<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-fdb-rats-psa-endorsements-05" category="info">

  <front>
    <title abbrev="PSA Endorsements">Arm's Platform Security Architecture (PSA) Attestation Verifier Endorsements</title>

    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm Ltd</organization>
      <address>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date />

    <area>Security</area>
    <workgroup>RATS</workgroup>
    

    <abstract>


<t>PSA Endorsements include reference values, cryptographic key material and
certification status information that a Verifier needs in order to appraise
attestation Evidence produced by a PSA device.  This memo defines such PSA
Endorsements as a profile of the CoRIM data model.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>PSA Endorsements include reference values, cryptographic key material and
certification status information that a Verifier needs in order to appraise
attestation Evidence produced by a PSA device <xref target="PSA-TOKEN"/>.  This memo defines
such PSA Endorsements as a profile of the CoRIM data model <xref target="CoRIM"/>.</t>

</section>
<section anchor="conventions-and-definitions" title="Conventions and Definitions">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader is assumed to be familiar with the terms defined in Section 2.1 of
<xref target="PSA-TOKEN"/> and in Section 4 of <xref target="RATS-ARCH"/>.</t>

</section>
<section anchor="sec-psa-endorsements" title="PSA Endorsements">

<t>PSA Endorsements describe an attesting device in terms of the hardware and
firmware components that make up its PSA Root of Trust (RoT). This includes
the identification and expected state of the device as well as the
cryptographic key material needed to verify Evidence signed by the device’s PSA
RoT. Additionally, PSA Endorsements can include information related to the
certification status of the attesting device.</t>

<t>There are five types of PSA Endorsements:</t>

<t><list style="symbols">
  <t>Reference Values (<xref target="sec-ref-values"/>), i.e., measurements of the PSA RoT
firmware;</t>
  <t>Attestation Verification Claims (<xref target="sec-keys"/>), i.e., cryptographic keys
that can be used to verify signed Evidence produced by the PSA RoT, along
with the identifiers that bind the keys to their device instances;</t>
  <t>Certification Claims (<xref target="sec-certificates"/>), i.e., metadata that describe
the certification status associated with a PSA device.</t>
  <t>Software Relations (<xref target="sec-swrel"/>), used to model upgrade and patch
relationships between software components;</t>
  <t>Endorsements Block List (<xref target="sec-endorsements-block-list"/>), used to invalidate
previously provisioned Endorsements.</t>
</list></t>

<section anchor="psa-endorsement-profile" title="PSA Endorsement Profile">

<t>PSA Endorsements are carried in one or more CoMIDs inside a CoRIM.</t>

<t>The profile attribute in the CoRIM MUST be present and MUST have a single entry
set to the uri <spanx style="verb">http://arm.com/psa/iot/1</spanx> as shown in <xref target="ex-psa-iot-profile"/>.</t>

<figure title="PSA IoT version 1, CoRIM profile" anchor="ex-psa-iot-profile"><artwork><![CDATA[
/ corim-map / {
  / corim.profile / 3: [ 
    32("http://arm.com/psa/iot/1")
  ]
  / ... /
}
]]></artwork></figure>

</section>
<section anchor="sec-psa-rot-id" title="PSA Endorsements to PSA RoT Linkage">

<t>Each PSA Endorsement - be it a Reference Value, Attestation Verification Claim
or Certification Claim - is associated with an immutable PSA RoT.  A PSA
Endorsement is associated to its PSA RoT by means of the unique PSA RoT
identifier known as Implementation ID (see Section 3.2.2 of <xref target="PSA-TOKEN"/>).</t>

<t>In order to support PSA Implementation IDs, the CoMID type
<spanx style="verb">$class-id-type-choice</spanx> is extended as follows:</t>

<figure><artwork><![CDATA[
; from draft-tschofenig-rats-psa-token
psa-implementation-id-type = bytes .size 32

tagged-implementation-id-type = #6.600(implementation-id-type)

$class-id-type-choice /= tagged-implementation-id-type
]]></artwork></figure>

<t>Besides, a PSA Endorsement can be associated with a specific instance of a
certain PSA RoT - as in the case of Attestation Verification Claims.  A PSA
Endorsement is associated with a PSA RoT instance by means of the Instance ID
(see Section 3.2.1 of <xref target="PSA-TOKEN"/>) and its “parent” Implementation ID.</t>

<t>These identifiers are typically found in the subject of a CoMID triple, encoded
in an <spanx style="verb">environment-map</spanx> as shown in <xref target="ex-psa-rot-id"/>.</t>

<figure title="Example PSA RoT Identification" anchor="ex-psa-rot-id"><artwork><![CDATA[
/ environment-map / {
  / comid.class / 0 : {
    / comid.class-id / 0 :
      / tagged-impl-id-type / 600(
        h'61636d652d696d706c656d656e746174
          696f6e2d69642d303030303030303031'
      ),
      / comid.vendor / 1 : "ACME Ltd.",
      / comid.model /  2 : "Roadrunner 1.0"
  },
  / comid.instance / 1 :
    / tagged-ueid-type / 550(
      h'01
        4ca3e4f50bf248c39787020d68ffd05c
        88767751bf2645ca923f57a98becd296'
    )
}
]]></artwork></figure>

<t>Optional <spanx style="verb">vendor</spanx> and <spanx style="verb">model</spanx> can be specified as well.  Together, they are
interpreted as a unique identifier of the product that embeds the PSA RoT.
Consistently providing a product identifier is RECOMMENDED.</t>

</section>
<section anchor="sec-ref-values" title="Reference Values">

<t>Reference Values carry measurements and other metadata associated with the
updatable firmware in a PSA RoT.  When appraising Evidence, the Verifier
compares Reference Values against the values found in the Software Components
of the PSA token (see Section 3.4.1 of <xref target="PSA-TOKEN"/>).</t>

<t>Each measurement is encoded in a <spanx style="verb">measurement-map</spanx> of a CoMID
<spanx style="verb">reference-triple-record</spanx>.  Since a <spanx style="verb">measurement-map</spanx> can encode one or more
measurements, a single <spanx style="verb">reference-triple-record</spanx> can carry as many measurements
as needed, provided they belong to the same PSA RoT identified in the subject of
the “reference value” triple.  A single <spanx style="verb">reference-triple-record</spanx> SHALL
completely describe the updatable PSA RoT.</t>

<t>The identifier of a measured software component is encoded in a <spanx style="verb">psa-swcomp-id</spanx>
object as follows:</t>

<figure><artwork><![CDATA[
psa-swcomp-id = {
  psa.measurement-type => text
  psa.version => text
  psa.signer-id => psa.hash-type
}

psa.hash-type = bytes .size 32 / bytes .size 48 / bytes .size 64

psa.measurement-type = 1
psa.version = 4
psa.signer-id = 5
]]></artwork></figure>

<t>The semantics of the codepoints in the <spanx style="verb">psa-swcomp-id</spanx> map are equivalent to
those in the <spanx style="verb">psa-software-component</spanx> map defined in Section 3.4.1 of
<xref target="PSA-TOKEN"/>.  The <spanx style="verb">psa-swcomp-id</spanx> MUST uniquely identify a given software
component within the PSA RoT / product.</t>

<t>In order to support PSA Reference Value identifiers, the CoMID type
<spanx style="verb">$measured-element-type-choice</spanx> is extended as follows:</t>

<figure><artwork><![CDATA[
tagged-psa-swcomp-id = #6.601(psa-swcomp-id)

$measured-element-type-choice /= tagged-psa-swcomp-id
]]></artwork></figure>

<t>and automatically bound to the <spanx style="verb">comid.mkey</spanx> in the <spanx style="verb">measurement-map</spanx>.</t>

<t>The raw measurement is encoded in a <spanx style="verb">digests-type</spanx> object in the
<spanx style="verb">measurement-values-map</spanx>.  The <spanx style="verb">digests-type</spanx> array MUST contain at least one
entry.  The <spanx style="verb">digests-type</spanx> array MAY contain more than one entry if multiple
digests (obtained with different hash algorithms) of the same measured
component exist.</t>

<t>The example in <xref target="ex-reference-value"/> shows a CoMID a PSA Endorsement of type
Reference Value for a firmware measurement associated with Implementation ID
<spanx style="verb">acme-implementation-id-000000001</spanx>.</t>

<figure title="Example Reference Value" anchor="ex-reference-value"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.reference-triples / 0 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          }
        },
        [
          / measurement-map / {
            / comid.mkey / 0 : 601({
              / psa.measurement-type / 1 : "PRoT",
              / psa.version /          4 : "1.3.5",
              / psa.signer-id /        5 : h'acbb11c7e4da2172
                                            05523ce4ce1a245a
                                            e1a239ae3c6bfd9e
                                            7871f7e5d8bae86b'
            }),
            / comid.mval / 1 : {
              / comid.digests / 2 : [
                / hash-alg-id / 1, / sha256 /
                / hash-value /  h'44aa336af4cb14a8
                                  79432e53dd6571c7
                                  fa9bccafb75f4882
                                  59262d6ea3a4d91b'
              ]
            }
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

<section anchor="sec-swrel" title="Software Upgrades and Patches">

<t>In order to model software lifecycle events such as updates and patches, this
profile defines a new triple that conveys the following semantics:</t>

<t><list style="symbols">
  <t>SUBJECT: a software component</t>
  <t>PREDICATE: (non-critically / critically) (updates / patches)</t>
  <t>OBJECT: another software component</t>
</list></t>

<t>The triple is reified and used as the object of another triple,
<spanx style="verb">psa-swrel-triple-record</spanx>, whose subject is the embedding environment.</t>

<figure><artwork><![CDATA[
comid.psa-swrel-triples = 5

$$triples-map-extension //= (
  comid.psa-swrel-triples => [ + psa-swrel-triple-record ]
)

psa.updates = 1
psa.patches = 2

psa-swrel-rel = [
  type: psa.updates / psa.patches
  security-critical: bool ; true means it's a fix for a security bug
]

sw-rel = [
  new: psa-swcomp-id ; identifier of the "new" firmware
  rel: psa-swrel-rel ; patches, updates and the security flag
  old: psa-swcomp-id ; identifier of the "old" firmware
]

psa-swrel-triple-record = [
  environment-map
  sw-rel
]
]]></artwork></figure>

<t>An example of a security critical update involving versions “1.3.5” and “1.4.0”
of software component “PRoT” within the target environment associated with
Implementation ID <spanx style="verb">acme-implementation-id-000000001</spanx> is shown in
<xref target="ex-psa-swrel-update-crit"/>.</t>

<figure title="Example Critical Software Upgrade" anchor="ex-psa-swrel-update-crit"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.psa-swrel-triples / 5 : [
      [
        / environment-map / {
          / comid.class-id / 0 :
          / tagged-impl-id-type / 600(
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031'
          ),
          / comid.vendor / 1 : "ACME Ltd.",
          / comid.model /  2 : "Roadrunner 1.0"
        },

        / sw-rel / [
          / new / {
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.4.0",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          },

          / rel / [
            / type / 1, / psa.updates /
            / security-critical / true
          ],

          / old / {
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.3.5",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="sec-keys" title="Attestation Verification Claims">

<t>An Attestation Verification Claim carries the verification key associated with
the Initial Attestation Key (IAK) of a PSA device.  When appraising Evidence,
the Verifier uses the Implementation ID and Instance ID claims (see
<xref target="sec-psa-rot-id"/>) to retrieve the verification key that it SHALL use to check
the signature on the Evidence.  This allows the Verifier to prove (or disprove)
the Attester’s claimed identity.</t>

<t>Each verification key is provided alongside the corresponding device Instance
and Implementation IDs (and, possibly, a product identifier) in an
<spanx style="verb">attest-key-triple-record</spanx>.  Specifically:</t>

<t><list style="symbols">
  <t>The Instance and Implementation IDs are encoded in the environment-map as
shown in <xref target="ex-psa-rot-id"/>;</t>
  <t>The IAK public key is carried in the <spanx style="verb">comid.key</spanx> entry in the
<spanx style="verb">verification-key-map</spanx>.  The IAK public key is a PEM-encoded
SubjectPublicKeyInfo <xref target="RFC5280"/>.  There MUST be only one
<spanx style="verb">verification-key-map</spanx> in an <spanx style="verb">attest-key-triple-record</spanx>;</t>
  <t>The optional <spanx style="verb">comid.keychain</spanx> entry MUST NOT be set by a CoMID producer that
uses the profile described in this document, and MUST be ignored by a CoMID
consumer that is parsing according to this profile.</t>
</list></t>

<t>The example in <xref target="ex-attestation-verification-claim"/> shows the PSA Endorsement
of type Attestation Verification Claim carrying a secp256r1 EC public IAK
associated with Instance ID <spanx style="verb">4ca3...d296</spanx>.</t>

<figure title="Example Attestation Verification Claim" anchor="ex-attestation-verification-claim"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.attest-key-triples / 3 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          },
          / comid.instance / 1 :
            / tagged-ueid-type / 550(
              h'01
                4ca3e4f50bf248c39787020d68ffd05c
                88767751bf2645ca923f57a98becd296'
            )
        },
        [
          / verification-key-map / {
            / comid.key / 0 :
              "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgA
              ETl4iCZ47zrRbRG0TVf0dw7VFlHtv18HInY
              hnmMNybo+A1wuECyVqrDSmLt4QQzZPBECV8
              ANHS5HgGCCSr7E/Lg=="
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sec-certificates" title="Certification Claims">

<t>PSA Certified <xref target="PSA-CERTIFIED"/> defines a certification scheme for the PSA
ecosystem.  A product - either a hardware component, a software component, or
an entire device - that is verified to meet the security criteria established
by the PSA Certified scheme is warranted a PSA Certified Security Assurance
Certificate (SAC).  A SAC contains information about the certification of a
certain product (e.g., the target system, the attained certification level, the
test lab that conducted the evaluation, etc.), and has a unique Certificate
Number.</t>

<t>The linkage between a PSA RoT – comprising the immutable part as well as zero
or more of the mutable components – and the associated SAC is provided by a
Certification Claim, which binds the PSA RoT Implementation ID and the software
component identifiers with the SAC unique Certificate Number.  When appraising
Evidence, the Verifier can use the Certification Claims associated with the
identified Attester as ancillary input to the Appraisal Policy, or to enrich
the produced Attestation Result.</t>

<t>A Certification Claim is encoded in an <spanx style="verb">psa-cert-triple-record</spanx>, which extends
the <spanx style="verb">$$triples-map-extension</spanx> socket, as follows:</t>

<figure><artwork><![CDATA[
comid.psa-cert-triples = 4

$$triples-map-extension //= (
  comid.psa-cert-triples => [ + psa-cert-triple-record ]
)

psa.immutable-rot = 1
psa.mutable-rot = 2

psa-rot-descriptor = {
  psa.immutable-rot => psa-implementation-id-type
  psa.mutable-rot => [ * psa-swcomp-id ]
}

psa-cert-triple-record = [
  psa-rot-descriptor
  psa-cert-num-type
]

psa-cert-num-type = text .regexp "[0-9]{13} - [0-9]{5}"
]]></artwork></figure>

<t><list style="symbols">
  <t>The Implementation ID of the immutable PSA RoT to which the SAC applies is
encoded as a <spanx style="verb">tagged-impl-id-type</spanx> in the <spanx style="verb">psa.immutable-rot</spanx> of the
<spanx style="verb">psa-rot-descriptor</spanx>;</t>
  <t>Any software component that is part of the certified PSA RoT is encoded as a
<spanx style="verb">psa-swcomp-id</spanx> (see <xref target="sec-ref-values"/>) in the <spanx style="verb">psa.mutable-rot</spanx> of the
<spanx style="verb">psa-rot-descriptor</spanx>;</t>
  <t>The unique SAC Certificate Number is encoded in the <spanx style="verb">psa-cert-num-type</spanx>.</t>
</list></t>

<t>A single CoMID can carry one or more Certification Claims.</t>

<t>The example in <xref target="ex-certification-claim"/> shows a Certification Claim that
associates Certificate Number <spanx style="verb">1234567890123 - 12345</spanx> to Implementation ID
<spanx style="verb">acme-implementation-id-000000001</spanx> and a single “PRoT” software component with
version “1.3.5”.</t>

<figure title="Example Certification Claim with `supplement` Link-Relation" anchor="ex-certification-claim"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  }, 
  / comid.triples / 4 : {
    / comid.psa-cert-triples / 4 : [
      [
        / psa-rot-descriptor / {
          / psa.immutable-rot / 1 :
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031',
          / psa.mutable-rot / 2 : [
            / psa-swcomp-id / {
              / psa.measurement-type / 1 : "PRoT",
              / psa.version /          4 : "1.3.5",
              / psa.signer-id /        5 : h'acbb11c7e4da2172
                                             05523ce4ce1a245a
                                             e1a239ae3c6bfd9e
                                             7871f7e5d8bae86b'
            }
          ]
        },
        / psa-cert-num-type / "1234567890123 - 12345"
      ]
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sec-endorsements-block-list" title="Endorsements Block List">

<t><cref>This is work in progress.  It may change or be removed in the future.</cref></t>

<t>The following three “blocklist” claims:</t>

<t><list style="symbols">
  <t><spanx style="verb">reference-blocklist-triple</spanx></t>
  <t><spanx style="verb">attest-key-blocklist-triple</spanx></t>
  <t><spanx style="verb">cert-blocklist-triple</spanx></t>
</list></t>

<t>are defined with the same syntax but opposite semantics with regards to their
“positive” counterparts to allow invalidating previously provisioned endorsements
from the acceptable set.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t><cref>TODO</cref></t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="cbor-tag-registrations" title="CBOR Tag Registrations">

<t>IANA is requested to allocate the following tag in the “CBOR Tags” registry
<xref target="IANA.cbor-tags"/>, preferably with the specified value:</t>

<texttable title="CoRIM CBOR Tags" anchor="tbl-psa-cbor-tag">
      <ttcol align='left'>Tag</ttcol>
      <ttcol align='left'>Data Item</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c>600</c>
      <c>tagged bytes</c>
      <c>PSA Implementation ID (<xref target="sec-psa-rot-id"/> of RFCTHIS)</c>
      <c>601</c>
      <c>tagged map</c>
      <c>PSA Software Component Identifier (<xref target="sec-ref-values"/> of RFCTHIS)</c>
</texttable>

</section>
<section anchor="corim-profile-registration" title="CoRIM Profile Registration">

<t>IANA is requested to register the following profile value in the
<cref>TODO</cref> CoRIM registry.</t>

<texttable title="PSA profile for CoRIM" anchor="tbl-psa-corim-profile">
      <ttcol align='left'>Profile Value</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c><spanx style="verb">http://arm.com/psa/iot/1</spanx></c>
      <c>uri</c>
      <c>The CoRIM profile specified by this document</c>
</texttable>

</section>
<section anchor="comid-codepoints" title="CoMID Codepoints">

<t>IANA is requested to register the following codepoints to the “CoMID Triples
Map” registry.</t>

<texttable title="PSA CoMID Triples" anchor="tbl-psa-comid-triples">
      <ttcol align='left'>Index</ttcol>
      <ttcol align='left'>Item Name</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>4</c>
      <c>comid.psa-cert-triples</c>
      <c>RFCTHIS</c>
      <c>5</c>
      <c>comid.psa-swrel-triples</c>
      <c>RFCTHIS</c>
</texttable>

</section>
</section>
<section numbered="no" anchor="acknowledgements" title="Acknowledgements">

<t><cref>TODO</cref></t>

</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor="PSA-TOKEN" target="https://datatracker.ietf.org/doc/html/draft-tschofenig-rats-psa-token-23">
  <front>
    <title>Arm's Platform Security Architecture (PSA) Attestation Token</title>
    <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="Simon Frost" initials="S." surname="Frost">
      <organization>Arm Limited</organization>
    </author>
    <author fullname="Mathias Brossard" initials="M." surname="Brossard">
      <organization>Arm Limited</organization>
    </author>
    <author fullname="Adrian L. Shaw" initials="A. L." surname="Shaw">
      <organization>HP Labs</organization>
    </author>
    <author fullname="Thomas Fossati" initials="T." surname="Fossati">
      <organization>Linaro</organization>
    </author>
    <date day="24" month="June" year="2024"/>
    <abstract>
      <t>The Arm Platform Security Architecture (PSA) is a family of hardware and firmware security specifications, as well as open-source reference implementations, to help device makers and chip manufacturers build best-practice security into products. Devices that are PSA compliant can produce attestation tokens as described in this memo, which are the basis for many different protocols, including secure provisioning and network access control. This document specifies the PSA attestation token structure and semantics. The PSA attestation token is a profile of the Entity Attestation Token (EAT). This specification describes what claims are used in an attestation token generated by PSA compliant systems, how these claims get serialized to the wire, and how they are cryptographically protected. This informational document is published as an independent submission to improve interoperability with Arm's architecture. It is not a standard nor a product of the IETF.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-tschofenig-rats-psa-token-23"/>
</reference>

<reference anchor="CoRIM" target="https://datatracker.ietf.org/doc/html/draft-ietf-rats-corim-05">
  <front>
    <title>Concise Reference Integrity Manifest</title>
    <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
      <organization>Fraunhofer SIT</organization>
    </author>
    <author fullname="Thomas Fossati" initials="T." surname="Fossati">
      <organization>Linaro</organization>
    </author>
    <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
      <organization>arm</organization>
    </author>
    <author fullname="Ned Smith" initials="N." surname="Smith">
      <organization>Intel</organization>
    </author>
    <author fullname="Wei Pan" initials="W." surname="Pan">
      <organization>Huawei Technologies</organization>
    </author>
    <date day="8" month="July" year="2024"/>
    <abstract>
      <t>Remote Attestation Procedures (RATS) enable Relying Parties to assess the trustworthiness of a remote Attester and therefore to decide whether to engage in secure interactions with it - or not. Evidence about trustworthiness can be rather complex and it is deemed unrealistic that every Relying Party is capable of the appraisal of Evidence. Therefore that burden is typically offloaded to a Verifier. In order to conduct Evidence appraisal, a Verifier requires not only fresh Evidence from an Attester, but also trusted Endorsements and Reference Values from Endorsers and Reference Value Providers, such as manufacturers, distributors, or device owners. This document specifies the information elements for representing Endorsements and Reference Values in CBOR format.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-rats-corim-05"/>
</reference>

<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
  <front>
    <title>Concise Binary Object Representation (CBOR) Tags</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor="RATS-ARCH" target="https://www.rfc-editor.org/info/rfc9334">
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
    <author fullname="D. Thaler" initials="D." surname="Thaler"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="N. Smith" initials="N." surname="Smith"/>
    <author fullname="W. Pan" initials="W." surname="Pan"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9334"/>
  <seriesInfo name="DOI" value="10.17487/RFC9334"/>
</reference>


<reference anchor="PSA-CERTIFIED" target="https://www.psacertified.org">
  <front>
    <title>PSA Certified</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source:
H4sIAPHI0WYAA+1c6XLbSJL+j6eoYXeEpW7epyRPdzRNyWNO+5TU3nA7HMsi
UCQxAgE2AEqmZfWz7LPsk21m1oHCQVua3tljduWwTQJ1ZGVmZX6ZlaVGo+Gk
fhqIEzaO148S9jrg6SKK1+xCuNvYT3fw3F35qXDTbSzYweuL8SEbp6lIUp76
Ucjeithf+CJmZ6EXxYlYizBNHD6fx+L6hEHz/AsvckO+hum8mC/SxsKbN2Ke
Jo1NwhvCatgAOmAOx4P/Ttjt6fjy7M5x4csyincnzA8XkeNv4hOWxtsk7bbb
x+2uw2PBTwzlzk0UXy3jaLs5YefjywvHAZpD7195EIUw5k4kzsY/cRzG4oUr
vCTdBeoxY2nkWh/90AOa9IMkitNYLBLzfbfOfU1j3zWN3WhN6zGjiY9pI/CT
tAHd5lEALxrRd9/DG+DMmm82friUbR2+TVdRDAQ24K1k2uUqWvOEPY2SBLgP
j6MYWj/3Qx5H8E2suR8AS6hVcyFb/RTQ6yY0tYd6Fy1FsmKn8M8GuCL0YKAG
7HnqZaPtqGHT0w1/4vG6CcuyB3smwiv2xI+vVlHwSY/0NObbcBUtQDcuppfZ
gCto3Jyrxj8lftpcmJYwjeOEoH9A+LU4gU6gQY3LVz+fvTxh08ZpM01cbBj6
y0xv0uhKhCjHSXQ+fSHb+SJdyBZuFPtALGqMNSwqRGN8PnkGuvF0ctzr9R01
2eTs/HL6dHp2is1YyuOlAGmu0nSTnLRaNzc3TZjTFXGKau8RW7Gd3ESo7xP9
Dp9L/e22ux3gV6PB+Bz0g7up4xS3Bui0G2w9wUCZRCxCV7BrHmxFUmduvNuk
0TLmm5XvsiuxY7AQ2Hc8YCARRxHjyg2JG3ObMLNeeJSueMp4tlVDAeoOLUBO
HnxNIwaKF3M/EQ63tvbZte8RHZs48rawRdh8B8Mg4Z649l3RZKCRfsLWYh3B
o4UfioQlW3eFbZzc4kBrOY6z8APBogWQJKS4kEOcrSNPBE3JorXveQGowTds
GqY0M1LzT8Ewdntr9Pnurop9jmYfezD7YHB6BAMj8yZReA19ga4EFw07HSbw
6bvjXEJ/ZAuYSFhY7cUvF5e1uvyfvXxFn8/P3vwyPT87xc8Xz8bPn5sPjmpx
8ezVL89Ps09Zz8mrFy/OXp7KzvCU5R45tRfjd/AGqaq9en05ffVy/LyG7E2R
HWAIt7hqBuYcWT0X8Aqkt4lFCizl4ERE4sb+HL5AnyeT1//+b50+rP5PsJO7
nc7x3Z36ctQZ9eHLDVgcOVsUBjv1FTi4c0CKgsc4Cg8C5vKNn/IA9AfYnayi
mxBsVSyAm8QvcC4ofB+lkQCFniJuwdd+4MMwN366IskAsetESZRoBJdECtJt
dkB6Tk4LiDCrTR/le3trDJQSZ8mT3p6wbxLhljwnu6vYKppjMBmTGgt+Risl
Mp4oVoq14rF3g8zHvbLw4zV9AZO/AceJo9H2WPMrwbYb5sMDnO88ilIc4RId
Mjs4jy4Pm1K/1T5NHBwcd4i1+XDx4uMG1g6cwn1k1FsRB6K4ESAcjtMK5ws7
GzepFMo17ttdth0TfxnKzZgN/IiodoDMJht7Hm0MUIJdvbz5XGCatjW2lYgF
ghSakUirsipqMUWeN0mlkMXwdwE+iaW7jaDmxekBAHzHzo2Je0smjh3c3qLw
wfQ1pNG7uzusM78pmnWwJzwBsCaJVwRICaEX1gJ9DMOWgZyifhJwf21mATbb
45dkQMAGdQI5BUq2TXJyUOyvtI4WbbDtAJmhNzUbSSuLiJXSzQGK0RucVTHe
jzNFRoTnigTXNsmJI7+gTFQFxqWc7CnNpfcMLQ70v0q8YAkAHpIWENE57whE
XESLlHbPOeoK2WJFQnID6kNza25JI77dAGM92ntsw1N3hfhUd175mwQYnN4I
ASTosbOdievOqe6TIHKvACDijpTz5kD2HF8THM1R4oegUz5CF5gczO61H20T
sJwguGs/AUJQmtY4aKBKFoq9lu6qwhoR0TyOfWkdYTxwrLD+GJ3ai+kpmozE
RyZIJyd3i/F/sJlALttUWi7jCcl5zbGZSMh9AAfp2Ypf41AJbD/oDa/inZOI
VKkPg2CBzRDfAbxT2LYFRrXlR2mrM8t8AUx2eys+ksGFdw1FDtnn33//3Wkx
gpoNQPGsxW6BdepJUxPeYr0T9p4hLmS97kFt36S1Q2jygQZoNpus5dzRBGjx
y/NL6PlDDbk8jS5x06GIWKeu+KLa1dAxlMVEu0jtQIwkrvhS5HxLDFP5HvQ9
42VkwhrknhEsFUxU/SvGxQGJV2xRGNCv2FbA/fV6m/J5YMwFoKdxEWcW+qIq
G+90ieYGTGNobOI29H/bZqYxMzbsKkSBg+Sn601AI0sSp6fsIBHC+Opes9vs
Sn9tefRDUIiphRWT7WYDMSNNVBowqSsVBr0nJ+DMvnUDWAQwvYHfGxDwgDWZ
4dogeIT9SyCILaIgiG7QPaBuPGaLOFqrqHp/kES6kyNBT8N+AP6AwFgz8T8J
UE/HSflyKbz97b8ZNoft9kH1+0PHqVwHa/3AvjgwLcd5ItAAIBQrqZxyMmXT
mwCMQHUyfgAlw8kvc9i8Wg0ayD1lOVyeUKuvOMJ76Jpl/nESQ0JR6ab6xfTU
KelSp6xLEh6CFtc2YDbDtFZWIWkek7y7JPC828A6ANSAsmwlykQSku38bzAp
cUcrXuzDoHUwji54Ic9BRByymQiv/TgKcTI0a3uMobIQmR0sdLOsIcR2TdIK
+NZmJ/S88AaGki/pFb601MVoX4uh6qkmjK0eDTvD3tAbDrre8HjojdpDdzjA
70Mx6g8hDjBNGYMGi6Gghv2u12sX/nQeqbaHdUOCpO+anCd87QDptfHkxRmm
Spq1YjvpyVuMdbHdecS9eBuGYAw6zXYN2t7VLXYYTaFhndyStyJb72Bg1rt6
1O6Y9fRd3hP9xaA9X3T7R27veHQ0anfb3vBosfDaA9c0PDoaDUejQQfaDfsD
lx93e4vBiB8fzYXrdY+HctmHZWcj5av9zNlHjgpoNH2aA/TkZV5tJJpmM8mx
GSnxjNgy0/tX7VZpzBDiYzgcLQVoaCzDM9RhJx/6gcIqq21Za7WzJKxMJXgT
6zmG7Ba8bDoQEScAdaCfxjIeInJuelpjwua2YlYJcIog3LhJC4U7TgmqI9LZ
5UE5xaK40AxyFk0JRhTbDb5Cn2eiMNyYlgf8F4hldS4C16IxtnQqOn/hIEKE
3kk5juBLjgpIzeUS8rbCANiJAZmOFVKQVyn6xH6VHWsqAGHxgTyaNDhyXTPr
pbQ3mYlyZibN05DWCtgO8MqbARsufFxS1QCobHIOG2Y6tjTqGTbcOweNIwUJ
SrjmYV6gDjyU4WddKZbwpArPBcY0GmomfJ1tHKNtFYaZQuVaIbFVU2aavNFX
KZapGpR8AJsHNN7kAAj7GNUy24Mwdn5bcb1KryLaKIsPjUVygw3AXsycSK6m
hFVyzQBHoBOAZ01beBJi/Ej5cvVaA9v8UwouYxroR3qw4slKAgnYjLkHJYgD
VtV+0D8qPBj25QhlwljHyZHE+k6BGDaQQAaZCoCBA1ddAwKQaZvIl0lMelLg
HUO3idwWv219ED6yO41AK6JE5LsosTSMWGTfiuST3phOOQlZnp8CJ2lqQXWU
VmAyc+lfW7Gnk2kDWi1FmdbwlrasXwDEBYtkY5gKZKzVsSGCTBz3Q8jKpRaV
j0Bs5yD3GLHrl2ayMGyun5Q4Gne+TSPMEkn0NSeLqmzATGGEK7GbGVEW7Zba
jTG/+bLB9Pwl4NaEiANrKTecHNTJDSptuxxbSTzfF2wb30mxu1FIgBncaABD
pGg5HQqbv9h1/M70pFAe/LCM7akr8xdsvQ1StFGO6s8Oojm21z7P8xekDCnD
Pct4sITwOV2tk0O9cciAatFYyic+gmNXTBMKoGiImllIYsLdHUHYxGDfcoSB
k6G+FXVzAe6DZ77YlkzRfZdAujPj7lpUxDxt9dOZWXmE0PUT0Vgj+uPLAn6G
Jw25S9KdwqJ5GC0bKIS9etRbtId8Mezx457b6Yj+8eh41G4P2oPhcXs06i0e
FRGpdCQI0fulsYvuRgP59wpmvjdwc18YkL3fFw5UtiiGBVmje4QHf1eY8NBw
Qf+YsKG4jq+FD8X2Xwsj9M+d+XyXDfU+x+qCfSmIwpoSM+pSFmgVb0uUVbpD
taLXYPMrFmM7ylb2AnWr1mn2moM9fTJnanoNSKG5O593Ou5I9D3e7Yy6FTLb
/9MeDLo9V/Rd0eHd/oA/qDP26R1z0XOH84V3LB7UGeKyzmIkBt7RnIuj4Tyv
N3cFtTESAaOV2+XlJtqatkhR3peIapE5bYA5lczs1OGfZMW7gyFr7WtNthI5
v3rU73Pe64EN6bvzTp8f3WPVo+N+rysGPQ+21ghEdY8uC348d12+mI8Gi/7R
0X2kOjjuDmFfCt7jfe+4My/uxA95DlduGd1G/o//3uUj4IL7KIbBBR9RoyTr
N1nc9IvM58uY7zUm9K3AUR4C5MGR3PUGbgf+Qrg7FxPX1xQ70gExoBtC8Grc
jRy3Tgeojk4M6xN5DrHJjYod1DkNng3vZHgsURIGjwam0pHTxS9P/no2uTzB
6KiE/eH96/Oz0+lkfHl2wg5CcGUQW2i8A4ppvhyyA01pS9N5CN1f6dFDGQhX
zEHeXJENyCcWKl0AC6aTCnkkqFEPhitqLJXNchSoBR4XgqM6uyEkrQMuX45E
SQPKCViuS3lludWKAyYE9J1vv1Vf0bg2CINKcwdA8UBWAVV3/pG9Z9+zPWSC
Nh7KAERzUMcdio/wves4WW/4C4/QAKBZPmF2V2lTVUcsU1JVUkZuJwBTo4A9
xooqoXKWfvooIcTzUWEf3YvNt0vng+MkN9akoGUnLI+vH1fkaWrQrmZQlDze
OmH5VTzOVNrWc4KAmoRFwPGwMAq8e80K7axZP9h8y3NdLqYAXpBjtFboSSh/
HBqgSYGyIUvzUxGOh2lRcI1KpZxgot2eLIDoQFgG7hwGqQixpU+1YytZkGST
V8SeTvnQ4uvYE7eAzuw6JrMr2SMXQoqSO+z6HwtSyxutRdDhD4LUKgh6b/j5
YOj5ENiZww4PgZsPg5ogAItzau+3ClATfU0ZXj4QN34NNeKWqerxD8GMfwQy
/hHE+CXAaIsCF1+WBOmm4nJdscc4g0K7kjPAvuAGrGYfChOCOf3Hi7kcHPxf
E/P9cWqlvS6i1YmWbxGf0rkNHnJ85STUQFeqCSI3+OUeqtBDAqxr+zWGmkXX
JU9IgUYg0R73Z2h7MB3/fCidba4Ede8ZiGOfgSBklESU3SP6YetclrmqWCgR
wpFVM/Yx5yGi9FiAaxHXonpZBLKB+5SDx5mxC8AZ94poQvXlVE8fSaeuSdYV
oZwSl7kzHBwBjxYEOwCj7vkJfTmk8SSnRAxgjUjH9KDyvfrYpUQizGJOKqju
igpuZHI6jkUCAMSzagQ1eyi7WS5iYAfwvM42UZL4cyyiqzpUO6SkZejMZDUc
qlDFUY46xMfYgeKQS/vQfM/slCnPEqOE5Qt+nRPo3Xt2/VjPNP6ZbbbzQBUX
+oldqGSlbyl7qxKbMt3K8LQzYzKtzkq3lgcGNT570dAn7rByGYy8pkag8NNw
EalC1kH3qK1T9bBUXelE5ayYnN03N1Pn+HsZrpcdmRNbszx3xf1Qr1EXBtPB
LcBPqmuW6VNVzReT0gMlZp9lYahVrZur8K1nNVpYRbQMo1jXTMszP4ycQqy1
jdWWAqXlMe1y7uICfH22JtUZ59uTBbbqtBs5XtGOMUlhfXxhpYMdlQ6+j6Hb
yQNlMBmb7mAYd9jZREsdFMApZYktozPDg/xms4lH8f8rUsElpcJmvf/PBds/
//W54Cp0X1FiUmLZnlKTjFtWyYn+uXfpif65XwmKYd7X89pVVm9vctvktgt0
1V48vbo5u3n37Ofo1+mnv7Un4zfvpurz6fiNe/pmOS50ObsM+v7k1/7oU3w+
P/9L+/Ltou3djN4+DZ6l152jZ9PwXZGB4frFy908+n7cudmeTXZvf4tPL9bP
0/6bN59+ff3kbPK2mFcdv3x2MXi2/MtkchGPzlrPlz/8UJ31/yo0/LLtK2LE
L5s5meCsrK422DBXXi3rf82lKFUWYm5ZgeXN8pSFGmtATGt56qbMsgNeK9kB
1FlTDYSGGA0mfEr88ezugsmh1CsTmHUWxQ7VhqR+bC4bNIybkWxShdlCpPnU
E0JrvHTAkFFg3ZMVeHCrmj1brVoDjHiDx6QhlTEV2mRXLRMInAhlZewFvHcx
nhzSeuGDPmLN31fi82ibVlSp5+ofNbcORHPZrNvJJMnSur6pIE9k8yMFgHUD
auGgdrCAz00qGUeV9S5MYI6cetSZSN3moXTxK7tyy1qb83K7notYuexAVh+b
AvesmrLRIMnFEuDTzQBTDgyAILVviXwSceTocnKV/NNtrTsseBdPZRQtr4wc
tpExYhGnQtcxgewDrMb7CLkqsz3RBWlPuWbCLtg0lx6QhjKrmGJVKd5xqmu+
qGKJIo+VqL4LUVVxZtUk6aCCqu4AhAQBJ7C72ZrK+bEkAmDj6wggzg43Fb4T
YQzMcbKiPDOcJOBcJNsAE+vjyhLwQpVDKItTUB8r0vgoBVn0Ie8Xzfbk4mfA
f/dKpPVyZUiWNLTmSKio5wGZ/XzfLLFfpjvL6xstxjjEZPfzz1SGHwMViaQ3
KXA5q5oqjEFFUPtKq1WdVb79e/ZdIX/+QZVOVdEus+NlitRD6hFu13K+D9Yw
+iGMgOVbrBmLpfi4YbX37cbxh9tO7w7Mr/w8uKvJJLuKyUpbSm3r0p0AVD6p
EnojwT4JMPvgJ5TTl1pF1mhWgRVndm1VnrMzNSnGWuXVUyA1DndVOXwrcklN
AZgx/qYaMMmRp6exSrKoyrLi2leO5odRfJndgkBmlc1NYS+asrOcRGe0k1VB
ogwKs3LJ3OWeCjO0J1zLeZ9CjMYrrQaFn8amJVWLmXW6vf5gODo6bsMnUDf6
PkOt+Xvqdciym9pRdVRToQCU2dJJTpXV/G8N8NgDzlFyZk02qorvKkxUMcQr
G6tyOPKff0pSL9GQp6BcMtEqWMNiOPFPUQbzx+pg/lghzNcqYexTh6oQsFX2
NPCsVrm5dcS0NzaqMDSlpHmFtSHENMNCVmkeZnR3rqGveaooac9dTBMo7buM
6Th/dsHG/yivTyd4Tf+KSQi/jEWC95GmeAMbIpEVD5dkYed4Q30dXWeWerHF
HHPzzy0aS9rZrNojXcXgT2o0K05aU2lvSrpaZeWmgbICM3xt5X4q35Nwym/w
N7SY0mQDeKmoM9mBjf3I5oAuo80mSiDAsuqmqS0ABo6/rkBf+3Vq1M6/FkB7
tKWLIuBjqQFl0LOLrLjgPRdZbRk4dImOYgLXFRuJLRKR0g18E6bRPRJPxFz9
MgUlq1enrwyrv2HT8ctxqSUGzk9enbNLMPTnYunj7wJRr6g9VbmAN07U7UVc
BTmwfKEO+gkl45oeL6khf3DEnXN7+yccrunOoxidCqAEvJeAIoUV7SzOmzs4
hCZA9J+Jts/sFO+kTCEqhM8XRgyfnc+NRgMaDdtteCERlCqZ/1x9v1HfO7aT
7QhMzp9OLp9NLw5xTKw1zIbDFI4crHz5xNw2Am9ecQW+MDBus3Qe0NyaF3pz
y7uxGfdUWoOeqpvLORHtkZDkuYgLEtK5b1kypk4ISnqiptNyayL79dyy4hjE
gdatUgZfuLP8mS41fyZ8l7sEbEmc0hX2r9so8IvuMlfcMdaPMC1DYxvWIfCb
mJsND2OYdSNCBZc1OeClhB7OC76p5Tk1DT3xERZJWvoSbcjn7PSIRKYY1YcX
ewDNZ60u0GyQa5avH8na5XlEqE21sXiUI534w8YuXioOhLfMfn9HSLBUeD/U
wqh2V2VI/gPOWLbKoEsAAA==

-->

</rfc>

