<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.10 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-fdb-rats-psa-endorsements-00" category="info">

  <front>
    <title abbrev="PSA Endorsements">Arm's Platform Security Architecture (PSA) Attestation Verifier Endorsements</title>

    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Ltd</organization>
      <address>
        <email>thomas.fossati@arm.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm Ltd</organization>
      <address>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date />

    <area>Security</area>
    <workgroup>RATS</workgroup>
    

    <abstract>


<t>PSA Endorsements include reference values, cryptographic key material and
certification status information that a Verifier needs in order to appraise
attestation Evidence produced by a PSA device.  This memo defines such PSA
Endorsements as a profile of the CoRIM data model.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>PSA Endorsements include reference values, cryptographic key material and
certification status information that a Verifier needs in order to appraise
attestation Evidence produced by a PSA device <xref target="PSA-TOKEN"/>.  This memo defines
such PSA Endorsements as a profile of the CoRIM data model <xref target="CoRIM"/>.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader is assumed to be familiar with the terms defined in Section 2.1 of
<xref target="PSA-TOKEN"/> and in Section 4 of <xref target="RATS-ARCH"/>.</t>

</section>
<section anchor="sec-psa-endorsements"><name>PSA Endorsements</name>

<t>PSA Endorsements describe an attesting device in terms of the hardware and
firmware components that make up its PSA Root of Trust (RoT). This includes
the identification and expected state of the device as well as the
cryptographic key material needed to verify Evidence signed by the device's PSA
RoT. Additionally, PSA Endorsements can include information related to the
certification status of the attesting device.</t>

<t>There are five types of PSA Endorsements:</t>

<t><list style="symbols">
  <t>Reference Values (<xref target="sec-ref-values"/>), i.e., measurements of the PSA RoT
firmware;</t>
  <t>Attestation Verification Claims (<xref target="sec-keys"/>), i.e., cryptographic keys
that can be used to verify signed Evidence produced by the PSA RoT, along
with the identifiers that bind the keys to their device instances;</t>
  <t>Certification Claims (<xref target="sec-certificates"/>), i.e., metadata that describe
the certification status associated with a PSA device.</t>
  <t>Software Relations (<xref target="sec-swrel"/>), used to model upgrade and patch
relationships between software components;</t>
  <t>Endorsements Block List (<xref target="sec-endorsements-block-list"/>), used to invalidate
previously provisioned Endorsements.</t>
</list></t>

<section anchor="psa-endorsement-profile"><name>PSA Endorsement Profile</name>

<t>PSA Endorsements are carried in one or more CoMIDs inside a CoRIM.</t>

<t>The profile attribute in the CoRIM MUST be present and MUST have a single entry
set to the uri <spanx style="verb">http://arm.com/psa/iot/1</spanx> as shown in <xref target="ex-psa-iot-profile"/>.</t>

<figure title="PSA IoT version 1, CoRIM profile" anchor="ex-psa-iot-profile"><artwork><![CDATA[
/ corim-map / {
  / corim.profile / 3: [ 
    32("http://arm.com/psa/iot/1")
  ]
  / ... /
}
]]></artwork></figure>

</section>
<section anchor="sec-psa-rot-id"><name>PSA Endorsements to PSA RoT Linkage</name>

<t>Each PSA Endorsement - be it a Reference Value, Attestation Verification Claim
or Certification Claim - is associated with an immutable PSA RoT.  A PSA
Endorsement is associated to its PSA RoT by means of the unique PSA RoT
identifier known as Implementation ID (see Section 3.2.2 of <xref target="PSA-TOKEN"/>).</t>

<t>In order to support PSA Implementation IDs, the CoMID type
<spanx style="verb">$class-id-type-choice</spanx> is extended as follows:</t>

<figure><artwork><![CDATA[
; from draft-tschofenig-rats-psa-token
psa-implementation-id-type = bytes .size 32

tagged-implementation-id-type = #6.600(implementation-id-type)

$class-id-type-choice /= tagged-implementation-id-type
]]></artwork></figure>

<t>Besides, a PSA Endorsement can be associated with a specific instance of a
certain PSA RoT - as in the case of Attestation Verification Claims.  A PSA
Endorsement is associated with a PSA RoT instance by means of the Instance ID
(see Section 3.2.1 of <xref target="PSA-TOKEN"/>) and its "parent" Implementation ID.</t>

<t>These identifiers are typically found in the subject of a CoMID triple, encoded
in an <spanx style="verb">environment-map</spanx> as shown in <xref target="ex-psa-rot-id"/>.</t>

<figure title="Example PSA RoT Identification" anchor="ex-psa-rot-id"><artwork><![CDATA[
/ environment-map / {
  / comid.class / 0 : {
    / comid.class-id / 0 :
      / tagged-impl-id-type / 600(
        h'61636d652d696d706c656d656e746174
          696f6e2d69642d303030303030303031'
      ),
      / comid.vendor / 1 : "ACME Ltd.",
      / comid.model /  2 : "Roadrunner 1.0"
  },
  / comid.instance / 1 :
    / tagged-ueid-type / 550(
      h'01
        4ca3e4f50bf248c39787020d68ffd05c
        88767751bf2645ca923f57a98becd296'
    )
}
]]></artwork></figure>

<t>Optional <spanx style="verb">vendor</spanx> and <spanx style="verb">model</spanx> can be specified as well.  Together, they are
interpreted as a unique identifier of the product that embeds the PSA RoT.
Consistently providing a product identifier is RECOMMENDED.</t>

</section>
<section anchor="sec-ref-values"><name>Reference Values</name>

<t>Reference Values carry measurements and other metadata associated with the
updatable firmware in a PSA RoT.  When appraising Evidence, the Verifier
compares Reference Values against the values found in the Software Components
of the PSA token (see Section 3.4.1 of <xref target="PSA-TOKEN"/>).</t>

<t>Each measurement is encoded in a <spanx style="verb">measurement-map</spanx> of a CoMID
<spanx style="verb">reference-triple-record</spanx>.  Since a <spanx style="verb">measurement-map</spanx> can encode one or more
measurements, a single <spanx style="verb">reference-triple-record</spanx> can carry as many measurements
as needed, provided they belong to the same PSA RoT identified in the subject of
the "reference value" triple.  A single <spanx style="verb">reference-triple-record</spanx> SHALL
completely describe the updatable PSA RoT.</t>

<t>The identifier of a measured software component is encoded in a <spanx style="verb">psa-swcomp-id</spanx>
object as follows:</t>

<figure><artwork><![CDATA[
psa-swcomp-id = {
  psa.measurement-type => text
  psa.version => text
  psa.signer-id => psa.hash-type
}

psa.hash-type = bytes .size 32 / bytes .size 48 / bytes .size 64

psa.measurement-type = 1
psa.version = 4
psa.signer-id = 5
]]></artwork></figure>

<t>The semantics of the codepoints in the <spanx style="verb">psa-swcomp-id</spanx> map are equivalent to
those in the <spanx style="verb">psa-software-component</spanx> map defined in Section 3.4.1 of
<xref target="PSA-TOKEN"/>.  The <spanx style="verb">psa-swcomp-id</spanx> MUST uniquely identify a given software
component within the PSA RoT / product.</t>

<t>In order to support PSA Reference Value identifiers, the CoMID type
<spanx style="verb">$measured-element-type-choice</spanx> is extended as follows:</t>

<figure><artwork><![CDATA[
tagged-psa-swcomp-id = #6.601(psa-swcomp-id)

$measured-element-type-choice /= tagged-psa-swcomp-id
]]></artwork></figure>

<t>and automatically bound to the <spanx style="verb">comid.mkey</spanx> in the <spanx style="verb">measurement-map</spanx>.</t>

<t>The raw measurement is encoded in a <spanx style="verb">digests-type</spanx> object in the
<spanx style="verb">measurement-values-map</spanx>.  The <spanx style="verb">digests-type</spanx> array MUST contain at least one
entry.  The <spanx style="verb">digests-type</spanx> array MAY contain more than one entry if multiple
digests (obtained with different hash algorithms) of the same measured
component exist.</t>

<t>The example in <xref target="ex-reference-value"/> shows a CoMID a PSA Endorsement of type
Reference Value for a firmware measurement associated with Implementation ID
<spanx style="verb">acme-implementation-id-000000001</spanx>.</t>

<figure title="Example Reference Value" anchor="ex-reference-value"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.reference-triples / 0 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          }
        },
        / measurement-map / {
          / comid.mkey / 0 : 601({
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.3.5",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          }),
          / comid.mval / 1 : {
            / comid.digests / 2 : [
              / hash-alg-id / 1, / sha256 /
              / hash-value /  h'44aa336af4cb14a8
                                79432e53dd6571c7
                                fa9bccafb75f4882
                                59262d6ea3a4d91b'
            ]
          }
        }
      ]
    ]
  }
}
]]></artwork></figure>

<section anchor="sec-swrel"><name>Software Upgrades and Patches</name>

<t>In order to model software lifecycle events such as updates and patches, this
profile defines a new triple that conveys the following semantics:</t>

<t><list style="symbols">
  <t>SUBJECT: a software component</t>
  <t>PREDICATE: (non-critically / critically) (updates / patches)</t>
  <t>OBJECT: another software component</t>
</list></t>

<t>The triple is reified and used as the object of another triple,
<spanx style="verb">psa-swrel-triple-record</spanx>, whose subject is the embedding environment.</t>

<figure><artwork><![CDATA[
comid.psa-swrel-triples = 5

$$triples-map-extension //= (
  comid.psa-swrel-triples => [ + psa-swrel-triple-record ]
)

psa.updates = 1
psa.patches = 2

psa-swrel-rel = [
  type: psa.updates / psa.patches
  security-critical: bool ; true means it's a fix for a security bug
]

sw-rel = [
  new: psa-swcomp-id ; identifier of the "new" firmware
  rel: psa-swrel-rel ; patches, updates and the security flag
  old: psa-swcomp-id ; identifier of the "old" firmware
]

psa-swrel-triple-record = [
  environment-map
  sw-rel
]
]]></artwork></figure>

<t>An example of a security critical update involving versions "1.3.5" and "1.4.0"
of software component "PRoT" within the target environment associated with
Implementation ID <spanx style="verb">acme-implementation-id-000000001</spanx> is shown in
<xref target="ex-psa-swrel-update-crit"/>.</t>

<figure title="Example Critical Software Upgrade" anchor="ex-psa-swrel-update-crit"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.psa-swrel-triples / 5 : [
      [
        / environment-map / {
          / comid.class-id / 0 :
          / tagged-impl-id-type / 600(
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031'
          ),
          / comid.vendor / 1 : "ACME Ltd.",
          / comid.model /  2 : "Roadrunner 1.0"
        },

        / sw-rel / [
          / new / {
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.4.0",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          },

          / rel / [
            / type / 1, / psa.updates /
            / security-critical / true
          ],

          / old / {
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.3.5",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="sec-keys"><name>Attestation Verification Claims</name>

<t>An Attestation Verification Claim carries the verification key associated with
the Initial Attestation Key (IAK) of a PSA device.  When appraising Evidence,
the Verifier uses the Implementation ID and Instance ID claims (see
<xref target="sec-psa-rot-id"/>) to retrieve the verification key that it SHALL use to check
the signature on the Evidence.  This allows the Verifier to prove (or disprove)
the Attester's claimed identity.</t>

<t>Each verification key is provided alongside the corresponding device Instance
and Implementation IDs (and, possibly, a product identifier) in an
<spanx style="verb">attest-key-triple-record</spanx>.  Specifically:</t>

<t><list style="symbols">
  <t>The Instance and Implementation IDs are encoded in the environment-map as
shown in <xref target="ex-psa-rot-id"/>;</t>
  <t>The IAK public key is carried in the <spanx style="verb">comid.key</spanx> entry in the
<spanx style="verb">verification-key-map</spanx>.  The IAK public key is a PEM-encoded
SubjectPublicKeyInfo <xref target="RFC5280"/>.  There MUST be only one
<spanx style="verb">verification-key-map</spanx> in an <spanx style="verb">attest-key-triple-record</spanx>;</t>
  <t>The optional <spanx style="verb">comid.keychain</spanx> entry MUST NOT be set by a CoMID producer that
uses the profile described in this document, and MUST be ignored by a CoMID
consumer that is parsing according to this profile.</t>
</list></t>

<t>The example in <xref target="ex-attestation-verification-claim"/> shows the PSA Endorsement
of type Attestation Verification Claim carrying a secp256r1 EC public IAK
associated with Instance ID <spanx style="verb">4ca3...d296</spanx>.</t>

<figure title="Example Attestation Verification Claim" anchor="ex-attestation-verification-claim"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.attest-key-triples / 3 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          },
          / comid.instance / 1 :
            / tagged-ueid-type / 550(
              h'01
                4ca3e4f50bf248c39787020d68ffd05c
                88767751bf2645ca923f57a98becd296'
            )
        },
        / verification-key-map / {
          / comid.key / 0 :
            "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgA
             ETl4iCZ47zrRbRG0TVf0dw7VFlHtv18HInY
             hnmMNybo+A1wuECyVqrDSmLt4QQzZPBECV8
             ANHS5HgGCCSr7E/Lg=="
        }
      ]
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sec-certificates"><name>Certification Claims</name>

<t>PSA Certified <xref target="PSA-CERTIFIED"/> defines a certification scheme for the PSA
ecosystem.  A product - either a hardware component, a software component, or
an entire device - that is verified to meet the security criteria established
by the PSA Certified scheme is warranted a PSA Certified Security Assurance
Certificate (SAC).  A SAC contains information about the certification of a
certain product (e.g., the target system, the attained certification level, the
test lab that conducted the evaluation, etc.), and has a unique Certificate
Number.</t>

<t>The linkage between a PSA RoT -- comprising the immutable part as well as zero
or more of the mutable components -- and the associated SAC is provided by a
Certification Claim, which binds the PSA RoT Implementation ID and the software
component identifiers with the SAC unique Certificate Number.  When appraising
Evidence, the Verifier can use the Certification Claims associated with the
identified Attester as ancillary input to the Appraisal Policy, or to enrich
the produced Attestation Result.</t>

<t>A Certification Claim is encoded in an <spanx style="verb">psa-cert-triple-record</spanx>, which extends
the <spanx style="verb">$$triples-map-extension</spanx> socket, as follows:</t>

<figure><artwork><![CDATA[
comid.psa-cert-triples = 4

$$triples-map-extension //= (
  comid.psa-cert-triples => [ + psa-cert-triple-record ]
)

psa.immutable-rot = 1
psa.mutable-rot = 2

psa-rot-descriptor = {
  psa.immutable-rot => psa-implementation-id-type
  psa.mutable-rot => [ * psa-swcomp-id ]
}

psa-cert-triple-record = [
  psa-rot-descriptor
  psa-cert-num-type
]

psa-cert-num-type = text .regexp "[0-9]{13} - [0-9]{5}"
]]></artwork></figure>

<t><list style="symbols">
  <t>The Implementation ID of the immutable PSA RoT to which the SAC applies is
encoded as a <spanx style="verb">tagged-impl-id-type</spanx> in the <spanx style="verb">psa.immutable-rot</spanx> of the
<spanx style="verb">psa-rot-descriptor</spanx>;</t>
  <t>Any software component that is part of the certified PSA RoT is encoded as a
<spanx style="verb">psa-swcomp-id</spanx> (see <xref target="sec-ref-values"/>) in the <spanx style="verb">psa.mutable-rot</spanx> of the
<spanx style="verb">psa-rot-descriptor</spanx>;</t>
  <t>The unique SAC Certificate Number is encoded in the <spanx style="verb">psa-cert-num-type</spanx>.</t>
</list></t>

<t>A single CoMID can carry one or more Certification Claims.</t>

<t>The example in <xref target="ex-certification-claim"/> shows a Certification Claim that
associates Certificate Number <spanx style="verb">1234567890123 - 12345</spanx> to Implementation ID
<spanx style="verb">acme-implementation-id-000000001</spanx> and a single "PRoT" software component with
version "1.3.5".</t>

<figure title="Example Certification Claim with `supplement` Link-Relation" anchor="ex-certification-claim"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  }, 
  / comid.triples / 4 : {
    / comid.psa-cert-triples / 4 : [
      [
        / psa-rot-descriptor / {
          / psa.immutable-rot / 1 :
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031',
          / psa.mutable-rot / 2 : [
            / psa-swcomp-id / {
              / psa.measurement-type / 1 : "PRoT",
              / psa.version /          4 : "1.3.5",
              / psa.signer-id /        5 : h'acbb11c7e4da2172
                                             05523ce4ce1a245a
                                             e1a239ae3c6bfd9e
                                             7871f7e5d8bae86b'
            }
          ]
        },
        / psa-cert-num-type / "1234567890123 - 12345"
      ]
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sec-endorsements-block-list"><name>Endorsements Block List</name>

<t><cref>This is work in progress.  It may change or be removed in the future.</cref></t>

<t>The following three "blocklist" claims:</t>

<t><list style="symbols">
  <t><spanx style="verb">reference-blocklist-triple</spanx></t>
  <t><spanx style="verb">attest-key-blocklist-triple</spanx></t>
  <t><spanx style="verb">cert-blocklist-triple</spanx></t>
</list></t>

<t>are defined with the same syntax but opposite semantics with regards to their
"positive" counterparts to allow invalidating previously provisioned endorsements
from the acceptable set.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t><cref>TODO</cref></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="cbor-tag-registrations"><name>CBOR Tag Registrations</name>

<t>IANA is requested to allocate the following tag in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specified value:</t>

<texttable title="CoRIM CBOR Tags" anchor="tbl-psa-cbor-tag">
      <ttcol align='left'>Tag</ttcol>
      <ttcol align='left'>Data Item</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c>600</c>
      <c>tagged bytes</c>
      <c>PSA Implementation ID (<xref target="sec-psa-rot-id"/> of RFCTHIS)</c>
      <c>601</c>
      <c>tagged map</c>
      <c>PSA Software Component Identifier (<xref target="sec-ref-values"/> of RFCTHIS)</c>
</texttable>

</section>
<section anchor="corim-profile-registration"><name>CoRIM Profile Registration</name>

<t>IANA is requested to register the following profile value in the
<cref>TODO</cref> CoRIM registry.</t>

<texttable title="PSA profile for CoRIM" anchor="tbl-psa-corim-profile">
      <ttcol align='left'>Profile Value</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c><spanx style="verb">http://arm.com/psa/iot/1</spanx></c>
      <c>uri</c>
      <c>The CoRIM profile specified by this document</c>
</texttable>

</section>
<section anchor="comid-codepoints"><name>CoMID Codepoints</name>

<t>IANA is requested to register the following codepoints to the "CoMID Triples
Map" registry.</t>

<texttable title="PSA CoMID Triples" anchor="tbl-psa-comid-triples">
      <ttcol align='left'>Index</ttcol>
      <ttcol align='left'>Item Name</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>4</c>
      <c>comid.psa-cert-triples</c>
      <c>RFCTHIS</c>
      <c>5</c>
      <c>comid.psa-swrel-triples</c>
      <c>RFCTHIS</c>
</texttable>

</section>
</section>
<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>

<t><cref>TODO</cref></t>

</section>


  </middle>

  <back>

    <references title='Normative References'>




<reference anchor='PSA-TOKEN'>
   <front>
      <title>Arm&#39;s Platform Security Architecture (PSA) Attestation Token</title>
      <author fullname='Hannes Tschofenig'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Simon Frost'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Mathias Brossard'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Adrian Shaw'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Thomas Fossati'>
	 <organization>Arm Limited</organization>
      </author>
      <date day='24' month='March' year='2021'/>
      <abstract>
	 <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-tschofenig-rats-psa-token-08'/>
   <format target='https://www.ietf.org/archive/id/draft-tschofenig-rats-psa-token-08.txt' type='TXT'/>
</reference>


<reference anchor='CoRIM'>
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname='Henk Birkholz'>
	 <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Thomas Fossati'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Yogesh Deshpande'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Ned Smith'>
	 <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan'>
	 <organization>Huawei Technologies</organization>
      </author>
      <date day='26' month='July' year='2021'/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to put
   trust in the trustworthiness of a remote Attester and therefore to
   decide if to engage in secure interactions with it - or not.
   Evidence about trustworthiness can be rather complex, voluminous or
   Attester-specific.  As it is deemed unrealistic that every Relying
   Party is capable of the appraisal of Evidence, that burden is taken
   on by a Verifier.  In order to conduct Evidence appraisal procedures,
   a Verifier requires not only fresh Evidence from an Attester, but
   also trusted Endorsements and Reference Values from Endorsers, such
   as manufacturers, distributors, or owners.  This document specifies
   Concise Reference Integrity Manifests (CoRIM) that represent
   Endorsements and Reference Values in CBOR format.  Composite devices
   or systems are represented by a collection of Concise Module
   Identifiers (CoMID) and Concise Software Identifiers (CoSWID) bundled
   in a CoRIM document.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-birkholz-rats-corim-01'/>
   <format target='https://www.ietf.org/archive/id/draft-birkholz-rats-corim-01.txt' type='TXT'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>

<reference anchor='IANA.cbor-tags' target='http://www.iana.org/assignments/cbor-tags'>
<front>
<title>Concise Binary Object Representation (CBOR) Tags</title>
<author><organization>IANA</organization></author>
<date/>
</front>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='RATS-ARCH'>
   <front>
      <title>Remote Attestation Procedures Architecture</title>
      <author fullname='Henk Birkholz'>
	 <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Dave Thaler'>
	 <organization>Microsoft</organization>
      </author>
      <author fullname='Michael Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Ned Smith'>
	 <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan'>
	 <organization>Huawei Technologies</organization>
      </author>
      <date day='23' month='April' year='2021'/>
      <abstract>
	 <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-12'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-rats-architecture-12.txt' type='TXT'/>
</reference>


<reference anchor="PSA-CERTIFIED" target="https://www.psacertified.org">
  <front>
    <title>PSA Certified</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source:
H4sIAG0EiWEAA+1c6XLbSJL+j6eoYXeEpW7epySPO4am5DHXt6T2htvhWBaB
IokRCLABUDItq59ln2WfbDOzDhQOynb3zJ6jifYIQB1ZmVmZX2ZlqdFoOKmf
BuKEjeP1g4S9Dni6iOI1uxDuNvbTHbx3V34q3HQbC3bw+mJ8yMZpKpKUp34U
srci9he+iNlZ6EVxItYiTBOHz+exuD5h0Dz/wYvckK9hOi/mi7Sx8OaNmKdJ
Y5PwhrAaNtptx+MpNLw9HV+e3TkuPCyjeHfC/HAROf4mPmFpvE3Sbrt93O46
PBb8xFDt3ETx1TKOtpsTdj6+vHAcoDf0/o0HUQhj7kTibPwTx2EsXrjCS9Jd
oF4zlkau9asfekCPfpFEcRqLRWKed+vcYxr7rmnsRmtaixlNfEwbgZ+kDeg2
jwL40Ih++BG+AFfWfLPxw6Vs6/BtuopiILABXyXDLlfRmifsSZQkwHl4HcVL
khp7nnrwKNbcD4An1Ky5kM3+wuN1E+iwB3oXLUWyYqfwzwZ4IvYOtaOGTU83
rBrsqQiv2GM/vlpFwSc90pOYb8NVtACtuJheZgOuoHFzrhr/JfHT5sK0hGkc
JwTNA6qvxQl0At1pXL56dvbyhE0bp800cbFh6C8zjUmjKxGiFCfR+fSFbKfH
l63cKPaBYNQZa2hUicb4fPJUdvFFupDNuaXsjqJhcnZ+OX0yPTvFnizl8VKA
iFdpuklOWq2bm5smkOKKOMV94DWBA9RO7ircABP9Dd9Lpe62ux1gY6PB+ByU
hrup4xT3Cii6G2w9wUDDRCxCV7BrHmxFUmduvNuk0TLmm5XvsiuxY7A22Ig8
YCAoRxHjyh2KO3WbMMMCeJWueMp4tndDAXsAWoD4PHhMIwbaGHM/EQ639vrZ
te8RHZs48rawb9h8B8Mg4Z649l3RZKCmfsLWYh3Bq4UfioQlW3eFbZzc4kCV
OY6z8APBogWQJKQUkUOcrSNPBE3JorXveQGI4zs2DVOaGan5P8Ewdntr1Pzu
rop9jmYf+2b2weD0CgZG5k2i8Br6Al0JLhoMAEzg07PjXEJ/ZAvYTVhY7cXP
F5e1uvx/9vIV/X5+9ubn6fnZKf5+8XT8/Ln5xVEtLp6++vn5afZb1nPy6sWL
s5ensjO8ZblXTu3F+B18Qapqr15fTl+9HD+vIXtTZAdYxy2umoGNR1bPBXwC
6W1ikQJLOXgVkbixP4cH6PN48vo//r3Th9X/6fzJpNvpHN/dqYejzqgPDzdg
iORsURjs1CNwcOeAFAWPcRQeBMzlGz/lAegPsDtZRTchmLBYADeJX+BxUPg+
SiMBCj1F3IKv/cCHYW78dEWSAWLXiZIo0Qh+ihSk2+yA9JycFhBhVps+yvf2
1tgsJc6Sa709Yd8lwi25UnZXsVU0x2AyJjUWnI9WSmQ8UawUa8Vj7waZj3tl
4cdregBPsAFviqPR9ljzK8G2G+bDC5zvPIpSHOESvTQ7OI8uD5tSv9U+TRwc
HHeItflw8eLjBtYOnMJ9ZNRbEQeiuBEgHI7TCueenY2bVArlGvftLtuOib8M
5WbMBn5AVDtAZpONPY82BijBrl7efC4wTdsa20rEAtCTnJFIq7IqajFFnjdJ
pZDF8N8C3BRLdxtBzYvTAyr4gZ0bE/eWTBw7uL1F4YPpa0ijd3d3WGd+UzTr
YE94Ag5NEq8IkBJC56wF+hCGLSM7Rf0k4P7azAJstscvyYDQDuoEcgqUbJvk
5KDYX2kdLdpg2wFcQ29qNpJWFhErpZsDPqMvOKtivB9nioywzxUJrm2SE0d+
QZmoCoxLOdlTmkvvGVoc6H+VeMESAGYkLSCic94RiLiIFintnnPUFbLFioTk
BtSH5tbckkZ8uwHGerT32Ian7gpBq+688jcJMDi9EQJI0GNnOxPXnVPdx0Hk
XrHnPu5IOW8Odc/xM2HUHCV+CDrlI3SBycHsXvvRNgHLCYK79hMgBKVpjYMG
qmSh2GvpriqsERHN49iX1hHGA8cK64/Rqb2YnqLJSHxkgnRycrcY/webCeSy
TaXlMp6QnNccm4mE3AdwkN6t+DUOlcD2g97wKd45iUiV+jCIINgM8R3AOwV5
W2BUW36UtjqzzBfAZLe34iMZXPjWUOSQff7tt9+cFiP02QBoz1rsFlin3jQ1
4S3WO2HvGeJC1use1PZNWjuEJh9ogGazyVrOHU2AFr88v4Sej2rI5Wl0iZsO
RcQ6dcUX1a6GjqEsJtpFageCooRXfClyviWGqXwP+p7xMjJhDXLPCJYKJqr+
BePigMQrtigM6FdsK+D+er1N+Tww5gLQ07iIMwt9UZWNd7pEcwOmMTQ2cRv6
v24z05gZG3YVosBB8tP1JqCRJYnTU3aQCGF8da/ZbXalv7Y8+iEoxNTCisl2
s4FAkiYqDZjUlQqD3pMTcGbfuwEsApjewOcGxEFgTWa4NogoYf8SCGKLKAii
G3QPqBsP2SKO1irM3h87ke7kSNDTsEfAHxAYayb+JwHq6TgpXy6Ft7/9d8Pm
sN0+qP5+6DiV62CtR+zegWk5zmOBBgChWEnllJMpm94EYASqk/EDKBlOfpnD
5tVq0EDuKcvh8oRafcERfoWuWeYfJzEkFJVuqj9MT52SLnXKuiThIWhxbQNm
M0xrZRWS5jHJu0sCz7sNrANADSjLVqJMJCHZzv8GkxJ3tOLFPgxaB+Poghfy
HETEIZuJ8NqPoxAnQ7O2xxgqC5HZwUI3yxpCbNckrYCnNjuh94UvMJT8SJ/w
o6UuRvtaDFVPNWFs9WDYGfaG3nDQ9YbHQ2/UHrrDAT4Pxag/hDjANGUMGiyG
ghr2u16vXfhf54Fqe1g3JEj6rsl5wmMHSK+NJy/OMIPSrBXbSU/eYqyL7c4j
7sXbMARj0Gm2a9D2rm6xw2gKDevklrwV2XoHA7Pe1YN2x6yn7/Ke6C8G7fmi
2z9ye8ejo1G72/aGR4uF1x64puHR0Wg4Gg060G7YH7j8uNtbDEb8+GguXK97
PJTLPiw7Gylf7WfOPnJUQKPp0xygJy/zaiPRNJtJjs1IiWfElpnev2q3SmOG
EB/D4WgpQENjGZ6hDjv50A8UVllty1qrnSVhZSrBm1jPMWS34GXTgYg4AagD
/TSW8RCRc9PTGhM2txWzSoBTBOHGTVoo3HFKUB2Rzi4PyikWxYVmkLNoSjCi
2G7wE/o8E4XhxrQ84L9CLKtzEbgWjbGlU9H5CwcRIvROynEEX3JUQGoul5C3
FQbATgzIdKyQgrxK0Sf2q+xYUwEIiw/k0aTBkeuaWR+lvclMlDMzaZ6GtFbA
doBX3gzYcOHjkqoGQGWTc9gw07GlUc+w4d45aBwpSFDCNQ/zAnXgpQw/60qx
hCdVeC4wptFQM+HrbOMYbaswzBQq1wqJrZoy0+SNvkixTNWg5APYPKDxJgdA
2MeoltkehLHz24rrVXoV0UZZfGgskhtsAPZi5kRyNSWskmsGOAKdALxr2sKT
EOMnSqKrzxrY5t9ScBnTQD/RixVPVhJIwGbMvShBHLCq9ov+UeHFsC9HKBPG
Ok6OJNZ3CsSwgQQyyFQADBy46hoQgEzbRL5MYtKbAu8Yuk3ktvh164Pwkd1p
BFoRJSLfRYmlYcQi+1Ykn/TGdMpJyPL8FDhJUwuqo7QCk5lL/9qKPZ1MG9Bq
Kcq0hre0Zb0HEBcsko1hKpCxVseGCDJxfB1CVi61qHwEYjsHudeIXe+bycKw
uX5S4mjc+TaNMEsk0decLKqyATOFEa7EbmZEWbRbajfG/OZ+g+n5S8CtCREH
1lJuODmokxtU2nY5tpJ4vi/YNr6TYnejkAAzuNEAhkjRcjoUNt/bdfzO9KRQ
HvywjO2pK/MXbL0NUrRRjurPDqI5ttc+z/MXpAwpwz3LeLCE8DldrZNDvXHI
gGrRWMonPoJjV0wTCqBoiJpZSGLC3R1B2MRg33KEgZOhvhV1cwHug2e+2JZM
0X2XQLoz4+5aVMQ8bfXTmVl5hND1E9FYI/rjywJ+hjcNuUvSncKieRgtGyiE
vXrQW7SHfDHs8eOe2+mI/vHoeNRuD9qD4XF7NOotHhQRqXQkCNH7pbGL7kYD
+fcKZr43cHNfGJB93xcOVLYohgVZo68ID35XmPCt4YL+MWFDcR1fCh+K7b8U
RuifO/P7Xd1if8Gm7GE/2iHFfbSDRQlUuj+1gtdg4wvEt3KeupV9QE2qdZq9
5qCyR+Y4TZ8BKS935/NOxx2Jvse7nVG3Qj57f9qDQbfnir4rOrzbH/Bv6Ytd
esdc9NzhfOEdi2/pCwFYZzESA+9ozsXRcG4ryF1OO4wQwDLltnKxgTaYLdKF
9yWFIYwD9lJysFOHf5IV7w6GrFXdlkwhMnv1oN/nvNcDE9F3550+P/riUkfH
/V5XDHoe7JsRyOaLHRb8eO66fDEfDRb9o6MvC3Fw3B3ChhO8x/vecWee32If
qnXfsb/iv3f5ULbgB4rxbMHY1yhb+l0WAP0sE/MyeHuNmXkrApTZ/DzKkdvX
4ObAXwh352IG+pqCQDrpBZhCUFyNu5Hj1ukk1NEZXn20ziHIuFFBgDpwwUPe
nYxzJdzBKNDgTTo7uvj58b+cTS5PMMwpgXj4/vr87HQ6GV+enbCDEHwSBAka
uID6mYdDdqApbWk6D6H7Kz16KCPaijnILSuyAcLEQsX9sGA6cpBnexq+YNyh
xlJpKUehU+BxIcqpsxuCxDpy8uVIFP1TcG/5IOVe5YYqDpgQYne+/149osVs
EJiUlgwQ34Gs8anu/BN7z35ke8gEbTyUkYTmoA4gFB/hues4WW/4D17hNkd7
e8LsrtJgqo5YhKRqoIzcTgBvRgF7iPVSQiUf/fRBQtDlowIxuhebb5fOB8dJ
bqxJQctOWB4oP6xIuNSgXc3AIXlOdcLyq3iYqbSt54TlNAmLgOOpXxR4XzUr
tLNm/WDzLc91uZgCCkGO0VqhJ8H1cWgQI0W8hizNT0U4nopFwTUqlfJvifZo
spKhA/EV+GUYpCJWls7SDpJkZZFNXhFEOuXThy+DSNwCOkXrmBStZI9cCClK
7tTqfyzaLG+0FuGCP4g2q7DkV+PIb8aQ34IfK9HB1+DGb8OMIACLc2rvt3K4
okW+plXCI39nQIhb5v83ILREgYsvS4J0U3G5rthjnEGhXckZYF9wA1azD4UJ
wZz+48X8T9xvftfodS9OrbTXRbQ60fIt4lM6gMHTii8caRroSsU95Abv76Eq
NiTAurY/YwRZdF3yqBNoBBLtcZ9B24Pp+NmhdLa5WtK9hxmOfZiBkFESUXaP
6IetA1bmqqqfRAhHlr/Y55WHiNJjAa5FXIvqZRHIBu5TMh1nxi4AZ9wrognV
l1OlfCSduiZZl3ZyykDmDmNwBDwjEOwAjLrnJ/RwSONJTokYwBqRjnk+5Xv1
+UmJRJjFHDlQARVVzsgscxyLBACIZxX7afZQmrJcjcAO4H2dbaIk8edYDVd1
OnZI2cfQmcmyNlShijMZdRqPsQPFIZf26fee2SnlnWU4CcsX/Don0Lv3EPqh
nmn8jG2280BVCfqJXXFk5WEpDasylDJvyvDYMmMyrc7Km5YHBjU+e9HQR+ew
chmMvKZGoPDTcBGpitRB96itc+6wVF2yRHWpmGXdNzdTB/J7Ga6XHZmjV7M8
d8X9UK9RV/jSCSzATypQlnlQVZYXk9IDJWafZWGoVXabK9WtZ8VWWA60DKNY
Fz/LwzuMnEIsmo3VlgKl5THtcu7iAnx9SCbVGefbk861Cq4bOV7RjjHZXX0O
YeV1HZXX/RpDt5Mnw2AyNt3BMO6ws4mWOiiAU0r3WkZnhifyzWYTz9T/V+R0
S0qFzXr/TOraP//1Sd0qdF9RK1Ji2Z6akYxbVu2I/vnqGhL983W1JIZ51Qnq
Kku3R59Mkjo3bu3Fk6ubs5t3T59Fv0w//a09Gb95N1W/n47fuKdvluM86WeX
Qd+f/NIffYrP5+d/bV++XbS9m9HbJ8HT9Lpz9HQavst3WIXrFy938+jHcedm
ezbZvf01Pr1YP0/7b958+uX147PJ20K+dPzy6cXg6fKvk8lFPDprPV8+emTF
XV/CfvcbtyIIvN+OyQxmZR20AX+5QmhZqWuuL6kCDnMfCkxrlogsVEMDJFrL
8zFldx1wS8kOsMyaqhU0hmgw4VNmj2e3DEySpF6ZoayzKHaoiiP1Y3MtoGH8
iGSTKqEWIs3nlhA74/UAhowC852swEVbdefZatUaYMQbPNAMqeCo0Ca7JZlA
ZEQwKmMvALqL8eSQ1gu/6MPQ/M0iPo+2aUU9ea5SUXPrQDSXzbqdLZIsres7
BfLsND9SAGA2oBYOagcL+NzkinFUWZnCBCbBqUedidRtHkofvrJrrKy1OS+3
67mIlU8OZJ2wKUXP6h4bDZJcLBE81fCbwl3w+Kl9n+OTiCNHF36r7J5ua902
wVtzKmVouV3ksA19EWw4FbqOGWIfcDPeHMjVg+0JH0h7ytUNdmmluZ6ANJRZ
xRSrSgGNU12dRbVFFFqsRPWtharaMKt6SEcNVB8HKCMIOKHZzdbUuI8lEYAL
X0eAYXa4qfCbCGNgjpOVz5nhJAHnItkGmDkfVxZrF+oRQllGgvpYkadHKcjy
DHkTaLYn2T4D/rtXIq2XaziyrKA1R0LlN9+Qus/3zTL3ZbqzxL3RYgw0TPo+
/06l8DESkVB5kwKXs/qmwhhUrrSvCFpVROXbv2c/FBLkH1SRUxXtMv1dpki9
pB7hdi3n+2ANo1/CCFhoxZqxWIqPG1Z7324cf7jt9O7A/MrfB3c1mUVXQVdp
S6ltXareR+WTKqE3EuyTANMLfkJJe6lVZI1mFWBwZldB5Tk7U5NiMFVePUVK
43BXlaS3QpPUlGoZ42/q9pIceXoaq3iK6iErLmjlaP42ii+z+wrIrLK5KexF
UyCWk+iMdrIqHZRRX1bYmLuGU2GG9sRjOe9TCMJ4pdWg+NLYtKRqMbNOt9cf
DEdHx234DdSNnmeoNb+nsoYsu6nyVGcxFQpAqSudxVRpy//WCI59w0FJzqzJ
RlUBXIWJKmLusrEqxxt//2OQeomGPAXlyodWwRoW09i/I5H9e1LZ/9Bk9h9L
Z/+xhPb9KW07qW0XZeRivLJTaQETqza3jpL2xkYVhqaUFa+wNoSYZlhyKs3D
jG65NfSFTBUl7bk1aQKlfdcmHefPLtj4n+RF5wQv1F8xCeGXsUjw5tAU70pD
JLLi4ZIs7Bzvkq+j68xSL7aYRG7+uUVjSTublXOkqxj8SY1mxUlrKq9NWVWr
ANw0UFZghp+t5E7ldxJO+Qv+gRVTRGwAL5VfJjuwsR/ZHNBltNlECQRYVoUz
tQXAwPEPC+gLuk6N2vnXAmiPtnSlA3wsNaAUeXblFBe858qpLQOHrrtRTOC6
YiOxRSJSuitvwjS68eGJmKs/e6Bk9er0lWH1d2w6fjkutcTA+fGrc3YJhv5c
LH38qx3qE7WnMhbwxom6Z4irIAeWr8RBP6FkXNPjJTXkD464c25v/4TDNd15
FKNTAZSANwhQpLCincV5c1uG0ASI/jPR9pmd4u2RKUSF8PuFEcNn53Oj0YBG
w3YbPkgEpYrbP1ffRNQ3hO1sOgKT8yeTy6fTi0McE2sEs+EwXyMHK18TMfeC
wJtXXFYvDIzbLJ0HNLfmhd7c8hZrxj2V1qC36o5xTkR7JCR5LuKChHRyW9aE
qSOAkp6o6bTcmsh+PbesDQZxoHWrlME9t4s/0/Xjz4Tvctd1LYlTusL+wxgF
ftGt44rbwPoVpmVobMM6BH4Tcwfh2xhm3V1QwWVNDngpoYfzgm9qeU5NQ098
hEWSlr5EG/I5Ox4ikSlG9eHDHkDzWasLNBvkmuULRLJ2eR4RalNtLB7lSCf+
sLGL138D4S2zv7QREiwV3qNaGNXuqgzJfwKbfR9+W0sAAA==

-->

</rfc>

