<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-cbor-encoded-cert-19" category="std" consensus="true" submissionType="IETF" updates="6698" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <?v3xml2rfc silence="Found SVG with width or height specified"?>
  <front>
    <title abbrev="C509 Certificates">CBOR Encoded X.509 Certificates (C509 Certificates)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-19"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="S." surname="Raza" fullname="Shahid Raza">
      <organization>University of Glasgow</organization>
      <address>
        <email>shahid.raza@glasgow.ac.uk</email>
      </address>
    </author>
    <author initials="J." surname="Höglund" fullname="Joel Höglund">
      <organization>RISE AB</organization>
      <address>
        <email>joel.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="M." surname="Furuhed" fullname="Martin Furuhed">
      <organization>IN Groupe</organization>
      <address>
        <email>martin.furuhed@ingroupe.com</email>
      </address>
    </author>
    <author initials="L." surname="Liao" fullname="Lijun Liao">
      <organization>NIO</organization>
      <address>
        <email>lijun.liao@nio.io</email>
      </address>
    </author>
    <date year="2026" month="May" day="11"/>
    <abstract>
      <?line 225?>

<t>This document specifies a CBOR encoding of X.509 certificates. The resulting certificates are called C509 certificates. The CBOR encoding supports a large subset of RFC 5280 and common certificate profiles, and it is extensible.</t>
      <t>Two types of C509 certificates are defined. One type is an invertible CBOR re-encoding of DER-encoded X.509 certificates with the signature field copied from the DER encoding. The other type is identical except that the signature is computed over the CBOR encoding instead of the DER encoding, thereby avoiding the use of ASN.1. Both types of certificates have the same semantics as X.509 while providing comparable size reduction.</t>
      <t>This document also specifies CBOR-encoded data structures for certification requests and certification request templates, new COSE headers, as well as a TLS certificate type and a file format for C509. This document updates RFC 6698 by extending the TLSA selectors registry to include C509 certificates.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cbor-encoded-cert/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cose-wg/CBOR-certificates"/>.</t>
    </note>
  </front>
  <middle>
    <?line 233?>

<section anchor="intro">
      <name>Introduction</name>
      <t>One of the challenges with deploying a Public Key Infrastructure (PKI) for the Internet of Things (IoT) is the size and parsing of X.509 public key certificates <xref target="RFC5280"/>, since those are not optimized for constrained environments <xref target="RFC7228"/>. Large certificate chains are also problematic in non-constrained protocols such as EAP-TLS <xref target="RFC9190"/> <xref target="RFC9191"/> where authenticators typically drop an EAP session after only 40–50 round-trips, QUIC <xref target="RFC9000"/> where the latency increases significantly unless the server sends less than three times as many bytes as received prior to validating the client address, and Resource Public Key Infrastructure (RPKI) <xref target="RFC6487"/> where a single certificate can be very large. More compact certificate representations are, therefore, desirable in many use cases.</t>
      <t>X.509 certificates are defined using Abstract Syntax Notation One (ASN.1) and encoded using the Distinguished Encoding Rules (DER) <xref target="X.690"/>. This document specifies an alternative encoding of X.509 certificates using the Concise Binary Object Representation (CBOR) <xref target="RFC8949"/>, initially proposed in <xref target="X.509-IoT"/>. The use of a more compact encoding reduces certificate size, which has known performance benefits in terms of decreased communication overhead, power consumption, latency, and storage requirements. The re-encoding of X.509 is called C509, and the resulting certificates are termed C509 certificates. C509 is not a general CBOR encoding for ASN.1 data structures.</t>
      <t>CBOR is a data format designed for small code size and small message size in systems with very limited memory, processor power, and instruction sets. CBOR builds on the JSON data model but extends it by, for example, encoding binary data directly without base64 conversion. In addition to the binary CBOR encoding, CBOR also has a diagnostic notation that is human-readable and editable, which simplifies development and debugging. The Concise Data Definition Language (CDDL) <xref target="RFC8610"/> provides a way to express structures for protocol messages and APIs that use CBOR. <xref target="RFC8610"/> also extends the diagnostic notation. For a complete specification and examples, see <xref target="RFC8949"/>, <xref target="RFC8610"/>, and <xref target="RFC8742"/>. A tool for becoming familiar with CBOR, available at the time of publication, is the CBOR playground <xref target="CborMe"/>.</t>
      <t>The C509 encoding supports a large subset of <xref target="RFC5280"/> and all certificates profiled for <xref target="RFC7925"/>, IEEE 802.1AR (DevID) <xref target="IEEE-802.1AR"/>, CAB Baseline <xref target="CAB-TLS"/>, <xref target="CAB-Code"/>, RPKI <xref target="RFC6487"/>, Wi-SUN <xref target="Wi-SUN"/>, and eUICC <xref target="GSMA-eUICC"/>. C509 is designed for small code size and compact encoding of certificates in constrained environments including certificates profiled specifically for IoT deployments, but can be applied to certificate-based authentication in general, for example, using TLS <xref target="RFC8446"/>, QUIC <xref target="RFC9000"/>, DTLS <xref target="RFC9147"/>, COSE <xref target="RFC9052"/> and EDHOC <xref target="RFC9528"/>. This document does not specify a certificate profile.</t>
      <t>At the time of publication, there are several C509 implementations targeting, for example, in-vehicle and vehicle-to-cloud communication, Uncrewed Aircraft Systems (UAS), and Global Navigation Satellite System (GNSS) deployments. When used to re-encode DER-encoded X.509 certificates, the CBOR encoding can reduce the size of <xref target="RFC7925"/>-profiled certificates by more than 50%; see <xref target="appA"/>.</t>
      <t>C509 is designed to be extensible to additional X.509 features, for example, support for new algorithms, including new Post-Quantum (PQ) algorithms, which can be registered in the IANA registry as they are specified; see <xref target="sigalg"/>.</t>
      <t>This document defines two types of C509 using the same CBOR encoding and differing only in what is being signed:</t>
      <ol spacing="normal" type="1"><li>
          <t>An invertible CBOR re-encoding of DER-encoded X.509 certificates <xref target="RFC5280"/>, which can be reversed to obtain the original DER-encoded X.509 certificate, which can be verified using legacy certificate software. Due to the widespread deployment of X.509, it is necessary to allow backward compatibility.</t>
        </li>
        <li>
          <t>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of the DER encoding. This removes the need for ASN.1 and DER parsing and the associated complexity, but such certificates are not backward compatible with implementations requiring DER-encoded X.509. Natively signed C509 certificates can be used in devices that are only required to authenticate to servers compatible with natively signed C509 certificates. This is not a major restriction in many IoT deployments in which the parties that issue and verify certificates are part of a restricted ecosystem.</t>
        </li>
      </ol>
      <t>This document also specifies C509 Certification Requests; see <xref target="CSR"/>. It further specifies COSE headers for use with C509 certificates in COSE; see <xref target="cose"/>; a TLS certificate type for use with C509 certificates in TLS and QUIC, with or without additional TLS certificate compression; see <xref target="tls"/>; and a C509 file format. By extending the TLSA selectors registry to include C509 certificates, this document updates <xref target="RFC6698"/>.</t>
    </section>
    <section anchor="notation">
      <name>Notational Conventions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This specification makes use of the terminology in <xref target="RFC2986"/>, <xref target="RFC5280"/>, <xref target="RFC7228"/>, <xref target="RFC8610"/>, and <xref target="RFC8949"/>. When referring to CBOR, this specification always refers to Deterministically Encoded CBOR as specified in Sections <xref target="RFC8949" section="4.2.1" sectionFormat="bare"/> and <xref target="RFC8949" section="4.2.2" sectionFormat="bare"/> of <xref target="RFC8949"/>.</t>
    </section>
    <section anchor="certificate">
      <name>C509 Certificate</name>
      <t>This section specifies the content and encoding of C509 certificates, with the objective of producing a compact representation that supports a large part of <xref target="RFC5280"/> and all of <xref target="RFC7925"/>, <xref target="IEEE-802.1AR"/>, RPKI <xref target="RFC6487"/>, GSMA eUICC <xref target="GSMA-eUICC"/>, and CAB Baseline <xref target="CAB-TLS"/> <xref target="CAB-Code"/>.</t>
      <t>In the CBOR encoding, static fields are elided, elliptic curve points and time values are compressed, OIDs are replaced with short integers or complemented with CBOR OID encoding <xref target="RFC9090"/>, and redundant encoding is removed. Combining these techniques significantly reduces certificate size, which is not achievable with general-purpose compression algorithms; see <xref target="fig-size-TLS"/>.</t>
      <t>A C509 certificate can be either a CBOR re-encoding of a DER-encoded X.509 certificate, in which case the signature is calculated on the DER-encoded ASN.1 data in the X.509 certificate, or a natively signed C509 certificate, in which case the signature is calculated directly on the CBOR-encoded data. In both cases, the certificate content adheres to the restrictions given in <xref target="RFC5280"/>. The re-encoding is known to work with DER-encoded certificates, but it might also work with other canonical encodings. The re-encoding does not work for BER-encoded certificates.</t>
      <t>In the encoding described below, the elements in arrays are always encoded in the same order as elements of the corresponding SEQUENCE or SET in the DER encoding.</t>
      <section anchor="message-fields">
        <name>Message Fields</name>
        <t>This section describes the X.509 fields and their CBOR encodings and uses them in the definition of C509 certificates; see <xref target="fig-CBORCertCDDL"/>. While many of <xref target="RFC5280"/> encodings are supported, there are a few instances marked "not supported" for which no alternative is provided and, therefore, no C509 encoding can be generated.</t>
        <t>The following Concise Data Definition Language (CDDL) defines the CBOR array C509Certificate and the CBOR Sequence <xref target="RFC8742"/> TBSCertificate. The member names therefore have documentary value only. Applications that do not require a CBOR item <bcp14>MAY</bcp14> represent C509 certificates using the CBOR sequence ~C509Certificate (unwrapped C509Certificate). Examples are given in the appendices; see, for example, <xref target="rfc7925-prof"/>.</t>
        <figure anchor="fig-CBORCertCDDL">
          <name>CDDL for C509Certificate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509Certificate = [
   TBSCertificate,
   issuerSignatureValue : any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificate = (
   c509CertificateType: int,
   certificateSerialNumber: CertificateSerialNumber,
   issuerSignatureAlgorithm: AlgorithmIdentifier,
   issuer: Name / null,
   validityNotBefore: ~time,
   validityNotAfter: ~time / null,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   extensions: Extensions,
)

CertificateSerialNumber = ~biguint

Name = [ * RDNAttribute ] / SpecialText

RDNAttribute = (
    ( attributeType: int, attributeValue: SpecialText ) //
    ( attributeType: ~oid, attributeValue: bytes )
)

AlgorithmIdentifier = int / ~oid /
                    [ algorithm: ~oid, parameters: bytes ]

Extensions = [ * Extension ] / int

Extension = (
    ( extensionID: int, extensionValue: Defined ) //
    ( extensionID: ~oid, extensionValue: bytes / [ bytes ] )
)

SpecialText = text / bytes / tag

Defined = any .ne undefined

tag = #6
]]></sourcecode>
        </figure>
        <t>C509 certificates are defined in terms of DER-encoded X.509 certificates <xref target="RFC5280"/> as detailed in the following subsections.</t>
        <section anchor="version">
          <name>version</name>
          <t>The 'version' field is encoded in the 'c509CertificateType' CBOR int. The field 'c509CertificateType' also indicates the type of the C509 certificate. Two types are defined in this document: natively signed C509 certificates, following X.509 v3 (c509CertificateType = 2); and CBOR re-encoded X.509 v3 DER certificate (c509CertificateType = 3), see <xref target="type"/>. The number of elements in TBSCertificate is fixed and determined by the type. Additional types may be added in the future.</t>
        </section>
        <section anchor="certificateserialnumber">
          <name>certificateSerialNumber</name>
          <t>The 'certificateSerialNumber' INTEGER value field is encoded as the unwrapped CBOR unsigned bignum (~biguint) 'CertificateSerialNumber'. Any leading 0x00 byte (to indicate that the number is not negative) is therefore omitted.</t>
        </section>
        <section anchor="signature">
          <name>signature</name>
          <t>The 'signature' field, containing the signature algorithm including parameters, is encoded as a CBOR int (see <xref target="sigalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
        </section>
        <section anchor="issuer">
          <name>issuer</name>
          <t>In the general case, the sequence of 'RDNAttribute' is encoded as a CBOR array consisting of RDNAttribute elements. RelativeDistinguishedName with more than one AttributeTypeAndValue is not supported. Each RDNAttribute is CBOR-encoded as (type, value), either as an (int, SpecialText) pair or as a (~oid, bytes) tuple.</t>
          <t>In the former case, the absolute value of the int encodes the attribute type (see <xref target="fig-rdnattrtype"/>) and the sign is used to represent the character string type in the X.509 certificate; positive for utf8String, negative for printableString. Attribute values which are always of type IA5String are unambiguously represented using a non-negative int. Examples include emailAddress and domainComponent (see <xref target="RFC5280"/>). In CBOR, all text strings are UTF-8 encoded and in natively signed C509 certificates all CBOR ints <bcp14>SHALL</bcp14> be non-negative. Text strings <bcp14>SHALL</bcp14> still adhere to any <xref target="RFC5280"/> restrictions. The value of the attributes serialNumber and countryName <bcp14>SHALL</bcp14> contain only characters from the 74-character ASCII subset permitted by PrintableString. Additionally, the value of the countryName attribute <bcp14>SHALL</bcp14> have length 2. CBOR encoding is allowed for IA5String (if this is the only allowed type, e.g., emailAddress), printableString and utf8String, whereas the string types teletexString, universalString, and bmpString are not supported.</t>
          <t>The text strings are further optimized as follows:</t>
          <ul spacing="normal">
            <li>
              <t>If the text string has an even length of at least 2 and contains only the symbols '0'-'9' or 'a'-'f', it is encoded as a CBOR byte string.</t>
            </li>
            <li>
              <t>If the text string contains an EUI-64 of the form "HH-HH-HH-HH-HH-HH-HH-HH" where each 'H' is one of the symbols '0'-'9' or 'A'-'F', it is encoded as a CBOR tagged MAC address using the CBOR tag 48, see <xref section="2.4" sectionFormat="of" target="RFC9542"/>. If of the form "HH-HH-HH-FF-FE-HH-HH-HH", it is encoded as a 48-bit MAC address, otherwise as a 64-bit MAC address. See example in <xref target="rfc7925-prof"/>.</t>
            </li>
            <li>
              <t>Otherwise, it is encoded as a CBOR text string.</t>
            </li>
          </ul>
          <t>The final encoding of the attribute value may therefore be text, bytes, or tag, i.e., SpecialText. If Name contains a single 'common name' attribute with attributeType = +1, it is for compactness encoded as just the SpecialText containing the single attribute value.</t>
          <t>In natively signed C509 certificates, bytes and tag 48 do not correspond to any predefined text string encoding and may also be used for other attribute types.</t>
          <t>If the 'issuer' field is identical to the 'subject' field, e.g., in case of self-signed certificates, then the 'issuer' field <bcp14>MUST</bcp14> be encoded as the CBOR simple value null (0xf6).</t>
        </section>
        <section anchor="validity">
          <name>validity</name>
          <t>The 'notBefore' and 'notAfter' fields are encoded as unwrapped CBOR epoch-based date/time (~time) where the tag content is an unsigned integer. In POSIX time <xref target="POSIX"/>, leap seconds are ignored, with a leap second having the same POSIX time as the second before it. Compression of X.509 certificates with the time 23:59:60 UTC is therefore not supported. Note that RFC 5280 mandates encoding of dates through the year 2049 as UTCTime, and later dates as GeneralizedTime. The value "99991231235959Z" (no expiration date) is encoded as the CBOR simple value null.</t>
        </section>
        <section anchor="subject">
          <name>subject</name>
          <t>The 'subject' field is encoded exactly like issuer, except that the CBOR simple value null is not a valid value.</t>
        </section>
        <section anchor="subjectpublickeyinfo">
          <name>subjectPublicKeyInfo</name>
          <t>The 'AlgorithmIdentifier' field including parameters is encoded as the CBOR int 'subjectPublicKeyAlgorithm' (see <xref target="pkalg"/>) or as an array with an unwrapped CBOR OID tag <xref target="RFC9090"/> optionally followed by the parameters encoded as a CBOR byte string.</t>
          <t>In general, the 'subjectPublicKey' BIT STRING value field is encoded as a CBOR byte string, but may be encoded as a CBOR item of any type except undefined (see <xref target="CRT"/>). This specification assumes the BIT STRING has zero unused bits, and the unused bits byte is omitted. For rsaEncryption and id-ecPublicKey, the encoding of subjectPublicKey is further optimized as described in <xref target="alg-encoding"/>.</t>
        </section>
        <section anchor="issueruniqueid">
          <name>issuerUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="subjectuniqueid">
          <name>subjectUniqueID</name>
          <t>Not supported.</t>
        </section>
        <section anchor="ext-field">
          <name>extensions</name>
          <t>The 'extensions' field is encoded either as a CBOR array or as a CBOR int. An omitted 'extensions' field is encoded as an empty CBOR array.</t>
          <t>Each 'extensionID' in the CBOR array is encoded either as a CBOR int (see <xref target="extype"/>) or as an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          <ul spacing="normal">
            <li>
              <t>If 'extensionID' is encoded as a CBOR int, it is followed by a CBOR item of any type except undefined (see <xref target="CRT"/>), and the sign of the int is used to encode if the extension is critical: Critical extensions are encoded with a negative sign and non-critical extensions are encoded with a positive sign. If the CBOR array contains exactly two ints and the absolute value of the first int is 2 (corresponding to keyUsage, see <xref target="ext-encoding"/>), the CBOR array is omitted and the 'extensions' field is encoded as a single CBOR int with the absolute value of the second int and the sign of the first int.</t>
            </li>
            <li>
              <t>If extensionID is encoded as an unwrapped CBOR OID tag, it is followed by the DER-encoded extnValue encoded in the following way:  </t>
              <ul spacing="normal">
                <li>
                  <t>if the extension is non-critical, the extnValue OCTET STRING value field is encoded as a CBOR byte string;</t>
                </li>
                <li>
                  <t>if the extension is critical, the extnValue OCTET STRING value field is encoded as a CBOR byte string and further wrapped in a CBOR array consisting of only this element.</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>The processing of critical and non-critical extensions is specified in <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
          <t>The currently defined extension values for which there is CBOR int encoded 'extensionID' are specified in <xref target="ext-encoding"/>. The extensions mandated to be supported by <xref target="RFC7925"/> and <xref target="IEEE-802.1AR"/> are given special treatment.</t>
          <t>More details about extensions in <xref target="ext-encoding"/>.</t>
        </section>
        <section anchor="signaturealgorithm">
          <name>signatureAlgorithm</name>
          <t>The 'signatureAlgorithm' field is always the same as the 'signature' field and therefore omitted from the CBOR encoding.</t>
        </section>
        <section anchor="signaturevalue">
          <name>signatureValue</name>
          <t>In general, the 'signatureValue' BIT STRING value field is encoded as the CBOR byte string issuerSignatureValue. This specification assumes that the BIT STRING has zero unused bits, and the unused bits byte is omitted. For natively signed C509 certificates, the signatureValue is calculated over the CBOR sequence TBSCertificate. For ECDSA, the encoding of issuerSignatureValue is further optimized as described in <xref target="alg-encoding"/>.</t>
        </section>
      </section>
      <section anchor="alg-encoding">
        <name>Encoding of subjectPublicKey and issuerSignatureValue</name>
        <section anchor="subpubkey-alg-encoding">
          <name>Encoding of subjectPublicKey</name>
          <t>For RSA public keys (rsaEncryption), the SEQUENCE and INTEGER type and length fields are omitted, and the two INTEGER value fields (modulus, exponent) are encoded as an array of two unwrapped CBOR unsigned bignum (~biguint), i.e., [ modulus : ~biguint, exponent : ~biguint ]. If the exponent is 65537, the array and the exponent are omitted and subjectPublicKey consists of only the modulus encoded as an unwrapped CBOR unsigned bignum (~biguint).</t>
          <t>For elliptic curve public keys in Weierstrass form (id-ecPublicKey), keys may be point-compressed as defined in Section 2.3.3 of <xref target="SECG"/>. Native C509 certificates with Weierstrass form keys use the octets 0x02, 0x03, and 0x04 as defined in <xref target="SECG"/>. If a DER-encoded certificate with an uncompressed public key of type id-ecPublicKey is CBOR-encoded with point compression, then the octet 0xfe is used instead of 0x02 to represent an even y-coordinate, and the octet 0xfd is used instead of 0x03 to represent an odd y-coordinate.</t>
        </section>
        <section anchor="encoding-of-issuersignaturevalue">
          <name>Encoding of issuerSignatureValue</name>
          <t>ECDSA signatures are encoded in the same way as in <xref section="2.1" sectionFormat="of" target="RFC9053"/>. For example, for P-256, the number of bytes for each integer is 32. The resulting byte string is encoded as a CBOR byte string.</t>
        </section>
      </section>
      <section anchor="ext-encoding">
        <name>Encoding of Extensions</name>
        <t>The 'extensions' field is encoded as specified in <xref target="ext-field"/> with further details provided in this section.</t>
        <t>For some extensions, the CBOR int encoded extensionID is only supported for commonly used values of the extension. In case of extension values for which the CBOR int encoded extensionID is not supported, the extension <bcp14>MUST</bcp14> be encoded using the unwrapped CBOR OID tag encoded extensionID.</t>
        <t>A note on extensionID naming: in existing OID databases, the same OID can be found in versions with and without an 'id-pe' or 'id-ce' prefix. We have excluded the prefix for the commonly used extensions defined in <xref target="RFC5280"/> and included them for extensions defined elsewhere.</t>
        <t>CBOR encoding of the following extension values is fully supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Key Identifier (subjectKeyIdentifier). In natively signed certificates, KeyIdentifier can, for example, be composed of the leftmost 160 bits of the SHA-256 hash of the CBOR encoded subjectPublicKey. Other methods of generating unique numbers can be used. The extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifier = bytes
   SubjectKeyIdentifier = KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Key Usage (keyUsage). The 'KeyUsage' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR int. See <xref target="ext-field"/> for special encoding in case keyUsage is the only extension present.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyUsage = uint
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Mappings (policyMappings). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyMappings = [
     + (issuerDomainPolicy: int/~oid, subjectDomainPolicy: int/~oid)
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Basic Constraints (basicConstraints). If 'cA' = false then extensionValue = -2, if 'cA' = true and 'pathLenConstraint' is not present then extensionValue = -1, and if 'cA' = true and 'pathLenConstraint' is present then extensionValue = pathLenConstraint.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   BasicConstraints = int
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Policy Constraints (policyConstraints). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyConstraints = [
     requireExplicitPolicy: uint / null,
     inhibitPolicyMapping: uint / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Extended Key Usage (extKeyUsage). extensionValue is encoded as an array of CBOR ints (see <xref target="EKU"/>), or unwrapped CBOR OID tags <xref target="RFC9090"/>, where each int or OID encodes a key usage purpose. If the array contains a single KeyPurposeId, the array is omitted.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyPurposeId = int / ~oid
   ExtKeyUsageSyntax = [ 2* KeyPurposeId ] / KeyPurposeId
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Inhibit anyPolicy (inhibitAnyPolicy). extensionValue is encoded as follows:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   InhibitAnyPolicy = uint
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IPAddrBlocks (id-pe-ipAddrBlocks). The X.509 extension IPAddrBlocks is specified in <xref target="RFC3779"/>. The ASN.1 BIT STRING value of IPAddress is converted to a byte sequence defined as:  </t>
            <t><tt>
unusedBits || value
</tt>  </t>
            <t>
where unusedBits is a single octet indicating the number of unused bits in the final octet of the BIT STRING, and value is the sequence of octets containing the BIT STRING value. This byte sequence preserves the exact information contained in the ASN.1 BIT STRING.  </t>
            <t>
For each IPAddressFamily, the representation is selected as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>If inherit is present, <tt>null</tt> <bcp14>SHALL</bcp14> be used.</t>
              </li>
              <li>
                <t>Otherwise, if the byte sequence of any IPAddress (including addressPrefix, and the min and max fields of addressRange) exceeds 8 octets in length, the IPAddressChoice representation <bcp14>SHALL</bcp14> be used.</t>
              </li>
              <li>
                <t>Otherwise, the IntIPAddressChoice representation <bcp14>SHALL</bcp14> be used.</t>
              </li>
            </ul>
            <t>
For IntIPAddressChoice, IntAddressPrefix and the min and max values of IntAddressRange <bcp14>SHALL</bcp14> be encoded as big-endian integers representing the following byte sequence:  </t>
            <t><tt>
(unusedBits + 1) || value
</tt>  </t>
            <t>
The first byte is encoded as (unusedBits + 1) instead of unusedBits in order to guarantee a non-zero value. With the exception of the first IPAddress, each subsequent IPAddress <bcp14>SHALL</bcp14> be encoded as a CBOR integer representing the difference from the previous IPAddress.  </t>
            <t>
As specified in <xref target="RFC3779"/>, the IPAddressFamily element contains an Address Family Identifier (AFI) and, optionally, a Subsequent Address Family Identifier (SAFI). AFIs and SAFIs are defined in <xref target="IANA-AFI"/> and <xref target="IANA-SAFI"/>, respectively. The limitations specified in <xref target="RFC3779"/> apply here as well.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   IntAddressPrefix = int
   IntAddressRange  = [ min: int, max: int ]
   IntIPAddressOrRange = IntAddressPrefix / IntAddressRange
   IntIPAddressChoice  = [ + IntIPAddressOrRange ]

   AddressPrefix = bytes
   AddressRange  = [ min: bytes, max: bytes ]
   IPAddressOrRange = AddressPrefix / AddressRange
   IPAddressChoice  = [ + IPAddressOrRange ]

   IPAddressFamily = (AFI: uint, SAFI: uint / null,
                      IntIPAddressChoice / IPAddressChoice / null)
   IPAddrBlocks = [ + IPAddressFamily ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>IPAddrBlocks v2 (id-pe-ipAddrBlocks-v2). The X.509 extension IPAddrBlocks v2 is specified in <xref target="RFC8360"/>. The extension value is encoded exactly like in the extension "IPAddrBlocks".</t>
          </li>
          <li>
            <t>OCSP No Check (id-pkix-ocsp-nocheck). The CBOR encoded extensionValue is the value null.</t>
          </li>
          <li>
            <t>TLS Features (id-pe-tlsfeature). The extensionValue is encoded as an array of integers, where each integer represents a TLS extension.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   TLSFeatures = [* feature: uint]
]]></sourcecode>
        <t>CBOR encoding of the following extension values are partly supported:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Alternative Name (subjectAltName). If the subject alternative name only contains general names registered in <xref target="GN"/> the extension value can be CBOR encoded. extensionValue is encoded as an array of (int, any) pairs where each pair encodes a general name (see <xref target="GN"/>). If subjectAltName contains exactly one dNSName, the array and the int are omitted and extensionValue is the dNSName encoded as a CBOR text string. In addition to the general names defined in <xref target="RFC5280"/>, the otherName values with type-id id-on-hardwareModuleName, id-on-SmtpUTF8Mailbox and id-on-MACAddress have been given their own ints; such otherName values are encoded as follows:
            </t>
            <ul spacing="normal">
              <li>
                <t>For id-on-hardwareModuleName, the value is a CBOR array [ hwType: ~oid, hwSerialNum: bytes ] as specified in <xref target="RFC4108"/>.</t>
              </li>
              <li>
                <t>For id-on-SmtpUTF8Mailbox, the value is a CBOR text as specified in <xref target="RFC9598"/>.</t>
              </li>
              <li>
                <t>For id-on-MACAddress, the value is a CBOR byte string containing 6 octets for EUI-48 and 8 octets for EUI-64 as specified in <xref target="I-D.ietf-lamps-macaddress-on"/>.</t>
              </li>
            </ul>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralName = ( GeneralNameType : int, GeneralNameValue : any )
   GeneralNames = [ + GeneralName ]
   SubjectAltName = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Issuer Alternative Name (issuerAltName). extensionValue is encoded exactly like subjectAltName.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   IssuerAltName  = GeneralNames / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>CRL Distribution Points (cRLDistributionPoints). If all DistributionPoint elements contain the distributionPoint with fullName choice of uniformResourceIdentifier, optional reasons, and optional cRLIssuer with one directoryName, the extension value can be CBOR-encoded. The 'reasons' BIT STRING is interpreted as an unsigned integer in network byte order and encoded as a CBOR uint. If the CRLDistributionPoints consists of only one DistributionPointName, which in turn has only the fullName field of type CBOR text, it is encoded as CBOR text; otherwise it is encoded as a CBOR array.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   DistributionPointName = [
     fullName:  [ 2 * text ] / text,
     reasons:   uint / null,
     cRLIssuer: Name / null,
   ]

   CRLDistributionPoints = [ + DistributionPointName ] / text
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Freshest CRL (freshestCRL). extensionValue is encoded exactly like cRLDistributionPoints.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   FreshestCRL = CRLDistributionPoints
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Information Access (authorityInfoAccess). If all the GeneralNames in authorityInfoAccess are of type uniformResourceIdentifier, the extension value can be CBOR-encoded. Each accessMethod is encoded as a CBOR int (see <xref target="IA"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>. The uniformResourceIdentifiers are encoded as CBOR text strings.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   AccessDescription = ( accessMethod: int / ~oid , uri: text )
   AuthorityInfoAccessSyntax = [ + AccessDescription ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Information Access (subjectInfoAccess). Encoded exactly like authorityInfoAccess.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   SubjectInfoAccessSyntax = AuthorityInfoAccessSyntax
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Authority Key Identifier (authorityKeyIdentifier). If the authority key identifier contains all of keyIdentifier, authorityCertIssuer, and authorityCertSerialNumber, or if only keyIdentifier is present, the extension value can be CBOR-encoded. If all three are present, a CBOR array is used. If only keyIdentifier is present, the array is omitted:</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   KeyIdentifierArray = [
     keyIdentifier: KeyIdentifier,
     authorityCertIssuer: GeneralNames,
     authorityCertSerialNumber: CertificateSerialNumber,
   ]
   AuthorityKeyIdentifier = KeyIdentifierArray / KeyIdentifier
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Certificate Policies (certificatePolicies). If noticeRef is not used and any explicitText values are encoded as UTF8String, the extension value can be CBOR-encoded. OIDs registered in <xref target="CP"/> are encoded as an int. The policyQualifierId is encoded as a CBOR int (see <xref target="PQ"/>) or an unwrapped CBOR OID tag <xref target="RFC9090"/>.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   PolicyIdentifier = int / ~oid
   PolicyQualifierInfo = (
     policyQualifierId: int / ~oid,
     qualifier: text,
   )
   CertificatePolicies = [
     + ( PolicyIdentifier, [ * PolicyQualifierInfo ] )
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Name Constraints (nameConstraints). If the name constraints only contain general names registered in <xref target="GN"/>, the extension value can be CBOR-encoded. C509 uses the same additions and restrictions as defined in <xref section="2.2" sectionFormat="of" target="RFC9549"/>. Note that the minimum and maximum fields are not used and are therefore omitted. For IPv4 addresses, the iPAddress field <bcp14>MUST</bcp14> contain five octets, and for IPv6 addresses, the field <bcp14>MUST</bcp14> contain 17 octets. In both cases the last octet indicates the number of bits in the prefix. As an example, the address block 192.0.2.0/24 is encoded as C0 00 02 00 18 instead of C0 00 02 00 FF FF FF 00 as in the DER encoding.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   GeneralSubtrees = [ + GeneralName ]
   NameConstraints = [
     permittedSubtrees: GeneralSubtrees / null,
     excludedSubtrees: GeneralSubtrees / null,
   ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Subject Directory Attributes (subjectDirectoryAttributes). Encoded as attributes in issuer and subject with the difference that there can be more than one attributeValue.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   RDNAttributes = (
     ( attributeType: int, attributeValue: [ + SpecialText] ) //
     ( attributeType: ~oid, attributeValue: [+ bytes] )
   )
   SubjectDirectoryAttributes = [ + RDNAttributes ]
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Identifiers (id-pe-autonomousSysIds). The X.509 extension AS Identifiers is specified in <xref target="RFC3779"/>. If 'rdi' is not present, the extension value can be CBOR-encoded. Each ASId is encoded as a CBOR uint. With the exception of the first ASId, each subsequent ASId is encoded as the difference from the previous ASId.</t>
          </li>
        </ul>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
   ASIdOrRange = uint / [min:uint, max:uint]
   ASIdentifiers = [ + ASIdOrRange ] / null
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>AS Identifiers v2 (id-pe-autonomousSysIds-v2). The X.509 extension AS Identifiers v2 is specified in <xref target="RFC8360"/>. The extension value is encoded exactly like in the extension "AS Identifiers".</t>
          </li>
        </ul>
        <section anchor="example-encoding-of-extensions">
          <name>Example Encoding of Extensions</name>
          <t>The examples below use values from <xref target="extype"/>, <xref target="EKU"/>, and <xref target="GN"/>:</t>
          <ul spacing="normal">
            <li>
              <t>A critical basicConstraints ('cA' = true) without pathLenConstraint is encoded as the two CBOR ints -4, -1.</t>
            </li>
            <li>
              <t>A non-critical keyUsage with digitalSignature (0), nonRepudiation (1), keyEncipherment (2) and keyAgreement (4) asserted is encoded as the two CBOR ints 2, 23 (2<sup>0</sup> + 2<sup>1</sup> + 2<sup>2</sup> + 2<sup>4</sup> = 23).</t>
            </li>
            <li>
              <t>A non-critical extKeyUsage containing id-kp-codeSigning and id-kp-OCSPSigning is encoded as the CBOR int 8 followed by the CBOR array [ 3, 9 ].</t>
            </li>
            <li>
              <t>A non-critical subjectAltName containing only the dNSName example.com is encoded as the CBOR int 3 followed by the CBOR text string "example.com".</t>
            </li>
          </ul>
          <t>Thus, the extension field of a certificate containing all of the above extensions in the given order would be encoded as the CBOR array [ -4, -1, 2, 23, 8, [ 3, 9 ], 3, "example.com" ].</t>
        </section>
      </section>
      <section anchor="cose-header-params">
        <name>C509 COSE Header Parameters</name>
        <t>The formatting and processing for c5b, c5c, c5t, and c5u, defined in <xref target="iana-header"/> below, are similar to x5bag, x5chain, x5t, x5u defined in <xref target="RFC9360"/> except that the certificates are C509 instead of DER-encoded X.509 and use a COSE_C509 structure instead of COSE_X509.</t>
        <t>The COSE_C509 structure used in c5b, c5c, and c5u is defined as:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
COSE_C509 = C509CertData / [ 2* C509CertData ]
C509CertData = bytes .cborseq C509Certificate
]]></sourcecode>
        <t>C509CertData thus includes the unwrapped CBOR sequence, ~C509Certificate. The byte string encoding includes the length of each certificate, which simplifies parsing. See <xref target="other-examples"/> for an example.</t>
        <t>The COSE_C509 item has media type application/cose-c509-cert, see <xref target="c509-cert"/>. Different CoAP Content-Formats are defined depending on "usage" = "chain" or not, see <xref target="content-format"/>.  Stored file formats are defined for the cases with/without ("usage" = "chain") with "magic numbers" TBD8/TBD6 using the reserved CBOR tag 55799 and the corresponding Content-Formats TBD15/TBD3, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <t>The value type of c5t is the COSE_CertHash structure defined in <xref target="RFC9360"/>, which contains the hash value of the C509 certificate calculated over ~C509Certificate. Thus, C509CertData contains all data necessary to calculate the thumbprint c5t.</t>
        <t>c5u provides an alternative way to identify an untrusted certificate chain by reference with a URI <xref target="RFC3986"/>, encoded as a CBOR text string (media type application/cbor and CoAP Content-Format 60). The referenced resource is a COSE_C509 item served with the application/cose-c509-cert media type ("usage" = "chain"), as described above.</t>
        <t>As the contents of c5b, c5c, c5t, and c5u are untrusted input, the header parameters can be in either the protected or unprotected header bucket. The trust mechanism <bcp14>MUST</bcp14> process any certificates in the c5b, c5c, and c5u parameters as untrusted input. The presence of a self-signed certificate in the parameter <bcp14>MUST NOT</bcp14> cause the update of the set of trust anchors without appropriate authorization.</t>
        <table anchor="iana-header">
          <name>C509 COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5b</td>
              <td align="left">24</td>
              <td align="left">COSE_C509</td>
              <td align="left">An unordered bag of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5c</td>
              <td align="left">25</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t</td>
              <td align="left">22</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a ~C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u</td>
              <td align="left">23</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing an ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
        <t>Certificates can also be identified with a 'kid' header parameter by storing the 'kid' value and the associated bag or chain in a dictionary.</t>
      </section>
      <section anchor="cose-header-alg-params">
        <name>C509 COSE Header Algorithm Parameters</name>
        <t>This section defines the COSE header parameters used for identifying or transporting the sender's key for static-static key agreement algorithms corresponding to <xref section="3" sectionFormat="of" target="RFC9360"/>, see <xref target="iana-sender"/>.</t>
        <ul spacing="normal">
          <li>
            <t>c5c-sender contains the chain of certificates starting with the sender's key exchange certificate. The structure is the same as 'c5c'.</t>
          </li>
          <li>
            <t>c5t-sender contains the hash value for the sender's key exchange certificate. The structure is the same as 'c5t'.</t>
          </li>
          <li>
            <t>c5u-sender contains a URI for the sender's key exchange certificate. The structure and processing are the same as 'c5u'.</t>
          </li>
        </ul>
        <table anchor="iana-sender">
          <name>Static ECDH Algorithm Values</name>
          <thead>
            <tr>
              <th align="right">Name</th>
              <th align="left">Algorithm</th>
              <th align="left">Label</th>
              <th align="left">Type</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">c5c-sender</td>
              <td align="left">ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW</td>
              <td align="left">-30 (suggested)</td>
              <td align="left">COSE_C509</td>
              <td align="left">An ordered chain of C509 certificates</td>
            </tr>
            <tr>
              <td align="right">c5t-sender</td>
              <td align="left">ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW</td>
              <td align="left">-31 (suggested)</td>
              <td align="left">COSE_CertHash</td>
              <td align="left">Hash of a ~C509Certificate</td>
            </tr>
            <tr>
              <td align="right">c5u-sender</td>
              <td align="left">ECDH-SS+HKDF-256, ECDH-SS+HKDF-512, ECDH-SS+A128KW, ECDH-SS+A192KW, ECDH-SS+A256KW</td>
              <td align="left">-32 (suggested)</td>
              <td align="left">uri</td>
              <td align="left">URI pointing to a COSE_C509 containing an ordered chain of certificates</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="private-key-structures">
        <name>Private Key Structures</name>
        <t>Certificate management also makes use of data structures including private keys; see, e.g., <xref target="RFC7468"/>. This section defines the following CBOR-encoded structures:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PrivateKey = [
   C509PrivateKeyType: int,
   subjectPrivateKeyAlgorithm: AlgorithmIdentifier,
   subjectPrivateKey: any,
]
]]></sourcecode>
        <t>The field 'C509PrivateKeyType' indicates the type of the C509 private key. Different types of C509 Private Key Structures can be defined, see <xref target="privkeys"/>. Currently, two types are defined. When C509PrivateKeyType = 0, the subjectPrivateKey is the CBOR byte string encoding of the PrivateKey OCTET STRING value field defined in <xref target="RFC5958"/>. When C509PrivateKeyType = 1, the subjectPrivateKey is a COSE_KEY structure containing a private key as defined in <xref target="RFC9052"/>. Note that COSE_KEY might not be possible to use with all algorithms that have a C509 AlgorithmIdentifier defined.</t>
        <t>The C509PrivateKey item is served with the application/cose-c509-privkey media type, see <xref target="c509-privkey"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD12 using the reserved CBOR tag 55799 and the Content-Format TBD10, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509PEM = [
   C509PrivateKey,
   COSE_C509 / null,
]
]]></sourcecode>
        <t>The C509PEM item is served with the application/cose-c509-pem media type, see <xref target="c509-pem"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. A stored file format is defined with "magic number" TBD13 using the reserved CBOR tag 55799 and the Content-Format TBD11, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
      <section anchor="deterministic-encoding">
        <name>Deterministic Encoding</name>
        <t>In some use cases it is desirable to be able to specify a unique C509 representation of a given X.509 certificate.</t>
        <t>Although this specification requires the use of Deterministically Encoded CBOR (see <xref target="notation"/>), it is still possible to represent certain X.509 certificate fields in different ways. This is a consequence of the extensibility of the C509 format, in which new encodings can be defined, for example, to optimize extensions for which no special CBOR encoding has previously been defined.</t>
        <t>Where both a specific and a generic CBOR encoding are supported, the specific CBOR encoding <bcp14>MUST</bcp14> be used. For example, when a specific CBOR encoding of an extension is defined in <xref target="ext-encoding"/> and the C509 Extensions Registry, that specific encoding <bcp14>MUST</bcp14> be used. In particular, when a specific otherName encoding is available, identified by a negative integer value in the C509 General Names Registry, it <bcp14>MUST</bcp14> be used.</t>
        <t>Native C509 certificates <bcp14>MUST</bcp14> use only specific CBOR-encoded fields. However, when decoding non-native C509 certificates, the decoder may need to support, for example, the (extensionID: ~oid, extensionValue: bytes / [bytes]) encoding of an extension for which an (extensionID: int, extensionValue: Defined) encoding exists. One reason is that the certificate might have been issued before the specific CBOR extension was registered.</t>
      </section>
      <section anchor="c509-name-in-tls-and-dtls">
        <name>C509 Name in TLS and DTLS</name>
        <t>In TLS and DTLS, the subject of a trusted authority may be sent to the peer to help it select the certificate chain, as in the CertificateAuthoritiesExtension in <xref target="RFC8446"/>, in the certificate_authorities field of CertificateRequest in <xref target="RFC5246"/>, or in the TrustedAuthorities in <xref target="RFC6066"/>. For such usage in TLS and DTLS, the C509 name is wrapped in a distinguished name <xref target="X.501"/> with exactly one RelativeDistinguishedName, which in turn contains exactly one AttributeTypeAndValue with the attribute C509Name. The attribute value is the raw byte string of the encoded C509 Name as specified in <xref target="subject"/>.</t>
        <t>The attribute for C509 Name has the following structure:</t>
        <artwork><![CDATA[
id-rdna-c509Name OBJECT IDENTIFIER ::= { 1 3 6 1 5 5 7 25 TBD30 }

c509Name ATTRIBUTE ::= {
   WITH SYNTAX C509Name
   SINGLE VALUE TRUE
   ID id-rdna-c509Name }

C509Name ::= OCTET STRING
]]></artwork>
      </section>
    </section>
    <section anchor="CSR">
      <name>C509 Certification Request</name>
      <t>This section defines the format of a C509 Certification Request based on <xref target="RFC2986"/>. It reuses the encodings of C509 certificates defined in <xref target="certificate"/>. A Certification Request is commonly referred to as a Certificate Signing Request (CSR).</t>
      <t>The CDDL for the C509 Certification Request is shown in <xref target="fig-C509CSRCDDL"/>. The fields have the same encoding as the corresponding fields of the C509 Certificate, see <xref target="message-fields"/>.</t>
      <figure anchor="fig-C509CSRCDDL">
        <name>CDDL for C509CertificationRequest.</name>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificationRequest = [
   TBSCertificationRequest,
   subjectSignatureValue: any,
]

; The elements of the following group are used in a CBOR Sequence:
TBSCertificationRequest = (
   c509CertificationRequestType: int,
   subjectSignatureAlgorithm: AlgorithmIdentifier,
   subject: Name,
   subjectPublicKeyAlgorithm: AlgorithmIdentifier,
   subjectPublicKey: Defined,
   attributes: CRAttributes,
)

CRAttributes = [ * CRAttribute ]

CRAttribute = (( attributeType: int, attributeValue: Defined ) //
               ( attributeType: ~oid, attributeValue: bytes ))
]]></sourcecode>
      </figure>
      <t>After verifying subjectSignatureValue, the Certification Authority (CA) <bcp14>MAY</bcp14> transform the C509CertificationRequest into a <xref target="RFC2986"/> CertificationRequestInfo for compatibility with existing procedures and implementations.</t>
      <t>The media type of C509CertificationRequest is application/cose-c509-pkcs10, see <xref target="c509-pkcs10"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD9 is defined using the reserved CBOR tag 55799 and the Content-Format TBD4, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      <section anchor="certification-request-types">
        <name>Certification Request Types</name>
        <t>Two types of C509 Certification Requests are defined. Both use the same CBOR encoding and differ only in what is being signed; see <xref target="csr-type"/>. A C509 Certification Request is either an invertible CBOR re-encoding of a DER-encoded certification request <xref target="RFC2986"/> or a natively signed request in which the signature is calculated over the CBOR encoding instead of the DER encoding.</t>
        <ul spacing="normal">
          <li>
            <t>c509CertificationRequestType = 2. This type indicates that the C509 Certification Request is natively signed, i.e., that subjectSignatureValue contains the signature over the CBOR Sequence TBSCertificationRequest; see <xref target="fig-C509CSRCDDL"/>. This encoding removes the need for ASN.1 and DER parsing and for re-encoding by the requesting party.</t>
          </li>
          <li>
            <t>c509CertificationRequestType = 3. This type indicates that the C509 Certification Request is a CBOR re-encoded <xref target="RFC2986"/> certification request, as defined in <xref target="CSR"/>. This encoding is backward compatible with legacy RFC 2986 certification requests and reduces transport overhead.</t>
          </li>
        </ul>
        <t>The type of certificate issued in response to the request is determined by the application. For C509, the default is c509CertificateType = c509CertificationRequestType.</t>
        <t>An implementation <bcp14>MAY</bcp14> only support certain values of c509CertificationRequestType.</t>
      </section>
      <section anchor="subject-signature-algorithm">
        <name>Subject Signature Algorithm</name>
        <t>subjectSignatureAlgorithm can be a signature algorithm or a non-signature proof-of-possession algorithm, for example, as defined in <xref target="RFC6955"/>. In the case of <xref target="RFC6955"/>, the signature is replaced by a MAC and requires a public Diffie-Hellman key of the verifier to be distributed out of band. Both signature algorithms and non-signature proof-of-possession algorithms are listed in the C509 Signature Algorithms Registry; see <xref target="sigalg"/>. The non-signature proof-of-possession algorithms with SHA-2 and HMAC-SHA2 (see values 14-16 in <xref target="sigalg"/>) require a signature value with syntax DhSigStatic, defined as follows:</t>
        <sourcecode type="cddl" name="c509.cddl"><![CDATA[
DhSigStatic = MessageDigest / DhSigStaticType

MessageDigest = bytes

DhSigStaticType = [
  issuer: Name,
  certificateSerialNumber: CertificateSerialNumber,
  hashValue: MessageDigest,
]
]]></sourcecode>
        <t>Note that a key agreement key pair may be used with a signature algorithm in a certification request, see <xref target="app-DH-keys"/>.</t>
      </section>
      <section anchor="certification-request-attributes">
        <name>Certification Request Attributes</name>
        <t>The 'attributes' field specifies the attributes contained in a certification request. The 'attributes' field with no GeneralAttribute <bcp14>SHALL</bcp14> be encoded as an empty CBOR array.</t>
        <t>The remainder of this section specifies CBOR-encoded attributes for Certification Requests.</t>
        <section anchor="extension-request">
          <name>Extension Request</name>
          <t>The X.509 attribute "Extension Request" is defined in <xref target="RFC2985"/>. The 'attributeValue' field has type Extensions as in <xref target="message-fields"/>. An empty CBOR array indicates no extensions.</t>
        </section>
        <section anchor="challenge-password">
          <name>Challenge Password</name>
          <t>The X.509 attribute "Challenge Password" is defined in <xref target="RFC2985"/>. The 'attributeValue' field has type ChallengePassword. A UTF8 String is encoded as CBOR text, and a Printable String is tagged with number 121 (alternative 0 as defined in <xref target="IANA-CBOR-TAGS"/>). All other string types are not supported. For certification request type 2, only UTF8 String is allowed.</t>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
ChallengePassword = text / #6.121(text)
]]></sourcecode>
        </section>
        <section anchor="private-key-possession-statement">
          <name>Private Key Possession Statement</name>
          <t>The X.509 attribute "Statement of Possession of a Private Key" is defined in <xref target="RFC9883"/>. The 'attributeValue' field has type PrivateKeyPossessionStatement.</t>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
PrivateKeyPossessionStatement = [
  issuer: Name,
  certificateSerialNumber: CertificateSerialNumber,
  cert: C509Certificate / null,
]
]]></sourcecode>
        </section>
      </section>
      <section anchor="CRT">
        <name>Certification Request Template</name>
        <t>Enrollment over Secure Transport (EST, <xref target="RFC7030"/>) defines, and <xref target="RFC9908"/> clarifies, how an EST server can specify what it expects the EST client to include in a subsequent Certification Request. Alternatively to the unstructured mechanism specified in <xref target="RFC7030"/>, <xref section="B" sectionFormat="of" target="RFC8295"/> describes an approach using a Certification Request Template in response to a GET /csrattrs request by the EST client. The EST server thus returns a Certification Request-like object with various fields filled out, and other fields waiting to be filled in and a signature to be added by the EST client.</t>
        <t>The approach of <xref target="RFC8295"/> is also followed for C509. The C509CertificationRequestTemplate is based on TBSCertificationRequest of the C509CertificationRequest, see <xref target="fig-C509CSRCDDL"/>, but excludes the subjectSignatureValue field from the template since that needs no further specification.</t>
        <t>The C509 Certification Request Template is shown in <xref target="fig-C509CSRTemplateCDDL"/>.</t>
        <figure anchor="fig-C509CSRTemplateCDDL">
          <name>CDDL for C509CertificationRequestTemplate.</name>
          <sourcecode type="cddl" name="c509.cddl"><![CDATA[
C509CertificationRequestTemplate = [
   c509CertificationRequestTemplateType: int,
   c509CertificationRequestType: [+ int] / undefined,
   subjectSignatureAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subject: NameTemplate / undefined,
   subjectPublicKeyAlgorithm: [+ AlgorithmIdentifier] / undefined,
   subjectPublicKey: undefined,
   extensionsRequest: ExtensionsTemplate / undefined,
]

NameTemplate = [ * RDNAttributeTemplate ]

RDNAttributeTemplate = (
    ( attributeType: uint, minOccurs: uint, maxOccurs: uint,
      attributeValue: SpecialText / undefined ) //
    ( attributeType: ~oid, minOccurs: uint, maxOccurs: uint,
      attributeValue: bytes / undefined )
)

ExtensionsTemplate = [ * ExtensionTemplate ]

ExtensionTemplate = (
    ( extensionID: uint, optional: bool, extensionValue: any ) //
    ( extensionID: ~oid, optional: bool,
    extensionValue: bytes / undefined )
)
]]></sourcecode>
        </figure>
        <t>Except as specified in this section, the fields have the same encoding as the corresponding fields of the TBSCertificationRequest, see <xref target="fig-C509CSRCDDL"/>. The specification of the template makes use of the CBOR simple value undefined (0xf7) to indicate fields to fill in. Consistent with this rule, note that the subjectPublicKey field always has the value undefined in the template.</t>
        <t>Different types of Certification Request Templates can be defined (see <xref target="temp-type"/>), distinguished by the c509CertificationRequestTemplateType integer. Each type may have its own CDDL structure.</t>
        <t>The presence of a Defined (non-undefined) value in a C509CertificationRequestTemplate indicates that the server expects the client to use that value in the certification request. If multiple AlgorithmIdentifier or c509CertificationRequestType values are present, the server expects the client to select one of them for use in the Certification Request. The presence of an undefined value indicates that the client is expected to provide an appropriate value for that field. For example, if the server includes a subjectAltName with a GeneralNameType iPAddress and a GeneralNameValue empty byte string, this means that the client <bcp14>SHOULD</bcp14> fill in a corresponding GeneralNameValue.</t>
        <t>For RDNAttributeTemplate, the minOccurs and maxOccurs fields specify the minimal and maximal occurrences of attributes of the given attributeType; maximal shall not be less than minimal, and maximal shall be positive. Negative attributeType is not allowed.</t>
        <t>For ExtensionTemplate, the field "optional" specifies whether an extension of the given extensionID is optional. Negative extensionID is not allowed.</t>
        <t>The media type of C509CertificationRequestTemplate is application/cose-c509-crtemplate, see <xref target="c509-crtemplate"/>, with corresponding CoAP Content-Format defined in <xref target="content-format"/>. The "magic number" TBD18 is defined using the reserved CBOR tag 55799 and the Content-Format TBD19, enveloped as described in <xref section="2.2" sectionFormat="of" target="RFC9277"/>.</t>
      </section>
    </section>
    <section anchor="c509-processing-and-certificate-issuance">
      <name>C509 Processing and Certificate Issuance</name>
      <t>It is straightforward to integrate the C509 format into legacy X.509 processing during certificate issuance. C509 processing can be performed as an isolated function of the CA, or as a separate function trusted by the CA.</t>
      <t>The Certification Request format defined in <xref target="CSR"/> follows the PKCS#10 format to enable a direct mapping to the certification request information, see <xref section="4.1" sectionFormat="of" target="RFC2986"/>. The CA can make use of a Certification Request Template defined in <xref target="CRT"/>, for simplified configuration.</t>
      <t>When a certification request is received, the CA, or function trusted by the CA, needs to perform some limited C509 processing and verify the proof-of-possession corresponding to the public key, before normal certificate generation can take place.</t>
      <t>In the reverse direction, in case c509CertificateType = 3 was requested, a separate C509 processing function can perform the conversion from a generated X.509 certificate to C509 as a bump-in-the-wire. In case c509CertificateType = 2 was requested, the C509 processing needs to be performed before signing the certificate, in which case a tighter integration with the CA may be needed.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="dep-set">
        <name>Legacy Considerations</name>
        <t>C509 certificates can be deployed with legacy X.509 certificates and CA infrastructure. An existing CA can continue to use its existing procedures and code for PKCS#10, and DER-encoded X.509 and only implement C509 as a thin processing layer on top. When receiving a C509 Certification Request, the CA transforms it into a DER-encoded CertificationRequestInfo <xref target="RFC2986"/> and uses that with existing processes and code to produce an RFC 5280 DER-encoded X.509 certificate. The DER-encoded X.509 is then transformed into a C509 certificate. At any later point, the C509 certificate can be used to recreate the original X.509 data structure needed to verify the signature.</t>
        <t>For protocols like TLS/DTLS 1.2, where certificates are sent unencrypted, the actual encoding and compression can be done at different locations depending on the deployment setting. For example, the mapping between C509 certificate and standard X.509 certificate can take place in a 6LoWPAN border gateway, which allows the server side to stay unmodified. This case gives the advantage of the low overhead of a C509 certificate over constrained wireless links. The conversion to X.509 within a constrained IoT device will incur a computational overhead. However, measured in energy, this is likely to be negligible compared to the reduced communication overhead.</t>
        <t>For the setting with constrained server and server-only authentication, the server only needs to be provisioned with the C509 certificate and does not perform the conversion to X.509. This option is viable when client authentication can be asserted by other means.</t>
        <t>For protocols like IKEv2, TLS/DTLS 1.3, and EDHOC, where certificates are encrypted, the proposed encoding needs to be done fully end-to-end, through adding the encoding/decoding functionality to the server.</t>
      </section>
      <section anchor="expected-certificate-sizes">
        <name>Expected Certificate Sizes</name>
        <t>The CBOR encoding of the sample certificate chains given in <xref target="appA"/> results in the numbers shown in Figures <xref target="fig-size-COSE" format="counter"/> and <xref target="fig-size-TLS" format="counter"/>. COSE_X509 is defined in <xref target="RFC9360"/> and COSE_C509 is defined in <xref target="cose"/>. After <xref target="RFC7925"/> profiling, most duplicated information has been removed, and the remaining text strings are minimal in size. Therefore, the further size reduction reached with general compression mechanisms such as Brotli <xref target="RFC7932"/> will be small, mainly corresponding to making the ASN.1 encoding more compact. CBOR encoding can however significantly compress RFC 7925 profiled certificates. In the examples with HTTPS certificate chains (www.ietf.org (ECDSA) and cabforum.org (RSA)) both C509 and Brotli perform well complementing each other. C509 uses dedicated information to compress individual certificates, while Brotli can compress duplicate information in the entire chain. Note that C509 certificates of type 2 and 3 have the same size. For Brotli, the Rust crate Brotli 3.3.0 was used with compression level 11 and window size 22.</t>
        <t>In the examples using FN-DSA and ML-DSA certificate chains, the largest portion of the certificate size consists of the public keys and signatures, which are essentially random. As a result, both Brotli and C509 achieve only very limited size reduction. However, C509 still performs slightly better.</t>
        <figure anchor="fig-size-COSE">
          <name>Comparing Sizes of Certificate Chains in COSE. Number of bytes (length of certificate chain).</name>
          <artwork align="center"><![CDATA[
+----------------------------------------+-----------+-----------+
| Description (number of certs)          | COSE_X509 | COSE_C509 |
+----------------------------------------+-----------+-----------+
| RFC 7925 profiled IoT Certificate (1)  |       319 |       142 |
+----------------------------------------+-----------+-----------+
| RPKI Certificate (1)                   |     20981 |     11523 |
+----------------------------------------+-----------+-----------+
| ECDSA HTTPS Certificate Chain (2)      |      1644 |      1012 |
+----------------------------------------+-----------+-----------+
| RSA HTTPS Certificate Chain (2)        |      2909 |      2240 |
+----------------------------------------+-----------+-----------+
| FN-DSA-512 HTTPS Certificate Chain (2) |      4417 |      3897 |
+----------------------------------------+-----------+-----------+
| ML-DSA-65 HTTPS Certificate Chain (2)  |     11863 |     11318 |
+----------------------------------------+-----------+-----------+

]]></artwork>
        </figure>
        <figure anchor="fig-size-TLS">
          <name>Comparing Sizes of Certificate Chains with TLS 1.3. Number of bytes (length of certificate chain). X.509 and C509 are Certificate messages. X.509 + Brotli and C509 + Brotli are CompressedCertificate messages.</name>
          <artwork align="center"><![CDATA[
+-----------------------+-------+---------+-------+--------+
| Description           | X.509 | X.509 + | C509  | C509 + |
| (number of certs)     |       | Brotli  |       | Brotli |
+-----------------------+-------+---------+-------+--------+
| RFC 7925 profiled     |   325 |     317 |  149  |    158 |
| IoT Certificate (1)   |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
| RPKI Certificate (1)  | 20987 |    9109 | 11529 |   7020 |
+-----------------------+-------+---------+-------+--------+
| ECDSA HTTPS           |  1651 |    1181 |  1019 |    930 |
| Certificate Chain (2) |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
| RSA HTTPS             |  2656 |    2195 |  2071 |   1913 |
| Certificate Chain (2) |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
| FN-DSA-512 HTTPS      |  4437 |    4026 |  3917 |   3776 |
| Certificate Chain (2) |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
| ML-DSA-65 HTTPS       | 11869 |   11420 | 11325 |  11148 |
| Certificate Chain (2) |       |         |       |        |
+-----------------------+-------+---------+-------+--------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The CBOR encoding of X.509 certificates does not change the security assumptions needed when deploying standard X.509 certificates. The same security procedures applies as for X.509. For example the same certificate path validation as defined in <xref section="6" sectionFormat="of" target="RFC5280"/> <bcp14>MUST</bcp14> be performed on C509 certificates before they can be considered trusted. The security considerations of <xref target="RFC5280"/> apply.</t>
      <t>The use of natively signed C509 certificates removes the need for ASN.1 encoding, which is a rich source of security vulnerabilities.</t>
      <t>Conversion between the certificate formats can be made in constant time to reduce risk of information leakage through side channels.</t>
      <t>The mechanism in this document does not reveal any additional information compared to X.509. Because of the difference in size, it will be possible to detect that this profile is used. The gateway solution described in <xref target="dep-set"/> requires unencrypted certificates which may violate identity protection and is not recommended.</t>
      <t>Any issues with decoding or parsing a C509 certificate should be handled exactly as how such errors would be handled for the corresponding X.509 certificate. For example, a non-critical extension <bcp14>MAY</bcp14> be ignored if it is not recognized, see <xref section="4.2" sectionFormat="of" target="RFC5280"/>.</t>
      <t>As stated in <xref target="cose-header-params"/>, the contents of the COSE Header Parameters c5b, c5c, c5t, c5u is untrusted input that potentially may be verified using existing trust anchors or other trust establishment mechanism out of scope of this document. Similar security considerations as x5bag, x5chain, x5t and x5u apply, see <xref target="RFC9360"/>. Security considerations of the COSE protected and unprotected headers are discussed in <xref target="RFC9052"/>.</t>
      <t>The specification makes no recommendations on the use of algorithms, paddings, or other security constructs applied in the encoding of a certificate. In particular, an IANA registration does not imply a recommendation. For example, some deprecated algorithms are assigned code points only for backward compatibility to enable CBOR encoding of existing certificates.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document creates several new registries in the new registry group "CBOR Encoded X.509 (C509)". For all items, the 'Reference' field points to this document.</t>
      <t>Editor's note: Add informative reference to the newly created IANA registries and updated existing registries.</t>
      <section anchor="designated-expert-guidance">
        <name>Designated Expert Guidance</name>
        <t>Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. Experts should take into account the expected usage of entries when approving point assignment. The length of the encoded value should be weighed against the number of code points left that encode to that size and how constrained the systems it will be used on are. Values in the interval [-24, 23] have a 1-byte encoding, other values in the interval [-256, 255] have a 2-byte encoding, and the remaining values in the interval [-65536, 65535] have a 3-byte encoding.</t>
        <t>All assignments according to "IETF Review with Expert Review" are made on an "IETF Review" basis per <xref section="4.8" sectionFormat="of" target="RFC8126"/> with "Expert Review" additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of "standards track code points" defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, working group chairs are encouraged to consult the expert(s) early during the process outlined in Section 3.1 of <xref target="RFC7120"/>.</t>
      </section>
      <section anchor="type">
        <name>C509 Certificate Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Types" under the registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. It is mandatory to specify content in all columns. For values in the interval [-24, 23], the registration procedure is "IETF Review with Expert Review". For all other values, the registration procedure is "Expert Review".  The initial contents of the registry are (see <xref target="version"/>):</t>
        <figure anchor="fig-types">
          <name>C509 Certificate Types</name>
          <artwork align="center"><![CDATA[
+-------+-------------------------------------------+
| Value | Description                               |
+=======+===========================================+
|     0 | Reserved                                  |
+-------+-------------------------------------------+
|     1 | Reserved                                  |
+-------+-------------------------------------------+
|     2 | Natively Signed C509 Certificate          |
+-------+-------------------------------------------+
|     3 | CBOR Re-encoded X.509 v3 Certificate      |
+-------+-------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="csr-type">
        <name>C509 Certification Request Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certification Request Types" under the new registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-csr-types">
          <name>C509 Certification Request Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Reserved                                                  |
+-------+-----------------------------------------------------------+
|     1 | Reserved                                                  |
+-------+-----------------------------------------------------------+
|     2 | Natively Signed C509 Certification Request.               |
+-------+-----------------------------------------------------------+
|     3 | CBOR re-encoding of RFC 2986 certification request.       |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="privkeys">
        <name>C509 Private Key Types Registry</name>
        <t>IANA has created a new registry titled "C509 Private Key Types" in the new registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Comments, subjectPrivateKey, and Reference, where Value is an integer, and the other columns are text strings. The subjectPrivateKey describes the encoding of the subject private key, see <xref target="private-key-structures"/>. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".  The initial contents of the registry are:</t>
        <figure anchor="fig-privkeys">
          <name>C509 Private Key Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Private Key                                               |
+=======+===========================================================+
|     0 | Comments:          Asymmetric Key Package (RFC 5958)      |
|       | subjectPrivateKey: PrivateKey OCTET STRING encoded as     |
|       | CBOR byte string                                          |
+-------+-----------------------------------------------------------+
|     1 | Comments:          COSE Key Object (RFC 9052)             |
|       | subjectPrivateKey: COSE_Key containing a private key      |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="temp-type">
        <name>C509 Certification Request Templates Types Registry</name>
        <t>IANA has created a new registry titled "C509 Certification Request Templates Types" under the new registry group "CBOR Encoded X.509 (C509)". The columns of the registry are Value, Description, and Reference, where Value is an integer, and the other columns are text strings. All columns are mandatory. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-temp-types">
          <name>C509 Certification Request Templates Types</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Description                                               |
+=======+===========================================================+
|     0 | Simple C509 Certification Request Template                |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="rdnatttype">
        <name>C509 RDN Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 RDN Attributes" in the new registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments and Reference, where Value is a non-negative integer, and the other columns are text strings. Name and Identifiers are informal descriptions. The fields Name, OID, and DER are mandatory. For RDN Attributes specified only for CBOR encoded certificates where no OID is defined, the OID and DER fields are marked "N/A". If there is an OID defined, the OID is given in dotted decimal representation, and the DER column contains the hex string of the DER-encoded OID <xref target="X.690"/>. If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the RDN Attribute is described. For values in the interval [0, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review".</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-rdnattrtype">
          <name>C509 RDN Attributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | RDN Attribute                                             |
+=======+===========================================================+
|     0 | Name:            Email Address                            |
|       | Identifiers:     emailAddress, e-mailAddress              |
|       | OID:             1.2.840.113549.1.9.1                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 01         |
|       | Comments:        RFC 2985                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Common Name                              |
|       | Identifiers:     commonName, cn                           |
|       | OID:             2.5.4.3                                  |
|       | DER:             06 03 55 04 03                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     2 | Name:            Surname                                  |
|       | Identifiers:     surname, sn                              |
|       | OID:             2.5.4.4                                  |
|       | DER:             06 03 55 04 04                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     3 | Name:            Serial Number                            |
|       | Identifiers:     serialNumber                             |
|       | OID:             2.5.4.5                                  |
|       | DER:             06 03 55 04 05                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     4 | Name:            Country                                  |
|       | Identifiers:     countryName, c                           |
|       | OID:             2.5.4.6                                  |
|       | DER:             06 03 55 04 06                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     5 | Name:            Locality                                 |
|       | Identifiers:     localityName, locality, l                |
|       | OID:             2.5.4.7                                  |
|       | DER:             06 03 55 04 07                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            State or Province                        |
|       | Identifiers:     stateOrProvinceName, st                  |
|       | OID:             2.5.4.8                                  |
|       | DER:             06 03 55 04 08                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     7 | Name:            Street Address                           |
|       | Identifiers:     streetAddress, street                    |
|       | OID:             2.5.4.9                                  |
|       | DER:             06 03 55 04 09                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     8 | Name:            Organization                             |
|       | Identifiers:     organizationName, o                      |
|       | OID:             2.5.4.10                                 |
|       | DER:             06 03 55 04 0A                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|     9 | Name:            Organizational Unit                      |
|       | Identifiers:     organizationalUnitName, ou               |
|       | OID:             2.5.4.11                                 |
|       | DER:             06 03 55 04 0B                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    10 | Name:            Title                                    |
|       | Identifiers:     title                                    |
|       | OID:             2.5.4.12                                 |
|       | DER:             06 03 55 04 0C                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    11 | Name:            Business Category                        |
|       | Identifiers:     businessCategory                         |
|       | OID:             2.5.4.15                                 |
|       | DER:             06 03 55 04 0F                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    12 | Name:            Postal Code                              |
|       | Identifiers:     postalCode                               |
|       | OID:             2.5.4.17                                 |
|       | DER:             06 03 55 04 11                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    13 | Name:            Given Name                               |
|       | Identifiers:     givenName                                |
|       | OID:             2.5.4.42                                 |
|       | DER:             06 03 55 04 2A                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    14 | Name:            Initials                                 |
|       | Identifiers:     initials                                 |
|       | OID:             2.5.4.43                                 |
|       | DER:             06 03 55 04 2B                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    15 | Name:            Generation Qualifier                     |
|       | Identifiers:     generationQualifier                      |
|       | OID:             2.5.4.44                                 |
|       | DER:             06 03 55 04 2C                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    16 | Name:            DN Qualifier                             |
|       | Identifiers:     dnQualifier                              |
|       | OID:             2.5.4.46                                 |
|       | DER:             06 03 55 04 2E                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    17 | Name:            Pseudonym                                |
|       | Identifiers:     pseudonym                                |
|       | OID:             2.5.4.65                                 |
|       | DER:             06 03 55 04 41                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    18 | Name:            Organization Identifier                  |
|       | Identifiers:     organizationIdentifier                   |
|       | OID:             2.5.4.97                                 |
|       | DER:             06 03 55 04 61                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    19 | Name:            Jurisdiction Locality Name               |
|       | Identifiers:     jurisdictionLocalityName                 |
|       | OID:             1.3.6.1.4.1.311.60.2.1.1                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 01   |
|       | Comments:        Proprietary Microsoft Attribute          |
+-------+-----------------------------------------------------------+
|    20 | Name:            Jurisdiction State or Province           |
|       | Identifiers:     jurisdictionStateOrProvinceName          |
|       | OID:             1.3.6.1.4.1.311.60.2.1.2                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 02   |
|       | Comments:        Proprietary Microsoft Attribute          |
+-------+-----------------------------------------------------------+
|    21 | Name:            Jurisdiction Country Name                |
|       | Identifiers:     jurisdictionCountryName                  |
|       | OID:             1.3.6.1.4.1.311.60.2.1.3                 |
|       | DER:             06 0B 2B 06 01 04 01 82 37 3C 02 01 03   |
|       | Comments:        Proprietary Microsoft Attribute          |
+-------+-----------------------------------------------------------+
|    22 | Name:            Domain Component                         |
|       | Identifiers:     domainComponent, dc                      |
|       | OID:             0.9.2342.19200300.100.1.25               |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 19      |
|       | Comments:        RFC 4524                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:            Name                                     |
|       | Identifiers:     name                                     |
|       | OID:             2.5.4.41                                 |
|       | DER:             06 03 55 04 29                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    26 | Name:            Telephone Number                         |
|       | Identifiers:     telephoneNumber                          |
|       | OID:             2.5.4.20                                 |
|       | DER:             06 03 55 04 14                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    27 | Name:            Directory Management Domain Name         |
|       | Identifiers:     dmdName                                  |
|       | OID:             2.5.4.54                                 |
|       | DER:             06 03 55 04 36                           |
|       | Comments:        X.520                                    |
+-------+-----------------------------------------------------------+
|    28 | Name:            userid                                   |
|       | Identifiers:     uid                                      |
|       | OID:             0.9.2342.19200300.100.1.1                |
|       | DER:             06 0A 09 92 26 89 93 F2 2C 64 01 01      |
|       | Comments:        RFC 4524                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:            Unstructured Name                        |
|       | Identifiers:     unstructuredName                         |
|       | OID:             1.2.840.113549.1.9.2                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 02         |
|       | Comments:        RFC 2985                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:            Unstructured Address                     |
|       | Identifiers:     unstructuredAddress                      |
|       | OID:             1.2.840.113549.1.9.8                     |
|       | DER:             06 0A 2A 86 48 86 F7 0D 01 09 08         |
|       | Comments:        RFC 2985                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="cratttype">
        <name>C509 CR Attributes Registry</name>
        <t>IANA has created a new registry titled "C509 CR Attributes" under the registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, attributeValue, and Reference, where Value is an integer, and the other columns are text strings. Name and Identifiers are informal descriptions. The fields Name, OID, and DER are mandatory. For CR Attributes specified only for CBOR encoded certificates where no OID is defined, the OID and DER fields are marked "N/A". If OID is present, the OID is given in dotted decimal representation, and the DER column contains the hex string of the DER-encoded OID <xref target="X.690"/>. If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the CR Attribute is described. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review".</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-crattrtype">
          <name>C509 CRAttributes</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | CR Attribute                                              |
+=======+===========================================================+
|     0 | Name:            Extension Request                        |
|       | Identifiers:     extensionRequest                         |
|       | OID:             1.2.840.113549.1.9.14                    |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 0E         |
|       | Comments:        RFC 2985                                 |
|       | attributeValue:  Extensions                               |
+-------+-----------------------------------------------------------+
|     1 | Name:            Challenge Password                       |
|       | Identifiers:     challengePassword                        |
|       | OID:             1.2.840.113549.1.9.7                     |
|       | DER:             06 09 2A 86 48 86 F7 0D 01 09 07         |
|       | Comments:        RFC 2985                                 |
|       | attributeValue:  ChallengePassword                        |
+-------+-----------------------------------------------------------+
|     2 | Name:            Private Key Possession Statement         |
|       | Identifiers:     privateKeyPossessionStatement            |
|       | OID:             1.3.6.1.4.1.22112.2.1                    |
|       | DER:             06 0A 2B 06 01 04 01 81 AC 60 02 01      |
|       | Comments:        RFC 9883                                 |
|       | attributeValue:  PrivateKeyPossessionStatement            |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="extype">
        <name>C509 Extensions Registry</name>
        <t>IANA has created a new registry titled "C509 Extensions" under the new registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, extensionValue, and Reference, where Value is a positive integer, and the other columns are text strings. The fields Name, OID, DER, and extensionValue are mandatory. For all other values the registration procedure is "Expert Review". For Extensions specified only for CBOR encoded certificates where no OID is defined, the OID and DER fields are marked "N/A". If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the Extension is described. For values in the interval [1, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use.</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-extype">
          <name>C509 Extensions</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Extension                                                 |
+=======+===========================================================+
|     1 | Name:            Subject Key Identifier                   |
|       | Identifiers:     subjectKeyIdentifier                     |
|       | OID:             2.5.29.14                                |
|       | DER:             06 03 55 1D 0E                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  SubjectKeyIdentifier                     |
+-------+-----------------------------------------------------------+
|     2 | Name:            Key Usage                                |
|       | Identifiers:     keyUsage                                 |
|       | OID:             2.5.29.15                                |
|       | DER:             06 03 55 1D 0F                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  KeyUsage                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Subject Alternative Name                 |
|       | Identifiers:     subjectAltName                           |
|       | OID:             2.5.29.17                                |
|       | DER:             06 03 55 1D 11                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  SubjectAltName                           |
+-------+-----------------------------------------------------------+
|     4 | Name:            Basic Constraints                        |
|       | Identifiers:     basicConstraints                         |
|       | OID:             2.5.29.19                                |
|       | DER:             06 03 55 1D 13                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  BasicConstraints                         |
+-------+-----------------------------------------------------------+
|     5 | Name:            CRL Distribution Points                  |
|       | Identifiers:     cRLDistributionPoints                    |
|       | OID:             2.5.29.31                                |
|       | DER:             06 03 55 1D 1F                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  CRLDistributionPoints                    |
+-------+-----------------------------------------------------------+
|     6 | Name:            Certificate Policies                     |
|       | Identifiers:     certificatePolicies                      |
|       | OID:             2.5.29.32                                |
|       | DER:             06 03 55 1D 20                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  CertificatePolicies                      |
+-------+-----------------------------------------------------------+
|     7 | Name:            Authority Key Identifier                 |
|       | Identifiers:     authorityKeyIdentifier                   |
|       | OID:             2.5.29.35                                |
|       | DER:             06 03 55 1D 23                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  AuthorityKeyIdentifier                   |
+-------+-----------------------------------------------------------+
|     8 | Name:            Extended Key Usage                       |
|       | Identifiers:     extKeyUsage                              |
|       | OID:             2.5.29.37                                |
|       | DER:             06 03 55 1D 25                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  ExtKeyUsageSyntax                        |
+-------+-----------------------------------------------------------+
|     9 | Name:            Authority Information Access             |
|       | Identifiers:     authorityInfoAccess                      |
|       | OID:             1.3.6.1.5.5.7.1.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 01            |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  AuthorityInfoAccessSyntax                |
+-------+-----------------------------------------------------------+
|    24 | Name:            Subject Directory Attributes             |
|       | Identifiers:     subjectDirectoryAttributes               |
|       | OID:             2.5.29.9                                 |
|       | DER:             06 03 55 1D 09                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  SubjectDirectoryAttributes               |
+-------+-----------------------------------------------------------+
|    25 | Name:            Issuer Alternative Name                  |
|       | Identifiers:     issuerAltName                            |
|       | OID:             2.5.29.18                                |
|       | DER:             06 03 55 1D 12                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  IssuerAltName                            |
+-------+-----------------------------------------------------------+
|    26 | Name:            Name Constraints                         |
|       | Identifiers:     nameConstraints                          |
|       | OID:             2.5.29.30                                |
|       | DER:             06 03 55 1D 1E                           |
|       | Comments:        RFC 9549                                 |
|       | extensionValue:  NameConstraints                          |
+-------+-----------------------------------------------------------+
|    27 | Name:            Policy Mappings                          |
|       | Identifiers:     policyMappings                           |
|       | OID:             2.5.29.33                                |
|       | DER:             06 03 55 1D 21                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  PolicyMappings                           |
+-------+-----------------------------------------------------------+
|    28 | Name:            Policy Constraints                       |
|       | Identifiers:     policyConstraints                        |
|       | OID:             2.5.29.36                                |
|       | DER:             06 03 55 1D 24                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  PolicyConstraints                        |
+-------+-----------------------------------------------------------+
|    29 | Name:            Freshest CRL                             |
|       | Identifiers:     freshestCRL                              |
|       | OID:             2.5.29.46                                |
|       | DER:             06 03 55 1D 2E                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  FreshestCRL                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Inhibit anyPolicy                        |
|       | Identifiers:     inhibitAnyPolicy                         |
|       | OID:             2.5.29.54                                |
|       | DER:             06 03 55 1D 36                           |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  InhibitAnyPolicy                         |
+-------+-----------------------------------------------------------+
|    31 | Name:            Subject Information Access               |
|       | Identifiers:     subjectInfoAccess                        |
|       | OID:             1.3.6.1.5.5.7.1.11                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 0B            |
|       | Comments:        RFC 5280                                 |
|       | extensionValue:  SubjectInfoAccessSyntax                  |
+-------+-----------------------------------------------------------+
|    32 | Name:            IPAddrBlocks                             |
|       | Identifiers:     id-pe-ipAddrBlocks                       |
|       | OID:             1.3.6.1.5.5.7.1.7                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 07            |
|       | Comments:        RFC 3779                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    33 | Name:            AS Identifiers                           |
|       | Identifiers:     id-pe-autonomousSysIds                   |
|       | OID:             1.3.6.1.5.5.7.1.8                        |
|       | DER:             06 08 2B 06 01 05 05 07 01 08            |
|       | Comments:        RFC 3779                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    34 | Name:            IPAddrBlocks v2                          |
|       | Identifiers:     id-pe-ipAddrBlocks-v2                    |
|       | OID:             1.3.6.1.5.5.7.1.28                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1C            |
|       | Comments:        RFC 8360                                 |
|       | extensionValue:  IPAddrBlocks                             |
+-------+-----------------------------------------------------------+
|    35 | Name:            AS Identifiers v2                        |
|       | Identifiers:     id-pe-autonomousSysIds-v2                |
|       | OID:             1.3.6.1.5.5.7.1.29                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 1D            |
|       | Comments:        RFC 8360                                 |
|       | extensionValue:  ASIdentifiers                            |
+-------+-----------------------------------------------------------+
|    36 | Name:            OCSP No Check                            |
|       | Identifiers:     id-pkix-ocsp-nocheck                     |
|       | OID:             1.3.6.1.5.5.7.48.1.5                     |
|       | DER:             06 09 2B 06 01 05 05 07 30 01 05         |
|       | Comments:        RFC 6960                                 |
|       | extensionValue:  null                                     |
+-------+-----------------------------------------------------------+
|    38 | Name:            TLS Features                             |
|       | Identifiers:     id-pe-tlsfeature                         |
|       | OID:             1.3.6.1.5.5.7.1.24                       |
|       | DER:             06 08 2B 06 01 05 05 07 01 18            |
|       | Comments:        RFC 7633                                 |
|       | extensionValue:  TLSFeatures                              |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="CP">
        <name>C509 Certificate Policies Registry</name>
        <t>IANA has created a new registry titled "C509 Certificate Policies" under the registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For all other values the registration procedure is "Expert Review". For Certificate Policies specified only for CBOR encoded certificates where no OID is defined, the OID and DER fields are marked "N/A". If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the Certificate Policy is described. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use.</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-cp">
          <name>C509 Certificate Policies</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Certificate Policy                                        |
+=======+===========================================================+
|     0 | Name:            Any Policy                               |
|       | Identifiers:     anyPolicy                                |
|       | OID:             2.5.29.32.0                              |
|       | DER:             06 04 55 1D 20 00                        |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|     1 | Name:            Domain Validation (DV)                   |
|       | Identifiers:     domain-validated                         |
|       | OID:             2.23.140.1.2.1                           |
|       | DER:             06 06 67 81 0C 01 02 01                  |
|       | Comments:        CA/Browser Forum                         |
+-------+-----------------------------------------------------------+
|     2 | Name:            Organization Validation (OV)             |
|       | Identifiers:     organization-validated                   |
|       | OID:             2.23.140.1.2.2                           |
|       | DER:             06 06 67 81 0C 01 02 02                  |
|       | Comments:        CA/Browser Forum                         |
+-------+-----------------------------------------------------------+
|     3 | Name:            Individual Validation (IV)               |
|       | Identifiers:     individual-validated                     |
|       | OID:             2.23.140.1.2.3                           |
|       | DER:             06 06 67 81 0C 01 02 03                  |
|       | Comments:        CA/Browser Forum                         |
+-------+-----------------------------------------------------------+
|     4 | Name:            Extended Validation (EV)                 |
|       | Identifiers:     ev-guidelines                            |
|       | OID:             2.23.140.1.1                             |
|       | DER:             06 05 67 81 0C 01 01                     |
|       | Comments:        CA/Browser Forum                         |
+-------+-----------------------------------------------------------+
|     7 | Name:            Resource PKI (RPKI)                      |
|       | Identifiers:     id-cp-ipAddr-asNumber                    |
|       | OID:             1.3.6.1.5.5.7.14.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 02            |
|       | Comments:        RFC 3779                                 |
+-------+-----------------------------------------------------------+
|     8 | Name:            Resource PKI (RPKI) (Alternative)        |
|       | Identifiers:     id-cp-ipAddr-asNumber-v2                 |
|       | OID:             1.3.6.1.5.5.7.14.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 0E 03            |
|       | Comments:        RFC 8360                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:            Remote SIM Provisioning Role             |
|       |                  Certificate Issuer                       |
|       | Identifiers:     id-rspRole-ci                            |
|       | OID:             2.23.146.1.2.1.0                         |
|       | DER:             06 07 67 81 12 01 02 01 00               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    25 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC v2                                 |
|       | Identifiers:     id-rspRole-euicc-v2                      |
|       | OID:             2.23.146.1.2.1.1                         |
|       | DER:             06 07 67 81 12 01 02 01 01               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    26 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC                                    |
|       | Identifiers:     id-rspRole-euicc                         |
|       | OID:             2.23.146.1.2.1.0.0.0.0.0                 |
|       | DER:             06 0B 67 81 12 01 02 01 00 00 00 00 00   |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    27 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer v2                    |
|       | Identifiers:     id-rspRole-eum-v2                        |
|       | OID:             2.23.146.1.2.1.2                         |
|       | DER:             06 07 67 81 12 01 02 01 02               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    28 | Name:            Remote SIM Provisioning Role             |
|       |                  eUICC Manufacturer                       |
|       | Identifiers:     id-rspRole-eum                           |
|       | OID:             2.23.146.1.2.1.0.0.0                     |
|       | DER:             06 09 67 81 12 01 02 01 00 00 00         |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    29 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS v2                            |
|       | Identifiers:     id-rspRole-dp-tls-v2                     |
|       | OID:             2.23.146.1.2.1.3                         |
|       | DER:             06 07 67 81 12 01 02 01 03               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    30 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ TLS                               |
|       | Identifiers:     id-rspRole-dp-tls                        |
|       | OID:             2.23.146.1.2.1.0.0.1.0                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 01 00      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    31 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication v2                 |
|       | Identifiers:     id-rspRole-dp-auth-v2                    |
|       | OID:             2.23.146.1.2.1.4                         |
|       | DER:             06 07 67 81 12 01 02 01 04               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    32 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Authentication                    |
|       | Identifiers:     id-rspRole-dp-auth                       |
|       | OID:             2.23.146.1.2.1.0.0.1.1                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 01 01      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    33 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding v2                |
|       | Identifiers:     id-rspRole-dp-pb-v2                      |
|       | OID:             2.23.146.1.2.1.5                         |
|       | DER:             06 07 67 81 12 01 02 01 05               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    34 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DP+ Profile Binding                   |
|       | Identifiers:     id-rspRole-dp-pb                         |
|       | OID:             2.23.146.1.2.1.0.0.1.2                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 01 02      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    35 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS v2                             |
|       | Identifiers:     id-rspRole-ds-tls-v2                     |
|       | OID:             2.23.146.1.2.1.6                         |
|       | DER:             06 07 67 81 12 01 02 01 06               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    36 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS TLS                                |
|       | Identifiers:     id-rspRole-ds-tls                        |
|       | OID:             2.23.146.1.2.1.0.0.2.0                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 02 00      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    37 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication v2                  |
|       | Identifiers:     id-rspRole-ds-auth-v2                    |
|       | OID:             2.23.146.1.2.1.7                         |
|       | DER:             06 07 67 81 12 01 02 01 07               |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
|    38 | Name:            Remote SIM Provisioning Role             |
|       |                  SM-DS Authentication                     |
|       | Identifiers:     id-rspRole-ds-auth                       |
|       | OID:             2.23.146.1.2.1.0.0.2.1                   |
|       | DER:             06 0A 67 81 12 01 02 01 00 00 02 01      |
|       | Comments:        GSMA SGP.22                              |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="PQ">
        <name>C509 Policies Qualifiers Registry</name>
        <t>IANA has created a new registry titled "C509 Policies Qualifiers" under the registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the Policy Qualifier is described. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review".</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-pq">
          <name>C509 Policies Qualifiers</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Policy Qualifier                                          |
+=======+===========================================================+
|     1 | Name:            Certification Practice Statement         |
|       | Identifiers:     id-qt-cps, cps                           |
|       | OID:             1.3.6.1.5.5.7.2.1                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 01            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            User Notice                              |
|       | Identifiers:     id-qt-unotice, unotice                   |
|       | OID:             1.3.6.1.5.5.7.2.2                        |
|       | DER:             06 08 2B 06 01 05 05 07 02 02            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="IA">
        <name>C509 Information Access Registry</name>
        <t>IANA has created a new registry titled "C509 Information Access" under the registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory.  If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the Information Access is described. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-ia">
          <name>C509 Information Accesses</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Information Access                                        |
+=======+===========================================================+
|     1 | Name:            OCSP                                     |
|       | Identifiers:     id-ad-ocsp, id-pkix-ocsp                 |
|       | OID:             1.3.6.1.5.5.7.48.1                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 01            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|     2 | Name:            CA Issuers                               |
|       | Identifiers:     id-ad-caIssuers, caIssuers               |
|       | OID:             1.3.6.1.5.5.7.48.2                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 02            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|     3 | Name:            Time Stamping                            |
|       | Identifiers:     id-ad-timeStamping, timeStamping         |
|       | OID:             1.3.6.1.5.5.7.48.3                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 03            |
|       | Comments:        RFC 3161                                 |
+-------+-----------------------------------------------------------+
|     5 | Name:            CA Repository                            |
|       | Identifiers:     id-ad-caRepository                       |
|       | OID:             1.3.6.1.5.5.7.48.5                       |
|       | DER:             06 08 2B 06 01 05 05 07 30 05            |
|       | Comments:        RFC 5280                                 |
+-------+-----------------------------------------------------------+
|    10 | Name:            RPKI Manifest                            |
|       | Identifiers:     id-ad-rpkiManifest                       |
|       | OID:             1.3.6.1.5.5.7.48.10                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0A            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    11 | Name:            Signed Object                            |
|       | Identifiers:     id-ad-signedObject                       |
|       | OID:             1.3.6.1.5.5.7.48.11                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0B            |
|       | Comments:        RFC 6487                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:            RPKI Notify                              |
|       | Identifiers:     id-ad-rpkiNotify                         |
|       | OID:             1.3.6.1.5.5.7.48.13                      |
|       | DER:             06 08 2B 06 01 05 05 07 30 0D            |
|       | Comments:        RFC 8182                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="EKU">
        <name>C509 Extended Key Usages Registry</name>
        <t>IANA has created a new registry titled "C509 Extended Key Usages" under the registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Identifiers, OID, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, and DER are mandatory. For Extended Key Usage specified only for CBOR encoded certificates where no OID is defined, the OID and DER fields are marked "N/A". If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the Extended Key Usage is described. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". Values <contact fullname="≥"/> 32768 are reserved for Private Use. For all other values the registration procedure is "Expert Review".</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-eku">
          <name>C509 Extended Key Usages</name>
          <artwork align="center"><![CDATA[
+-------+---------------------------------------------------------+
| Value | Extended Key Usage                                      |
+=======+=========================================================+
|     0 | Name:            Any Extended Key Usage                 |
|       | Identifiers:     anyExtendedKeyUsage                    |
|       | OID:             2.5.29.37.0                            |
|       | DER:             06 04 55 1D 25 00                      |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     1 | Name:            TLS Server authentication              |
|       | Identifiers:     id-kp-serverAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.1                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 01          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     2 | Name:            TLS Client Authentication              |
|       | Identifiers:     id-kp-clientAuth                       |
|       | OID:             1.3.6.1.5.5.7.3.2                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 02          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     3 | Name:            Code Signing                           |
|       | Identifiers:     id-kp-codeSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.3                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 03          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     4 | Name:            Email protection (S/MIME)              |
|       | Identifiers:     id-kp-emailProtection                  |
|       | OID:             1.3.6.1.5.5.7.3.4                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 04          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|     8 | Name:            Time Stamping                          |
|       | Identifiers:     id-kp-timeStamping, timestamping       |
|       | OID:             1.3.6.1.5.5.7.3.8                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 08          |
|       | Comments:        RFC 3161                               |
+-------+---------------------------------------------------------+
|     9 | Name:            OCSP Signing                           |
|       | Identifiers:     id-kp-OCSPSigning                      |
|       | OID:             1.3.6.1.5.5.7.3.9                      |
|       | DER:             06 08 2B 06 01 05 05 07 03 09          |
|       | Comments:        RFC 5280                               |
+-------+---------------------------------------------------------+
|    10 | Name:            Kerberos PKINIT Client Auth            |
|       | Identifiers:     id-pkinit-KPClientAuth                 |
|       | OID:             1.3.6.1.5.2.3.4                        |
|       | DER:             06 07 2B 06 01 05 02 03 04             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    11 | Name:            Kerberos PKINIT KDC                    |
|       | Identifiers:     id-pkinit-KPKdc                        |
|       | OID:             1.3.6.1.5.2.3.5                        |
|       | DER:             06 07 2B 06 01 05 02 03 05             |
|       | Comments:        RFC 4556                               |
+-------+---------------------------------------------------------+
|    12 | Name:            SSH Client                             |
|       | Identifiers:     id-kp-secureShellClient                |
|       | OID:             1.3.6.1.5.5.7.3.21                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 15          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    13 | Name:            SSH Server                             |
|       | Identifiers:     id-kp-secureShellServer                |
|       | OID:             1.3.6.1.5.5.7.3.22                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 16          |
|       | Comments:        RFC 6187                               |
+-------+---------------------------------------------------------+
|    14 | Name:            Bundle Security                        |
|       | Identifiers:     id-kp-bundleSecurity                   |
|       | OID:             1.3.6.1.5.5.7.3.35                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 23          |
|       | Comments:        RFC 9174                               |
+-------+---------------------------------------------------------+
|    15 | Name:            CMC Certification Authority            |
|       | Identifiers:     id-kp-cmcCA                            |
|       | OID:             1.3.6.1.5.5.7.3.27                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1B          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    16 | Name:            CMC Registration Authority             |
|       | Identifiers:     id-kp-cmcRA                            |
|       | OID:             1.3.6.1.5.5.7.3.28                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1C          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    17 | Name:            CMC Archive Server                     |
|       | Identifiers:     id-kp-cmcArchive                       |
|       | OID:             1.3.6.1.5.5.7.3.29                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 1D          |
|       | Comments:        RFC 6402                               |
+-------+---------------------------------------------------------+
|    18 | Name:            CMC Key Generation Authority           |
|       | Identifiers:     id-kp-cmKGA                            |
|       | OID:             1.3.6.1.5.5.7.3.32                     |
|       | DER:             06 08 2B 06 01 05 05 07 03 20          |
|       | Comments:        RFC 9480                               |
+-------+---------------------------------------------------------+
|    20 | Name:            Wi-SUN FAN Device                      |
|       | Identifiers:     id-kp-wisun-fan-device                 |
|       | OID:             1.3.6.1.4.1.45605.1                    |
|       | DER:             06 09 2B 06 01 04 01 82 E4 25 01       |
|       | Comments:                                               |
+-------+---------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="GN">
        <name>C509 General Names Registry</name>
        <t>IANA has created a new registry titled "C509 General Names" under the registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Comments, GeneralNameValue, and Reference, where Value is an integer, and the other columns are text strings. The fields Name and GeneralNameValue are mandatory. If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the General Name is described. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review".</t>
        <t>The initial contents of the registry are:</t>
        <figure anchor="fig-gn">
          <name>C509 General Names</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | General Name                                              |
+=======+===========================================================+
|    -3 | Name:             otherName with MACAddress               |
|       | Comments:         TBD92(Use RFC I-D-lamps-macaddress-on)  |
|       |                   id-on-MACAddress                        |
|       |                   (1.3.6.1.5.5.7.8.12)                    |
|       |                   06 08 2B 06 01 05 05 07 08 0C           |
|       | GeneralNameValue: bytes                                   |
+-------+-----------------------------------------------------------+
|    -2 | Name:             otherName with SmtpUTF8Mailbox          |
|       | Comments:         RFC 9598                                |
|       |                   id-on-SmtpUTF8Mailbox                   |
|       |                   (1.3.6.1.5.5.7.8.9)                     |
|       |                   06 08 2B 06 01 05 05 07 08 09           |
|       | GeneralNameValue: text                                    |
+-------+-----------------------------------------------------------+
|    -1 | Name:             otherName with hardwareModuleName       |
|       | Comments:         RFC 4108                                |
|       |                   id-on-hardwareModuleName                |
|       |                   (1.3.6.1.5.5.7.8.4)                     |
|       |                   06 08 2B 06 01 05 05 07 08 04           |
|       | GeneralNameValue: [ ~oid, bytes ]                         |
+-------+-----------------------------------------------------------+
|     0 | Name:             otherName                               |
|       | Comments:         RFC 5280                                |
|       | GeneralNameValue: [ ~oid, bytes ]                         |
+-------+-----------------------------------------------------------+
|     1 | Name:             rfc822Name                              |
|       | Comments:         RFC 5280                                |
|       | GeneralNameValue: text                                    |
+-------+-----------------------------------------------------------+
|     2 | Name:             dNSName                                 |
|       | Comments:         RFC 5280                                |
|       | GeneralNameValue: text                                    |
+-------+-----------------------------------------------------------+
|     4 | Name:             directoryName                           |
|       | Comments:         RFC 5280                                |
|       | GeneralNameValue: Name                                    |
+-------+-----------------------------------------------------------+
|     6 | Name:             uniformResourceIdentifier               |
|       | Comments:         RFC 5280                                |
|       | GeneralNameValue: text                                    |
+-------+-----------------------------------------------------------+
|     7 | Name:             iPAddress                               |
|       | Comments:         RFC 5280                                |
|       | GeneralNameValue: bytes                                   |
+-------+-----------------------------------------------------------+
|     8 | Name:             registeredID                            |
|       | Comments          RFC 5280                                |
|       | GeneralNameValue: ~oid                                    |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sigalg">
        <name>C509 Signature Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Signature Algorithms" under the registry group "CBOR Encoded X.509 (C509)". The registry includes both signature algorithms and non-signature proof-of-possession algorithms. The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. Alignment with the value of public key algorithm must be considered, see instruction in <xref target="pkalg"/>.  If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the Signature Algorithm is described. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <!-- NOTE: Check referenced section number hardcoded in the table. -->

<figure anchor="fig-sigalgs">
          <name>C509 Signature Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Signature Algorithm                                       |
+=======+===========================================================+
|  -256 | Name:        RSASSA-PKCS1-v1_5 with SHA-1                 |
|       | Identifiers: sha1-with-rsa-signature,                     |
|       |              sha1WithRSAEncryption,                       |
|       |              sha-1WithRSAEncryption                       |
|       | OID:         1.2.840.113549.1.1.5                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|  -255 | Name:        ECDSA with SHA-1                             |
|       | Identifiers: ecdsa-with-SHA1                              |
|       | OID:         1.2.840.10045.4.1                            |
|       | Parameters:  Absent                                       |
|       | DER:         30 09 06 07 2A 86 48 CE 3D 04 01             |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     0 | Name:        ECDSA with SHA-256                           |
|       | Identifiers: ecdsa-with-SHA256                            |
|       | OID:         1.2.840.10045.4.3.2                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 02          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     1 | Name:        ECDSA with SHA-384                           |
|       | Identifiers: ecdsa-with-SHA384                            |
|       | OID:         1.2.840.10045.4.3.3                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 03          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     2 | Name:        ECDSA with SHA-512                           |
|       | Identifiers: ecdsa-with-SHA512                            |
|       | OID:         1.2.840.10045.4.3.4                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 86 48 CE 3D 04 03 04          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     3 | Name:        ECDSA with SHAKE128                          |
|       | Identifiers: id-ecdsa-with-shake128                       |
|       | OID:         1.3.6.1.5.5.7.6.32                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 20          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     4 | Name:        ECDSA with SHAKE256                          |
|       | Identifiers: id-ecdsa-with-shake256                       |
|       | OID:         1.3.6.1.5.5.7.6.33                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 21          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|     5 | Name:        Unsigned                                     |
|       | Identifiers: id-alg-unsigned                              |
|       | OID:         1.3.6.1.5.5.7.6.36                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 24          |
|       | Comments:    bytes of size 0                              |
+-------+-----------------------------------------------------------+
|     8 | Name:        SM2 with SM3                                 |
|       | Identifiers: sm2-with-sm3                                 |
|       | OID:         1.2.156.10197.1.501                          |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2A 81 1C CF 55 01 83 75          |
|       | Comments:    See Section 3.2.2.                           |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519                                      |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448                                        |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    14 | Name:        PoP with SHA-256 and HMAC-SHA256             |
|       | Identifiers: sa-ecdhPop-sha256-hmac-sha256                |
|       | OID:         1.3.6.1.5.5.7.6.26                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1A          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    15 | Name:        PoP with SHA-384 and HMAC-SHA384             |
|       | Identifiers: sa-ecdhPop-sha384-hmac-sha384                |
|       | OID:         1.3.6.1.5.5.7.6.27                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1B          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    16 | Name:        PoP with SHA-512 and HMAC-SHA512             |
|       | Identifiers: sa-ecdhPop-sha512-hmac-sha512                |
|       | OID:         1.3.6.1.5.5.7.6.28                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1C          |
|       | Comments:    Proof-of-possession algorithm, indexed with  |
|       |              KDF and MAC, see RFC 6955. Requires          |
|       |              recipient's public static Diffie-Hellman key |
+-------+-----------------------------------------------------------+
|    23 | Name:        RSASSA-PKCS1-v1_5 with SHA-256               |
|       | Identifiers: sha256WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.11                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        RSASSA-PKCS1-v1_5 with SHA-384               |
|       | Identifiers: sha384WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.12                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0C 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    25 | Name:        RSASSA-PKCS1-v1_5 with SHA-512               |
|       | Identifiers: sha512WithRSAEncryption                      |
|       | OID:         1.2.840.113549.1.1.13                        |
|       | Parameters:  NULL                                         |
|       | DER:         30 0B 06 09 2A 86 48 86 F7 0D 01 01 0D 05 00 |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    26 | Name:        RSASSA-PSS with SHA-256                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-256, MGF-1 with SHA-256, saltLength = 32 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 01 |
|       |              05 00 A2 03 02 01 20                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    27 | Name:        RSASSA-PSS with SHA-384                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-384, MGF-1 with SHA-384, saltLength = 48 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 02 |
|       |              05 00 A2 03 02 01 30                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    28 | Name:        RSASSA-PSS with SHA-512                      |
|       | Identifiers: rsassa-pss, id-RSASSA-PSS                    |
|       | OID:         1.2.840.113549.1.1.10                        |
|       | Parameters:  SHA-512, MGF-1 with SHA-512, saltLength = 64 |
|       | DER:         30 41 06 09 2A 86 48 86 F7 0D 01 01 0A 30 34 |
|       |              A0 0F 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A1 1C 30 1A 06 09 2A 86 48 86 F7 0D 01 |
|       |              01 08 30 0D 06 09 60 86 48 01 65 03 04 02 03 |
|       |              05 00 A2 03 02 01 40                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    29 | Name:        RSASSA-PSS with SHAKE128                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE128                       |
|       | OID:         1.3.6.1.5.5.7.6.30                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1E          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    30 | Name:        RSASSA-PSS with SHAKE256                     |
|       | Identifiers: id-RSASSA-PSS-SHAKE256                       |
|       | OID:         1.3.6.1.5.5.7.6.31                           |
|       | Parameters:  Absent                                       |
|       | DER:         30 0A 06 08 2B 06 01 05 05 07 06 1F          |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="pkalg">
        <name>C509 Public Key Algorithms Registry</name>
        <t>IANA has created a new registry titled "C509 Public Key Algorithms" under the registry group "CBOR Encoded X.509 (C509)". The fields of the registry are Value, Name, Identifiers, OID, Parameters, DER, Comments, and Reference, where Value is an integer, and the other columns are text strings. The fields Name, OID, Parameters, and DER are mandatory. If the public key can only be used with one signature algorithm and the OID of the public key algorithm is the same as the signature algorithm, then the value must be chosen equal to the value of signature algorithm, see <xref target="sigalg"/>. If it is not expected to be understood from the other information (e.g. the OID), then the Comments field must contain a reference to where the Public Key Algorithm is described. For values in the interval [-24, 23] the registration procedure is "IETF Review with Expert Review". For all other values the registration procedure is "Expert Review". The initial contents of the registry are:</t>
        <figure anchor="fig-pkalgs">
          <name>C509 Public Key Algorithms</name>
          <artwork align="center"><![CDATA[
+-------+-----------------------------------------------------------+
| Value | Public Key Algorithm                                      |
+=======+===========================================================+
|     0 | Name:        RSA                                          |
|       | Identifiers: rsaEncryption                                |
|       | OID:         1.2.840.113549.1.1.1                         |
|       | Parameters:  NULL                                         |
|       | DER:         30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
+-------+-----------------------------------------------------------+
|     1 | Name:        EC Public Key (Weierstrass) with secp256r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp256r1 (1.2.840.10045.3.1.7) |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 |
|       |              48 CE 3D 03 01 07                            |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
|       |              Also known as P-256, ansip256r1, prime256v1  |
+-------+-----------------------------------------------------------+
|     2 | Name:        EC Public Key (Weierstrass) with secp384r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp384r1 (1.3.132.0.34)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 22                                     |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
|       |              Also known as P-384, ansip384r1              |
+-------+-----------------------------------------------------------+
|     3 | Name:        EC Public Key (Weierstrass) with secp521r1   |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = secp521r1 (1.3.132.0.35)        |
|       | DER:         30 10 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 |
|       |              04 00 23                                     |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
|       |              Also known as P-521, ansip521r1              |
+-------+-----------------------------------------------------------+
|     6 | Name:        EC Public Key (Weierstrass) with             |
|       |              sm2p256v1                                    |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = sm2p256v1                       |
|       |              (1.2.156.10197.1.301)                        |
|       | DER:         30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 81 |
|       |              1C CF 55 01 82 2D                            |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
+-------+-----------------------------------------------------------+
|     8 | Name:        X25519 (Montgomery)                          |
|       | Identifiers: id-X25519                                    |
|       | OID:         1.3.101.110                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6E                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|     9 | Name:        X448 (Montgomery)                            |
|       | Identifiers: id-X448                                      |
|       | OID:         1.3.101.111                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 6F                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    12 | Name:        Ed25519 (Twisted Edwards)                    |
|       | Identifiers: id-Ed25519, id-EdDSA25519                    |
|       | OID:         1.3.101.112                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 70                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    13 | Name:        Ed448 (Edwards)                              |
|       | Identifiers: id-Ed448, id-EdDSA448                        |
|       | OID:         1.3.101.113                                  |
|       | Parameters:  Absent                                       |
|       | DER:         30 05 06 03 2B 65 71                         |
|       | Comments:                                                 |
+-------+-----------------------------------------------------------+
|    24 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP256r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP256r1                 |
|       |              (1.3.36.3.3.2.8.1.1.7)                       |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 07                         |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
+-------+-----------------------------------------------------------+
|    25 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP384r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP384r1                 |
|       |              (1.3.36.3.3.2.8.1.1.11)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0B                         |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
+-------+-----------------------------------------------------------+
|    26 | Name:        EC Public Key (Weierstrass) with             |
|       |              brainpoolP512r1                              |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = brainpoolP512r1                 |
|       |              (1.3.36.3.3.2.8.1.1.13)                      |
|       | DER:         30 14 06 07 2A 86 48 CE 3D 02 01 06 09 2B 24 |
|       |              03 03 02 08 01 01 0D                         |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
+-------+-----------------------------------------------------------+
|    27 | Name:        EC Public Key (Weierstrass) with             |
|       |              FRP256v1                                     |
|       | Identifiers: ecPublicKey, id-ecPublicKey                  |
|       | OID:         1.2.840.10045.2.1                            |
|       | Parameters:  namedCurve = FRP256v1                        |
|       |              (1.2.250.1.223.101.256.1)                    |
|       | DER:         30 15 06 07 2A 86 48 CE 3D 02 01 06 0A 2A 81 |
|       |              7A 01 81 5F 65 82 00 01                      |
|       | Comments:    subjectPublicKey encoded as in Section 3.2.1 |
+-------+-----------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="cose">
        <name>COSE Header Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-header"/> to the "COSE Header Parameters" registry in the registry group "CBOR Object Signing and Encryption (COSE)" with this document as reference.</t>
      </section>
      <section anchor="cose-alg">
        <name>COSE Header Algorithm Parameters Registry</name>
        <t>IANA is requested to assign the entries in <xref target="iana-sender"/> to the "COSE Header Algorithm Parameters" registry in the registry group "CBOR Object Signing and Encryption (COSE)" with this document as reference.</t>
      </section>
      <section anchor="media-type-application-registry">
        <name>Media Type Application Registry</name>
        <t>IANA is requested to assign the following entries into the "application" registry in the registry group "Media Types" with this document as reference.</t>
        <section anchor="c509-cert">
          <name>Media Type application/cose-c509-cert</name>
          <t>When the application/cose-c509-cert media type is used, the data is a COSE_C509 structure. If the parameter "usage" is set to "chain", this sequence indicates a certificate chain.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-cert</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about the intended meaning of the order in the CBOR sequence of certificates.</t>
            </li>
            <li>
              <t>Can be set to "chain" to indicate that the sequence of data items is to be interpreted as a certificate chain.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD8, TBD6</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pkcs10">
          <name>Media Type application/cose-c509-pkcs10</name>
          <t>When the application/cose-c509-pkcs10 media type is used, the data is a C509CertificationRequest structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pkcs10</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certification Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD9</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-crtemplate">
          <name>Media Type application/cose-c509-crtemplate</name>
          <t>When the application/cose-c509-crtemplate media type is used, the data is a C509CertificationRequestTemplate structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-crtemplate</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and C509 Certification Request.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD18</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-privkey">
          <name>Media Type application/cose-c509-privkey</name>
          <t>When the application/cose-c509-privkey media type is used, the data is a C509PrivateKey structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-privkey</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD12</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="c509-pem">
          <name>Media Type application/cose-c509-pem</name>
          <t>When the application/cose-c509-pem media type is used, the data is a C509PEM structure.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-c509-pem</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of [[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use C509 as a certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): TBD13</t>
            </li>
            <li>
              <t>File extension(s): .c509</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
        <section anchor="cose-certhash">
          <name>Media Type application/cose-certhash</name>
          <t>When the application/cose-certhash media type is used, the data is a COSE_CertHash structure as defined in <xref target="RFC9360"/>. If the parameter "usage" is set to "c509", the hash value is calculated over a C509 certificate.</t>
          <t>Type name: application</t>
          <t>Subtype name: cose-certhash</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: usage</t>
          <ul spacing="normal">
            <li>
              <t>Can be absent to provide no further information about what the hash value is calculated over.</t>
            </li>
            <li>
              <t>Can be set to "c509" to indicate that the COSE_CertHash structure as defined in <xref target="RFC9360"/> is used, with hashValue calculated over a C509 certificate as defined in <xref target="cose-header-params"/>.</t>
            </li>
          </ul>
          <t>Encoding considerations: binary</t>
          <t>Security considerations: See the Security Considerations section of <xref target="RFC9360"/>.</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: [[this document]]</t>
          <t>Applications that use this media type: Applications that employ COSE and use X.509 or C509 as certificate type.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:</t>
          <ul spacing="normal">
            <li>
              <t>Deprecated alias names for this type: N/A</t>
            </li>
            <li>
              <t>Magic number(s): N/A</t>
            </li>
            <li>
              <t>File extension(s): N/A</t>
            </li>
            <li>
              <t>Macintosh file type code(s): N/A</t>
            </li>
          </ul>
          <t>Person &amp; email address to contact for further information: iesg@ietf.org</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: COSE WG</t>
          <t>Change controller: IETF</t>
        </section>
      </section>
      <section anchor="content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is requested to add entries for "application/cose-c509-cert", "application/cose-c509-pkcs10", "application/cose-c509-crtemplate", "application/cose-c509-privkey" and "application/cose-c509-pem" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters".
A dedicated Content-Format ID is requested for the "application/cose-c509-cert" media type in the case when the parameter "usage" is set to "chain", see <xref target="c509-cert"/>.</t>
        <t>IANA is requested to add entries for "application/cose-certhash" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters". A dedicated Content-Format ID is requested  in the case when the parameter "usage" is set to "c509", see <xref target="cose-certhash"/>.</t>
        <t>IANA is requested to add entries for "application/cbor" to the "CoAP Content-Formats" registry in the registry group "Constrained RESTful Environments (CoRE) Parameters", in the case when the encoding is a CBOR text string containing a URI, see <xref target="RFC3986"/>.</t>
        <figure anchor="fig-format-ids">
          <name>CoAP Content-Format IDs</name>
          <artwork><![CDATA[
+----------------------+---------+-----------+-------+------------+
| Content              | Content | Media     | ID    | Reference  |
| Format               | Coding  | Type      |       |            |
+======================+=========+===========+=======+============+
| application/         | -       | [[link    | TBD3  | [[this     |
| cose-c509-cert       |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         |         | [[link    |       | [[this     |
| cose-c509-cert;      | -       | to 8.18]] | TBD15 | document]] |
| usage=chain          |         |           |       |            |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD4  | [[this     |
| cose-c509-pkcs10     |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD19 | [[this     |
| cose-c509-crtemplate |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD10 | [[this     |
| cose-c509-privkey    |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD11 | [[this     |
| cose-c509-pem        |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         | -       | [[link    | TBD16 | [[this     |
| cose-certhash        |         | to 8.18]] |       | document]] |
+----------------------+---------+-----------+-------+------------+
| application/         |         | [[link    |       | [[this     |
| cose-certhash;       | -       | to 8.18]] | TBD17 | document]] |
| usage=c509           |         |           |       |            |
+----------------------+---------+-----------+-------+------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="tls">
        <name>TLS Certificate Types Registry</name>
        <t>This document registers the following entry in the "TLS Certificate Types" registry in the registry group "Transport Layer Security (TLS) Extensions". The new certificate type can be used with additional TLS certificate compression <xref target="RFC8879"/>. For TLS 1.3, the C509 certificate type is defined as a new case in the CertificateEntry struct specified in <xref section="4.4.2" sectionFormat="of" target="RFC8446"/>:</t>
        <artwork><![CDATA[
case C509:
  opaque c509_data<1..2^24-1>;
]]></artwork>
        <t>where c509_data is the CBOR sequence ~C509Certificate (an unwrapped C509Certificate). For TLS 1.2 the same construction is applied with a similar union type defined for the Certificate struct in <xref section="7.4.2" sectionFormat="of" target="RFC5246"/>. Note that, similar to COSE_C509, the TLS handshake contains the length of each certificate. The TLS extensions client_certificate_type and server_certificate_type <xref target="RFC7250"/> are used to negotiate the use of C509.</t>
        <artwork><![CDATA[
+-------+------------------+-------------+--------------------------+
| Value | Name             | Recommended | Comment                  |
+=======+==================+=============+==========================+
|  TBD5 | C509 Certificate |           N |                          |
+-------+------------------+-------------+--------------------------+
]]></artwork>
      </section>
      <section anchor="tlsa">
        <name>TLSA Selectors Registry</name>
        <t>This document registers the following entry in the "TLSA Selectors" registry in the registry group "DNS-Based Authentication of Named Entities (DANE) Parameters". The C509 certificate data, C509CertData, is defined in <xref target="cose-header-params"/>.</t>
        <artwork><![CDATA[
+-------+---------+------------------------+-------------------+
| Value | Acronym |   Short Description    |     Reference     |
+=======+=========+========================+===================+
|  TBD7 |    C509 | C509 certificate data  | [[this document]] |
+-------+---------+------------------------+-------------------+
]]></artwork>
        <t>The TLSA selectors registry defined in <xref target="RFC6698"/> originally only applied to PKIX <xref target="RFC5280"/> certificates in DER encoding. This specification updates <xref target="RFC6698"/> to accept the use of C509 certificates.</t>
      </section>
      <section anchor="edhoc-authentication-credential-types-registry">
        <name>EDHOC Authentication Credential Types Registry</name>
        <t>This document registers the following entry in the "EDHOC Authentication Credential Types" registry in the registry group "Ephemeral Diffie-Hellman Over COSE (EDHOC)". This is useful to identify C509 certificates as a supported authentication credential type to use with EDHOC <xref target="RFC9528"/>, for example, during discovery of EDHOC resources, see <xref target="RFC9668"/>.</t>
        <artwork><![CDATA[
+-------+----------------------+-------------------+
| Value | Description          |     Reference     |
+=======+======================+===================+
|   3   | C509 certificate     | [[this document]] |
+-------+----------------------+-------------------+
]]></artwork>
      </section>
      <section anchor="relative-distinguished-name-attribute">
        <name>Relative Distinguished Name Attribute</name>
        <t>This document registers the following entry in the "SMI Security for PKIX Relative Distinguished Name Attribute" registry <xref target="RFC7299"/>:</t>
        <artwork><![CDATA[
+---------+----------------------+-------------------+
| Decimal | Description          |     Reference     |
+=========+======================+===================+
| TBD30   | id-rdna-c509Name     | [[this document]] |
+---------+----------------------+-------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2985">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from that specification. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5958">
          <front>
            <title>Asymmetric Key Packages</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>This document defines the syntax for private-key information and a content type for it. Private-key information includes a private key for a specified public-key algorithm and a set of attributes. The Cryptographic Message Syntax (CMS), as defined in RFC 5652, can be used to digitally sign, digest, authenticate, or encrypt the asymmetric key format content type. This document obsoletes RFC 5208. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5958"/>
          <seriesInfo name="DOI" value="10.17487/RFC5958"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="RFC6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8295">
          <front>
            <title>EST (Enrollment over Secure Transport) Extensions</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The EST (Enrollment over Secure Transport) protocol defines the Well-Known URI (Uniform Resource Identifier) -- /.well-known/est -- along with a number of other path components that clients use for PKI (Public Key Infrastructure) services, namely certificate enrollment (e.g., /simpleenroll). This document defines a number of other PKI services as additional path components -- specifically, firmware and trust anchors as well as symmetric, asymmetric, and encrypted keys. This document also specifies the PAL (Package Availability List), which is an XML (Extensible Markup Language) file or JSON (JavaScript Object Notation) object that clients use to retrieve packages available and authorized for them. This document extends the EST server path components to provide these additional services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8295"/>
          <seriesInfo name="DOI" value="10.17487/RFC8295"/>
        </reference>
        <reference anchor="RFC8360">
          <front>
            <title>Resource Public Key Infrastructure (RPKI) Validation Reconsidered</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="C. Martinez" initials="C." surname="Martinez"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="D. Shaw" initials="D." surname="Shaw"/>
            <date month="April" year="2018"/>
            <abstract>
              <t>This document specifies an alternative to the certificate validation procedure specified in RFC 6487 that reduces aspects of operational fragility in the management of certificates in the Resource Public Key Infrastructure (RPKI), while retaining essential security features.</t>
              <t>The procedure specified in RFC 6487 requires that Resource Certificates are rejected entirely if they are found to overclaim any resources not contained on the issuing certificate, whereas the validation process defined here allows an issuing Certification Authority (CA) to chose to communicate that such Resource Certificates should be accepted for the intersection of their resources and the issuing certificate.</t>
              <t>It should be noted that the validation process defined here considers validation under a single trust anchor (TA) only. In particular, concerns regarding overclaims where multiple configured TAs claim overlapping resources are considered out of scope for this document.</t>
              <t>This choice is signaled by a set of alternative Object Identifiers (OIDs) per "X.509 Extensions for IP Addresses and AS Identifiers" (RFC 3779) and "Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI)" (RFC 6484). It should be noted that in case these OIDs are not used for any certificate under a trust anchor, the validation procedure defined here has the same outcome as the procedure defined in RFC 6487.</t>
              <t>Furthermore, this document provides an alternative to Route Origin Authorization (ROA) (RFC 6482) and BGPsec Router Certificate (BGPsec PKI Profiles -- publication requested) validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8360"/>
          <seriesInfo name="DOI" value="10.17487/RFC8360"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9090">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags for Object Identifiers</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR), defined in RFC 8949, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.</t>
              <t>This document defines CBOR tags for object identifiers (OIDs) and is the reference document for the IANA registration of the CBOR tags so defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9090"/>
          <seriesInfo name="DOI" value="10.17487/RFC9090"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9542">
          <front>
            <title>IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="Y. Li" initials="Y." surname="Li"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>Some IETF protocols make use of Ethernet frame formats and IEEE 802 parameters. This document discusses several aspects of such parameters and their use in IETF protocols, specifies IANA considerations for assignment of points under the IANA Organizationally Unique Identifier (OUI), and provides some values for use in documentation. This document obsoletes RFC 7042.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="141"/>
          <seriesInfo name="RFC" value="9542"/>
          <seriesInfo name="DOI" value="10.17487/RFC9542"/>
        </reference>
        <reference anchor="RFC9549">
          <front>
            <title>Internationalization Updates to RFC 5280</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The updates to RFC 5280 described in this document provide alignment with the 2008 specification for Internationalized Domain Names (IDNs) and includes support for internationalized email addresses in X.509 certificates. The updates ensure that name constraints for email addresses that contain only ASCII characters and internationalized email addresses are handled in the same manner. This document obsoletes RFC 8399.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9549"/>
          <seriesInfo name="DOI" value="10.17487/RFC9549"/>
        </reference>
        <reference anchor="RFC9598">
          <front>
            <title>Internationalized Email Addresses in X.509 Certificates</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <author fullname="W. Chuang" initials="W." surname="Chuang"/>
            <author fullname="C. Bonnell" initials="C." surname="Bonnell"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a new name form for inclusion in the otherName field of an X.509 Subject Alternative Name and Issuer Alternative Name extension that allows a certificate subject to be associated with an internationalized email address.</t>
              <t>This document updates RFC 5280 and obsoletes RFC 8398.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9598"/>
          <seriesInfo name="DOI" value="10.17487/RFC9598"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
        <reference anchor="RFC9883">
          <front>
            <title>An Attribute for Statement of Possession of a Private Key</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>This document specifies an attribute for a statement of possession of a private key by a certificate subject. As part of X.509 certificate enrollment, a Certification Authority (CA) typically demands proof that the subject possesses the private key that corresponds to the to-be-certified public key. In some cases, a CA might accept a signed statement from the certificate subject. For example, when a certificate subject needs separate certificates for signature and key establishment, a statement that can be validated with the previously issued signature certificate for the same subject might be adequate for subsequent issuance of the key establishment certificate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9883"/>
          <seriesInfo name="DOI" value="10.17487/RFC9883"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-macaddress-on">
          <front>
            <title>Media Access Control (MAC) Addresses in X.509 Certificates</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Corey Bonnell" initials="C." surname="Bonnell">
              <organization>DigiCert, Inc.</organization>
            </author>
            <author fullname="Joe Mandel" initials="J." surname="Mandel">
              <organization>AKAYLA, Inc.</organization>
            </author>
            <author fullname="Tomofumi Okubo" initials="T." surname="Okubo">
              <organization>Penguin Securities Pte. Ltd.</organization>
            </author>
            <author fullname="Michael StJohns" initials="M." surname="StJohns">
              <organization>NthPermutation Security LLC</organization>
            </author>
            <date day="12" month="March" year="2026"/>
            <abstract>
              <t>   This document defines a new GeneralName.otherName for inclusion in
   the X.509 Subject Alternative Name (SAN) and Issuer Alternative Name
   (IAN) extensions to carry an IEEE Media Access Control (MAC) address.
   The new name form makes it possible to bind a layer-2 interface
   identifier to a public key certificate.  Additionally, this document
   defines how constraints on this name form can be encoded and
   processed in the X.509 Name Constraints extension (NCE).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-macaddress-on-07"/>
        </reference>
        <reference anchor="POSIX" target="https://pubs.opengroup.org/onlinepubs/9699919799/">
          <front>
            <title>IEEE Standard for Information Technology--Portable Operating System Interface (POSIX(TM)) Base Specifications, Issue 7</title>
            <author>
              <organization/>
            </author>
            <date year="2018" month="January"/>
          </front>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="X.501" target="https://www.itu.int/rec/T-REC-X.501/en">
          <front>
            <title>Information Technology - Open Systems Interconnection - The Directory: Models, ITU-T X.501</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="X.520" target="https://www.itu.int/rec/T-REC-X.520/en">
          <front>
            <title>Information Technology - Open Systems Interconnection - The Directory: Selected attribute types</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="October"/>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690">
          <front>
            <title>ASN.1 encoding rules. Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Wi-SUN" target="https://wi-sun.org">
          <front>
            <title>Wi-SUN Alliance</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3161">
          <front>
            <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="P. Cain" initials="P." surname="Cain"/>
            <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
            <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
            <date month="August" year="2001"/>
            <abstract>
              <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3161"/>
          <seriesInfo name="DOI" value="10.17487/RFC3161"/>
        </reference>
        <reference anchor="RFC4524">
          <front>
            <title>COSINE LDAP/X.500 Schema</title>
            <author fullname="K. Zeilenga" initials="K." role="editor" surname="Zeilenga"/>
            <date month="June" year="2006"/>
            <abstract>
              <t>This document provides a collection of schema elements for use with the Lightweight Directory Access Protocol (LDAP) from the COSINE and Internet X.500 pilot projects.</t>
              <t>This document obsoletes RFC 1274 and updates RFCs 2247 and 2798. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4524"/>
          <seriesInfo name="DOI" value="10.17487/RFC4524"/>
        </reference>
        <reference anchor="RFC6487">
          <front>
            <title>A Profile for X.509 PKIX Resource Certificates</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer's authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This document contains the normative specification of Certificate and Certificate Revocation List (CRL) syntax in the Resource Public Key Infrastructure (RPKI). This document also specifies profiles for the format of certificate requests and specifies the Relying Party RPKI certificate path validation procedure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6487"/>
          <seriesInfo name="DOI" value="10.17487/RFC6487"/>
        </reference>
        <reference anchor="RFC6955">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <author fullname="R. Ankney" initials="R." surname="Ankney"/>
            <author fullname="A. Malpani" initials="A." surname="Malpani"/>
            <author fullname="S. Galperin" initials="S." surname="Galperin"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7468">
          <front>
            <title>Textual Encodings of PKIX, PKCS, and CMS Structures</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="S. Leonard" initials="S." surname="Leonard"/>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document describes and discusses the textual encodings of the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (PKCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-known, are implemented by several applications and libraries, and are widely deployed. This document articulates the de facto rules by which existing implementations operate and defines them so that future implementations can interoperate.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7468"/>
          <seriesInfo name="DOI" value="10.17487/RFC7468"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC7932">
          <front>
            <title>Brotli Compressed Data Format</title>
            <author fullname="J. Alakuijala" initials="J." surname="Alakuijala"/>
            <author fullname="Z. Szabadka" initials="Z." surname="Szabadka"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7932"/>
          <seriesInfo name="DOI" value="10.17487/RFC7932"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8603">
          <front>
            <title>Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="M. Jenkins" initials="M." surname="Jenkins"/>
            <author fullname="L. Zieglar" initials="L." surname="Zieglar"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use with the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8603"/>
          <seriesInfo name="DOI" value="10.17487/RFC8603"/>
        </reference>
        <reference anchor="RFC8879">
          <front>
            <title>TLS Certificate Compression</title>
            <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
            <author fullname="V. Vasiliev" initials="V." surname="Vasiliev"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>In TLS handshakes, certificate chains often take up the majority of the bytes transmitted.</t>
              <t>This document describes how certificate chains can be compressed to reduce the amount of data transmitted and avoid some round trips.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8879"/>
          <seriesInfo name="DOI" value="10.17487/RFC8879"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9190">
          <front>
            <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9190"/>
          <seriesInfo name="DOI" value="10.17487/RFC9190"/>
        </reference>
        <reference anchor="RFC9191">
          <front>
            <title>Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods</title>
            <author fullname="M. Sethi" initials="M." surname="Sethi"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem. This document looks at this problem in detail and describes the potential solutions available.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9191"/>
          <seriesInfo name="DOI" value="10.17487/RFC9191"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC9908">
          <front>
            <title>Clarification and Enhancement of the CSR Attributes Definition in RFC 7030</title>
            <author fullname="M. Richardson" initials="M." role="editor" surname="Richardson"/>
            <author fullname="O. Friel" initials="O." surname="Friel"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="D. Harkins" initials="D." surname="Harkins"/>
            <date month="January" year="2026"/>
            <abstract>
              <t>This document updates RFC 7030, "Enrollment over Secure Transport" (EST), clarifying how the Certificate Signing Request (CSR) Attributes Response can be used by an EST server to specify both CSR attribute Object Identifiers (OIDs) and CSR attribute values, particularly X.509 extension values, that the server expects the client to include in a subsequent CSR request. RFC 9148 is derived from RFC 7030 and is also updated.</t>
              <t>RFC 7030 is ambiguous in its specification of the CSR Attributes Response. This has resulted in implementation challenges and implementor confusion because there was no universal understanding of what was specified. This document clarifies the encoding rules.</t>
              <t>This document also provides a new straightforward approach: using a template for CSR contents that may be partially filled in by the server. This also allows an EST server to specify a subject Distinguished Name (DN).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9908"/>
          <seriesInfo name="DOI" value="10.17487/RFC9908"/>
        </reference>
        <reference anchor="CAB-TLS" target="https://cabforum.org/baseline-requirements-documents/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 2.1.4"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="CAB-Code" target="https://cabforum.org/baseline-requirements-code-signing/">
          <front>
            <title>CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates Version 3.8.0"</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="IEEE-802.1AR" target="https://standards.ieee.org/standard/802_1AR-2018.html">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks–Secure Device Identity</title>
            <author initials="" surname="Institute of Electrical and Electronics Engineers">
              <organization/>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE Standard 802.1AR-2018" value=""/>
        </reference>
        <reference anchor="GSMA-eUICC" target="https://www.gsma.com/solutions-and-impact/technologies/esim/wp-content/uploads/2025/01/SGP.14-v2.2.pdf">
          <front>
            <title>GSMA eUICC PKI Certificate Policy Version 2.2</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="GSMA-SGP.22" target="https://www.gsma.com/solutions-and-impact/technologies/esim/wp-content/uploads/2023/12/SGP.22-v3.1.pdf">
          <front>
            <title>GSMA RSP Technical Specification Version 3.1 Final</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="X.509-IoT" target="https://doi.org/10.1007/978-3-319-93797-7_14">
          <front>
            <title>Lightweight X.509 Digital Certificates for the Internet of Things.</title>
            <author initials="F." surname="Forsby">
              <organization/>
            </author>
            <author initials="M." surname="Furuhed">
              <organization/>
            </author>
            <author initials="P." surname="Papadimitratos">
              <organization/>
            </author>
            <author initials="S." surname="Raza">
              <organization/>
            </author>
            <date year="2018" month="July"/>
          </front>
          <seriesInfo name="Springer, Cham." value="Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242."/>
        </reference>
        <reference anchor="CborMe" target="https://cbor.me/">
          <front>
            <title>CBOR Playground</title>
            <author initials="C." surname="Bormann">
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
        </reference>
        <reference anchor="SP-800-56A" target="https://doi.org/10.6028/NIST.SP.800-56Ar3">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</title>
            <author initials="E." surname="Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
          <seriesInfo name="NIST" value="Special Publication 800-56A Revision 3"/>
        </reference>
        <reference anchor="IANA-AFI" target="https://www.iana.org/assignments/address-family-numbers/address-family-numbers.xhtml">
          <front>
            <title>Address Family Numbers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-SAFI" target="https://www.iana.org/assignments/safi-namespace/safi-namespace.xhtml">
          <front>
            <title>Subsequent Address Family Identifiers (SAFI) Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA-CBOR-TAGS" target="https://www.iana.org/assignments/cbor-tags/cbor-tags.xhtml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 2612?>

<section anchor="appA">
      <name>C509 Certificate Examples</name>
      <section anchor="rfc7925-prof">
        <name>Example: RFC 7925 profiled X.509 Certificate</name>
        <t>Example of an <xref target="RFC7925"/> profiled X.509 certificate parsed with OpenSSL.</t>
        <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 128269 (0x1f50d)
        Signature Algorithm: ecdsa-with-SHA256
        Issuer: CN=RFC test CA
        Validity
            Not Before: Jan  1 00:00:00 2023 GMT
            Not After : Jan  1 00:00:00 2026 GMT
        Subject: CN=01-23-45-FF-FE-67-89-AB
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                pub:
                    04:b1:21:6a:b9:6e:5b:3b:33:40:f5:bd:f0:2e:69:
                    3f:16:21:3a:04:52:5e:d4:44:50:b1:01:9c:2d:fd:
                    38:38:ab:ac:4e:14:d8:6c:09:83:ed:5e:9e:ef:24:
                    48:c6:86:1c:c4:06:54:71:77:e6:02:60:30:d0:51:
                    f7:79:2a:c2:06
                ASN1 OID: prime256v1
                NIST CURVE: P-256
        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature
    Signature Algorithm: ecdsa-with-SHA256
        30:46:02:21:00:d4:32:0b:1d:68:49:e3:09:21:9d:30:03:7e:
        13:81:66:f2:50:82:47:dd:da:e7:6c:ce:ea:55:05:3c:10:8e:
        90:02:21:00:d5:51:f6:d6:01:06:f1:ab:b4:84:cf:be:62:56:
        c1:78:e4:ac:33:14:ea:19:19:1e:8b:60:7d:a5:ae:3b:da:16
]]></artwork>
        <t>The DER encoding of the above certificate is 316 bytes.</t>
        <artwork><![CDATA[
30 82 01 38 30 81 de a0 03 02 01 02 02 03 01 f5 0d 30 0a 06 08 2a 86
48 ce 3d 04 03 02 30 16 31 14 30 12 06 03 55 04 03 0c 0b 52 46 43 20
74 65 73 74 20 43 41 30 1e 17 0d 32 33 30 31 30 31 30 30 30 30 30 30
5a 17 0d 32 36 30 31 30 31 30 30 30 30 30 30 5a 30 22 31 20 30 1e 06
03 55 04 03 0c 17 30 31 2d 32 33 2d 34 35 2d 46 46 2d 46 45 2d 36 37
2d 38 39 2d 41 42 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a 86
48 ce 3d 03 01 07 03 42 00 04 b1 21 6a b9 6e 5b 3b 33 40 f5 bd f0 2e
69 3f 16 21 3a 04 52 5e d4 44 50 b1 01 9c 2d fd 38 38 ab ac 4e 14 d8
6c 09 83 ed 5e 9e ef 24 48 c6 86 1c c4 06 54 71 77 e6 02 60 30 d0 51
f7 79 2a c2 06 a3 0f 30 0d 30 0b 06 03 55 1d 0f 04 04 03 02 07 80 30
0a 06 08 2a 86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 d4 32 0b 1d
68 49 e3 09 21 9d 30 03 7e 13 81 66 f2 50 82 47 dd da e7 6c ce ea 55
05 3c 10 8e 90 02 21 00 d5 51 f6 d6 01 06 f1 ab b4 84 cf be 62 56 c1
78 e4 ac 33 14 ea 19 19 1e 8b 60 7d a5 ae 3b da 16
]]></artwork>
        <section anchor="example-c509-certificate-encoding">
          <name>Example: C509 Certificate Encoding</name>
          <t>This section shows the C509 encoding of the X.509 certificate in the previous section. The point-compressed public key is represented as described in <xref target="subpubkey-alg-encoding"/>.</t>
          <t><xref target="fig-CBOR-diagnostic-7925"/> shows the diagnostic notation of the unwrapped CBOR sequence, ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-CBOR-diagnostic-7925">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  3,                   / version and certificate type /
  h'01f50d',           / certificateSerialNumber /
  0,                   / signatureAlgorithm /
  "RFC test CA",       / issuer /
  1672531200,          / notBefore /
  1767225600,          / notAfter /
  48(h'0123456789AB'), / subject, EUI-64 /
  1,                   / subjectPublicKeyAlgorithm /
  h'FEB1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,                   / single extension:
                         non-critical keyUsage
                         digitalSignature /
  h'D4320B1D6849E309219D30037E138166F2508247DDDAE76CCE
    EA55053C108E90D551F6D60106F1ABB484CFBE6256C178E4AC
    3314EA19191E8B607DA5AE3BDA16'

]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-7925"/> shows the plain hex format of the unwrapped CBOR sequence. The size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-7925">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
03
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 FE B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 D4 32 0B 1D 68 49 E3 09 21 9D 30 03 7E 13 81 66 F2 50 82 47 DD
DA E7 6C CE EA 55 05 3C 10 8E 90 D5 51 F6 D6 01 06 F1 AB B4 84 CF BE
62 56 C1 78 E4 AC 33 14 EA 19 19 1E 8B 60 7D A5 AE 3B DA 16
]]></artwork>
          </figure>
        </section>
        <section anchor="example-native">
          <name>Example: Natively Signed C509 Certificate</name>
          <t>This section shows the natively signed C509 certificate corresponding to the certificate in the previous section. It is identical except for c509CertificateType, the encoding of point compression (see <xref target="subpubkey-alg-encoding"/>), and signatureValue.</t>
          <t><xref target="fig-CBOR-diagnostic-native"/> shows the diagnostic notation of the natively signed unwrapped CBOR sequence, ~C509Certificate.</t>
          <figure anchor="fig-CBOR-diagnostic-native">
            <name>CBOR diagnostic notation of ~C509Certificate</name>
            <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

  2,
  h'01f50d',
  0,
  "RFC test CA",
  1672531200,
  1767225600,
  48(h'0123456789AB'),
  1,
  h'02B1216AB96E5B3B3340F5BDF02E693F16213A04525ED44450
    B1019C2DFD3838AB',
  1,
  h'EB0D472731F689BC00F5880B12C68B3F9FD38B23FADFCA2095
    0F3F241B60A202579CAC28CD3B7494D5FA5D8BBAB4600357E5
    50AB9FA9A65D9BA2B3B82E668CC6'
]]></artwork>
          </figure>
          <t><xref target="fig-CBOR-plain-hex-native"/> shows the plain hex format of the natively signed unwrapped CBOR sequence. The size is 140 bytes.</t>
          <figure anchor="fig-CBOR-plain-hex-native">
            <name>CBOR plain hex format of ~C509Certificate.</name>
            <artwork><![CDATA[
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
        </section>
        <section anchor="app-DH-keys">
          <name>C509 for Diffie-Hellman keys</name>
          <t>The two previous examples illustrate keyUsage digitalSignature. A C509 certificate for a public Diffie-Hellman key would instead have key usage keyAgreement encoded according to <xref target="ext-encoding"/> (in this case of single extension encoded as integer 16 instead of 1 for digital signature) but otherwise identical in format. Note that Section 5.6.3.2 of <xref target="SP-800-56A"/> allows a key agreement key pair to be used to sign a certification request.</t>
        </section>
        <section anchor="example-additional-keys-for-the-example-certificates">
          <name>Example: Additional Keys for the Example Certificates</name>
          <t>Below are the issuer key pair and the subject private key corresponding to the above example certificates. The private keys are encoded as in COSE <xref target="RFC9052"/>. This issuer key pair can be used to sign or verify the example certificates, and the subject private key allows those certificates to be used in test vectors for other protocols such as EDHOC.</t>
          <artwork><![CDATA[
issuerPublicKeyAlgorithm :
1 (EC Public Key (Weierstrass) with secp256r1)

issuerPublicKey :
h'02AE4CDB01F614DEFC7121285FDC7F5C6D1D42C95647F061BA0080DF678867845E'

issuerPrivateKey :
h'DC66B3415456D649429B53223DF7532B942D6B0E0842C30BCA4C0ACF91547BB2'
]]></artwork>
          <artwork><![CDATA[
subjectPrivateKey :
h'D718111F3F9BD91B92FF6877F386BDBFCEA7154268FD7F2FB56EE17D99EA16D4'
]]></artwork>
        </section>
        <section anchor="other-examples">
          <name>Examples: C509Certificate and C509CertData</name>
          <t>This section exemplifies other CBOR objects defined in this specification, based on the natively signed C509 certificate in <xref target="example-native"/>.</t>
          <t><xref target="fig-C509Certificate"/> shows the encoding of the corresponding C509Certificate, i.e., the CBOR array wrapping of the CBOR sequence ~C509Certificate, see <xref target="message-fields"/>.</t>
          <figure anchor="fig-C509Certificate">
            <name>C509Certificate: The CBOR array wrapping of ~C509Certificate</name>
            <artwork><![CDATA[
8B
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509Certificate is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 8B (which indicates that it is a CBOR array with 11 elements).</t>
          <t><xref target="fig-C509CertData"/> shows the encoding of the corresponding C509CertData, i.e., the CBOR byte string wrapping of the CBOR sequence ~C509Certificate, see <xref target="cose-header-params"/>.</t>
          <figure anchor="fig-C509CertData">
            <name>C509CertData: CBOR byte string wrapping of ~C509Certificate.</name>
            <artwork><![CDATA[
58 8C
02
43 01 F5 0D
00
6B 52 46 43 20 74 65 73 74 20 43 41
1A 63 B0 CD 00
1A 69 55 B9 00
D8 30 46 01 23 45 67 89 AB
01
58 21 02 B1 21 6A B9 6E 5B 3B 33 40 F5 BD F0 2E 69 3F 16 21 3A 04 52
5E D4 44 50 B1 01 9C 2D FD 38 38 AB
01
58 40 EB 0D 47 27 31 F6 89 BC 00 F5 88 0B 12 C6 8B 3F 9F D3 8B 23 FA
DF CA 20 95 0F 3F 24 1B 60 A2 02 57 9C AC 28 CD 3B 74 94 D5 FA 5D 8B
BA B4 60 03 57 E5 50 AB 9F A9 A6 5D 9B A2 B3 B8 2E 66 8C C6
]]></artwork>
          </figure>
          <t>Note that C509CertData is identical to ~C509Certificate in <xref target="example-native"/> except for the prefix 58 8C (which indicates that it is a CBOR byte string of 140 bytes).</t>
        </section>
      </section>
      <section anchor="example-ieee-8021ar-profiled-x509-certificate">
        <name>Example: IEEE 802.1AR profiled X.509 Certificate</name>
        <t>An example of an IEEE 802.1AR profiled X.509 certificate (Secure Device Identifier, DevID) is provided in Appendix C.2 of <xref target="RFC9148"/>. The certificate is shown below including details of the hardwareModuleName type of otherName in subjectAltName, see <xref target="ext-encoding"/>.</t>
        <artwork><![CDATA[
Certificate:
  Data:
    Version: 3 (0x2)
    Serial Number: 9112578475118446130 (0x7e7661d7b54e4632)
    Signature Algorithm: ecdsa-with-SHA256
    Issuer: C=US, ST=CA, O=Example Inc, OU=certification,
            CN=802.1AR CA
    Validity
      Not Before: Jan 31 11:29:16 2019 GMT
      Not After : Dec 31 23:59:59 9999 GMT
    Subject: C=US, ST=CA, L=LA, O=example Inc,
             OU=IoT/serialNumber=Wt1234
    Subject Public Key Info:
      Public Key Algorithm: id-ecPublicKey
        Public-Key: (256 bit)
        pub:
          04:c8:b4:21:f1:1c:25:e4:7e:3a:c5:71:23:bf:2d:
          9f:dc:49:4f:02:8b:c3:51:cc:80:c0:3f:15:0b:f5:
          0c:ff:95:8d:75:41:9d:81:a6:a2:45:df:fa:e7:90:
          be:95:cf:75:f6:02:f9:15:26:18:f8:16:a2:b2:3b:
          56:38:e5:9f:d9
          ASN1 OID: prime256v1
          NIST CURVE: P-256
    X509v3 extensions:
      X509v3 Basic Constraints:
        CA:FALSE
      X509v3 Subject Key Identifier:
        96:60:0D:87:16:BF:7F:D0:E7:52:D0:AC:76:07:77:AD:66:5D:02:A0
      X509v3 Authority Key Identifier:
        68:D1:65:51:F9:51:BF:C8:2A:43:1D:0D:9F:08:BC:2D:20:5B:11:60
      X509v3 Key Usage: critical
        Digital Signature, Key Encipherment
      X509v3 Subject Alternative Name:
        otherName:
          type-id: 1.3.6.1.5.5.7.8.4 (id-on-hardwareModuleName)
          value:
            hwType: 1.3.6.1.4.1.6715.10.1
            hwSerialNum: 01:02:03:04
  Signature Algorithm: ecdsa-with-SHA256
  Signature Value:
    30:46:02:21:00:c0:d8:19:96:d2:50:7d:69:3f:3c:48:ea:a5:
    ee:94:91:bd:a6:db:21:40:99:d9:81:17:c6:3b:36:13:74:cd:
    86:02:21:00:a7:74:98:9f:4c:32:1a:5c:f2:5d:83:2a:4d:33:
    6a:08:ad:67:df:20:f1:50:64:21:18:8a:0a:de:6d:34:92:36
]]></artwork>
        <t>The DER encoding of the certificate is 577 bytes:</t>
        <artwork><![CDATA[
30 82 02 3D 30 82 01 E2 A0 03 02 01 02 02 08 7E 76 61 D7 B5 4E 46 32
30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 5D 31 0B 30 09 06 03 55 04 06
13 02 55 53 31 0B 30 09 06 03 55 04 08 0C 02 43 41 31 14 30 12 06 03
55 04 0A 0C 0B 45 78 61 6D 70 6C 65 20 49 6E 63 31 16 30 14 06 03 55
04 0B 0C 0D 63 65 72 74 69 66 69 63 61 74 69 6F 6E 31 13 30 11 06 03
55 04 03 0C 0A 38 30 32 2E 31 41 52 20 43 41 30 20 17 0D 31 39 30 31
33 31 31 31 32 39 31 36 5A 18 0F 39 39 39 39 31 32 33 31 32 33 35 39
35 39 5A 30 5C 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0B 30 09 06
03 55 04 08 0C 02 43 41 31 0B 30 09 06 03 55 04 07 0C 02 4C 41 31 14
30 12 06 03 55 04 0A 0C 0B 65 78 61 6D 70 6C 65 20 49 6E 63 31 0C 30
0A 06 03 55 04 0B 0C 03 49 6F 54 31 0F 30 0D 06 03 55 04 05 13 06 57
74 31 32 33 34 30 59 30 13 06 07 2A 86 48 CE 3D 02 01 06 08 2A 86 48
CE 3D 03 01 07 03 42 00 04 C8 B4 21 F1 1C 25 E4 7E 3A C5 71 23 BF 2D
9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5 0C FF 95 8D 75 41 9D 81
A6 A2 45 DF FA E7 90 BE 95 CF 75 F6 02 F9 15 26 18 F8 16 A2 B2 3B 56
38 E5 9F D9 A3 81 8A 30 81 87 30 09 06 03 55 1D 13 04 02 30 00 30 1D
06 03 55 1D 0E 04 16 04 14 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07
77 AD 66 5D 02 A0 30 1F 06 03 55 1D 23 04 18 30 16 80 14 68 D1 65 51
F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D 20 5B 11 60 30 0E 06 03 55 1D 0F
01 01 FF 04 04 03 02 05 A0 30 2A 06 03 55 1D 11 04 23 30 21 A0 1F 06
08 2B 06 01 05 05 07 08 04 A0 13 30 11 06 09 2B 06 01 04 01 B4 3B 0A
01 04 04 01 02 03 04 30 0A 06 08 2A 86 48 CE 3D 04 03 02 03 49 00 30
46 02 21 00 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 02 21 00 A7 74 98 9F 4C 32 1A
5C F2 5D 83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34
92 36
]]></artwork>
        <section anchor="example-c509-certificate-encoding-1">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the same X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

 3,
 h'7E7661D7B54E4632',
 0,
 [
  -4, "US",
   6, "CA",
   8, "Example Inc",
   9, "certification",
   1, "802.1AR CA"
 ],
 1548934156,
 null,
 [
  -4, "US",
   6, "CA",
   5, "LA",
   8, "example Inc",
   9, "IoT",
  -3, "Wt1234"
 ],
 1,
 h'FDC8B421F11C25E47E3AC57123BF2D9FDC494F028BC351CC80C03F150BF50CFF
   95',
 [
   4, -2,
   1, h'96600D8716BF7FD0E752D0AC760777AD665D02A0',
   7, h'68D16551F951BFC82A431D0D9F08BC2D205B1160',
  -2, 5,
  3, [-1, [h'2B06010401B43B0A01', h'01020304']]
     / subjectAltName with hardwareModuleName /
 ],
 h'C0D81996D2507D693F3C48EAA5EE9491BDA6DB214099D98117C63B361374CD86
   A774989F4C321A5CF25D832A4D336A08AD67DF20F1506421188A0ADE6D349236'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 275 bytes:</t>
          <artwork><![CDATA[
03 48 7E 76 61 D7 B5 4E 46 32 00 8A 23 62 55 53 06 62 43 41 08 6B 45
78 61 6D 70 6C 65 20 49 6E 63 09 6D 63 65 72 74 69 66 69 63 61 74 69
6F 6E 01 6A 38 30 32 2E 31 41 52 20 43 41 1A 5C 52 DC 0C F6 8C 23 62
55 53 06 62 43 41 05 62 4C 41 08 6B 65 78 61 6D 70 6C 65 20 49 6E 63
09 63 49 6F 54 22 66 57 74 31 32 33 34 01 58 21 FD C8 B4 21 F1 1C 25
E4 7E 3A C5 71 23 BF 2D 9F DC 49 4F 02 8B C3 51 CC 80 C0 3F 15 0B F5
0C FF 95 8A 04 21 01 54 96 60 0D 87 16 BF 7F D0 E7 52 D0 AC 76 07 77
AD 66 5D 02 A0 07 54 68 D1 65 51 F9 51 BF C8 2A 43 1D 0D 9F 08 BC 2D
20 5B 11 60 21 05 03 82 20 82 49 2B 06 01 04 01 B4 3B 0A 01 44 01 02
03 04 58 40 C0 D8 19 96 D2 50 7D 69 3F 3C 48 EA A5 EE 94 91 BD A6 DB
21 40 99 D9 81 17 C6 3B 36 13 74 CD 86 A7 74 98 9F 4C 32 1A 5C F2 5D
83 2A 4D 33 6A 08 AD 67 DF 20 F1 50 64 21 18 8A 0A DE 6D 34 92 36
]]></artwork>
        </section>
      </section>
      <section anchor="example-cab-baseline-ecdsa-https-x509-certificate">
        <name>Example: CAB Baseline ECDSA HTTPS X.509 Certificate</name>
        <t>The www.ietf.org HTTPS server replies with a certificate message with 2 certificates. The DER encoding of the first certificate is 1209 bytes.</t>
        <artwork><![CDATA[
30 82 04 b5 30 82 04 5a a0 03 02 01 02 02 10 04 7f a1 e3 19 28 ee 40
3b a0 b8 3a 39 56 73 fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 4a 31
0b 30 09 06 03 55 04 06 13 02 55 53 31 19 30 17 06 03 55 04 0a 13 10
43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e 31 20 30 1e 06 03 55
04 03 13 17 43 6c 6f 75 64 66 6c 61 72 65 20 49 6e 63 20 45 43 43 20
43 41 2d 33 30 1e 17 0d 32 30 30 37 32 39 30 30 30 30 30 30 5a 17 0d
32 31 30 37 32 39 31 32 30 30 30 30 5a 30 6d 31 0b 30 09 06 03 55 04
06 13 02 55 53 31 0b 30 09 06 03 55 04 08 13 02 43 41 31 16 30 14 06
03 55 04 07 13 0d 53 61 6e 20 46 72 61 6e 63 69 73 63 6f 31 19 30 17
06 03 55 04 0a 13 10 43 6c 6f 75 64 66 6c 61 72 65 2c 20 49 6e 63 2e
31 1e 30 1c 06 03 55 04 03 13 15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61
72 65 73 73 6c 2e 63 6f 6d 30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06
08 2a 86 48 ce 3d 03 01 07 03 42 00 04 96 3e cd d8 4d cd 1b 93 a1 cf
43 2d 1a 72 17 d6 c6 3b de 33 55 a0 2f 8c fb 5a d8 99 4c d4 4e 20 5f
15 f6 e3 d2 3b 38 2b a6 49 9b b1 7f 34 1f a5 92 fa 21 86 1f 16 d3 12
06 63 24 05 fd 70 42 bd a3 82 02 fd 30 82 02 f9 30 1f 06 03 55 1d 23
04 18 30 16 80 14 a5 ce 37 ea eb b0 75 0e 94 67 88 b4 45 fa d9 24 10
87 96 1f 30 1d 06 03 55 1d 0e 04 16 04 14 cc 0b 50 e7 d8 37 db f2 43
f3 85 3d 48 60 f5 3b 39 be 9b 2a 30 2e 06 03 55 1d 11 04 27 30 25 82
15 73 6e 69 2e 63 6c 6f 75 64 66 6c 61 72 65 73 73 6c 2e 63 6f 6d 82
0c 77 77 77 2e 69 65 74 66 2e 6f 72 67 30 0e 06 03 55 1d 0f 01 01 ff
04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05
05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 7b 06 03 55 1d 1f 04 74
30 72 30 37 a0 35 a0 33 86 31 68 74 74 70 3a 2f 2f 63 72 6c 33 2e 64
69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72 65 49
6e 63 45 43 43 43 41 2d 33 2e 63 72 6c 30 37 a0 35 a0 33 86 31 68 74
74 70 3a 2f 2f 63 72 6c 34 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f
43 6c 6f 75 64 66 6c 61 72 65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72
6c 30 4c 06 03 55 1d 20 04 45 30 43 30 37 06 09 60 86 48 01 86 fd 6c
01 01 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73
3a 2f 2f 77 77 77 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 50 53
30 08 06 06 67 81 0c 01 02 02 30 76 06 08 2b 06 01 05 05 07 01 01 04
6a 30 68 30 24 06 08 2b 06 01 05 05 07 30 01 86 18 68 74 74 70 3a 2f
2f 6f 63 73 70 2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 30 40 06 08 2b
06 01 05 05 07 30 02 86 34 68 74 74 70 3a 2f 2f 63 61 63 65 72 74 73
2e 64 69 67 69 63 65 72 74 2e 63 6f 6d 2f 43 6c 6f 75 64 66 6c 61 72
65 49 6e 63 45 43 43 43 41 2d 33 2e 63 72 74 30 0c 06 03 55 1d 13 01
01 ff 04 02 30 00 30 82 01 05 06 0a 2b 06 01 04 01 d6 79 02 04 02 04
81 f6 04 81 f3 00 f1 00 76 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30
94 56 8e e3 4d 13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 73
9c 83 5f 8e 00 00 04 03 00 47 30 45 02 21 00 f8 d1 b4 a9 3d 2f 0d 4c
41 76 df b4 88 bc c7 3b 86 44 3d 7d e0 0e 6a c8 17 4d 89 48 a8 84 36
68 02 20 29 ff 5a 34 06 8a 24 0c 69 50 27 88 e8 ee 25 ab 7e d2 cb cf
68 6e ce 7b 5f 96 b4 31 a9 07 02 fa 00 77 00 5c dc 43 92 fe e6 ab 45
44 b1 5e 9a d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e
ca 00 00 01 73 9c 83 5f be 00 00 04 03 00 48 30 46 02 21 00 e8 91 c1
97 bf b0 e3 d3 0c b6 ce e6 0d 94 c3 c7 5f d1 17 53 36 93 11 08 d8 98
12 d4 d2 9d 81 d0 02 21 00 a1 59 d1 6c 46 47 d1 48 37 57 fc d6 ce 4e
75 ec 7b 5e f6 57 ef e0 28 f8 e5 cc 47 92 68 2d ac 43 30 0a 06 08 2a
86 48 ce 3d 04 03 02 03 49 00 30 46 02 21 00 bd 63 cf 4f 7e 5c fe 6c
29 38 5e a7 1c fb fc 1e 3f 7b 1c d0 72 51 a2 21 f7 77 69 c0 f4 71 df
ea 02 21 00 b5 c0 6c c4 58 54 fa 30 b2 82 88 b1 d3 bb 9a 66 61 ed 50
31 72 5b 1a 82 02 e0 da 5b 59 f9 54 02
]]></artwork>
        <section anchor="example-c509-certificate-encoding-2">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'047FA1E31928EE403BA0B83A395673FC',
0,
[
 -4, "US",
 -8, "Cloudflare, Inc.",
 -1, "Cloudflare Inc ECC CA-3"
],
1595980800,
1627560000,
[
 -4, "US",
 -6, "CA",
 -5, "San Francisco",
 -8, "Cloudflare, Inc.",
 -1, "sni.cloudflaressl.com"
],
1,
h'FD963ECDD84DCD1B93A1CF432D1A7217D6C63BDE3355A02F8CFB5AD8994CD44E
  20',
[
 7, h'A5CE37EAEBB0750E946788B445FAD9241087961F',
 1, h'CC0B50E7D837DBF243F3853D4860F53B39BE9B2A',
 3, [2, "sni.cloudflaressl.com", 2, "www.ietf.org"],
-2, 1,
 8, [1, 2],
 5, [
     ["http://crl3.digicert.com/CloudflareIncECCCA-3.crl",
       null, null],
     ["http://crl4.digicert.com/CloudflareIncECCCA-3.crl",
       null, null]
    ],
 6, [h'6086480186FD6C0101', [1, "https://www.digicert.com/CPS"],
     2, []],
 9, [1, "http://ocsp.digicert.com",
     2, "http://cacerts.digicert.com/CloudflareIncECCCA-3.crt"],
-4, -2,
 h'2B06010401D679020402',
 h'0481F300F1007600F65C942FD1773022145418083094568EE34D131933BFDF0C
   2F200BCC4EF164E3000001739C835F8E0000040300473045022100F8D1B4A93D
   2F0D4C4176DFB488BCC73B86443D7DE00E6AC8174D8948A8843668022029FF5A
   34068A240C69502788E8EE25AB7ED2CBCF686ECE7B5F96B431A90702FA007700
   5CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70ECA
   000001739C835FBE0000040300483046022100E891C197BFB0E3D30CB6CEE60D
   94C3C75FD1175336931108D89812D4D29D81D0022100A159D16C4647D1483757
   FCD6CE4E75EC7B5EF657EFE028F8E5CC4792682DAC43'
],
h'BD63CF4F7E5CFE6C29385EA71CFBFC1E3F7B1CD07251A221F77769C0F471DFEA
  B5C06CC45854FA30B28288B1D3BB9A6661ED5031725B1A8202E0DA5B59F95402'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 835 bytes.</t>
        </section>
      </section>
      <section anchor="example-cab-baseline-rsa-https-x509-certificate">
        <name>Example: CAB Baseline RSA HTTPS X.509 Certificate</name>
        <t>The tools.ietf.org HTTPS server replies with a certificate message with 4 certificates. The DER encoding of the first certificate is 1647 bytes.</t>
        <artwork><![CDATA[
30 82 06 6b 30 82 05 53 a0 03 02 01 02 02 09 00 a6 a5 5c 87 0e 39 b4
0e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 c6 31 0b 30 09
06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 08 13 07 41 72 69
7a 6f 6e 61 31 13 30 11 06 03 55 04 07 13 0a 53 63 6f 74 74 73 64 61
6c 65 31 25 30 23 06 03 55 04 0a 13 1c 53 74 61 72 66 69 65 6c 64 20
54 65 63 68 6e 6f 6c 6f 67 69 65 73 2c 20 49 6e 63 2e 31 33 30 31 06
03 55 04 0b 13 2a 68 74 74 70 3a 2f 2f 63 65 72 74 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 31 34 30 32 06 03 55 04 03 13 2b 53 74 61 72 66 69 65 6c 64 20
53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68
6f 72 69 74 79 20 2d 20 47 32 30 1e 17 0d 32 30 31 30 30 31 31 39 33
38 33 36 5a 17 0d 32 31 31 31 30 32 31 39 33 38 33 36 5a 30 3e 31 21
30 1f 06 03 55 04 0b 13 18 44 6f 6d 61 69 6e 20 43 6f 6e 74 72 6f 6c
20 56 61 6c 69 64 61 74 65 64 31 19 30 17 06 03 55 04 03 0c 10 2a 2e
74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a
86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01
00 b1 e1 37 e8 eb 82 d6 89 fa db f5 c2 4b 77 f0 2c 4a de 72 6e 3e 13
60 d1 a8 66 1e c4 ad 3d 32 60 e5 f0 99 b5 f4 7a 7a 48 55 21 ee 0e 39
12 f9 ce 0d ca f5 69 61 c7 04 ed 6e 0f 1d 3b 1e 50 88 79 3a 0e 31 41
16 f1 b1 02 64 68 a5 cd f5 4a 0a ca 99 96 35 08 c3 7e 27 5d d0 a9 cf
f3 e7 28 af 37 d8 b6 7b dd f3 7e ae 6e 97 7f f7 ca 69 4e cc d0 06 df
5d 27 9b 3b 12 e7 e6 fe 08 6b 52 7b 82 11 7c 72 b3 46 eb c1 e8 78 b8
0f cb e1 eb bd 06 44 58 dc 83 50 b2 a0 62 5b dc 81 b8 36 e3 9e 7c 79
b2 a9 53 8a e0 0b c9 4a 2a 13 39 31 13 bd 2c cf a8 70 cf 8c 8d 3d 01
a3 88 ae 12 00 36 1d 1e 24 2b dd 79 d8 53 01 26 ed 28 4f c9 86 94 83
4e c8 e1 14 2e 85 b3 af d4 6e dd 69 46 af 41 25 0e 7a ad 8b f2 92 ca
79 d9 7b 32 4f f7 77 e8 f9 b4 4f 23 5c d4 5c 03 ae d8 ab 3a ca 13 5f
5d 5d 5d a1 02 03 01 00 01 a3 82 02 e1 30 82 02 dd 30 0c 06 03 55 1d
13 01 01 ff 04 02 30 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06
01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0e 06 03 55 1d 0f
01 01 ff 04 04 03 02 05 a0 30 3d 06 03 55 1d 1f 04 36 30 34 30 32 a0
30 a0 2e 86 2c 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 74 61 72 66 69 65
6c 64 74 65 63 68 2e 63 6f 6d 2f 73 66 69 67 32 73 31 2d 32 34 32 2e
63 72 6c 30 63 06 03 55 1d 20 04 5c 30 5a 30 4e 06 0b 60 86 48 01 86
fd 6e 01 07 17 01 30 3f 30 3d 06 08 2b 06 01 05 05 07 02 01 16 31 68
74 74 70 3a 2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72
66 69 65 6c 64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72
79 2f 30 08 06 06 67 81 0c 01 02 01 30 81 82 06 08 2b 06 01 05 05 07
01 01 04 76 30 74 30 2a 06 08 2b 06 01 05 05 07 30 01 86 1e 68 74 74
70 3a 2f 2f 6f 63 73 70 2e 73 74 61 72 66 69 65 6c 64 74 65 63 68 2e
63 6f 6d 2f 30 46 06 08 2b 06 01 05 05 07 30 02 86 3a 68 74 74 70 3a
2f 2f 63 65 72 74 69 66 69 63 61 74 65 73 2e 73 74 61 72 66 69 65 6c
64 74 65 63 68 2e 63 6f 6d 2f 72 65 70 6f 73 69 74 6f 72 79 2f 73 66
69 67 32 2e 63 72 74 30 1f 06 03 55 1d 23 04 18 30 16 80 14 25 45 81
68 50 26 38 3d 3b 2d 2c be cd 6a d9 b6 3d b3 66 63 30 2b 06 03 55 1d
11 04 24 30 22 82 10 2a 2e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67
82 0e 74 6f 6f 6c 73 2e 69 65 74 66 2e 6f 72 67 30 1d 06 03 55 1d 0e
04 16 04 14 ad 8a b4 1c 07 51 d7 92 89 07 b0 b7 84 62 2f 36 55 7a 5f
4d 30 82 01 06 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 81 f7 04 81 f4
00 f2 00 77 00 f6 5c 94 2f d1 77 30 22 14 54 18 08 30 94 56 8e e3 4d
13 19 33 bf df 0c 2f 20 0b cc 4e f1 64 e3 00 00 01 74 e5 ac 71 13 00
00 04 03 00 48 30 46 02 21 00 8c f5 48 52 ce 56 35 43 39 11 cf 10 cd
b9 1f 52 b3 36 39 22 3a d1 38 a4 1d ec a6 fe de 1f e9 0f 02 21 00 bc
a2 25 43 66 c1 9a 26 91 c4 7a 00 b5 b6 53 ab bd 44 c2 f8 ba ae f4 d2
da f2 52 7c e6 45 49 95 00 77 00 5c dc 43 92 fe e6 ab 45 44 b1 5e 9a
d4 56 e6 10 37 fb d5 fa 47 dc a1 73 94 b2 5e e6 f6 c7 0e ca 00 00 01
74 e5 ac 72 3c 00 00 04 03 00 48 30 46 02 21 00 a5 e0 90 6e 63 e9 1d
4f dd ef ff 03 52 b9 1e 50 89 60 07 56 4b 44 8a 38 28 f5 96 dc 6b 28
72 6d 02 21 00 fc 91 ea ed 02 16 88 66 05 4e e1 8a 2e 53 46 c4 cc 51
fe b3 fa 10 a9 1d 2e db f9 91 25 f8 6c e6 30 0d 06 09 2a 86 48 86 f7
0d 01 01 0b 05 00 03 82 01 01 00 14 04 3f a0 be d2 ee 3f a8 6e 3a 1f
78 8e a0 4c 35 53 0f 11 06 1f ff 60 a1 6d 0b 83 e9 d9 2a db b3 3f 9d
b3 d7 e0 59 4c 19 a8 e4 19 a5 0c a7 70 72 77 63 d5 fe 64 51 0a d2 7a
d6 50 a5 8a 92 38 ec cb 2f 0f 5a c0 64 58 4d 5c 06 b9 73 63 68 27 8b
89 34 dc 79 c7 1d 3a fd 34 5f 83 14 41 58 49 80 68 29 80 39 8a 86 72
69 cc 79 37 ce e3 97 f7 dc f3 95 88 ed 81 03 29 00 d2 a2 c7 ba ab d6
3a 8e ca 09 0b d9 fb 39 26 4b ff 03 d8 8e 2d 3f 6b 21 ca 8a 7d d8 5f
fb 94 ba 83 de 9c fc 15 8d 61 fa 67 2d b0 c7 db 3d 25 0a 41 4a 85 d3
7f 49 46 37 3c f4 b1 75 d0 52 f3 dd c7 66 f1 4b fd aa 00 ed bf e4 7e
ed 01 ec 7b e4 f6 46 fc 31 fd 72 fe 03 d2 f2 65 af 4d 7e e2 81 9b 7a
fd 30 3c f5 52 f4 05 34 a0 8a 3e 19 41 58 c8 a8 e0 51 71 84 09 15 ae
ec a5 77 75 fa 18 f7 d5 77 d5 31 cc c7 2d
]]></artwork>
        <section anchor="example-c509-certificate-encoding-3">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the first X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'A6A55C870E39B40E',
23,
[
 -4, "US",
 -6, "Arizona",
 -5, "Scottsdale",
 -8, "Starfield Technologies, Inc.",
 -9, "http://certs.starfieldtech.com/repository/",
 -1, "Starfield Secure Certificate Authority - G2"
],
1601581116,
1635881916,
[
  -9, "Domain Control Validated",
   1, "*.tools.ietf.org"
],
0,
h'B1E137E8EB82D689FADBF5C24B77F02C4ADE726E3E1360D1A8661EC4AD3D3260
  E5F099B5F47A7A485521EE0E3912F9CE0DCAF56961C704ED6E0F1D3B1E508879
  3A0E314116F1B1026468A5CDF54A0ACA99963508C37E275DD0A9CFF3E728AF37
  D8B67BDDF37EAE6E977FF7CA694ECCD006DF5D279B3B12E7E6FE086B527B8211
  7C72B346EBC1E878B80FCBE1EBBD064458DC8350B2A0625BDC81B836E39E7C79
  B2A9538AE00BC94A2A13393113BD2CCFA870CF8C8D3D01A388AE1200361D1E24
  2BDD79D8530126ED284FC98694834EC8E1142E85B3AFD46EDD6946AF41250E7A
  AD8BF292CA79D97B324FF777E8F9B44F235CD45C03AED8AB3ACA135F5D5D5DA1',
[
-4, -2,
 8, [ 1, 2 ],
 -2, 5,
 5, "http://crl.starfieldtech.com/sfig2s1-242.crl",
 6, [ h'6086480186FD6E01071701',
     [1, "http://certificates.starfieldtech.com/repository/"],
     1,
     []
    ],
 9, [ 1, "http://ocsp.starfieldtech.com/", 2,
      "http://certificates.starfieldtech.com/repository/sfig2.crt"],
 7, h'254581685026383D3B2D2CBECD6AD9B63DB36663',
 3, [ 2, "*.tools.ietf.org", 2, "tools.ietf.org" ],
 1, h'AD8AB41C0751D7928907B0B784622F36557A5F4D',
 h'2B06010401D679020402',
 h'0481F400F2007700F65C942FD1773022145418083094568EE34D131933BFDF0C
   2F200BCC4EF164E300000174E5AC711300000403004830460221008CF54852CE
   5635433911CF10CDB91F52B33639223AD138A41DECA6FEDE1FE90F022100BCA2
   254366C19A2691C47A00B5B653ABBD44C2F8BAAEF4D2DAF2527CE64549950077
   005CDC4392FEE6AB4544B15E9AD456E61037FBD5FA47DCA17394B25EE6F6C70E
   CA00000174E5AC723C0000040300483046022100A5E0906E63E91D4FDDEFFF03
   52B91E50896007564B448A3828F596DC6B28726D022100FC91EAED0216886605
   4EE18A2E5346C4CC51FEB3FA10A91D2EDBF99125F86CE6'
],
h'14043FA0BED2EE3FA86E3A1F788EA04C35530F11061FFF60A16D0B83E9D92ADB
  B33F9DB3D7E0594C19A8E419A50CA770727763D5FE64510AD27AD650A58A9238
  ECCB2F0F5AC064584D5C06B9736368278B8934DC79C71D3AFD345F8314415849
  80682980398A867269CC7937CEE397F7DCF39588ED81032900D2A2C7BAABD63A
  8ECA090BD9FB39264BFF03D88E2D3F6B21CA8A7DD85FFB94BA83DE9CFC158D61
  FA672DB0C7DB3D250A414A85D37F4946373CF4B175D052F3DDC766F14BFDAA00
  EDBFE47EED01EC7BE4F646FC31FD72FE03D2F265AF4D7EE2819B7AFD303CF552
  F40534A08A3E194158C8A8E05171840915AEECA57775FA18F7D577D531CCC72D'
]]></artwork>
          <t>The size of the CBOR encoding (CBOR sequence) is 1295 bytes.</t>
        </section>
      </section>
      <section anchor="example-certificate-with-extensions-ipaddrblocks-and-ipaddrblocksv2">
        <name>Example: Certificate with Extensions IPAddrBlocks and IPAddrBlocksV2</name>
        <t>An example X.509 certificate with extensions IPAddrBlocks and IPAddrBlocksV2.</t>
        <artwork><![CDATA[
Certificate:
  Version: v3 (2)
  Serial Number:
    12:34
  Issuer: CN=selfsign-brainpoolp384r1,SURNAME=my surname,T=my title,
          GIVENNAME=my givenName,Name=my name
  Validity:
    Not Before: Thu Jan 02 01:00:00 CET 2025
    Not After : Fri Jan 02 01:00:00 CET 2026
  Subject: CN=selfsign-brainpoolp384r1,SURNAME=my surname,T=my title
           ,GIVENNAME=my givenName,Name=my name
  Subject Public Key Info:
    Public Key Algorithm: EC/BRAINPOOLP384R1
    Pub:
      04:67:09:c9:92:91:9b:49:c4:8f:d9:31:d0:5c:49:7d:38:65:
      e6:08:4c:91:df:3a:4c:7e:78:1f:41:85:43:b0:23:d5:9e:8b:
      f2:5d:13:3f:b1:a0:94:e9:d4:2c:8f:a6:ed:3b:46:e9:88:3a:
      35:ab:d4:b0:a9:d3:0a:ae:fd:9b:7e:88:ed:38:00:56:5d:1e:
      7f:06:33:13:4d:65:19:29:2d:49:bd:55:ec:30:a1:67:19:7f:
      ec:0f:74:29:82:2b:95
  X509v3 extensions:
    X509v3 keyUsage:
      digitalSignature
    X509v3 sbgp-ipAddrBlock:
      IPv4:
        192.0.2.0/24
        198.51.100.0/28
        203.0.113.0/24
      IPv6:
        2001:db8:1234::/48
        3fff:600:: - 3fff:fff:ffff:ffff:ffff:ffff:ffff:ffff
    X509v3 sbgp-ipAddrBlockV2:
      IPv4 unicast:
        192.0.2.0/24
        198.51.100.0/28
        203.0.113.0/24
      IPv6 unicast:
        2001:db8:1234::/48
        3fff:3:: - 3fff:122:0:2233:3344:5566:ffff:ffff
  Signature Algorithm: SHA384WITHECDSA
  Signature Value:
    30:64:02:30:67:09:c9:92:91:9b:49:c4:8f:d9:31:d0:5c:49:
    7d:38:65:e6:08:4c:91:df:3a:4c:7e:78:1f:41:85:43:b0:23:
    d5:9e:8b:f2:5d:13:3f:b1:a0:94:e9:d4:2c:8f:a6:ed:02:30:
    20:ed:9f:db:5a:30:9b:2c:87:04:dd:a5:f1:44:f1:7b:b3:16:
    b9:8c:29:11:24:fb:a5:cf:ec:6e:f9:7f:26:88:06:9a:e6:c5:
    2e:2b:3c:e2:23:12:8d:d1:0c:2a:a7:30
]]></artwork>
        <t>The DER encoding of the certificate is 717 bytes:</t>
        <artwork><![CDATA[
30 82 02 c9 30 82 02 50 a0 03 02 01 02 02 02 12 34 30 0a 06 08 2a 86
48 ce 3d 04 03 03 30 74 31 21 30 1f 06 03 55 04 03 0c 18 73 65 6c 66
73 69 67 6e 2d 62 72 61 69 6e 70 6f 6f 6c 70 33 38 34 72 31 31 13 30
11 06 03 55 04 04 0c 0a 6d 79 20 73 75 72 6e 61 6d 65 31 11 30 0f 06
03 55 04 0c 0c 08 6d 79 20 74 69 74 6c 65 31 15 30 13 06 03 55 04 2a
0c 0c 6d 79 20 67 69 76 65 6e 4e 61 6d 65 31 10 30 0e 06 03 55 04 29
0c 07 6d 79 20 6e 61 6d 65 30 1e 17 0d 32 35 30 31 30 32 30 30 30 30
30 30 5a 17 0d 32 36 30 31 30 32 30 30 30 30 30 30 5a 30 74 31 21 30
1f 06 03 55 04 03 0c 18 73 65 6c 66 73 69 67 6e 2d 62 72 61 69 6e 70
6f 6f 6c 70 33 38 34 72 31 31 13 30 11 06 03 55 04 04 0c 0a 6d 79 20
73 75 72 6e 61 6d 65 31 11 30 0f 06 03 55 04 0c 0c 08 6d 79 20 74 69
74 6c 65 31 15 30 13 06 03 55 04 2a 0c 0c 6d 79 20 67 69 76 65 6e 4e
61 6d 65 31 10 30 0e 06 03 55 04 29 0c 07 6d 79 20 6e 61 6d 65 30 7a
30 14 06 07 2a 86 48 ce 3d 02 01 06 09 2b 24 03 03 02 08 01 01 0b 03
62 00 04 67 09 c9 92 91 9b 49 c4 8f d9 31 d0 5c 49 7d 38 65 e6 08 4c
91 df 3a 4c 7e 78 1f 41 85 43 b0 23 d5 9e 8b f2 5d 13 3f b1 a0 94 e9
d4 2c 8f a6 ed 3b 46 e9 88 3a 35 ab d4 b0 a9 d3 0a ae fd 9b 7e 88 ed
38 00 56 5d 1e 7f 06 33 13 4d 65 19 29 2d 49 bd 55 ec 30 a1 67 19 7f
ec 0f 74 29 82 2b 95 a3 81 b0 30 81 ad 30 0b 06 03 55 1d 0f 04 04 03
02 07 80 30 48 06 08 2b 06 01 05 05 07 01 07 04 3c 30 3a 30 19 04 02
00 01 30 13 03 04 00 c0 00 02 03 05 04 c6 33 64 00 03 04 00 cb 00 71
30 1d 04 02 00 02 30 17 03 07 00 20 01 0d b8 12 34 30 0c 03 04 00 3f
ff 06 03 04 00 3f ff 0f 30 54 06 08 2b 06 01 05 05 07 01 1c 04 48 30
46 30 1a 04 03 00 01 01 30 13 03 04 00 c0 00 02 03 05 04 c6 33 64 00
03 04 00 cb 00 71 30 28 04 03 00 02 01 30 21 03 07 00 20 01 0d b8 12
34 30 16 03 05 00 3f ff 00 03 03 0d 00 3f ff 01 22 00 00 22 33 33 44
55 66 30 0a 06 08 2a 86 48 ce 3d 04 03 03 03 67 00 30 64 02 30 67 09
c9 92 91 9b 49 c4 8f d9 31 d0 5c 49 7d 38 65 e6 08 4c 91 df 3a 4c 7e
78 1f 41 85 43 b0 23 d5 9e 8b f2 5d 13 3f b1 a0 94 e9 d4 2c 8f a6 ed
02 30 20 ed 9f db 5a 30 9b 2c 87 04 dd a5 f1 44 f1 7b b3 16 b9 8c 29
11 24 fb a5 cf ec 6e f9 7f 26 88 06 9a e6 c5 2e 2b 3c e2 23 12 8d d1
0c 2a a7 30
]]></artwork>
        <section anchor="example-c509-certificate-encoding-4">
          <name>Example: C509 Certificate Encoding</name>
          <t>The CBOR encoding (~C509Certificate) of the X.509 certificate is shown below in CBOR diagnostic format.</t>
          <artwork><![CDATA[
/This defines a CBOR Sequence (RFC 8742):/

3,
h'1234',
1,
null,
1735776000,
1767312000,
[
  1,"selfsign-brainpoolp384r1",
  2, "my surname",
  10, "my title",
  13, "my givenName",
  25, "my name"
],
25,
h'046709C992919B49C48FD931D05C497D3865E6084C91DF3A4C7E781F418543B0
  23D59E8BF25D133FB1A094E9D42C8FA6ED3B46E9883A35ABD4B0A9D30AAEFD9B
  7E88ED3800565D1E7F0633134D6519292D49BD55EC30A167197FEC0F7429822B
  95',
[
  2, 1,
  32, [
       1, null, [ 29360130, 24770733054, -24770012047 ],
       2, null, [
                  316663873933876,
                  [ -316663852962606, 9 ]
                ]
      ],
  34, [
       1, 1, [ 29360130, 24770733054, -24770012047 ],
       2, 1, [
               h'0020010DB81234',
               [ h'003FFF0003', h'003FFF01220000223333445566' ]
             ]
      ]
],
h'6709C992919B49C48FD931D05C497D3865E6084C91DF3A4C7E781F418543B023
  D59E8BF25D133FB1A094E9D42C8FA6ED20ED9FDB5A309B2C8704DDA5F144F17B
  B316B98C291124FBA5CFEC6EF97F2688069AE6C52E2B3CE223128DD10C2AA730'
]]></artwork>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors want to thank Henk Birkholz, Mike Bishop, Mohamed Boucadair, Corey Bonnell, Carsten Bormann, Deb Cooley, Roman Danyliw, Viktor Dukhovni, Paul Hoffman, Russ Housley, Christopher Inacio, Olle Johansson, Benjamin Kaduk, Ted Lemon, Ilari Liusvaara, Laurence Lundblade, Francesca Palombini, Thomas Peterson, Michael Richardson, Stefan Santesson, Jim Schaad, Brian Sipos, Rene Struik, Ketan Talaulikar, Fraser Tweedale, Gunter Van de Velde, Éric Vyncke, and Paul Wouters for reviewing and commenting on intermediate versions of the draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
