y="1876">Access</text>
                  <text x="132" y="1892">Identifiers:</text>
                  <text x="288" y="1892">subjectInfoAccess</text>
                  <text x="100" y="1908">OID:</text>
                  <text x="292" y="1908">1.3.6.1.5.5.7.1.11</text>
                  <text x="100" y="1924">DER:</text>
                  <text x="228" y="1924">06</text>
                  <text x="252" y="1924">08</text>
                  <text x="276" y="1924">2B</text>
                  <text x="300" y="1924">06</text>
                  <text x="324" y="1924">01</text>
                  <text x="348" y="1924">05</text>
                  <text x="372" y="1924">05</text>
                  <text x="396" y="1924">07</text>
                  <text x="420" y="1924">01</text>
                  <text x="444" y="1924">0B</text>
                  <text x="120" y="1940">Comments:</text>
                  <text x="232" y="1940">RFC</text>
                  <text x="268" y="1940">5280</text>
                  <text x="144" y="1956">extensionValue:</text>
                  <text x="312" y="1956">SubjectInfoAccessSyntax</text>
                  <text x="52" y="1988">32</text>
                  <text x="104" y="1988">Name:</text>
                  <text x="268" y="1988">IPAddrBlocks</text>
                  <text x="132" y="2004">Identifiers:</text>
                  <text x="292" y="2004">id-pe-ipAddrBlocks</text>
                  <text x="100" y="2020">OID:</text>
                  <text x="288" y="2020">1.3.6.1.5.5.7.1.7</text>
                  <text x="100" y="2036">DER:</text>
                  <text x="228" y="2036">06</text>
                  <text x="252" y="2036">08</text>
                  <text x="276" y="2036">2B</text>
                  <text x="300" y="2036">06</text>
                  <text x="324" y="2036">01</text>
                  <text x="348" y="2036">05</text>
                  <text x="372" y="2036">05</text>
                  <text x="396" y="2036">07</text>
                  <text x="420" y="2036">01</text>
                  <text x="444" y="2036">07</text>
                  <text x="120" y="2052">Comments:</text>
                  <text x="232" y="2052">RFC</text>
                  <text x="268" y="2052">3779</text>
                  <text x="144" y="2068">extensionValue:</text>
                  <text x="268" y="2068">IPAddrBlocks</text>
                  <text x="52" y="2100">33</text>
                  <text x="104" y="2100">Name:</text>
                  <text x="228" y="2100">AS</text>
                  <text x="288" y="2100">Identifiers</text>
                  <text x="132" y="2116">Identifiers:</text>
                  <text x="308" y="2116">id-pe-autonomousSysIds</text>
                  <text x="100" y="2132">OID:</text>
                  <text x="288" y="2132">1.3.6.1.5.5.7.1.8</text>
                  <text x="100" y="2148">DER:</text>
                  <text x="228" y="2148">06</text>
                  <text x="252" y="2148">08</text>
                  <text x="276" y="2148">2B</text>
                  <text x="300" y="2148">06</text>
                  <text x="324" y="2148">01</text>
                  <text x="348" y="2148">05</text>
                  <text x="372" y="2148">05</text>
                  <text x="396" y="2148">07</text>
                  <text x="420" y="2148">01</text>
                  <text x="444" y="2148">08</text>
                  <text x="120" y="2164">Comments:</text>
                  <text x="232" y="2164">RFC</text>
                  <text x="268" y="2164">3779</text>
                  <text x="144" y="2180">extensionValue:</text>
                  <text x="272" y="2180">ASIdentifiers</text>
                  <text x="52" y="2212">34</text>
                  <text x="104" y="2212">Name:</text>
                  <text x="268" y="2212">IPAddrBlocks</text>
                  <text x="332" y="2212">v2</text>
                  <text x="132" y="2228">Identifiers:</text>
                  <text x="304" y="2228">id-pe-ipAddrBlocks-v2</text>
                  <text x="100" y="2244">OID:</text>
                  <text x="292" y="2244">1.3.6.1.5.5.7.1.28</text>
                  <text x="100" y="2260">DER:</text>
                  <text x="228" y="2260">06</text>
                  <text x="252" y="2260">08</text>
                  <text x="276" y="2260">2B</text>
                  <text x="300" y="2260">06</text>
                  <text x="324" y="2260">01</text>
                  <text x="348" y="2260">05</text>
                  <text x="372" y="2260">05</text>
                  <text x="396" y="2260">07</text>
                  <text x="420" y="2260">01</text>
                  <text x="444" y="2260">1C</text>
                  <text x="120" y="2276">Comments:</text>
                  <text x="232" y="2276">RFC</text>
                  <text x="268" y="2276">8360</text>
                  <text x="144" y="2292">extensionValue:</text>
                  <text x="268" y="2292">IPAddrBlocks</text>
                  <text x="52" y="2324">35</text>
                  <text x="104" y="2324">Name:</text>
                  <text x="228" y="2324">AS</text>
                  <text x="288" y="2324">Identifiers</text>
                  <text x="348" y="2324">v2</text>
                  <text x="132" y="2340">Identifiers:</text>
                  <text x="320" y="2340">id-pe-autonomousSysIds-v2</text>
                  <text x="100" y="2356">OID:</text>
                  <text x="292" y="2356">1.3.6.1.5.5.7.1.29</text>
                  <text x="100" y="2372">DER:</text>
                  <text x="228" y="2372">06</text>
                  <text x="252" y="2372">08</text>
                  <text x="276" y="2372">2B</text>
                  <text x="300" y="2372">06</text>
                  <text x="324" y="2372">01</text>
                  <text x="348" y="2372">05</text>
                  <text x="372" y="2372">05</text>
                  <text x="396" y="2372">07</text>
                  <text x="420" y="2372">01</text>
                  <text x="444" y="2372">1D</text>
                  <text x="120" y="2388">Comments:</text>
                  <text x="232" y="2388">RFC</text>
                  <text x="268" y="2388">8360</text>
                  <text x="144" y="2404">extensionValue:</text>
                  <text x="272" y="2404">ASIdentifiers</text>
                  <text x="52" y="2436">36</text>
                  <text x="104" y="2436">Name:</text>
                  <text x="236" y="2436">OCSP</text>
                  <text x="268" y="2436">No</text>
                  <text x="304" y="2436">Check</text>
                  <text x="132" y="2452">Identifiers:</text>
                  <text x="300" y="2452">id-pkix-ocsp-nocheck</text>
                  <text x="100" y="2468">OID:</text>
                  <text x="300" y="2468">1.3.6.1.5.5.7.48.1.5</text>
                  <text x="100" y="2484">DER:</text>
                  <text x="228" y="2484">06</text>
                  <text x="252" y="2484">09</text>
                  <text x="276" y="2484">2B</text>
                  <text x="300" y="2484">06</text>
                  <text x="324" y="2484">01</text>
                  <text x="348" y="2484">05</text>
                  <text x="372" y="2484">05</text>
                  <text x="396" y="2484">07</text>
                  <text x="420" y="2484">30</text>
                  <text x="444" y="2484">01</text>
                  <text x="468" y="2484">05</text>
                  <text x="120" y="2500">Comments:</text>
                  <text x="232" y="2500">RFC</text>
                  <text x="268" y="2500">6960</text>
                  <text x="144" y="2516">extensionValue:</text>
                  <text x="236" y="2516">null</text>
                  <text x="52" y="2548">37</text>
                  <text x="104" y="2548">Name:</text>
                  <text x="276" y="2548">Precertificate</text>
                  <text x="368" y="2548">Signing</text>
                  <text x="448" y="2548">Certificate</text>
                  <text x="132" y="2564">Identifiers:</text>
                  <text x="100" y="2580">OID:</text>
                  <text x="312" y="2580">1.3.6.1.4.1.11129.2.4.3</text>
                  <text x="100" y="2596">DER:</text>
                  <text x="228" y="2596">06</text>
                  <text x="252" y="2596">0A</text>
                  <text x="276" y="2596">2B</text>
                  <text x="300" y="2596">06</text>
                  <text x="324" y="2596">01</text>
                  <text x="348" y="2596">04</text>
                  <text x="372" y="2596">01</text>
                  <text x="396" y="2596">D6</text>
                  <text x="420" y="2596">79</text>
                  <text x="444" y="2596">02</text>
                  <text x="468" y="2596">04</text>
                  <text x="492" y="2596">03</text>
                  <text x="120" y="2612">Comments:</text>
                  <text x="232" y="2612">RFC</text>
                  <text x="268" y="2612">6962</text>
                  <text x="144" y="2628">extensionValue:</text>
                  <text x="236" y="2628">null</text>
                  <text x="52" y="2660">38</text>
                  <text x="104" y="2660">Name:</text>
                  <text x="232" y="2660">TLS</text>
                  <text x="284" y="2660">Features</text>
                  <text x="132" y="2676">Identifiers:</text>
                  <text x="284" y="2676">id-pe-tlsfeature</text>
                  <text x="100" y="2692">OID:</text>
                  <text x="292" y="2692">1.3.6.1.5.5.7.1.24</text>
                  <text x="100" y="2708">DER:</text>
                  <text x="228" y="2708">06</text>
                  <text x="252" y="2708">08</text>
                  <text x="276" y="2708">2B</text>
                  <text x="300" y="2708">06</text>
                  <text x="324" y="2708">01</text>
                  <text x="348" y="2708">05</text>
                  <text x="372" y="2708">05</text>
                  <text x="396" y="2708">07</text>
                  <text x="420" y="2708">01</text>
                  <text x="444" y="2708">18</text>
                  <text x="120" y="2724">Comments:</text>
                  <text x="232" y="2724">RFC</text>
                  <text x="268" y="2724">7633</text>
                  <text x="144" y="2740">extensionValue:</text>
                  <text x="264" y="2740">TLSFeatures</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:        RFC 5280                                 |
|       | AttributeValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:        RFC 9549                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IPAddrBlocks                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:        RFC 3779                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Identifiers                           |
|       | Identifiers:     id-pe-autonomousSysIds                   |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:        RFC 3779                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IPAddrBlocks v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:        RFC 8360                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Identifiers v2                        |
|       | Identifiers:     id-pe-autonomousSysIds-v2                |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:        RFC 8360                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:        RFC 6960                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    37 | Name:            Precertificate Signing Certificate       |
|       | Identifiers:                                              |
|       | OID:             1.3.6.1.4.1.11129.2.4.3                  |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 03      |
|       | Comments:        RFC 6962                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    38 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:        RFC 7633                                 |
|       | extensionValue:  TLSFeatures                              |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies Registry" under the registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2432" width="560" viewBox="0 0 560 2432" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2416" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2416" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2416" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,960 L 552,960" fill="none" stroke="black"/>
                <path d="M 8,1072 L 552,1072" fill="none" stroke="black"/>
                <path d="M 8,1184 L 552,1184" fill="none" stroke="black"/>
                <path d="M 8,1296 L 552,1296" fill="none" stroke="black"/>
                <path d="M 8,1408 L 552,1408" fill="none" stroke="black"/>
                <path d="M 8,1520 L 552,1520" fill="none" stroke="black"/>
                <path d="M 8,1632 L 552,1632" fill="none" stroke="black"/>
                <path d="M 8,1744 L 552,1744" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,1968 L 552,1968" fill="none" stroke="black"/>
                <path d="M 8,2080 L 552,2080" fill="none" stroke="black"/>
                <path d="M 8,2192 L 552,2192" fill="none" stroke="black"/>
                <path d="M 8,2304 L 552,2304" fill="none" stroke="black"/>
                <path d="M 8,2416 L 552,2416" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Certificate</text>
                  <text x="204" y="52">Policy</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="232" y="84">Any</text>
                  <text x="276" y="84">Policy</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="256" y="100">anyPolicy</text>
                  <text x="100" y="116">OID:</text>
                  <text x="264" y="116">2.5.29.32.0</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">04</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">20</text>
                  <text x="348" y="132">00</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">5280</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="244" y="180">Domain</text>
                  <text x="316" y="180">Validation</text>
                  <text x="380" y="180">(DV)</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">domain-validated</text>
                  <text x="100" y="212">OID:</text>
                  <text x="276" y="212">2.23.140.1.2.1</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">06</text>
                  <text x="276" y="228">67</text>
                  <text x="300" y="228">81</text>
                  <text x="324" y="228">0C</text>
                  <text x="348" y="228">01</text>
                  <text x="372" y="228">02</text>
                  <text x="396" y="228">01</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="260" y="244">CA/Browser</text>
                  <text x="328" y="244">Forum</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="268" y="276">Organization</text>
                  <text x="364" y="276">Validation</text>
                  <text x="428" y="276">(OV)</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="308" y="292">organization-validated</text>
                  <text x="100" y="308">OID:</text>
                  <text x="276" y="308">2.23.140.1.2.2</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">06</text>
                  <text x="276" y="324">67</text>
                  <text x="300" y="324">81</text>
                  <text x="324" y="324">0C</text>
                  <text x="348" y="324">01</text>
                  <text x="372" y="324">02</text>
                  <text x="396" y="324">02</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="260" y="340">CA/Browser</text>
                  <text x="328" y="340">Forum</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="260" y="372">Individual</text>
                  <text x="348" y="372">Validation</text>
                  <text x="412" y="372">(IV)</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="300" y="388">individual-validated</text>
                  <text x="100" y="404">OID:</text>
                  <text x="276" y="404">2.23.140.1.2.3</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">06</text>
                  <text x="276" y="420">67</text>
                  <text x="300" y="420">81</text>
                  <text x="324" y="420">0C</text>
                  <text x="348" y="420">01</text>
                  <text x="372" y="420">02</text>
                  <text x="396" y="420">03</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="260" y="436">CA/Browser</text>
                  <text x="328" y="436">Forum</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="252" y="468">Extended</text>
                  <text x="332" y="468">Validation</text>
                  <text x="396" y="468">(EV)</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="272" y="484">ev-guidelines</text>
                  <text x="100" y="500">OID:</text>
                  <text x="268" y="500">2.23.140.1.1</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">05</text>
                  <text x="276" y="516">67</text>
                  <text x="300" y="516">81</text>
                  <text x="324" y="516">0C</text>
                  <text x="348" y="516">01</text>
                  <text x="372" y="516">01</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="260" y="532">CA/Browser</text>
                  <text x="328" y="532">Forum</text>
                  <text x="56" y="564">7</text>
                  <text x="104" y="564">Name:</text>
                  <text x="252" y="564">Resource</text>
                  <text x="304" y="564">PKI</text>
                  <text x="348" y="564">(RPKI)</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="304" y="580">id-cp-ipAddr-asNumber</text>
                  <text x="100" y="596">OID:</text>
                  <text x="292" y="596">1.3.6.1.5.5.7.14.2</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">0E</text>
                  <text x="444" y="612">02</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="232" y="628">RFC</text>
                  <text x="268" y="628">3779</text>
                  <text x="56" y="660">8</text>
                  <text x="104" y="660">Name:</text>
                  <text x="252" y="660">Resource</text>
                  <text x="304" y="660">PKI</text>
                  <text x="348" y="660">(RPKI)</text>
                  <text x="432" y="660">(Alternative)</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="316" y="676">id-cp-ipAddr-asNumber-v2</text>
                  <text x="100" y="692">OID:</text>
                  <text x="292" y="692">1.3.6.1.5.5.7.14.3</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">0E</text>
                  <text x="444" y="708">03</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">8360</text>
                  <text x="52" y="756">24</text>
                  <text x="104" y="756">Name:</text>
                  <text x="244" y="756">Remote</text>
                  <text x="288" y="756">SIM</text>
                  <text x="356" y="756">Provisioning</text>
                  <text x="428" y="756">Role</text>
                  <text x="264" y="772">Certificate</text>
                  <text x="340" y="772">Issuer</text>
                  <text x="132" y="788">Identifiers:</text>
                  <text x="272" y="788">id-rspRole-ci</text>
                  <text x="100" y="804">OID:</text>
                  <text x="284" y="804">2.23.146.1.2.1.0</text>
                  <text x="100" y="820">DER:</text>
                  <text x="228" y="820">06</text>
                  <text x="252" y="820">07</text>
                  <text x="276" y="820">67</text>
                  <text x="300" y="820">81</text>
                  <text x="324" y="820">12</text>
                  <text x="348" y="820">01</text>
                  <text x="372" y="820">02</text>
                  <text x="396" y="820">01</text>
                  <text x="420" y="820">00</text>
                  <text x="120" y="836">Comments:</text>
                  <text x="236" y="836">GSMA</text>
                  <text x="284" y="836">SGP.22</text>
                  <text x="52" y="868">25</text>
                  <text x="104" y="868">Name:</text>
                  <text x="244" y="868">Remote</text>
                  <text x="288" y="868">SIM</text>
                  <text x="356" y="868">Provisioning</text>
                  <text x="428" y="868">Role</text>
                  <text x="240" y="884">eUICC</text>
                  <text x="276" y="884">v2</text>
                  <text x="132" y="900">Identifiers:</text>
                  <text x="296" y="900">id-rspRole-euicc-v2</text>
                  <text x="100" y="916">OID:</text>
                  <text x="284" y="916">2.23.146.1.2.1.1</text>
                  <text x="100" y="932">DER:</text>
                  <text x="228" y="932">06</text>
                  <text x="252" y="932">07</text>
                  <text x="276" y="932">67</text>
                  <text x="300" y="932">81</text>
                  <text x="324" y="932">12</text>
                  <text x="348" y="932">01</text>
                  <text x="372" y="932">02</text>
                  <text x="396" y="932">01</text>
                  <text x="420" y="932">01</text>
                  <text x="120" y="948">Comments:</text>
                  <text x="236" y="948">GSMA</text>
                  <text x="284" y="948">SGP.22</text>
                  <text x="52" y="980">26</text>
                  <text x="104" y="980">Name:</text>
                  <text x="244" y="980">Remote</text>
                  <text x="288" y="980">SIM</text>
                  <text x="356" y="980">Provisioning</text>
                  <text x="428" y="980">Role</text>
                  <text x="240" y="996">eUICC</text>
                  <text x="132" y="1012">Identifiers:</text>
                  <text x="284" y="1012">id-rspRole-euicc</text>
                  <text x="100" y="1028">OID:</text>
                  <text x="316" y="1028">2.23.146.1.2.1.0.0.0.0.0</text>
                  <text x="100" y="1044">DER:</text>
                  <text x="228" y="1044">06</text>
                  <text x="252" y="1044">0B</text>
                  <text x="276" y="1044">67</text>
                  <text x="300" y="1044">81</text>
                  <text x="324" y="1044">12</text>
                  <text x="348" y="1044">01</text>
                  <text x="372" y="1044">02</text>
                  <text x="396" y="1044">01</text>
                  <text x="420" y="1044">00</text>
                  <text x="444" y="1044">00</text>
                  <text x="468" y="1044">00</text>
                  <text x="492" y="1044">00</text>
                  <text x="516" y="1044">00</text>
                  <text x="120" y="1060">Comments:</text>
                  <text x="236" y="1060">GSMA</text>
                  <text x="284" y="1060">SGP.22</text>
                  <text x="52" y="1092">27</text>
                  <text x="104" y="1092">Name:</text>
                  <text x="244" y="1092">Remote</text>
                  <text x="288" y="1092">SIM</text>
                  <text x="356" y="1092">Provisioning</text>
                  <text x="428" y="1092">Role</text>
                  <text x="240" y="1108">eUICC</text>
                  <text x="316" y="1108">Manufacturer</text>
                  <text x="380" y="1108">v2</text>
                  <text x="132" y="1124">Identifiers:</text>
                  <text x="288" y="1124">id-rspRole-eum-v2</text>
                  <text x="100" y="1140">OID:</text>
                  <text x="284" y="1140">2.23.146.1.2.1.2</text>
                  <text x="100" y="1156">DER:</text>
                  <text x="228" y="1156">06</text>
                  <text x="252" y="1156">07</text>
                  <text x="276" y="1156">67</text>
                  <text x="300" y="1156">81</text>
                  <text x="324" y="1156">12</text>
                  <text x="348" y="1156">01</text>
                  <text x="372" y="1156">02</text>
                  <text x="396" y="1156">01</text>
                  <text x="420" y="1156">02</text>
                  <text x="120" y="1172">Comments:</text>
                  <text x="236" y="1172">GSMA</text>
                  <text x="284" y="1172">SGP.22</text>
                  <text x="52" y="1204">28</text>
                  <text x="104" y="1204">Name:</text>
                  <text x="244" y="1204">Remote</text>
                  <text x="288" y="1204">SIM</text>
                  <text x="356" y="1204">Provisioning</text>
                  <text x="428" y="1204">Role</text>
                  <text x="240" y="1220">eUICC</text>
                  <text x="316" y="1220">Manufacturer</text>
                  <text x="132" y="1236">Identifiers:</text>
                  <text x="276" y="1236">id-rspRole-eum</text>
                  <text x="100" y="1252">OID:</text>
                  <text x="300" y="1252">2.23.146.1.2.1.0.0.0</text>
                  <text x="100" y="1268">DER:</text>
                  <text x="228" y="1268">06</text>
                  <text x="252" y="1268">09</text>
                  <text x="276" y="1268">67</text>
                  <text x="300" y="1268">81</text>
                  <text x="324" y="1268">12</text>
                  <text x="348" y="1268">01</text>
                  <text x="372" y="1268">02</text>
                  <text x="396" y="1268">01</text>
                  <text x="420" y="1268">00</text>
                  <text x="444" y="1268">00</text>
                  <text x="468" y="1268">00</text>
                  <text x="120" y="1284">Comments:</text>
                  <text x="236" y="1284">GSMA</text>
                  <text x="284" y="1284">SGP.22</text>
                  <text x="52" y="1316">29</text>
                  <text x="104" y="1316">Name:</text>
                  <text x="244" y="1316">Remote</text>
                  <text x="288" y="1316">SIM</text>
                  <text x="356" y="1316">Provisioning</text>
                  <text x="428" y="1316">Role</text>
                  <text x="244" y="1332">SM-DP+</text>
                  <text x="288" y="1332">TLS</text>
                  <text x="316" y="1332">v2</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="300" y="1348">id-rspRole-dp-tls-v2</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="284" y="1364">2.23.146.1.2.1.3</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">07</text>
                  <text x="276" y="1380">67</text>
                  <text x="300" y="1380">81</text>
                  <text x="324" y="1380">12</text>
                  <text x="348" y="1380">01</text>
                  <text x="372" y="1380">02</text>
                  <text x="396" y="1380">01</text>
                  <text x="420" y="1380">03</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="236" y="1396">GSMA</text>
                  <text x="284" y="1396">SGP.22</text>
                  <text x="52" y="1428">30</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="244" y="1428">Remote</text>
                  <text x="288" y="1428">SIM</text>
                  <text x="356" y="1428">Provisioning</text>
                  <text x="428" y="1428">Role</text>
                  <text x="244" y="1444">SM-DP+</text>
                  <text x="288" y="1444">TLS</text>
                  <text x="132" y="1460">Identifiers:</text>
                  <text x="288" y="1460">id-rspRole-dp-tls</text>
                  <text x="100" y="1476">OID:</text>
                  <text x="308" y="1476">2.23.146.1.2.1.0.0.1.0</text>
                  <text x="100" y="1492">DER:</text>
                  <text x="228" y="1492">06</text>
                  <text x="252" y="1492">0A</text>
                  <text x="276" y="1492">67</text>
                  <text x="300" y="1492">81</text>
                  <text x="324" y="1492">12</text>
                  <text x="348" y="1492">01</text>
                  <text x="372" y="1492">02</text>
                  <text x="396" y="1492">01</text>
                  <text x="420" y="1492">00</text>
                  <text x="444" y="1492">00</text>
                  <text x="468" y="1492">01</text>
                  <text x="492" y="1492">00</text>
                  <text x="120" y="1508">Comments:</text>
                  <text x="236" y="1508">GSMA</text>
                  <text x="284" y="1508">SGP.22</text>
                  <text x="52" y="1540">31</text>
                  <text x="104" y="1540">Name:</text>
                  <text x="244" y="1540">Remote</text>
                  <text x="288" y="1540">SIM</text>
                  <text x="356" y="1540">Provisioning</text>
                  <text x="428" y="1540">Role</text>
                  <text x="244" y="1556">SM-DP+</text>
                  <text x="332" y="1556">Authentication</text>
                  <text x="404" y="1556">v2</text>
                  <text x="132" y="1572">Identifiers:</text>
                  <text x="304" y="1572">id-rspRole-dp-auth-v2</text>
                  <text x="100" y="1588">OID:</text>
                  <text x="284" y="1588">2.23.146.1.2.1.4</text>
                  <text x="100" y="1604">DER:</text>
                  <text x="228" y="1604">06</text>
                  <text x="252" y="1604">07</text>
                  <text x="276" y="1604">67</text>
                  <text x="300" y="1604">81</text>
                  <text x="324" y="1604">12</text>
                  <text x="348" y="1604">01</text>
                  <text x="372" y="1604">02</text>
                  <text x="396" y="1604">01</text>
                  <text x="420" y="1604">04</text>
                  <text x="120" y="1620">Comments:</text>
                  <text x="236" y="1620">GSMA</text>
                  <text x="284" y="1620">SGP.22</text>
                  <text x="52" y="1652">32</text>
                  <text x="104" y="1652">Name:</text>
                  <text x="244" y="1652">Remote</text>
                  <text x="288" y="1652">SIM</text>
                  <text x="356" y="1652">Provisioning</text>
                  <text x="428" y="1652">Role</text>
                  <text x="244" y="1668">SM-DP+</text>
                  <text x="332" y="1668">Authentication</text>
                  <text x="132" y="1684">Identifiers:</text>
                  <text x="292" y="1684">id-rspRole-dp-auth</text>
                  <text x="100" y="1700">OID:</text>
                  <text x="308" y="1700">2.23.146.1.2.1.0.0.1.1</text>
                  <text x="100" y="1716">DER:</text>
                  <text x="228" y="1716">06</text>
                  <text x="252" y="1716">0A</text>
                  <text x="276" y="1716">67</text>
                  <text x="300" y="1716">81</text>
                  <text x="324" y="1716">12</text>
                  <text x="348" y="1716">01</text>
                  <text x="372" y="1716">02</text>
                  <text x="396" y="1716">01</text>
                  <text x="420" y="1716">00</text>
                  <text x="444" y="1716">00</text>
                  <text x="468" y="1716">01</text>
                  <text x="492" y="1716">01</text>
                  <text x="120" y="1732">Comments:</text>
                  <text x="236" y="1732">GSMA</text>
                  <text x="284" y="1732">SGP.22</text>
                  <text x="52" y="1764">33</text>
                  <text x="104" y="1764">Name:</text>
                  <text x="244" y="1764">Remote</text>
                  <text x="288" y="1764">SIM</text>
                  <text x="356" y="1764">Provisioning</text>
                  <text x="428" y="1764">Role</text>
                  <text x="244" y="1780">SM-DP+</text>
                  <text x="304" y="1780">Profile</text>
                  <text x="368" y="1780">Binding</text>
                  <text x="412" y="1780">v2</text>
                  <text x="132" y="1796">Identifiers:</text>
                  <text x="296" y="1796">id-rspRole-dp-pb-v2</text>
                  <text x="100" y="1812">OID:</text>
                  <text x="284" y="1812">2.23.146.1.2.1.5</text>
                  <text x="100" y="1828">DER:</text>
                  <text x="228" y="1828">06</text>
                  <text x="252" y="1828">07</text>
                  <text x="276" y="1828">67</text>
                  <text x="300" y="1828">81</text>
                  <text x="324" y="1828">12</text>
                  <text x="348" y="1828">01</text>
                  <text x="372" y="1828">02</text>
                  <text x="396" y="1828">01</text>
                  <text x="420" y="1828">05</text>
                  <text x="120" y="1844">Comments:</text>
                  <text x="236" y="1844">GSMA</text>
                  <text x="284" y="1844">SGP.22</text>
                  <text x="52" y="1876">34</text>
                  <text x="104" y="1876">Name:</text>
                  <text x="244" y="1876">Remote</text>
                  <text x="288" y="1876">SIM</text>
                  <text x="356" y="1876">Provisioning</text>
                  <text x="428" y="1876">Role</text>
                  <text x="244" y="1892">SM-DP+</text>
                  <text x="304" y="1892">Profile</text>
                  <text x="368" y="1892">Binding</text>
                  <text x="132" y="1908">Identifiers:</text>
                  <text x="284" y="1908">id-rspRole-dp-pb</text>
                  <text x="100" y="1924">OID:</text>
                  <text x="308" y="1924">2.23.146.1.2.1.0.0.1.2</text>
                  <text x="100" y="1940">DER:</text>
                  <text x="228" y="1940">06</text>
                  <text x="252" y="1940">0A</text>
                  <text x="276" y="1940">67</text>
                  <text x="300" y="1940">81</text>
                  <text x="324" y="1940">12</text>
                  <text x="348" y="1940">01</text>
                  <text x="372" y="1940">02</text>
                  <text x="396" y="1940">01</text>
                  <text x="420" y="1940">00</text>
                  <text x="444" y="1940">00</text>
                  <text x="468" y="1940">01</text>
                  <text x="492" y="1940">02</text>
                  <text x="120" y="1956">Comments:</text>
                  <text x="236" y="1956">GSMA</text>
                  <text x="284" y="1956">SGP.22</text>
                  <text x="52" y="1988">35</text>
                  <text x="104" y="1988">Name:</text>
                  <text x="244" y="1988">Remote</text>
                  <text x="288" y="1988">SIM</text>
                  <text x="356" y="1988">Provisioning</text>
                  <text x="428" y="1988">Role</text>
                  <text x="240" y="2004">SM-DS</text>
                  <text x="280" y="2004">TLS</text>
                  <text x="308" y="2004">v2</text>
                  <text x="132" y="2020">Identifiers:</text>
                  <text x="300" y="2020">id-rspRole-ds-tls-v2</text>
                  <text x="100" y="2036">OID:</text>
                  <text x="284" y="2036">2.23.146.1.2.1.6</text>
                  <text x="100" y="2052">DER:</text>
                  <text x="228" y="2052">06</text>
                  <text x="252" y="2052">07</text>
                  <text x="276" y="2052">67</text>
                  <text x="300" y="2052">81</text>
                  <text x="324" y="2052">12</text>
                  <text x="348" y="2052">01</text>
                  <text x="372" y="2052">02</text>
                  <text x="396" y="2052">01</text>
                  <text x="420" y="2052">06</text>
                  <text x="120" y="2068">Comments:</text>
                  <text x="236" y="2068">GSMA</text>
                  <text x="284" y="2068">SGP.22</text>
                  <text x="52" y="2100">36</text>
                  <text x="104" y="2100">Name:</text>
                  <text x="244" y="2100">Remote</text>
                  <text x="288" y="2100">SIM</text>
                  <text x="356" y="2100">Provisioning</text>
                  <text x="428" y="2100">Role</text>
                  <text x="240" y="2116">SM-DS</text>
                  <text x="280" y="2116">TLS</text>
                  <text x="132" y="2132">Identifiers:</text>
                  <text x="288" y="2132">id-rspRole-ds-tls</text>
                  <text x="100" y="2148">OID:</text>
                  <text x="308" y="2148">2.23.146.1.2.1.0.0.2.0</text>
                  <text x="100" y="2164">DER:</text>
                  <text x="228" y="2164">06</text>
                  <text x="252" y="2164">0A</text>
                  <text x="276" y="2164">67</text>
                  <text x="300" y="2164">81</text>
                  <text x="324" y="2164">12</text>
                  <text x="348" y="2164">01</text>
                  <text x="372" y="2164">02</text>
                  <text x="396" y="2164">01</text>
                  <text x="420" y="2164">00</text>
                  <text x="444" y="2164">00</text>
                  <text x="468" y="2164">02</text>
                  <text x="492" y="2164">00</text>
                  <text x="120" y="2180">Comments:</text>
                  <text x="236" y="2180">GSMA</text>
                  <text x="284" y="2180">SGP.22</text>
                  <text x="52" y="2212">37</text>
                  <text x="104" y="2212">Name:</text>
                  <text x="244" y="2212">Remote</text>
                  <text x="288" y="2212">SIM</text>
                  <text x="356" y="2212">Provisioning</text>
                  <text x="428" y="2212">Role</text>
                  <text x="240" y="2228">SM-DS</text>
                  <text x="324" y="2228">Authentication</text>
                  <text x="396" y="2228">v2</text>
                  <text x="132" y="2244">Identifiers:</text>
                  <text x="304" y="2244">id-rspRole-ds-auth-v2</text>
                  <text x="100" y="2260">OID:</text>
                  <text x="284" y="2260">2.23.146.1.2.1.7</text>
                  <text x="100" y="2276">DER:</text>
                  <text x="228" y="2276">06</text>
                  <text x="252" y="2276">07</text>
                  <text x="276" y="2276">67</text>
                  <text x="300" y="2276">81</text>
                  <text x="324" y="2276">12</text>
                  <text x="348" y="2276">01</text>
                  <text x="372" y="2276">02</text>
                  <text x="396" y="2276">01</text>
                  <text x="420" y="2276">07</text>
                  <text x="120" y="2292">Comments:</text>
                  <text x="236" y="2292">GSMA</text>
                  <text x="284" y="2292">SGP.22</text>
                  <text x="52" y="2324">38</text>
                  <text x="104" y="2324">Name:</text>
                  <text x="244" y="2324">Remote</text>
                  <text x="288" y="2324">SIM</text>
                  <text x="356" y="2324">Provisioning</text>
                  <text x="428" y="2324">Role</text>
                  <text x="240" y="2340">SM-DS</text>
                  <text x="324" y="2340">Authentication</text>
                  <text x="132" y="2356">Identifiers:</text>
                  <text x="292" y="2356">id-rspRole-ds-auth</text>
                  <text x="100" y="2372">OID:</text>
                  <text x="308" y="2372">2.23.146.1.2.1.0.0.2.1</text>
                  <text x="100" y="2388">DER:</text>
                  <text x="228" y="2388">06</text>
                  <text x="252" y="2388">0A</text>
                  <text x="276" y="2388">67</text>
                  <text x="300" y="2388">81</text>
                  <text x="324" y="2388">12</text>
                  <text x="348" y="2388">01</text>
                  <text x="372" y="2388">02</text>
                  <text x="396" y="2388">01</text>
                  <text x="420" y="2388">00</text>
                  <text x="444" y="2388">00</text>
                  <text x="468" y="2388">02</text>
                  <text x="492" y="2388">01</text>
                  <text x="120" y="2404">Comments:</text>
                  <text x="236" y="2404">GSMA</text>
                  <text x="284" y="2404">SGP.22</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:        CA/Browser Forum                         |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:        CA/Browser Forum                         |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:        CA/Browser Forum                         |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:        CA/Browser Forum                         |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:        RFC 3779                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:        RFC 8360                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    25 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC v2                                 |
|       | Identifiers:     id-rspRole-euicc-v2                      |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    26 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.0.0.0.0.0                 |
|       | DER:             06 0B 67 81 12 01 02 01 00 00 00 00 00   |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    27 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer v2                    |
|       | Identifiers:     id-rspRole-eum-v2                        |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    28 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.0.0.0                     |
|       | DER:             06 09 67 81 12 01 02 01 00 00 00         |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    29 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS v2                            |
|       | Identifiers:     id-rspRole-dp-tls-v2                     |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.0.0.1.0                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 01 00      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    31 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication v2                 |
|       | Identifiers:     id-rspRole-dp-auth-v2                    |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    32 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.0.0.1.1                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 01 01      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    33 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding v2                |
|       | Identifiers:     id-rspRole-dp-pb-v2                      |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    34 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.0.0.1.2                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 01 02      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    35 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS v2                             |
|       | Identifiers:     id-rspRole-ds-tls-v2                     |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    36 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.0.0.2.0                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 02 00      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    37 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication v2                  |
|       | Identifiers:     id-rspRole-ds-auth-v2                    |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    38 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.0.0.2.1                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 02 01      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers Registry" under the registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="560" viewBox="0 0 560 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,256" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,256" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Certificate</text>
                  <text x="204" y="52">Policy</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="272" y="84">Certification</text>
                  <text x="364" y="84">Practice</text>
                  <text x="440" y="84">Statement</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="260" y="100">id-qt-cps,</text>
                  <text x="320" y="100">cps</text>
                  <text x="100" y="116">OID:</text>
                  <text x="288" y="116">1.3.6.1.5.5.7.2.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">02</text>
                  <text x="444" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">5280</text>
                  <text x="56" y="180">2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="236" y="180">User</text>
                  <text x="284" y="180">Notice</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="276" y="196">id-qt-unotice,</text>
                  <text x="368" y="196">unotice</text>
                  <text x="100" y="212">OID:</text>
                  <text x="288" y="212">1.3.6.1.5.5.7.2.2</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">02</text>
                  <text x="444" y="228">02</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="232" y="244">RFC</text>
                  <text x="268" y="244">5280</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access Registry" under the registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="560" viewBox="0 0 560 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,736" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,736" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,736" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 552,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 552,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 552,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 552,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 552,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 552,736" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="128" y="52">Information</text>
                  <text x="204" y="52">Access</text>
                  <text x="56" y="84">1</text>
                  <text x="104" y="84">Name:</text>
                  <text x="236" y="84">OCSP</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="264" y="100">id-ad-ocsp,</text>
                  <text x="364" y="100">id-pkix-ocsp</text>
                  <text x="100" y="116">OID:</text>
                  <text x="292" y="116">1.3.6.1.5.5.7.48.1</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">08</text>
                  <text x="276" y="132">2B</text>
                  <text x="300" y="132">06</text>
                  <text x="324" y="132">01</text>
                  <text x="348" y="132">05</text>
                  <text x="372" y="132">05</text>
                  <text x="396" y="132">07</text>
                  <text x="420" y="132">30</text>
                  <text x="444" y="132">01</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">5280</text>
                  <text x="56" y="180">2</text>
                  <text x="104" y="180">Name:</text>
                  <text x="228" y="180">CA</text>
                  <text x="272" y="180">Issuers</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">id-ad-caIssuers,</text>
                  <text x="392" y="196">caIssuers</text>
                  <text x="100" y="212">OID:</text>
                  <text x="292" y="212">1.3.6.1.5.5.7.48.2</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">30</text>
                  <text x="444" y="228">02</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="232" y="244">RFC</text>
                  <text x="268" y="244">5280</text>
                  <text x="56" y="276">3</text>
                  <text x="104" y="276">Name:</text>
                  <text x="236" y="276">Time</text>
                  <text x="292" y="276">Stamping</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="296" y="292">id-ad-timeStamping,</text>
                  <text x="428" y="292">timeStamping</text>
                  <text x="100" y="308">OID:</text>
                  <text x="292" y="308">1.3.6.1.5.5.7.48.3</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">30</text>
                  <text x="444" y="324">03</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="232" y="340">RFC</text>
                  <text x="268" y="340">3161</text>
                  <text x="56" y="372">5</text>
                  <text x="104" y="372">Name:</text>
                  <text x="228" y="372">CA</text>
                  <text x="284" y="372">Repository</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="292" y="388">id-ad-caRepository</text>
                  <text x="100" y="404">OID:</text>
                  <text x="292" y="404">1.3.6.1.5.5.7.48.5</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">08</text>
                  <text x="276" y="420">2B</text>
                  <text x="300" y="420">06</text>
                  <text x="324" y="420">01</text>
                  <text x="348" y="420">05</text>
                  <text x="372" y="420">05</text>
                  <text x="396" y="420">07</text>
                  <text x="420" y="420">30</text>
                  <text x="444" y="420">05</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="232" y="436">RFC</text>
                  <text x="268" y="436">5280</text>
                  <text x="52" y="468">10</text>
                  <text x="104" y="468">Name:</text>
                  <text x="236" y="468">RPKI</text>
                  <text x="292" y="468">Manifest</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="292" y="484">id-ad-rpkiManifest</text>
                  <text x="100" y="500">OID:</text>
                  <text x="296" y="500">1.3.6.1.5.5.7.48.10</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">08</text>
                  <text x="276" y="516">2B</text>
                  <text x="300" y="516">06</text>
                  <text x="324" y="516">01</text>
                  <text x="348" y="516">05</text>
                  <text x="372" y="516">05</text>
                  <text x="396" y="516">07</text>
                  <text x="420" y="516">30</text>
                  <text x="444" y="516">0A</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="232" y="532">RFC</text>
                  <text x="268" y="532">6487</text>
                  <text x="52" y="564">11</text>
                  <text x="104" y="564">Name:</text>
                  <text x="244" y="564">Signed</text>
                  <text x="300" y="564">Object</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="292" y="580">id-ad-signedObject</text>
                  <text x="100" y="596">OID:</text>
                  <text x="296" y="596">1.3.6.1.5.5.7.48.11</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">30</text>
                  <text x="444" y="612">0B</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="232" y="628">RFC</text>
                  <text x="268" y="628">6487</text>
                  <text x="52" y="660">13</text>
                  <text x="104" y="660">Name:</text>
                  <text x="236" y="660">RPKI</text>
                  <text x="284" y="660">Notify</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="284" y="676">id-ad-rpkiNotify</text>
                  <text x="100" y="692">OID:</text>
                  <text x="296" y="692">1.3.6.1.5.5.7.48.13</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">30</text>
                  <text x="444" y="708">0D</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">8182</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:        RFC 3161                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages Registry" under the registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1808" width="544" viewBox="0 0 544 1808" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1792" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1792" fill="none" stroke="black"/>
                <path d="M 536,32 L 536,1792" fill="none" stroke="black"/>
                <path d="M 8,32 L 536,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 536,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 536,66" fill="none" stroke="black"/>
                <path d="M 8,160 L 536,160" fill="none" stroke="black"/>
                <path d="M 8,256 L 536,256" fill="none" stroke="black"/>
                <path d="M 8,352 L 536,352" fill="none" stroke="black"/>
                <path d="M 8,448 L 536,448" fill="none" stroke="black"/>
                <path d="M 8,544 L 536,544" fill="none" stroke="black"/>
                <path d="M 8,640 L 536,640" fill="none" stroke="black"/>
                <path d="M 8,736 L 536,736" fill="none" stroke="black"/>
                <path d="M 8,832 L 536,832" fill="none" stroke="black"/>
                <path d="M 8,928 L 536,928" fill="none" stroke="black"/>
                <path d="M 8,1024 L 536,1024" fill="none" stroke="black"/>
                <path d="M 8,1120 L 536,1120" fill="none" stroke="black"/>
                <path d="M 8,1216 L 536,1216" fill="none" stroke="black"/>
                <path d="M 8,1312 L 536,1312" fill="none" stroke="black"/>
                <path d="M 8,1408 L 536,1408" fill="none" stroke="black"/>
                <path d="M 8,1504 L 536,1504" fill="none" stroke="black"/>
                <path d="M 8,1600 L 536,1600" fill="none" stroke="black"/>
                <path d="M 8,1696 L 536,1696" fill="none" stroke="black"/>
                <path d="M 8,1792 L 536,1792" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="116" y="52">Extended</text>
                  <text x="168" y="52">Key</text>
                  <text x="208" y="52">Usage</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="232" y="84">Any</text>
                  <text x="284" y="84">Extended</text>
                  <text x="336" y="84">Key</text>
                  <text x="376" y="84">Usage</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="296" y="100">anyExtendedKeyUsage</text>
                  <text x="100" y="116">OID:</text>
                  <text x="264" y="116">2.5.29.37.0</text>
                  <text x="100" y="132">DER:</text>
                  <text x="228" y="132">06</text>
                  <text x="252" y="132">04</text>
                  <text x="276" y="132">55</text>
                  <text x="300" y="132">1D</text>
                  <text x="324" y="132">25</text>
                  <text x="348" y="132">00</text>
                  <text x="120" y="148">Comments:</text>
                  <text x="232" y="148">RFC</text>
                  <text x="268" y="148">5280</text>
                  <text x="56" y="180">1</text>
                  <text x="104" y="180">Name:</text>
                  <text x="232" y="180">TLS</text>
                  <text x="276" y="180">Server</text>
                  <text x="364" y="180">authentication</text>
                  <text x="132" y="196">Identifiers:</text>
                  <text x="284" y="196">id-kp-serverAuth</text>
                  <text x="100" y="212">OID:</text>
                  <text x="288" y="212">1.3.6.1.5.5.7.3.1</text>
                  <text x="100" y="228">DER:</text>
                  <text x="228" y="228">06</text>
                  <text x="252" y="228">08</text>
                  <text x="276" y="228">2B</text>
                  <text x="300" y="228">06</text>
                  <text x="324" y="228">01</text>
                  <text x="348" y="228">05</text>
                  <text x="372" y="228">05</text>
                  <text x="396" y="228">07</text>
                  <text x="420" y="228">03</text>
                  <text x="444" y="228">01</text>
                  <text x="120" y="244">Comments:</text>
                  <text x="232" y="244">RFC</text>
                  <text x="268" y="244">5280</text>
                  <text x="56" y="276">2</text>
                  <text x="104" y="276">Name:</text>
                  <text x="232" y="276">TLS</text>
                  <text x="276" y="276">Client</text>
                  <text x="364" y="276">Authentication</text>
                  <text x="132" y="292">Identifiers:</text>
                  <text x="284" y="292">id-kp-clientAuth</text>
                  <text x="100" y="308">OID:</text>
                  <text x="288" y="308">1.3.6.1.5.5.7.3.2</text>
                  <text x="100" y="324">DER:</text>
                  <text x="228" y="324">06</text>
                  <text x="252" y="324">08</text>
                  <text x="276" y="324">2B</text>
                  <text x="300" y="324">06</text>
                  <text x="324" y="324">01</text>
                  <text x="348" y="324">05</text>
                  <text x="372" y="324">05</text>
                  <text x="396" y="324">07</text>
                  <text x="420" y="324">03</text>
                  <text x="444" y="324">02</text>
                  <text x="120" y="340">Comments:</text>
                  <text x="232" y="340">RFC</text>
                  <text x="268" y="340">5280</text>
                  <text x="56" y="372">3</text>
                  <text x="104" y="372">Name:</text>
                  <text x="236" y="372">Code</text>
                  <text x="288" y="372">Signing</text>
                  <text x="132" y="388">Identifiers:</text>
                  <text x="288" y="388">id-kp-codeSigning</text>
                  <text x="100" y="404">OID:</text>
                  <text x="288" y="404">1.3.6.1.5.5.7.3.3</text>
                  <text x="100" y="420">DER:</text>
                  <text x="228" y="420">06</text>
                  <text x="252" y="420">08</text>
                  <text x="276" y="420">2B</text>
                  <text x="300" y="420">06</text>
                  <text x="324" y="420">01</text>
                  <text x="348" y="420">05</text>
                  <text x="372" y="420">05</text>
                  <text x="396" y="420">07</text>
                  <text x="420" y="420">03</text>
                  <text x="444" y="420">03</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="232" y="436">RFC</text>
                  <text x="268" y="436">5280</text>
                  <text x="56" y="468">4</text>
                  <text x="104" y="468">Name:</text>
                  <text x="240" y="468">Email</text>
                  <text x="308" y="468">protection</text>
                  <text x="388" y="468">(S/MIME)</text>
                  <text x="132" y="484">Identifiers:</text>
                  <text x="304" y="484">id-kp-emailProtection</text>
                  <text x="100" y="500">OID:</text>
                  <text x="288" y="500">1.3.6.1.5.5.7.3.4</text>
                  <text x="100" y="516">DER:</text>
                  <text x="228" y="516">06</text>
                  <text x="252" y="516">08</text>
                  <text x="276" y="516">2B</text>
                  <text x="300" y="516">06</text>
                  <text x="324" y="516">01</text>
                  <text x="348" y="516">05</text>
                  <text x="372" y="516">05</text>
                  <text x="396" y="516">07</text>
                  <text x="420" y="516">03</text>
                  <text x="444" y="516">04</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="232" y="532">RFC</text>
                  <text x="268" y="532">5280</text>
                  <text x="56" y="564">8</text>
                  <text x="104" y="564">Name:</text>
                  <text x="236" y="564">Time</text>
                  <text x="292" y="564">Stamping</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="296" y="580">id-kp-timeStamping,</text>
                  <text x="428" y="580">timestamping</text>
                  <text x="100" y="596">OID:</text>
                  <text x="288" y="596">1.3.6.1.5.5.7.3.8</text>
                  <text x="100" y="612">DER:</text>
                  <text x="228" y="612">06</text>
                  <text x="252" y="612">08</text>
                  <text x="276" y="612">2B</text>
                  <text x="300" y="612">06</text>
                  <text x="324" y="612">01</text>
                  <text x="348" y="612">05</text>
                  <text x="372" y="612">05</text>
                  <text x="396" y="612">07</text>
                  <text x="420" y="612">03</text>
                  <text x="444" y="612">08</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="232" y="628">RFC</text>
                  <text x="268" y="628">3161</text>
                  <text x="56" y="660">9</text>
                  <text x="104" y="660">Name:</text>
                  <text x="236" y="660">OCSP</text>
                  <text x="288" y="660">Signing</text>
                  <text x="132" y="676">Identifiers:</text>
                  <text x="288" y="676">id-kp-OCSPSigning</text>
                  <text x="100" y="692">OID:</text>
                  <text x="288" y="692">1.3.6.1.5.5.7.3.9</text>
                  <text x="100" y="708">DER:</text>
                  <text x="228" y="708">06</text>
                  <text x="252" y="708">08</text>
                  <text x="276" y="708">2B</text>
                  <text x="300" y="708">06</text>
                  <text x="324" y="708">01</text>
                  <text x="348" y="708">05</text>
                  <text x="372" y="708">05</text>
                  <text x="396" y="708">07</text>
                  <text x="420" y="708">03</text>
                  <text x="444" y="708">09</text>
                  <text x="120" y="724">Comments:</text>
                  <text x="232" y="724">RFC</text>
                  <text x="268" y="724">5280</text>
                  <text x="52" y="756">10</text>
                  <text x="104" y="756">Name:</text>
                  <text x="252" y="756">Kerberos</text>
                  <text x="316" y="756">PKINIT</text>
                  <text x="372" y="756">Client</text>
                  <text x="420" y="756">Auth</text>
                  <text x="132" y="772">Identifiers:</text>
                  <text x="308" y="772">id-pkinit-KPClientAuth</text>
                  <text x="100" y="788">OID:</text>
                  <text x="280" y="788">1.3.6.1.5.2.3.4</text>
                  <text x="100" y="804">DER:</text>
                  <text x="228" y="804">06</text>
                  <text x="252" y="804">07</text>
                  <text x="276" y="804">2B</text>
                  <text x="300" y="804">06</text>
                  <text x="324" y="804">01</text>
                  <text x="348" y="804">05</text>
                  <text x="372" y="804">02</text>
                  <text x="396" y="804">03</text>
                  <text x="420" y="804">04</text>
                  <text x="120" y="820">Comments:</text>
                  <text x="232" y="820">RFC</text>
                  <text x="268" y="820">4556</text>
                  <text x="52" y="852">11</text>
                  <text x="104" y="852">Name:</text>
                  <text x="252" y="852">Kerberos</text>
                  <text x="316" y="852">PKINIT</text>
                  <text x="360" y="852">KDC</text>
                  <text x="132" y="868">Identifiers:</text>
                  <text x="280" y="868">id-pkinit-KPKdc</text>
                  <text x="100" y="884">OID:</text>
                  <text x="280" y="884">1.3.6.1.5.2.3.5</text>
                  <text x="100" y="900">DER:</text>
                  <text x="228" y="900">06</text>
                  <text x="252" y="900">07</text>
                  <text x="276" y="900">2B</text>
                  <text x="300" y="900">06</text>
                  <text x="324" y="900">01</text>
                  <text x="348" y="900">05</text>
                  <text x="372" y="900">02</text>
                  <text x="396" y="900">03</text>
                  <text x="420" y="900">05</text>
                  <text x="120" y="916">Comments:</text>
                  <text x="232" y="916">RFC</text>
                  <text x="268" y="916">4556</text>
                  <text x="52" y="948">12</text>
                  <text x="104" y="948">Name:</text>
                  <text x="232" y="948">SSH</text>
                  <text x="276" y="948">Client</text>
                  <text x="132" y="964">Identifiers:</text>
                  <text x="312" y="964">id-kp-secureShellClient</text>
                  <text x="100" y="980">OID:</text>
                  <text x="292" y="980">1.3.6.1.5.5.7.3.21</text>
                  <text x="100" y="996">DER:</text>
                  <text x="228" y="996">06</text>
                  <text x="252" y="996">08</text>
                  <text x="276" y="996">2B</text>
                  <text x="300" y="996">06</text>
                  <text x="324" y="996">01</text>
                  <text x="348" y="996">05</text>
                  <text x="372" y="996">05</text>
                  <text x="396" y="996">07</text>
                  <text x="420" y="996">03</text>
                  <text x="444" y="996">15</text>
                  <text x="120" y="1012">Comments:</text>
                  <text x="232" y="1012">RFC</text>
                  <text x="268" y="1012">6187</text>
                  <text x="52" y="1044">13</text>
                  <text x="104" y="1044">Name:</text>
                  <text x="232" y="1044">SSH</text>
                  <text x="276" y="1044">Server</text>
                  <text x="132" y="1060">Identifiers:</text>
                  <text x="312" y="1060">id-kp-secureShellServer</text>
                  <text x="100" y="1076">OID:</text>
                  <text x="292" y="1076">1.3.6.1.5.5.7.3.22</text>
                  <text x="100" y="1092">DER:</text>
                  <text x="228" y="1092">06</text>
                  <text x="252" y="1092">08</text>
                  <text x="276" y="1092">2B</text>
                  <text x="300" y="1092">06</text>
                  <text x="324" y="1092">01</text>
                  <text x="348" y="1092">05</text>
                  <text x="372" y="1092">05</text>
                  <text x="396" y="1092">07</text>
                  <text x="420" y="1092">03</text>
                  <text x="444" y="1092">16</text>
                  <text x="120" y="1108">Comments:</text>
                  <text x="232" y="1108">RFC</text>
                  <text x="268" y="1108">6187</text>
                  <text x="52" y="1140">14</text>
                  <text x="104" y="1140">Name:</text>
                  <text x="244" y="1140">Bundle</text>
                  <text x="308" y="1140">Security</text>
                  <text x="132" y="1156">Identifiers:</text>
                  <text x="300" y="1156">id-kp-bundleSecurity</text>
                  <text x="100" y="1172">OID:</text>
                  <text x="292" y="1172">1.3.6.1.5.5.7.3.35</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="228" y="1188">06</text>
                  <text x="252" y="1188">08</text>
                  <text x="276" y="1188">2B</text>
                  <text x="300" y="1188">06</text>
                  <text x="324" y="1188">01</text>
                  <text x="348" y="1188">05</text>
                  <text x="372" y="1188">05</text>
                  <text x="396" y="1188">07</text>
                  <text x="420" y="1188">03</text>
                  <text x="444" y="1188">23</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="232" y="1204">RFC</text>
                  <text x="268" y="1204">9174</text>
                  <text x="52" y="1236">15</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="232" y="1236">CMC</text>
                  <text x="304" y="1236">Certification</text>
                  <text x="400" y="1236">Authority</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="264" y="1252">id-kp-cmcCA</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="292" y="1268">1.3.6.1.5.5.7.3.27</text>
                  <text x="100" y="1284">DER:</text>
                  <text x="228" y="1284">06</text>
                  <text x="252" y="1284">08</text>
                  <text x="276" y="1284">2B</text>
                  <text x="300" y="1284">06</text>
                  <text x="324" y="1284">01</text>
                  <text x="348" y="1284">05</text>
                  <text x="372" y="1284">05</text>
                  <text x="396" y="1284">07</text>
                  <text x="420" y="1284">03</text>
                  <text x="444" y="1284">1B</text>
                  <text x="120" y="1300">Comments:</text>
                  <text x="232" y="1300">RFC</text>
                  <text x="268" y="1300">6402</text>
                  <text x="52" y="1332">16</text>
                  <text x="104" y="1332">Name:</text>
                  <text x="232" y="1332">CMC</text>
                  <text x="300" y="1332">Registration</text>
                  <text x="392" y="1332">Authority</text>
                  <text x="132" y="1348">Identifiers:</text>
                  <text x="264" y="1348">id-kp-cmcRA</text>
                  <text x="100" y="1364">OID:</text>
                  <text x="292" y="1364">1.3.6.1.5.5.7.3.28</text>
                  <text x="100" y="1380">DER:</text>
                  <text x="228" y="1380">06</text>
                  <text x="252" y="1380">08</text>
                  <text x="276" y="1380">2B</text>
                  <text x="300" y="1380">06</text>
                  <text x="324" y="1380">01</text>
                  <text x="348" y="1380">05</text>
                  <text x="372" y="1380">05</text>
                  <text x="396" y="1380">07</text>
                  <text x="420" y="1380">03</text>
                  <text x="444" y="1380">1C</text>
                  <text x="120" y="1396">Comments:</text>
                  <text x="232" y="1396">RFC</text>
                  <text x="268" y="1396">6402</text>
                  <text x="52" y="1428">17</text>
                  <text x="104" y="1428">Name:</text>
                  <text x="232" y="1428">CMC</text>
                  <text x="280" y="1428">Archive</text>
                  <text x="340" y="1428">Server</text>
                  <text x="132" y="1444">Identifiers:</text>
                  <text x="284" y="1444">id-kp-cmcArchive</text>
                  <text x="100" y="1460">OID:</text>
                  <text x="292" y="1460">1.3.6.1.5.5.7.3.29</text>
                  <text x="100" y="1476">DER:</text>
                  <text x="228" y="1476">06</text>
                  <text x="252" y="1476">08</text>
                  <text x="276" y="1476">2B</text>
                  <text x="300" y="1476">06</text>
                  <text x="324" y="1476">01</text>
                  <text x="348" y="1476">05</text>
                  <text x="372" y="1476">05</text>
                  <text x="396" y="1476">07</text>
                  <text x="420" y="1476">03</text>
                  <text x="444" y="1476">1D</text>
                  <text x="120" y="1492">Comments:</text>
                  <text x="232" y="1492">RFC</text>
                  <text x="268" y="1492">6402</text>
                  <text x="52" y="1524">18</text>
                  <text x="104" y="1524">Name:</text>
                  <text x="232" y="1524">CMC</text>
                  <text x="264" y="1524">Key</text>
                  <text x="324" y="1524">Generation</text>
                  <text x="408" y="1524">Authority</text>
                  <text x="132" y="1540">Identifiers:</text>
                  <text x="264" y="1540">id-kp-cmKGA</text>
                  <text x="100" y="1556">OID:</text>
                  <text x="292" y="1556">1.3.6.1.5.5.7.3.32</text>
                  <text x="100" y="1572">DER:</text>
                  <text x="228" y="1572">06</text>
                  <text x="252" y="1572">08</text>
                  <text x="276" y="1572">2B</text>
                  <text x="300" y="1572">06</text>
                  <text x="324" y="1572">01</text>
                  <text x="348" y="1572">05</text>
                  <text x="372" y="1572">05</text>
                  <text x="396" y="1572">07</text>
                  <text x="420" y="1572">03</text>
                  <text x="444" y="1572">20</text>
                  <text x="120" y="1588">Comments:</text>
                  <text x="232" y="1588">RFC</text>
                  <text x="268" y="1588">9480</text>
                  <text x="52" y="1620">19</text>
                  <text x="104" y="1620">Name:</text>
                  <text x="264" y="1620">Certificate</text>
                  <text x="364" y="1620">Transparency</text>
                  <text x="132" y="1636">Identifiers:</text>
                  <text x="100" y="1652">OID:</text>
                  <text x="312" y="1652">1.3.6.1.4.1.11129.2.4.4</text>
                  <text x="100" y="1668">DER:</text>
                  <text x="228" y="1668">06</text>
                  <text x="252" y="1668">0A</text>
                  <text x="276" y="1668">2B</text>
                  <text x="300" y="1668">06</text>
                  <text x="324" y="1668">01</text>
                  <text x="348" y="1668">04</text>
                  <text x="372" y="1668">01</text>
                  <text x="396" y="1668">D6</text>
                  <text x="420" y="1668">79</text>
                  <text x="444" y="1668">02</text>
                  <text x="468" y="1668">04</text>
                  <text x="492" y="1668">04</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="232" y="1684">RFC</text>
                  <text x="268" y="1684">6962</text>
                  <text x="52" y="1716">20</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="244" y="1716">Wi-SUN</text>
                  <text x="288" y="1716">FAN</text>
                  <text x="332" y="1716">Device</text>
                  <text x="132" y="1732">Identifiers:</text>
                  <text x="308" y="1732">id-kp-wisun-fan-device</text>
                  <text x="100" y="1748">OID:</text>
                  <text x="296" y="1748">1.3.6.1.4.1.45605.1</text>
                  <text x="100" y="1764">DER:</text>
                  <text x="228" y="1764">06</text>
                  <text x="252" y="1764">09</text>
                  <text x="276" y="1764">2B</text>
                  <text x="300" y="1764">06</text>
                  <text x="324" y="1764">01</text>
                  <text x="348" y="1764">04</text>
                  <text x="372" y="1764">01</text>
                  <text x="396" y="1764">82</text>
                  <text x="420" y="1764">E4</text>
                  <text x="444" y="1764">25</text>
                  <text x="468" y="1764">01</text>
                  <text x="120" y="1780">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:        RFC 3161                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
|    15 | Name:            CMC Certification Authority            |
|       | Identifiers:     id-kp-cmcCA                            |
|       | OID:             1.3.6.1.5.5.7.3.27                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1B          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    16 | Name:            CMC Registration Authority             |
|       | Identifiers:     id-kp-cmcRA                            |
|       | OID:             1.3.6.1.5.5.7.3.28                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1C          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    17 | Name:            CMC Archive Server                     |
|       | Identifiers:     id-kp-cmcArchive                       |
|       | OID:             1.3.6.1.5.5.7.3.29                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1D          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    18 | Name:            CMC Key Generation Authority           |
|       | Identifiers:     id-kp-cmKGA                            |
|       | OID:             1.3.6.1.5.5.7.3.32                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 20          |
|       | Comments:        RFC 9480                               |
+-------+---------------------------------------------------------+
|    19 | Name:            Certificate Transparency               |
|       | Identifiers:                                            |
|       | OID:             1.3.6.1.4.1.11129.2.4.4                |
|       | DER:             06 0A 2B 06 01 04 01 D6 79 02 04 04    |
|       | Comments:        RFC 6962                               |
+-------+---------------------------------------------------------+
|    20 | Name:            Wi-SUN FAN Device                      |
|       | Identifiers:     id-kp-wisun-fan-device                 |
|       | OID:             1.3.6.1.4.1.45605.1                    |
|       | DER:             06 09 2B 06 01 04 01 82 E4 25 01       |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names Registry" under the registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Comments, GeneralNameValue, and Reference, where Value is an integer, and the other columns are text strings. The fields Name and GeneralNameValue are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="864" width="560" viewBox="0 0 560 864" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,848" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,848" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,848" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,288 L 552,288" fill="none" stroke="black"/>
                <path d="M 8,400 L 552,400" fill="none" stroke="black"/>
                <path d="M 8,464 L 552,464" fill="none" stroke="black"/>
                <path d="M 8,528 L 552,528" fill="none" stroke="black"/>
                <path d="M 8,592 L 552,592" fill="none" stroke="black"/>
                <path d="M 8,656 L 552,656" fill="none" stroke="black"/>
                <path d="M 8,720 L 552,720" fill="none" stroke="black"/>
                <path d="M 8,784 L 552,784" fill="none" stroke="black"/>
                <path d="M 8,848 L 552,848" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="112" y="52">General</text>
                  <text x="168" y="52">Names</text>
                  <text x="52" y="84">-3</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">otherName</text>
                  <text x="316" y="84">with</text>
                  <text x="380" y="84">MACAddress</text>
                  <text x="120" y="100">Comments:</text>
                  <text x="256" y="100">TBD92(Use</text>
                  <text x="312" y="100">RFC</text>
                  <text x="428" y="100">I-D-lamps-macaddress-on)</text>
                  <text x="284" y="116">id-on-MACAddress</text>
                  <text x="300" y="132">(1.3.6.1.5.5.7.8.12)</text>
                  <text x="228" y="148">06</text>
                  <text x="252" y="148">08</text>
                  <text x="276" y="148">2B</text>
                  <text x="300" y="148">06</text>
                  <text x="324" y="148">01</text>
                  <text x="348" y="148">05</text>
                  <text x="372" y="148">05</text>
                  <text x="396" y="148">07</text>
                  <text x="420" y="148">08</text>
                  <text x="444" y="148">0C</text>
                  <text x="152" y="164">GeneralNameValue:</text>
                  <text x="248" y="164">bytes</text>
                  <text x="52" y="196">-2</text>
                  <text x="104" y="196">Name:</text>
                  <text x="256" y="196">otherName</text>
                  <text x="316" y="196">with</text>
                  <text x="400" y="196">SmtpUTF8Mailbox</text>
                  <text x="120" y="212">Comments:</text>
                  <text x="232" y="212">RFC</text>
                  <text x="268" y="212">8398</text>
                  <text x="304" y="228">id-on-SmtpUTF8Mailbox</text>
                  <text x="296" y="244">(1.3.6.1.5.5.7.8.9)</text>
                  <text x="228" y="260">06</text>
                  <text x="252" y="260">08</text>
                  <text x="276" y="260">2B</text>
                  <text x="300" y="260">06</text>
                  <text x="324" y="260">01</text>
                  <text x="348" y="260">05</text>
                  <text x="372" y="260">05</text>
                  <text x="396" y="260">07</text>
                  <text x="420" y="260">08</text>
                  <text x="444" y="260">09</text>
                  <text x="152" y="276">GeneralNameValue:</text>
                  <text x="244" y="276">text</text>
                  <text x="52" y="308">-1</text>
                  <text x="104" y="308">Name:</text>
                  <text x="256" y="308">otherName</text>
                  <text x="316" y="308">with</text>
                  <text x="412" y="308">hardwareModuleName</text>
                  <text x="120" y="324">Comments:</text>
                  <text x="232" y="324">RFC</text>
                  <text x="268" y="324">4108</text>
                  <text x="316" y="340">id-on-hardwareModuleName</text>
                  <text x="296" y="356">(1.3.6.1.5.5.7.8.4)</text>
                  <text x="228" y="372">06</text>
                  <text x="252" y="372">08</text>
                  <text x="276" y="372">2B</text>
                  <text x="300" y="372">06</text>
                  <text x="324" y="372">01</text>
                  <text x="348" y="372">05</text>
                  <text x="372" y="372">05</text>
                  <text x="396" y="372">07</text>
                  <text x="420" y="372">08</text>
                  <text x="444" y="372">04</text>
                  <text x="152" y="388">GeneralNameValue:</text>
                  <text x="232" y="388">[</text>
                  <text x="264" y="388">~oid,</text>
                  <text x="312" y="388">bytes</text>
                  <text x="344" y="388">]</text>
                  <text x="56" y="420">0</text>
                  <text x="104" y="420">Name:</text>
                  <text x="256" y="420">otherName</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="232" y="436">RFC</text>
                  <text x="268" y="436">5280</text>
                  <text x="152" y="452">GeneralNameValue:</text>
                  <text x="232" y="452">[</text>
                  <text x="264" y="452">~oid,</text>
                  <text x="312" y="452">bytes</text>
                  <text x="344" y="452">]</text>
                  <text x="56" y="484">1</text>
                  <text x="104" y="484">Name:</text>
                  <text x="260" y="484">rfc822Name</text>
                  <text x="120" y="500">Comments:</text>
                  <text x="232" y="500">RFC</text>
                  <text x="268" y="500">5280</text>
                  <text x="152" y="516">GeneralNameValue:</text>
                  <text x="244" y="516">text</text>
                  <text x="56" y="548">2</text>
                  <text x="104" y="548">Name:</text>
                  <text x="248" y="548">dNSName</text>
                  <text x="120" y="564">Comments:</text>
                  <text x="232" y="564">RFC</text>
                  <text x="268" y="564">5280</text>
                  <text x="152" y="580">GeneralNameValue:</text>
                  <text x="244" y="580">text</text>
                  <text x="56" y="612">4</text>
                  <text x="104" y="612">Name:</text>
                  <text x="272" y="612">directoryName</text>
                  <text x="120" y="628">Comments:</text>
                  <text x="232" y="628">RFC</text>
                  <text x="268" y="628">5280</text>
                  <text x="152" y="644">GeneralNameValue:</text>
                  <text x="244" y="644">Name</text>
                  <text x="56" y="676">6</text>
                  <text x="104" y="676">Name:</text>
                  <text x="320" y="676">uniformResourceIdentifier</text>
                  <text x="120" y="692">Comments:</text>
                  <text x="232" y="692">RFC</text>
                  <text x="268" y="692">5280</text>
                  <text x="152" y="708">GeneralNameValue:</text>
                  <text x="244" y="708">text</text>
                  <text x="56" y="740">7</text>
                  <text x="104" y="740">Name:</text>
                  <text x="256" y="740">iPAddress</text>
                  <text x="120" y="756">Comments:</text>
                  <text x="232" y="756">RFC</text>
                  <text x="268" y="756">5280</text>
                  <text x="152" y="772">GeneralNameValue:</text>
                  <text x="248" y="772">bytes</text>
                  <text x="56" y="804">8</text>
                  <text x="104" y="804">Name:</text>
                  <text x="268" y="804">registeredID</text>
                  <text x="116" y="820">Comments</text>
                  <text x="232" y="820">RFC</text>
                  <text x="268" y="820">5280</text>
                  <text x="152" y="836">GeneralNameValue:</text>
                  <text x="244" y="836">~oid</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Names                                             |
+=======+===========================================================+
|    -3 | Name:            otherName with MACAddress                |
|       | Comments:        TBD92(Use RFC I-D-lamps-macaddress-on)   |
|       |                  id-on-MACAddress                         |
|       |                  (1.3.6.1.5.5.7.8.12)                     |
|       |                  06 08 2B 06 01 05 05 07 08 0C            |
|       | GeneralNameValue: bytes                                   |
+-------+-----------------------------------------------------------+
|    -2 | Name:            otherName with SmtpUTF8Mailbox           |
|       | Comments:        RFC 8398                                 |
|       |                  id-on-SmtpUTF8Mailbox                    |
|       |                  (1.3.6.1.5.5.7.8.9)                      |
|       |                  06 08 2B 06 01 05 05 07 08 09            |
|       | GeneralNameValue: text                                    |
+-------+-----------------------------------------------------------+
|    -1 | Name:            otherName with hardwareModuleName        |
|       | Comments:        RFC 4108                                 |
|       |                  id-on-hardwareModuleName                 |
|       |                  (1.3.6.1.5.5.7.8.4)                      |
|       |                  06 08 2B 06 01 05 05 07 08 04            |
|       | GeneralNameValue: [ ~oid, bytes ]                         |
+-------+-----------------------------------------------------------+
|     0 | Name:            otherName                                |
|       | Comments:        RFC 5280                                 |
|       | GeneralNameValue: [ ~oid, bytes ]                         |
+-------+-----------------------------------------------------------+
|     1 | Name:            rfc822Name                               |
|       | Comments:        RFC 5280                                 |
|       | GeneralNameValue: text                                    |
+-------+-----------------------------------------------------------+
|     2 | Name:            dNSName                                  |
|       | Comments:        RFC 5280                                 |
|       | GeneralNameValue: text                                    |
+-------+-----------------------------------------------------------+
|     4 | Name:            directoryName                            |
|       | Comments:        RFC 5280                                 |
|       | GeneralNameValue: Name                                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            uniformResourceIdentifier                |
|       | Comments:        RFC 5280                                 |
|       | GeneralNameValue: text                                    |
+-------+-----------------------------------------------------------+
|     7 | Name:            iPAddress                                |
|       | Comments:        RFC 5280                                 |
|       | GeneralNameValue: bytes                                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            registeredID                             |
|       | Comments         RFC 5280                                 |
|       | GeneralNameValue: ~oid                                    |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the registry group "CBOR Encoded X.509 (C509) Parameters". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. Alignment with the value of public key algorithm <bcp14>MUST</bcp14> be considered, see instruction in <xref target="pkalg"/>. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <!-- NOTE: Check referenced section number hardcoded in the table. -->

<figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2864" width="560" viewBox="0 0 560 2864" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,2848" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,2848" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,2848" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,208 L 552,208" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,432 L 552,432" fill="none" stroke="black"/>
                <path d="M 8,544 L 552,544" fill="none" stroke="black"/>
                <path d="M 8,656 L 552,656" fill="none" stroke="black"/>
                <path d="M 8,768 L 552,768" fill="none" stroke="black"/>
                <path d="M 8,880 L 552,880" fill="none" stroke="black"/>
                <path d="M 8,992 L 552,992" fill="none" stroke="black"/>
                <path d="M 8,1104 L 552,1104" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1328 L 552,1328" fill="none" stroke="black"/>
                <path d="M 8,1472 L 552,1472" fill="none" stroke="black"/>
                <path d="M 8,1616 L 552,1616" fill="none" stroke="black"/>
                <path d="M 8,1760 L 552,1760" fill="none" stroke="black"/>
                <path d="M 8,1872 L 552,1872" fill="none" stroke="black"/>
                <path d="M 8,1984 L 552,1984" fill="none" stroke="black"/>
                <path d="M 8,2096 L 552,2096" fill="none" stroke="black"/>
                <path d="M 8,2272 L 552,2272" fill="none" stroke="black"/>
                <path d="M 8,2448 L 552,2448" fill="none" stroke="black"/>
                <path d="M 8,2624 L 552,2624" fill="none" stroke="black"/>
                <path d="M 8,2736 L 552,2736" fill="none" stroke="black"/>
                <path d="M 8,2848 L 552,2848" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="104" y="52">X.509</text>
                  <text x="168" y="52">Signature</text>
                  <text x="252" y="52">Algorithms</text>
                  <text x="44" y="84">-256</text>
                  <text x="104" y="84">Name:</text>
                  <text x="256" y="84">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="84">with</text>
                  <text x="392" y="84">SHA-1</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="284" y="100">sha1-with-rsa-signature,</text>
                  <text x="276" y="116">sha1WithRSAEncryption,</text>
                  <text x="276" y="132">sha-1WithRSAEncryption</text>
                  <text x="100" y="148">OID:</text>
                  <text x="268" y="148">1.2.840.113549.1.1.5</text>
                  <text x="128" y="164">Parameters:</text>
                  <text x="204" y="164">NULL</text>
                  <text x="100" y="180">DER:</text>
                  <text x="196" y="180">30</text>
                  <text x="220" y="180">0D</text>
                  <text x="244" y="180">06</text>
                  <text x="268" y="180">09</text>
                  <text x="292" y="180">2A</text>
                  <text x="316" y="180">86</text>
                  <text x="340" y="180">48</text>
                  <text x="364" y="180">86</text>
                  <text x="388" y="180">F7</text>
                  <text x="412" y="180">0D</text>
                  <text x="436" y="180">01</text>
                  <text x="460" y="180">01</text>
                  <text x="484" y="180">05</text>
                  <text x="508" y="180">05</text>
                  <text x="532" y="180">00</text>
                  <text x="120" y="196">Comments:</text>
                  <text x="208" y="196">Don't</text>
                  <text x="248" y="196">use</text>
                  <text x="44" y="228">-255</text>
                  <text x="104" y="228">Name:</text>
                  <text x="208" y="228">ECDSA</text>
                  <text x="252" y="228">with</text>
                  <text x="296" y="228">SHA-1</text>
                  <text x="132" y="244">Identifiers:</text>
                  <text x="248" y="244">ecdsa-with-SHA1</text>
                  <text x="100" y="260">OID:</text>
                  <text x="256" y="260">1.2.840.10045.4.1</text>
                  <text x="128" y="276">Parameters:</text>
                  <text x="212" y="276">Absent</text>
                  <text x="100" y="292">DER:</text>
                  <text x="196" y="292">30</text>
                  <text x="220" y="292">09</text>
                  <text x="244" y="292">06</text>
                  <text x="268" y="292">07</text>
                  <text x="292" y="292">2A</text>
                  <text x="316" y="292">86</text>
                  <text x="340" y="292">48</text>
                  <text x="364" y="292">CE</text>
                  <text x="388" y="292">3D</text>
                  <text x="412" y="292">04</text>
                  <text x="436" y="292">01</text>
                  <text x="120" y="308">Comments:</text>
                  <text x="208" y="308">Don't</text>
                  <text x="252" y="308">use.</text>
                  <text x="288" y="308">See</text>
                  <text x="336" y="308">Section</text>
                  <text x="396" y="308">3.2.2.</text>
                  <text x="56" y="340">0</text>
                  <text x="104" y="340">Name:</text>
                  <text x="208" y="340">ECDSA</text>
                  <text x="252" y="340">with</text>
                  <text x="304" y="340">SHA-256</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="256" y="356">ecdsa-with-SHA256</text>
                  <text x="100" y="372">OID:</text>
                  <text x="264" y="372">1.2.840.10045.4.3.2</text>
                  <text x="128" y="388">Parameters:</text>
                  <text x="212" y="388">Absent</text>
                  <text x="100" y="404">DER:</text>
                  <text x="196" y="404">30</text>
                  <text x="220" y="404">0A</text>
                  <text x="244" y="404">06</text>
                  <text x="268" y="404">08</text>
                  <text x="292" y="404">2A</text>
                  <text x="316" y="404">86</text>
                  <text x="340" y="404">48</text>
                  <text x="364" y="404">CE</text>
                  <text x="388" y="404">3D</text>
                  <text x="412" y="404">04</text>
                  <text x="436" y="404">03</text>
                  <text x="460" y="404">02</text>
                  <text x="120" y="420">Comments:</text>
                  <text x="200" y="420">See</text>
                  <text x="248" y="420">Section</text>
                  <text x="308" y="420">3.2.2.</text>
                  <text x="56" y="452">1</text>
                  <text x="104" y="452">Name:</text>
                  <text x="208" y="452">ECDSA</text>
                  <text x="252" y="452">with</text>
                  <text x="304" y="452">SHA-384</text>
                  <text x="132" y="468">Identifiers:</text>
                  <text x="256" y="468">ecdsa-with-SHA384</text>
                  <text x="100" y="484">OID:</text>
                  <text x="264" y="484">1.2.840.10045.4.3.3</text>
                  <text x="128" y="500">Parameters:</text>
                  <text x="212" y="500">Absent</text>
                  <text x="100" y="516">DER:</text>
                  <text x="196" y="516">30</text>
                  <text x="220" y="516">0A</text>
                  <text x="244" y="516">06</text>
                  <text x="268" y="516">08</text>
                  <text x="292" y="516">2A</text>
                  <text x="316" y="516">86</text>
                  <text x="340" y="516">48</text>
                  <text x="364" y="516">CE</text>
                  <text x="388" y="516">3D</text>
                  <text x="412" y="516">04</text>
                  <text x="436" y="516">03</text>
                  <text x="460" y="516">03</text>
                  <text x="120" y="532">Comments:</text>
                  <text x="200" y="532">See</text>
                  <text x="248" y="532">Section</text>
                  <text x="308" y="532">3.2.2.</text>
                  <text x="56" y="564">2</text>
                  <text x="104" y="564">Name:</text>
                  <text x="208" y="564">ECDSA</text>
                  <text x="252" y="564">with</text>
                  <text x="304" y="564">SHA-512</text>
                  <text x="132" y="580">Identifiers:</text>
                  <text x="256" y="580">ecdsa-with-SHA512</text>
                  <text x="100" y="596">OID:</text>
                  <text x="264" y="596">1.2.840.10045.4.3.4</text>
                  <text x="128" y="612">Parameters:</text>
                  <text x="212" y="612">Absent</text>
                  <text x="100" y="628">DER:</text>
                  <text x="196" y="628">30</text>
                  <text x="220" y="628">0A</text>
                  <text x="244" y="628">06</text>
                  <text x="268" y="628">08</text>
                  <text x="292" y="628">2A</text>
                  <text x="316" y="628">86</text>
                  <text x="340" y="628">48</text>
                  <text x="364" y="628">CE</text>
                  <text x="388" y="628">3D</text>
                  <text x="412" y="628">04</text>
                  <text x="436" y="628">03</text>
                  <text x="460" y="628">04</text>
                  <text x="120" y="644">Comments:</text>
                  <text x="200" y="644">See</text>
                  <text x="248" y="644">Section</text>
                  <text x="308" y="644">3.2.2.</text>
                  <text x="56" y="676">3</text>
                  <text x="104" y="676">Name:</text>
                  <text x="208" y="676">ECDSA</text>
                  <text x="252" y="676">with</text>
                  <text x="308" y="676">SHAKE128</text>
                  <text x="132" y="692">Identifiers:</text>
                  <text x="276" y="692">id-ecdsa-with-shake128</text>
                  <text x="100" y="708">OID:</text>
                  <text x="260" y="708">1.3.6.1.5.5.7.6.32</text>
                  <text x="128" y="724">Parameters:</text>
                  <text x="212" y="724">Absent</text>
                  <text x="100" y="740">DER:</text>
                  <text x="196" y="740">30</text>
                  <text x="220" y="740">0A</text>
                  <text x="244" y="740">06</text>
                  <text x="268" y="740">08</text>
                  <text x="292" y="740">2B</text>
                  <text x="316" y="740">06</text>
                  <text x="340" y="740">01</text>
                  <text x="364" y="740">05</text>
                  <text x="388" y="740">05</text>
                  <text x="412" y="740">07</text>
                  <text x="436" y="740">06</text>
                  <text x="460" y="740">20</text>
                  <text x="120" y="756">Comments:</text>
                  <text x="200" y="756">See</text>
                  <text x="248" y="756">Section</text>
                  <text x="308" y="756">3.2.2.</text>
                  <text x="56" y="788">4</text>
                  <text x="104" y="788">Name:</text>
                  <text x="208" y="788">ECDSA</text>
                  <text x="252" y="788">with</text>
                  <text x="308" y="788">SHAKE256</text>
                  <text x="132" y="804">Identifiers:</text>
                  <text x="276" y="804">id-ecdsa-with-shake256</text>
                  <text x="100" y="820">OID:</text>
                  <text x="260" y="820">1.3.6.1.5.5.7.6.33</text>
                  <text x="128" y="836">Parameters:</text>
                  <text x="212" y="836">Absent</text>
                  <text x="100" y="852">DER:</text>
                  <text x="196" y="852">30</text>
                  <text x="220" y="852">0A</text>
                  <text x="244" y="852">06</text>
                  <text x="268" y="852">08</text>
                  <text x="292" y="852">2B</text>
                  <text x="316" y="852">06</text>
                  <text x="340" y="852">01</text>
                  <text x="364" y="852">05</text>
                  <text x="388" y="852">05</text>
                  <text x="412" y="852">07</text>
                  <text x="436" y="852">06</text>
                  <text x="460" y="852">21</text>
                  <text x="120" y="868">Comments:</text>
                  <text x="200" y="868">See</text>
                  <text x="248" y="868">Section</text>
                  <text x="308" y="868">3.2.2.</text>
                  <text x="56" y="900">5</text>
                  <text x="104" y="900">Name:</text>
                  <text x="220" y="900">Unsigned</text>
                  <text x="132" y="916">Identifiers:</text>
                  <text x="248" y="916">id-alg-unsigned</text>
                  <text x="100" y="932">OID:</text>
                  <text x="260" y="932">1.3.6.1.5.5.7.6.36</text>
                  <text x="128" y="948">Parameters:</text>
                  <text x="212" y="948">Absent</text>
                  <text x="100" y="964">DER:</text>
                  <text x="196" y="964">30</text>
                  <text x="220" y="964">0A</text>
                  <text x="244" y="964">06</text>
                  <text x="268" y="964">08</text>
                  <text x="292" y="964">2B</text>
                  <text x="316" y="964">06</text>
                  <text x="340" y="964">01</text>
                  <text x="364" y="964">05</text>
                  <text x="388" y="964">05</text>
                  <text x="412" y="964">07</text>
                  <text x="436" y="964">06</text>
                  <text x="460" y="964">24</text>
                  <text x="120" y="980">Comments:</text>
                  <text x="208" y="980">bytes</text>
                  <text x="244" y="980">of</text>
                  <text x="276" y="980">size</text>
                  <text x="304" y="980">0</text>
                  <text x="56" y="1012">8</text>
                  <text x="104" y="1012">Name:</text>
                  <text x="200" y="1012">SM2</text>
                  <text x="236" y="1012">with</text>
                  <text x="272" y="1012">SM3</text>
                  <text x="132" y="1028">Identifiers:</text>
                  <text x="236" y="1028">sm2-with-sm3</text>
                  <text x="100" y="1044">OID:</text>
                  <text x="264" y="1044">1.2.156.10197.1.501</text>
                  <text x="128" y="1060">Parameters:</text>
                  <text x="212" y="1060">Absent</text>
                  <text x="100" y="1076">DER:</text>
                  <text x="196" y="1076">30</text>
                  <text x="220" y="1076">0A</text>
                  <text x="244" y="1076">06</text>
                  <text x="268" y="1076">08</text>
                  <text x="292" y="1076">2A</text>
                  <text x="316" y="1076">81</text>
                  <text x="340" y="1076">1C</text>
                  <text x="364" y="1076">CF</text>
                  <text x="388" y="1076">55</text>
                  <text x="412" y="1076">01</text>
                  <text x="436" y="1076">83</text>
                  <text x="460" y="1076">75</text>
                  <text x="120" y="1092">Comments:</text>
                  <text x="200" y="1092">See</text>
                  <text x="248" y="1092">Section</text>
                  <text x="308" y="1092">3.2.2.</text>
                  <text x="52" y="1124">12</text>
                  <text x="104" y="1124">Name:</text>
                  <text x="216" y="1124">Ed25519</text>
                  <text x="132" y="1140">Identifiers:</text>
                  <text x="232" y="1140">id-Ed25519,</text>
                  <text x="336" y="1140">id-EdDSA25519</text>
                  <text x="100" y="1156">OID:</text>
                  <text x="232" y="1156">1.3.101.112</text>
                  <text x="128" y="1172">Parameters:</text>
                  <text x="212" y="1172">Absent</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="196" y="1188">30</text>
                  <text x="220" y="1188">05</text>
                  <text x="244" y="1188">06</text>
                  <text x="268" y="1188">03</text>
                  <text x="292" y="1188">2B</text>
                  <text x="316" y="1188">65</text>
                  <text x="340" y="1188">70</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="52" y="1236">13</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="208" y="1236">Ed448</text>
                  <text x="132" y="1252">Identifiers:</text>
                  <text x="224" y="1252">id-Ed448,</text>
                  <text x="312" y="1252">id-EdDSA448</text>
                  <text x="100" y="1268">OID:</text>
                  <text x="232" y="1268">1.3.101.113</text>
                  <text x="128" y="1284">Parameters:</text>
                  <text x="212" y="1284">Absent</text>
                  <text x="100" y="1300">DER:</text>
                  <text x="196" y="1300">30</text>
                  <text x="220" y="1300">05</text>
                  <text x="244" y="1300">06</text>
                  <text x="268" y="1300">03</text>
                  <text x="292" y="1300">2B</text>
                  <text x="316" y="1300">65</text>
                  <text x="340" y="1300">71</text>
                  <text x="120" y="1316">Comments:</text>
                  <text x="52" y="1348">14</text>
                  <text x="104" y="1348">Name:</text>
                  <text x="200" y="1348">PoP</text>
                  <text x="236" y="1348">with</text>
                  <text x="288" y="1348">SHA-256</text>
                  <text x="336" y="1348">and</text>
                  <text x="400" y="1348">HMAC-SHA256</text>
                  <text x="132" y="1364">Identifiers:</text>
                  <text x="304" y="1364">sa-ecdhPop-sha256-hmac-sha256</text>
                  <text x="100" y="1380">OID:</text>
                  <text x="260" y="1380">1.3.6.1.5.5.7.6.26</text>
                  <text x="128" y="1396">Parameters:</text>
                  <text x="212" y="1396">Absent</text>
                  <text x="100" y="1412">DER:</text>
                  <text x="196" y="1412">30</text>
                  <text x="220" y="1412">0A</text>
                  <text x="244" y="1412">06</text>
                  <text x="268" y="1412">08</text>
                  <text x="292" y="1412">2B</text>
                  <text x="316" y="1412">06</text>
                  <text x="340" y="1412">01</text>
                  <text x="364" y="1412">05</text>
                  <text x="388" y="1412">05</text>
                  <text x="412" y="1412">07</text>
                  <text x="436" y="1412">06</text>
                  <text x="460" y="1412">1A</text>
                  <text x="120" y="1428">Comments:</text>
                  <text x="264" y="1428">Proof-of-possession</text>
                  <text x="388" y="1428">algorithm,</text>
                  <text x="464" y="1428">indexed</text>
                  <text x="516" y="1428">with</text>
                  <text x="200" y="1444">KDF</text>
                  <text x="232" y="1444">and</text>
                  <text x="268" y="1444">MAC,</text>
                  <text x="304" y="1444">see</text>
                  <text x="336" y="1444">RFC</text>
                  <text x="376" y="1444">6955.</text>
                  <text x="436" y="1444">Requires</text>
                  <text x="232" y="1460">recipient's</text>
                  <text x="308" y="1460">public</text>
                  <text x="364" y="1460">static</text>
                  <text x="452" y="1460">Diffie-Hellman</text>
                  <text x="528" y="1460">key</text>
                  <text x="52" y="1492">15</text>
                  <text x="104" y="1492">Name:</text>
                  <text x="200" y="1492">PoP</text>
                  <text x="236" y="1492">with</text>
                  <text x="288" y="1492">SHA-384</text>
                  <text x="336" y="1492">and</text>
                  <text x="400" y="1492">HMAC-SHA384</text>
                  <text x="132" y="1508">Identifiers:</text>
                  <text x="304" y="1508">sa-ecdhPop-sha384-hmac-sha384</text>
                  <text x="100" y="1524">OID:</text>
                  <text x="260" y="1524">1.3.6.1.5.5.7.6.27</text>
                  <text x="128" y="1540">Parameters:</text>
                  <text x="212" y="1540">Absent</text>
                  <text x="100" y="1556">DER:</text>
                  <text x="196" y="1556">30</text>
                  <text x="220" y="1556">0A</text>
                  <text x="244" y="1556">06</text>
                  <text x="268" y="1556">08</text>
                  <text x="292" y="1556">2B</text>
                  <text x="316" y="1556">06</text>
                  <text x="340" y="1556">01</text>
                  <text x="364" y="1556">05</text>
                  <text x="388" y="1556">05</text>
                  <text x="412" y="1556">07</text>
                  <text x="436" y="1556">06</text>
                  <text x="460" y="1556">1B</text>
                  <text x="120" y="1572">Comments:</text>
                  <text x="264" y="1572">Proof-of-possession</text>
                  <text x="388" y="1572">algorithm,</text>
                  <text x="464" y="1572">indexed</text>
                  <text x="516" y="1572">with</text>
                  <text x="200" y="1588">KDF</text>
                  <text x="232" y="1588">and</text>
                  <text x="268" y="1588">MAC,</text>
                  <text x="304" y="1588">see</text>
                  <text x="336" y="1588">RFC</text>
                  <text x="376" y="1588">6955.</text>
                  <text x="436" y="1588">Requires</text>
                  <text x="232" y="1604">recipient's</text>
                  <text x="308" y="1604">public</text>
                  <text x="364" y="1604">static</text>
                  <text x="452" y="1604">Diffie-Hellman</text>
                  <text x="528" y="1604">key</text>
                  <text x="52" y="1636">16</text>
                  <text x="104" y="1636">Name:</text>
                  <text x="200" y="1636">PoP</text>
                  <text x="236" y="1636">with</text>
                  <text x="288" y="1636">SHA-512</text>
                  <text x="336" y="1636">and</text>
                  <text x="400" y="1636">HMAC-SHA512</text>
                  <text x="132" y="1652">Identifiers:</text>
                  <text x="304" y="1652">sa-ecdhPop-sha512-hmac-sha512</text>
                  <text x="100" y="1668">OID:</text>
                  <text x="260" y="1668">1.3.6.1.5.5.7.6.28</text>
                  <text x="128" y="1684">Parameters:</text>
                  <text x="212" y="1684">Absent</text>
                  <text x="100" y="1700">DER:</text>
                  <text x="196" y="1700">30</text>
                  <text x="220" y="1700">0A</text>
                  <text x="244" y="1700">06</text>
                  <text x="268" y="1700">08</text>
                  <text x="292" y="1700">2B</text>
                  <text x="316" y="1700">06</text>
                  <text x="340" y="1700">01</text>
                  <text x="364" y="1700">05</text>
                  <text x="388" y="1700">05</text>
                  <text x="412" y="1700">07</text>
                  <text x="436" y="1700">06</text>
                  <text x="460" y="1700">1C</text>
                  <text x="120" y="1716">Comments:</text>
                  <text x="264" y="1716">Proof-of-possession</text>
                  <text x="388" y="1716">algorithm,</text>
                  <text x="464" y="1716">indexed</text>
                  <text x="516" y="1716">with</text>
                  <text x="200" y="1732">KDF</text>
                  <text x="232" y="1732">and</text>
                  <text x="268" y="1732">MAC,</text>
                  <text x="304" y="1732">see</text>
                  <text x="336" y="1732">RFC</text>
                  <text x="376" y="1732">6955.</text>
                  <text x="436" y="1732">Requires</text>
                  <text x="232" y="1748">recipient's</text>
                  <text x="308" y="1748">public</text>
                  <text x="364" y="1748">static</text>
                  <text x="452" y="1748">Diffie-Hellman</text>
                  <text x="528" y="1748">key</text>
                  <text x="52" y="1780">23</text>
                  <text x="104" y="1780">Name:</text>
                  <text x="256" y="1780">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1780">with</text>
                  <text x="400" y="1780">SHA-256</text>
                  <text x="132" y="1796">Identifiers:</text>
                  <text x="280" y="1796">sha256WithRSAEncryption</text>
                  <text x="100" y="1812">OID:</text>
                  <text x="272" y="1812">1.2.840.113549.1.1.11</text>
                  <text x="128" y="1828">Parameters:</text>
                  <text x="204" y="1828">NULL</text>
                  <text x="100" y="1844">DER:</text>
                  <text x="196" y="1844">30</text>
                  <text x="220" y="1844">0B</text>
                  <text x="244" y="1844">06</text>
                  <text x="268" y="1844">09</text>
                  <text x="292" y="1844">2A</text>
                  <text x="316" y="1844">86</text>
                  <text x="340" y="1844">48</text>
                  <text x="364" y="1844">86</text>
                  <text x="388" y="1844">F7</text>
                  <text x="412" y="1844">0D</text>
                  <text x="436" y="1844">01</text>
                  <text x="460" y="1844">01</text>
                  <text x="484" y="1844">0B</text>
                  <text x="508" y="1844">05</text>
                  <text x="532" y="1844">00</text>
                  <text x="120" y="1860">Comments:</text>
                  <text x="52" y="1892">24</text>
                  <text x="104" y="1892">Name:</text>
                  <text x="256" y="1892">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="1892">with</text>
                  <text x="400" y="1892">SHA-384</text>
                  <text x="132" y="1908">Identifiers:</text>
                  <text x="280" y="1908">sha384WithRSAEncryption</text>
                  <text x="100" y="1924">OID:</text>
                  <text x="272" y="1924">1.2.840.113549.1.1.12</text>
                  <text x="128" y="1940">Parameters:</text>
                  <text x="204" y="1940">NULL</text>
                  <text x="100" y="1956">DER:</text>
                  <text x="196" y="1956">30</text>
                  <text x="220" y="1956">0B</text>
                  <text x="244" y="1956">06</text>
                  <text x="268" y="1956">09</text>
                  <text x="292" y="1956">2A</text>
                  <text x="316" y="1956">86</text>
                  <text x="340" y="1956">48</text>
                  <text x="364" y="1956">86</text>
                  <text x="388" y="1956">F7</text>
                  <text x="412" y="1956">0D</text>
                  <text x="436" y="1956">01</text>
                  <text x="460" y="1956">01</text>
                  <text x="484" y="1956">0C</text>
                  <text x="508" y="1956">05</text>
                  <text x="532" y="1956">00</text>
                  <text x="120" y="1972">Comments:</text>
                  <text x="52" y="2004">25</text>
                  <text x="104" y="2004">Name:</text>
                  <text x="256" y="2004">RSASSA-PKCS1-v1_5</text>
                  <text x="348" y="2004">with</text>
                  <text x="400" y="2004">SHA-512</text>
                  <text x="132" y="2020">Identifiers:</text>
                  <text x="280" y="2020">sha512WithRSAEncryption</text>
                  <text x="100" y="2036">OID:</text>
                  <text x="272" y="2036">1.2.840.113549.1.1.13</text>
                  <text x="128" y="2052">Parameters:</text>
                  <text x="204" y="2052">NULL</text>
                  <text x="100" y="2068">DER:</text>
                  <text x="196" y="2068">30</text>
                  <text x="220" y="2068">0B</text>
                  <text x="244" y="2068">06</text>
                  <text x="268" y="2068">09</text>
                  <text x="292" y="2068">2A</text>
                  <text x="316" y="2068">86</text>
                  <text x="340" y="2068">48</text>
                  <text x="364" y="2068">86</text>
                  <text x="388" y="2068">F7</text>
                  <text x="412" y="2068">0D</text>
                  <text x="436" y="2068">01</text>
                  <text x="460" y="2068">01</text>
                  <text x="484" y="2068">0D</text>
                  <text x="508" y="2068">05</text>
                  <text x="532" y="2068">00</text>
                  <text x="120" y="2084">Comments:</text>
                  <text x="52" y="2116">26</text>
                  <text x="104" y="2116">Name:</text>
                  <text x="228" y="2116">RSASSA-PSS</text>
                  <text x="292" y="2116">with</text>
                  <text x="344" y="2116">SHA-256</text>
                  <text x="132" y="2132">Identifiers:</text>
                  <text x="232" y="2132">rsassa-pss,</text>
                  <text x="336" y="2132">id-RSASSA-PSS</text>
                  <text x="100" y="2148">OID:</text>
                  <text x="272" y="2148">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2164">Parameters:</text>
                  <text x="220" y="2164">SHA-256,</text>
                  <text x="280" y="2164">MGF-1</text>
                  <text x="324" y="2164">with</text>
                  <text x="380" y="2164">SHA-256,</text>
                  <text x="460" y="2164">saltLength</text>
                  <text x="512" y="2164">=</text>
                  <text x="532" y="2164">32</text>
                  <text x="100" y="2180">DER:</text>
                  <text x="196" y="2180">30</text>
                  <text x="220" y="2180">41</text>
                  <text x="244" y="2180">06</text>
                  <text x="268" y="2180">09</text>
                  <text x="292" y="2180">2A</text>
                  <text x="316" y="2180">86</text>
                  <text x="340" y="2180">48</text>
                  <text x="364" y="2180">86</text>
                  <text x="388" y="2180">F7</text>
                  <text x="412" y="2180">0D</text>
                  <text x="436" y="2180">01</text>
                  <text x="460" y="2180">01</text>
                  <text x="484" y="2180">0A</text>
                  <text x="508" y="2180">30</text>
                  <text x="532" y="2180">34</text>
                  <text x="196" y="2196">A0</text>
                  <text x="220" y="2196">0F</text>
                  <text x="244" y="2196">30</text>
                  <text x="268" y="2196">0D</text>
                  <text x="292" y="2196">06</text>
                  <text x="316" y="2196">09</text>
                  <text x="340" y="2196">60</text>
                  <text x="364" y="2196">86</text>
                  <text x="388" y="2196">48</text>
                  <text x="412" y="2196">01</text>
                  <text x="436" y="2196">65</text>
                  <text x="460" y="2196">03</text>
                  <text x="484" y="2196">04</text>
                  <text x="508" y="2196">02</text>
                  <text x="532" y="2196">01</text>
                  <text x="196" y="2212">05</text>
                  <text x="220" y="2212">00</text>
                  <text x="244" y="2212">A1</text>
                  <text x="268" y="2212">1C</text>
                  <text x="292" y="2212">30</text>
                  <text x="316" y="2212">1A</text>
                  <text x="340" y="2212">06</text>
                  <text x="364" y="2212">09</text>
                  <text x="388" y="2212">2A</text>
                  <text x="412" y="2212">86</text>
                  <text x="436" y="2212">48</text>
                  <text x="460" y="2212">86</text>
                  <text x="484" y="2212">F7</text>
                  <text x="508" y="2212">0D</text>
                  <text x="532" y="2212">01</text>
                  <text x="196" y="2228">01</text>
                  <text x="220" y="2228">08</text>
                  <text x="244" y="2228">30</text>
                  <text x="268" y="2228">0D</text>
                  <text x="292" y="2228">06</text>
                  <text x="316" y="2228">09</text>
                  <text x="340" y="2228">60</text>
                  <text x="364" y="2228">86</text>
                  <text x="388" y="2228">48</text>
                  <text x="412" y="2228">01</text>
                  <text x="436" y="2228">65</text>
                  <text x="460" y="2228">03</text>
                  <text x="484" y="2228">04</text>
                  <text x="508" y="2228">02</text>
                  <text x="532" y="2228">01</text>
                  <text x="196" y="2244">05</text>
                  <text x="220" y="2244">00</text>
                  <text x="244" y="2244">a2</text>
                  <text x="268" y="2244">03</text>
                  <text x="292" y="2244">02</text>
                  <text x="316" y="2244">01</text>
                  <text x="340" y="2244">20</text>
                  <text x="120" y="2260">Comments:</text>
                  <text x="52" y="2292">27</text>
                  <text x="104" y="2292">Name:</text>
                  <text x="228" y="2292">RSASSA-PSS</text>
                  <text x="292" y="2292">with</text>
                  <text x="344" y="2292">SHA-384</text>
                  <text x="132" y="2308">Identifiers:</text>
                  <text x="232" y="2308">rsassa-pss,</text>
                  <text x="336" y="2308">id-RSASSA-PSS</text>
                  <text x="100" y="2324">OID:</text>
                  <text x="272" y="2324">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2340">Parameters:</text>
                  <text x="220" y="2340">SHA-384,</text>
                  <text x="280" y="2340">MGF-1</text>
                  <text x="324" y="2340">with</text>
                  <text x="380" y="2340">SHA-384,</text>
                  <text x="460" y="2340">saltLength</text>
                  <text x="512" y="2340">=</text>
                  <text x="532" y="2340">48</text>
                  <text x="100" y="2356">DER:</text>
                  <text x="196" y="2356">30</text>
                  <text x="220" y="2356">41</text>
                  <text x="244" y="2356">06</text>
                  <text x="268" y="2356">09</text>
                  <text x="292" y="2356">2A</text>
                  <text x="316" y="2356">86</text>
                  <text x="340" y="2356">48</text>
                  <text x="364" y="2356">86</text>
                  <text x="388" y="2356">F7</text>
                  <text x="412" y="2356">0D</text>
                  <text x="436" y="2356">01</text>
                  <text x="460" y="2356">01</text>
                  <text x="484" y="2356">0A</text>
                  <text x="508" y="2356">30</text>
                  <text x="532" y="2356">34</text>
                  <text x="196" y="2372">A0</text>
                  <text x="220" y="2372">0F</text>
                  <text x="244" y="2372">30</text>
                  <text x="268" y="2372">0D</text>
                  <text x="292" y="2372">06</text>
                  <text x="316" y="2372">09</text>
                  <text x="340" y="2372">60</text>
                  <text x="364" y="2372">86</text>
                  <text x="388" y="2372">48</text>
                  <text x="412" y="2372">01</text>
                  <text x="436" y="2372">65</text>
                  <text x="460" y="2372">03</text>
                  <text x="484" y="2372">04</text>
                  <text x="508" y="2372">02</text>
                  <text x="532" y="2372">02</text>
                  <text x="196" y="2388">05</text>
                  <text x="220" y="2388">00</text>
                  <text x="244" y="2388">A1</text>
                  <text x="268" y="2388">1C</text>
                  <text x="292" y="2388">30</text>
                  <text x="316" y="2388">1A</text>
                  <text x="340" y="2388">06</text>
                  <text x="364" y="2388">09</text>
                  <text x="388" y="2388">2A</text>
                  <text x="412" y="2388">86</text>
                  <text x="436" y="2388">48</text>
                  <text x="460" y="2388">86</text>
                  <text x="484" y="2388">F7</text>
                  <text x="508" y="2388">0D</text>
                  <text x="532" y="2388">01</text>
                  <text x="196" y="2404">01</text>
                  <text x="220" y="2404">08</text>
                  <text x="244" y="2404">30</text>
                  <text x="268" y="2404">0D</text>
                  <text x="292" y="2404">06</text>
                  <text x="316" y="2404">09</text>
                  <text x="340" y="2404">60</text>
                  <text x="364" y="2404">86</text>
                  <text x="388" y="2404">48</text>
                  <text x="412" y="2404">01</text>
                  <text x="436" y="2404">65</text>
                  <text x="460" y="2404">03</text>
                  <text x="484" y="2404">04</text>
                  <text x="508" y="2404">02</text>
                  <text x="532" y="2404">02</text>
                  <text x="196" y="2420">05</text>
                  <text x="220" y="2420">00</text>
                  <text x="244" y="2420">A2</text>
                  <text x="268" y="2420">03</text>
                  <text x="292" y="2420">02</text>
                  <text x="316" y="2420">01</text>
                  <text x="340" y="2420">30</text>
                  <text x="120" y="2436">Comments:</text>
                  <text x="52" y="2468">28</text>
                  <text x="104" y="2468">Name:</text>
                  <text x="228" y="2468">RSASSA-PSS</text>
                  <text x="292" y="2468">with</text>
                  <text x="344" y="2468">SHA-512</text>
                  <text x="132" y="2484">Identifiers:</text>
                  <text x="232" y="2484">rsassa-pss,</text>
                  <text x="336" y="2484">id-RSASSA-PSS</text>
                  <text x="100" y="2500">OID:</text>
                  <text x="272" y="2500">1.2.840.113549.1.1.10</text>
                  <text x="128" y="2516">Parameters:</text>
                  <text x="220" y="2516">SHA-512,</text>
                  <text x="280" y="2516">MGF-1</text>
                  <text x="324" y="2516">with</text>
                  <text x="380" y="2516">SHA-512,</text>
                  <text x="460" y="2516">saltLength</text>
                  <text x="512" y="2516">=</text>
                  <text x="532" y="2516">64</text>
                  <text x="100" y="2532">DER:</text>
                  <text x="196" y="2532">30</text>
                  <text x="220" y="2532">41</text>
                  <text x="244" y="2532">06</text>
                  <text x="268" y="2532">09</text>
                  <text x="292" y="2532">2A</text>
                  <text x="316" y="2532">86</text>
                  <text x="340" y="2532">48</text>
                  <text x="364" y="2532">86</text>
                  <text x="388" y="2532">F7</text>
                  <text x="412" y="2532">0D</text>
                  <text x="436" y="2532">01</text>
                  <text x="460" y="2532">01</text>
                  <text x="484" y="2532">0A</text>
                  <text x="508" y="2532">30</text>
                  <text x="532" y="2532">34</text>
                  <text x="196" y="2548">A0</text>
                  <text x="220" y="2548">0F</text>
                  <text x="244" y="2548">30</text>
                  <text x="268" y="2548">0D</text>
                  <text x="292" y="2548">06</text>
                  <text x="316" y="2548">09</text>
                  <text x="340" y="2548">60</text>
                  <text x="364" y="2548">86</text>
                  <text x="388" y="2548">48</text>
                  <text x="412" y="2548">01</text>
                  <text x="436" y="2548">65</text>
                  <text x="460" y="2548">03</text>
                  <text x="484" y="2548">04</text>
                  <text x="508" y="2548">02</text>
                  <text x="532" y="2548">03</text>
                  <text x="196" y="2564">05</text>
                  <text x="220" y="2564">00</text>
                  <text x="244" y="2564">A1</text>
                  <text x="268" y="2564">1C</text>
                  <text x="292" y="2564">30</text>
                  <text x="316" y="2564">1A</text>
                  <text x="340" y="2564">06</text>
                  <text x="364" y="2564">09</text>
                  <text x="388" y="2564">2A</text>
                  <text x="412" y="2564">86</text>
                  <text x="436" y="2564">48</text>
                  <text x="460" y="2564">86</text>
                  <text x="484" y="2564">F7</text>
                  <text x="508" y="2564">0D</text>
                  <text x="532" y="2564">01</text>
                  <text x="196" y="2580">01</text>
                  <text x="220" y="2580">08</text>
                  <text x="244" y="2580">30</text>
                  <text x="268" y="2580">0D</text>
                  <text x="292" y="2580">06</text>
                  <text x="316" y="2580">09</text>
                  <text x="340" y="2580">60</text>
                  <text x="364" y="2580">86</text>
                  <text x="388" y="2580">48</text>
                  <text x="412" y="2580">01</text>
                  <text x="436" y="2580">65</text>
                  <text x="460" y="2580">03</text>
                  <text x="484" y="2580">04</text>
                  <text x="508" y="2580">02</text>
                  <text x="532" y="2580">03</text>
                  <text x="196" y="2596">05</text>
                  <text x="220" y="2596">00</text>
                  <text x="244" y="2596">A2</text>
                  <text x="268" y="2596">03</text>
                  <text x="292" y="2596">02</text>
                  <text x="316" y="2596">01</text>
                  <text x="340" y="2596">40</text>
                  <text x="120" y="2612">Comments:</text>
                  <text x="52" y="2644">29</text>
                  <text x="104" y="2644">Name:</text>
                  <text x="228" y="2644">RSASSA-PSS</text>
                  <text x="292" y="2644">with</text>
                  <text x="348" y="2644">SHAKE128</text>
                  <text x="132" y="2660">Identifiers:</text>
                  <text x="276" y="2660">id-RSASSA-PSS-SHAKE128</text>
                  <text x="100" y="2676">OID:</text>
                  <text x="260" y="2676">1.3.6.1.5.5.7.6.30</text>
                  <text x="128" y="2692">Parameters:</text>
                  <text x="212" y="2692">Absent</text>
                  <text x="100" y="2708">DER:</text>
                  <text x="196" y="2708">30</text>
                  <text x="220" y="2708">0A</text>
                  <text x="244" y="2708">06</text>
                  <text x="268" y="2708">08</text>
                  <text x="292" y="2708">2B</text>
                  <text x="316" y="2708">06</text>
                  <text x="340" y="2708">01</text>
                  <text x="364" y="2708">05</text>
                  <text x="388" y="2708">05</text>
                  <text x="412" y="2708">07</text>
                  <text x="436" y="2708">06</text>
                  <text x="460" y="2708">1E</text>
                  <text x="120" y="2724">Comments:</text>
                  <text x="52" y="2756">30</text>
                  <text x="104" y="2756">Name:</text>
                  <text x="228" y="2756">RSASSA-PSS</text>
                  <text x="292" y="2756">with</text>
                  <text x="348" y="2756">SHAKE256</text>
                  <text x="132" y="2772">Identifiers:</text>
                  <text x="276" y="2772">id-RSASSA-PSS-SHAKE256</text>
                  <text x="100" y="2788">OID:</text>
                  <text x="260" y="2788">1.3.6.1.5.5.7.6.31</text>
                  <text x="128" y="2804">Parameters:</text>
                  <text x="212" y="2804">Absent</text>
                  <text x="100" y="2820">DER:</text>
                  <text x="196" y="2820">30</text>
                  <text x="220" y="2820">0A</text>
                  <text x="244" y="2820">06</text>
                  <text x="268" y="2820">08</text>
                  <text x="292" y="2820">2B</text>
                  <text x="316" y="2820">06</text>
                  <text x="340" y="2820">01</text>
                  <text x="364" y="2820">05</text>
                  <text x="388" y="2820">05</text>
                  <text x="412" y="2820">07</text>
                  <text x="436" y="2820">06</text>
                  <text x="460" y="2820">1F</text>
                  <text x="120" y="2836">Comments:</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Signature Algorithms                                |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:    Don't use                                    |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    Don't use. See Section 3.2.2.                |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     5 | Name:        Unsigned                                     |
|       | Identifiers: id-alg-unsigned                              |
|       | OID:         1.3.6.1.5.5.7.6.36                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 24          |
|       | Comments:    bytes of size 0                              |
+-------+-----------------------------------------------------------+
|     8 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        PoP with SHA-256 and HMAC-SHA256             |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    15 | Name:        PoP with SHA-384 and HMAC-SHA384             |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    16 | Name:        PoP with SHA-512 and HMAC-SHA512             |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 a2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the registry group "CBOR Encoded X.509 (C509) Parameters". The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. If the public key can only be used with one signature algorithm and the OID of the public key algorithm is the same as the signature algorithm, then the value <bcp14>MUST</bcp14> be chosen equal to the value of signature algorithm, see <xref target="sigalg"/>. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1872" width="560" viewBox="0 0 560 1872" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,1856" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,1856" fill="none" stroke="black"/>
                <path d="M 552,32 L 552,1856" fill="none" stroke="black"/>
                <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
                <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
                <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
                <path d="M 8,176 L 552,176" fill="none" stroke="black"/>
                <path d="M 8,320 L 552,320" fill="none" stroke="black"/>
                <path d="M 8,464 L 552,464" fill="none" stroke="black"/>
                <path d="M 8,608 L 552,608" fill="none" stroke="black"/>
                <path d="M 8,768 L 552,768" fill="none" stroke="black"/>
                <path d="M 8,880 L 552,880" fill="none" stroke="black"/>
                <path d="M 8,992 L 552,992" fill="none" stroke="black"/>
                <path d="M 8,1104 L 552,1104" fill="none" stroke="black"/>
                <path d="M 8,1216 L 552,1216" fill="none" stroke="black"/>
                <path d="M 8,1376 L 552,1376" fill="none" stroke="black"/>
                <path d="M 8,1536 L 552,1536" fill="none" stroke="black"/>
                <path d="M 8,1696 L 552,1696" fill="none" stroke="black"/>
                <path d="M 8,1856 L 552,1856" fill="none" stroke="black"/>
                <g class="text">
                  <text x="40" y="52">Value</text>
                  <text x="104" y="52">X.509</text>
                  <text x="156" y="52">Public</text>
                  <text x="200" y="52">Key</text>
                  <text x="260" y="52">Algorithms</text>
                  <text x="56" y="84">0</text>
                  <text x="104" y="84">Name:</text>
                  <text x="200" y="84">RSA</text>
                  <text x="132" y="100">Identifiers:</text>
                  <text x="240" y="100">rsaEncryption</text>
                  <text x="100" y="116">OID:</text>
                  <text x="268" y="116">1.2.840.113549.1.1.1</text>
                  <text x="128" y="132">Parameters:</text>
                  <text x="204" y="132">NULL</text>
                  <text x="100" y="148">DER:</text>
                  <text x="196" y="148">30</text>
                  <text x="220" y="148">0d</text>
                  <text x="244" y="148">06</text>
                  <text x="268" y="148">09</text>
                  <text x="292" y="148">2a</text>
                  <text x="316" y="148">86</text>
                  <text x="340" y="148">48</text>
                  <text x="364" y="148">86</text>
                  <text x="388" y="148">f7</text>
                  <text x="412" y="148">0d</text>
                  <text x="436" y="148">01</text>
                  <text x="460" y="148">01</text>
                  <text x="484" y="148">01</text>
                  <text x="508" y="148">05</text>
                  <text x="532" y="148">00</text>
                  <text x="120" y="164">Comments:</text>
                  <text x="228" y="164">Compressed</text>
                  <text x="340" y="164">subjectPublicKey</text>
                  <text x="56" y="196">1</text>
                  <text x="104" y="196">Name:</text>
                  <text x="196" y="196">EC</text>
                  <text x="236" y="196">Public</text>
                  <text x="280" y="196">Key</text>
                  <text x="352" y="196">(Weierstrass)</text>
                  <text x="428" y="196">with</text>
                  <text x="488" y="196">secp256r1</text>
                  <text x="132" y="212">Identifiers:</text>
                  <text x="236" y="212">ecPublicKey,</text>
                  <text x="348" y="212">id-ecPublicKey</text>
                  <text x="100" y="228">OID:</text>
                  <text x="256" y="228">1.2.840.10045.2.1</text>
                  <text x="128" y="244">Parameters:</text>
                  <text x="228" y="244">namedCurve</text>
                  <text x="280" y="244">=</text>
                  <text x="328" y="244">secp256r1</text>
                  <text x="456" y="244">(1.2.840.10045.3.1.7)</text>
                  <text x="100" y="260">DER:</text>
                  <text x="196" y="260">30</text>
                  <text x="220" y="260">13</text>
                  <text x="244" y="260">06</text>
                  <text x="268" y="260">07</text>
                  <text x="292" y="260">2A</text>
                  <text x="316" y="260">86</text>
                  <text x="340" y="260">48</text>
                  <text x="364" y="260">CE</text>
                  <text x="388" y="260">3D</text>
                  <text x="412" y="260">02</text>
                  <text x="436" y="260">01</text>
                  <text x="460" y="260">06</text>
                  <text x="484" y="260">08</text>
                  <text x="508" y="260">2A</text>
                  <text x="532" y="260">86</text>
                  <text x="196" y="276">48</text>
                  <text x="220" y="276">CE</text>
                  <text x="244" y="276">3D</text>
                  <text x="268" y="276">03</text>
                  <text x="292" y="276">01</text>
                  <text x="316" y="276">07</text>
                  <text x="120" y="292">Comments:</text>
                  <text x="228" y="292">Compressed</text>
                  <text x="340" y="292">subjectPublicKey</text>
                  <text x="204" y="308">Also</text>
                  <text x="248" y="308">known</text>
                  <text x="284" y="308">as</text>
                  <text x="324" y="308">P-256,</text>
                  <text x="400" y="308">ansip256r1,</text>
                  <text x="492" y="308">prime256v1</text>
                  <text x="56" y="340">2</text>
                  <text x="104" y="340">Name:</text>
                  <text x="196" y="340">EC</text>
                  <text x="236" y="340">Public</text>
                  <text x="280" y="340">Key</text>
                  <text x="352" y="340">(Weierstrass)</text>
                  <text x="428" y="340">with</text>
                  <text x="488" y="340">secp384r1</text>
                  <text x="132" y="356">Identifiers:</text>
                  <text x="236" y="356">ecPublicKey,</text>
                  <text x="348" y="356">id-ecPublicKey</text>
                  <text x="100" y="372">OID:</text>
                  <text x="256" y="372">1.2.840.10045.2.1</text>
                  <text x="128" y="388">Parameters:</text>
                  <text x="228" y="388">namedCurve</text>
                  <text x="280" y="388">=</text>
                  <text x="328" y="388">secp384r1</text>
                  <text x="428" y="388">(1.3.132.0.34)</text>
                  <text x="100" y="404">DER:</text>
                  <text x="196" y="404">30</text>
                  <text x="220" y="404">10</text>
                  <text x="244" y="404">06</text>
                  <text x="268" y="404">07</text>
                  <text x="292" y="404">2A</text>
                  <text x="316" y="404">86</text>
                  <text x="340" y="404">48</text>
                  <text x="364" y="404">CE</text>
                  <text x="388" y="404">3D</text>
                  <text x="412" y="404">02</text>
                  <text x="436" y="404">01</text>
                  <text x="460" y="404">06</text>
                  <text x="484" y="404">05</text>
                  <text x="508" y="404">2B</text>
                  <text x="532" y="404">81</text>
                  <text x="196" y="420">04</text>
                  <text x="220" y="420">00</text>
                  <text x="244" y="420">22</text>
                  <text x="120" y="436">Comments:</text>
                  <text x="228" y="436">Compressed</text>
                  <text x="340" y="436">subjectPublicKey</text>
                  <text x="204" y="452">Also</text>
                  <text x="248" y="452">known</text>
                  <text x="284" y="452">as</text>
                  <text x="324" y="452">P-384,</text>
                  <text x="396" y="452">ansip384r1</text>
                  <text x="56" y="484">3</text>
                  <text x="104" y="484">Name:</text>
                  <text x="196" y="484">EC</text>
                  <text x="236" y="484">Public</text>
                  <text x="280" y="484">Key</text>
                  <text x="352" y="484">(Weierstrass)</text>
                  <text x="428" y="484">with</text>
                  <text x="488" y="484">secp521r1</text>
                  <text x="132" y="500">Identifiers:</text>
                  <text x="236" y="500">ecPublicKey,</text>
                  <text x="348" y="500">id-ecPublicKey</text>
                  <text x="100" y="516">OID:</text>
                  <text x="256" y="516">1.2.840.10045.2.1</text>
                  <text x="128" y="532">Parameters:</text>
                  <text x="228" y="532">namedCurve</text>
                  <text x="280" y="532">=</text>
                  <text x="328" y="532">secp521r1</text>
                  <text x="428" y="532">(1.3.132.0.35)</text>
                  <text x="100" y="548">DER:</text>
                  <text x="196" y="548">30</text>
                  <text x="220" y="548">10</text>
                  <text x="244" y="548">06</text>
                  <text x="268" y="548">07</text>
                  <text x="292" y="548">2A</text>
                  <text x="316" y="548">86</text>
                  <text x="340" y="548">48</text>
                  <text x="364" y="548">CE</text>
                  <text x="388" y="548">3D</text>
                  <text x="412" y="548">02</text>
                  <text x="436" y="548">01</text>
                  <text x="460" y="548">06</text>
                  <text x="484" y="548">05</text>
                  <text x="508" y="548">2B</text>
                  <text x="532" y="548">81</text>
                  <text x="196" y="564">04</text>
                  <text x="220" y="564">00</text>
                  <text x="244" y="564">23</text>
                  <text x="120" y="580">Comments:</text>
                  <text x="228" y="580">Compressed</text>
                  <text x="340" y="580">subjectPublicKey</text>
                  <text x="204" y="596">Also</text>
                  <text x="248" y="596">known</text>
                  <text x="284" y="596">as</text>
                  <text x="324" y="596">P-521,</text>
                  <text x="396" y="596">ansip521r1</text>
                  <text x="56" y="628">6</text>
                  <text x="104" y="628">Name:</text>
                  <text x="196" y="628">EC</text>
                  <text x="236" y="628">Public</text>
                  <text x="280" y="628">Key</text>
                  <text x="352" y="628">(Weierstrass)</text>
                  <text x="428" y="628">with</text>
                  <text x="224" y="644">sm2p256v1</text>
                  <text x="132" y="660">Identifiers:</text>
                  <text x="236" y="660">ecPublicKey,</text>
                  <text x="348" y="660">id-ecPublicKey</text>
                  <text x="100" y="676">OID:</text>
                  <text x="256" y="676">1.2.840.10045.2.1</text>
                  <text x="128" y="692">Parameters:</text>
                  <text x="228" y="692">namedCurve</text>
                  <text x="280" y="692">=</text>
                  <text x="328" y="692">sm2p256v1</text>
                  <text x="272" y="708">(1.2.156.10197.1.301)</text>
                  <text x="100" y="724">DER:</text>
                  <text x="196" y="724">30</text>
                  <text x="220" y="724">13</text>
                  <text x="244" y="724">06</text>
                  <text x="268" y="724">07</text>
                  <text x="292" y="724">2A</text>
                  <text x="316" y="724">86</text>
                  <text x="340" y="724">48</text>
                  <text x="364" y="724">CE</text>
                  <text x="388" y="724">3D</text>
                  <text x="412" y="724">02</text>
                  <text x="436" y="724">01</text>
                  <text x="460" y="724">06</text>
                  <text x="484" y="724">08</text>
                  <text x="508" y="724">2A</text>
                  <text x="532" y="724">81</text>
                  <text x="196" y="740">1C</text>
                  <text x="220" y="740">CF</text>
                  <text x="244" y="740">55</text>
                  <text x="268" y="740">01</text>
                  <text x="292" y="740">82</text>
                  <text x="316" y="740">2D</text>
                  <text x="120" y="756">Comments:</text>
                  <text x="228" y="756">Compressed</text>
                  <text x="340" y="756">subjectPublicKey</text>
                  <text x="56" y="788">8</text>
                  <text x="104" y="788">Name:</text>
                  <text x="212" y="788">X25519</text>
                  <text x="292" y="788">(Montgomery)</text>
                  <text x="132" y="804">Identifiers:</text>
                  <text x="224" y="804">id-X25519</text>
                  <text x="100" y="820">OID:</text>
                  <text x="232" y="820">1.3.101.110</text>
                  <text x="128" y="836">Parameters:</text>
                  <text x="212" y="836">Absent</text>
                  <text x="100" y="852">DER:</text>
                  <text x="196" y="852">30</text>
                  <text x="220" y="852">05</text>
                  <text x="244" y="852">06</text>
                  <text x="268" y="852">03</text>
                  <text x="292" y="852">2B</text>
                  <text x="316" y="852">65</text>
                  <text x="340" y="852">6E</text>
                  <text x="120" y="868">Comments:</text>
                  <text x="56" y="900">9</text>
                  <text x="104" y="900">Name:</text>
                  <text x="204" y="900">X448</text>
                  <text x="276" y="900">(Montgomery)</text>
                  <text x="132" y="916">Identifiers:</text>
                  <text x="216" y="916">id-X448</text>
                  <text x="100" y="932">OID:</text>
                  <text x="232" y="932">1.3.101.111</text>
                  <text x="128" y="948">Parameters:</text>
                  <text x="212" y="948">Absent</text>
                  <text x="100" y="964">DER:</text>
                  <text x="196" y="964">30</text>
                  <text x="220" y="964">05</text>
                  <text x="244" y="964">06</text>
                  <text x="268" y="964">03</text>
                  <text x="292" y="964">2B</text>
                  <text x="316" y="964">65</text>
                  <text x="340" y="964">6F</text>
                  <text x="120" y="980">Comments:</text>
                  <text x="52" y="1012">12</text>
                  <text x="104" y="1012">Name:</text>
                  <text x="216" y="1012">Ed25519</text>
                  <text x="284" y="1012">(Twisted</text>
                  <text x="356" y="1012">Edwards)</text>
                  <text x="132" y="1028">Identifiers:</text>
                  <text x="232" y="1028">id-Ed25519,</text>
                  <text x="336" y="1028">id-EdDSA25519</text>
                  <text x="100" y="1044">OID:</text>
                  <text x="232" y="1044">1.3.101.112</text>
                  <text x="128" y="1060">Parameters:</text>
                  <text x="212" y="1060">Absent</text>
                  <text x="100" y="1076">DER:</text>
                  <text x="196" y="1076">30</text>
                  <text x="220" y="1076">05</text>
                  <text x="244" y="1076">06</text>
                  <text x="268" y="1076">03</text>
                  <text x="292" y="1076">2B</text>
                  <text x="316" y="1076">65</text>
                  <text x="340" y="1076">70</text>
                  <text x="120" y="1092">Comments:</text>
                  <text x="52" y="1124">13</text>
                  <text x="104" y="1124">Name:</text>
                  <text x="208" y="1124">Ed448</text>
                  <text x="272" y="1124">(Edwards)</text>
                  <text x="132" y="1140">Identifiers:</text>
                  <text x="224" y="1140">id-Ed448,</text>
                  <text x="312" y="1140">id-EdDSA448</text>
                  <text x="100" y="1156">OID:</text>
                  <text x="232" y="1156">1.3.101.113</text>
                  <text x="128" y="1172">Parameters:</text>
                  <text x="212" y="1172">Absent</text>
                  <text x="100" y="1188">DER:</text>
                  <text x="196" y="1188">30</text>
                  <text x="220" y="1188">05</text>
                  <text x="244" y="1188">06</text>
                  <text x="268" y="1188">03</text>
                  <text x="292" y="1188">2B</text>
                  <text x="316" y="1188">65</text>
                  <text x="340" y="1188">71</text>
                  <text x="120" y="1204">Comments:</text>
                  <text x="52" y="1236">24</text>
                  <text x="104" y="1236">Name:</text>
                  <text x="196" y="1236">EC</text>
                  <text x="236" y="1236">Public</text>
                  <text x="280" y="1236">Key</text>
                  <text x="352" y="1236">(Weierstrass)</text>
                  <text x="428" y="1236">with</text>
                  <text x="248" y="1252">brainpoolP256r1</text>
                  <text x="132" y="1268">Identifiers:</text>
                  <text x="236" y="1268">ecPublicKey,</text>
                  <text x="348" y="1268">id-ecPublicKey</text>
                  <text x="100" y="1284">OID:</text>
                  <text x="256" y="1284">1.2.840.10045.2.1</text>
                  <text x="128" y="1300">Parameters:</text>
                  <text x="228" y="1300">namedCurve</text>
                  <text x="280" y="1300">=</text>
                  <text x="352" y="1300">brainpoolP256r1</text>
                  <text x="276" y="1316">(1.3.36.3.3.2.8.1.1.7)</text>
                  <text x="100" y="1332">DER:</text>
                  <text x="196" y="1332">30</text>
                  <text x="220" y="1332">14</text>
                  <text x="244" y="1332">06</text>
                  <text x="268" y="1332">07</text>
                  <text x="292" y="1332">2A</text>
                  <text x="316" y="1332">86</text>
                  <text x="340" y="1332">48</text>
                  <text x="364" y="1332">CE</text>
                  <text x="388" y="1332">3D</text>
                  <text x="412" y="1332">02</text>
                  <text x="436" y="1332">01</text>
                  <text x="460" y="1332">06</text>
                  <text x="484" y="1332">09</text>
                  <text x="508" y="1332">2B</text>
                  <text x="532" y="1332">24</text>
                  <text x="196" y="1348">03</text>
                  <text x="220" y="1348">03</text>
                  <text x="244" y="1348">02</text>
                  <text x="268" y="1348">08</text>
                  <text x="292" y="1348">01</text>
                  <text x="316" y="1348">01</text>
                  <text x="340" y="1348">07</text>
                  <text x="120" y="1364">Comments:</text>
                  <text x="228" y="1364">Compressed</text>
                  <text x="340" y="1364">subjectPublicKey</text>
                  <text x="52" y="1396">25</text>
                  <text x="104" y="1396">Name:</text>
                  <text x="196" y="1396">EC</text>
                  <text x="236" y="1396">Public</text>
                  <text x="280" y="1396">Key</text>
                  <text x="352" y="1396">(Weierstrass)</text>
                  <text x="428" y="1396">with</text>
                  <text x="248" y="1412">brainpoolP384r1</text>
                  <text x="132" y="1428">Identifiers:</text>
                  <text x="236" y="1428">ecPublicKey,</text>
                  <text x="348" y="1428">id-ecPublicKey</text>
                  <text x="100" y="1444">OID:</text>
                  <text x="256" y="1444">1.2.840.10045.2.1</text>
                  <text x="128" y="1460">Parameters:</text>
                  <text x="228" y="1460">namedCurve</text>
                  <text x="280" y="1460">=</text>
                  <text x="352" y="1460">brainpoolP384r1</text>
                  <text x="280" y="1476">(1.3.36.3.3.2.8.1.1.11)</text>
                  <text x="100" y="1492">DER:</text>
                  <text x="196" y="1492">30</text>
                  <text x="220" y="1492">14</text>
                  <text x="244" y="1492">06</text>
                  <text x="268" y="1492">07</text>
                  <text x="292" y="1492">2A</text>
                  <text x="316" y="1492">86</text>
                  <text x="340" y="1492">48</text>
                  <text x="364" y="1492">CE</text>
                  <text x="388" y="1492">3D</text>
                  <text x="412" y="1492">02</text>
                  <text x="436" y="1492">01</text>
                  <text x="460" y="1492">06</text>
                  <text x="484" y="1492">09</text>
                  <text x="508" y="1492">2B</text>
                  <text x="532" y="1492">24</text>
                  <text x="196" y="1508">03</text>
                  <text x="220" y="1508">03</text>
                  <text x="244" y="1508">02</text>
                  <text x="268" y="1508">08</text>
                  <text x="292" y="1508">01</text>
                  <text x="316" y="1508">01</text>
                  <text x="340" y="1508">0B</text>
                  <text x="120" y="1524">Comments:</text>
                  <text x="228" y="1524">Compressed</text>
                  <text x="340" y="1524">subjectPublicKey</text>
                  <text x="52" y="1556">26</text>
                  <text x="104" y="1556">Name:</text>
                  <text x="196" y="1556">EC</text>
                  <text x="236" y="1556">Public</text>
                  <text x="280" y="1556">Key</text>
                  <text x="352" y="1556">(Weierstrass)</text>
                  <text x="428" y="1556">with</text>
                  <text x="248" y="1572">brainpoolP512r1</text>
                  <text x="132" y="1588">Identifiers:</text>
                  <text x="236" y="1588">ecPublicKey,</text>
                  <text x="348" y="1588">id-ecPublicKey</text>
                  <text x="100" y="1604">OID:</text>
                  <text x="256" y="1604">1.2.840.10045.2.1</text>
                  <text x="128" y="1620">Parameters:</text>
                  <text x="228" y="1620">namedCurve</text>
                  <text x="280" y="1620">=</text>
                  <text x="352" y="1620">brainpoolP512r1</text>
                  <text x="280" y="1636">(1.3.36.3.3.2.8.1.1.13)</text>
                  <text x="100" y="1652">DER:</text>
                  <text x="196" y="1652">30</text>
                  <text x="220" y="1652">14</text>
                  <text x="244" y="1652">06</text>
                  <text x="268" y="1652">07</text>
                  <text x="292" y="1652">2A</text>
                  <text x="316" y="1652">86</text>
                  <text x="340" y="1652">48</text>
                  <text x="364" y="1652">CE</text>
                  <text x="388" y="1652">3D</text>
                  <text x="412" y="1652">02</text>
                  <text x="436" y="1652">01</text>
                  <text x="460" y="1652">06</text>
                  <text x="484" y="1652">09</text>
                  <text x="508" y="1652">2B</text>
                  <text x="532" y="1652">24</text>
                  <text x="196" y="1668">03</text>
                  <text x="220" y="1668">03</text>
                  <text x="244" y="1668">02</text>
                  <text x="268" y="1668">08</text>
                  <text x="292" y="1668">01</text>
                  <text x="316" y="1668">01</text>
                  <text x="340" y="1668">0D</text>
                  <text x="120" y="1684">Comments:</text>
                  <text x="228" y="1684">Compressed</text>
                  <text x="340" y="1684">subjectPublicKey</text>
                  <text x="52" y="1716">27</text>
                  <text x="104" y="1716">Name:</text>
                  <text x="196" y="1716">EC</text>
                  <text x="236" y="1716">Public</text>
                  <text x="280" y="1716">Key</text>
                  <text x="352" y="1716">(Weierstrass)</text>
                  <text x="428" y="1716">with</text>
                  <text x="220" y="1732">FRP256v1</text>
                  <text x="132" y="1748">Identifiers:</text>
                  <text x="236" y="1748">ecPublicKey,</text>
                  <text x="348" y="1748">id-ecPublicKey</text>
                  <text x="100" y="1764">OID:</text>
                  <text x="256" y="1764">1.2.840.10045.2.1</text>
                  <text x="128" y="1780">Parameters:</text>
                  <text x="228" y="1780">namedCurve</text>
                  <text x="280" y="1780">=</text>
                  <text x="324" y="1780">FRP256v1</text>
                  <text x="288" y="1796">(1.2.250.1.223.101.256.1)</text>
                  <text x="100" y="1812">DER:</text>
                  <text x="196" y="1812">30</text>
                  <text x="220" y="1812">15</text>
                  <text x="244" y="1812">06</text>
                  <text x="268" y="1812">07</text>
                  <text x="292" y="1812">2A</text>
                  <text x="316" y="1812">86</text>
                  <text x="340" y="1812">48</text>
                  <text x="364" y="1812">CE</text>
                  <text x="388" y="1812">3D</text>
                  <text x="412" y="1812">02</text>
                  <text x="436" y="1812">01</text>
                  <text x="460" y="1812">06</text>
                  <text x="484" y="1812">0A</text>
                  <text x="508" y="1812">2A</text>
                  <text x="532" y="1812">81</text>
                  <text x="196" y="1828">7A</text>
                  <text x="220" y="1828">01</text>
                  <text x="244" y="1828">81</text>
                  <text x="268" y="1828">5F</text>
                  <text x="292" y="1828">65</text>
                  <text x="316" y="1828">82</text>
                  <text x="340" y="1828">00</text>
                  <text x="364" y="1828">01</text>
                  <text x="120" y="1844">Comments:</text>
                  <text x="228" y="1844">Compressed</text>
                  <text x="340" y="1844">subjectPublicKey</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | X.509 Public Key Algorithms                               |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstrass) with secp256r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstrass) with secp384r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstrass) with secp521r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    Compressed subjectPublicKey                  |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     6 | Name:        EC Public Key (Weierstrass) with             |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstrass) with             |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    Compressed subjectPublicKey                  |
+-------+-----------------------------------------------------------+
]]></artwork>
          </artset>
        </figure>
        <section anchor="suitability-of-different-public-key-algorithms-for-use-within-iot-scenarios">
          <name>Suitability of different public key algorithms for use within IoT scenarios</name>
          <t>The public key algorithms registry <xref target="pkalg"/> specifies a number of algorithms, not all which are suitable for usage with constrained devices. RSA requires large keys and large signature sizes compared to elliptic curve cryptography (ECC), which together with resource-efficient implementations of named elliptic curves (Montgomery, Edwards and Weierstrass curves) make them suitable candidates for IoT public key usage.</t>
        </section>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry in the registry group "CBOR Object Signing and Encryption (COSE)" with this document as reference.</t>
      </section>
      <section anchor="cose-alg">
        <name>COSE Header Algorithm Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-sender"/> to the "COSE Header Algorithm Parameters" registry in the registry group "CBOR Object Signing and Encryption (COSE)" with this document as reference.</t>
      </section>
      <section anchor="media-type-application-registry">
        <name>Media Type Application Registry</name>
        <t>IANA is requested to assign the following entries in to the "application" registry in the registry group "Media Types" with this document as reference.</t>
        <section anchor="c509-cert">
          <name>Media Type application/cose-c509-cert</name>
          <t>When the application/cose-c509-cert media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-cert</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
            </li>
            <li>
              <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD8, TBD6</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pkcs10">
          <name>Media Type application/cose-c509-pkcs10</name>
          <t>When the application/cose-c509-pkcs10 media type is used, the data is a C509CertificationRequest structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pkcs10</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certification Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD9</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-crtemplate">
          <name>Media Type application/cose-c509-crtemplate</name>
          <t>When the application/cose-c509-crtemplate media type is used, the data is a C509CertificationRequestTemplate structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-crtemplate</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certification Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD18</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-privkey">
          <name>Media Type application/cose-c509-privkey</name>
          <t>When the application/cose-c509-privkey media type is used, the data is a C509PrivateKey structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-privkey</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD12</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pem">
          <name>Media Type application/cose-c509-pem</name>
          <t>When the application/cose-c509-pem media type is used, the data is a C509PEM structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pem</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD13</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="cose-certhash">
          <name>Media Type application/cose-certhash</name>
          <t>When the application/cose-certhash media type is used, the data is a COSE_CertHash structure, see <xref target="RFC9360"/>.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-certhash</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about what the hash value is calculated over.</t>
            </li>
            <li>
              <t>Can be set to "c509" to indicate that the hash value is calculated over a C509 certificate, see <xref target="cose-header-params"/>.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of <xref target="RFC9360"/>.</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use X.509 or C509 as certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): N/A</t>
            </li>
            <li>
              <t>File extension(s): N/A</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
      </section>
      <section anchor="content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to add entries for "application/cose-c509-cert", "application/cose-c509-pkcs10", "application/cose-c509-crtemplate", "application/cose-c509-privkey" and "application/cose-c509-pem" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters".
A dedicated Content-Format ID is requested for the "application/cose-c509-cert" media type in the case when the parameter "usage" is set to "chain", see <xref target="c509-cert"/>.</t>
        <t>IANA is requested to add entries for "application/cose-certhash" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters". A dedicated Content-Format ID is requested  in the case when the parameter "usage" is set to "c509", see <xref target="cose-certhash"/>.</t>
        <t>IANA is requested to add entries for "application/cbor" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters", in the case when the encoding is a CBOR text string containing a URI, see <xref target="RFC3986"/>.</t>
        <figure anchor="fig-format-ids">
          <name>CoAP Content-Format IDs</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="544" viewBox="0 0 544 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,496" fill="none" stroke="black"/>
                <path d="M 192,32 L 192,496" fill="none" stroke="black"/>
                <path d="M 272,32 L 272,496" fill="none" stroke="black"/>
                <path d="M 368,32 L 368,496" fill="none" stroke="black"/>
                <path d="M 432,32 L 432,496" fill="none" stroke="black"/>
                <path d="M 536,32 L 536,496" fill="none" stroke="black"/>
                <path d="M 8,32 L 536,32" fill="none" stroke="black"/>
                <path d="M 8,78 L 536,78" fill="none" stroke="black"/>
                <path d="M 8,82 L 536,82" fill="none" stroke="black"/>
                <path d="M 8,128 L 536,128" fill="none" stroke="black"/>
                <path d="M 8,192 L 536,192" fill="none" stroke="black"/>
                <path d="M 8,240 L 536,240" fill="none" stroke="black"/>
                <path d="M 8,288 L 536,288" fill="none" stroke="black"/>
                <path d="M 8,336 L 536,336" fill="none" stroke="black"/>
                <path d="M 8,384 L 536,384" fill="none" stroke="black"/>
                <path d="M 8,432 L 536,432" fill="none" stroke="black"/>
                <path d="M 8,496 L 536,496" fill="none" stroke="black"/>
                <g class="text">
                  <text x="48" y="52">Content</text>
                  <text x="232" y="52">Content</text>
                  <text x="304" y="52">Media</text>
                  <text x="388" y="52">ID</text>
                  <text x="480" y="52">Reference</text>
                  <text x="44" y="68">Format</text>
                  <text x="228" y="68">Coding</text>
                  <text x="300" y="68">Type</text>
                  <text x="68" y="100">application/</text>
                  <text x="208" y="100">-</text>
                  <text x="308" y="100">[[link</text>
                  <text x="396" y="100">TBD3</text>
                  <text x="468" y="100">[[this</text>
                  <text x="76" y="116">cose-c509-cert</text>
                  <text x="292" y="116">to</text>
                  <text x="332" y="116">8.18]]</text>
                  <text x="484" y="116">document]]</text>
                  <text x="68" y="148">application/</text>
                  <text x="308" y="148">[[link</text>
                  <text x="468" y="148">[[this</text>
                  <text x="80" y="164">cose-c509-cert;</text>
                  <text x="208" y="164">-</text>
                  <text x="292" y="164">to</text>
                  <text x="332" y="164">8.18]]</text>
                  <text x="400" y="164">TBD15</text>
                  <text x="484" y="164">document]]</text>
                  <text x="40" y="180">usage</text>
                  <text x="72" y="180">=</text>
                  <text x="104" y="180">chain</text>
                  <text x="68" y="212">application/</text>
                  <text x="208" y="212">-</text>
                  <text x="308" y="212">[[link</text>
                  <text x="396" y="212">TBD4</text>
                  <text x="468" y="212">[[this</text>
                  <text x="84" y="228">cose-c509-pkcs10</text>
                  <text x="292" y="228">to</text>
                  <text x="332" y="228">8.18]]</text>
                  <text x="484" y="228">document]]</text>
                  <text x="68" y="260">application/</text>
                  <text x="208" y="260">-</text>
                  <text x="308" y="260">[[link</text>
                  <text x="400" y="260">TBD19</text>
                  <text x="468" y="260">[[this</text>
                  <text x="100" y="276">cose-c509-crtemplate</text>
                  <text x="292" y="276">to</text>
                  <text x="332" y="276">8.18]]</text>
                  <text x="484" y="276">document]]</text>
                  <text x="68" y="308">application/</text>
                  <text x="208" y="308">-</text>
                  <text x="308" y="308">[[link</text>
                  <text x="400" y="308">TBD10</text>
                  <text x="468" y="308">[[this</text>
                  <text x="88" y="324">cose-c509-privkey</text>
                  <text x="292" y="324">to</text>
                  <text x="332" y="324">8.18]]</text>
                  <text x="484" y="324">document]]</text>
                  <text x="68" y="356">application/</text>
                  <text x="208" y="356">-</text>
                  <text x="308" y="356">[[link</text>
                  <text x="400" y="356">TBD11</text>
                  <text x="468" y="356">[[this</text>
                  <text x="72" y="372">cose-c509-pem</text>
                  <text x="292" y="372">to</text>
                  <text x="332" y="372">8.18]]</text>
                  <text x="484" y="372">document]]</text>
                  <text x="68" y="404">application/</text>
                  <text x="208" y="404">-</text>
                  <text x="308" y="404">[[link</text>
                  <text x="400" y="404">TBD16</text>
                  <text x="468" y="404">[[this</text>
                  <text x="72" y="420">cose-certhash</text>
                  <text x="292" y="420">to</text>
                  <text x="332" y="420">8.18]]</text>
                  <text x="484" y="420">document]]</text>
                  <text x="68" y="452">application/</text>
                  <text x="308" y="452">[[link</text>
                  <text x="468" y="452">[[this</text>
                  <text x="76" y="468">cose-certhash;</text>
                  <text x="208" y="468">-</text>
                  <text x="292" y="468">to</text>
                  <text x="332" y="468">8.18]]</text>
                  <text x="400" y="468">TBD17</text>
                  <text x="484" y="468">document]]</text>
                  <text x="40" y="484">usage</text>
                  <text x="72" y="484">=</text>
                  <text x="100" y="484">c509</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
+----------------------+---------+-----------+-------+------------+
| Content              | Content | Media     | ID    | Reference  |
| Format               | Coding  | Type      |       |            |
+======================+=========+===========+=======+============+
| application/         | -       | [[link    | TBD3  | [[this     |
| cose-c509-cert       |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         |         | [[link    |       | [[this     |
| cose-c509-cert;      | -       | to 8.18]] | TBD15 | document]] |
| usage = chain        |         |           |       |            |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD4  | [[this     |
| cose-c509-pkcs10     |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD19 | [[this     |
| cose-c509-crtemplate |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD10 | [[this     |
| cose-c509-privkey    |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD11 | [[this     |
| cose-c509-pem        |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD16 | [[this     |
| cose-certhash        |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         |         | [[link    |       | [[this     |
| cose-certhash;       | -       | to 8.18]] | TBD17 | document]] |
| usage = c509         |         |           |       |            |
+----------------------+---------+-----------+-------+------------+
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry in the registry group "Transport Layer Security (TLS) Extensions". The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. For TLS 1.3, the C509 certificate type is defined as a new case in the CertificateEntry struct specified in <xref section="4.4.2" sectionFormat="of" target="RFC8446"/>:</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="64" width="248" viewBox="0 0 248 64" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <g class="text">
                <text x="20" y="36">case</text>
                <text x="64" y="36">C509:</text>
                <text x="44" y="52">opaque</text>
                <text x="160" y="52">c509_data&lt;1..2^24-1&gt;;</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
case C509:
  opaque c509_data<1..2^24-1>;
]]></artwork>
        </artset>
        <t>where c509_data is the CBOR sequence ~C509Certificate (an unwrapped C509Certificate). For TLS 1.2 the same construction is applied with a similar union type defined for the Certificate struct in <xref section="7.4.2" sectionFormat="of" target="RFC5246"/>. Note that, similar to COSE_C509, the TLS handshake contains the length of each certificate. The TLS extensions client_certificate_type and server_certificate_type <xref target="RFC7250"/> are used to negotiate the use of C509.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 224,32 L 224,96" fill="none" stroke="black"/>
              <path d="M 336,32 L 336,96" fill="none" stroke="black"/>
              <path d="M 552,32 L 552,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 552,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 552,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 552,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 552,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="100" y="52">Name</text>
                <text x="280" y="52">Recommended</text>
                <text x="376" y="52">Comment</text>
                <text x="44" y="84">TBD5</text>
                <text x="100" y="84">C509</text>
                <text x="168" y="84">Certificate</text>
                <text x="320" y="84">N</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           N |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="tlsa">
        <name>TLSA Selectors Registry</name>
        <t>This document registers the following entry in the "TLSA Selectors" registry in the registry group "DNS-Based Authentication of Named Entities (DANE) Parameters". The C509 certificate data, C509CertData, is defined in <xref target="cose-header-params"/>.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="520" viewBox="0 0 520 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
              <path d="M 352,32 L 352,96" fill="none" stroke="black"/>
              <path d="M 512,32 L 512,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 512,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 512,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 512,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 512,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="112" y="52">Acronym</text>
                <text x="200" y="52">Short</text>
                <text x="272" y="52">Description</text>
                <text x="432" y="52">Reference</text>
                <text x="44" y="84">TBD7</text>
                <text x="124" y="84">C509</text>
                <text x="180" y="84">C509</text>
                <text x="248" y="84">certificate</text>
                <text x="316" y="84">data</text>
                <text x="388" y="84">[[this</text>
                <text x="460" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+---------+------------------------+-------------------+
| Value | Acronym |   Short Description    |     Reference     |
+=======+=========+========================+===================+
|  TBD7 |    C509 | C509 certificate data  | [[this document]] |
+-------+---------+------------------------+-------------------+
]]></artwork>
        </artset>
        <t>The TLSA selectors registry defined in <xref target="RFC6698"/> originally only applied to PKIX <xref target="RFC5280"/> certificates in DER encoding. This specification updates <xref target="RFC6698"/> to accept the use of C509 certificates.</t>
      </section>
      <section anchor="edhoc-authentication-credential-types-registry">
        <name>EDHOC Authentication Credential Types Registry</name>
        <t>This document registers the following entry in the "EDHOC Authentication Credential Types" registry in the registry group "Ephemeral Diffie-Hellman Over COSE (EDHOC)". This is useful to identify C509 certificates as a supported authentication credential type to use with EDHOC <xref target="RFC9528"/>, for example, during discovery of EDHOC resources, see <xref target="RFC9668"/>.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="424" viewBox="0 0 424 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 72,32 L 72,96" fill="none" stroke="black"/>
              <path d="M 256,32 L 256,96" fill="none" stroke="black"/>
              <path d="M 416,32 L 416,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 416,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 416,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 416,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 416,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="40" y="52">Value</text>
                <text x="128" y="52">Description</text>
                <text x="336" y="52">Reference</text>
                <text x="40" y="84">3</text>
                <text x="100" y="84">C509</text>
                <text x="168" y="84">certificate</text>
                <text x="292" y="84">[[this</text>
                <text x="364" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+-------+----------------------+-------------------+
| Value | Description          |     Reference     |
+=======+======================+===================+
|   3   | C509 certificate     | [[this document]] |
+-------+----------------------+-------------------+
]]></artwork>
        </artset>
      </section>
      <section anchor="relative-distinguished-name-attribute">
        <name>Relative Distinguished Name Attribute</name>
        <t>This document regists the following entry in the "SMI Security for PKIX Relative Distinguished Name Attribute" registry <xref target="RFC7299"/>:</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="440" viewBox="0 0 440 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
              <path d="M 88,32 L 88,96" fill="none" stroke="black"/>
              <path d="M 272,32 L 272,96" fill="none" stroke="black"/>
              <path d="M 432,32 L 432,96" fill="none" stroke="black"/>
              <path d="M 8,32 L 432,32" fill="none" stroke="black"/>
              <path d="M 8,62 L 432,62" fill="none" stroke="black"/>
              <path d="M 8,66 L 432,66" fill="none" stroke="black"/>
              <path d="M 8,96 L 432,96" fill="none" stroke="black"/>
              <g class="text">
                <text x="48" y="52">Decimal</text>
                <text x="144" y="52">Description</text>
                <text x="352" y="52">Reference</text>
                <text x="40" y="84">TBD30</text>
                <text x="164" y="84">id-rdna-c509Name</text>
                <text x="308" y="84">[[this</text>
                <text x="380" y="84">document]]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+---------+----------------------+-------------------+
| Decimal | Description          |     Reference     |
+=========+======================+===================+
| TBD30   | id-rdna-c509Name     | [[this document]] |
+---------+----------------------+-------------------+
]]></artwork>
        </artset>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2985">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5958">
          <front>
            <title>Asymmetric Key Packages</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document defines the syntax for private-key information and a content type for it. Private-key information includes a private key for a specified public-key algorithm and a set of attributes. The Cryptographic Message Syntax (CMS), as defined in RFC 5652, can be used to digitally sign, digest, authenticate, or encrypt the asymmetric key format content type. This document obsoletes RFC 5208. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5958"/>
          <seriesInfo name="DOI" value="10.17487/RFC5958"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC8360">
          <front>
            <title>Resource Public Key Infrastructure (RPKI) Validation Reconsidered</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="C. Martinez" initials="C." surname="Martinez"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="D. Shaw" initials="D." surname="Shaw"/>
            <date month="April" year="2018"/>
            <abstract>
              <t>This document specifies an alternative to the certificate validation procedure specified in RFC 6487 that reduces aspects of operational fragility in the management of certificates in the Resource Public Key Infrastructure (RPKI), while retaining essential security features.</t>
              <t>The procedure specified in RFC 6487 requires that Resource Certificates are rejected entirely if they are found to overclaim any resources not contained on the issuing certificate, whereas the validation process defined here allows an issuing Certification Authority (CA) to chose to communicate that such Resource Certificates should be accepted for the intersection of their resources and the issuing certificate.</t>
              <t>It should be noted that the validation process defined here considers validation under a single trust anchor (TA) only. In particular, concerns regarding overclaims where multiple configured TAs claim overlapping resources are considered out of scope for this document.</t>
              <t>This choice is signaled by a set of alternative Object Identifiers (OIDs) per "X.509 Extensions for IP Addresses and AS Identifiers" (RFC 3779) and "Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI)" (RFC 6484). It should be noted that in case these OIDs are not used for any certificate under a trust anchor, the validation procedure defined here has the same outcome as the procedure defined in RFC 6487.</t>
              <t>Furthermore, this document provides an alternative to Route Origin Authorization (ROA) (RFC 6482) and BGPsec Router Certificate (BGPsec PKI Profiles -- publication requested) validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8360"/>
          <seriesInfo name="DOI" value="10.17487/RFC8360"/>
        </reference>
        <reference anchor="RFC8398">
          <front>
            <title>Internationalized Email Addresses in X.509 Certificates</title>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov"/>
            <author fullname="W. Chuang" initials="W." role="editor" surname="Chuang"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a new name form for inclusion in the otherName field of an X.509 Subject Alternative Name and Issuer Alternative Name extension that allows a certificate subject to be associated with an internationalized email address.</t>
              <t>This document updates RFC 5280.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8398"/>
          <seriesInfo name="DOI" value="10.17487/RFC8398"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="RFC9549">
          <front>
            <title>Internationalization Updates to RFC 5280</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The updates to RFC 5280 described in this document provide alignment with the 2008 specification for Internationalized Domain Names (IDNs) and includes support for internationalized email addresses in X.509 certificates. The updates ensure that name constraints for email addresses that contain only ASCII characters and internationalized email addresses are handled in the same manner. This document obsoletes RFC 8399.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9549"/>
          <seriesInfo name="DOI" value="10.17487/RFC9549"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="RFC9883">
          <front>
            <title>An Attribute for Statement of Possession of a Private Key</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>This document specifies an attribute for a statement of possession of a private key by a certificate subject. As part of X.509 certificate enrollment, a Certification Authority (CA) typically demands proof that the subject possesses the private key that corresponds to the to-be-certified public key. In some cases, a CA might accept a signed statement from the certificate subject. For example, when a certificate subject needs separate certificates for signature and key establishment, a statement that can be validated with the previously issued signature certificate for the same subject might be adequate for subsequent issuance of the key establishment certificate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9883"/>
          <seriesInfo name="DOI" value="10.17487/RFC9883"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-macaddress-on">
          <front>
            <title>Media Access Control (MAC) Addresses in X.509 Certificates</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Corey Bonnell" initials="C." surname="Bonnell">
              <organization>DigiCert, Inc.</organization>
            </author>
            <author fullname="Joe Mandel" initials="J." surname="Mandel">
              <organization>AKAYLA, Inc.</organization>
            </author>
            <author fullname="Tomofumi Okubo" initials="T." surname="Okubo">
              <organization>Penguin Securities Pte. Ltd.</organization>
            </author>
            <author fullname="Michael StJohns" initials="M." surname="StJohns">
              <organization>NthPermutation Security LLC</organization>
            </author>
            <date day="12" month="March" year="2026"/>
            <abstract>
              <t>   This document defines a new GeneralName.otherName for inclusion in
   the X.509 Subject Alternative Name (SAN) and Issuer Alternative Name
   (IAN) extensions to carry an IEEE Media Access Control (MAC) address.
   The new name form makes it possible to bind a layer-2 interface
   identifier to a public key certificate.  Additionally, this document
   defines how constraints on this name form can be encoded and
   processed in the X.509 Name Constraints extension (NCE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-macaddress-on-07"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="X.501" target="https://www.itu.int/rec/T-REC-X.501/en">
          <front>
            <title>Information Technology - Open Systems Interconnection - The Directory: Models, ITU-T X.501</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="X.520" target="https://www.itu.int/rec/T-REC-X.520/en">
          <front>
            <title>Information Technology - Open Systems Interconnection - The Directory: Selected attribute types</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>ASN.1 encoding rules. Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Wi-SUN" target="https://wi-sun.org">
          <front>
            <title>Wi-SUN Alliance</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1274">
          <front>
            <title>The COSINE and Internet X.500 Schema</title>
            <author fullname="P. Barker" initials="P." surname="Barker"/>
            <author fullname="S. Kille" initials="S." surname="Kille"/>
            <date month="November" year="1991"/>
            <abstract>
              <t>This document suggests an X.500 Directory Schema, or Naming Architecture, for use in the COSINE and Internet X.500 pilots. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1274"/>
          <seriesInfo name="DOI" value="10.17487/RFC1274"/>
        </reference>
        <reference anchor="RFC2247">
          <front>
            <title>Using Domains in LDAP/X.500 Distinguished Names</title>
            <author fullname="S. Kille" initials="S." surname="Kille"/>
            <author fullname="M. Wahl" initials="M." surname="Wahl"/>
            <author fullname="A. Grimstad" initials="A." surname="Grimstad"/>
            <author fullname="R. Huber" initials="R." surname="Huber"/>
            <author fullname="S. Sataluri" initials="S." surname="Sataluri"/>
            <date month="January" year="1998"/>
            <abstract>
              <t>This document defines an algorithm by which a name registered with the Internet Domain Name Service [2] can be represented as an LDAP distinguished name. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2247"/>
          <seriesInfo name="DOI" value="10.17487/RFC2247"/>
        </reference>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <author fullname="R. Ankney" initials="R." surname="Ankney"/>
            <author fullname="A. Malpani" initials="A." surname="Malpani"/>
            <author fullname="S. Galperin" initials="S." surname="Galperin"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7468">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-uta-tls13-iot-profile">
          <front>
            <title>TLS/DTLS 1.3 Profiles for the Internet of Things</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Daniel Migault" initials="D." surname="Migault">
              <organization>Ericsson</organization>
            </author>
            <date day="20" month="February" year="2026"/>
            <abstract>
              <t>   RFC 7925 offers guidance to developers on using TLS/DTLS 1.2 for
   Internet of Things (IoT) devices with resource constraints.  This
   document is a companion to RFC 7925, defining TLS/DTLS 1.3 profiles
   for IoT devices.  Additionally, it updates RFC 7925 with respect to
   the X.509 certificate profile and ciphersuite requirements.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/thomas-fossati/draft-tls13-iot.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-uta-tls13-iot-profile-19"/>
        </reference>
        <reference anchor="I-D.ietf-tls-ctls">
          <front>
            <title>Compact TLS 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="17" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies a "compact" version of TLS 1.3 and DTLS 1.3.
   It saves bandwidth by trimming obsolete material, tighter encoding, a
   template-based specialization technique, and alternative
   cryptographic techniques. cTLS is not directly interoperable with TLS
   1.3 or DTLS 1.3 since the over-the-wire framing is different.  A
   single server can, however, offer cTLS alongside TLS or DTLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-ctls-10"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-rfc7030-csrattrs">
          <front>
            <title>Clarification and enhancement of RFC7030 CSR Attributes definition</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens</organization>
            </author>
            <author fullname="Dan Harkins" initials="D." surname="Harkins">
              <organization>The Industrial Lounge</organization>
            </author>
            <date day="28" month="June" year="2025"/>
            <abstract>
              <t>   This document updates RFC7030, Enrollment over Secure Transport
   (EST), clarifying how the Certificate Signiing Request (CSR)
   Attributes Response can be used by an EST server to specify both CSR
   attribute Object IDs (OID) and also CSR attribute values, in
   particular X.509 extension values, that the server expects the client
   to include in subsequent CSR request.  RFC9148 is derived from
   RFC7030, and it is also updated.

   RFC7030 (EST) is ambiguous in its specification of the CSR Attributes
   Response.  This has resulted in implementation challenges and
   implementor confusion.  As a result, there was not universal
   understanding of what was specified.  This document clarifies the
   encoding rules.

   This document therefore also provides a new straightforward approach:
   using a template for CSR contents that may be partially filled in by
   the server.  This also allows an EST server to specify a subject
   Distinguished Name (DN).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc7030-csrattrs-23"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 2.1.4"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 3.8.0"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/solutions-and-impact/technologies/esim/wp-content/uploads/2025/01/SGP.14-v2.2.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.2</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="GSMA-SGP.22" target="https://www.gsma.com/solutions-and-impact/technologies/esim/wp-content/uploads/2023/12/SGP.22-v3.1.pdf">
          <front>
            <title>GSMA RSP Technial Specification Version 3.1 Final</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="https://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
        <reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
            <author initials="E." surname="Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
        </reference>
        <reference anchor="IANA-AFI" target="https://www.iana.org/assignments/address-family-numbers/address-family-numbers.xhtml">
          <front>
            <title>Address Family Numbers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-SAFI" target="https://www.iana.org/assignments/safi-namespace/safi-namespace.xhtml">
          <front>
            <title>Subsequent Address Family Identifiers (SAFI) Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-CBOR-TAGS" target="https://www.iana.org/assignments/cbor-tags/cbor-tags.xhtml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 2621?>

<section anchor="appA">
      <name>C509 Certificate Examples</name>
      <section anchor="rfc7925-prof">
        <name>Example: RFC 7925 profiled X.509 Certificate</name>
        <t>Example of <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example: C509 Certificate Encoding</name>
          <t>This section shows the C509 encoding of the X.509 certificate in the previous section. The point compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <t><xref target="fig-CBOR-diagnostic-7925"/> shows the diagnostic notation of the unwrapped CBOR sequence, ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-CBOR-diagnostic-7925">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  3,                   / version and certificate type /
  h'01f50d',           / serialNumber /
  0,                   / signatureAlgorithm /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  48(h'0123456789AB'), / subject, EUI-64 /
  1,                   / subjectPublicKeyAlgorithm /
  h'FEB1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,                   / single extension:
                         non-critical keyUsage
                         digitalSignature /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-7925"/> shows the plain hex format of the unwrapped CBOR sequence, the size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-7925">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
03
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 FE B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16
]]></artwork>
          </figure>
        </section>
        <section anchor="example-native">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>This section shows the natively signed C509 certificate corresponding to that of the previous section, which is identical except for c509CertificateType, encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <t><xref target="fig-CBOR-diagnostic-native"/> shows the diagnostic notation of the natively signed unwrapped CBOR sequence, ~C509Certificate.</t>
          <figure anchor="fig-CBOR-diagnostic-native">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  2,
  h'01f50d',
  0,
  "RFC test CA",
  1672531200,
  1767225600,
  48(h'0123456789AB'),
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  h'EB0D472731F689BC00F5880B12C68B3F9FD38B23FADFCA2095
    0F3F241B60A202579CAC28CD3B7494D5FA5D8BBAB4600357E5
    50AB9FA9A65D9BA2B3B82E668CC6'
]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-native"/> shows the plain hex format of the natively signed unwrapped CBOR sequence, the size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-native">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
        </section>
        <section anchor="app-DH-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate keyUsage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used to sign a certification request.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key belonging to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. These issuer key pair can be used to sign or verify the example certificates and the subject private key allows the example certificates to be used in test vectors for other protocols like EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstrass) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
        <section anchor="other-examples">
          <name>Examples: C509Certificate and C509CertData</name>
          <t>This section examplifies other CBOR objects defined in this specification, based on the natively signed C509 certificate in <xref target="example-native"/>.</t>
          <t><xref target="fig-C509Certificate"/> shows the encoding of the corresponding C509Certificate, i.e., the CBOR array wrapping of the CBOR sequence ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-C509Certificate">
            <name>C509Certificate: The CBOR array wrapping of ~C509Certificate</name>
            <artwork><![CDATA[
8B
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509Certificate is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 8B (which indicates that it is a CBOR array with 11 elements).</t>
          <t><xref target="fig-C509CertData"/> shows the encoding of the corresponding C509CertData, i.e., the CBOR byte string wrapping of the CBOR sequence ~C509Certificate, see <xref target="cose-header-params"/>.</t>
          <figure anchor="fig-C509CertData">
            <name>C509CertData: CBOR byte string wrapping of ~C509Certificate.</name>
            <artwork><![CDATA[
58 8C
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509CertData is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 58 8C (which indicates that it is a CBOR byte string of 140 bytes).</t>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example: IEEE 802.1AR profiled X.509 Certificate</name>
        <t>An example of an IEEE 802.1AR profiled X.509 certificate (Secure Device Identifier, DevID) is provided in Appendix C.2 of <xref target="RFC9148"/>. The certificate is shown below including details of the hardwareModuleName type of otherName in subjectAltName, see <xref target="ext-encoding"/>.</t>
        <artwork><![CDATA[
Certificate:
  Data:
    Version: 3 (0x2)
    Serial Number: 9112578475118446130 (0x7e7661d7b54e4632)
    Signature Algorithm: ecdsa-with-SHA256
    Issuer: C=US, ST=CA, O=Example Inc, OU=certification,
            CN=802.1AR CA
    Validity
      Not Before: Jan 31 11:29:16 2019 GMT
      Not After : Dec 31 23:59:59 9999 GMT
    Subject: C=US, ST=CA, L=LA, O=example Inc,
             OU=IoT/serialNumber=Wt1234
    Subject Public Key Info:
      Public Key Algorithm: id-ecPublicKey
        Public-Key: (256 bit)
        pub:
          04:c8:b4:21:f1:1c:25:e4:7e:3a:c5:71:23:bf:2d:
          9f:dc:49:4f:02:8b:c3:51:cc:80:c0:3f:15:0b:f5:
          0c:ff:95:8d:75:41:9d:81:a6:a2:45:df:fa:e7:90:
          be:95:cf:75:f6:02:f9:15:26:18:f8:16:a2:b2:3b:
          56:38:e5:9f:d9
          ASN1 OID: prime256v1
          NIST CURVE: P-256
    X509v3 extensions:
      X509v3 Basic Constraints:
        CA:FALSE
      X509v3 Subject Key Identifier:
        96:60:0D:87:16:BF:7F:D0:E7:52:D0:AC:76:07:77:AD:66:5D:02:A0
      X509v3 Authority Key Identifier:
        68:D1:65:51:F9:51:BF:C8:2A:43:1D:0D:9F:08:BC:2D:20:5B:11:60
      X509v3 Key Usage: critical
        Digital Signature, Key Encipherment
      X509v3 Subject Alternative Name:
        otherName:
          type-id: 1.3.6.1.5.5.7.8.4 (id-on-hardwareModuleName)
          value:
            hwType: 1.3.6.1.4.1.6715.10.1
            hwSerialNum: 01:02:03:04
  Signature Algorithm: ecdsa-with-SHA256
  Signature Value:
    30:46:02:21:00:c0:d8:19:96:d2:50:7d:69:3f:3c:48:ea:a5:
    ee:94:91:bd:a6:db:21:40:99:d9:81:17:c6:3b:36:13:74:cd:
    86:02:21:00:a7:74:98:9f:4c:32:1a:5c:f2:5d:83:2a:4d:33:
    6a:08:ad:67:df:20:f1:50:64:21:18:8a:0a:de:6d:34:92:36
]]></artwork>
        <t>The DER encoding of the certificate is 577 bytes:</t>
        <artwork><![CDATA[
30 82 02 3D 30 82 01 E2 A0 03 02 01 02 02 08 7E 76 61 D7 B5 4E 46 32
30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 5D 31 0B 30 09 06 03 55 04 06
13 02 55 53 31 0B 30 09 06 03 55 04 08 0C 02 43 41 31 14 30 12 06 03
55 04 0A 0C 0B 45 78 61 6D 70 6C 65 20 49 6E 63 31 16 30 14 06 03 55
04 0B 0C 0D 63 65 72 74 69 66 69 63 61 74 69 6F 6E 31 13 30 11 06 03
55 04 03 0C 0A 38 30 32 2E 31 41 52 20 43 41 30 20 17 0D 31 39 30 31
33 31 31 31 32 39 31 36 5A 18 0F 39 39 39 39 31 32 33 31 32 33 35 39
35 39 5A 30 5C 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0B 30 09 06
03 55 04 08 0C 02 43 41 31 0B 30 09 06 03 55 04 07 0C 02 4C 41 31 14
30 12 06 03 55 04 0A 0C 0B 65 78 61 6D 70 6C 65 20 49 6E 63 31 0C 30
0A 06 03 55 04 0B 0C 03 49 6F 54 31 0F 30 0D 06 03 55 04 05 13 06 57
74 31 32 33 34 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48
CE 3D 03 01 07 03 42 00 04 C8 B4 21 F1 1C 25 E4 7E 3A C5 71 23 BF 2D
9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C FF 95 8D 75 41 9D 81
A6 A2 45 DF FA E7 90 BE 95 CF 75 F6 02 F9 15 26 18 F8 16 A2 B2 3B 56
38 E5 9F D9 A3 81 8A 30 81 87 30 09 06 03 55 1D 13 04 02 30 00 30 1D
06 03 55 1D 0E 04 16 04 14 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07
77 AD 66 5D 02 A0 30 1F 06 03 55 1D 23 04 18 30 16 80 14 68 D1 65 51
F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20 5B 11 60 30 0E 06 03 55 1D 0F
01 01 FF 04 04 03 02 05 A0 30 2A 06 03 55 1D 11 04 23 30 21 A0 1F 06
08 2B 06 01 05 05 07 08 04 A0 13 30 11 06 09 2B 06 01 04 01 B4 3B 0A
01 04 04 01 02 03 04 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 30
46 02 21 00 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 02 21 00 A7 74 98 9F 4C 32 1A
5C F2 5D 83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34
92 36
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

 3,
 h'7E7661D7B54E4632',
 0,
 [
  -4, "US",
   6, "CA",
   8, "Example Inc",
   9, "certification",
   1, "802.1AR CA"
 ],
 1548934156,
 null,
 [
  -4, "US",
   6, "CA",
   5, "LA",
   8, "example Inc",
   9, "IoT",
  -3, "Wt1234"
 ],
 1,
 h'FDC8B421F11C25E47E3AC57123BF2D9FDC494F028BC351CC80C03F150BF50CFF
   95',
 [
   4, -2,
   1, h'96600D8716BF7FD0E752D0AC760777AD665D02A0',
   7, h'68D16551F951BFC82A431D0D9F08BC2D205B1160',
  -2, 5,
  3, [-1, [h'2B06010401B43B0A01', h'01020304']]
     / subjectAltName with hardwareModuleName /
 ],
 h'C0D81996D2507D693F3C48EAA5EE9491BDA6DB214099D98117C63B361374CD86
   A774989F4C321A5CF25D832A4D336A08AD67DF20F1506421188A0ADE6D349236'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 275 bytes:</t>
          <artwork><![CDATA[
03 48 7E 76 61 D7 B5 4E 46 32 00 8A 23 62 55 53 06 62 43 41 08 6B 45
78 61 6D 70 6C 65 20 49 6E 63 09 6D 63 65 72 74 69 66 69 63 61 74 69
6F 6E 01 6A 38 30 32 2E 31 41 52 20 43 41 1A 5C 52 DC 0C F6 8C 23 62
55 53 06 62 43 41 05 62 4C 41 08 6B 65 78 61 6D 70 6C 65 20 49 6E 63
09 63 49 6F 54 22 66 57 74 31 32 33 34 01 58 21 FD C8 B4 21 F1 1C 25
E4 7E 3A C5 71 23 BF 2D 9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5
0C FF 95 8A 04 21 01 54 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07 77
AD 66 5D 02 A0 07 54 68 D1 65 51 F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D
20 5B 11 60 21 05 03 82 20 82 49 2B 06 01 04 01 B4 3B 0A 01 44 01 02
03 04 58 40 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 A7 74 98 9F 4C 32 1A 5C F2 5D
83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34 92 36
]]></artwork>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example: CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'047FA1E31928EE403BA0B83A395673FC',
0,
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'FD963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E
  20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, [
     ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
       null, null],
     ["http://crl4.digicert.com/CloudflareIncECCCA-3.crl",
       null, null]
    ],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],
     2, []],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
 h'2B06010401D679020402',
 h'0481F300F1007600F65C942FD1773022145418083094568EE34D131933BFDF0C
   2F200BCC4EF164E3000001739C835F8E0000040300473045022100F8D1B4A93D
   2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668022029FF5A
   34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA007700
   5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA
   000001739C835FBE0000040300483046022100E891C197BFB0E3D30CB6CEE60D
   94C3C75FD1175336931108D89812D4D29D81D0022100A159D16C4647D1483757
   FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
],
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 835 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example: CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'A6A55C870E39B40E',
23,
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, "http://crl.starfieldtech.com/sfig2s1-242.crl",
 6, [ h'6086480186FD6E01071701',
     [1, "http://certificates.starfieldtech.com/repository/"],
     1,
     []
    ],
 9, [ 1, "http://ocsp.starfieldtech.com/", 2,
      "http://certificates.starfieldtech.com/repository/sfig2.crt"],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
 h'2B06010401D679020402',
 h'0481F400F2007700F65C942FD1773022145418083094568EE34D131933BFDF0C
   2F200BCC4EF164E300000174E5AC711300000403004830460221008CF54852CE
   5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F022100BCA2
   254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE64549950077
   005CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70E
   CA00000174E5AC723C0000040300483046022100A5E0906E63E91D4FDDEFFF03
   52B91E50896007564B448A3828F596DC6B28726D022100FC91EAED0216886605
   4EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
],
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1295 bytes.</t>
        </section>
      </section>
      <section anchor="example-certificate-with-extensions-ipaddrblocks-and-ipaddrblocksv2">
        <name>Example: Certificate with Extensions IPAddrBlocks and IPAddrBlocksV2</name>
        <t>An example X.509 certificate with extensions IPAddrBlocks and IPAddrBlocksV2.</t>
        <artwork><![CDATA[
Certificate:
  SHA256 Fingerprint:
    c4917e6e4be1fe23eea1862fb57061aecead12b30db8f536cfe0da4a899bec75
  Data:
    Version: v3 (2)
    Serial Number:
      12:34
    Issuer: CN=selfsign-brainpoolp384r1,SURNAME=my surname,
            T=my title, GIVENNAME=my givenName,Name=my name
    Validity:
      Not Before: Thu Jan 02 01:00:00 CET 2025
      Not After : Fri Jan 02 01:00:00 CET 2026
    Subject: CN=selfsign-brainpoolp384r1,SURNAME=my surname,
             T=my title ,GIVENNAME=my givenName,Name=my name
    Subject Public Key Info:
      Public Key Algorithm: EC/BRAINPOOLP384R1
      Pub:
        04:67:09:c9:92:91:9b:49:c4:8f:d9:31:d0:5c:49:7d:38:65:
        e6:08:4c:91:df:3a:4c:7e:78:1f:41:85:43:b0:23:d5:9e:8b:
        f2:5d:13:3f:b1:a0:94:e9:d4:2c:8f:a6:ed:3b:46:e9:88:3a:
        35:ab:d4:b0:a9:d3:0a:ae:fd:9b:7e:88:ed:38:00:56:5d:1e:
        7f:06:33:13:4d:65:19:29:2d:49:bd:55:ec:30:a1:67:19:7f:
        ec:0f:74:29:82:2b:95
    X509v3 extensions:
      X509v3 keyUsage:
        digitalSignature
      X509v3 sbgp-ipAddrBlock:
        IPv4:
          22.82.0.0/16
          23.83.112.0/20
          23.106.104.0 - 23.106.119.255
          23.109.0.0/16
          23.111.16.0 - 23.111.63.255
        IPv6:
          2001:5::/32
          2001:600:: - 2001:7f9:ffff:ffff:ffff:ffff:ffff:ffff
          2001:7fb:: - 2001:bff:ffff:ffff:ffff:ffff:ffff:ffff
          2001:1400::/22
      X509v3 sbgp-ipAddrBlockV2:
        IPv4 unicast:
          22.82.0.0/16
          23.83.112.0/20
          23.106.104.0 - 23.106.119.255
          23.109.0.0/16
          23.111.16.0 - 23.111.63.255
        IPv6 unicast:
          2001:5::/32
          2002:2::/72
          2002:3:: - 2002:8:0:ffff:ffff:ffff:ffff:ffff
  Signature Algorithm: SHA384WITHECDSA
  Signature Value:
    30:64:02:30:67:09:c9:92:91:9b:49:c4:8f:d9:31:d0:5c:49:
    7d:38:65:e6:08:4c:91:df:3a:4c:7e:78:1f:41:85:43:b0:23:
    d5:9e:8b:f2:5d:13:3f:b1:a0:94:e9:d4:2c:8f:a6:ed:02:30:
    3f:7d:d0:c9:cf:50:86:29:85:29:f0:22:b8:2b:f6:32:f4:9d:
    40:9a:2f:2e:70:0e:c2:b0:bd:24:a3:bb:09:41:85:da:7c:21:
    af:47:9f:10:81:9a:41:04:c1:a4:b3:76
]]></artwork>
        <t>The DER encoding of the certificate is 791 bytes:</t>
        <artwork><![CDATA[
30 82 03 13 30 82 02 9a a0 03 02 01 02 02 02 12 34 30 0a 06 08 2a 86
48 ce 3d 04 03 03 30 74 31 21 30 1f 06 03 55 04 03 0c 18 73 65 6c 66
73 69 67 6e 2d 62 72 61 69 6e 70 6f 6f 6c 70 33 38 34 72 31 31 13 30
11 06 03 55 04 04 0c 0a 6d 79 20 73 75 72 6e 61 6d 65 31 11 30 0f 06
03 55 04 0c 0c 08 6d 79 20 74 69 74 6c 65 31 15 30 13 06 03 55 04 2a
0c 0c 6d 79 20 67 69 76 65 6e 4e 61 6d 65 31 10 30 0e 06 03 55 04 29
0c 07 6d 79 20 6e 61 6d 65 30 1e 17 0d 32 35 30 31 30 32 30 30 30 30
30 30 5a 17 0d 32 36 30 31 30 32 30 30 30 30 30 30 5a 30 74 31 21 30
1f 06 03 55 04 03 0c 18 73 65 6c 66 73 69 67 6e 2d 62 72 61 69 6e 70
6f 6f 6c 70 33 38 34 72 31 31 13 30 11 06 03 55 04 04 0c 0a 6d 79 20
73 75 72 6e 61 6d 65 31 11 30 0f 06 03 55 04 0c 0c 08 6d 79 20 74 69
74 6c 65 31 15 30 13 06 03 55 04 2a 0c 0c 6d 79 20 67 69 76 65 6e 4e
61 6d 65 31 10 30 0e 06 03 55 04 29 0c 07 6d 79 20 6e 61 6d 65 30 7a
30 14 06 07 2a 86 48 ce 3d 02 01 06 09 2b 24 03 03 02 08 01 01 0b 03
62 00 04 67 09 c9 92 91 9b 49 c4 8f d9 31 d0 5c 49 7d 38 65 e6 08 4c
91 df 3a 4c 7e 78 1f 41 85 43 b0 23 d5 9e 8b f2 5d 13 3f b1 a0 94 e9
d4 2c 8f a6 ed 3b 46 e9 88 3a 35 ab d4 b0 a9 d3 0a ae fd 9b 7e 88 ed
38 00 56 5d 1e 7f 06 33 13 4d 65 19 29 2d 49 bd 55 ec 30 a1 67 19 7f
ec 0f 74 29 82 2b 95 a3 81 fa 30 81 f7 30 0b 06 03 55 1d 0f 04 04 03
02 07 80 30 75 06 08 2b 06 01 05 05 07 01 07 04 69 30 67 30 32 04 02
00 01 30 2c 03 03 00 16 52 03 04 04 17 53 70 30 0c 03 04 00 17 6a 68
03 04 00 17 6a 77 03 03 00 17 6d 30 0c 03 04 00 17 6f 10 03 04 00 17
6f 3f 30 31 04 02 00 02 30 2b 03 05 00 20 01 00 05 30 0d 03 04 00 20
01 06 03 05 00 20 01 07 f9 30 0d 03 05 00 20 01 07 fb 03 04 00 20 01
0b 03 04 02 20 01 14 30 71 06 08 2b 06 01 05 05 07 01 1c 04 65 30 63
30 33 04 03 00 01 01 30 2c 03 03 00 16 52 03 04 04 17 53 70 30 0c 03
04 00 17 6a 68 03 04 00 17 6a 77 03 03 00 17 6d 30 0c 03 04 00 17 6f
10 03 04 00 17 6f 3f 30 2c 04 03 00 02 01 30 25 03 05 00 20 01 00 05
03 0a 00 20 02 00 02 00 00 00 00 00 30 10 03 05 00 20 02 00 03 03 07
00 20 02 00 08 00 00 30 0a 06 08 2a 86 48 ce 3d 04 03 03 03 67 00 30
64 02 30 67 09 c9 92 91 9b 49 c4 8f d9 31 d0 5c 49 7d 38 65 e6 08 4c
91 df 3a 4c 7e 78 1f 41 85 43 b0 23 d5 9e 8b f2 5d 13 3f b1 a0 94 e9
d4 2c 8f a6 ed 02 30 3f 7d d0 c9 cf 50 86 29 85 29 f0 22 b8 2b f6 32
f4 9d 40 9a 2f 2e 70 0e c2 b0 bd 24 a3 bb 09 41 85 da 7c 21 af 47 9f
10 81 9a 41 04 c1 a4 b3 76
]]></artwork>
        <section anchor="example-c509-certificate-encoding-4">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'1234',
1,
null,
1735776000,
1767312000,
[
  1, "selfsign-brainpoolp384r1", 2, "my surname", 10, "my title",
  13, "my givenName", 25, "my name"
],
25,
h'046709C992919B49C48FD931D05C497D3865E6084C91DF3A4C7E781F418543B0
  23D59E8BF25D133FB1A094E9D42C8FA6ED3B46E9883A35ABD4B0A9D30AAEFD9B
  7E88ED3800565D1E7F0633134D6519292D49BD55EC30A167197FEC0F7429822B
  95',
[
 2, 1,
 32, [ 1, null,
       [
         71250, 85343518, [-67102984, 15], -18240266,
         [18241443, 47]
       ],
       2, null,
       [
         4831903749, [-4813029119, 4813031155], [2, -4813031152],
         33554441]
       ],
 34, [ 1, 1,
       [
         71250, 85343518, [-67102984, 15], -18240266, [18241443, 47]
       ],
       2, 1,
       [
         h'0020010005', h'00200200020000000000',
         [h'0020020003', h'00200200080000']
       ]
     ]
],
h'6709C992919B49C48FD931D05C497D3865E6084C91DF3A4C7E781F418543B023
  D59E8BF25D133FB1A094E9D42C8FA6ED3F7DD0C9CF5086298529F022B82BF632
  F49D409A2F2E700EC2B0BD24A3BB094185DA7C21AF479F10819A4104C1A4B376'
]]></artwork>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Mohamed Boucadair, Corey Bonnell, Carsten Bormann, Viktor Dukhovni, Russ Housley, Paul Hoffmann, Christopher Inacio, Olle Johansson, Benjamin Kaduk, Ted Lemon, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Rene Struik, Fraser Tweedale, Gunter Van de Velde, Éric Vyncke, and Paul Wouters for reviewing and commenting on intermediate versions of the draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
