rfc9216.original.xml | rfc9216.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<!DOCTYPE rfc [ | <!DOCTYPE rfc [ | |||
<!ENTITY nbsp " "> | <!ENTITY nbsp " "> | |||
<!ENTITY zwsp "​"> | <!ENTITY zwsp "​"> | |||
<!ENTITY nbhy "‑"> | <!ENTITY nbhy "‑"> | |||
<!ENTITY wj "⁠"> | <!ENTITY wj "⁠"> | |||
]> | ]> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version --> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | |||
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | -ietf-lamps-samples-08" number="9216" obsoletes="" updates="" submissionType="IE | |||
-ietf-lamps-samples-08" category="info" obsoletes="" updates="" submissionType=" | TF" category="info" consensus="true" xml:lang="en" tocInclude="true" sortRefs="t | |||
IETF" xml:lang="en" version="3"> | rue" symRefs="true" version="3"> | |||
<!-- xml2rfc v2v3 conversion 3.12.0 --> | ||||
<front> | <front> | |||
<title>S/MIME Example Keys and Certificates</title> | <title abbrev="S/MIME">S/MIME Example Keys and Certificates</title> | |||
<seriesInfo name="Internet-Draft" value="draft-ietf-lamps-samples-08"/> | <seriesInfo name="RFC" value="9216"/> | |||
<author initials="D.K." surname="Gillmor" fullname="Daniel Kahn Gillmor" rol | <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor" ro | |||
e="editor"> | le="editor"> | |||
<organization abbrev="ACLU">American Civil Liberties Union</organization> | <organization abbrev="ACLU">American Civil Liberties Union</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street>125 Broad St.</street> | <street>125 Broad St.</street> | |||
<city>New York, NY</city> | <city>New York</city> | |||
<region>NY</region> | ||||
<code>10004</code> | <code>10004</code> | |||
<country>USA</country> | <country>United States of America</country> | |||
</postal> | </postal> | |||
<email>dkg@fifthhorseman.net</email> | <email>dkg@fifthhorseman.net</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2022" month="February" day="02"/> | <date year="2022" month="April"/> | |||
<area>int</area> | ||||
<area>sec</area> | ||||
<workgroup>lamps</workgroup> | <workgroup>lamps</workgroup> | |||
<keyword>Internet-Draft</keyword> | ||||
<abstract> | <keyword>pkix | |||
</keyword> | ||||
<keyword>encryption | ||||
</keyword> | ||||
<keyword>security | ||||
</keyword> | ||||
<keyword>authentication | ||||
</keyword> | ||||
<keyword>S/MIME | ||||
</keyword> | ||||
<keyword>smime | ||||
</keyword> | ||||
<keyword>email | ||||
</keyword> | ||||
<keyword>mail | ||||
</keyword> | ||||
<keyword>confidentiality | ||||
</keyword> | ||||
<keyword>certificate | ||||
</keyword> | ||||
<keyword>pkcs8 | ||||
</keyword> | ||||
<keyword>pkcs #12 | ||||
</keyword> | ||||
<keyword>x509 | ||||
</keyword> | ||||
<keyword>"test vector" | ||||
</keyword> | ||||
<abstract> | ||||
<t>The S/MIME development community benefits from sharing samples of signe d or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples. </t> | <t>The S/MIME development community benefits from sharing samples of signe d or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples. </t> | |||
</abstract> | </abstract> | |||
</front> | </front> | |||
<middle> | <middle> | |||
<section anchor="introduction" numbered="true" toc="default"> | <section anchor="introduction" numbered="true" toc="default"> | |||
<name>Introduction</name> | <name>Introduction</name> | |||
<t>The S/MIME (<xref target="RFC8551" format="default"/>) development comm | <t>The S/MIME (<xref target="RFC8551" format="default"/>) development | |||
unity, in particular the e-mail development community, benefits from sharing sam | community, in particular the email development community, benefits from | |||
ples of signed and/or encrypted data. | sharing samples of signed and/or encrypted data. Often, the exact key | |||
Often the exact key material used does not matter because the properties being t | material used does not matter because the properties being tested | |||
ested pertain to implementation correctness, completeness or interoperability of | pertain to implementation correctness, completeness, or interoperability | |||
the overall system. | of the overall system. However, without access to the relevant secret | |||
However, without access to the relevant secret key material, a sample is useless | key material, a sample is useless.</t> | |||
.</t> | <t>This document defines a small set of X.509v3 certificates (<xref | |||
<t>This document defines a small set of X.509v3 certificates (<xref target | target="RFC5280" format="default"/>) and secret keys for use when | |||
="RFC5280" format="default"/>) and secret keys for use when generating or operat | generating or operating on such samples.</t> | |||
ing on such samples.</t> | <t>An example RSA Certification Authority is supplied, and sample RSA | |||
<t>An example RSA certification authority is supplied, and sample RSA cert | certificates are provided for two "personas", Alice and Bob.</t> | |||
ificates are provided for two "personas", Alice and Bob.</t> | <t>Additionally, an Ed25519 (<xref target="RFC8032" format="default"/>) Ce | |||
<t>Additionally, an Ed25519 (<xref target="RFC8032" format="default"/>) ce | rtification Authority is supplied, along with sample Ed25519 certificates for tw | |||
rtification authority is supplied, along with sample Ed25519 certificates for tw | o more "personas", Carlos and Dana.</t> | |||
o more "personas", Carlos and Dana.</t> | <t>This document focuses narrowly on functional, well-formed identity | |||
<t>This document focuses narrowly on functional, well-formed identity and | and key material. It is a starting point that other documents can use | |||
key material. | to develop sample signed or encrypted messages, test vectors, or other | |||
It is a starting point that other documents can use to develop sample signed or | artifacts for improved interoperability.</t> | |||
encrypted messages, test vectors, or other artifacts for improved interoperabili | ||||
ty.</t> | ||||
<section anchor="requirements-language" numbered="true" toc="default"> | ||||
<name>Requirements Language</name> | ||||
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", " | ||||
SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" i | ||||
n this document are to be interpreted as described in BCP 14 <xref target="RFC21 | ||||
19" format="default"/> <xref target="RFC8174" format="default"/> when, and only | ||||
when, they appear in all capitals, as shown here.</t> | ||||
</section> | ||||
<section anchor="terminology" numbered="true" toc="default"> | <section anchor="terminology" numbered="true" toc="default"> | |||
<name>Terminology</name> | <name>Terminology</name> | |||
<ul spacing="normal"> | ||||
<li>"Certification Authority" (or "CA") is a party capable of issuing | <dl> | |||
X.509 certificates</li> | <dt>"Certification Authority" (or "CA"): | |||
<li>"End-Entity" is a party that is capable of using X.509 certificate | </dt> | |||
s (and their corresponding secret key material)</li> | <dd>a party capable of issuing X.509 | |||
<li>"Mail User Agent" (or "MUA") is a program that generates or handle | certificates | |||
s <xref target="RFC5322" format="default"/> e-mail messages.</li> | </dd> | |||
</ul> | ||||
<dt>"End Entity" (or "EE"): | ||||
</dt> | ||||
<dd>a party that is capable of using X.509 certificates (and their | ||||
corresponding secret key material) | ||||
</dd> | ||||
<dt>"Mail User Agent" (or "MUA"): | ||||
</dt> | ||||
<dd>a program that generates or handles email messages (<xref | ||||
target="RFC5322" format="default"/>) | ||||
</dd> | ||||
</dl> | ||||
</section> | </section> | |||
<section anchor="prior-work" numbered="true" toc="default"> | <section anchor="prior-work" numbered="true" toc="default"> | |||
<name>Prior Work</name> | <name>Prior Work</name> | |||
<t><xref target="RFC4134" format="default"/> contains some sample certif | <t><xref target="RFC4134" format="default"/> contains some sample certif | |||
icates, as well as messages of various S/MIME formats. | icates as well as messages of various S/MIME formats. | |||
That older work has unacceptably old algorithm choices that may introduce failur | That older work has unacceptably old algorithm choices that may introduce failur | |||
es when testing modern systems: in 2019, some tools explicitly mark 1024-bit RSA | es when testing modern systems: in 2019, some tools explicitly marked 1024-bit R | |||
and 1024-bit DSS as weak.</t> | SA and 1024-bit DSS as weak.</t> | |||
<t>This earlier document also does not use the now widely-accepted PEM e | <t>This earlier document also does not use the now widely accepted | |||
ncoding (see <xref target="RFC7468" format="default"/>) for the objects, and ins | Privacy-Enhanced Mail (PEM) encoding (see <xref target="RFC7468" | |||
tead embeds runnable Perl code to extract them from the document.</t> | format="default"/>) for the objects and instead embeds runnable Perl | |||
<t>It also includes examples of messages and other structures which are | code to extract them from the document.</t> | |||
greater in ambition than this document intends to be.</t> | <t>It also includes examples of messages and other structures that are g | |||
<t><xref target="RFC8410" format="default"/> includes an example X25519 | reater in ambition than this document intends to be.</t> | |||
certificate that is certified with Ed25519, but it appears to be self-issued, an | <t><xref target="RFC8410" format="default"/> includes an example | |||
d it is not directly useful in testing an S/MIME-capable MUA.</t> | X25519 certificate that is certified with Ed25519, but it appears to | |||
be self issued, and it is not directly useful in testing an S/MIME-capab | ||||
le | ||||
MUA.</t> | ||||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="background" numbered="true" toc="default"> | <section anchor="background" numbered="true" toc="default"> | |||
<name>Background</name> | <name>Background</name> | |||
<section anchor="certificate-usage" numbered="true" toc="default"> | <section anchor="certificate-usage" numbered="true" toc="default"> | |||
<name>Certificate Usage</name> | <name>Certificate Usage</name> | |||
<t>These X.509 certificates (<xref target="RFC5280" format="default"/>) | <t>These X.509 certificates (<xref target="RFC5280" format="default"/>) | |||
are designed for use with S/MIME protections (<xref target="RFC8551" format="def | are designed for use with S/MIME protections (<xref target="RFC8551" format="def | |||
ault"/>) for e-mail (<xref target="RFC5322" format="default"/>).</t> | ault"/>) for email (<xref target="RFC5322" format="default"/>).</t> | |||
<t>In particular, they should be usable with signed and encrypted messag | <t>In particular, they should be usable with signed and encrypted messag | |||
es, as part of test suites and interoperability frameworks.</t> | es as part of test suites and interoperability frameworks.</t> | |||
<t>All end-entity and intermediate CA certificates are marked with Certi ficate Policies from <xref target="TEST-POLICY" format="default"/> indicating th at they are intended only for use in testing environments. | <t>All end-entity and intermediate CA certificates are marked with Certi ficate Policies from <xref target="TEST-POLICY" format="default"/> indicating th at they are intended only for use in testing environments. | |||
End-entity certificates are marked with policy 2.16.840.1.101.3.2.1.48.1 and int ermediate CAs are marked with policy 2.16.840.1.101.3.2.1.48.2.</t> | End-entity certificates are marked with policy 2.16.840.1.101.3.2.1.48.1 and int ermediate CAs are marked with policy 2.16.840.1.101.3.2.1.48.2.</t> | |||
</section> | </section> | |||
<section anchor="certificate-expiration" numbered="true" toc="default"> | <section anchor="certificate-expiration" numbered="true" toc="default"> | |||
<name>Certificate Expiration</name> | <name>Certificate Expiration</name> | |||
<t>The certificates included in this draft expire in 2052. | <t>The certificates included in this document expire in 2052. | |||
This should be sufficiently far in the future that they will be useful for a few decades. | This should be sufficiently far in the future that they will be useful for a few decades. | |||
However, when testing tools in the far future (or when playing with clock skew s cenarios), care should be taken to consider the certificate validity window.</t> | However, when testing tools in the far future (or when playing with clock-skew s cenarios), care should be taken to consider the certificate validity window.</t> | |||
<t>Due to this lengthy expiration window, these certificates will not be particularly useful to test or evaluate the interaction between certificate exp iration and protected messages.</t> | <t>Due to this lengthy expiration window, these certificates will not be particularly useful to test or evaluate the interaction between certificate exp iration and protected messages.</t> | |||
</section> | </section> | |||
<section anchor="certificate-revocation" numbered="true" toc="default"> | <section anchor="certificate-revocation" numbered="true" toc="default"> | |||
<name>Certificate Revocation</name> | <name>Certificate Revocation</name> | |||
<t>Because these are expected to be used in test suites or examples, and we do not expect there to be online network services in these use cases, we do not expect these certificates to produce any revocation artifacts.</t> | <t>Because these are expected to be used in test suites or examples, and we do not expect there to be online network services in these use cases, we do not expect these certificates to produce any revocation artifacts.</t> | |||
<t>As a result, none of the certificates include either an OCSP indicato | <t>As a result, none of the certificates include either an Online Certif | |||
r (see <tt>id-ad-ocsp</tt> as defined in the Authority Information Access X.509 | icate Status Protocol (OCSP) | |||
extension in S.4.2.2.1 of <xref target="RFC5280" format="default"/>) or a CRL in | indicator (see <tt>id-ad-ocsp</tt> as defined in the Authority | |||
dicator (see the CRL Distribution Points X.509 extension as defined in S.4.2.1.1 | Information Access X.509 extension in <xref target="RFC5280" | |||
3 of <xref target="RFC5280" format="default"/>).</t> | sectionFormat="of" section="4.2.2.1" format="default"/>) or a Certificat | |||
e Revocation List (CRL) | ||||
indicator (see the CRL Distribution Points X.509 extension as defined | ||||
in <xref target="RFC5280" sectionFormat="of" section="4.2.1.13" | ||||
format="default"/>).</t> | ||||
</section> | </section> | |||
<section anchor="using-the-ca-in-test-suites" numbered="true" toc="default "> | <section anchor="using-the-ca-in-test-suites" numbered="true" toc="default "> | |||
<name>Using the CA in Test Suites</name> | <name>Using the CA in Test Suites</name> | |||
<t>To use these end-entity certificates in a piece of software (for exam | <t>To use these end-entity certificates in a piece of software (for exam | |||
ple, in a test suite or an interoperability matrix), most tools will need to acc | ple, in a test suite or an interoperability matrix), most tools will need to acc | |||
ept either the Example RSA CA (<xref target="sample-rsa-ca" format="default"/>) | ept either the example RSA CA (<xref target="sample-rsa-ca" format="default"/>) | |||
or the Example Ed25519 CA (<xref target="sample-ed25519-ca" format="default"/>) | or the example Ed25519 CA (<xref target="sample-ed25519-ca" format="default"/>) | |||
as a legitimate root authority.</t> | as a legitimate root authority.</t> | |||
<t>Note that some tooling behaves differently for certificates validated | <t>Note that some tooling behaves differently for certificates validated | |||
by "locally-installed root CAs" than for pre-installed "system-level" root CAs) | by "locally installed root CAs" than for pre-installed "system-level" root CAs) | |||
. | . | |||
For example, many common implementations of HPKP (<xref target="RFC7469" format= | For example, many common implementations of HTTP Public Key Pinning (HPKP) (<xre | |||
"default"/>) only applied the designed protections when dealing with a certifica | f target="RFC7469" format="default"/>) only applied the designed protections whe | |||
te issued by a pre-installed "system-level" root CA, and were disabled when deal | n dealing with a certificate issued by a pre-installed "system-level" root CA an | |||
ing with a certificate issued by a "locally-installed root CA".</t> | d were disabled when dealing with a certificate issued by a "locally installed r | |||
oot CA".</t> | ||||
<t>To test some tooling specifically, it may be necessary to install the root CA as a "system-level" root CA.</t> | <t>To test some tooling specifically, it may be necessary to install the root CA as a "system-level" root CA.</t> | |||
</section> | </section> | |||
<section anchor="certificate-chains" numbered="true" toc="default"> | <section anchor="certificate-chains" numbered="true" toc="default"> | |||
<name>Certificate Chains</name> | <name>Certificate Chains</name> | |||
<t>In most real-world examples, X.509 certificates are deployed with a c hain of more than one X.509 certificate. | <t>In most real-world examples, X.509 certificates are deployed with a c hain of more than one X.509 certificate. | |||
In particular, there is typically a long-lived root CA that users' software know s about upon installation, and the end-entity certificate is issued by an interm ediate CA, which is in turn issued by the root CA.</t> | In particular, there is typically a long-lived root CA that users' software know s about upon installation, and the end-entity certificate is issued by an interm ediate CA, which is in turn issued by the root CA.</t> | |||
<t>The example end-entity certificates in this document can be used with | <t>The example end-entity certificates in this document can be used eith | |||
either a simple two-link certificate chain (they are directly certified by thei | er with a simple two-link certificate chain (they are directly certified by thei | |||
r corresponding root CA), or in a three-link chain.</t> | r corresponding root CA) or in a three-link chain.</t> | |||
<t>For example, Alice's encryption certificate (<xref target="alice-encr | <t>For example, Alice's encryption certificate (<tt>alice.encrypt.crt</t | |||
ypt-cert" format="default"/>, <tt>alice.encrypt.crt</tt>) can be validated by a | t>; see <xref target="alice-encrypt-cert" format="default"/>) can be validated b | |||
peer that directly trusts the Example RSA CA's root cert (<xref target="rsa-ca-c | y a peer that directly trusts the example RSA CA's root cert (<tt>ca.rsa.crt</tt | |||
ert" format="default"/>, <tt>ca.rsa.crt</tt>):</t> | >; see <xref target="rsa-ca-cert" format="default"/>):</t> | |||
<artwork name="alice-validate-two-hops" type="" align="left" alt=""><![C | <artwork name="alice-validate-two-hops" align="left" ><![CDATA[ | |||
DATA[ | +==============+ +-------------------+ | |||
╔════════════╗ ┌───────────────────┐ | || ca.rsa.crt ||-->| alice.encrypt.crt | | |||
║ ca.rsa.crt ╟─→│ alice.encrypt.crt │ | +==============+ +-------------------+ | |||
╚════════════╝ └───────────────────┘ | ||||
]]></artwork> | ]]></artwork> | |||
<t>And it can also be validated by a peer that only directly trusts the | <t>And it can also be validated by a peer that only directly trusts the | |||
Example Ed25519 CA's root cert (<xref target="ed25519-ca-cert" format="default"/ | example Ed25519 CA's root cert (<tt>ca.25519.crt</tt>; see <xref target="ed25519 | |||
>, <tt>ca.25519.crt</tt>), via an intermediate cross-signed CA cert (<xref targe | -ca-cert" format="default"/>) via an intermediate cross-signed CA cert (<tt>ca.r | |||
t="rsa-ca-cross-cert" format="default"/>, <tt>ca.rsa.cross.crt</tt>):</t> | sa.cross.crt</tt>; see <xref target="rsa-ca-cross-cert" format="default"/>):</t> | |||
<artwork name="alice-validate-three-hops" type="" align="left" alt=""><! | <artwork name="alice-validate-three-hops" align="left"><![CDATA[ | |||
[CDATA[ | +================+ +------------------+ +-------------------+ | |||
╔══════════════╗ ┌──────────────────┐ ┌───────────────────┐ | || ca.25519.crt ||-->| ca.rsa.cross.crt |-->| alice.encrypt.crt | | |||
║ ca.25519.crt ╟─→│ ca.rsa.cross.crt ├─→│ alice.encrypt.crt │ | +================+ +------------------+ +-------------------+ | |||
╚══════════════╝ └──────────────────┘ └───────────────────┘ | ||||
]]></artwork> | ]]></artwork> | |||
<t>By omitting the cross-signed CA certs, it should be possible to test a "transvalid" certificate (an end-entity certificate that is supplied without i ts intermediate certificate) in some configurations.</t> | <t>By omitting the cross-signed CA certs, it should be possible to test a "transvalid" certificate (an end-entity certificate that is supplied without i ts intermediate certificate) in some configurations.</t> | |||
</section> | </section> | |||
<section anchor="passwords" numbered="true" toc="default"> | <section anchor="passwords" numbered="true" toc="default"> | |||
<name>Passwords</name> | <name>Passwords</name> | |||
<t>Each secret key presented in this draft is represented as a PEM-encod ed PKCS#8 <xref target="RFC5958" format="default"/> object in cleartext form (it has no password).</t> | <t>Each secret key presented in this document is represented as a PEM-en coded PKCS #8 (<xref target="RFC5958" format="default"/>) object in cleartext fo rm (it has no password).</t> | |||
<t>As such, the secret key objects are not suitable for verifying intero perable password protection schemes.</t> | <t>As such, the secret key objects are not suitable for verifying intero perable password protection schemes.</t> | |||
<t>However, the PKCS#12 <xref target="RFC7292" format="default"/> object s do have simple textual passwords, because tooling for dealing with passwordles s PKCS#12 objects is underdeveloped at the time of this draft.</t> | <t>However, the PKCS #12 (<xref target="RFC7292" format="default"/>) obj ects do have simple textual passwords, because tooling for dealing with password less PKCS #12 objects is underdeveloped at the time of this document.</t> | |||
</section> | </section> | |||
<section anchor="secret-key-origins" numbered="true" toc="default"> | <section anchor="secret-key-origins" numbered="true" toc="default"> | |||
<name>Secret key origins</name> | <name>Secret Key Origins</name> | |||
<t>The secret RSA keys in this document are all deterministically derive | <t>The secret RSA keys in this document are all deterministically derive | |||
d using provable prime generation as found in <xref target="FIPS186-4" format="d | d using provable prime generation as found in <xref target="FIPS186-4" format="d | |||
efault"/>, based on known seeds derived via <xref target="SHA256" format="defaul | efault"/> based on known seeds derived via SHA-256 (<xref target="SHA" format="d | |||
t"/> from simple strings. | efault"/>) from simple strings. | |||
The validation parameters for these derivations are stored in the objects themse lves as specified in <xref target="RFC8479" format="default"/>.</t> | The validation parameters for these derivations are stored in the objects themse lves as specified in <xref target="RFC8479" format="default"/>.</t> | |||
<t>The secret Ed25519 and X25519 keys in this document are all derived b y hashing a simple string. | <t>The secret Ed25519 and X25519 keys in this document are all derived b y hashing a simple string. | |||
The seeds and their derivation are included in the document for informational pu | The seeds and their derivation are included in the document for informational pu | |||
rposes, and to allow re-creation of the objects from appropriate tooling.</t> | rposes and to allow recreation of the objects from appropriate tooling.</t> | |||
<t>All RSA seeds used are 224 bits long (the first 224 bits of the SHA-2 | <t>All RSA seeds used are 224 bits long (the first 224 bits of the SHA-2 | |||
56 digest of the origin string), and are represented in hexadecimal.</t> | 56 digest of the origin string) and are represented in hexadecimal.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="sample-rsa-ca" numbered="true" toc="default"> | <section anchor="sample-rsa-ca" numbered="true" toc="default"> | |||
<name>Example RSA Certification Authority</name> | <name>Example RSA Certification Authority</name> | |||
<t>The example RSA Certification Authority has the following information:< /t> | <t>The example RSA Certification Authority has the following information:< /t> | |||
<ul spacing="normal"> | <dl> | |||
<li>Name: <tt>Sample LAMPS RSA Certification Authority</tt></li> | <dt>Name: | |||
</ul> | </dt> | |||
<section anchor="rsa-ca-cert" numbered="true" toc="default"> | <dd><tt>Sample LAMPS RSA Certification Authority</tt> | |||
</dd> | ||||
</dl> | ||||
<section anchor="rsa-ca-cert" numbered="true" toc="default"> | ||||
<name>RSA Certification Authority Root Certificate</name> | <name>RSA Certification Authority Root Certificate</name> | |||
<t>This certificate is used to verify certificates issued by the example RSA Certification Authority.</t> | <t>This certificate is used to verify certificates issued by the example RSA Certification Authority.</t> | |||
<sourcecode type="application/x-x509-ca-cert" name="ca.rsa.crt"><![CDATA | ||||
[ | <sourcecode type="x509" name="ca.rsa.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIIDezCCAmOgAwIBAgITcBn0xb/zdaeCQlqp6yZUAGZUCDANBgkqhkiG9w0BAQ0F | MIIDezCCAmOgAwIBAgITcBn0xb/zdaeCQlqp6yZUAGZUCDANBgkqhkiG9w0BAQ0F | |||
ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | |||
U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | |||
MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowVTENMAsGA1UEChMESUVURjERMA8G | MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowVTENMAsGA1UEChMESUVURjERMA8G | |||
A1UECxMITEFNUFMgV0cxMTAvBgNVBAMTKFNhbXBsZSBMQU1QUyBSU0EgQ2VydGlm | A1UECxMITEFNUFMgV0cxMTAvBgNVBAMTKFNhbXBsZSBMQU1QUyBSU0EgQ2VydGlm | |||
aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB | aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB | |||
AQC2GGPTEFVNdi0LsiQ79A0Mz2G+LRJlbX2vNo8STibAnyQ9VzFrGJHjUhRX/Omr | AQC2GGPTEFVNdi0LsiQ79A0Mz2G+LRJlbX2vNo8STibAnyQ9VzFrGJHjUhRX/Omr | |||
OP3rDCB2SYfBPVwd0CdC6z9qfJkcVxDc1hK+VS9vKncL0IPUYlkJwWuMpXa1Ielz | OP3rDCB2SYfBPVwd0CdC6z9qfJkcVxDc1hK+VS9vKncL0IPUYlkJwWuMpXa1Ielz | |||
+zCuV+gjV83Uvn6wTn39MCmymu7nFPzihcuOnbMYOCdMmUbi1Dm8TX9P6itFR3hi | +zCuV+gjV83Uvn6wTn39MCmymu7nFPzihcuOnbMYOCdMmUbi1Dm8TX9P6itFR3hi | |||
skipping to change at line 165 ¶ | skipping to change at line 237 ¶ | |||
heSNUHUigVR9njTVw2EBz7e2p+v3tOsMnunvm6PIDgHxx0W6mjzMX7lG74bJfo+v | heSNUHUigVR9njTVw2EBz7e2p+v3tOsMnunvm6PIDgHxx0W6mjzMX7lG74bJfo+v | |||
dx+jI/aXt+iih5pi7/2Yu9eTDVu+S52wsnF89BEJeV0r+EmGDxUv47D+5KuQpKM9 | dx+jI/aXt+iih5pi7/2Yu9eTDVu+S52wsnF89BEJeV0r+EmGDxUv47D+5KuQpKM9 | |||
U/isXpwC6K/36T8RhhdOQXDq0Mt91TZ4dJTT0m3cmo80zzcxsKMDStZHOOzCBtBq | U/isXpwC6K/36T8RhhdOQXDq0Mt91TZ4dJTT0m3cmo80zzcxsKMDStZHOOzCBtBq | |||
uIbwWw5Oa72o/Iwg9v+W0WkSBCWEadf/uK+cRicxrQ== | uIbwWw5Oa72o/Iwg9v+W0WkSBCWEadf/uK+cRicxrQ== | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="rsa-certification-authority-secret-key" numbered="true" t oc="default"> | <section anchor="rsa-certification-authority-secret-key" numbered="true" t oc="default"> | |||
<name>RSA Certification Authority Secret Key</name> | <name>RSA Certification Authority Secret Key</name> | |||
<t>This secret key material is used by the example RSA Certification Aut hority to issue new certificates.</t> | <t>This secret key material is used by the example RSA Certification Aut hority to issue new certificates.</t> | |||
<sourcecode type="application/x-pem-file" name="ca.rsa.key"><![CDATA[ | <sourcecode type="pkcs8" name="ca.rsa.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MIIE+wIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC2GGPTEFVNdi0L | MIIE+wIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC2GGPTEFVNdi0L | |||
siQ79A0Mz2G+LRJlbX2vNo8STibAnyQ9VzFrGJHjUhRX/OmrOP3rDCB2SYfBPVwd | siQ79A0Mz2G+LRJlbX2vNo8STibAnyQ9VzFrGJHjUhRX/OmrOP3rDCB2SYfBPVwd | |||
0CdC6z9qfJkcVxDc1hK+VS9vKncL0IPUYlkJwWuMpXa1Ielz+zCuV+gjV83Uvn6w | 0CdC6z9qfJkcVxDc1hK+VS9vKncL0IPUYlkJwWuMpXa1Ielz+zCuV+gjV83Uvn6w | |||
Tn39MCmymu7nFPzihcuOnbMYOCdMmUbi1Dm8TX9P6itFR3hiIHpSKMbkoXlM1837 | Tn39MCmymu7nFPzihcuOnbMYOCdMmUbi1Dm8TX9P6itFR3hiIHpSKMbkoXlM1837 | |||
WaFfx57kBIoIuNjKEyPIuK9wGUAeppc5QAHJg95PPEHNHlmMyhBzClmgkyozRSeS | WaFfx57kBIoIuNjKEyPIuK9wGUAeppc5QAHJg95PPEHNHlmMyhBzClmgkyozRSeS | |||
rkxq9XeJKU94lWGaZ0zb4karCur/eiMoCk3YNV8L3styvcMG1qUDCAaKx6FZEf7h | rkxq9XeJKU94lWGaZ0zb4karCur/eiMoCk3YNV8L3styvcMG1qUDCAaKx6FZEf7h | |||
E9RN6L3bAgMBAAECggEAE3tFhsm7DpgDlro+1Sk1kjbHssR4sOBHb4zrPp6c18PO | E9RN6L3bAgMBAAECggEAE3tFhsm7DpgDlro+1Sk1kjbHssR4sOBHb4zrPp6c18PO | |||
6T8gWuBcj1DzOzykNTzaMaDxAia4vuxVJB1mberkNHzTFqyb8bx3ceSEOCT3aoyq | 6T8gWuBcj1DzOzykNTzaMaDxAia4vuxVJB1mberkNHzTFqyb8bx3ceSEOCT3aoyq | |||
5fiFpR0L6Ba1vgg8RTvNCAIApHNa4pVk0XD8Wq+h7mlUAOYGbie5UO8/P2qWjcOz | 5fiFpR0L6Ba1vgg8RTvNCAIApHNa4pVk0XD8Wq+h7mlUAOYGbie5UO8/P2qWjcOz | |||
skipping to change at line 196 ¶ | skipping to change at line 268 ¶ | |||
7v2x+m8rMqlyv+pkyWLV8KKytHmdiBzD+oTWxF7r4ueLjtaxngzxn93pAoGBAKpR | 7v2x+m8rMqlyv+pkyWLV8KKytHmdiBzD+oTWxF7r4ueLjtaxngzxn93pAoGBAKpR | |||
rR9PnroKHubSE/drUNZFLvnZwPDv6lO8T978tONL372pUT9KjR8eN31DaMpoQOpc | rR9PnroKHubSE/drUNZFLvnZwPDv6lO8T978tONL372pUT9KjR8eN31DaMpoQOpc | |||
BqvpSoQjBLt1nDysV2krI0RwMIOzAWc0E9C8RMvJ6+RdU50Q1BSyjvLGaKi5AAHk | BqvpSoQjBLt1nDysV2krI0RwMIOzAWc0E9C8RMvJ6+RdU50Q1BSyjvLGaKi5AAHk | |||
PTk8cGYVO1BCHGlX8p3XYfw0xQaHxtuVCV8eYgCvAoGBAIZeiVhc0YTJOjUadz+0 | PTk8cGYVO1BCHGlX8p3XYfw0xQaHxtuVCV8eYgCvAoGBAIZeiVhc0YTJOjUadz+0 | |||
vSOzA1arg5k2YCPCGf7z+ijM5rbMk7jrYixD6WMjTOkVLHDsVxMBpbA7GhL7TKy5 | vSOzA1arg5k2YCPCGf7z+ijM5rbMk7jrYixD6WMjTOkVLHDsVxMBpbA7GhL7TKy5 | |||
cepBH1PVwxEIl8dqN+UoeJeBpnHo/cjJ0iCR9/aMJzI+qiUo3OMDR+UH99NIddKN | cepBH1PVwxEIl8dqN+UoeJeBpnHo/cjJ0iCR9/aMJzI+qiUo3OMDR+UH99NIddKN | |||
i75GRVLAeW0Izgt09EMEiD9joDswOQYKKwYBBAGSCBIIATErMCkGCWCGSAFlAwQC | i75GRVLAeW0Izgt09EMEiD9joDswOQYKKwYBBAGSCBIIATErMCkGCWCGSAFlAwQC | |||
AgQcpcG3hHYU7WYaawUiNRQotLfwnYzMotmTAt1i6Q== | AgQcpcG3hHYU7WYaawUiNRQotLfwnYzMotmTAt1i6Q== | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key was generated using provable prime generation found i | <t>This secret key was generated using provable prime generation found | |||
n <xref target="FIPS186-4" format="default"/> using the seed <tt>a5c1b7847614ed6 | in <xref target="FIPS186-4" format="default"/> using the seed | |||
61a6b0522351428b4b7f09d8ccca2d99302dd62e9</tt>. | <tt>a5c1b7847614ed661a6b0522351428b4b7f09d8ccca2d99302dd62e9</tt>. | |||
This seed is the first 224 bits of the <xref target="SHA256" format="default"/> | This seed is the first 224 bits of the SHA-256 (<xref target="SHA" | |||
digest of the string <tt>draft-lamps-sample-certs-keygen.ca.rsa.seed</tt>.</t> | format="default"/>) digest of the string | |||
<tt>draft-lamps-sample-certs-keygen.ca.rsa.seed</tt>.</t> | ||||
</section> | </section> | |||
<section anchor="rsa-ca-cross-cert" numbered="true" toc="default"> | <section anchor="rsa-ca-cross-cert" numbered="true" toc="default"> | |||
<name>RSA Certification Authority Cross-signed Certificate</name> | <name>RSA Certification Authority Cross-Signed Certificate</name> | |||
<t>If an e-mail client only trusts the Ed25519 Certification Authority R | <t>If an email client only trusts the Ed25519 Certification Authority Ro | |||
oot Certificate found in <xref target="ed25519-ca-cert" format="default"/>, they | ot Certificate found in <xref target="ed25519-ca-cert" format="default"/>, they | |||
can use this intermediate CA certificate to verify any end entity certificate i | can use this intermediate CA certificate to verify any end-entity certificate is | |||
ssued by the example RSA Certification Authority.</t> | sued by the example RSA Certification Authority.</t> | |||
<sourcecode type="application/x-x509-ca-cert" name="ca.rsa.cross.crt"><! | <sourcecode type="x509" name="ca.rsa.cross.crt"><![CDATA[ | |||
[CDATA[ | ||||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIIC5zCCApmgAwIBAgITcTQnnf8DUsvAdvkX7mUemYos7DAFBgMrZXAwWTENMAsG | MIIC5zCCApmgAwIBAgITcTQnnf8DUsvAdvkX7mUemYos7DAFBgMrZXAwWTENMAsG | |||
A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | |||
QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | |||
MzU0NFoYDzIwNTIwOTI3MDY1NDE4WjBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | MzU0NFoYDzIwNTIwOTI3MDY1NDE4WjBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | |||
EwhMQU1QUyBXRzExMC8GA1UEAxMoU2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0 | EwhMQU1QUyBXRzExMC8GA1UEAxMoU2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0 | |||
aW9uIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALYY | aW9uIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALYY | |||
Y9MQVU12LQuyJDv0DQzPYb4tEmVtfa82jxJOJsCfJD1XMWsYkeNSFFf86as4/esM | Y9MQVU12LQuyJDv0DQzPYb4tEmVtfa82jxJOJsCfJD1XMWsYkeNSFFf86as4/esM | |||
IHZJh8E9XB3QJ0LrP2p8mRxXENzWEr5VL28qdwvQg9RiWQnBa4yldrUh6XP7MK5X | IHZJh8E9XB3QJ0LrP2p8mRxXENzWEr5VL28qdwvQg9RiWQnBa4yldrUh6XP7MK5X | |||
6CNXzdS+frBOff0wKbKa7ucU/OKFy46dsxg4J0yZRuLUObxNf0/qK0VHeGIgelIo | 6CNXzdS+frBOff0wKbKa7ucU/OKFy46dsxg4J0yZRuLUObxNf0/qK0VHeGIgelIo | |||
skipping to change at line 227 ¶ | skipping to change at line 303 ¶ | |||
BxcMp/EJKGU2GmccaHb0WTAfBgNVHSMEGDAWgBRropV9uhSb5C0E0Qek0YLkLmuM | BxcMp/EJKGU2GmccaHb0WTAfBgNVHSMEGDAWgBRropV9uhSb5C0E0Qek0YLkLmuM | |||
tTAFBgMrZXADQQBnQ+0eFP/BBKz8bVELVEPw9WFXwIGnyH7rrmLQJSE5GJmm7cYX | tTAFBgMrZXADQQBnQ+0eFP/BBKz8bVELVEPw9WFXwIGnyH7rrmLQJSE5GJmm7cYX | |||
FFJBGyc3NWzlxxyfJLsh0yYh04dxdM8R5hcD | FFJBGyc3NWzlxxyfJLsh0yYh04dxdM8R5hcD | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="alices-sample-certificates" numbered="true" toc="default"> | <section anchor="alices-sample-certificates" numbered="true" toc="default"> | |||
<name>Alice's Sample Certificates</name> | <name>Alice's Sample Certificates</name> | |||
<t>Alice has the following information:</t> | <t>Alice has the following information:</t> | |||
<ul spacing="normal"> | ||||
<li>Name: <tt>Alice Lovelace</tt></li> | <dl> | |||
<li>E-mail Address: <tt>alice@smime.example</tt></li> | <dt>Name: | |||
</ul> | </dt> | |||
<dd><tt>Alice Lovelace</tt> | ||||
</dd> | ||||
<dt>Email Address: | ||||
</dt> | ||||
<dd><tt>alice@smime.example</tt> | ||||
</dd> | ||||
</dl> | ||||
<section anchor="alice-verify-cert" numbered="true" toc="default"> | <section anchor="alice-verify-cert" numbered="true" toc="default"> | |||
<name>Alice's Signature Verification End-Entity Certificate</name> | <name>Alice's Signature Verification End-Entity Certificate</name> | |||
<t>This certificate is used for verification of signatures made by Alice .</t> | <t>This certificate is used for verification of signatures made by Alice .</t> | |||
<sourcecode type="application/x-pem-file" name="alice.sign.crt"><![CDATA [ | <sourcecode type="x509" name="alice.sign.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIIDzzCCAregAwIBAgITN0EFee11f0Kpolw69Phqzpqp1zANBgkqhkiG9w0BAQ0F | MIIDzzCCAregAwIBAgITN0EFee11f0Kpolw69Phqzpqp1zANBgkqhkiG9w0BAQ0F | |||
ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | |||
U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | |||
MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowOzENMAsGA1UEChMESUVURjERMA8G | MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowOzENMAsGA1UEChMESUVURjERMA8G | |||
A1UECxMITEFNUFMgV0cxFzAVBgNVBAMTDkFsaWNlIExvdmVsYWNlMIIBIjANBgkq | A1UECxMITEFNUFMgV0cxFzAVBgNVBAMTDkFsaWNlIExvdmVsYWNlMIIBIjANBgkq | |||
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtPSJ6Fg4Fj5Nmn9PkrYo0jTkfCv4TfA/ | hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtPSJ6Fg4Fj5Nmn9PkrYo0jTkfCv4TfA/ | |||
pdO/KLpZbJOAEr0sI7AjaO7B1GuMUFJeSTulamNfCwDcDkY63PQWl+DILs7GxVwX | pdO/KLpZbJOAEr0sI7AjaO7B1GuMUFJeSTulamNfCwDcDkY63PQWl+DILs7GxVwX | |||
urhYdZlaV5hcUqVAckPvedDBc/3rz4D/esFfs+E7QMFtmd+K04s+A8TCNO12DRVB | urhYdZlaV5hcUqVAckPvedDBc/3rz4D/esFfs+E7QMFtmd+K04s+A8TCNO12DRVB | |||
DpbP4JFD9hsc8prDtpGmFk7rd0q8gqnhxBW2RZAeLqzJOMayCQtws1q7ktkNBR2w | DpbP4JFD9hsc8prDtpGmFk7rd0q8gqnhxBW2RZAeLqzJOMayCQtws1q7ktkNBR2w | |||
skipping to change at line 263 ¶ | skipping to change at line 348 ¶ | |||
E1oAJKKhDbdbEcZXL2+x1V+duGymWtaD01DZZukKYr7agyHahiXRn/C9cy31wbqN | E1oAJKKhDbdbEcZXL2+x1V+duGymWtaD01DZZukKYr7agyHahiXRn/C9cy31wbqN | |||
sy9x0fjPQg6+DqatiQpMz9EIae6aCHHBhOiPU7IPkazgPYgkLD59fk4PGHnYxs1F | sy9x0fjPQg6+DqatiQpMz9EIae6aCHHBhOiPU7IPkazgPYgkLD59fk4PGHnYxs1F | |||
hdO6zZk9E8zwlc1ALgZa/iSbczisqckN3qGehD2s16jMhwFXLJtBiN+uCDgNG/D0 | hdO6zZk9E8zwlc1ALgZa/iSbczisqckN3qGehD2s16jMhwFXLJtBiN+uCDgNG/D0 | |||
qyTbY4fgKieUHx/tHuzUszZxJg== | qyTbY4fgKieUHx/tHuzUszZxJg== | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="alice-sign-key" numbered="true" toc="default"> | <section anchor="alice-sign-key" numbered="true" toc="default"> | |||
<name>Alice's Signing Private Key Material</name> | <name>Alice's Signing Private Key Material</name> | |||
<t>This private key material is used by Alice to create signatures.</t> | <t>This private key material is used by Alice to create signatures.</t> | |||
<sourcecode type="application/x-pem-file" name="alice.sign.key"><![CDATA [ | <sourcecode type="pkcs8" name="alice.sign.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MIIE+gIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC09InoWDgWPk2a | MIIE+gIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC09InoWDgWPk2a | |||
f0+StijSNOR8K/hN8D+l078oullsk4ASvSwjsCNo7sHUa4xQUl5JO6VqY18LANwO | f0+StijSNOR8K/hN8D+l078oullsk4ASvSwjsCNo7sHUa4xQUl5JO6VqY18LANwO | |||
Rjrc9BaX4MguzsbFXBe6uFh1mVpXmFxSpUByQ+950MFz/evPgP96wV+z4TtAwW2Z | Rjrc9BaX4MguzsbFXBe6uFh1mVpXmFxSpUByQ+950MFz/evPgP96wV+z4TtAwW2Z | |||
34rTiz4DxMI07XYNFUEOls/gkUP2GxzymsO2kaYWTut3SryCqeHEFbZFkB4urMk4 | 34rTiz4DxMI07XYNFUEOls/gkUP2GxzymsO2kaYWTut3SryCqeHEFbZFkB4urMk4 | |||
xrIJC3CzWruS2Q0FHbBlfkgKN5wXVgkWFfiOucfCn+IQsaqpo1d3f9jSkbtAV5w3 | xrIJC3CzWruS2Q0FHbBlfkgKN5wXVgkWFfiOucfCn+IQsaqpo1d3f9jSkbtAV5w3 | |||
vzfog8919MxKI9H6l4KuElnAtJ7BtZcsl7dUy9u9COgEykRiVokFQgqQ7XNDU+r3 | vzfog8919MxKI9H6l4KuElnAtJ7BtZcsl7dUy9u9COgEykRiVokFQgqQ7XNDU+r3 | |||
SeOWwks7AgMBAAECggEAFKD2DG9A1u77q3u3p2WDH3zueTtiqgaT8u8XO+jhOI/+ | SeOWwks7AgMBAAECggEAFKD2DG9A1u77q3u3p2WDH3zueTtiqgaT8u8XO+jhOI/+ | |||
HzoX9eo8DIJ/b/G3brwHyfh17JFvLH1zbgsn5bghJTz3r+JcZZ5l3srqMV8t8zjI | HzoX9eo8DIJ/b/G3brwHyfh17JFvLH1zbgsn5bghJTz3r+JcZZ5l3srqMV8t8zjI | |||
JEHOKC3szH8gYVKWrIgBAqOt1H9Ti8J2oKk2aymqBFr3ZXpBUCTWpEz2s3FMBUUI | JEHOKC3szH8gYVKWrIgBAqOt1H9Ti8J2oKk2aymqBFr3ZXpBUCTWpEz2s3FMBUUI | |||
skipping to change at line 294 ¶ | skipping to change at line 379 ¶ | |||
WmFXlX/w5qzKXtWr3ox9JPFzveSfs1bqZBi1QQmfp0skhBo/jyNvpYUNAoGAMNkw | WmFXlX/w5qzKXtWr3ox9JPFzveSfs1bqZBi1QQmfp0skhBo/jyNvpYUNAoGAMNkw | |||
GhcdQW87GY7QFXQ/ePwOmV49lgrCT/BwKPDKl8l5ZgvfL/ddEzWQgH/XraoyHT2T | GhcdQW87GY7QFXQ/ePwOmV49lgrCT/BwKPDKl8l5ZgvfL/ddEzWQgH/XraoyHT2T | |||
uEuM18+QM73hfLt26RBCHGXK1CUMMzL+fAQc7sjH1YXlkleFASg4rrpcrKqoR+KB | uEuM18+QM73hfLt26RBCHGXK1CUMMzL+fAQc7sjH1YXlkleFASg4rrpcrKqoR+KB | |||
YSiayNhAK4yrf+WN66C8VPknbA7us0L1TEbAOAECgYEAtwRiiQwk3BlqENFypyc8 | YSiayNhAK4yrf+WN66C8VPknbA7us0L1TEbAOAECgYEAtwRiiQwk3BlqENFypyc8 | |||
0Q1pxp3U7ciHi8mni0kNcTqe57Y/2o8nY9ISnt1GffMs79YQfRXTRdEm2St6oChI | 0Q1pxp3U7ciHi8mni0kNcTqe57Y/2o8nY9ISnt1GffMs79YQfRXTRdEm2St6oChI | |||
9Cv5j74LHZXkgEVFfO2Nq/uwSzTZkePk+HoPJo4WtAdokZgRAyyHl0gEae8Rl89e | 9Cv5j74LHZXkgEVFfO2Nq/uwSzTZkePk+HoPJo4WtAdokZgRAyyHl0gEae8Rl89e | |||
yBX7dutONALjRZFTrg18CuegOzA5BgorBgEEAZIIEggBMSswKQYJYIZIAWUDBAIC | yBX7dutONALjRZFTrg18CuegOzA5BgorBgEEAZIIEggBMSswKQYJYIZIAWUDBAIC | |||
BBySyJ1DMNPY4x1P3pudD+bp/BQhQd1lpF5bQ28F | BBySyJ1DMNPY4x1P3pudD+bp/BQhQd1lpF5bQ28F | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key was generated using provable prime generation found i | <t>This secret key was generated using provable prime generation found | |||
n <xref target="FIPS186-4" format="default"/> using the seed <tt>92c89d4330d3d8e | in <xref target="FIPS186-4" format="default"/> using the seed | |||
31d4fde9b9d0fe6e9fc142141dd65a45e5b436f05</tt>. | <tt>92c89d4330d3d8e31d4fde9b9d0fe6e9fc142141dd65a45e5b436f05</tt>. | |||
This seed is the first 224 bits of the <xref target="SHA256" format="default"/> | This seed is the first 224 bits of the SHA-256 (<xref target="SHA" | |||
digest of the string <tt>draft-lamps-sample-certs-keygen.alice.sign.seed</tt>.</ | format="default"/>) digest of the string | |||
t> | <tt>draft-lamps-sample-certs-keygen.alice.sign.seed</tt>.</t> | |||
</section> | </section> | |||
<section anchor="alice-encrypt-cert" numbered="true" toc="default"> | <section anchor="alice-encrypt-cert" numbered="true" toc="default"> | |||
<name>Alice's Encryption End-Entity Certificate</name> | <name>Alice's Encryption End-Entity Certificate</name> | |||
<t>This certificate is used to encrypt messages to Alice.</t> | <t>This certificate is used to encrypt messages to Alice.</t> | |||
<sourcecode type="application/x-pem-file" name="alice.encrypt.crt"><![CD ATA[ | <sourcecode type="x509" name="alice.encrypt.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIIDzzCCAregAwIBAgITDy0lvRE5l0rOQlSHoe49NAaKtDANBgkqhkiG9w0BAQ0F | MIIDzzCCAregAwIBAgITDy0lvRE5l0rOQlSHoe49NAaKtDANBgkqhkiG9w0BAQ0F | |||
ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | |||
U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | |||
MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowOzENMAsGA1UEChMESUVURjERMA8G | MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowOzENMAsGA1UEChMESUVURjERMA8G | |||
A1UECxMITEFNUFMgV0cxFzAVBgNVBAMTDkFsaWNlIExvdmVsYWNlMIIBIjANBgkq | A1UECxMITEFNUFMgV0cxFzAVBgNVBAMTDkFsaWNlIExvdmVsYWNlMIIBIjANBgkq | |||
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmpUp+ovBouOP6AFQJ+RpwpODxxzY60n1 | hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmpUp+ovBouOP6AFQJ+RpwpODxxzY60n1 | |||
lJ53pTeNSiJlWkwtw/cxQq0t4uD2vWYB8gOUH/CVt2Zp1c+auzPKJ2Zu5mY6kHm+ | lJ53pTeNSiJlWkwtw/cxQq0t4uD2vWYB8gOUH/CVt2Zp1c+auzPKJ2Zu5mY6kHm+ | |||
hVB+IthjLeI7Htg6rNeuXq50/TuTSxX5R1I1EXGt8p6hAQVeA5oZ2afHg4b97enV | hVB+IthjLeI7Htg6rNeuXq50/TuTSxX5R1I1EXGt8p6hAQVeA5oZ2afHg4b97enV | |||
8gozR0/Nkug4AkXmbk7THNc8vvjMUJanZ/VmS4TgDqXjWShplcI3lcvvBZMswt41 | 8gozR0/Nkug4AkXmbk7THNc8vvjMUJanZ/VmS4TgDqXjWShplcI3lcvvBZMswt41 | |||
skipping to change at line 329 ¶ | skipping to change at line 418 ¶ | |||
jqB8+dz2AwYeMxODWq9opwtA/lTOkRg8uuivZfg/m5fFo/QshlHNaaTDVEXsU4Ps | jqB8+dz2AwYeMxODWq9opwtA/lTOkRg8uuivZfg/m5fFo/QshlHNaaTDVEXsU4Ps | |||
98Hm/3gznbvhdjFbZbi4oZ3tAadRlE5K9JiQaJYOnUmGpfB8PPwDR6chMZeegSQA | 98Hm/3gznbvhdjFbZbi4oZ3tAadRlE5K9JiQaJYOnUmGpfB8PPwDR6chMZeegSQA | |||
W++OIKqHrg/WEh4yiuPfqmAvX2hZkPpivNJYdTPUXTSO7K459CyqbqG+sNOo2kc1 | W++OIKqHrg/WEh4yiuPfqmAvX2hZkPpivNJYdTPUXTSO7K459CyqbqG+sNOo2kc1 | |||
nTXl85RHNrVKQK+L0YWY1Q+hWA== | nTXl85RHNrVKQK+L0YWY1Q+hWA== | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="alice-decrypt-key" numbered="true" toc="default"> | <section anchor="alice-decrypt-key" numbered="true" toc="default"> | |||
<name>Alice's Decryption Private Key Material</name> | <name>Alice's Decryption Private Key Material</name> | |||
<t>This private key material is used by Alice to decrypt messages.</t> | <t>This private key material is used by Alice to decrypt messages.</t> | |||
<sourcecode type="application/x-pem-file" name="alice.encrypt.key"><![CD ATA[ | <sourcecode type="pkcs8" name="alice.encrypt.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MIIE+gIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCalSn6i8Gi44/o | MIIE+gIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCalSn6i8Gi44/o | |||
AVAn5GnCk4PHHNjrSfWUnnelN41KImVaTC3D9zFCrS3i4Pa9ZgHyA5Qf8JW3ZmnV | AVAn5GnCk4PHHNjrSfWUnnelN41KImVaTC3D9zFCrS3i4Pa9ZgHyA5Qf8JW3ZmnV | |||
z5q7M8onZm7mZjqQeb6FUH4i2GMt4jse2Dqs165ernT9O5NLFflHUjURca3ynqEB | z5q7M8onZm7mZjqQeb6FUH4i2GMt4jse2Dqs165ernT9O5NLFflHUjURca3ynqEB | |||
BV4DmhnZp8eDhv3t6dXyCjNHT82S6DgCReZuTtMc1zy++MxQlqdn9WZLhOAOpeNZ | BV4DmhnZp8eDhv3t6dXyCjNHT82S6DgCReZuTtMc1zy++MxQlqdn9WZLhOAOpeNZ | |||
KGmVwjeVy+8FkyzC3jX/Qcm+ZLCqlLqhBwDHdZ5qDTII2PVX1X3K7/cONxhvBbaU | KGmVwjeVy+8FkyzC3jX/Qcm+ZLCqlLqhBwDHdZ5qDTII2PVX1X3K7/cONxhvBbaU | |||
l/k1swdszUtjhflyFZ80RuQ3qFC6vL/PGeWy6SCf58duq/AOEksCAWlb+MD8QH9Y | l/k1swdszUtjhflyFZ80RuQ3qFC6vL/PGeWy6SCf58duq/AOEksCAWlb+MD8QH9Y | |||
j7CFSmq1AgMBAAECggEADgxoWEDDRE5yEZ+s7TMw+WH2o+3XOOrryqnsLbOyv34I | j7CFSmq1AgMBAAECggEADgxoWEDDRE5yEZ+s7TMw+WH2o+3XOOrryqnsLbOyv34I | |||
wAAUWK7qZyjd9rSDOAtBOgFhQNXYhWZlT+0iHslCIfqJMZ8wy1iFHBCIphoMSWs5 | wAAUWK7qZyjd9rSDOAtBOgFhQNXYhWZlT+0iHslCIfqJMZ8wy1iFHBCIphoMSWs5 | |||
/D+idXrUef5Y23rClBxXH0g1UnSGXnpUH4ehV6p1lvZMh4OJKEoMC4cpyd1SzXrw | /D+idXrUef5Y23rClBxXH0g1UnSGXnpUH4ehV6p1lvZMh4OJKEoMC4cpyd1SzXrw | |||
skipping to change at line 361 ¶ | skipping to change at line 450 ¶ | |||
ORCxvXTyGiW2USVu3EkaqFDtnMmH27G6LNxuudc/dco2cFWbZ0bbGFN8yYiBCwJl | ORCxvXTyGiW2USVu3EkaqFDtnMmH27G6LNxuudc/dco2cFWbZ0bbGFN8yYiBCwJl | |||
fDGDv7wb5FIgykypqtn4lpvjHUHA6hX90gShT3TTTsZ0SjJJGgZEeV/2qyq+ZdF/ | fDGDv7wb5FIgykypqtn4lpvjHUHA6hX90gShT3TTTsZ0SjJJGgZEeV/2qyq+ZdF/ | |||
Ya+ecV26BzR1Vfuzs4jBnCuS4DaHgxcuWW2N6pZRAoGAWTovk3xdtE0TZvDerxUY | Ya+ecV26BzR1Vfuzs4jBnCuS4DaHgxcuWW2N6pZRAoGAWTovk3xdtE0TZvDerxUY | |||
l8hX+vwJGy7uZjegi4cFecSkOR4iekVxrEvEGhpNdEB2GqdLgp6Q6GPdalCG2wc4 | l8hX+vwJGy7uZjegi4cFecSkOR4iekVxrEvEGhpNdEB2GqdLgp6Q6GPdalCG2wc4 | |||
7pojp/0inc4RtRRf3nZHaTy00bnSe/0y+t0OUbkRMtXhnViVhCcOt6BUcsHupbu2 | 7pojp/0inc4RtRRf3nZHaTy00bnSe/0y+t0OUbkRMtXhnViVhCcOt6BUcsHupbu2 | |||
Adub72KLk+gvASDduuatGjqgOzA5BgorBgEEAZIIEggBMSswKQYJYIZIAWUDBAIC | Adub72KLk+gvASDduuatGjqgOzA5BgorBgEEAZIIEggBMSswKQYJYIZIAWUDBAIC | |||
BBwc90hJ90RfRmxCciUfX5a3f6Bpiz6Ys/Hugge/ | BBwc90hJ90RfRmxCciUfX5a3f6Bpiz6Ys/Hugge/ | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key was generated using provable prime generation found i n <xref target="FIPS186-4" format="default"/> using the seed <tt>1cf74849f7445f4 66c4272251f5f96b77fa0698b3e98b3f1ee8207bf</tt>. | <t>This secret key was generated using provable prime generation found i n <xref target="FIPS186-4" format="default"/> using the seed <tt>1cf74849f7445f4 66c4272251f5f96b77fa0698b3e98b3f1ee8207bf</tt>. | |||
This seed is the first 224 bits of the <xref target="SHA256" format="default"/> digest of the string <tt>draft-lamps-sample-certs-keygen.alice.encrypt.seed</tt> .</t> | This seed is the first 224 bits of the SHA-256 (<xref target="SHA" format="defau lt"/>) digest of the string <tt>draft-lamps-sample-certs-keygen.alice.encrypt.se ed</tt>.</t> | |||
</section> | </section> | |||
<section anchor="pkcs12-object-for-alice" numbered="true" toc="default"> | <section anchor="pkcs12-object-for-alice" numbered="true" toc="default"> | |||
<name>PKCS12 Object for Alice</name> | <name>PKCS #12 Object for Alice</name> | |||
<t>This PKCS12 (<xref target="RFC7292" format="default"/>) object contai | <t>This PKCS #12 (<xref target="RFC7292" format="default"/>) object | |||
ns the same information as presented in <xref target="alice-verify-cert" format= | contains the same information as presented in Sections <xref | |||
"default"/>, <xref target="alice-sign-key" format="default"/>, <xref target="ali | target="rsa-ca-cross-cert" format="counter"/>, <xref | |||
ce-encrypt-cert" format="default"/>, <xref target="alice-decrypt-key" format="de | target="alice-verify-cert" format="counter"/>, <xref | |||
fault"/>, and <xref target="rsa-ca-cross-cert" format="default"/>.</t> | target="alice-sign-key" format="counter"/>, <xref | |||
target="alice-encrypt-cert" format="counter"/>, and <xref | ||||
target="alice-decrypt-key" format="counter"/>. | ||||
</t> | ||||
<t>It is locked with the simple five-letter password <tt>alice</tt>.</t> | <t>It is locked with the simple five-letter password <tt>alice</tt>.</t> | |||
<sourcecode type="application/x-pem-file" name="alice.p12"><![CDATA[ | <sourcecode type="pkcs12" name="alice.p12"><![CDATA[ | |||
-----BEGIN PKCS12----- | -----BEGIN PKCS12----- | |||
MIIX+AIBAzCCF8AGCSqGSIb3DQEHAaCCF7EEghetMIIXqTCCBI8GCSqGSIb3DQEH | MIIX+AIBAzCCF8AGCSqGSIb3DQEHAaCCF7EEghetMIIXqTCCBI8GCSqGSIb3DQEH | |||
BqCCBIAwggR8AgEAMIIEdQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQMwDgQIWQKs | BqCCBIAwggR8AgEAMIIEdQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQMwDgQIWQKs | |||
PyUaB9YCAhTCgIIESCsrTOUTY394FyrjkeCBSV1dw7I3o9oZN7N6Ux2KyIamsWiJ | PyUaB9YCAhTCgIIESCsrTOUTY394FyrjkeCBSV1dw7I3o9oZN7N6Ux2KyIamsWiJ | |||
77t7RL1/VSxSBLjVV8Sn5+/o3mFjr5NkyQbWuky33ySVy3HZUdZc2RTooyFEdRi8 | 77t7RL1/VSxSBLjVV8Sn5+/o3mFjr5NkyQbWuky33ySVy3HZUdZc2RTooyFEdRi8 | |||
x82dzEaVmab7pW4zpoG/IVR6OTizcWJOooGoE0ORim6y2G+iRZ3ePBUq0+8eSNYW | x82dzEaVmab7pW4zpoG/IVR6OTizcWJOooGoE0ORim6y2G+iRZ3ePBUq0+8eSNYW | |||
+jIWov9abdFqj9j1bQKj/Hrdje2TCdl6a9sSlTFYvIxBWUdPlZDwvCQqwiCWmXeI | +jIWov9abdFqj9j1bQKj/Hrdje2TCdl6a9sSlTFYvIxBWUdPlZDwvCQqwiCWmXeI | |||
6T9EpZldksDjr5N+zFhSLoRwABGRU8jXSU9AEsem9DFxoqZq8VsQcegQFY6aJcZO | 6T9EpZldksDjr5N+zFhSLoRwABGRU8jXSU9AEsem9DFxoqZq8VsQcegQFY6aJcZO | |||
Xel7IECIAgK8nZlKCTzyNVALxeFw0ijWnW4ltDaqcC6GepmuINiqqdD94YAOHxRl | Xel7IECIAgK8nZlKCTzyNVALxeFw0ijWnW4ltDaqcC6GepmuINiqqdD94YAOHxRl | |||
1lKU4mLknSJ36W4T7vaI4fp98sK0nGpaDzQheu6BbQ+dVd44q52MDwvqvD0Y7UjF | 1lKU4mLknSJ36W4T7vaI4fp98sK0nGpaDzQheu6BbQ+dVd44q52MDwvqvD0Y7UjF | |||
skipping to change at line 504 ¶ | skipping to change at line 601 ¶ | |||
Q8MhWk8VRR1FqcuwB0T0bc+SIKEINkvYmDFAMBkGCSqGSIb3DQEJFDEMHgoAYQBs | Q8MhWk8VRR1FqcuwB0T0bc+SIKEINkvYmDFAMBkGCSqGSIb3DQEJFDEMHgoAYQBs | |||
AGkAYwBlMCMGCSqGSIb3DQEJFTEWBBS79syyLR0GEhyXrilqkBDTIGZmczAvMB8w | AGkAYwBlMCMGCSqGSIb3DQEJFTEWBBS79syyLR0GEhyXrilqkBDTIGZmczAvMB8w | |||
BwYFKw4DAhoEFO/nnMx9hi1oZ0S+JkJAu+H3/jPzBAj1OQCGvaJQwQICKAA= | BwYFKw4DAhoEFO/nnMx9hi1oZ0S+JkJAu+H3/jPzBAj1OQCGvaJQwQICKAA= | |||
-----END PKCS12----- | -----END PKCS12----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="bobs-sample" numbered="true" toc="default"> | <section anchor="bobs-sample" numbered="true" toc="default"> | |||
<name>Bob's Sample</name> | <name>Bob's Sample</name> | |||
<t>Bob has the following information:</t> | <t>Bob has the following information:</t> | |||
<ul spacing="normal"> | ||||
<li>Name: <tt>Bob Babbage</tt></li> | <dl> | |||
<li>E-mail Address: <tt>bob@smime.example</tt></li> | <dt>Name: | |||
</ul> | </dt> | |||
<dd><tt>Bob Babbage</tt> | ||||
</dd> | ||||
<dt>Email Address: | ||||
</dt> | ||||
<dd><tt>bob@smime.example</tt> | ||||
</dd> | ||||
</dl> | ||||
<section anchor="bob-verify-cert" numbered="true" toc="default"> | <section anchor="bob-verify-cert" numbered="true" toc="default"> | |||
<name>Bob's Signature Verification End-Entity Certificate</name> | <name>Bob's Signature Verification End-Entity Certificate</name> | |||
<t>This certificate is used for verification of signatures made by Bob.< /t> | <t>This certificate is used for verification of signatures made by Bob.< /t> | |||
<sourcecode type="application/x-pem-file" name="bob.sign.crt"><![CDATA[ | <sourcecode type="x509" name="bob.sign.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIIDyjCCArKgAwIBAgITaqOkD33fBy/kGaVsmPv8LghbwzANBgkqhkiG9w0BAQ0F | MIIDyjCCArKgAwIBAgITaqOkD33fBy/kGaVsmPv8LghbwzANBgkqhkiG9w0BAQ0F | |||
ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | |||
U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | |||
MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowODENMAsGA1UEChMESUVURjERMA8G | MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowODENMAsGA1UEChMESUVURjERMA8G | |||
A1UECxMITEFNUFMgV0cxFDASBgNVBAMTC0JvYiBCYWJiYWdlMIIBIjANBgkqhkiG | A1UECxMITEFNUFMgV0cxFDASBgNVBAMTC0JvYiBCYWJiYWdlMIIBIjANBgkqhkiG | |||
9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5nAF0glRof9NjBKke6g+7RLrOgRfwQjcH+2z | 9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5nAF0glRof9NjBKke6g+7RLrOgRfwQjcH+2z | |||
m0Af67FJRNrEwTuOutlWamUA3p9+wb7XqizVHOQhVesjwgp8PJpo8Adm8ar84d2t | m0Af67FJRNrEwTuOutlWamUA3p9+wb7XqizVHOQhVesjwgp8PJpo8Adm8ar84d2t | |||
tey1OVdxaCJuNe7SJjfrwShB6NvAm7S8CDG3+EapkO9fzn2pWwaREQ6twWtHi1QT | tey1OVdxaCJuNe7SJjfrwShB6NvAm7S8CDG3+EapkO9fzn2pWwaREQ6twWtHi1QT | |||
51PduRtiQ1oqsuJk8LBDgUMZlKUsaXfF8GKzJlGuaLRl5/3Kfr9+b6VkCDuxTZYL | 51PduRtiQ1oqsuJk8LBDgUMZlKUsaXfF8GKzJlGuaLRl5/3Kfr9+b6VkCDuxTZYL | |||
skipping to change at line 540 ¶ | skipping to change at line 646 ¶ | |||
6gKcHED5p+bUhDyIH2fy9hGyeOUs8nvi+7/HwBipN+nA/PfsPn+aU4l1K6qDoG/i | 6gKcHED5p+bUhDyIH2fy9hGyeOUs8nvi+7/HwBipN+nA/PfsPn+aU4l1K6qDoG/i | |||
kwyuiWcFFlc5yE5rkAe2J0/a4+HtzNmTK4jB/4GbyI6xlUszPlEqKE+Es10Xut/y | kwyuiWcFFlc5yE5rkAe2J0/a4+HtzNmTK4jB/4GbyI6xlUszPlEqKE+Es10Xut/y | |||
UWL5nKKaqpRRd07Pq371MpFQs2+zXt4fGheKzZU3XXrIPcAPyJjWiyU1DzpqgSJM | UWL5nKKaqpRRd07Pq371MpFQs2+zXt4fGheKzZU3XXrIPcAPyJjWiyU1DzpqgSJM | |||
OIp/HtXdFscHb9+Qic8= | OIp/HtXdFscHb9+Qic8= | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="bob-sign-key" numbered="true" toc="default"> | <section anchor="bob-sign-key" numbered="true" toc="default"> | |||
<name>Bob's Signing Private Key Material</name> | <name>Bob's Signing Private Key Material</name> | |||
<t>This private key material is used by Bob to create signatures.</t> | <t>This private key material is used by Bob to create signatures.</t> | |||
<sourcecode type="application/x-pem-file" name="bob.sign.key"><![CDATA[ | <sourcecode type="pkcs8" name="bob.sign.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MIIE+wIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDmcAXSCVGh/02M | MIIE+wIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDmcAXSCVGh/02M | |||
EqR7qD7tEus6BF/BCNwf7bObQB/rsUlE2sTBO4662VZqZQDen37BvteqLNUc5CFV | EqR7qD7tEus6BF/BCNwf7bObQB/rsUlE2sTBO4662VZqZQDen37BvteqLNUc5CFV | |||
6yPCCnw8mmjwB2bxqvzh3a217LU5V3FoIm417tImN+vBKEHo28CbtLwIMbf4RqmQ | 6yPCCnw8mmjwB2bxqvzh3a217LU5V3FoIm417tImN+vBKEHo28CbtLwIMbf4RqmQ | |||
71/OfalbBpERDq3Ba0eLVBPnU925G2JDWiqy4mTwsEOBQxmUpSxpd8XwYrMmUa5o | 71/OfalbBpERDq3Ba0eLVBPnU925G2JDWiqy4mTwsEOBQxmUpSxpd8XwYrMmUa5o | |||
tGXn/cp+v35vpWQIO7FNlgtnG3r5rf9CRoLcj2bbKA+5u0cUkHk/n6zxuhE5IqbU | tGXn/cp+v35vpWQIO7FNlgtnG3r5rf9CRoLcj2bbKA+5u0cUkHk/n6zxuhE5IqbU | |||
4HWCwujDx4X1Ls61wYZ6ihkmIlRAJHXg1pTlsjJ8oRlXZhK1fB3O2gQknZ9FREgr | 4HWCwujDx4X1Ls61wYZ6ihkmIlRAJHXg1pTlsjJ8oRlXZhK1fB3O2gQknZ9FREgr | |||
7xifCUHdAgMBAAECggEABcQg1fTtieZ+O/aNdU149NK0qx97GLTBjIguQEDDBVFK | 7xifCUHdAgMBAAECggEABcQg1fTtieZ+O/aNdU149NK0qx97GLTBjIguQEDDBVFK | |||
2lu4PhBg9AdgAUqLH1PE+eq65JaGZwvFH8X1Ms2AKiRzYsPOQIoJ4n1hc69uiEN9 | 2lu4PhBg9AdgAUqLH1PE+eq65JaGZwvFH8X1Ms2AKiRzYsPOQIoJ4n1hc69uiEN9 | |||
Ykcv4QHOvvqtCtWYjJyb5By9WPeLH6QynJ6FlBoSqxhURSWyYfTuwqt1OHEhsUuH | Ykcv4QHOvvqtCtWYjJyb5By9WPeLH6QynJ6FlBoSqxhURSWyYfTuwqt1OHEhsUuH | |||
skipping to change at line 571 ¶ | skipping to change at line 677 ¶ | |||
97HVWOig/tX6mOWg1yBsm+q9TKTrrvm1pRGlmE6BQgSYYy4r5O4u3VlnYwKBgQCl | 97HVWOig/tX6mOWg1yBsm+q9TKTrrvm1pRGlmE6BQgSYYy4r5O4u3VlnYwKBgQCl | |||
B4FvWyDhTVQHwaAfHUg3av/k+T++KSg6gVKJF1Nw1x8ZW5kvnbJC3pAlgTnyZFyK | B4FvWyDhTVQHwaAfHUg3av/k+T++KSg6gVKJF1Nw1x8ZW5kvnbJC3pAlgTnyZFyK | |||
s5n5iwI1VZEtDbKTt1kqKCp8tqAV9p9AYWQKrgzxUJsOuUWcZc+X3aWEf87IIpNE | s5n5iwI1VZEtDbKTt1kqKCp8tqAV9p9AYWQKrgzxUJsOuUWcZc+X3aWEf87IIpNE | |||
iQKfXiZaquZ23T2tKvsoZz8nqg9x7U8hG3uYLV26HQKBgCOJ/C21yW25NwZ5FUdh | iQKfXiZaquZ23T2tKvsoZz8nqg9x7U8hG3uYLV26HQKBgCOJ/C21yW25NwZ5FUdh | |||
PsQmVH7+YydJaLzHS/c7PrOgQFRMdejvAku/eYJbKbUv7qsJFIG4i/IG0CfVmu/B | PsQmVH7+YydJaLzHS/c7PrOgQFRMdejvAku/eYJbKbUv7qsJFIG4i/IG0CfVmu/B | |||
ax5fbfYZtoB/0zxWaLkIEStVWaKrSKRdTrNzTAOreeJKsY4RNp6rvmpgojbmIGA1 | ax5fbfYZtoB/0zxWaLkIEStVWaKrSKRdTrNzTAOreeJKsY4RNp6rvmpgojbmIGA1 | |||
Tg8Mup0xQ8F4d28rtUeynHxzoDswOQYKKwYBBAGSCBIIATErMCkGCWCGSAFlAwQC | Tg8Mup0xQ8F4d28rtUeynHxzoDswOQYKKwYBBAGSCBIIATErMCkGCWCGSAFlAwQC | |||
AgQc9K+qy7VHPzYOBqwy4AGI/kFzrhXJm88EOouPbg== | AgQc9K+qy7VHPzYOBqwy4AGI/kFzrhXJm88EOouPbg== | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key was generated using provable prime generation found i | <t>This secret key was generated using provable prime generation found | |||
n <xref target="FIPS186-4" format="default"/> using the seed <tt>f4afaacbb5473f3 | in <xref target="FIPS186-4" format="default"/> using the seed | |||
60e06ac32e00188fe4173ae15c99bcf043a8b8f6e</tt>. | <tt>f4afaacbb5473f360e06ac32e00188fe4173ae15c99bcf043a8b8f6e</tt>. | |||
This seed is the first 224 bits of the <xref target="SHA256" format="default"/> | This seed is the first 224 bits of the SHA-256 (<xref target="SHA" | |||
digest of the string <tt>draft-lamps-sample-certs-keygen.bob.sign.seed</tt>.</t> | format="default"/>) digest of the string | |||
<tt>draft-lamps-sample-certs-keygen.bob.sign.seed</tt>.</t> | ||||
</section> | </section> | |||
<section anchor="bob-encrypt-cert" numbered="true" toc="default"> | <section anchor="bob-encrypt-cert" numbered="true" toc="default"> | |||
<name>Bob's Encryption End-Entity Certificate</name> | <name>Bob's Encryption End-Entity Certificate</name> | |||
<t>This certificate is used to encrypt messages to Bob.</t> | <t>This certificate is used to encrypt messages to Bob.</t> | |||
<sourcecode type="application/x-pem-file" name="bob.encrypt.crt"><![CDAT A[ | <sourcecode type="x509" name="bob.encrypt.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIIDyjCCArKgAwIBAgITMHxHQA+GJjocYtLrgy+WwNeGlDANBgkqhkiG9w0BAQ0F | MIIDyjCCArKgAwIBAgITMHxHQA+GJjocYtLrgy+WwNeGlDANBgkqhkiG9w0BAQ0F | |||
ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | |||
U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0xOTEx | |||
MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowODENMAsGA1UEChMESUVURjERMA8G | MjAwNjU0MThaGA8yMDUyMDkyNzA2NTQxOFowODENMAsGA1UEChMESUVURjERMA8G | |||
A1UECxMITEFNUFMgV0cxFDASBgNVBAMTC0JvYiBCYWJiYWdlMIIBIjANBgkqhkiG | A1UECxMITEFNUFMgV0cxFDASBgNVBAMTC0JvYiBCYWJiYWdlMIIBIjANBgkqhkiG | |||
9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqtHAlBNMiBIk8iJqwHk/yDoFWwj8P9Z1uYdq | 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqtHAlBNMiBIk8iJqwHk/yDoFWwj8P9Z1uYdq | |||
1aqIuofvjoAyjdA8TbsBRGdmvaIOSQOepsNjW1ko7lE8HlDs9JHn1E+tzH3mKfn+ | 1aqIuofvjoAyjdA8TbsBRGdmvaIOSQOepsNjW1ko7lE8HlDs9JHn1E+tzH3mKfn+ | |||
G2erY+alkMJTXPvMAUdCA8+e1OJ7k91gYXDpzIWrP3Kc0xTlsJ8tGJ6mhydJX3wP | G2erY+alkMJTXPvMAUdCA8+e1OJ7k91gYXDpzIWrP3Kc0xTlsJ8tGJ6mhydJX3wP | |||
0/HuyHpfKQQfDusPH8S5yidPciWuB7Wj0X4xY1pUAz2rSSAlnGvhEzKFbW43BPjY | 0/HuyHpfKQQfDusPH8S5yidPciWuB7Wj0X4xY1pUAz2rSSAlnGvhEzKFbW43BPjY | |||
skipping to change at line 606 ¶ | skipping to change at line 716 ¶ | |||
Ixvvt7gzvSTpe+NUT1i09xNgsC8v19WB/BwkqMAgDqMxqCxT4fyrvVwpxNBke75j | Ixvvt7gzvSTpe+NUT1i09xNgsC8v19WB/BwkqMAgDqMxqCxT4fyrvVwpxNBke75j | |||
E6Q3xCjfdOWYcfMLK7EsTSgimYuonZjN7v/yqTdjn/iVH+agL/2MlSfiU36w/Yf1 | E6Q3xCjfdOWYcfMLK7EsTSgimYuonZjN7v/yqTdjn/iVH+agL/2MlSfiU36w/Yf1 | |||
7EM09uKGH/Javh+2Vjd0j8rE/q2Iaac5VI91M6xz5oDZUknycBKKinR+nJWMt5AK | 7EM09uKGH/Javh+2Vjd0j8rE/q2Iaac5VI91M6xz5oDZUknycBKKinR+nJWMt5AK | |||
UAaL2Mjl3YtrUGBpxxY= | UAaL2Mjl3YtrUGBpxxY= | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="bob-decrypt-key" numbered="true" toc="default"> | <section anchor="bob-decrypt-key" numbered="true" toc="default"> | |||
<name>Bob's Decryption Private Key Material</name> | <name>Bob's Decryption Private Key Material</name> | |||
<t>This private key material is used by Bob to decrypt messages.</t> | <t>This private key material is used by Bob to decrypt messages.</t> | |||
<sourcecode type="application/x-pem-file" name="bob.encrypt.key"><![CDAT A[ | <sourcecode type="pkcs8" name="bob.encrypt.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MIIE/AIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCq0cCUE0yIEiTy | MIIE/AIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCq0cCUE0yIEiTy | |||
ImrAeT/IOgVbCPw/1nW5h2rVqoi6h++OgDKN0DxNuwFEZ2a9og5JA56mw2NbWSju | ImrAeT/IOgVbCPw/1nW5h2rVqoi6h++OgDKN0DxNuwFEZ2a9og5JA56mw2NbWSju | |||
UTweUOz0kefUT63MfeYp+f4bZ6tj5qWQwlNc+8wBR0IDz57U4nuT3WBhcOnMhas/ | UTweUOz0kefUT63MfeYp+f4bZ6tj5qWQwlNc+8wBR0IDz57U4nuT3WBhcOnMhas/ | |||
cpzTFOWwny0YnqaHJ0lffA/T8e7Iel8pBB8O6w8fxLnKJ09yJa4HtaPRfjFjWlQD | cpzTFOWwny0YnqaHJ0lffA/T8e7Iel8pBB8O6w8fxLnKJ09yJa4HtaPRfjFjWlQD | |||
PatJICWca+ETMoVtbjcE+Nhc9SdFYy1cXJrV2OroRv0z+SVuF1mF4MsuyMtRJdhT | PatJICWca+ETMoVtbjcE+Nhc9SdFYy1cXJrV2OroRv0z+SVuF1mF4MsuyMtRJdhT | |||
vSv1VcYz+pyN382FZimEJ4FyqzBozmZcth2bSYWaqh5wXraZQTQOI12HApO2d593 | vSv1VcYz+pyN382FZimEJ4FyqzBozmZcth2bSYWaqh5wXraZQTQOI12HApO2d593 | |||
RyWX4PcVAgMBAAECggEAEvPt6aAQjEJzHfiKnqt1U7p4UKb5Ef4yFrE7PdTLkeK2 | RyWX4PcVAgMBAAECggEAEvPt6aAQjEJzHfiKnqt1U7p4UKb5Ef4yFrE7PdTLkeK2 | |||
RjncIhb6MeevVs8gO6co7Zn8tuUT95U3cOXLhVOWTvaHYeurTXaknICz3IeOoSl8 | RjncIhb6MeevVs8gO6co7Zn8tuUT95U3cOXLhVOWTvaHYeurTXaknICz3IeOoSl8 | |||
skiVZko70uJ8pR6asWUlr/zOjlEwZ7RnEUWet97oM0YeA07LDFDkF7eUq//6bfzT | skiVZko70uJ8pR6asWUlr/zOjlEwZ7RnEUWet97oM0YeA07LDFDkF7eUq//6bfzT | |||
skipping to change at line 637 ¶ | skipping to change at line 747 ¶ | |||
wKOQvjycMhs3FpXn0arjCczS2wGSgPGEpUR4JJhcpfaF6kphZsWDWzVlAQKBgQC2 | wKOQvjycMhs3FpXn0arjCczS2wGSgPGEpUR4JJhcpfaF6kphZsWDWzVlAQKBgQC2 | |||
ivbKltNhj4w2q1m7EGC3F5bzl5jOI1QTKQXYbspM8zwz6KuFR3+l+Wvlt30ncJ9u | ivbKltNhj4w2q1m7EGC3F5bzl5jOI1QTKQXYbspM8zwz6KuFR3+l+Wvlt30ncJ9u | |||
dOXFU7gCdBeMotTBA7uBVUxZOtKQyl9bTorNU1wNn1zNnJbETDLi1WH9zCdkrTIC | dOXFU7gCdBeMotTBA7uBVUxZOtKQyl9bTorNU1wNn1zNnJbETDLi1WH9zCdkrTIC | |||
PtFK67WQ6yMFdWzC1gEy5YjzRjbTe/rukbP5weH1uQKBgQC+WfachEmQ3NcxSjbR | PtFK67WQ6yMFdWzC1gEy5YjzRjbTe/rukbP5weH1uQKBgQC+WfachEmQ3NcxSjbR | |||
kUxCcida8REewWh4AldU8U0gFcFxF6YwQI8I7ujtnCK2RKTECG9HCyaDXgMwfArV | kUxCcida8REewWh4AldU8U0gFcFxF6YwQI8I7ujtnCK2RKTECG9HCyaDXgMwfArV | |||
zf17a9xDJL2LQKrJ9ATeSo34o9zIkpbJL0NCHHocOqYdHU+VO2ZE4Gu8DKk3siVH | zf17a9xDJL2LQKrJ9ATeSo34o9zIkpbJL0NCHHocOqYdHU+VO2ZE4Gu8DKk3siVH | |||
XAaJ/RJSEqAIMOgwfGuHOhhto6A7MDkGCisGAQQBkggSCAExKzApBglghkgBZQME | XAaJ/RJSEqAIMOgwfGuHOhhto6A7MDkGCisGAQQBkggSCAExKzApBglghkgBZQME | |||
AgIEHJjImYZSlYkp6InjQZ87/Q7f4KyhXaMGDe34oeg= | AgIEHJjImYZSlYkp6InjQZ87/Q7f4KyhXaMGDe34oeg= | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key was generated using provable prime generation found i | <t>This secret key was generated using provable prime generation found | |||
n <xref target="FIPS186-4" format="default"/> using the seed <tt>98c899865295892 | in <xref target="FIPS186-4" format="default"/> using the seed | |||
9e889e3419f3bfd0edfe0aca15da3060dedf8a1e8</tt>. | <tt>98c8998652958929e889e3419f3bfd0edfe0aca15da3060dedf8a1e8</tt>. | |||
This seed is the first 224 bits of the <xref target="SHA256" format="default"/> | This seed is the first 224 bits of the SHA-256 (<xref target="SHA" | |||
digest of the string <tt>draft-lamps-sample-certs-keygen.bob.encrypt.seed</tt>.< | format="default"/>) digest of the string | |||
/t> | <tt>draft-lamps-sample-certs-keygen.bob.encrypt.seed</tt>.</t> | |||
</section> | </section> | |||
<section anchor="pkcs12-object-for-bob" numbered="true" toc="default"> | <section anchor="pkcs12-object-for-bob" numbered="true" toc="default"> | |||
<name>PKCS12 Object for Bob</name> | <name>PKCS #12 Object for Bob</name> | |||
<t>This PKCS12 (<xref target="RFC7292" format="default"/>) object contai | <t>This PKCS #12 (<xref target="RFC7292" format="default"/>) object cont | |||
ns the same information as presented in <xref target="bob-verify-cert" format="d | ains the same information as presented in Sections <xref target="rsa-ca-cross-ce | |||
efault"/>, <xref target="bob-sign-key" format="default"/>, <xref target="bob-enc | rt" format="counter"/>, <xref target="bob-verify-cert" format="counter"/>, <xref | |||
rypt-cert" format="default"/>, <xref target="bob-decrypt-key" format="default"/> | target="bob-sign-key" format="counter"/>, <xref target="bob-encrypt-cert" forma | |||
, and <xref target="rsa-ca-cross-cert" format="default"/>.</t> | t="counter"/>, and <xref target="bob-decrypt-key" format="counter"/>. | |||
</t> | ||||
<t>It is locked with the simple three-letter password <tt>bob</tt>.</t> | <t>It is locked with the simple three-letter password <tt>bob</tt>.</t> | |||
<sourcecode type="application/x-pem-file" name="bob.p12"><![CDATA[ | <sourcecode type="pkcs12" name="bob.p12"><![CDATA[ | |||
-----BEGIN PKCS12----- | -----BEGIN PKCS12----- | |||
MIIX6AIBAzCCF7AGCSqGSIb3DQEHAaCCF6EEghedMIIXmTCCBIcGCSqGSIb3DQEH | MIIX6AIBAzCCF7AGCSqGSIb3DQEHAaCCF6EEghedMIIXmTCCBIcGCSqGSIb3DQEH | |||
BqCCBHgwggR0AgEAMIIEbQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQMwDgQIe/d6 | BqCCBHgwggR0AgEAMIIEbQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQMwDgQIe/d6 | |||
qDQ/28QCAhQGgIIEQJKA5kzRVm9d6rEwC/0RyBSgpPuSROUQTjspt6EhBZlgHc3u | qDQ/28QCAhQGgIIEQJKA5kzRVm9d6rEwC/0RyBSgpPuSROUQTjspt6EhBZlgHc3u | |||
FTCPaO5P/vpeWaCnBRarGFn3DmqA3JT+59bmRpGdiP3Zrlk2EbHi0yrd2P3UFDnX | FTCPaO5P/vpeWaCnBRarGFn3DmqA3JT+59bmRpGdiP3Zrlk2EbHi0yrd2P3UFDnX | |||
qRkkI+7pf6eOHWJRntJA+KJS8v3tZ/hpiEKAEav/Mq0IFNFyEiZpCkbKCX5auDb1 | qRkkI+7pf6eOHWJRntJA+KJS8v3tZ/hpiEKAEav/Mq0IFNFyEiZpCkbKCX5auDb1 | |||
p5c3J2MNg/WNBfpGJUHKVIzuIF3H+8LfFgayRsDsppoUMffR+GmdL8nxLiqhraHD | p5c3J2MNg/WNBfpGJUHKVIzuIF3H+8LfFgayRsDsppoUMffR+GmdL8nxLiqhraHD | |||
+Iqr3LpEroNi/iZQWUTFTUlaePf/2KMqaHOuy41IVvcH1jIcLXHGNa66S8AP/Hj2 | +Iqr3LpEroNi/iZQWUTFTUlaePf/2KMqaHOuy41IVvcH1jIcLXHGNa66S8AP/Hj2 | |||
TJPPg/lve76DVaGdEnx4QJd4pBFQac90zmhxU1HZrvzubK9t4e5lr80wpd2djvZK | TJPPg/lve76DVaGdEnx4QJd4pBFQac90zmhxU1HZrvzubK9t4e5lr80wpd2djvZK | |||
wSLzUgtQZXq8pSs1r85vrb3KItdYGF6SZpX029FS7rY3uYth5SYVUQWdUYYY3S0/ | wSLzUgtQZXq8pSs1r85vrb3KItdYGF6SZpX029FS7rY3uYth5SYVUQWdUYYY3S0/ | |||
skipping to change at line 781 ¶ | skipping to change at line 896 ¶ | |||
gogzwwSaGwx9n/o6czE8MBUGCSqGSIb3DQEJFDEIHgYAYgBvAGIwIwYJKoZIhvcN | gogzwwSaGwx9n/o6czE8MBUGCSqGSIb3DQEJFDEIHgYAYgBvAGIwIwYJKoZIhvcN | |||
AQkVMRYEFBfFhHvQp+92kDi4s28IvJK1niuUMC8wHzAHBgUrDgMCGgQUgwafFeGU | AQkVMRYEFBfFhHvQp+92kDi4s28IvJK1niuUMC8wHzAHBgUrDgMCGgQUgwafFeGU | |||
n9Q1rAOUCgw+KWxk+8EECJ1vqXe6ro0FAgIoAA== | n9Q1rAOUCgw+KWxk+8EECJ1vqXe6ro0FAgIoAA== | |||
-----END PKCS12----- | -----END PKCS12----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="sample-ed25519-ca" numbered="true" toc="default"> | <section anchor="sample-ed25519-ca" numbered="true" toc="default"> | |||
<name>Example Ed25519 Certification Authority</name> | <name>Example Ed25519 Certification Authority</name> | |||
<t>The example Ed25519 Certification Authority has the following informati on:</t> | <t>The example Ed25519 Certification Authority has the following informati on:</t> | |||
<ul spacing="normal"> | <dl> | |||
<li>Name: <tt>Sample LAMPS Ed25519 Certification Authority</tt></li> | <dt>Name: | |||
</ul> | </dt> | |||
<dd><tt>Sample LAMPS Ed25519 Certification Authority</tt> | ||||
</dd> | ||||
</dl> | ||||
<section anchor="ed25519-ca-cert" numbered="true" toc="default"> | <section anchor="ed25519-ca-cert" numbered="true" toc="default"> | |||
<name>Ed25519 Certification Authority Root Certificate</name> | <name>Ed25519 Certification Authority Root Certificate</name> | |||
<t>This certificate is used to verify certificates issued by the example Ed25519 Certification Authority.</t> | <t>This certificate is used to verify certificates issued by the example Ed25519 Certification Authority.</t> | |||
<sourcecode type="application/x-x509-ca-cert" name="ca.25519.crt"><![CDA TA[ | <sourcecode type="x509" name="ca.25519.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIIBtzCCAWmgAwIBAgITH59R65FuWGNFHoyc0N3iWesrXzAFBgMrZXAwWTENMAsG | MIIBtzCCAWmgAwIBAgITH59R65FuWGNFHoyc0N3iWesrXzAFBgMrZXAwWTENMAsG | |||
A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | |||
QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | |||
MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjBZMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjBZMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | |||
EwhMQU1QUyBXRzE1MDMGA1UEAxMsU2FtcGxlIExBTVBTIEVkMjU1MTkgQ2VydGlm | EwhMQU1QUyBXRzE1MDMGA1UEAxMsU2FtcGxlIExBTVBTIEVkMjU1MTkgQ2VydGlm | |||
aWNhdGlvbiBBdXRob3JpdHkwKjAFBgMrZXADIQCEgUZ9yI/rkX/82DihqzVIZQZ+ | aWNhdGlvbiBBdXRob3JpdHkwKjAFBgMrZXADIQCEgUZ9yI/rkX/82DihqzVIZQZ+ | |||
RKE3URyp+eN2TxJDBKNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC | RKE3URyp+eN2TxJDBKNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC | |||
AQYwHQYDVR0OBBYEFGuilX26FJvkLQTRB6TRguQua4y1MAUGAytlcANBAFAJrlWo | AQYwHQYDVR0OBBYEFGuilX26FJvkLQTRB6TRguQua4y1MAUGAytlcANBAFAJrlWo | |||
QjzwT0ph7rXe023x3GaLPMXMwQI2Of+apkdG2mH9ID6PE1bu3gRRqIH5w2tyS+xF | QjzwT0ph7rXe023x3GaLPMXMwQI2Of+apkdG2mH9ID6PE1bu3gRRqIH5w2tyS+xF | |||
Jw0ouxcJyAyXEQ4= | Jw0ouxcJyAyXEQ4= | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="ed25519-certification-authority-secret-key" numbered="tru e" toc="default"> | <section anchor="ed25519-certification-authority-secret-key" numbered="tru e" toc="default"> | |||
<name>Ed25519 Certification Authority Secret Key</name> | <name>Ed25519 Certification Authority Secret Key</name> | |||
<t>This secret key material is used by the example Ed25519 Certification Authority to issue new certificates.</t> | <t>This secret key material is used by the example Ed25519 Certification Authority to issue new certificates.</t> | |||
<sourcecode type="application/x-pem-file" name="ca.25519.key"><![CDATA[ | <sourcecode type="pkcs8" name="ca.25519.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MC4CAQAwBQYDK2VwBCIEIAt889xRDvxNT8ak53T7tzKuSn6CQDe8fIdjrCiSFRcp | MC4CAQAwBQYDK2VwBCIEIAt889xRDvxNT8ak53T7tzKuSn6CQDe8fIdjrCiSFRcp | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key is the <xref target="SHA256" format="default"/> diges | <t>This secret key is the SHA-256 (<xref target="SHA" | |||
t of the ASCII string <tt>draft-lamps-sample-certs-keygen.ca.25519.seed</tt>.</t | format="default"/>) digest of the ASCII string | |||
> | <tt>draft-lamps-sample-certs-keygen.ca.25519.seed</tt>.</t> | |||
</section> | </section> | |||
<section anchor="ed25519-ca-cross-cert" numbered="true" toc="default"> | <section anchor="ed25519-ca-cross-cert" numbered="true" toc="default"> | |||
<name>Ed25519 Certification Authority Cross-signed Certificate</name> | <name>Ed25519 Certification Authority Cross-Signed Certificate</name> | |||
<t>If an e-mail client only trusts the RSA Certification Authority Root | <t>If an email client only trusts the RSA Certification Authority Root C | |||
Certificate found in <xref target="rsa-ca-cert" format="default"/>, they can use | ertificate found in <xref target="rsa-ca-cert" format="default"/>, they can use | |||
this intermediate CA certificate to verify any end entity certificate issued by | this intermediate CA certificate to verify any end-entity certificate issued by | |||
the example Ed25519 Certification Authority.</t> | the example Ed25519 Certification Authority.</t> | |||
<sourcecode type="application/x-x509-ca-cert" name="ca.25519.cross.crt"> | <sourcecode type="x509" name="ca.25519.cross.crt"><![CDATA[ | |||
<![CDATA[ | ||||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIICvzCCAaegAwIBAgITR49T5oAgYhF5+eBYQ3ZBZIMuujANBgkqhkiG9w0BAQsF | MIICvzCCAaegAwIBAgITR49T5oAgYhF5+eBYQ3ZBZIMuujANBgkqhkiG9w0BAQsF | |||
ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | |||
U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0yMDEy | U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0yMDEy | |||
MTUyMTM1NDRaGA8yMDUyMDkyNzA2NTQxOFowWTENMAsGA1UEChMESUVURjERMA8G | MTUyMTM1NDRaGA8yMDUyMDkyNzA2NTQxOFowWTENMAsGA1UEChMESUVURjERMA8G | |||
A1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBMQU1QUyBFZDI1NTE5IENl | A1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBMQU1QUyBFZDI1NTE5IENl | |||
cnRpZmljYXRpb24gQXV0aG9yaXR5MCowBQYDK2VwAyEAhIFGfciP65F//Ng4oas1 | cnRpZmljYXRpb24gQXV0aG9yaXR5MCowBQYDK2VwAyEAhIFGfciP65F//Ng4oas1 | |||
SGUGfkShN1Ecqfnjdk8SQwSjfDB6MA8GA1UdEwEB/wQFMAMBAf8wFwYDVR0gBBAw | SGUGfkShN1Ecqfnjdk8SQwSjfDB6MA8GA1UdEwEB/wQFMAMBAf8wFwYDVR0gBBAw | |||
DjAMBgpghkgBZQMCATACMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUa6KVfboU | DjAMBgpghkgBZQMCATACMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUa6KVfboU | |||
m+QtBNEHpNGC5C5rjLUwHwYDVR0jBBgwFoAUkTCOfAcXDKfxCShlNhpnHGh29Fkw | m+QtBNEHpNGC5C5rjLUwHwYDVR0jBBgwFoAUkTCOfAcXDKfxCShlNhpnHGh29Fkw | |||
skipping to change at line 839 ¶ | skipping to change at line 960 ¶ | |||
VCk03DFE3Qt4w9mlv9yuMse33nmsBGXog/XZvM2JRY0iKt0xksQqQD9uYm7MoMeH | VCk03DFE3Qt4w9mlv9yuMse33nmsBGXog/XZvM2JRY0iKt0xksQqQD9uYm7MoMeH | |||
qQs3Ot7EaoPj54xyWvy42run6TLUye64D94SNjB/q/wjL96bsVIKGrRn10T1ybCh | qQs3Ot7EaoPj54xyWvy42run6TLUye64D94SNjB/q/wjL96bsVIKGrRn10T1ybCh | |||
4F5HD00hQZgP15Dlb1rg+vskN8MSk5nuD+6z1VsugioW0+k= | 4F5HD00hQZgP15Dlb1rg+vskN8MSk5nuD+6z1VsugioW0+k= | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="carloss-sample-certificates" numbered="true" toc="default"> | <section anchor="carloss-sample-certificates" numbered="true" toc="default"> | |||
<name>Carlos's Sample Certificates</name> | <name>Carlos's Sample Certificates</name> | |||
<t>Carlos has the following information:</t> | <t>Carlos has the following information:</t> | |||
<ul spacing="normal"> | ||||
<li>Name: <tt>Carlos Turing</tt></li> | <dl> | |||
<li>E-mail Address: <tt>carlos@smime.example</tt></li> | <dt>Name: | |||
</ul> | </dt> | |||
<dd><tt>Carlos Turing</tt> | ||||
</dd> | ||||
<dt>Email Address: | ||||
</dt> | ||||
<dd><tt>carlos@smime.example</tt> | ||||
</dd> | ||||
</dl> | ||||
<section anchor="carlos-verify-cert" numbered="true" toc="default"> | <section anchor="carlos-verify-cert" numbered="true" toc="default"> | |||
<name>Carlos's Signature Verification End-Entity Certificate</name> | <name>Carlos's Signature Verification End-Entity Certificate</name> | |||
<t>This certificate is used for verification of signatures made by Carlo s.</t> | <t>This certificate is used for verification of signatures made by Carlo s.</t> | |||
<sourcecode type="application/x-pem-file" name="carlos.sign.crt"><![CDAT A[ | <sourcecode type="x509" name="carlos.sign.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIICBzCCAbmgAwIBAgITP14fVCTRtAFDeA9zwYoXhR52ljAFBgMrZXAwWTENMAsG | MIICBzCCAbmgAwIBAgITP14fVCTRtAFDeA9zwYoXhR52ljAFBgMrZXAwWTENMAsG | |||
A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | |||
QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | |||
MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjA6MQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjA6MQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | |||
EwhMQU1QUyBXRzEWMBQGA1UEAxMNQ2FybG9zIFR1cmluZzAqMAUGAytlcAMhAMLO | EwhMQU1QUyBXRzEWMBQGA1UEAxMNQ2FybG9zIFR1cmluZzAqMAUGAytlcAMhAMLO | |||
gDIs3mHITYRNYO+RnOedrq5/HuQHXSPyAKaS98ito4GwMIGtMAwGA1UdEwEB/wQC | gDIs3mHITYRNYO+RnOedrq5/HuQHXSPyAKaS98ito4GwMIGtMAwGA1UdEwEB/wQC | |||
MAAwFwYDVR0gBBAwDjAMBgpghkgBZQMCATABMB8GA1UdEQQYMBaBFGNhcmxvc0Bz | MAAwFwYDVR0gBBAwDjAMBgpghkgBZQMCATABMB8GA1UdEQQYMBaBFGNhcmxvc0Bz | |||
bWltZS5leGFtcGxlMBMGA1UdJQQMMAoGCCsGAQUFBwMEMA4GA1UdDwEB/wQEAwIG | bWltZS5leGFtcGxlMBMGA1UdJQQMMAoGCCsGAQUFBwMEMA4GA1UdDwEB/wQEAwIG | |||
wDAdBgNVHQ4EFgQUZIXjO5wdWs3mC7oafwi+xJzMhD8wHwYDVR0jBBgwFoAUa6KV | wDAdBgNVHQ4EFgQUZIXjO5wdWs3mC7oafwi+xJzMhD8wHwYDVR0jBBgwFoAUa6KV | |||
fboUm+QtBNEHpNGC5C5rjLUwBQYDK2VwA0EAwVGQWbdy6FQIpTFsaWvG2/US2fnS | fboUm+QtBNEHpNGC5C5rjLUwBQYDK2VwA0EAwVGQWbdy6FQIpTFsaWvG2/US2fnS | |||
6B+BzgCrkGQKWX1WgkTj4MEOqL+0cFXLr7ZQ2DQUo2iXyTAu58BR6btcCQ== | 6B+BzgCrkGQKWX1WgkTj4MEOqL+0cFXLr7ZQ2DQUo2iXyTAu58BR6btcCQ== | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="carlos-sign-key" numbered="true" toc="default"> | <section anchor="carlos-sign-key" numbered="true" toc="default"> | |||
<name>Carlos's Signing Private Key Material</name> | <name>Carlos's Signing Private Key Material</name> | |||
<t>This private key material is used by Carlos to create signatures.</t> | <t>This private key material is used by Carlos to create signatures.</t> | |||
<sourcecode type="application/x-pem-file" name="carlos.sign.key"><![CDAT A[ | <sourcecode type="pkcs8" name="carlos.sign.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MC4CAQAwBQYDK2VwBCIEILvvxL741LfX+Ep3Iyye3Cjr4JmONIVYhZPM4M9N1IHY | MC4CAQAwBQYDK2VwBCIEILvvxL741LfX+Ep3Iyye3Cjr4JmONIVYhZPM4M9N1IHY | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key is the <xref target="SHA256" format="default"/> diges t of the ASCII string <tt>draft-lamps-sample-certs-keygen.carlos.sign.25519.seed </tt>.</t> | <t>This secret key is the SHA-256 (<xref target="SHA" format="default"/> ) digest of the ASCII string <tt>draft-lamps-sample-certs-keygen.carlos.sign.255 19.seed</tt>.</t> | |||
</section> | </section> | |||
<section anchor="carlos-encrypt-cert" numbered="true" toc="default"> | <section anchor="carlos-encrypt-cert" numbered="true" toc="default"> | |||
<name>Carlos's Encryption End-Entity Certificate</name> | <name>Carlos's Encryption End-Entity Certificate</name> | |||
<t>This certificate is used to encrypt messages to Carlos. | <t>This certificate is used to encrypt messages to Carlos. | |||
It contains an SMIMECapabilities extension to indicate that Carlos's MUA expects | ||||
ECDH with HKDF using SHA-256; uses AES-128 key wrap, as indicated in <xref targ | It contains an SMIMECapabilities extension to indicate that Carlos's MUA | |||
et="RFC8418" format="default"/>.</t> | expects Elliptic Curve Diffie-Hellman (ECDH) with the HMAC-based Key | |||
<sourcecode type="application/x-pem-file" name="carlos.encrypt.crt"><![C | Derivation Function (HKDF) using SHA-256, and that it uses the AES-128 key wrap | |||
DATA[ | algorithm, | |||
as indicated in <xref target="RFC8418" format="default"/>. | ||||
</t> | ||||
<sourcecode type="x509" name="carlos.encrypt.crt"><![CDATA[ | ||||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIICNDCCAeagAwIBAgITfz0Bv+b1OMAT79aCh3arViNvhDAFBgMrZXAwWTENMAsG | MIICNDCCAeagAwIBAgITfz0Bv+b1OMAT79aCh3arViNvhDAFBgMrZXAwWTENMAsG | |||
A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | |||
QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | |||
MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjA6MQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjA6MQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | |||
EwhMQU1QUyBXRzEWMBQGA1UEAxMNQ2FybG9zIFR1cmluZzAqMAUGAytlbgMhAC5o | EwhMQU1QUyBXRzEWMBQGA1UEAxMNQ2FybG9zIFR1cmluZzAqMAUGAytlbgMhAC5o | |||
MczTIMiddTUYTc/WymEqXw8hZm1QbIz2xX2gFDx0o4HdMIHaMCsGCSqGSIb3DQEJ | MczTIMiddTUYTc/WymEqXw8hZm1QbIz2xX2gFDx0o4HdMIHaMCsGCSqGSIb3DQEJ | |||
DwQeMBwwGgYLKoZIhvcNAQkQAxMwCwYJYIZIAWUDBAEFMAwGA1UdEwEB/wQCMAAw | DwQeMBwwGgYLKoZIhvcNAQkQAxMwCwYJYIZIAWUDBAEFMAwGA1UdEwEB/wQCMAAw | |||
FwYDVR0gBBAwDjAMBgpghkgBZQMCATABMB8GA1UdEQQYMBaBFGNhcmxvc0BzbWlt | FwYDVR0gBBAwDjAMBgpghkgBZQMCATABMB8GA1UdEQQYMBaBFGNhcmxvc0BzbWlt | |||
ZS5leGFtcGxlMBMGA1UdJQQMMAoGCCsGAQUFBwMEMA4GA1UdDwEB/wQEAwIDCDAd | ZS5leGFtcGxlMBMGA1UdJQQMMAoGCCsGAQUFBwMEMA4GA1UdDwEB/wQEAwIDCDAd | |||
BgNVHQ4EFgQUgSmg+iOgSyCMDXgA3u3aFss0JbkwHwYDVR0jBBgwFoAUa6KVfboU | BgNVHQ4EFgQUgSmg+iOgSyCMDXgA3u3aFss0JbkwHwYDVR0jBBgwFoAUa6KVfboU | |||
m+QtBNEHpNGC5C5rjLUwBQYDK2VwA0EAzss75UzFuADPfd4hQdo5jyAQ3GvkyyvI | m+QtBNEHpNGC5C5rjLUwBQYDK2VwA0EAzss75UzFuADPfd4hQdo5jyAQ3GvkyyvI | |||
BdBGnWtJ1eT1WuMaIMhi1rH4vPGPd9scwW+sqd9fG+pv3MShl+zKAQ== | BdBGnWtJ1eT1WuMaIMhi1rH4vPGPd9scwW+sqd9fG+pv3MShl+zKAQ== | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="carlos-decrypt-key" numbered="true" toc="default"> | <section anchor="carlos-decrypt-key" numbered="true" toc="default"> | |||
<name>Carlos's Decryption Private Key Material</name> | <name>Carlos's Decryption Private Key Material</name> | |||
<t>This private key material is used by Carlos to decrypt messages.</t> | <t>This private key material is used by Carlos to decrypt messages.</t> | |||
<sourcecode type="application/x-pem-file" name="carlos.encrypt.key"><![C DATA[ | <sourcecode type="pkcs8" name="carlos.encrypt.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MC4CAQAwBQYDK2VuBCIEIIH5782H/otrhLy9Dtvzt79ffsvpcVXgdUczTdUvSQsK | MC4CAQAwBQYDK2VuBCIEIIH5782H/otrhLy9Dtvzt79ffsvpcVXgdUczTdUvSQsK | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key is the <xref target="SHA256" format="default"/> diges | <t>This secret key is the SHA-256 (<xref target="SHA" | |||
t of the ASCII string <tt>draft-lamps-sample-certs-keygen.carlos.encrypt.25519.s | format="default"/>) digest of the ASCII string | |||
eed</tt>.</t> | <tt>draft-lamps-sample-certs-keygen.carlos.encrypt.25519.seed</tt>.</t> | |||
</section> | </section> | |||
<section anchor="pkcs12-object-for-carlos" numbered="true" toc="default"> | <section anchor="pkcs12-object-for-carlos" numbered="true" toc="default"> | |||
<name>PKCS12 Object for Carlos</name> | <name>PKCS #12 Object for Carlos</name> | |||
<t>This PKCS12 (<xref target="RFC7292" format="default"/>) object contai | <t>This PKCS #12 (<xref target="RFC7292" format="default"/>) object cont | |||
ns the same information as presented in <xref target="carlos-verify-cert" format | ains the same information as presented in Sections <xref target="ed25519-ca-cros | |||
="default"/>, <xref target="carlos-sign-key" format="default"/>, <xref target="c | s-cert" format="counter"/>, <xref target="carlos-verify-cert" format="counter"/> | |||
arlos-encrypt-cert" format="default"/>, <xref target="carlos-decrypt-key" format | , <xref target="carlos-sign-key" format="counter"/>, <xref target="carlos-encryp | |||
="default"/>, and <xref target="ed25519-ca-cross-cert" format="default"/>.</t> | t-cert" format="counter"/>, and <xref target="carlos-decrypt-key" format="counte | |||
r"/>. | ||||
</t> | ||||
<t>It is locked with the simple five-letter password <tt>carlos</tt>.</t > | <t>It is locked with the simple five-letter password <tt>carlos</tt>.</t > | |||
<sourcecode type="application/x-pem-file" name="carlos.p12"><![CDATA[ | <sourcecode type="pkcs12" name="carlos.p12"><![CDATA[ | |||
-----BEGIN PKCS12----- | -----BEGIN PKCS12----- | |||
MIIKzgIBAzCCCpYGCSqGSIb3DQEHAaCCCocEggqDMIIKfzCCAvcGCSqGSIb3DQEH | MIIKzgIBAzCCCpYGCSqGSIb3DQEHAaCCCocEggqDMIIKfzCCAvcGCSqGSIb3DQEH | |||
BqCCAugwggLkAgEAMIIC3QYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQMwDgQIwS3R | BqCCAugwggLkAgEAMIIC3QYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQMwDgQIwS3R | |||
pT1mkyMCAhS7gIICsGKkBm0nci9VHfqxOTWy/lkKyQeF5bwsF/9gZrqUym1KtHZF | pT1mkyMCAhS7gIICsGKkBm0nci9VHfqxOTWy/lkKyQeF5bwsF/9gZrqUym1KtHZF | |||
a4rSJIPUctmzqVnhGmfW9m+LEi7Em9rRmUIQbDZt4kQDG5eDk7AdhyDnB3uZDG1W | a4rSJIPUctmzqVnhGmfW9m+LEi7Em9rRmUIQbDZt4kQDG5eDk7AdhyDnB3uZDG1W | |||
4cAeUVXJMzGfnwtzy5TzBZzEo5nnVX74Al+PDW9wdpbv2TIriL0m29fBT+7HVS9F | 4cAeUVXJMzGfnwtzy5TzBZzEo5nnVX74Al+PDW9wdpbv2TIriL0m29fBT+7HVS9F | |||
Z/95XokSwbb6mmCYeGiPpNEaoeUeuU4zrh/k+JJqDuqNsU66I30wH0CFmk3aarBV | Z/95XokSwbb6mmCYeGiPpNEaoeUeuU4zrh/k+JJqDuqNsU66I30wH0CFmk3aarBV | |||
3LkEeCjKFkngzMOZqiKZu8D2hEUjsGQ9ALsRn7P+hIWNFIgjvqgcCMTF8fLK1C/8 | 3LkEeCjKFkngzMOZqiKZu8D2hEUjsGQ9ALsRn7P+hIWNFIgjvqgcCMTF8fLK1C/8 | |||
vYGD+HOpnn23nLele4b/qpFYx5kJ0bOK1Zo1SpgUQ7Bu6gectUceyOgi7CjRScuV | vYGD+HOpnn23nLele4b/qpFYx5kJ0bOK1Zo1SpgUQ7Bu6gectUceyOgi7CjRScuV | |||
ew7918ZY0ugyYoIWAT0kecPM0TFtxAn19JPXo4jBYAlwUtx7GYAlDkgZCb/0dbkv | ew7918ZY0ugyYoIWAT0kecPM0TFtxAn19JPXo4jBYAlwUtx7GYAlDkgZCb/0dbkv | |||
skipping to change at line 974 ¶ | skipping to change at line 1115 ¶ | |||
Fn7qHw06MDthnKniazFCMBsGCSqGSIb3DQEJFDEOHgwAYwBhAHIAbABvAHMwIwYJ | Fn7qHw06MDthnKniazFCMBsGCSqGSIb3DQEJFDEOHgwAYwBhAHIAbABvAHMwIwYJ | |||
KoZIhvcNAQkVMRYEFGSF4zucHVrN5gu6Gn8IvsSczIQ/MC8wHzAHBgUrDgMCGgQU | KoZIhvcNAQkVMRYEFGSF4zucHVrN5gu6Gn8IvsSczIQ/MC8wHzAHBgUrDgMCGgQU | |||
8nOYIWrnJVXEur957K5cCV3jx5cECJDjaZkfy4FnAgIoAA== | 8nOYIWrnJVXEur957K5cCV3jx5cECJDjaZkfy4FnAgIoAA== | |||
-----END PKCS12----- | -----END PKCS12----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="danas-sample-certificates" numbered="true" toc="default"> | <section anchor="danas-sample-certificates" numbered="true" toc="default"> | |||
<name>Dana's Sample Certificates</name> | <name>Dana's Sample Certificates</name> | |||
<t>Dana has the following information:</t> | <t>Dana has the following information:</t> | |||
<ul spacing="normal"> | <dl> | |||
<li>Name: <tt>Dana Hopper</tt></li> | <dt>Name: | |||
<li>E-mail Address: <tt>dna@smime.example</tt></li> | </dt> | |||
</ul> | <dd><tt>Dana Hopper</tt> | |||
<section anchor="dana-verify-cert" numbered="true" toc="default"> | </dd> | |||
<dt>Email Address: | ||||
</dt> | ||||
<dd><tt>dna@smime.example</tt> | ||||
</dd> | ||||
</dl> | ||||
<section anchor="dana-verify-cert" numbered="true" toc="default"> | ||||
<name>Dana's Signature Verification End-Entity Certificate</name> | <name>Dana's Signature Verification End-Entity Certificate</name> | |||
<t>This certificate is used for verification of signatures made by Dana. </t> | <t>This certificate is used for verification of signatures made by Dana. </t> | |||
<sourcecode type="application/x-pem-file" name="dana.sign.crt"><![CDATA[ | <sourcecode type="x509" name="dana.sign.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIICAzCCAbWgAwIBAgITaWZI+hVtn8pQZviAmPmBXzWfnjAFBgMrZXAwWTENMAsG | MIICAzCCAbWgAwIBAgITaWZI+hVtn8pQZviAmPmBXzWfnjAFBgMrZXAwWTENMAsG | |||
A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | |||
QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | |||
MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjA4MQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjA4MQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | |||
EwhMQU1QUyBXRzEUMBIGA1UEAxMLRGFuYSBIb3BwZXIwKjAFBgMrZXADIQCy2h3h | EwhMQU1QUyBXRzEUMBIGA1UEAxMLRGFuYSBIb3BwZXIwKjAFBgMrZXADIQCy2h3h | |||
hkaKDY67PuCuNLnnrQiHdSWYpPlgFsOif85vrqOBrjCBqzAMBgNVHRMBAf8EAjAA | hkaKDY67PuCuNLnnrQiHdSWYpPlgFsOif85vrqOBrjCBqzAMBgNVHRMBAf8EAjAA | |||
MBcGA1UdIAQQMA4wDAYKYIZIAWUDAgEwATAdBgNVHREEFjAUgRJkYW5hQHNtaW1l | MBcGA1UdIAQQMA4wDAYKYIZIAWUDAgEwATAdBgNVHREEFjAUgRJkYW5hQHNtaW1l | |||
LmV4YW1wbGUwEwYDVR0lBAwwCgYIKwYBBQUHAwQwDgYDVR0PAQH/BAQDAgbAMB0G | LmV4YW1wbGUwEwYDVR0lBAwwCgYIKwYBBQUHAwQwDgYDVR0PAQH/BAQDAgbAMB0G | |||
A1UdDgQWBBRIA4bBabh4ba7e88wGsDOsVzLdljAfBgNVHSMEGDAWgBRropV9uhSb | A1UdDgQWBBRIA4bBabh4ba7e88wGsDOsVzLdljAfBgNVHSMEGDAWgBRropV9uhSb | |||
5C0E0Qek0YLkLmuMtTAFBgMrZXADQQDpORBZitzXGYUjxnoKVLIcWL5xner97it5 | 5C0E0Qek0YLkLmuMtTAFBgMrZXADQQDpORBZitzXGYUjxnoKVLIcWL5xner97it5 | |||
VKxEf8E7AeAp96POPEu//2jXnh4qAT40ymW0wrqxU1NT8WW/dSgC | VKxEf8E7AeAp96POPEu//2jXnh4qAT40ymW0wrqxU1NT8WW/dSgC | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="dana-sign-key" numbered="true" toc="default"> | <section anchor="dana-sign-key" numbered="true" toc="default"> | |||
<name>Dana's Signing Private Key Material</name> | <name>Dana's Signing Private Key Material</name> | |||
<t>This private key material is used by Dana to create signatures.</t> | <t>This private key material is used by Dana to create signatures.</t> | |||
<sourcecode type="application/x-pem-file" name="dana.sign.key"><![CDATA[ | <sourcecode type="pkcs8" name="dana.sign.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MC4CAQAwBQYDK2VwBCIEINZ8GPfmQh2AMp+uNIsZMbzvyTOltwvEt13usjnUaW4N | MC4CAQAwBQYDK2VwBCIEINZ8GPfmQh2AMp+uNIsZMbzvyTOltwvEt13usjnUaW4N | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This secret key is the <xref target="SHA256" format="default"/> diges | <t>This secret key is the SHA-256 (<xref target="SHA" | |||
t of the ASCII string <tt>draft-lamps-sample-certs-keygen.dana.sign.25519.seed</ | format="default"/>) digest of the ASCII string | |||
tt>.</t> | <tt>draft-lamps-sample-certs-keygen.dana.sign.25519.seed</tt>.</t> | |||
</section> | </section> | |||
<section anchor="dana-encrypt-cert" numbered="true" toc="default"> | <section anchor="dana-encrypt-cert" numbered="true" toc="default"> | |||
<name>Dana's Encryption End-Entity Certificate</name> | <name>Dana's Encryption End-Entity Certificate</name> | |||
<t>This certificate is used to encrypt messages to Dana. | <t>This certificate is used to encrypt messages to Dana. It contains | |||
It contains an SMIMECapabilities extension to indicate that Dana's MUA expects E | an SMIMECapabilities extension to indicate that Dana's MUA expects | |||
CDH with HKDF using SHA-256; uses AES-128 key wrap, as indicated in <xref target | ECDH with HKDF using SHA-256, and that it uses the AES-128 key wrap algo | |||
="RFC8418" format="default"/>.</t> | rithm, as | |||
<sourcecode type="application/x-pem-file" name="dana.encrypt.crt"><![CDA | indicated in <xref target="RFC8418" format="default"/>.</t> | |||
TA[ | <sourcecode type="x509" name="dana.encrypt.crt"><![CDATA[ | |||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIICMDCCAeKgAwIBAgITDksKNqnvupyaO2gkjlIdwN7zpzAFBgMrZXAwWTENMAsG | MIICMDCCAeKgAwIBAgITDksKNqnvupyaO2gkjlIdwN7zpzAFBgMrZXAwWTENMAsG | |||
A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | A1UEChMESUVURjERMA8GA1UECxMITEFNUFMgV0cxNTAzBgNVBAMTLFNhbXBsZSBM | |||
QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | QU1QUyBFZDI1NTE5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MCAXDTIwMTIxNTIx | |||
MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjA4MQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | MzU0NFoYDzIwNTIxMjE1MjEzNTQ0WjA4MQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQL | |||
EwhMQU1QUyBXRzEUMBIGA1UEAxMLRGFuYSBIb3BwZXIwKjAFBgMrZW4DIQDgMaI2 | EwhMQU1QUyBXRzEUMBIGA1UEAxMLRGFuYSBIb3BwZXIwKjAFBgMrZW4DIQDgMaI2 | |||
AWkU9LG8CvaRHgDSEY9d72Y8ENZeMwibPugkVKOB2zCB2DArBgkqhkiG9w0BCQ8E | AWkU9LG8CvaRHgDSEY9d72Y8ENZeMwibPugkVKOB2zCB2DArBgkqhkiG9w0BCQ8E | |||
HjAcMBoGCyqGSIb3DQEJEAMTMAsGCWCGSAFlAwQBBTAMBgNVHRMBAf8EAjAAMBcG | HjAcMBoGCyqGSIb3DQEJEAMTMAsGCWCGSAFlAwQBBTAMBgNVHRMBAf8EAjAAMBcG | |||
A1UdIAQQMA4wDAYKYIZIAWUDAgEwATAdBgNVHREEFjAUgRJkYW5hQHNtaW1lLmV4 | A1UdIAQQMA4wDAYKYIZIAWUDAgEwATAdBgNVHREEFjAUgRJkYW5hQHNtaW1lLmV4 | |||
YW1wbGUwEwYDVR0lBAwwCgYIKwYBBQUHAwQwDgYDVR0PAQH/BAQDAgMIMB0GA1Ud | YW1wbGUwEwYDVR0lBAwwCgYIKwYBBQUHAwQwDgYDVR0PAQH/BAQDAgMIMB0GA1Ud | |||
DgQWBBSd303UBe+a7GCGvCdtBOnOWtyPpDAfBgNVHSMEGDAWgBRropV9uhSb5C0E | DgQWBBSd303UBe+a7GCGvCdtBOnOWtyPpDAfBgNVHSMEGDAWgBRropV9uhSb5C0E | |||
0Qek0YLkLmuMtTAFBgMrZXADQQD6f7DCCxXzpnY3BwmrIuf/SNQSf//Otri7USkd | 0Qek0YLkLmuMtTAFBgMrZXADQQD6f7DCCxXzpnY3BwmrIuf/SNQSf//Otri7USkd | |||
9GF+VthGS+9KJ4HTBCh0ZGuHIU9EgnfgdSL1UR3WUkL7tv8A | 9GF+VthGS+9KJ4HTBCh0ZGuHIU9EgnfgdSL1UR3WUkL7tv8A | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
<section anchor="dana-decrypt-key" numbered="true" toc="default"> | <section anchor="dana-decrypt-key" numbered="true" toc="default"> | |||
<name>Dana's Decryption Private Key Material</name> | <name>Dana's Decryption Private Key Material</name> | |||
<t>This private key material is used by Dana to decrypt messages.</t> | <t>This private key material is used by Dana to decrypt messages.</t> | |||
<sourcecode type="application/x-pem-file" name="dana.encrypt.key"><![CDA TA[ | <sourcecode type="pkcs8" name="dana.encrypt.key"><![CDATA[ | |||
-----BEGIN PRIVATE KEY----- | -----BEGIN PRIVATE KEY----- | |||
MC4CAQAwBQYDK2VuBCIEIGxZt8L7lY48OEq4gs/smQ4weDhRNMlYHG21StivPfz3 | MC4CAQAwBQYDK2VuBCIEIGxZt8L7lY48OEq4gs/smQ4weDhRNMlYHG21StivPfz3 | |||
-----END PRIVATE KEY----- | -----END PRIVATE KEY----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
<t>This seed is the <xref target="SHA256" format="default"/> digest of t he ASCII string <tt>draft-lamps-sample-certs-keygen.dana.encrypt.25519.seed</tt> .</t> | <t>This seed is the SHA-256 (<xref target="SHA" format="default"/>) dige st of the ASCII string <tt>draft-lamps-sample-certs-keygen.dana.encrypt.25519.se ed</tt>.</t> | |||
</section> | </section> | |||
<section anchor="pkcs12-object-for-dana" numbered="true" toc="default"> | <section anchor="pkcs12-object-for-dana" numbered="true" toc="default"> | |||
<name>PKCS12 Object for Dana</name> | <name>PKCS #12 Object for Dana</name> | |||
<t>This PKCS12 (<xref target="RFC7292" format="default"/>) object contai | <t>This PKCS #12 (<xref target="RFC7292" format="default"/>) object cont | |||
ns the same information as presented in <xref target="dana-verify-cert" format=" | ains the same information as presented in Sections <xref target="ed25519-ca-cros | |||
default"/>, <xref target="dana-sign-key" format="default"/>, <xref target="dana- | s-cert" format="counter"/>, <xref target="dana-verify-cert" format="counter"/>, | |||
encrypt-cert" format="default"/>, <xref target="dana-decrypt-key" format="defaul | <xref target="dana-sign-key" format="counter"/>, <xref target="dana-encrypt-cert | |||
t"/>, and <xref target="ed25519-ca-cross-cert" format="default"/>.</t> | " format="counter"/>, and <xref target="dana-decrypt-key" format="counter"/>. | |||
</t> | ||||
<t>It is locked with the simple four-letter password <tt>dana</tt>.</t> | <t>It is locked with the simple four-letter password <tt>dana</tt>.</t> | |||
<sourcecode type="application/x-pem-file" name="dana.p12"><![CDATA[ | <sourcecode type="pkcs12" name="dana.p12"><![CDATA[ | |||
-----BEGIN PKCS12----- | -----BEGIN PKCS12----- | |||
MIIKtgIBAzCCCn4GCSqGSIb3DQEHAaCCCm8EggprMIIKZzCCAu8GCSqGSIb3DQEH | MIIKtgIBAzCCCn4GCSqGSIb3DQEHAaCCCm8EggprMIIKZzCCAu8GCSqGSIb3DQEH | |||
BqCCAuAwggLcAgEAMIIC1QYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQMwDgQIZNqH | BqCCAuAwggLcAgEAMIIC1QYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQMwDgQIZNqH | |||
TA2APx0CAhQXgIICqK+HFHF6dF5qwlWM6MRCXw11VKrcYBff65iLABPyGvWENnVM | TA2APx0CAhQXgIICqK+HFHF6dF5qwlWM6MRCXw11VKrcYBff65iLABPyGvWENnVM | |||
TTPpDLqbGm6Yd2eLntPZvJoVe5Sf2+DW4q3BZ9aKuEdneBBk8mDJ6/Lq1+wFxY5k | TTPpDLqbGm6Yd2eLntPZvJoVe5Sf2+DW4q3BZ9aKuEdneBBk8mDJ6/Lq1+wFxY5k | |||
WaBHTA6LNml/NkM3za/fr4abKFQnu6DZgZDGbZh2BsgCMmO9TeHgZyepsh3WP4ZO | WaBHTA6LNml/NkM3za/fr4abKFQnu6DZgZDGbZh2BsgCMmO9TeHgZyepsh3WP4ZO | |||
aYDvSD0LiEzerDPlOBgjYahcNLjv/Dn/dFxtOO3or010TTUoQCqeHJOoq3hJtSI+ | aYDvSD0LiEzerDPlOBgjYahcNLjv/Dn/dFxtOO3or010TTUoQCqeHJOoq3hJtSI+ | |||
8n0iXk6gtf1/ROj6JRt/3Aqz/mLMIhuxIg/5K1wxY9AwFT4oyflapNJozGg9qwGi | 8n0iXk6gtf1/ROj6JRt/3Aqz/mLMIhuxIg/5K1wxY9AwFT4oyflapNJozGg9qwGi | |||
PWVtEy3QDNvAs3bDfiNQqAfJOEHv2z3Ran7sYuz3vE0FnPfA81oWbazlydjB0P/B | PWVtEy3QDNvAs3bDfiNQqAfJOEHv2z3Ran7sYuz3vE0FnPfA81oWbazlydjB0P/B | |||
OQ+s6VLbsAosnZq9jv2ZVrCDaDAl/g7oD7fY8qmaC6O2q5/Z3KusfMt+r9En2v81 | OQ+s6VLbsAosnZq9jv2ZVrCDaDAl/g7oD7fY8qmaC6O2q5/Z3KusfMt+r9En2v81 | |||
skipping to change at line 1109 ¶ | skipping to change at line 1263 ¶ | |||
hkiG9w0BCRQxCh4IAGQAYQBuAGEwIwYJKoZIhvcNAQkVMRYEFEgDhsFpuHhtrt7z | hkiG9w0BCRQxCh4IAGQAYQBuAGEwIwYJKoZIhvcNAQkVMRYEFEgDhsFpuHhtrt7z | |||
zAawM6xXMt2WMC8wHzAHBgUrDgMCGgQUzSoHpcIerV21CvCOjAe5ZVhs2M8ECC5D | zAawM6xXMt2WMC8wHzAHBgUrDgMCGgQUzSoHpcIerV21CvCOjAe5ZVhs2M8ECC5D | |||
kkzl2MltAgIoAA== | kkzl2MltAgIoAA== | |||
-----END PKCS12----- | -----END PKCS12----- | |||
]]></sourcecode> | ]]></sourcecode> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="security-considerations" numbered="true" toc="default"> | <section anchor="security-considerations" numbered="true" toc="default"> | |||
<name>Security Considerations</name> | <name>Security Considerations</name> | |||
<t>The keys presented in this document should be considered compromised an d insecure, because the secret key material is published and therefore not secre t.</t> | <t>The keys presented in this document should be considered compromised an d insecure, because the secret key material is published and therefore not secre t.</t> | |||
<t>Any application which maintains a denylist of invalid key material shou ld include these keys in its list.</t> | <t>Any application that maintains a deny list of invalid key material shou ld include these keys in its list.</t> | |||
</section> | </section> | |||
<section anchor="iana-considerations" numbered="true" toc="default"> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
<name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
<t>IANA has nothing to do for this document.</t> | <t>This document has no IANA actions.</t> | |||
</section> | ||||
<section anchor="document-considerations" numbered="true" toc="default"> | ||||
<name>Document Considerations</name> | ||||
<t>[ RFC Editor: please remove this section before publication ]</t> | ||||
<t>This document is currently edited as markdown. Minor editorial | ||||
changes can be suggested via merge requests at | ||||
https://gitlab.com/dkg/lamps-samples or by e-mail to the | ||||
author. Please direct all significant commentary to the public IETF | ||||
LAMPS mailing list: <tt>spasm@ietf.org</tt></t> | ||||
<section anchor="document-history" numbered="true" toc="default"> | ||||
<name>Document History</name> | ||||
<section anchor="substantive-changes-from-draft-ietf-07-to-draft-ietf-08 | ||||
" numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-ietf-*-07 to draft-ietf-*-08</nam | ||||
e> | ||||
<ul spacing="normal"> | ||||
<li>Apply editorial cleanup suggested during review</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-ietf-06-to-draft-ietf-07 | ||||
" numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-ietf-*-06 to draft-ietf-*-07</nam | ||||
e> | ||||
<ul spacing="normal"> | ||||
<li>Correct document history</li> | ||||
<li>Restore PKCS12 for dana and bob from -05</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-ietf-05-to-draft-ietf-06 | ||||
" numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-ietf-*-05 to draft-ietf-*-06</nam | ||||
e> | ||||
<ul spacing="normal"> | ||||
<li>Added outbound references for acronyms PEM, CRL, and OCSP, thank | ||||
s Stewart Brant.</li> | ||||
<li>Accidentally modified PKCS12 for dana and bob</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-ietf-04-to-draft-ietf-05 | ||||
" numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-ietf-*-04 to draft-ietf-*-05</nam | ||||
e> | ||||
<ul spacing="normal"> | ||||
<li>Switch from SHA512 to SHA1 as MAC checksum in PKCS#12 objects, f | ||||
or interop with Keychain Access on macOS.</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-ietf-03-to-draft-ietf-04 | ||||
" numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-ietf-*-03 to draft-ietf-*-04</nam | ||||
e> | ||||
<ul spacing="normal"> | ||||
<li>Order subject/issuer DN components by scope.</li> | ||||
<li>Put cross-signed intermediate CA certificates into PKCS#12 inste | ||||
ad of self-signed root CA certificates.</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-ietf-02-to-draft-ietf-03 | ||||
" numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-ietf-*-02 to draft-ietf-*-03</nam | ||||
e> | ||||
<ul spacing="normal"> | ||||
<li>Correct encoding of S/MIME Capabilities extension.</li> | ||||
<li>Change "Certificate Authority" to "Certification Authority".</li | ||||
> | ||||
<li>Add CertificatePolicies to all intermediate and end-entity certi | ||||
ficates.</li> | ||||
<li>Add organization and organizational unit to all certificates.</l | ||||
i> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-ietf-01-to-draft-ietf-02 | ||||
" numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-ietf-*-01 to draft-ietf-*-02</nam | ||||
e> | ||||
<ul spacing="normal"> | ||||
<li>Added cross-signed certificates for both CAs</li> | ||||
<li>Added S/MIME Capabilities extension for Carlos and Dana's encryp | ||||
tion keys, indicating preferred ECDH parameters.</li> | ||||
<li>Ensure no serial numbers are negative.</li> | ||||
<li>Encode keyUsage extensions in minimum-length BIT STRINGs.</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-ietf-00-to-draft-ietf-01 | ||||
" numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-ietf-*-00 to draft-ietf-*-01</nam | ||||
e> | ||||
<ul spacing="normal"> | ||||
<li>Added Curve25519 sample certificates (new CA, Carlos, and Dana)< | ||||
/li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-dkg-05-to-draft-ietf-00" | ||||
numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-dkg-*-05 to draft-ietf-*-00</name | ||||
> | ||||
<ul spacing="normal"> | ||||
<li>WG adoption (dkg moves from Author to Editor)</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-dkg-04-to-draft-dkg-05" | ||||
numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-dkg-*-04 to draft-dkg-*-05</name> | ||||
<ul spacing="normal"> | ||||
<li>PEM blobs are now <tt>sourcecode</tt>, not <tt>artwork</tt></li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-dkg-03-to-draft-dkg-04" | ||||
numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-dkg-*-03 to draft-dkg-*-04</name> | ||||
<ul spacing="normal"> | ||||
<li>Describe deterministic key generation</li> | ||||
<li>label PEM blobs with filenames in XML</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-dkg-02-to-draft-dkg-03" | ||||
numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-dkg-*-02 to draft-dkg-*-03</name> | ||||
<ul spacing="normal"> | ||||
<li>Alice and Bob now each have two distinct certificates: one for | ||||
signing, one for encryption, and public keys to match.</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-dkg-01-to-draft-dkg-02" | ||||
numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-dkg-*-01 to draft-dkg-*-02</name> | ||||
<ul spacing="normal"> | ||||
<li>PKCS#12 objects are deliberately locked with simple passphrases< | ||||
/li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="substantive-changes-from-draft-dkg-00-to-draft-dkg-01" | ||||
numbered="true" toc="default"> | ||||
<name>Substantive Changes from draft-dkg-*-00 to draft-dkg-*-01</name> | ||||
<ul spacing="normal"> | ||||
<li>changed all three keys to use RSA instead of RSA-PSS</li> | ||||
<li>set keyEncipherment keyUsage flag instead of dataEncipherment in | ||||
EE certs</li> | ||||
</ul> | ||||
</section> | ||||
</section> | ||||
</section> | ||||
<section anchor="acknowledgements" numbered="true" toc="default"> | ||||
<name>Acknowledgements</name> | ||||
<t>This draft was inspired by similar work in the OpenPGP space by Bjarni | ||||
Runar and juga at <xref target="I-D.bre-openpgp-samples" format="default"/>.</t> | ||||
<t>Eric Rescorla helped spot issues with certificate formats.</t> | ||||
<t>Sean Turner pointed to <xref target="RFC4134" format="default"/> as pri | ||||
or work.</t> | ||||
<t>Deb Cooley suggested that Alice and Bob should have separate certificat | ||||
es for signing and encryption.</t> | ||||
<t>Wolfgang Hommel helped to build reproducible encrypted PKCS#12 objects. | ||||
</t> | ||||
<t>Carsten Bormann got the XML <tt>sourcecode</tt> markup working for this | ||||
draft.</t> | ||||
<t>David A. Cooper identified problems with the certificates and suggested | ||||
corrections.</t> | ||||
<t>Lijun Liao helped get the terminology right.</t> | ||||
<t>Stewart Brant and Roman Danyliw provided editorial suggestions.</t> | ||||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<displayreference target="I-D.bre-openpgp-samples" to="OPENPGP-SAMPLES"/> | ||||
<references> | <references> | |||
<name>References</name> | <name>References</name> | |||
<references> | <references> | |||
<name>Normative References</name> | <name>Normative References</name> | |||
<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2 | ||||
119"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5280. | |||
<front> | xml"/> | |||
<title>Key words for use in RFCs to Indicate Requirement Levels</tit | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5958. | |||
le> | xml"/> | |||
<author fullname="S. Bradner" initials="S." surname="Bradner"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7292. | |||
<organization/> | xml"/> | |||
</author> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7468. | |||
<date month="March" year="1997"/> | xml"/> | |||
<abstract> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8032. | |||
<t>In many standards track documents several words are used to sig | xml"/> | |||
nify the requirements in the specification. These words are often capitalized. | ||||
This document defines these words as they should be interpreted in IETF document | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8479. | |||
s. This document specifies an Internet Best Current Practices for the Internet | xml"/> | |||
Community, and requests discussion and suggestions for improvements.</t> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8551. | |||
</abstract> | xml"/> | |||
</front> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<seriesInfo name="RFC" value="2119"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2119"/> | ||||
</reference> | ||||
<reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5 | ||||
280"> | ||||
<front> | ||||
<title>Internet X.509 Public Key Infrastructure Certificate and Cert | ||||
ificate Revocation List (CRL) Profile</title> | ||||
<author fullname="D. Cooper" initials="D." surname="Cooper"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Santesson" initials="S." surname="Santesson"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Farrell" initials="S." surname="Farrell"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Boeyen" initials="S." surname="Boeyen"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="R. Housley" initials="R." surname="Housley"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="W. Polk" initials="W." surname="Polk"> | ||||
<organization/> | ||||
</author> | ||||
<date month="May" year="2008"/> | ||||
<abstract> | ||||
<t>This memo profiles the X.509 v3 certificate and X.509 v2 certif | ||||
icate revocation list (CRL) for use in the Internet. An overview of this approa | ||||
ch and model is provided as an introduction. The X.509 v3 certificate format is | ||||
described in detail, with additional information regarding the format and seman | ||||
tics of Internet name forms. Standard certificate extensions are described and | ||||
two Internet-specific extensions are defined. A set of required certificate ext | ||||
ensions is specified. The X.509 v2 CRL format is described in detail along with | ||||
standard and Internet-specific extensions. An algorithm for X.509 certificatio | ||||
n path validation is described. An ASN.1 module and examples are provided in th | ||||
e appendices. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5280"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5280"/> | ||||
</reference> | ||||
<reference anchor="RFC5958" target="https://www.rfc-editor.org/info/rfc5 | ||||
958"> | ||||
<front> | ||||
<title>Asymmetric Key Packages</title> | ||||
<author fullname="S. Turner" initials="S." surname="Turner"> | ||||
<organization/> | ||||
</author> | ||||
<date month="August" year="2010"/> | ||||
<abstract> | ||||
<t>This document defines the syntax for private-key information an | ||||
d a content type for it. Private-key information includes a private key for a s | ||||
pecified public-key algorithm and a set of attributes. The Cryptographic Messag | ||||
e Syntax (CMS), as defined in RFC 5652, can be used to digitally sign, digest, a | ||||
uthenticate, or encrypt the asymmetric key format content type. This document o | ||||
bsoletes RFC 5208. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5958"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5958"/> | ||||
</reference> | ||||
<reference anchor="RFC7292" target="https://www.rfc-editor.org/info/rfc7 | ||||
292"> | ||||
<front> | ||||
<title>PKCS #12: Personal Information Exchange Syntax v1.1</title> | ||||
<author fullname="K. Moriarty" initials="K." role="editor" surname=" | ||||
Moriarty"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Nystrom" initials="M." surname="Nystrom"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Parkinson" initials="S." surname="Parkinson"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="A. Rusch" initials="A." surname="Rusch"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Scott" initials="M." surname="Scott"> | ||||
<organization/> | ||||
</author> | ||||
<date month="July" year="2014"/> | ||||
<abstract> | ||||
<t>PKCS #12 v1.1 describes a transfer syntax for personal identity | ||||
information, including private keys, certificates, miscellaneous secrets, and e | ||||
xtensions. Machines, applications, browsers, Internet kiosks, and so on, that s | ||||
upport this standard will allow a user to import, export, and exercise a single | ||||
set of personal identity information. This standard supports direct transfer of | ||||
personal information under several privacy and integrity modes.</t> | ||||
<t>This document represents a republication of PKCS #12 v1.1 from | ||||
RSA Laboratories' Public Key Cryptography Standard (PKCS) series. By publishing | ||||
this RFC, change control is transferred to the IETF.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7292"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7292"/> | ||||
</reference> | ||||
<reference anchor="RFC7468" target="https://www.rfc-editor.org/info/rfc7 | ||||
468"> | ||||
<front> | ||||
<title>Textual Encodings of PKIX, PKCS, and CMS Structures</title> | ||||
<author fullname="S. Josefsson" initials="S." surname="Josefsson"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Leonard" initials="S." surname="Leonard"> | ||||
<organization/> | ||||
</author> | ||||
<date month="April" year="2015"/> | ||||
<abstract> | ||||
<t>This document describes and discusses the textual encodings of | ||||
the Public-Key Infrastructure X.509 (PKIX), Public-Key Cryptography Standards (P | ||||
KCS), and Cryptographic Message Syntax (CMS). The textual encodings are well-kn | ||||
own, are implemented by several applications and libraries, and are widely deplo | ||||
yed. This document articulates the de facto rules by which existing implementat | ||||
ions operate and defines them so that future implementations can interoperate.</ | ||||
t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7468"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7468"/> | ||||
</reference> | ||||
<reference anchor="RFC8032" target="https://www.rfc-editor.org/info/rfc8 | ||||
032"> | ||||
<front> | ||||
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title> | ||||
<author fullname="S. Josefsson" initials="S." surname="Josefsson"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="I. Liusvaara" initials="I." surname="Liusvaara"> | ||||
<organization/> | ||||
</author> | ||||
<date month="January" year="2017"/> | ||||
<abstract> | ||||
<t>This document describes elliptic curve signature scheme Edwards | ||||
-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with | ||||
recommended parameters for the edwards25519 and edwards448 curves. An example i | ||||
mplementation and test vectors are provided.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8032"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8032"/> | ||||
</reference> | ||||
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8 | ||||
174"> | ||||
<front> | ||||
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | ||||
tle> | ||||
<author fullname="B. Leiba" initials="B." surname="Leiba"> | ||||
<organization/> | ||||
</author> | ||||
<date month="May" year="2017"/> | ||||
<abstract> | ||||
<t>RFC 2119 specifies common key words that may be used in protoco | ||||
l specifications. This document aims to reduce the ambiguity by clarifying tha | ||||
t only UPPERCASE usage of the key words have the defined special meanings.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<seriesInfo name="RFC" value="8174"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
</reference> | ||||
<reference anchor="RFC8479" target="https://www.rfc-editor.org/info/rfc8 | ||||
479"> | ||||
<front> | ||||
<title>Storing Validation Parameters in PKCS#8</title> | ||||
<author fullname="N. Mavrogiannopoulos" initials="N." surname="Mavro | ||||
giannopoulos"> | ||||
<organization/> | ||||
</author> | ||||
<date month="September" year="2018"/> | ||||
<abstract> | ||||
<t>This memo describes a method of storing parameters needed for p | ||||
rivate-key validation in the Private-Key Information Syntax Specification as def | ||||
ined in PKCS#8 format (RFC 5208). It is equally applicable to the alternative i | ||||
mplementation of the Private-Key Information Syntax Specification as defined in | ||||
RFC 5958.</t> | ||||
<t>The approach described in this document encodes the parameters | ||||
under a private enterprise extension and does not form part of a formal standard | ||||
.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8479"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8479"/> | ||||
</reference> | ||||
<reference anchor="RFC8551" target="https://www.rfc-editor.org/info/rfc8 | ||||
551"> | ||||
<front> | ||||
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version | ||||
4.0 Message Specification</title> | ||||
<author fullname="J. Schaad" initials="J." surname="Schaad"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="B. Ramsdell" initials="B." surname="Ramsdell"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Turner" initials="S." surname="Turner"> | ||||
<organization/> | ||||
</author> | ||||
<date month="April" year="2019"/> | ||||
<abstract> | ||||
<t>This document defines Secure/Multipurpose Internet Mail Extensi | ||||
ons (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive | ||||
secure MIME data. Digital signatures provide authentication, message integrity, | ||||
and non-repudiation with proof of origin. Encryption provides data confidential | ||||
ity. Compression can be used to reduce data size. This document obsoletes RFC | ||||
5751.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8551"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8551"/> | ||||
</reference> | ||||
</references> | </references> | |||
<references> | <references> | |||
<name>Informative References</name> | <name>Informative References</name> | |||
<reference anchor="FIPS186-4"> | ||||
<reference anchor="FIPS186-4" target="https://doi.org/10.6028/NIST.FIPS. | ||||
186-4"> | ||||
<front> | <front> | |||
<title>Digital Signature Standard (DSS)</title> | <title>Digital Signature Standard (DSS)</title> | |||
<author> | <author> | |||
<organization/> | <organization>National Institute of Standards and Technology (NIST | |||
) | ||||
</organization> | ||||
</author> | </author> | |||
<date month="July" year="2013"/> | <date month="July" year="2013"/> | |||
</front> | </front> | |||
<seriesInfo name="National Institute of Standards and Technology" valu | <seriesInfo name="FIPS PUB" value="186-4"/> | |||
e="report"/> | <seriesInfo name="DOI" value="10.6028/NIST.FIPS.186-4"/> | |||
<seriesInfo name="DOI" value="10.6028/nist.fips.186-4"/> | ||||
</reference> | </reference> | |||
<reference anchor="I-D.bre-openpgp-samples" target="https://www.ietf.org | ||||
/archive/id/draft-bre-openpgp-samples-01.txt"> | ||||
<front> | ||||
<title>OpenPGP Example Keys and Certificates</title> | ||||
<author fullname="Bjarni Rúnar Einarsson"> | ||||
<organization>Mailpile ehf</organization> | ||||
</author> | ||||
<author fullname="juga"> | ||||
<organization>Independent</organization> | ||||
</author> | ||||
<author fullname="Daniel Kahn Gillmor"> | ||||
<organization>American Civil Liberties Union</organization> | ||||
</author> | ||||
<date day="20" month="December" year="2019"/> | ||||
<abstract> | ||||
<t> The OpenPGP development community benefits from sharing samp | ||||
les of | ||||
signed or encrypted data. This document facilitates such | ||||
collaboration by defining a small set of OpenPGP certificates and | ||||
keys for use when generating such samples. | ||||
</t> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.bre-ope | |||
</abstract> | npgp-samples.xml"/> | |||
</front> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4134. | |||
<seriesInfo name="Internet-Draft" value="draft-bre-openpgp-samples-01" | xml"/> | |||
/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5322. | |||
</reference> | xml"/> | |||
<reference anchor="RFC4134" target="https://www.rfc-editor.org/info/rfc4 | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7469. | |||
134"> | xml"/> | |||
<front> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8410. | |||
<title>Examples of S/MIME Messages</title> | xml"/> | |||
<author fullname="P. Hoffman" initials="P." role="editor" surname="H | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8418. | |||
offman"> | xml"/> | |||
<organization/> | ||||
</author> | <reference anchor="SHA" target="https://doi.org/10.6028/NIST.FIPS.180-4" | |||
<date month="July" year="2005"/> | > | |||
<abstract> | ||||
<t>This document gives examples of message bodies formatted using | ||||
S/MIME. Specifically, it has examples of Cryptographic Message Syntax (CMS) obje | ||||
cts and S/MIME messages (including the MIME formatting). It includes examples o | ||||
f many common CMS formats. The purpose of this document is to help increase int | ||||
eroperability for S/MIME and other protocols that rely on CMS. This memo provid | ||||
es information for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4134"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4134"/> | ||||
</reference> | ||||
<reference anchor="RFC5322" target="https://www.rfc-editor.org/info/rfc5 | ||||
322"> | ||||
<front> | ||||
<title>Internet Message Format</title> | ||||
<author fullname="P. Resnick" initials="P." role="editor" surname="R | ||||
esnick"> | ||||
<organization/> | ||||
</author> | ||||
<date month="October" year="2008"/> | ||||
<abstract> | ||||
<t>This document specifies the Internet Message Format (IMF), a sy | ||||
ntax for text messages that are sent between computer users, within the framewor | ||||
k of "electronic mail" messages. This specification is a revision of Request Fo | ||||
r Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, " | ||||
Standard for the Format of ARPA Internet Text Messages", updating it to reflect | ||||
current practice and incorporating incremental changes that were specified in ot | ||||
her RFCs. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5322"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5322"/> | ||||
</reference> | ||||
<reference anchor="RFC7469" target="https://www.rfc-editor.org/info/rfc7 | ||||
469"> | ||||
<front> | ||||
<title>Public Key Pinning Extension for HTTP</title> | ||||
<author fullname="C. Evans" initials="C." surname="Evans"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="C. Palmer" initials="C." surname="Palmer"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="R. Sleevi" initials="R." surname="Sleevi"> | ||||
<organization/> | ||||
</author> | ||||
<date month="April" year="2015"/> | ||||
<abstract> | ||||
<t>This document defines a new HTTP header that allows web host op | ||||
erators to instruct user agents to remember ("pin") the hosts' cryptographic ide | ||||
ntities over a period of time. During that time, user agents (UAs) will require | ||||
that the host presents a certificate chain including at least one Subject Publi | ||||
c Key Info structure whose fingerprint matches one of the pinned fingerprints fo | ||||
r that host. By effectively reducing the number of trusted authorities who can | ||||
authenticate the domain during the lifetime of the pin, pinning may reduce the i | ||||
ncidence of man-in-the-middle attacks due to compromised Certification Authoriti | ||||
es.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7469"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7469"/> | ||||
</reference> | ||||
<reference anchor="RFC8410" target="https://www.rfc-editor.org/info/rfc8 | ||||
410"> | ||||
<front> | ||||
<title>Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 fo | ||||
r Use in the Internet X.509 Public Key Infrastructure</title> | ||||
<author fullname="S. Josefsson" initials="S." surname="Josefsson"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="J. Schaad" initials="J." surname="Schaad"> | ||||
<organization/> | ||||
</author> | ||||
<date month="August" year="2018"/> | ||||
<abstract> | ||||
<t>This document specifies algorithm identifiers and ASN.1 encodin | ||||
g formats for elliptic curve constructs using the curve25519 and curve448 curves | ||||
. The signature algorithms covered are Ed25519 and Ed448. The key agreement al | ||||
gorithms covered are X25519 and X448. The encoding for public key, private key, | ||||
and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.</t | ||||
> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8410"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8410"/> | ||||
</reference> | ||||
<reference anchor="RFC8418" target="https://www.rfc-editor.org/info/rfc8 | ||||
418"> | ||||
<front> | ||||
<title>Use of the Elliptic Curve Diffie-Hellman Key Agreement Algori | ||||
thm with X25519 and X448 in the Cryptographic Message Syntax (CMS)</title> | ||||
<author fullname="R. Housley" initials="R." surname="Housley"> | ||||
<organization/> | ||||
</author> | ||||
<date month="August" year="2018"/> | ||||
<abstract> | ||||
<t>This document describes the conventions for using the Elliptic | ||||
Curve Diffie-Hellman (ECDH) key agreement algorithm with curve25519 and curve448 | ||||
in the Cryptographic Message Syntax (CMS).</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8418"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8418"/> | ||||
</reference> | ||||
<reference anchor="SHA256"> | ||||
<front> | <front> | |||
<title>Secure Hash Standard</title> | <title>Secure Hash Standard (SHS)</title> | |||
<author fullname="Quynh H. Dang" initials="Q." surname="Dang"> | <author> | |||
<organization/> | <organization>National Institute of Standards and Technology (NIST | |||
)</organization> | ||||
</author> | </author> | |||
<date month="July" year="2015"/> | <date month="August" year="2015"/> | |||
</front> | </front> | |||
<seriesInfo name="National Institute of Standards and Technology" valu | <seriesInfo name="FIPS PUB" value="180-4"/> | |||
e="report"/> | <seriesInfo name="DOI" value="10.6028/NIST.FIPS.180-4"/> | |||
<seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/> | ||||
</reference> | </reference> | |||
<reference anchor="TEST-POLICY" target="https://csrc.nist.gov/CSRC/media /Projects/Computer-Security-Objects-Register/documents/test_policy.pdf"> | <reference anchor="TEST-POLICY" target="https://csrc.nist.gov/CSRC/media /Projects/Computer-Security-Objects-Register/documents/test_policy.pdf"> | |||
<front> | <front> | |||
<title>Test Certificate Policy to Support PKI Pilots and Testing</ti tle> | <title>Test Certificate Policy to Support PKI Pilots and Testing</ti tle> | |||
<author> | <author> | |||
<organization>NIST - Computer Security Divisiion (CSD)</organizati on> | <organization>National Institute of Standards and Technology (NIST )</organization> | |||
</author> | </author> | |||
<date year="2012" month="May"/> | <date year="2012" month="May"/> | |||
</front> | </front> | |||
<refcontent>Computer Security Resource Center</refcontent> | ||||
</reference> | </reference> | |||
</references> | </references> | |||
</references> | </references> | |||
</back> | ||||
<!-- ##markdown-source: | ||||
H4sIADgD+2EAA9S8W6+jWrYm+M6vsHY+VKa8Iww2xrClkoo7GAM2F4N5qeQO | ||||
NveLMaTyqFUP/dQPp1vnqEutbvVj/4/+KeeX9MReK2JF7MjMnVWp6qqt2BFe | ||||
E5hzzHH5xjfGxOvTp09Ql3ZZ+MtCX8mizC7Yh5tXWbiQwrFduEWwoMOmS6PU | ||||
d7uwhYLSL9wc3B00btR9SsMu+pSBB9pP7fOx9hOMQ/OtcdmMvyzSIiohKK2a | ||||
XxZd07fdGoYJeA25TejOFztoKJtb3JR99cviOQ10C0cwFvyyEIsubIqw+8TM | ||||
K0FQ2wFh/qOblQVYfQSiQG7fJWXzC7T4BC3Af2nR/rJgPi+kzws+zbK8bJ7D | ||||
L3EZt0jDbCG5SfHN1bKJf1mQediA/RULOr2n2eKQevOWw3ZhFmlZPO9ruyYM | ||||
u18WyHq7oJrSDRZ69/l5xU87sFElHBYXsJefF8rlNVwGYFkEhmH07ee+6GaV | ||||
mDr5HHA9rwnvYHH6YD4HwtxNM6DYW/wfojTqErC3FowVn4ESnjc05WymMEg7 | ||||
IPys2SZ3u/QeAg1w4lFHcOwTCnaqip8R+DMGr/GVIurG5/na5+dFaCF+Yj6D | ||||
ZT+VVVhUcfVuNDCDxtEoskFfn7ab9fr1aYdixOsTjiLwl084+KQL5HqL/eUF | ||||
4XlBg9WNT0f1INIX8Miic5t4VmPSdVX7y2rlt43/uUjb7nNc3le0rtGrHGzQ | ||||
XR2b8hr6Xbuiy7zqgSd80kO/b4CuP6ne88onLYzBg2GzAj7Z52EBbgYe2v3H | ||||
qsxSf/xcBdG84Mu3fzLAlY+evDg+71p05ULvq6psusVREhfHNCu7l9vPT6RF | ||||
/BOY5IujvfnLvMvFp8W7aIt30RYM8J82BT6z+D2tM38ADwRgrV8WaxhZf4K3 | ||||
UPHBZECRawR5U+52jb8pd0ts8TfVr4mvRngbw+HN2xiO7NB3c+zeTbTdIr9A | ||||
nz59As4FHNb1QdgYSfge2UF4D7OymlUF3DHP+2KW2QuLMErBpqOmzBdt4jZg | ||||
14s3x1iU0aJN4yIMwM4XYeE3Y9WBH8C23M8LI0nbxbv2F5Hrp1nazTCxaHs/ | ||||
AWtkmeuVDdgx0Ig3AgGitJhndxdt7mbZog27eQX78xYm7puF/wFpnja4zRgE | ||||
/HzRt+FiSMJiEQNp5wlnEec13uT8DD23nadBkIUQ9LsZPZoy6P156W+U8Ps/ | ||||
/elNU3/+8x9+rJKfAZQsKhfI4veZ2yw68HT4aY7Ov3T/b9Uh2NPq13qE1KgD | ||||
W3su8wBGm7e9AH4CQMnN5q2D+0owT1F28/DscV7ou7NO5meqBkTzC6+8cF53 | ||||
jgLwzDzogp0AF09nQWahX6bwy6YBIVSEbfvzvA1wEQgAfpqNnM64O8/oerM5 | ||||
x1n8eZnyDoZmm41g9vwzJJQDUEbz82JIQXT03cL1/XkKsNx8exNm4d0FampD | ||||
vwm/3dPPswO8sgxwILAPoKXZhN/609NbZkf4Dc7ysuocRbNVZ9f5uuxf9iAw | ||||
/Nzo64fie48ii9keTzE1nfyw4KzDFybM+klnd6+qLA2Dn19L/+iZeSPN01j3 | ||||
NADWmWXqhnLxExCgLQu3/ennBQkgKXxOQZXeLEAAsB4sBnY/zlMv2GANHJd4 | ||||
d2IABvN2f5tgIHHGT1u9y/c+2TcyvosF8mP4jWy022TlKypBLnV/Za0IfGhn | ||||
J3WbphyycdZn1Bf+S37gJWGWfZpTFtg7UEDRzRK+xfgXx/gMid0sNjB5N8cf | ||||
kLgqgUMCj3KB8YFfNV9WbBdzxn4GQfkel+9b+xFk5cDH3DgEHj/Hx+IOAgAk | ||||
2J+fTvCceF4QYFj3UgIIGWCqWdjv4gHs/He/W2hh3adN+BLk4BZxD+Z+Ac28 | ||||
oZnCtIufZFM3gO6e/y4U9flZY0+mqLHM/Bmk0MPhy4f3O3RBNQ/M109fn6RV | ||||
WWYV5vUwGF18NySTl59ePviTejREVSEPP81g1n1jqtkPgc688LW3CsTJjE3g | ||||
jrD1G0B+5k0vKPq4QNDF09PmRPXnP78+z4kHfJ5j6bVUWQBrv34EegRGrarQ | ||||
nXFkMUet71YgJ2RA0WCBNimHYgGUHb60aIRNnhZlVsYjAPDFT/Q3nky+e/JP | ||||
i98Di/xEkz/94eUdMziP89SuB6wNQCFt2372lic4fOPR87RsEXxinx7308fn | ||||
n06Vth/n6dsfz7L4/bxTsL20eaFnW5VF8AT5X8PbHxbzovKcL8wWOBYJIKd7 | ||||
24Nsft1EU8aNm7/EeEOl8AnBCVhsThwvUANcDOj7LQG9e/FLf8cmBbdbgHdC | ||||
0PPmmcKBm/2ymKEfKLzMw/eg+LifpzXmkJz/fZ9zVsAdpK6yb9+z5YtjgtWM | ||||
ZwBmAdjOTNmBiAC4ixnyqw4ob5yvAXvHs72SfOEnJYCy9rW33B1nT3vm4xDQ | ||||
hDTrgQJfaNy9WBbAGzB18ZZc2rk2mEkT8fNrB11ZZi0AY4BlgG5ns6qBDAi8 | ||||
Rj95afdE2tk+XwYYXX9t0L29AxVwSQCEzYcoyNrya159T6ZFOQCQDMJs/PTa | ||||
HAiGIyvPOFI+7f37NgxfhplZ2Qy/T8icE+SLl76CAii/C0GVEOYgnNpF0xfF | ||||
08eOYZM9a4M5AsPHk6TNT+cv6jDP8y4hkFx8EzMt/KwH0fmej56m+mK2ZxA+ | ||||
IQyQPkB53rSbgmQ2h3oMiq2ZM8wBmXvPhDLb5XtUmLGgCNoXMnx+86eZ9AN/ | ||||
+rK++zUl2r/KHl8D6jUGVPfMN2+JBtAkwBKAdV4A8bYSCKAs+jTH73v6TJ9z | ||||
zEYJ0pmmAHMD60R99kSyN38Bgrxc9NN79ILImoNiQbn+s6IsgmeIfOT8ZvsO | ||||
0sDaPwryb1kE0B3Y8yuVfKEQ84beggMEcBc+E1z7Ha2c734L2N9/COI/zCb9 | ||||
SC3fEBPAYg/CByijb597eaXpL5zxh1kM+Pc80ZOezQkNAOA7bf4VhYsAzoRz | ||||
3D5pDYh6YOlPH3Lw84Fn4QW0RP+Atszx9m7OX1VRM/N8eu+f/vSh3Hu6TfDE | ||||
8pmTzq7xSg9N+OZr4VvueNftB/OGxT1tyuKZXj9D7Fdp/6pkr8pvsf6MYJ9x | ||||
FP6MgLoU+bz5DAY+o/hn5Ed7/Yuz/MVp1p9/5Vjso0pfZc6LAnwj5VvwBF8T | ||||
8dzQmNEsfaoCAN12/fmFUl89oe2jaFZtMft/9MqnMzpE/RzfH/Q5pMCeT9d5 | ||||
xsisTHcRhQPwXd8N5kzxlal/RNwXpr7PChZ4m3lOU88bq8wd03fO6Gelf1u0 | ||||
NzBv64fFnCXaP4DiYVbeV6E79xY+Cw6QgNp0Thbdt9oA+SVLg9mQA3COcgCq | ||||
ZPrwVTOA7WdhEXfJ+NLNiwS87nsGSvudYp87n3ECrPw1pr7CxTzrHBlzMIJ1 | ||||
+xdEvbEe139VpWE3hEDmjzJ+WH12mLcw/xB8v3YALbyX/psDUF9rM/D3rCAw | ||||
4WuCF+I9K7o3Z38P21nGN2x/oeAwJ4Ln7l5Pz9N94W0gbEBptCiA8HMyBiTj | ||||
/ky3L2u2zyWAbdp5sh9N9L0mwazVW3p2ixHUbu+7+UqKZ+CYWQvILX3W/Qwm | ||||
LML30vBH7r4I0xerLhYqrR/fsQDs85lB/5gGn9zgU+m31R9f1HMu9oJ3f/xC | ||||
/UAh/9bnmgnhq8J8ITdIniFwMjAMnvl//x8UxCUI0Fmkb1D8GQ60dvhegHmV | ||||
eZhJQdJMQWaaZzrOxcavF/hWvtdaABQ23y/28guzfQHeE0nB/c/Wk/40M0CH | ||||
cvHVN8K/gGtzpl5Uaeg/NdyWUTfMbvT76KuX/Py66asLPTda/Br6geqa9AFC | ||||
NS/Bra+gfwVO+HLIF815N9csNvuh6AVbABnsxSA/Na0L0u2bVj/e+V5KfnN3 | ||||
+Bp8e8KdnScLY8A/Zp68aErgkV9qVaA5pXxnEF8o36xHL0zcO9BJkEYRCIAX | ||||
HILlv1HYE1XcOcK8cfETgKq5Yv40czDwAYw+FwNY/9OL+MzPg6rnww0/vYjn | ||||
p2yuI3/6cj+wKPdR5/kcHXPfZ/a6b3oqT0YmHKXjW8Kf+6ZPRc0Jzn0V4S92 | ||||
984oPrKHJ94GoZt9wVv3G0R60aN5c+5vEvwdQmYGkz4pRfB3rfGXVfjT56cP | ||||
v/zuo51agC3PqZ69ivTF+r0Zo+aYdZtnq/VtuleD6DXhyzF+vI1f4yydzGXN | ||||
k0U9/RlQ2+wTwECQfr7C5w+Y3YvLVVk5vmd5sPl5rieRLl8JFfxQ/IAXfv4B | ||||
Z2uenaturF4bnl27LOJPWXr/qqqXM4Nob9p/9zWIb6DCAPJ4c8esr57o9dTJ | ||||
04tedns2An8IDfOiH+xUfE9mfn6j/ekrFfSgovp6+welf37RlHcq/1dw6Nsa | ||||
Ye64vCewpxbfQR6Q1edMIB8BJRS3b4R+Kfr3X9jfF1r/tU54ifer4vpN3D/8 | ||||
/GpMzoCXNGH4tsQ8LdjJNxH6bKH9u/adMT+7nR9EAcHpznd8erv+ab745z// | ||||
vPjjc/jz2/Bnv+n++If37X6DLiAAwydOuh/qk+fZVvsD8ASSPPcwLzMv/kLQ | ||||
r6v67mcw9FruFwgUXb/MGXdO6p/mc6t//9NL2ncJPs36Tcqq/enP0D/90z9B | ||||
//av//Jv//rPv+HP/75Y/Nu//C//9i//03/pn38Ga/2vi6/iLv7tX//v+cL/ | ||||
/L/927/8p8WvlAdW+0/gif/jt0n3f83S/ct/hXT/+akNiHxVj7PZnmXzX7Pd | ||||
E5j/mgG/5rTvjfg1sX1jyOfgy5Q/L+6p+6v49JuybT+9wf9blfXRKZ6Xf+0a | ||||
YPSLg/xN/3iGx3+Jh/wj/OSf/2Fe9kWX3/rZ9zoBy/2f/zAv/Ef44n/+B3ky | ||||
NS7KPO26dyb5I9dpn2n2a/FVgVvSuXvwXveAtNo1btE+veOnb3FwbuT8OMW8 | ||||
N3Hejw6+nO/M51vf+vPXp/4wo/OTD4DKL0rj/lU/vbcp3bZ9dsQhiHXnI5av | ||||
PVPAZlogxK+qY/ChCb9efJKEIyt/evbh5p6cROu/w9/YN7HF//znt/7bPI+f | ||||
hSBKAH9/9i8XvwdqmvuVBahy3iT5w6ucmQ98nvn8o0hvfbxnqprLppleP7sy | ||||
M20EdXQaPcviD0w7C79M/IHWgUI5AQRx1sGXCnxe6ik6sn5rIq6J9RfZ50y7 | ||||
mOnul3QK9tC72ZfZ25+/nvy98a5ZqG9Y3fu985nal7Xe55+P2wpQl7+dl8ya | ||||
fRaEC8DK38q5dxO8TKd/0EuTxk/yZXzV15zlnkdsPzxkmKleEHbPJj8os964 | ||||
Elj+SZNevfb5lOWlwWYW4f107lV1RXMbb577T3/68obDDI6e2z6bR082BRQd | ||||
zj3W93ln6P3Tn15vJwDVvo5kX/qcS70ifrazv6SGeSnA7gCaAkHb925uG77m | ||||
eyP3zzYHqB2/VqjvGp17t22YzSXKfMDxYsHhm9Bvp/N//vPnb7T2nlpmsvfW | ||||
Rv1bSnxtDeQw4MjJ2xH6xz19fpt/VsTXo4qvW3hru33sRIUfD++aRfq10J49 | ||||
rm8Anrw3I+YyMcvKAcQkSFPha8b3c+E3RTz1DCodEBPNEx7ePPSt4zh7yku8 | ||||
J3ucxVmv0YU3o8rzaPL3zz5U2gDg+nLhbQlgy0/AmCBdx89+ztvCT3982/8f | ||||
XoLO037EjXQ+bXq4AbBKPh8vQr/7lqD9+Lxp8afffVvxfkuX/9qTM848N1LO | ||||
+nrhxBe9ggS++LRQni8k/VF/TXYg5aP+16b84+u88a+sqT1Z8gcI/9PvPvLM | ||||
twOQ78qIpxWAXV+A9h3v/6Zm+A3b/vwDZvKVK76oyKsKfj25enx6gCrrXcT5 | ||||
3Y1PnyiWF5UFzWqGyIk0abDPUUgWRSacaJrM1ZgcRIqMRcOnCvjhrabADelT | ||||
VlfY6Jgk75g0QypUfKuTW8oTA0yRJ5iDSIY6yyd4oIcLcz6dJHbQ9tpZ42WN | ||||
HZjX2IEdEvlkIidzpGxtYh8yjfMkYrLkQy4hc811Pv/IRPZBGWcKiLc3TjrF | ||||
OPYedi2nuqw58C/RiyyHBHxy9/MMDg0y5gb4oRrsA5Kv5KBcTVg2Epcn8VFm | ||||
TPD/bVQmcq0Yp4fKlcPZYBWZbJ+r0onM6ubZ1K6sJpM4Dz0HH7JosJxicnJ8 | ||||
hv2HbJB3KlbOFCkbEqcknk21jk69b0M3YTY+rc9jwGc55FpKAj7cvZSiAlsr | ||||
vc2+CoTbEMdsKpMwT+s1r4vehjmxQGkmSaIixQzkfF0iS5GCyBO95vkjEOCs | ||||
BCl8aNPTjiBheVrzy4O2zzx7fVdKXDdSjyzGE3GeuIbfC1cz0eyVmjeQetw0 | ||||
DE2t9UtEHc9DANMBjU1EHe1v/vnB+EgiLc86cZcK/wCLR/OS3faD1cuV7SJi | ||||
mE3QcqL78zK+nvGNeS+wwSg2hEznY97vCu44pYnfq4UnX1Q6kHPTSxEmxw2b | ||||
OGJpx2mbJIVEodIl2buVdiYj+GZnuVz02O5ulFiKvXKV2PEo9hIx8CYZVpW/ | ||||
PZHCPia2xyMrKEKWy9CYUBOd5fFtLCdND/Xm9qgJO9xLJoFmFu868OShN7eh | ||||
+2YVpnJJ3zYX5YwfNm033n2Zh5DaZGjSlR4Y57DRLmEJTcEOG4+MZYok+evp | ||||
CoxJPj0vYAeWWg0nTibBtQgfmPjCQGcNPpInYQVsxJAxy8sU/LyZiU8WRema | ||||
LG5x6uHL1YrdS7y55nPfdwUPtoxXXEAfA4MkVZo8sSTN2Fa256+T5AaKfPS5 | ||||
zBELh14K2U47ND7FaOvtVabtmBgPkDjwZ9ZXqnUkoMuLYGgGfxBwxD2SjByY | ||||
vBBXkR/VwzVs3Xu3ylXYgHX4cN3D2jknNhELJaGumIKZxmeNKK7GeViz1LQL | ||||
19XyvunUVi764p5jR5GJhccDtrD8Osn2LuN3qLePyuUdCh7Lq7hy7W6Zpsm2 | ||||
Sner9aUnQoM590t9ux7agsMJit2HZ7hZsjnPPMw7umOWW6k/VZJMQOYqbe1q | ||||
oDFptcEMXEuSQD3ZTA3LHYEYDhrsDQPON35e4vA0+Y9Wkhm9cwRVnWiqo2qo | ||||
F73BGraqu1uXK3GIifvSgq2bTtEW6wbRqpeWvpb6j+b07//9C9pYhfk1sD2J | ||||
/t+A9jf6JYXjG4r/4HWDL2j+2/H62YubQX5RhMM32P9XkBys+UMkr8L8U5Rm | ||||
4UcUP2riGWx0IbGXLyjOLmf0/hVCs8ARdZqSYgA2+g14NTkDzvd4A/29gPM9 | ||||
3kB/L+B8jzfQ3ws43+MN9PcCzvd4A/29gPM93kDfAg5LA3gn2U3HJW2+Y6qY | ||||
yZpyieg35Hb1hLbV0FalBA+dmmOF+Qh+VCEQL7HVU/4VYSZ1Gm+KMbmyyzzI | ||||
1EXv/eO8p5DcC5ubIkwGV48e7j02fqizKm1s3HKsoW2UcpUGHzDKRe5xjGvG | ||||
XaFJkawExUWr8w22Gdyql8kuz0xSvfBeGm5NFV8d17V19dU5DYCqarzYe32V | ||||
9j3crVccnCasxfs2lZc+ziyXxS6X2m59vZECgw7ZUVmDjFkXuRtX1ATFpccp | ||||
Oe2MTsXoy+PR6E4OYt8DntvqZeAvuWl5ray+QG71gxFY1BSdiSFXAulSsap5 | ||||
IJeyjntu1ZZw2EdYq13dr6MjtZu4FbKXAu2GmnvVfOiwepKo+MTsh7I4brXh | ||||
rsLtpaTTAZp6zr8YubJKxI22uadS/2gQghawZX7vRRPflqUocJiRlr0zJLcl | ||||
tjzfdo1vB/p2izIGCq0179zYq226ktXpgfu4KA6lsxfd9jAt7w+cQwssGZMz | ||||
tvVsZUeKVHmVk3XQ4d1xLTsrDTqzUXtDcyVXsVHqp5GMrvsppQv6JXLBCIR5 | ||||
McXjrYaP+v2cSiduz9EUQe2PXJIFa6gS43JKh9XemeSNtREtE5Ysfjdv29g8 | ||||
8mIj2tgjtyz0biMrGMdHT/Uc63KEw8DDEF6GRIIpxW0aF8EhZoZRPayPXO8A | ||||
PK9rHyYYdulXewstlLIPagOYq7km+UOheSnmrxmDT9BKvem+fx+HAYjMBLAW | ||||
ulfNnFL2yjyu3Nr0JumBZ9O+tVFJbNdrXgyEWtfoe+aPOHxyoa2lbMyDko7U | ||||
ZgsL9BEjBoaT7cuYb5t9eboe7wnGi31yke7oGY+i6HG73Le3x7a3Uts576Hd | ||||
ff1Y5ngj19l4X1a30TqccUkaOyEPUmpilqVhPbhdg/bh4dq5jyKeHgWxqciS | ||||
p0ip0qBGI45FU0pC7+nsKmhMxeEO98IZjswdy1TcIHZ4pyqHzW5dmQYhXTU8 | ||||
VDYI48pVeVIrH6Lqe6UDUalDhxTM2J7Xt0aEtUEW1Ym0fJglaFyT73tsqQXm | ||||
Fj4hlD5e7wfeldItSQo36GjccJ+/nFWEogU+s/FqY18iQFtPrvDo+jN9xsNL | ||||
TN+fIotOmJ4TH74Ye/VqusG0hKG7DlZC3Cbe3tYX+kjz0W5apld523jybXdt | ||||
LumDwSz5aqi380Fg2vNDpiqP3PHJYWdI4xbyw4oSEADQD1bM8KBWlmYZ7kOq | ||||
KoRy5QPekNIasXLl/SQu69QsN6rMaEtTIAhFDAJJgdLdltfOBzK0YHGKO5hg | ||||
ZTZliGvJtIN6ukjScKEokgcZRhRBRmpk+sbTFs3rJJeRw4mGyPjkVz6/SYSL | ||||
ubMurjuYqaKdyu4QDcVlkssuN8gOSbFvsvmvEtwzm3+fogdQDb6/2fe3Gx4/ | ||||
7na8Pda9lfeLP7pbH/F2OLrDEDQMMAxxMQ/ertebLYKucQ/1dhFMBLgPqN86 | ||||
IIgNvA4CbB0Sf3x/x2SeJX0rU39Yb3/onnxbcr9q7cUfX1/++fi9n2cd134C | ||||
mwYb+vzGGOaV/vj5b5Ic+pvm5g/r2K+tcQgSo+draK/Xq/xsfkXm1c3/2MR/ | ||||
b97/1pL5g+5/0N5/Hl19ed04SdvvD96+7aB+qarn4+Lw+f7WD07y/pE19ls/ | ||||
/L+60qa3c6Vd5V8rbeNUFBHOmO2dDO43e5ebYX4p2x1DclQsN45NDtZb6Qr9 | ||||
qHb9UemqGOT0XroePpSu0FvtyjmMiCgGuxVZJfMLrXLy7Hqxtcpbo/HJPsMu | ||||
T4yurW1lmrQZQxxkQwSTiqDSnkxY4coLM4kDGBhUQ9zIzAVRGBa1rn+7DwD9 | ||||
tUbAb+kDQL9uBACF6uLAnC57qXREMKoA0ktRJ5IB9AvUTeD6qZypGEUeLhfo | ||||
Qsins4msD6d+3DN3mDlNx4uHdmx+7iIXX18fe3Xf0tGeQWzZai+3UNE5LsIx | ||||
t0VXYQtSq+DsE5wlbGpz2sOH5riu8Fx72KwyWWyzPR/WeB0M91NMaKl1KigX | ||||
HTOQfBLMPu5kaWtDGK3YU6Avo4ZSowgeJE9yd71vrlSJG1EsaB8xuodHR+sP | ||||
puo9lAhe1RJ8FkJejMNMLKFHryehOdlT1DnleSUU/YlN4xRdy6Uh4inabEjn | ||||
RGF5NmUk6efM5objJx8OrcsksYIsAaZMG9JV4fagaDP4BgnQW2Vs0vPFqQpD | ||||
uada3UrYncDEMZaMIEbs4R6OG0ClB8+qTrIIUWUjlOebtupZA2E35T1oaXIA | ||||
pYWr4LJQvuytwcarmDYHcq62J9KevVLQSRZiGVKVyYGn8/dUIVIyKT7L8N9S | ||||
hUN/oQyPXivILM+QVkxpTVmdiT7RvS0Ns/ApvMGXw+2Q9zLUGV8ijDmdqOK0 | ||||
hEPuuKIoacK9M3s4s8eBsDh7EPliFHZNkx9Oe53d8vs83/kXG+K4PcWP/kax | ||||
puzxGKP9oU3g8ZLAaPAIZFzbJj7zN8vTLwfqb+3Kb74MCr2+sPLbe56v+w/l | ||||
PcxcP/zjfIV94TgZBE3Ytr+8HcT/hzYHyfHzGyy+WqBfJAGJwn2+qnieUfYd | ||||
KL++5P9dDnk7In0i8t/siH4543mf9u3LW+7rrercDcIZs5+y/AiRX2eQ8xN/ | ||||
EY9/VC//sOs5zVjchF+wWIFZLgwRJIKlqswGjDgm9VTVFTL9D9v1VKe/s+vJ | ||||
TeT5PXUwN651LWWW8B7k5/YCPgO9UeL1V90u9q3bhZPzDXQsPTtf3VHfY1yM | ||||
ctetkhfE8dZcSvhq3CL6jhoRuYKqQF1Jh8rx9irJNnAr7sirq+4ohO9lk9uH | ||||
utEDEqRE9MD4zO2CbY4nK1sy4qHd8Y/zYEN9k1wCJ3PPINjM+kz6t+M9DBjK | ||||
X22aCWUAXnNRu2R3J5nr8mApwWi7JHGDVlRkzWhnCmIq74juOYZIWh+vGqar | ||||
+JwD1WAA13hcF8mDstaaQ4aHetqrsjvSp25okXp3624Kpa0HyLG3In0NfQ65 | ||||
7LnERq9NIQzVKmUPfF27ih1sVhe44ncnLvSVHb7BxOMxiAxZT4/asgppqEn2 | ||||
znDQQwCt9mEfbs7y3bufriUlV+wlc/eUKUo3FZlOyLEm4OKatfuDOogMeSKp | ||||
EuXvwJX5dobSD11NWibJgXthcAzo+cBcSZmKqzi5xZRzAmndICmZQp/PQOzp | ||||
ZMuURbHrl71PgtK5FpId8jN6sZDB482BfU2WgbkGOr6IT9p/MgVA8Qfo16Dt | ||||
kd+B9o5ox/GgwTybjHaTZvWNAsSCd3J/IiPoW9D+233W79us0OxtPpqnSh2p | ||||
tUtV4iZa0tWeSUCV5ayPhHA9saflHaOC446X9ghRuGK7oa57NcDQpiQhSSCr | ||||
pb/G0fN9PNvWniBArYrXa8c8yQ9h+Uiwkowmv5zyIsBs92wJMRoK4lUv17tj | ||||
nkgQi5TkXpISxgs81nfsw3r5QM7LoOfH3OpcBkYYx+lv0qXZufEouElqa8WK | ||||
JvxxAzRcK1A7Eg84uh5PMbZkagBmp0qeCFZ0Q8ylBYFK1PRo7sTjzZ3i4yW+ | ||||
HZgtEd3QIy8Ul0eLcFASqNjk3AgWn4bMR8hD7LirVPf8KW1r/6Zsaj5MmHWL | ||||
YFc5GTjgbB2VKsueZmKFXzEwVI+Gd0GjWEpDU3isOqGfzHZyHvv4N/VZP+aP | ||||
OUkdn2ejz190sJDfe6nv6WJG8Lmaec8V1dvNf6nx+sps85vvz2/bfMgZfyNL | ||||
/Nd3VeO/1lX1567q9UNXFSbEorSY2Dre1i4UwUu9S6+6omq4tEoUnFlm8A4v | ||||
+yxrbyip3/Xh2tJKuWsF00UfJzPb7lXsXF8Q/EAqgwpp18YnKNdG5bifWo+z | ||||
qRDruQTJz5Wdcw+9MqnxtCS2sMxNq/B+jI8ENpyXE2p0oHBYO9AGbYwUQCHA | ||||
eXhnXxTOZNWsXcU387jmH9OYt+r65l4so+82ejPSdSiwnOdwNwrtG/mGQo9G | ||||
3NMberKaXl+DeBM8KotusaRsB/sc3ywuStXej+hiKZ5at65KJNhExFW/eR15 | ||||
3g4b6D5FZYwTCCE/JJEQsAyVejYryG6/ozrHb7NdYI5ET9BqzI43LT2XN+4U | ||||
16edrTDmstlAeqhaw63dfeyqchKzZniCRPrdrt70m2ptMcJm6kOjS+vYNfAe | ||||
t9XlNVHF1RISptImwhJnxP3KW/EbrxmEMUqQ3Z67HwRk8uK22HpxsjemTbPc | ||||
+46zzTZtU8tnvMOnqwjtWUGV6E07CXh8OUtWI8YUWasdIhBGiu/XpQSMPeY1 | ||||
xTUbx64okzasip3W7YaTKdMUoZpmW3JftwHrJ8tbh27s7e1OlvnuQCOMkLKY | ||||
JkUgPffe6sArgj5c0CCfQFrHKmLL7ZEEanGhNDVxrYXnqjXcwJWCjVReFB/J | ||||
/CjKh8BpVwnX7h55PtiSnGdlAZxkEmoGWVF1uIcEH5ePaB8ywXiOxXDVn7vs | ||||
RCi+dvL68nZjRuYiX85YMr1alLutm1x4jnemQpM6nd1Aw2rdmLVxEa3HY308 | ||||
TVt+ix/91nBkHMAr6jpqCXh1IHiNcRKyXlN8obRZEVs3Leyfjy3E7MTMUQ8g | ||||
H+u6ESqs/WC2u/w6jn1UnbGt6oPN5PqezGV7fbVOeBEUam8dfX+7xyLlbkBu | ||||
D7s7h1LdUBIKErftw4a/pJlMPEWmN9uHlO6i9T7nu/ZyWSNdpPWMmWPsNZEt | ||||
zNtBvFWIhGhzuMFfkW27Kxn2cq/1o7EPKOxIeqvOGQLvSuQUWl+RHfZAbtRK | ||||
2fEqsUNV3DxCq2Mg3Mxd0I/RttBqJG/E5chzwrnlmQ2yafyle7sEkk+v4V2I | ||||
iZqsG4jDlVNBY7USVylUKEbPTKjjzV1VcssExCqQpHy3i+8XjFC9a4GVFNeb | ||||
rbo9u66rZ37LqYf12ZEPtFKf9tBSOXDO7oY/9vvT2WdF1Vj37M5e+S0lBaVp | ||||
+sVhWxRtfXZOx9Mgbnlis5NOcR+PmewcuhCycs7O7NWwrSfJ7qxmUz6I/ZGb | ||||
7qEetYhXO1SKnE55VMHtLaHK1XVU7tXFVMiSJ2XlNkB84gcnC9/xF8Bp7NMq | ||||
PA4qIApEFje0saIG6chIGZ5tnfgeHVZBwE7WKRZWduOWo2CsDahnexnBlyd5 | ||||
t0miQ7fGtLk5aksIbcrydFhG5MnftVcBudjZLQs5Uo/Rpqn8RqpLbSlR0EVP | ||||
3VFJSAkdm2hpKRhG4+fjrfDIXd/CB8RgPVKdceICKOigpelpuG2orGYVbqxG | ||||
H4fgE1I9qo2581MhxfMihW+Kb9ThdndZrUu8uBCiXnQIH0VyuyMup0izDS1g | ||||
87XeYSWdiBBB37fXHXoQHPsWs2cuUtdKveoHfTKcW3i8LYXyuC9RqyOD8ubE | ||||
GjmOQgbHrBviWoYTIQQKAuBF3fwF8qvmcEYTIzjdh7E6kVsqLhsqZlnSAdkn | ||||
jilZbwfpdNlfREckLZOhSJGGKGrUxz3CyMrxgj6Q46bqA2bpVSvqlJwCJKu4 | ||||
rXda49x/Fx1VYu3jRIBuNnCwCfBwgwRoFISERwRwFGIhEfkIukZQJAiwrYtu | ||||
w62HbrAI3v437Kh+YAwfuqrvlIb9+rb73yiDv3nv/a+/GfR269fvGYOxv1H3 | ||||
fnj39h9b+jIjnN01dpvBjXrKdKEMUUIhXan7H/eFn/9/S9+8MqtleafKXj1i | ||||
JHfaL7VqqFTm8ZguGFwgULbfbiqQBvV0n1m3oRtW/uNUwx3aM+u7daHwWDWF | ||||
FX3u1k6FgLzST0dpv3b6bX7BbkK+hJIztRS75HoIxZ3QxVijhL1db+GV0Rv6 | ||||
w95qiIiwNt/hFZaQp3NIbktn7UagbvGIXVicITwuJw1eKbc+RsmbnXu3nSEo | ||||
Pn6/X2Vz7xbO6pzrqBEztX219KTKfHGT+fc75cjt0KEItIKF/T3Xh7rSsfLk | ||||
k4+NFboxPNLKFTkTZ2LsVxvm6l88QESzfbRVPFnwZORwQe2tn1gRpLDeTcGS | ||||
U9+Mq+lRZG1/i4tlJHj1fWCS/QFYvLJWV3IFilpLXA6JWdXd6b/z0teMvyt9 | ||||
UxMWzhozkpJ2xkn9OGxRDHBiZcP8w0rf2MzQcj8+5GqwKnLM1LuEAeXKGRIz | ||||
WwFBWRqV+0eN9HC9tmNb1SlBxJjIXqEHBmqjxy7Sxb7FY+t82Vi1HPYquRPT | ||||
CdToS55he7yX7iGrabZT+A9+GNdy5AmI6G1M/DQZ0LWm8GUwrcnhEsoPlbFq | ||||
oqyGjlxlhnrTYrzv07sTxat8G3Hl6tQmmaC4rsGcWbs1UcAMCVzIV5t4Krx7 | ||||
ElxB9eGlaOlsOtINtIzdSsQ+Pbn7i1qYOV9FFH48DoyG+YnshGGsn0jIWi5V | ||||
UaqFJl5ZbIKOaX+M6py82+vEuR2r9K7sL4FxNG1DV3cSuiXosfZqftkqarm+ | ||||
+QhUGHaGbzVBac7SSVoe4It1QU7LxCL/rtKXCb/kib9a/Qav+/6LCuC3Zz9+ | ||||
WfpvZIv/1iWwm+kFluJ8iqKrEiLPZLHlC/qGHgVBuTZ6ZJlFEWYKikhifnYN | ||||
esMQE0c3+iZFjy7hxMJIbk8Rvrc2Tg5watrWOxkvCyff5c61PoUexpkCmq55 | ||||
uUOvbbhm6hbBtmFTGIS6Bfw4ygTzamq+uxmLmqUg6owyeVI4FR4yyX3TYYE9 | ||||
0ldFMPC1jjExrYVOb3Syj0zjcik/TlkdFITlHBKVVKtQcSCJz8/DNTyPS5y7 | ||||
jRO9udqrk58vnQNdZ4c6oQZGCJxtzRiiuD6ebcTeSLuVryqP5E55rgllqxvS | ||||
DkE7md01ibKRc3BY60+bmqOx+2F15ENrxHQ62uJBX69Ilb21NGll3lJm8JNA | ||||
XKDrjub0vEY+lsBM/CgtlmFA2h5ZZ9nuDHlYWsK6XG5sVW2asS7ag6eO9w0q | ||||
QgNJmpa0q53xGhCNzqhkR6kxl5wU+5JYTmYs4VRoM1qM6r3s4MOIpJxA0WKV | ||||
lLJutVtoxSzTwG7MMNpe1puGzqiHLcAxYhY6bxcVMEiYnLEKye6OnKDqXmJL | ||||
mUb9agwQfbKbAVqeedpHlpV9X3WGtdG8dV1aKrEvrcuSrfy2bYatgqucyKlM | ||||
gp4i76Bg1dno1rh7QqtoBSFScijd6spNtn6pVtfGV66XPVFrgU56Tiup+/Xo | ||||
wGN9PQgMzaQV141LC65upuPvkzbuITpG9K7bdVKs38nzqmCvCh6u7iSBrEiS | ||||
liha8Q8TWx7iVz2JhoaMUQw9ZX1r7ykJheZfn2gNZpfsnSlSbwCbhwZmaEMD | ||||
KjzpzJWK0pPile4kqN75OKHb+ojAkdqt0yMrhPYSOlukbSiNghEykbHTY4zJ | ||||
TbvDMjK8UtqG8w7WbTpc6iO1KZ1BF9kd3ViCYe/BZiznvrQhjkc0FMGjQgPF | ||||
0h694ts6zLfpWL+qdis5yft+x9HwOmrwTd2KwWGok5TpjGowlc0VqqNqty9Z | ||||
R314+caIZeRxJG/NyTDjqFk7CeAL5tD2kjCm0ePEjn5j3ICfwHFNRjwcFXdo | ||||
9EZbwlZx73fC/pSOGJodNsTt2N9PN4laXlQMplYlh03eyN1rtygl+1q1leop | ||||
m3QzUiZkb1es2q8Oh5eWzfMgWKFFxnq8rGLqQVx5tThKaKLSt6nQ9rt67MvN | ||||
zrgv2Q2yy7gIul+4e3bRA5Te53lq0jfHuEsb7nbYCQ3IL8KghyfuxHY7l7kp | ||||
+NUmvOORu+PS0iyV+MZX0IHEL2euYU76cXSDSDlf7m1vJ9P+4OgX/npUeSEW | ||||
t/s+uhwYBzUZaWUAxnQ7XWaJGUaGVI1+3G1j5FNrbernfsPe3JpjukLOhfWO | ||||
xw7Ko+8DfxX45drnLM+BPY/nFHy8pBQ97DMoYnjmvhu8LSfG420ErKZAs+p+ | ||||
FQCrwBKbgGM9MTaGYbQOrF/3ez522PC8WtdjvXQCbgVd3GXon9cYNWnIOeqn | ||||
Fr1SBd3rKOMK8cPvLWsNosfR5qrdMsr7bfMIOhY2nDsTNg/zAmV4Yi/vw54f | ||||
d71zDeMU9bnQ12+qhqbh7fxo2DvLJ5USsNSar4NDXGEnjD8Gbkbz68FHoV1V | ||||
XqsVnBY+qnWaFm0KR3CNEYa9Qg9X8LjsYNX0bprc2UlxTs8J7asdRpl+K/SV | ||||
168hMui93Vo63JbxndSZoO/djr/Wf08JPPgEnOwJWIu0/EH7qRnZW3cTYVSV | ||||
TtilXQl9HIer/y5KYMSPdiiOEuBvdBuhGOaj6916vUWibURg3m4XuTBG4N4m | ||||
nP+KkDDE1/DOi/6bl8DvpOFDFTx/yQ1ZL16/F/Z5gvskI2+ae7v6+w9ft/vD | ||||
+3cFv/yetKccgJp8PLl+/oalj98kev/u+Mej5D///GX4y5HBh7Hvv2b+Pv6R | ||||
YP359dWlH34P+PU7wObfjFP6X35B0VPY15e/ovQefsrC5+8E/fIVxNcR+h// | ||||
MvGqkPVvJ1xP9X3hWvaSBBwKVOccTn781ohAumBsx7JxEnbzfbVB05SIf3MP | ||||
RNXz4Py1Eg2fCdlM3oJvXozxQe0z8HT65SGZPMkDqFRE6yS10HE0XYq40GRi | ||||
0DF4WKfbxlBN47IhUG5srreQpvQzEgw7cVMSpaPsFMx8rKVRdPPWSvfQbtft | ||||
tAOyOusPnTpcz2dcL7bLVbnJuWuzVW7jybP627jZjPp53AiOGTj+WjPKcuTY | ||||
QEtx6IGvg4l1z7nr7SoLnaqSX4lnDVONdPKtvVqWfMnCqpbm2Ljml6nmbMIj | ||||
ZdbwEg915WJBy6tolXfC9QKuvhJXxDtJ15XQBNdwbdBBhrlEq2cGd7mLD8oy | ||||
g2PmMMOdPtVDSlu5HYoQZhBs5WTBrWVmkZcTl+iHUhtIitdMkE90kyDZNswJ | ||||
hnuUtVPj5/bkh/GJu2Du3ndUyA6zncjSIhlLeOFkEm1Mo3ImD4+QG+D0ahUW | ||||
mnWMW/s0xodV3otKWtcBQ6AXUhUeWgYhmWSi+eFW6PsNZqHG7u6KaFQReCvB | ||||
BV+5zHRKwh6jvNMyOAcoWm/XMthEfWfgy868cpB4Zo+bM8F6UYGhCK3Bueif | ||||
aXMsHt7GdaVrElOSwXuXVuqOfUjs0IY5imQjt2shLPFxA/n1Mtrt/RAWz3Sc | ||||
aW6nYI0+7ikO32fUydpWDu+XODkYMlJJG60JRGZKk5DEGZGilpIBoXuHUjGz | ||||
ajLf2Q7UBSt823K3LBqF3nZHBxuPWk77vvcom4jQkV/tYV/ntsRArP0VdvKg | ||||
FGW5G9aR6YQQx0d/OAxXv9whIQaKQfcOxpKVtQe00KbZvhl20vJMhg554CwU | ||||
4VfMBoYskdLodQsgSqA2V3y5iZSjf0+BG4N07SjABo3DkVeP6rKSfty2jR9p | ||||
+u7+6H3yTm9tAkK9HH6wfqCObdFXmbDb9Uvash5XUMogqJ5JjmF6g4+4MIWN | ||||
GnMvr6bs3JhJrtvHeLkW0J7fnhKZOzXGSB4GOt63x1VDRtvHMeHX1ZI49Rk8 | ||||
ppQoOsNdUiTtJB2Wl4N/v9yNBPGSK9SYUXaZpvs9HW16JA6+veapsiJGittP | ||||
op9L0QGW+d7FLPFm2WtKvCa80fXY2UhyTegjSG1rJV45jUIbF3cXIgwWD8dt | ||||
z2kg1TsBqUdL2DZCTN4BGuwqKF+i5EYAtfx2o19OR6yAKqNbuTBjCNNlt3MV | ||||
OVnm000UaMTaTGaQ6SjemeNeTkllY3RLLUoEUOhn5X4nBv4lkNeQiohLk1lt | ||||
D0ScPBQ8SJANl24aZiywy/ZBIQ+ud+D8cC1Zcbk5NsiSIqQ4Wpar5MF1XfSA | ||||
kP6I2L7QwS4aUw0W76KBV9o2GrY6FmOJTpiMQV7U6n5wAcxma8PJw4szpVeE | ||||
aNv7BoNuDXJ2tTPx8E+0d4G3vc8svX7MOftYrJrkHDySWByD/K52wcSU0whb | ||||
HGPc46tJKaFW0FAonxmMzKzAUrOcqlVfzPY67F7WnJXj0rXH1rYDGKWolUN2 | ||||
GNu+3kxizeRTXu85aehJKNdkJzfPSVklMlvgWDOU3sbBd7HijSNirgI7XbbY | ||||
efQeq1s6MPY1GhOLKpICiW9JnN6hUk34rluOIO3S5144ZWxWnsKTAqP0FlB3 | ||||
OEAs9YriBNdhQ3XP4a72M0ypCu1iJh5dcpCdcA06tHNe2Hws4qnBjcFYOecJ | ||||
Z048DMgfHPxt4jFIHwKE7MtDDMkyMomy9LFkOVY48RQRkLFobkvwMEOqDS+M | ||||
Crp73LoO2SPnu3VyFIi6iDI3zSXdejVJZcdHO1YOYj0YssctkQzr0QNmcFzF | ||||
kcZgXmkbJLnrb3umFWyniWwOkq4iKojr0l0paTLUflcl/qEsqL3tl1Ev3JdZ | ||||
eSTk46Eb+o1cIkNrGalQRVs7f8ilcxqgyGuqdZkc+nivIo5GEVpEmpVLJh0X | ||||
E0h1UDubraYdbx7YUS0uCaHhaU94epjhXpWhOrQky8dkM2h8SVkTu6TwCt25 | ||||
WtsFGwEFJYDGFKakl/W57dpM06VCWlkNfzGHctzdFGYYIYZKu6hs5QvcVBYb | ||||
bhvboIb9jSoDP9scqIrxlCnwGmdYhstR9fbEFGmZXGXw4xyV6TWFasL0tCBW | ||||
1mMJa9LAYT62Oa+1gNt215NQKKK8kTYdTUxs2iLINS6IQ6geKIIOkHpk0SNk | ||||
RbmgwPFQMxwS2gRm5GZa5RcZ2wjY1QfM3ceqXSg6Hd3U/DVpjZobfDmGUcu1 | ||||
rVBgoCg62AA5JtEE8B3ReBd1psmqpr3pbDRDSnMn4T3ZnwxdWpH2YF6Xsnc6 | ||||
J9mEdyHKnRtoQPvMQXBUvNQJszkHovqwU+cW6RKdaBO+2p1cv7G5eyTdGr95 | ||||
6OtUkMtHAhDFYg2lE6E2s7batumLK4Y0W/hsoALNKdwp4inP6M4EGRx3480l | ||||
XFANP450aXNx6CEnGOFWVBpPFgSv98ftwQc5I3XhEcdPnjFZSbrdBWgSblWx | ||||
ggfBTPljsmt3xDrPsu7e65Um7W+qbd2xBKrJ65ZsKQrfK/fYPu6QS/dY3+Xg | ||||
OmBxPZ38B6nvUVM4xTD9yFOVOZjHJSeQF4Q+KvrV06BKaIwUMbl0tSSSSxGe | ||||
/HS5rI/3G13LPS+cH24eoOrBLfi9gigPFmFGOQx6t7KBy/THAoox7HAMR4I/ | ||||
9exGpxR6HeTXXh13AR5ZNuvUSX3ojlHbD+cpKCwP6Un/qkWno1IueytEIZCr | ||||
L2lrS5usJrdg51od6Pclxh+wleqcVNpwL/LoiBZDXPV1bGLGpl5f8f6GHBT/ | ||||
QBQ45OrVafuw2oqyq8kuN0TEY7Qc1pOTcXTd3E/DJQlsr3sUhPpYVWmeA/D0 | ||||
a/JxXz7GLrEgSn4s0wzZs4FHX2FkO1zzlraUo5XJKHnWkzKrnKQl5Bpr7jFl | ||||
p4iwj68MzFT6gWbhRwKteKW0S9XeHJpHRIsMmxj4YXTWCrslxmTTYVWO423J | ||||
TS4ZJ8HVQ7ibvyMKyvMzVDlIMaTnh9WOv3W3BzsVaqpfoiICteT2dnVoGA9w | ||||
rSj5qGEY02LWgD173kOla5TdsLDTIRtXgPaqrVGqc6CJw3qvAPKZUo7Dj7dk | ||||
eUxRoxUn+7A2j4CijSjDuGyEj24+XmA0yBKuLRIGqhtA+Qh2o66aioNH01vH | ||||
dJiwsUEUVXXuZVAGBS19E+owz+Nzs9qu7fvKlojggS4v1PUAoauNGMCr8bw3 | ||||
tZoRBQEv0TLm0CbKbpPqAoJDFHuuj4+wKeOlMrbugRib3YrJUuTan+HnUaAz | ||||
fFMf8CUYs+aX5pETTZ7mWkJRvs0Z7AC8WZqfgV4PDaBiIVWKTAOxph4ON9zd | ||||
WKQ5WiLjWI6NqTHv6ApZ7+viviEPyyNGEHBvI6PnQIpvDPQykbUzLJQw15Pk | ||||
6E2BrlGk6/gJssT5JDTxcdqJFys/FMhRER6Zg6eFeIlyI7pBR3eDaje8XWmP | ||||
vRjiB/lyQOrrbcXJ9YqrYh/WMcAUPPu+xwjBw+OOLHkLPyIeHASEd+chxSNv | ||||
MJxsm6VopQJq4hNf+bXFWFqchrxItxcYFu4PVJLkM8aJV+5MG054V7VzOU65 | ||||
bkOOEz/qxrsOKO3UqqWFwlHcuGy3fZztDZUmGg+4rDimLjaaCHxWHYOnpNoy | ||||
QylXyS0/QLq9yYXV7ZCO7iYeBv4e1Aigy362OyO6oSACN1Zo6PFSjNKtgyk3 | ||||
61r6Q70+DvLKqEsH2qbwuqvvaqjhmb07NHoYP3gBR6RhU8hnNBC23aM8d0QS | ||||
BA4tSby/3zo4l00P7ohSXM9Bu0TNtco8Bo/UTfYr/mYzZ1BGYtReCtATEWLt | ||||
dX95GGGNzseZZ/Qo94y54wjcXgVEyz6gtb3xEH//6Mndo1MLiTy2FjtaVEzg | ||||
1JKWeEwa1G2LG5lzzrMbsuVo83rnSolOLVHiUAW684fUUsXj6ronFIyvKxSw | ||||
o3yLTArHO7vYIbt7S+n8SVfNYxw5/mOda4+Kyn0b7/LtZQ8lOQglRkI2fW6a | ||||
vNQcAQ/B/d1KPpOnMNal+tTbeiRLmHQrbD7cXYdru3u4J1fLiYgTdAiWPN7c | ||||
yO3hofFXa3WdrqZCshYDkOFIn0ucXd0C/MAa9ytZDtxutx6JErYRZ/KPO8Hy | ||||
M6i8+OrK0vUEDZcc6cX1oVzhknjjp/16Q5F+8MBtsntMppNogeCKXTG4+zYy | ||||
GtSghxqnIfsBKoYeRVcTlub1qTmrrn2K7jes1RU+4LG1cXP9S7yWsA1DJH68 | ||||
NDzneDzremfZ4xXXIQVH3WIy1IeHjA/MHTDxsOypA41eRT1WuPTqcttquB50 | ||||
LzbarbNrb05AuzkOPy55sD+rEKuv+pqjT5ypu7ltK17Z3dPTDb9a/Z6blpQ9 | ||||
HS97ZdMtN3mF6XlsOOvpiHPmiWVR3tMFiKkvZ2yNML6llavcLXHAmFb5/Sbl | ||||
aBDwVBakfVsKjntA46Bck0htJLpcyFTrp/Tyyl7BBGqzg+1E8H2DsXCAPpb5 | ||||
LfrwgLFaHKiauHhugdgwuOe8peL2eQ/0YqglRc6tEP0CLprpX2p5hImvHfKz | ||||
SVYyTSYndZ4UIgVvG9iONNGhZpZrR7/C5dhz+mY6bYVEGiO3ake69i60dF9l | ||||
+qRcrHsfuLtH5C57Vd5Bq4GmiNYKJlg2KpeSBetBJPfUc8QLti3lZTOindFL | ||||
Uq3us81ObYsrBQe6Ykjt1IqbyIWO5rXNHrUobFwaaRNmp9aJqPHOpF0lFD3u | ||||
R0BD1lh5auJzZ1w0QrkYQRgudY9yvBvbrSC2stJqiIBb8BrW6Zf9qSCIUCXO | ||||
aYIL4+k+iFUamMmmojk1Kwf07IxkLVqq4A+EQV4pyFbuyzoKhF2U2sQgb1f8 | ||||
vThpodjWV5s2S8AS9ZNI1swqWoqrAOHWTl7LO2mw4QOvsRoBqRbIhNxug1YK | ||||
wR88JeysHGukR57p4mqbY8v1/gEUVhQIdlzeKZ2Nrf1KxPliTwJy6VGQMUbX | ||||
Mkb5dL3M8uY4SbslDdJ3JxNF1Dbo4zyNK+pWDI7o7m9tgJ7vKn/TwUUZa5OO | ||||
2kMU0WtLfh91SdfexbMJeO9tWjer7DzJuuapMTFq201yR4RVYdO5ebWmFXUv | ||||
vbx0z5RP51CuFsXFMQRZcRvxfAkOJy6Nts5B2FnnlX1mz2KpFZ2ipVIrEdiZ | ||||
FPKt7ZXWiafrA5yECSTaGyXNRiQOCz5HXC7TT4p8PzC3EhEPjCE1onI/5ld+ | ||||
ZXHloeiqPXfsLk5blgZyvdqHAdqcDb0Mulg6KcHxorJpoO/rQdTxXTQ1NLW2 | ||||
8mFs4ZSPgrZXEt2tldqFA1nFuNRaR7ceeuyE5bDTbWRVEJfQMZWD6ofDwad3 | ||||
LC6SiOg21zhzWOSAXbx1FtiPM1Fvjkd1kHq+cBMYMqSCwUDa3VIir/LGxCHn | ||||
trK1Zg/qSf8QLh/tXkMarEjFjefLlm2Pu9jLEXtFaywBr0VoLAB9LRlt+XCw | ||||
5nq0mP1xdztHKH8n8a6h+abs0Mrbe/mQUaEsjpnuB6dSYIuxbsJCLSBNzm3H | ||||
laZsU1y7emfddnhd7mvYxc7Jqg1CWPLV/4+6N1t6VTuXBe95CkfUJVFF313S | ||||
9yAQIOCOvhW9QFAvX/xruVm2l7fts12niZgzYk4JwRAa48tM+DJ5SN3pxbnJ | ||||
9d61vWEdvfkQ1vrB9ehNAH5FaHnKwsjSzNiDkNlYa9UkYlXLZxpyUTPZxRec | ||||
qBaRVdeCeP09ve5pHg8cRXdn+AZikhWRnSeHQoCoi7XUQeiusPkMZJNRqDFy | ||||
IabJDf/8mGStPjSYzYSjvzzhAyvowjsWcIBbs2vojutpVej34kkLJyXKWFmp | ||||
YH0pTadm0zFzxFAdG4YfSiXJ8OA98T5+79dTowDpZkfyexWiTvCm+KosO/k2 | ||||
PueYmbh/LbXABvbNgvnOUQcZuk7w9FfjXlRSrTSvGzxroCNWvlDEvjhCHX6e | ||||
GitUpdRHMyaWYhUjWI0f2/gsUy7YrjQ9K9SwisrnjVLVbtJcvgGPCint+U1b | ||||
uxpyUxELMw9S0JK+abWG0RIJ9MKjLN0TmXPFy3rjT7pXZypqF2j5N28F/Epe | ||||
Hu+81e6ZxelQgF7jQt6SRz/VHJFT3HE+6njy/VHH4Nwxg4iL5UbjJ3UDl3ke | ||||
CgD2B00py1PRy+kWWTX/7RfjQ2BqpEP4oxYpLuIZB992dY3DpxyDQ/vBt/MS | ||||
3WefWAUBDK1fqKK14BwEdqFvHIGQ7aakzL6kmZ2UNDeMVQlVnc0UgySBZ71c | ||||
ae1gcTayJ7SWAfmWP1z3hVdHvgQD/aE1ita5ayP5ulumn96eoHjpXMf0debB | ||||
sTVpg3Vr3KUrL4WbHzDgjwiGqdSDuvkus1qCihDYi1RtdcxPR4TZHXl9lRE/ | ||||
ISRHgkIWEu6mZU9hZmJzejMDAogDJZEQAq246sdKm0Czu+hMLeAmHM6wUUvh | ||||
x78+zTTijG367CH/1ZX/zgdM5yj4iqtZ+WATh2tZ2T/Uv6L/XWC6kSjpmufk | ||||
gfhQ2UkKD06FhKGdIQugsexxawapZ//6nsKtGaTaefJcJP6gMfOzTeFExl+2 | ||||
OXTWuUXXjcbvnzfVls1+95qSPuPCdnPl0z5/rilNPzt1WN3Zuof9xFfAEEl7 | ||||
pYYH7ibai/ucYY9SATSS3mflXK5yxsf1ABMetBnmqJpV1Iv85HAqZa/Mxtc0 | ||||
AfCZ9jvRZddIycQ6F9BadnmDGj9M623LgrtVPCVEwPBaxtnwhqfzifZ+UdrT | ||||
mxxG0AVCGoc/p4nPhANmpYIsnoMkUAJWRtWn0zaKnQLheeliohE1YWYS/sL9 | ||||
RDoo2WmKdAYCXphOJdU1U+9t/br08ekT1/LKvkO1cN9DYkGbJl7QJ3AxJ36+ | ||||
QFH+QgEfHfLyiXvr3ABu56J2jdaBB089CtPZoBGhsovHCRY1GYQk/jw4I8xe | ||||
WQRaOirGS31LMKntwUco6REGqEHw0GpPZEaq0li4vnY2Gez+8wrHS8Cg18NJ | ||||
wvpUNeEwUbO9htZATe7Mp5PRab4ZKSBMAvIR0sJ6qXFXqrjAXkRJydQrPfwZ | ||||
U9vH4/Fq/B3UVhfMh/m66z6KPsMMZHPnga46MJv7g67sSbHXoA9DkSIzYvGz | ||||
mI8FsJJ3JNltKtq215wKs9HeXEdUNdoI4Zu75HAk1kCxiXCqEZ8dHdraEWrj | ||||
Puuamr6lZ6XFhUnnm36rvZI44gzlwJvxc6AnpaN8PT8PqkpewAfZ9VWzZg/S | ||||
ICkS5yx5q6gEbjl1Iatcpi6TdWz2DYsU/TyClNeQhIArt7+YOXgTSgoQJYGF | ||||
VDI6zoRJmCHIzlsDZcmBxjA8knQecG+3bEYX6u8kZ6bpM+7wqfzS8hmZKzIY | ||||
2Mvlegd6nL81jFTstzkYe+UmnVvzAdbJLBdGNFYf/o5QIjKzT0PP2JeaZHXH | ||||
8/LEycApbw9UvfXkQD1W40Zi7tKH4pFQZiVl1ch7ozrlzsB7G7sm/Zt7IytO | ||||
w4aFyRwxtoUMpM5ulTfj2xsW3ioi+Hg4ZON0QH6ip7aq8Zocb2yTWchov2cZ | ||||
IImR545HxDcNChkuBAEdenD4GLHSd/MnU4cSg5ARc58mX2P4dma3YdRFUOxy | ||||
533GSDAKNtPUOH593C8ZBjgLiFFSWhx9Vq2ryOv+eMGQCYsrfCDkcWmK9ykh | ||||
hCgFaFCosCbMq+YlmN92Y6B38Ik8RqBBIRy2bz6KpmfrS25a8NMlTu433xnY | ||||
4FOGNfITPmXmgyMv7FQH3ZKG5K4cfXnzBr4AYo9BTYSrDo2l4+zMt+aGdtdi | ||||
FaJ5Gc9HP/qTLSA7KQ7gkmzgYzzdUD3R0lA4AyWSAzBqlhvjR+WufGOsjdWM | ||||
dXkOVbcujl64ld3fEuA+hkYviIivvt4sTp/ZefPiRHJ/c08gvE4L2o69rB6W | ||||
GlYuvBxkRgV1/QRry1vWbaugb1buGpSWm5Dqb9CNDfB0Rrvr2JJxAWJrrtP8 | ||||
4T+JuUzlXUR2azObs0tjmn5GI0vB3nJPSTRRnP4T1Cttt/eCEO35/fzk2RPI | ||||
A0SsuWlkFG4V4riB1cOeCIhjSl7JB6/mvca/VWLhkO8QhQSOMXqrpirFPg0D | ||||
Sy4PeCOoAMdTbCXh+TWuvHEbNj+mV/x+F5VtyxR8NrBAFOq3JrN0SD8+GVX5 | ||||
BE6SFERKyQJ7RvDXNBSo/ajDEO1gu0uP5FgYtlykVi1Z8c1JX0Lm5JvBPxvf | ||||
eXapz0MrCjNRldgV8PKiDdPDx7V4tabJ8TCEsevJpdqQ+0S76/AIMQIUvgVk | ||||
TFgVCrmqFS/5noQ3D8XKdQKy0Zsf3RsKZct82zGN6CHkFkH+AHOewdZxR4WP | ||||
EKeR/HgrvXAjim03LEnLAokL4sfaAIc261dHB66LSHP2OTjYg9MMfKq6qFrd | ||||
Hr0FiTW57rf3VjRJEE2lGtnI4VaAlTs2Orje5M2/3sgT/5mDdjc5+gC4I5L0 | ||||
4y7G9ShKNjQM5i08G2SM4SeodRr7ARUMah8Xx7aI7fDynmjO4ai8zrK/Td75 | ||||
TUPCHzMKuDH9c0IBANz/+zciCX625pI0Tap/kEeQjunvpRH88Zj/ZhbBvbP/ | ||||
cBLBr08K/btGj/tA/6EUgrP9sWLof7ZiJLPdCRhWcifUyUmwvh87bVR1evwf | ||||
nEIg/LtWDIF9/smKwcPa/tM3F720Jnrlf2XD+PMVn39kwyAGVoKr3h1Lxmo5 | ||||
vSvICvxJ3bQrtzycNlNA9ALeMFuSlKS51iIe3sf+bP0refssNjHgkVLh3FyB | ||||
Yjt1UKztUU30Q5tGms3fdLLQeI5uwFaciB3k34TXPlZBPbW2XI5nzZHWzr6p | ||||
J80LMgaKydTZTHkN6PQ6Eld0yO14bUqDOB5AII/8426Ng4zz+tE62uCEyjfj | ||||
XvfXJCwlWtYvrZc/ieH2BITp5cKAKRl0vPD5enFkAPF3I8EEg5wu4TGVeaNn | ||||
9fikmyJpHPEgwJVOR9d+6m/E5pBqNcaDLiTmSdn3by8X4xgDWqP5Du8iuJX4 | ||||
RKqepS7GARo9t/DIr5vUahpaur6r6iAdDbdYx/5iw9hMVZ6B/zEbxh8/4zgB | ||||
YHI2J77u37rjrvTVb/GT6Av519lpcuYvG2qOY5rsKPP8PZkcX+IOU7xlw69e | ||||
DuHXI4v3QpIPgc1/cVY4uChV95b0SywYfqCwxLGN5kqPhu6WV6ETzqH8OsoW | ||||
4G4WII2s33m8XbJZKOjll3/WN9ZNgyLXKCN1fxszZP0xZohjZaoAnIh8fKlX | ||||
zBM7n0pE3drN9h0vbDxN0HCzpye/xijM3/2xWv51YsgkYvnGCnuxu9v6oIGP | ||||
Rd1ESyfDmLvqZ81C3NZ1cyQ30h4KU/+xv6/3zMOvxztDHje1fytND06yWe6D | ||||
fwzfHCArPVNEgZjA1K+FU1XQ8mRq+Sxsf6WHvQEpSDm4ZrLAgYUe5foYwMTH | ||||
e0QnZ2GUoQbojvPTvDJJ6jPiFImlYwtUg6EEB5Xtst6ejrcchMvpqZLf3l+v | ||||
Ry/OPxRvReDws0En4L8MYtD1ZJ5cN4epx4xRiDlJzoqCV7jhpVwX+hX7WBgu | ||||
6iNjH6fWvprTR4RrmqunZgK2OkHKFubSmikpAzpNRv8rFoy/4MV/kT3wAw// | ||||
bvLAD4D9q7kDf0aF/8lZrsI7Y8MnH8g1BKMmIM4uNQvUJn5WkpMgjreO8iYs | ||||
qcNBy+r3Irp6nI2TJBrEc+wIxYBR3L4Vs2H5Nw+TAoA8Hzw/HPT73R4cmn7n | ||||
/aqxBEUowycCTBrVN45Qm/q2wJ3TRWVEaT7djEM10xJ357cDUAhkl0mfcpPo | ||||
CjPGJXBhBNxj8BmUkFFNeDXzib+9YxVtzvm+/en5nXI6PKLFfPsJMQKbHA5Q | ||||
9hNaTOzTy1FtSrL6ahtkbCGWkuHd0chaNE11FiQ+cOZ3SgcN5PX91CKhzqkP | ||||
4MqLPz6t8MVDxFhJ5Ihisqm7t9q7rKaEFTJ5/dpq9Oj2YVzrSMlhNlo53RAz | ||||
kitWC0B9m5L3lfy3lgsucyqk9LamiEEbSqzcR3DG0uH5y1Cy4XGtWn0cUbhB | ||||
WdIBtP/gj5qrGDavWH82FOQhgsVMEloix8cuKXSImCvK6o17RevDdtRRwwek | ||||
zkjm04gWA0RdtuOOYu/7vPHbK2q1MyW4k3k9CkMhnXPQSKnnxuf8rX33+Tqj | ||||
0vsc84bYiliv/kcBcswiuHcqNS5ntXiissx1gQ3xNeA3hnWmnjQQ27bYqsKs | ||||
tsZEHLB1lPL0ym9IWOwpCTQ4MjFPUn4eMo8w6Qki99F5xJG3lJCFcdtvNN/f | ||||
8ROyMasQMvLLQ0Y8OpliBVUT5xRQIhXZiJ3W85EOCtR3zamIxOCDIpSkhfeh | ||||
rxvNTp8sePziX/judDuhAqneFKaKyoQHBt/HzIqCj6QKkVshKTbz7MiCyWi+ | ||||
st0a/RyvdvKS40PTX06Wzhj8Dq95oWTeWvstWQHszeBLg7O4y+D3VDFocLQN | ||||
HiUrUygv1ssRB+ugmkGYyOhoZhsHR/RTXoq1fKq9WkyBvUJf4GCtYpA58ofv | ||||
rzqE2VM211+HDHNRh6257KQcC9WRgIjRGpdRkfpNtKO9twGB7FbeWOtSdk+9 | ||||
l73JDyZyU/0Ug44z6rbqwuvJfOVZP48HhVyMOpzgJcjp1dFiz0EV0D8pWZJD | ||||
AvZkWH2WiXSLnfy74W+LmfJPLKJp70Eo+Tl9Wgh5kaslyJ7rm95os+5Fnge4 | ||||
PcYuCVEavw7ZOYOtVU8BnekhiVCBzvD3iO13gT8zFNmcK/MFOsb3ZzStSJ2O | ||||
K6BbEE7P2tvdsa2dH+AIPsNkjfRVEiF8UpfR+HqBZXWp8yaLbiu37Zhs5HzI | ||||
NIbbh9EBDKUEL7upoC0k3/arQk5ufYMz4+nesuxvZHLl/i2SnFM9o+jEF8LG | ||||
P1jQD9EvI+Z7gMOl/XUKtRc4ypGwpeJXWLJDHeiBoP6syCrQNQmxDuRLxy+i | ||||
24dU47GJ7StvOGPp1IGVGIjmUJEgFn9EtLch3azzE73NbMBMDBu9HH2prq+v | ||||
rfbHf2VxBoZY8hJLmlLVyRKBxtHLsImT+ROjmIdu+r6O8UUPc8V8KZ+uZewT | ||||
GQFKKj8uEd7WIB5FzhdKWEdMSH5eA4/VeQcKBUZnriXGpTyhjHrcTNSRXDMv | ||||
2p3tPlARaame+js1r5qkyngDqTLMl8H7A3FA8iXKtIzibeQg+Pq+EqNTxecW | ||||
vBJ9eepu7i3W5bH2UhSavka4a03kfW6namzTt3pzJMCraPMzwV+Hlm7eSi+b | ||||
X5yD8r3+rSxXRgfnkwqUxxXZ3HycOCurUCddSx1qb5oW7fHzSKv/TbJcSzwp | ||||
kyRLUwKnsBIj4QImkwxDCxhGaLosbhjDkgIhMoZJsxLGsYRO6ZIs/ifaLv7M | ||||
GX7juPiVzPwrqQM/jOa/mTnwXyjc/1jewN+KXFP5Kg4Lylo7ZtFmLNUJvg6r | ||||
kPv/g/MG/peJ3HlT2J6zzIZTO7rR5uPmQqcwSq+jpR9MjHyifAaQZFY/Y7m3 | ||||
I3u2OUt76cq5cv7eE9V+OnYxrVb7QrqR6kVa6YWV0ZQBEcHtUrC3Xg4gIKPF | ||||
EoFJ35maFz52k/VznqXBArE1qmOQKroVyqW+lgemZ/D3Jlcavcka+a7vchdi | ||||
xwOAIeVzKlOpO04pfNaHQj+Js8kfWfP6cNSrhUP8GyGTz17o8nyy/SDvtXjp | ||||
UvrCMe7RRkD48Af3ZW6hdCZI3s6kmDIm1PVpncd1IRjG2hr+M4x8Cl6YIJRN | ||||
aM7aHLLqVzTVfMEB2bweiUm8QyPK3/Bbes9jkUkk+vZFWGisvD5uXBiKMoez | ||||
vgcFTPrfWuRK6t+I3Odir2Zg8s/4a+EoQeB8UPceqUaN/x8SuTyaAREtVcm3 | ||||
4kDhy1Ss1GLEXUD36oqal4qxX0x6fsdqhORr0iHI4HAUIcaC++hh+oabLzcA | ||||
+DC2X4F6mL0JN2DTs3tgaVaiRIy3VWo10wHEwzy1G/Qz5ywYKYjYVSkSH+sP | ||||
0+zRDqjffd+o6tqf3lSAlu8hDcx8rWrl6R1hXhzEHd1sspUwm9+Z/3p4eS57 | ||||
cExfi+sKimgBkXSwL9+Wuf2KstI0dEpcvWfVvKPPOMStRe3QOXt5O0BNoIBJ | ||||
ZUCo2T/LxsfIA4pKBKBEE2Y+uqxAWrLXIBq0OdzSiwjNqHrDDRGoDGKS34sY | ||||
hdjvhjPjdL0ZXHDQ7ulLsDrgs4mBmm2PRdviy9z0/Ub/usj95ykDP6jwP5Ax | ||||
8Eep+68kDPwWHf7bYhdi/yux+/MUpWf/m3yBGc74e8Weqth4J6C+F7bwINWu | ||||
gpR/HBAyvIgaXYJ5bMgaBO1K0C1Y+FqfQxJjNGHGitBYgnwfqJW+nu0H8L2j | ||||
8O0L7orS90jMLItoAks8jcmtJeaXc/RWBtIH58KqcBGUjw8fD3txdWYPZp2s | ||||
EJBNlyfZr2M44WiYE0WD+7JkIY8uKLXo6YnjaJs86PJrDLoGM6eW4MqWPNyy | ||||
ldpX7wjAI9k0lX9lCSh65hhsaZuJoFVnzDOXohPJQm0JUHsZ3R2+wGfwkZC3 | ||||
hJvr5zQ3V8trD9ifOxJk0QVOp4XRqBQ3b1HDpXO+uPF6x9lWo+kzeiVzTRzh | ||||
ksSO59gqgirsZKM5wWCAe75C/JEFf/Xgkv2xkQnrtKJ2KWWjD7e09KkJ9/WU | ||||
EEv8lBaReuSe0RU6CrjtkKl1SppFsQcrXdlkNlLxQG8f32MIH8vs0KgD++Xt | ||||
90IvPosXJt2g8hemFvb47Glg7ZogvuEH/mj05JLJ+vL7BbrsthePmHIH0X8V | ||||
G0ONJhwVLEwZgiR0ElX4MwSRaXl5QHEs0A0swrqDxXJoXA0yvKvY2ul9BAV5 | ||||
FfI3CuhAx0wyqHOvlb7hV6oXB5+4gtAgnwUQistR2aT9pSKD6ApG8osn99dC | ||||
FKi4IiPPcIKZRq8sd1Kq0G2ZpYBtUXVxeraY2zwB+uK9JqQ10TDy9uVumLGy | ||||
1Z8I5kYyt98CauEV+54U7q/5AoJJeJ8nzlpOa0ejXW0S8B2DNr1VT27fAuud | ||||
S13c1JejfLPUiBglLAilT40SUc3wggbR/fb3VtHno3WwmDcmswCKzWeKa5Tc | ||||
m6c2WM6D3RCUJxvSYoZTRrrp8XyaiM/kAxWDxIw35zFPyYOeHhg4RgQFZNXm | ||||
JF+k7QvsW7tsSxJZj7jc2/l1yEFqzDp56EL5zOOPGcv+ZkfwsiVvTuAr0SeB | ||||
RZw59uQfJ2FNEjKNb1/KIv3lQUfqFtK8fc4Ztc+G9Tj4VBSzG3GS8zeLmkPo | ||||
Da3dBgjKKwxeKwLKuFqJZjB2JtO2S1flEVEti0bSd03SeTCtdozgmkt5qHPl | ||||
fGxyHh7PxWSAtNiP1BFb5Nd8geYhQlfBPYfrbIvEy42v3LmIC8Yh+ppzK4/m | ||||
wemal9mVffJ8b4QG4EsitqBcGzzBxWtMghdOwyYZhtLLPp5dau7ES+lpFNeV | ||||
vdKzcqxhu3ERMThbC6mEL3DotrO3Z2bWKyZN4QAnS8tn1xM95Gf1kMXJd3FN | ||||
q7PplvJkN9Xx+hJeV9Czv44YBZo91fvNqlv8QGfkTYkyj0lEevVEey9bx9Od | ||||
MErXyaSv4yL1j+RiYA++9n7D4CHTmA+Q26HkUxWfc4U5bh7HUh8u8L+xvenO | ||||
2TOpNy6WjxzWgFzWoKWiJxgN8lKYi8+7xVN54LFJOkm9HPI0pfx18UglnkTU | ||||
Xm6begW0fLr0QRyFgnx+HTL4KpOsFt8OZmXfXzwunf9jyM8T2hWL41XjbJ/7 | ||||
tA9XUiZ9JTI6HJVWqU+7DbyOuron8jKj8GcihJV5lOwSAFeJUAnzFTQDNW5l | ||||
rjGsVzxHDB+ZS+2mVDNgi1eUMbPnKFd8MLDRWMTlDy3oHbbesA2EbKJBrvYU | ||||
Z1Y17eoo5Y9i1/U2kix1c3eZb37olcN1N7rwrPjVL3biqv5P3E28xa4qKlqr | ||||
vqP42UfdRKpD68Q0BTlUietnHSamLBT3iIrqfw+xy9AZzTA0SaAMQTMoU9A0 | ||||
c48PYUosvTltkZcFnGQJQuQJBpNwfr9AJ0hB/08Wu/9SwsBNRf5/yBf429vD | ||||
vyQG/NVNgT+/8vfJAn9Lqv47uQK/Pkf874IF7kP8bqzAz2n774QKkH8KFaB+ | ||||
J1SA/CVUIP/Z7v1LqED2O6ECys8tBxf+U6hA+i+GChRQTgKz4EAo7fy02Ms/ | ||||
oQKOprNEd/08sTAnF/HgIdg9uWc1PT5P1/Ydr12njRRrLu4rJcM+gOTxj8Qm | ||||
HtA+Fa+EHzg3WWRpwIT3zGKaBxJM+nYnOW8eWLz0HSqmSgOfS44+MF8ShhCY | ||||
3a5TQWoqycJWXpo7bBoL6tqT3rEthuqpEXVWTHbInGFVsqRTbOKJ71KdD4nk | ||||
I6QIMBEZpqGmVUEviysnWfMVPVCvjyphCkgb5S2JTncV1mkafbMsXVB+5wY9 | ||||
fI1mrpdEEQBQnRfMmMRltBqoiZ2X70me3yfFo4RQ3bxZo/05cUQN9kxBWjUz | ||||
QkW2EpJ80uwDUloU8LTHo4L6vaBIIUjkXBy+uKPlN32RnCRj4Otdf31EiZf9 | ||||
+qQ6s+EF0S80fEw5mrd7rAPH07j8G97jcKan54osNLEvKaarWx7JEvmMpxC+ | ||||
1d+TWiLsE2018YwC33nlfhRF2BOGgGFNjAo3+Zdv48+aGiIt7gm17TrGeFJa | ||||
/T70/YZj1/XC1DhdQYHJAmx5tzIyH309/RlAUnFhtBP+ZDp9WQ+vpJUX5z3h | ||||
T7qfuFba2DuYcFcMIXq8wt64tpec9pKcnonGRHiVAIaJaZP+NbcU8b3vz4UM | ||||
rJEOuZdjSda5/jX1C2jnnd7xeN6PkoiiqmqVRu5aRsC8HzaQyHG9CnXB0U1g | ||||
b7e2/DAI1/sk7VCsgSxn+PKf7XgLO/fpkx9TMGJqOeCjj3nkjY+GDHASzb9t | ||||
XDTeqZ01FF1yKzQLYV9inJZcmbVlTfIWV+cRuXKnsE/OjbZRKIOTfHseDo/A | ||||
mOZL3FTZzh/bJnAfyt3OgXWCmBZ2/fpKcl2gExpljEKwhGlQ6jFbW3Td6/Nz | ||||
Sx9PBFrWR1tzPobYIg7fEAcF9SRSZx1r0fONi8x07rxRr74lEZdgpsXp6czU | ||||
yySHoLRNqgK6TMoLRRgg/jU+LUVFQI3FjqdgwuTV+YRi5qg5eYhreM+keKtv | ||||
X+dZOWoK7X1YztdlgCRSOO4gOIs7kNDlqJfbJaif1HA4QwdbJSo0Mgb4ftaC | ||||
K2mt1IAbzQaY7sKvl1LBqA0wc1aH1INQsOcJbTN9+o469mDtNm7blQ0znyT7 | ||||
Vd1tW3T8lb7wNfM3Ln52FfOROi/wgTMdAvK1c9OAPpfhkCAR+RQ6exeU8fPS | ||||
IKpsDC3syCPYg+3DxQdaiYQjlx/+mOGHs/LA9/GlzdrqET2OhICX19NfIMNU | ||||
Ct3KMOSJKobs6FRXQyPoOMmVlI02Zg7YuekTCUJEAAanV+sLv3Z95apLmcYC | ||||
O5ysZCNindBPWkxrTHhQpHTvZeTeO4tXyN5QQ88XW/UNlxpAA9IO9yQGuaFc | ||||
o69W+LE8WKYlClJ/Pakvh9Bju3mEZsEjyGzGmjfd/acnGXUNdhAFCn5n5BE8 | ||||
aoTJnqyB4kt35XrwaVQ2fFLbVfRY8ZLbXB9nTC/ArdS2MX3KC4cx38oIFgCr | ||||
RxKrc3D2/LPN2DowsJrVmmEHId2DW5cuZ5AX1tAcePH1qZT64ECStOyFpsgf | ||||
CADSvzeOitEvAQLHH42jbvCPjKM/nwH+YhxtG/kjPLtSxv1D5SXjxVaVM1an | ||||
AdP1Y/N7As07G+SC5p3J4QuT3sLiwQJQ+Ziw5PCDIvUrunK0Nz5yyuRfGj++ | ||||
cDhIalhwJi5hzlNIeR3f7I9Gam4iFv7Is2ecA+GpbEYbFJ/x2tCvwgl+5QSi | ||||
jeSxsnVI4FeX8eTrBFnCNjumBAfp7zyPgYnxPfHhahJwDN8qTjrGol7vOxih | ||||
vbwqSNu+NSSFcg99mqxS6y3cG2zpMAOThWaF1Xp8MpBImN4ZcEuMN76ZFazs | ||||
j+ZiyM/RivWB/FQ0u4rVsSoC7TPzVhM/hJaXRKEa+INcs+Z5ix8wDwH9DQd+ | ||||
nryfC4MVaCE+jPT6xi4swiymZnZLko3yiSefiWr9Wlm1NsyvR3cSjahwHF8t | ||||
QFvgA6mHrs2D10czKoqauvDraOf+8eACHTNmgQReabNuKIoBA0WSVPU1SpuU | ||||
WkO8IgF0lDhtBamvM04nyUw83fIDVn5JZKNY6Yu66v4JlAgqfHwNx1enWbOD | ||||
Bd8WfT5eenvdgktV91fwVaXGaVt7E6Rcjh7yp9PCgUSNNKX5G17fzIq3gj4s | ||||
sKGoQxUUvlo1+NHtewI4V+xdYemzU3E5lTOf+Bccq7yJJMS3E9hO5n2R3abR | ||||
ejN3GxgyhRNsry4kMt+ov50E7Dln8c2yg9jFJY1GiB9yhq8HwX8bdA7rZ1rU | ||||
8bx7Dw7PBWj/MOdXmeK3z+/Xm1JQBAO8fEmZ11exMwaNJ+5ay4ZnkfUdHJ4g | ||||
BXICdbNFDuPjgOdXzFpqh1IQmEyr13FREkwJ0E7lwBRn3hBFgIKT6AQwXf7k | ||||
KJaNnipPuEdFTJ6g5fFm+qB68++We9Wg0CAdPlcSVAL9+n1VV2jZ38ewTWM9 | ||||
mCQbC98X8+xATuwFI3riL+nwK5JiuFWTydqZ2VjfZYhOqqeCAh3o6Xrkp2Eq | ||||
BTwHg83HitWjKvH5K1+7SoDq2IF29v3I/HzYHwx20lLkRRlGnFQXvQFoMqwz | ||||
m/g+aRtlOc/PKUasA7Hv3cTnEf5S3oEs1ObSXMaKElnK3xwNQjWgvQWaQtlG | ||||
AcUA4UZVVtBOSerqPWWhDp/DN35iDB5T1Ve+LpSePV1LNMPJVyUVLja+tSre | ||||
xxoPdAEGIVCEsMuXJX+dMgk98TQDK/EQZTqaWm3WZ8o4SppUiWuk0XvWQNV4 | ||||
ijwrRM5DfJUgYHg2smV23akpyTVH8PI/tj1bLakamomG+7sbWO/0W8aMspyi | ||||
vrZ2mYsmEsGWmAQXeMDoTpltlHVkv5s6K+RbfYYhUY19N5eGfxX311p762VG | ||||
nmcc5MaTKphBqq++tCH28DcKuKnnwN1SPgYGv1KvXWQcVZ4EqBc/iVmktNNm | ||||
DK4MdkbIzjQcmQUP0d8Kw81AniqoDegPOHVQ0DzZri2GJ+HlILbxVO/iqI3y | ||||
zzJCn4m9ujsoJlHryVfJSJhnUjA5EmAQLyZQbaq+HejYuVnr1okulPWnIdsR | ||||
J6PoeqVLZT+x/cpIOPgJfrWGv82TAe4Xo597fsEfA2VY+O8DZX7X+yOeSvgI | ||||
VmDIvt6P+cfB7w+fwpPro0K62Se+bzo7pcaQM9IttaMimjv93cJ9JySVOSs8 | ||||
ikKDw+xAdaG9PRKSo42J9oVez3FxNlgbTsR5MHucoxuYduWYhLYLm9tbioin | ||||
vUXiJ9duBslfIBCLB631xUNzH7CD9cMhNs+OsIbQcF/W9VnU4nPGYo4Eqbc3 | ||||
0CKh6Oq++rePYYRxT90WeCDrowg7blIj/mEoBy3e+JzwtIx0I3Gcy1B/ZgNX | ||||
t6vebdv9sX0IZT89mJfXMkbg74AkEALBXFUKT1vyglv1wO/BqXKoirF6Di9c | ||||
L7vXiUbavobNx1B2C4vp2SCD7WvJHbICFYbDH73z/f56b4I2yx7jBt0YceHX | ||||
ovSoWNPnttlW/TjyW/d8lUUcaU9WYnZP3/eq34D6BrEMegWbP04PccWdallZ | ||||
OofN5ZkTfbA9XnD4WLmHOBifmspntn9X1xb1Dzy6tg6FAE0DRdwc13fttql+ | ||||
mahFvD5yL/DEm9EliNBaKzgcqqArs/B3CKuaq+JlCDeroYIDWQbUu/Bc3OiE | ||||
jxev5x62Gk5wbjg0zQ9uiqPhAd+6r+siyFcT5DNYHPh6TYbd6c9LIA53ByD0 | ||||
+7ZsVMAoYVAOT4p4AonTXr8oSW7tij9khggeGW05dCITyzw54PszQ1rTE++w | ||||
sg5AFQoTT5MjgRFfF6/Zkx0/xapVM+VbQNTVZi9cYzP6F0If2tj7nyOWs3TE | ||||
R/kZuJSuAL1RqR+eTlRHOCXfDSKXtw77IHxKs4hk6fYY304YmjvCT9uv8xFu | ||||
YB7JOA8aG+thYQR4kLz2IRO+uLL7OflxwA/UxeVCz+VhEiMp/IJPUKw8uxn9 | ||||
HuqV4tTH9+ekqLDTjjUABIeEqniwSTclDAdrVfz9kU78wMxBI9VX02dOHM3w | ||||
Fn8FPYFFaLrEB6SyuCqj+CEagDycH19VQu7JeLCZ1d63p7iqPzP74QqDdP+w | ||||
TumHEbKw4qJTZLZiJx44QlpGQmNfawIg82yykxriDTTrUu7uwsf4brGTBiy0 | ||||
WJ/3G4eNh+8Q9i4OlSo+WQqXQQiK7g3a1GwfwAnWbwpCiJkw3JGJvvwTZ3S5 | ||||
v3BLRhzz1Q5lN9m8FcQ3kDqU95BtNbo4g+x+rmbElQz87SUPLurEnxAB8y8h | ||||
AjJ//uXqBV+J/I+l0Wh/MgTGA/gtbf1N3IkNwSqfemlsODdrtY97pzcqHR6k | ||||
qbTfas6jjDxpHDQRGOlLTKfoFerpOB8kdMWrKb/ZwX9UjuUI3/NjBNOyEq2f | ||||
4RjVBRxqYhL8pYX2LU5TkQKbUqrj2Y6hRLX5cFdLCaO3dR1hHRnMx/tZ9TDa | ||||
RPFmz6t9C6OysAmlxe29blBSYx4X4B2PrOoxx3nM5Wun+KOSgwGH6mHj2KV5 | ||||
PEW8YvuSzebuu2nc+0b1QxjZfLV121yjYQOqV9JOC6JhyhvEcOthwLi/log9 | ||||
ZcX68DWc577WaYTftl3tS6DoV7DrEWiBLc18vfXcgIuI4FLspHnJenqqOOer | ||||
UGjLHU/+TUSHcmFc/bqLDJpOLw0pUeOVBeuwWMz2Jd3a2ViA7bLTqkKoWydC | ||||
fOGaN4IjOd41uQ7VKPm4i780qxmBYErHmjeRPLLB7gt18rky46p+AnGVvEjp | ||||
yZPCiQo5VFx5F/l81Yi3CC2eXwmiX8JBBgnayMHT+qk0kK0x1GkRp63dZxqo | ||||
4Jr1itQHVUyk8IfDuDqNS6W2n4rA8WS5R/ELGj9mVk1Y9GYlMPfeFK7MNB3i | ||||
eRKAAOQ/ohLKgulsjozzKlLB2qVbVvjUx5ehlou6mxZXFHoMljflGw7ElK7O | ||||
UPFAFiC/cIFjSWsLfipdTdxosH3g0/XKmXyvkTN1B9gulHNoau6cCzsmSZC4 | ||||
4xace+XZRn+j0EICI7Vj5Dla4451wuNFCWX6DLxXeO/udAbams0jwS0k618e | ||||
/enKOHwm0dlJz1nCDuJKeiDBG7X+wJjcClnZvAzT76OA9bP9+c5U3xCR8UVJ | ||||
eqNltJ3khfqBNe58uk9xLykOO+geKCJ/vatYjUzbEsd6XSBazm79eu2KBgsC | ||||
3JkzS6oVfo7vNZOfYw+trj9PRaY6RxB7POC6M5NrtqR1eq0LhDgyIhyj6zDB | ||||
SDn5EjH3ZsG1U1R1IdXWp3TuMzgLM8dGdHPtXQYsH5FkXuPIBee4zLriu+1r | ||||
i8ClvjIOBxWDQo9Yv4whwpp7GSM+a31N+s0z5SQglrZBAFVM8/U4Y1TPcVkL | ||||
ooZenUnSS3xzFWGBN5VofI6i5xYRuQk58Hl3B6jl8aahQC5ZaeB9QayGEk6x | ||||
NzyOBy1YeGgUhUkpNPvy/umXCEyVSwWYJKPhw/EoX+hnbr3yhnWvDFOBss4+ | ||||
dXDM1NKMW1SewpzjBaydVERQU3rsuHNcyMl/3fZ5NJJDQaWboPyX/m5fPeMh | ||||
FsANeQhZXX2e4MdKhRdLsVHyIN23XJl8YjXhiUnItX8HEUt3kt5CV2L29iPy | ||||
tT8TpEUCDIPO9ch9lAesQW9X3Q5QG1X8DdnSIPqyh6XW+Z1E6WSpJOREBkmc | ||||
/Bn2eMJQAw9DLvCUlHtUx0OKqu+ChTmvlhh/EA9hRYnIWsMXvwp8ULQvU1oO | ||||
+3oLR0KvXBehFAwu8k4B5BzuKfSRBcxEeVD4SZQliDjH0aO9V3txVRG5JR68 | ||||
zXpp2E8y6HHR8CnaIfcEHWmzBzI/bzAc2+yGhO8KwQv+8XjQXqvHqlXTH0S3 | ||||
6quaDsu4kEqE8xyF4R5L0yuPyU8zYi5AoC/n5fIdQsVM7xcrryX7uWVsA7/N | ||||
ojS/3MO088FvSJv2HoLLwu9srFORWM70EEJ2BDgo8NOjMm8KwE8xFWRP3UJu | ||||
HjEWDKjXI2zpUHWa4j5s5le2LJVOloD2u0Ia+/5RLxvwee/5MacBX1i0x7XE | ||||
Ho6k8gELnaPY4Gi5DlrcW6t+hyGQw/RNK5cJdm2TolmE/ITxAIGrQQjoMHL4 | ||||
GRGM2Jx0TKvMvNj3zM7xxHSCSJuc/7e2RVWpIjaquB1gZfX3QwTE+VoEyWO7 | ||||
d+YV1qco2D6KfbCR1Z/2Nqn7Y4YA8NsQgerH7//HSJ+fjfLfCRH42wwB4O+E | ||||
BG81qI6kptj8NBv6efUTIiAYajji4jc7RRrEkyZWW+g11NAzAILAhQdqxR8y | ||||
n4YbGCy2kjPR5X38JmNnNVMUEs13yrrXSlnNsUw934GLqGOe5FIBEh9gZa9w | ||||
PM+6Fgs0A72xCNKFWFZw53bHP2syJEIvIJzAZrvjeepye5b5SZNfxKEzAxVQ | ||||
gDNBd+reSCZtbfW6qxDpk0/yIOBVpkJbf/KmiifkMiiPoHo88tBcWix4PrSI | ||||
TmtuFgXgEXhD+VRK6NDjRW0I3MYkDOOIdiP5NwMyb0YqcnoAaeQgmMUd3xTK | ||||
R0zYNNBdsl3GA5Sj/dqx7YC5+u5RTE8+R/H92HLbNLDv0mZhQux9knzrXME0 | ||||
9j59lU+vF/QWag0sDNYDhlo7iGWE2FdCRkEogxvRMUaba0j8np94qn137mj6 | ||||
SZTHGjZNMprgfEFCE397kAhrJvAScIK2qhUm+A8/HawfyrnzrpZglZYlgBXv | ||||
VIrAEOoCxzRMVkmFf2mBXQjOdb0TG2MBE1TH0RU6Txk0M/n64VTrXlIRYAmt | ||||
bysS6yto40LNaFmKMbJ4qjhnycozlFj+MD6od0+kawrNd0XAGuvXXPSdRagM | ||||
it3wFVx7GNVFk8zR0ZXb+9xINrUjL8P6pWKbUNcoqUUgai/YgolHcP8ypvE8 | ||||
zXGXmQY0psvBmUrlrscHLXPDxZEPMRA28ZaRCE80yua1r2m7EVC/lJ8HK+Ry | ||||
Pmlr1cw0iDSNf7zLky9TODaw4mH64Au+OnY9BxRNdLoVOMMI4n63YzUAZheT | ||||
v7gjPZ4dOfOmA4sEHXSmb36jne8v73gWovkhycISIFb3RDAMAyi/ddTz/ZI7 | ||||
KgLocBF0Qy/fbr70ajEOeaDtxLtD0Ei/65kjF/6sE6HmJ2h+Kcy1l2JIN9GV | ||||
bzhKIw4PNKGGzcc79UDaHW2D23D9tFe0QONnPLSLwdg2PvqrotqnWLbH8BqN | ||||
Wk+792egZe07cgB68peXHIFTMtCs+mHyvLIJxdiANEqkY+ySYpTo8cIyR2O3 | ||||
tiRDLhCRbxA/utL78NgJBMan7Nv7kDmUbZNSMcNHzaGvIinUhivpLdOh+FOK | ||||
iKwMq+tgXTrMLPEKiyVn/KsYBSAJhFYK5UX1JroYdpiWw2g/XnJoGAgB37rs | ||||
oz13RASR8zho8mm1XOR7X3iBea1tvQ4FqF31azbyRRbUKEQtmnKeH4IehcPC | ||||
576YtGkp5kWHwa/GcEG+Fndxwm9ESkg/8Iw3BLzbqznS9fsmnF7OsveFYAWG | ||||
us25lGvBge7Z9++r0LYzf6Cq0r10ajoO5rT7hw47W7wCJKnKsT4X4fLiOsaR | ||||
IiHE0Yo9oa9XVn024rpNJV09Yf7lqc7phcMG2qv9zDKQXYJ7BPnB928w/p7p | ||||
ZmfBmeTtpL/O/CzZBUu8Tv6GN1dQFvG1IC7DDab8iIpVWMGzCKwVcXJAqMsS | ||||
Sh3j4I0wl43XYRRk12x+cza0hKV5+WhdyiWRXvR3beHeVGS8q/zr8hqMGpIh | ||||
AwPMNE/TKoj93ViJ3nyuMsWFicln0azfWpmvnu8mVamp5+wbYwHToqqOV1I3 | ||||
e3qNrwBgyfHBdh0q0MLgNWZRhbgaQ3GKGY+vprNFaGPRikTOYj2tGOPQWH1y | ||||
yXTJVy3FpRtcwMN+h7VFYJNQ99/ugNOt09M+Yhl+f4DdVR1Fd/EnZPYzpKQ2 | ||||
RvMBYulXcmJnhQ9bUQMauDNQR1XJrL9HLH6Zcge/fprBZOkb1e/CyhE8IgmB | ||||
8fpzMqFrCZ+nPNpzXD1ZUulZoBqr6zieiXx8mQEayez6r9H4b8EY+DMac6VU | ||||
K7szgQzaCQ2+orS6a7d4bD6+ydO3/GIVrvIX4WZ/cuX41ZGUUiH7wMA4t7S3 | ||||
b5l0gPrr24G0KPIass9hQS4jLN0AO7J/9ZSs3wkQEH919v9BzFGCQJjfeBh+ | ||||
+jTYz1aPy4+34f/9v/7YNFL8uuH/nSW/9K4Wfyj+xT3868EEv8YZ/MFgzcfz | ||||
n+3210iCf3Zsdxy3v7Fn/OV7/CvujF9bU3777nq/vX5+7c7d/vXT8Hs9JFny | ||||
//zymX9o5vgS8J8H+s8MHdz28wDJ1/vPhg6FYFySkD4v2ZKU8cxgC2texbqE | ||||
FytxlbnEIXu8vF8dEsDvWSR+zyFheez1J4eEIVl1GnJr/ORM4I9ODykWVMTy | ||||
REIVrT4b3Cl+920UulOK4pUTBnAiM2cSuoTJs6HgqYfpqfdO1S9gXj5sSWMk | ||||
XOrx84LZisj997I8B361XPzP7CbA3/hNEFMw/+Q3Wf/ObiLeCNz6iOl1lYMG | ||||
Zy73byB5WfX9jz1tOC4P3THFtClXukNv/3zCBNXhxcqPmVOFli6EaFRo6vkK | ||||
1NiJQcDVRcx3zwksLNT7agKnW7wpsr8O0YW9X59I6B/sj2Pg53rVL04BmmNL | ||||
WrxP6M+DA6NDcX7Z2Oa4u0TIn6YPUVLS9s5wPJcjPbf6OJ8EPxGT9WX23PqM | ||||
tThWYrWlf42A016HB081tYQFjGJfTE6Mhxmah6OidgkmU5fL6FthVIF8iEj6 | ||||
wapbuasKcaDb+QS/EqAd8Pj5ZtrJnqHo4P9KB/w/W4PPX3vs9OL8+6a732t5 | ||||
/zcW1c8K/WU1/mEojr9apP/lcvvvdcfz+C/30rn7d9LR4OB4VVTZjaaZryvs | ||||
91ymk47APGq79M9zIHlHKOhSzduFb56Sm03/bl/iH7v//mGfH/vkVfVf7vb7 | ||||
8zn4TavfPzvJ/C9ddD/9ePcP9I+L6V967QBALf+QDH8ofg2WyfqmGO7xDv39 | ||||
gy2fdfv1G7lP9l+v27/pt/xTb98fuwDvXd31+T7aPX/u/9ynq7mBfnkXefPz | ||||
QZ79q9L+l5KeDOcfinufxa8evr+u///5An+fnP9Imef3nzKf/OU5wS7OeMTI | ||||
VlEtEWDBRQ4Wc7Fqfj7t37o31v+1vr3TFMQTMD3/ND0TsQT3H/r2/oRK/7Jv | ||||
7x+h0u+BEvBfo9L454XNniJbq5JcZs3jxlEIsip8TFYEeMq+XHbP2kLEbC6H | ||||
Nu/op3M821LgyD/i5p/saJLJmj/l/a8sacDveNL4P9nJfuMm47j2r91kCakH | ||||
ZTr6wBt0Ns4SlcmSeYInltb4i53sX3GTAX9jJzP+kpkSwF/YFq8q6l29+ZrZ | ||||
tTVN973BLH27yYZMWTMJCAEgA9013CjXq4eXVqwFowHbDpdAL88cNgOcM7ZD | ||||
m22OeUst4kLuer9vQ469iK0TXFYCSmhnGEPM1tjLPmo6aPOFEXkyON2EQ59J | ||||
xutbPH7BIc2QdA3O/lZ+hyrb0yDXF3VhbyDgOxgTJBFzNvxg3v3OnB9zLTBs | ||||
eK+cHI4VFMa7iWpuBDf6Bn+71ZkdgflEb8oczUIBZmfF7I0Sk/HREvj3fO0n | ||||
ji6fgfQM/yxIXGDwHx0JzdDRGgx5j0LV5cUdENhDzpSvAVwiFAGGayeuHggh | ||||
9CmyVOC+dhZtPjti+AggeSHB+qma8QWD3T/H0j/wydKP65+DvX5bAVcA+PXd | ||||
f4NP//ED3ucHG34/6iv7ZZPfS/v6y1j+zcCvX3f5H878+nU0v19jf3nnP5L8 | ||||
xXM/xTX9C4d+IHgZ8J67sZJQsMx1/H/tfVuTo0iy5ju/Im325eyqexAgJJh9 | ||||
We4ggbgLoT1rNtxv4g5C6Pz5DZSZVVld2XOqpvvs7jHbhzarVkKEu4eHX+LD | ||||
Pdz6nBo4es3/E8bQ1PZnY2hHofV323/UUX72BfIh8QYCzPp4eVDt1yBUSSlF | ||||
VqGElXqsFCXLNY6uujIqNQq7FofFURfPpjZTB88kiWyoN8KkSMLw2/Jd6Mfq | ||||
d4n3+l1XoT2aF45pUN5vwZp+QP9MDe/HPlXQbxtVXaRzruJT6ADGmF3txVO2 | ||||
uu8fSsoS3xndxUJDi4n+zEJ/cSxrMNFJ0B0/nLe8LjXWctP5TUBh20TjyoS2 | ||||
9Ip+JExXCPrBOSNOUlj5RuHUVl6tA/4sd7uLjrK6XaPZebaoESdoY+sPAaP/ | ||||
0NXY3+zsf9Ca6W0j/2x3pjer86MNmj7u3z8/MJdvt7u82yByfF5xDSbNc4Qx | ||||
ebfZl+pROrnpRVM2CnlEJNH9vx2YfxXDdxH6lxX7kf4Tb8v2B1tQvBtc6UNJ | ||||
DwiyTUVSOMZrPD+7ZkMGno3uQ1T1C0VLMlaFb3F26g1fyVZsCjzXRAEI/TmG | ||||
FV+Lb8QDy79VTAER/gpk+N8XkvoXijN/RVDitSyr85pflrqh96HfsgCDZ4gN | ||||
Qjzren5Pp/6sXhnMcflmLvK+uIX4saZvKx9RFcrakR6TYl53yo63lP3/buGj | ||||
W/AT4BYYvIZAHGlJShaGlu1aAezMJdeeJyK9lIjuSw/0fkYTnr2v640YKpLo | ||||
KcBIfzxQhdhJjxR6moTkI/pY6ICChfQP1xBz/GctIaA/4lMWlwL9AZ/CMsCl | ||||
QB99SmKWySpTE3NmFPacUNiIeXzfr/d+8alP+d2o/6NPefT9Drcf/EixWhxu | ||||
Uj2s8XymdEy4FfN8kyA6pIXKGfZIZCHOqHiSkmZIJ25umqCFZB9MzqpvQzIW | ||||
Vs0NU0DOsHocqJ/0Kf9+J4Q3+/RPNEP46ll+pB/Cb4zAn+lbxqdvkUR8R6Ai | ||||
XA9dKs8kO9wew46M4/7WBKdzEtpA6UP7Zur94f8J3/Iuie/cy/e1nq+S/g8o | ||||
9/wkOXhWcv421vj44/d1n5+o0JfSz8+PpP7Ja6VfJ/q0APRNqH+gBvTwSF5r | ||||
QJnG/a4GlKkDLkladnkuXrKS2yc1oNS41IDKxVsNKIP9YA3oZGIG1FhIWczL | ||||
NUvmLgEv98KhoMt1FWTkSYzbu2o5M3wtDrMe8bg/9TxMJpeutecSOQzihYe8 | ||||
TWfuJc0OhvLRnqpUKGOHLFcyl+24kuyM0pZ0n70Mm0JnBTxiix0VpjNb0dh4 | ||||
YQXEgTYBFdmn8155CHE1DY8Ztx705cHVeFWdzrsNdV1prENOYePfUEvqMnld | ||||
omRMW6udeDJJHrrAJH6uC3Py/W1ZMm4kZFpzBBl9ZEejvXl0KVys9vuWHdtj | ||||
b2+3EraexDXDlwXmeR19gjC54CImP/BFlTwU9dJmh8tIsGjK2Xkv6CQl90a1 | ||||
01ap5Bx5KclvbRIwisUTsXxAGJiAbq7ArkS1qSoUq+ToGm18uG14944X+7Wv | ||||
HpBLjZhNYus7etwmYMfYQTSrSbZjcsMMxhMUTTsSIS7uekxmt5YcyloXUaAp | ||||
a4sf7lSFkHvtXG9y2qWukz3cdwL4B1skF8aH16Ff3KCNvNKoaH/YFCfW4Fh9 | ||||
G6TwFk6vrU3cxej4CL2Ec1x5y98dNhMjnzLv0u3yaAs53BknsoRCGeHP/UAa | ||||
pLDb5Gq/dhSFL0NyqGc1ZdftVriSQK3Vrr4yJxNmDh6zZsagX+pguusehsJR | ||||
LwZ4PwWcfItGNdmuR3T0hIPdiiWfhthqW5fFajrStbtas7hS0hf4XnUnThbK | ||||
R0NuoHYdw2J80axtfy9cWhg1NLIpuO3gR1YeBcwahRPgSgmrcBxP6Y1y5TlF | ||||
Ep8iZqNcSTD0EJjTSLVpDxJP677j2wAb5lMDl7Jrq2t9nJaMfntMH9PhEuPH | ||||
1WCs2YsQJBPRXZpoT0GzdT/xQf4432ozvdfJzuhqgzwGG37ap460oVV0g6gi | ||||
z2X6JTIK4vaQCEfiz1W1HTYo3EI5Up52tLdBH3eNE2oXK1X/MOXGtmOb7WEq | ||||
y7hI0mZSNBtrNRSmzBPhWMiKFCRXDHCqhEimNFUr05Xr6OzWhocW+EW5TpV/ | ||||
OM6K4ec2Dc/iNIHtfrh9f1/wIXnGqdV7fUdj/1h9h6o8zko/RDDhLc0V7KsE | ||||
Xi6Ts7dq0X1qyTenz3HzIIcKSBStAh/prZiqPXtwgbawCRxQdGvz9zkwVAHa | ||||
R/sxmiSj2Kd9HJ732coyjaHS1baZTwpZG3Z4D3xhZCSSiDlfLk9ztzvwhDCG | ||||
VsKsfCjy5Lzaim7hNLfd1QlvPS8QNDdv922GwYNGasnx1jBucjopu/m+Nc+E | ||||
TnWBbOrF3bf6G0RF6+yIECJBOuRdFbnH5oK2ojv7u3jdaGJXNpbAbNtyuNVI | ||||
cjT6g8WvJzfScXOGSRuLoVrZ+lLQqTeRLXovqDcrvFo/otlkOcslnE2pIof1 | ||||
yMDDurZUM3AFOjLSU7dmda+5CBYMcTkuN0l+Vse6p2oLkw6VMh0wZq1eiJp+ | ||||
BLfEbCLKg0+wah3Y5uKj6Nxue84TKa22Wx8KDsa+BFJm8DKUe6xajxpyu15G | ||||
txfHHXcb1nZa9WTjF9c9mzGJstqYfHKwDD/cngfCjyFBLJyqbG6bRpd3ef6g | ||||
sKjRUFacGULZe+ztGjnu7oINsMQNxeN0j69yTRQWikThA0GDEhr504HMroqD | ||||
gfWcM2Pmz7yWnPrxmMEiX2X5mU/uD6oKtF3MayDb6NV6G3oZl+/zqDzE0B4D | ||||
JjFkt+uEz1I4OpOn1SBcN/MOzoc7Y1AwvimzYdMzMyYz69XqyjUkNfCT4Hbs | ||||
RKA4NAo5uvN2JYdu20QIhXP4sEh7T/Cx3Uu1oXUCRuibMjWRdWN53XEMHFXI | ||||
i3i4ZIe97M1QFytGjInuXZXgXTY28R1kDfAG5lU2yz3xQcVmqMcoXe+CXvMe | ||||
qKgXB3hdzepqGLaESUKNzeRcfNrK2Yyig1clcH6+a7xPswdY2xJKVSYGwWBa | ||||
4Kbanqnhw3pvoDDBE83pxLUh/uywqH1yjauy7M75vRpXuf7gNa5pTSbrQZ9d | ||||
67ZU40oCBdz+BjObI1P36eWMZUV5QEpV2jcmSqXE+QaRGxPGjxQBEorBO54b | ||||
ucvdDmNmQyYx2yxxfLwJ1MAxBsz5V/VIPqIabdbJAd1rps92WwhG6vpW7+z6 | ||||
cjRqg74QjR0lJ2ffT0cnb2+P04jvJaNs2DV+zk/sQfT5NjtT7ZCT8IS1a0hv | ||||
4QZWSLuTHZbE0lk+hlLTOB16MNBsIEvKtA6ceCbD9hxYqrA+NKhQdrFwHCJB | ||||
XqM51J4OF+8yuxKRFOY9Pckm+XgkMaLOFVU8XL2v65VwSEPKQeI9x0QlNWsB | ||||
Jq+iiDIm2HShFglx/TTdD7HbSHt0yjLvFkbG6eg72XTaWdkK2JRBu8PpCUWP | ||||
R3lS0lu1D0TPNBHNUzPIzOs7v0e4vSNw/VqfgnBSiOyI1aextXDRhqNQSe6k | ||||
JR+tjEMSVOBanJRgY6IHRibYFFIfh8r2N5qNXAhkJWblCTtogB8sCMfU9Whj | ||||
A0ItKlWqYDXh4lna7jEGOQ4UB2ePC+KikBrurivB2se5ljykeZ3mbewrAzHa | ||||
JEt6Woee86Pq1AfDrHMvQrY3wpfvq5CvtoZy520TSkBcwl22HNvM3T5uBK3c | ||||
llpyOZjn4VaJIx/45mocCmM8UUM7rndgxKYQaGkvH0+SIdoQnsgU41s5aWkB | ||||
FURbQ64912QTdeQPa/eihNMj7Slp7SrNLPY2d2l0fMgdk3a33NG/8dBupacl | ||||
W8XbI0bnq9vdHgRzs25OvcsIfqmyO1vB9ca+S8mpaLQuNupCvfRwnJG9szrP | ||||
WyjSUbrzK2wgGdSietVwH7w/0tNoMS3vwN1ZNLdZHO+bOxpRCcYyrWdT+7wZ | ||||
zBM8P/INdLtn5ytLY8AsBM0xxPfRjq1Fc+Pdx3xnymLYHGtb7Fet3gvbmVVw | ||||
mhvPjnCvYZnshTSCznpnV8VlU26SNdLHiaXG7HHszne41tZzuaJxECdVsu3c | ||||
1oN7aUrmlF0xnAglTtA0U3EhSjmna3yQND50zT3myP06uM/4edOfL1d8Qrba | ||||
I/JJk8eHumkN28c11opPHerrtjJZfgORJB+oerwNEkI8z9aK8DftoSGdOWfo | ||||
+3d3vwkoLQkPRXo9ZF9uYv3wSfZyEyvtKXwyfV5ElRzTWGW58GF2SxEVv+ZU | ||||
hmshPouQJsoCk1TN81HP5ck/YoVKXF0FFdvIvNTcYb/Zm/z1hBSOg92neMS9 | ||||
y6ETOJeOBQUKiS6qjCxXbGkSvv083Vb0TcRSy/13HBUkdE8JBBU8qPyjfYQY | ||||
w77/e6cnSaD/Npeih8Sk+wdDQz3L0N0n3687IL7+vVzpyAetxClxSNoMBHIl | ||||
hGZBGjRyvenR7oopSedgEGIqYvtzuqJqxeymgmUO8+AMK+Uonel17qL6RWSB | ||||
tEaIr3atOK23Cjuk1aHKvAfPKHT/268HVTGZlpuHUkqUKJ+ib5SoPL8ihL77 | ||||
pl8w+c1jDMRTd8STcStUhHTrzeAh6fBnXxFCRKW6ktNV+9OZGzsS3x3wgDlh | ||||
+R0POGbP5t6liOcNX/3QV4SsV3m/B1cuf/sJsPL5uFg3TdR9DlWGlfcZTvlO | ||||
wk+ilCF47U/GKBdKPjspWKb6k/BJ6olPOl9vJnIu0io9DRXR6JdbRpVaSZ8f | ||||
Tlz9p8QnNz97EG0rtPR+EC0bAj+6Jg02ET1dztJvP9ub0RRLgRX0Dqy73Wkj | ||||
Mx7lqur0TAxNx220a8L3ahYvLZhale6AWW0fyzHx8SQaz284OCqnKEihg+fx | ||||
rkTpOkihJhaY0PfDZyrhJpBqvaKHBsfxOWUnxr5wHTzVxePgOcgVAmnPxnWQ | ||||
yRdsEO89j3qvNDVNTOJKz27vui1Skw5sz/Nv2utHgzoY3AfkrJ/LGALD5NC0 | ||||
IVEbn/b8dON7u4ggJqFn1f70kMNrTsVPKkyFE1jKSWiQ0DYnckxNH8KZNbfW | ||||
o2LtyoVcjspgfRWUrrONCoK9bHicBdfO71V9OMlS4Mj4vYo6cpcNOHQ63Dkg | ||||
jx0VUQ251VSNG2EYzc9VumkpawMcorOeuvZuAy0hHAcOzYT5gTPkDzv5H6CS | ||||
z437s5jk07j8KCL5db/++Xjk8UIIWlzqKUopzWo8Sv1F8R+32VKvw3TjBgQb | ||||
+7yyPWdz/L97ZvxVCN8dF7+t049gkc/F+oNI5KtZ/SM45BvB/6dRyKcI/zQM | ||||
8pk5Rl/79bNFfzi21W1sZk9FkyK/SuF03D2a/4yfd/9HmX5nA0w/CH08CYUo | ||||
p7BJWSCYm2eICWtyLhnuUJfgjpdImTJfG5PidFBpFESKKEt1H0NPRic4SMyp | ||||
QKHrj30J9hwQ1CLhD3dy0LT1vd9Y3Ab0R/zG4jagf85vgK0C/MZrr/qn3zBD | ||||
bI3ZdLTydgIj3JhwoNVKdYZZa9jf9xuL24D+gd/Yxjugovfzo6lcsA5lJ40x | ||||
bB51M4ZhFVidnW0WIUQK/Oo0pIK5IkG2IFo0k64vwihKNsklVZyEpozYBubY | ||||
hbwbbgT1437j30cen9bon8Ad373Hj6CO32z6Px9zFO6XgZB3V3dDqFy7SXq4 | ||||
L/XNFLGpcVSuriigiDlkNy1+YD/oP742mP0zPcdPYI2LdP8DkMbvAvwncvht | ||||
9PD1p+8xxu+U5Q8jjPXYfY8wLtN8ii8+xfhH0MXhHV2sNt+jiyXBJUnTLc9d | ||||
lpxiJD5DF5czSjl4RxeRH0QXL8dWhCwKpbT7eukwe17QxfawEnmR34Y83k5X | ||||
R9kqBnOeEOR06AKXjuMtnskUrc3CzeGO1UmBLAtYI7n1hXLrhmgkV4N2ue3r | ||||
U4SbMbpinU2L0RfSO4xcWEU0XRAlu9/CcousJv7u4gXkeLRoUVv5WF7hY6Fg | ||||
Dw+Ou43nH3i9GrfsJbmwgn9JUbpPGKVUSSsSk8scNX2KOdrmokKey95Mdi1n | ||||
3CPqWO2q0knuemlwlPMbzFZwyN8HVcXqbo2sLcuudaaNxL1at1i6H0xpBVLt | ||||
dXYutskQI7Ch5tu9McAY1T7gUlakdLxLCYwfkOnuktTEW5t6jq9ec9zXDyEh | ||||
20nIIM05DdyM6ezxRvWYz8bZUW+peK9y4g19YIZX7Xp3fGA3bs1XWkwRSO34 | ||||
3uM6hzm91mAaUvVVvz3Jfk/VfXVpyfyGXk4dw3osdYWTXc3uYpdoS4/ZqmiL | ||||
wxfsMPaxMqw6kqvQG4FAInrLk665V6x0zt1RvoRddeTg/moMrReqggE7OoYT | ||||
hrCa7dKwfRGYoKrIKzJWBdnrJehig6AAZP63wJl5uDB2+gk7naJ70u6V87ZA | ||||
bg/zbNR7eKioFQI7mjMjJbOPrrmgJm5rnqDhPpzoLaKXAXrWNgS/m2YP5Loh | ||||
ZZOPOEIQeAAafTjsHbrhkKs0UlwhDJK2rR/unuZzEZIQZKApIs5yqxqTlblR | ||||
b2aSD71xgleFyWXOhl81E0cYo+XG9rhrV9y0lt1QTgoRV2cO6qu1v0VtvjFg | ||||
DmHJ6O486rTjfSm0GR8M1J/HoBupVjumDuz51vqRBc6IV7d4pVVZPUHo6X5L | ||||
p1oY8PyyuhaegV8Ar0LjK0m72XH2LDDJ4bbCBSrY3+07SBJa2aeYPaykcuxq | ||||
NBTtu/ODiHEmS0pkushZ7zJtNQZEIDDn/NgeC/vaDo86VIj7bZMEiQU/JPle | ||||
7q2LhrabCnKpzUzrdxyuUAENL8yqibGCiv1z0KyXrd18D1Uw5RNI1J8+CEqS | ||||
w/EfdQ790Dj0PtaZZ15Yv1qgCnFFJck+gQoUbBx3UNcrBB/l9hxmx7TD9TWI | ||||
coJODOv1ZGwFnErkcpJWlputNIK72Dkr7TfWHvM30PZ+262wxiICn+PjrXYO | ||||
YpOAeyZWdrx3wsxGphj54tP7E46qBw5YnoSSL6o8Sg+8FE42NDgSmiJ3nNgd | ||||
IumGC4Ym3ceSjXwLE8qiaEi9znA8za2k2hL11UxYb88TNT5VscqmhQnVCLL2 | ||||
sDupTsXePCLUOS7pOMewQ2URbLDxrZi6zIiJ18iDGTyurYIBtTt/o0UqJsci | ||||
DXEd3d9cQuQ27K5NtxoeD2dRF6k77GOpbxO5riGDsT6Saro2MzmD4chnIuHs | ||||
6EZ4ymUcWp30Lr3qPB5uDg/yct+RNYNtkx2D0ndGr8uxg3nSshD0qD20xuME | ||||
od5ec3pbzpRYuRMJdczdN+/0zR+44Zrsq/vdR1xc34xFMuePw3aDIfTUoqvs | ||||
KK9vQkDWaIBzsq2BvSZEMn2BhrNzC8/ozlPFfOy1mL1cd2sGf4iZ2yO8vbWK | ||||
iqTqIdigGx0LUcmwrMCtqrxHTmaGmB208Y2ZJh4gMi1Dvasy2lmtdtG+xEqY | ||||
U+21O6+r2raQLVkSh+O+K82+UW4Hc9vMmSsaGwmib5RUGFJ+Cwf9tg/1/cqe | ||||
u5Uo4qHHbZP66iAksvNR/5zDG6S8nd1i724d4r4uSsRwUxHS95cmda63I9C7 | ||||
Q73Z2lWxIfQAxvf4IK22Nmud+Q6GT9jmFjQ6Wgxgi1CHK9LRIr4hoxhiekG3 | ||||
hLolzqKWFn2UcpxilOqejQ7WqTjciTtInCYfI/GZZ6R7zKNHMWLls7baz86q | ||||
AhZpRuOKZq+zlWn8zj3PQqblGpUcCNkkBJtbXVq0c9pOOC4X7SjwJ/0clWlB | ||||
GOV3vH/+Ubw/3sM95kIx7icL3l+5y5dF2eboudrm2lDDeB64NXppkyvpyfzU | ||||
5yQNd1lB11sVuRjwte/m/UbbQyfBnbfHmdZyYbtLrvuT4mYSJibRKt9u+fPh | ||||
zMKUlyknFkUuZdyJJIab183FPpjk0Fh7GdLZCYvyhuXYdm/z+8senv2kMahD | ||||
fczTgMPoHb9bOYpEaN1urSC8P+3mwWaoXI0RopccqOlsYNQJlQzlTEgyZ845 | ||||
XFSAN+EyH5cUo2nx+0ZHiYbuLKI7uUmtm+Z8KmJxsHcym0F0uSUMkO1w110u | ||||
tXLYDShYPJHB4CuzuZ/1hD+eI13Ft57REO64OTW1MXXeSbZVbNgXK6iJkQcf | ||||
l3aUwfsh46/MdozX2g1sRjzdFtSlDoBDku+CxPLiLrbCbfjQdq3F+ra+GrkC | ||||
g9o+KQYLbYL6VN0tr7rppcVwF4W8LG3u4cdOKMrVg8CugsyyNlkfZ8Ps7mJn | ||||
0NItETcThHmCiNy2ReyqzjQBzUh1FcRf/PwQTsbh3Gs7qr/Kq2ozZASGWPfW | ||||
tC9ntJ1JuZE2Vt5AOAUfZeVQY2NbivzVkqvKtdvlEJ4g+KNLWLB8rsRmfbCK | ||||
8cyX4WE/NAg8h22KEDld7KAqlgOdD2PEgPG6mHsfBAaeMubXNLrOpbWUWhEj | ||||
zhBBJKm70TkTRwmnYYleuRVK3x4XiJTPtZl58CTm1rizD1tkXe8ctSVby42Q | ||||
DLmvxL7ceyqzTRtPT7c+hp0cthP3/nUXwBtgkW462VKPtmillHcU43w8rDA0 | ||||
509Ucu5YwkZ00UGzBu93DnweSoSKki4VkMrUk330cK+QWnHwgGqsM2qRQ24K | ||||
Yz3ekPjYp9vmKs8XN4Zpr01B2i/2Hpw1LLG9ZSfg35I9QZknmYci2T5gossr | ||||
6X6lyNzjso9j90Kple/W81E7ButbsAsbv1hdlOrq4z7LBwrTlLtV7Kh5z0BV | ||||
fzzKZNXq16MoMnvjIIx3Fe/GPB58TdkZmCBbZAiPeES6Lh6c10bGyve65OP4 | ||||
mqNuCo1GPZ9XhPPgzIEkJPhQUp3nHM7VXdUQnnO8fDgyXSUw0YM9qNidEy09 | ||||
5ZgmWT126qbMISU/bhVJpL61NEKS+BKXeMSUeBP4r/i+JeNSrclSAfSptZFR | ||||
+oHcnJV7KRZjMyb6xgUBVV5EOHZkbwxvrIPMFi+7LoJiEp60O24lJ6x9CGls | ||||
bHwN7cImUwcypcTTAQ9KmzJ2qymn9hmIzmz9ruXU+ZvrGBlDvzPpRqIEnXJ1 | ||||
eqQE7vNGWHsM7Eed3+Fd70oesUfXHLQNcA+TVsU/KwdoEcSncuCnHWEXBHCv | ||||
4yKHFZBDFq5zw8f2M6fgcdh4kW6sIJeLlGrl4gfv1lxPLC4Oia67ZJo2ja+3 | ||||
wsaLdwd3pVjb+9hv6yOnR3uKw6cvcviC8f6wHLiETXu+GcV06IbdA3pQ3qRs | ||||
72dlQJ3P0MOHWYtNIEXdCUWYG6PmVIRfTmmPKgTHMDgLFcXjiirX4YfQQzMK | ||||
xtcK87rqs/Dtbp3+tb0ISLl/k9M/i7vDOhjLpZy8T+vxGr740XIy8HwbPBXU | ||||
ZdPVZbYc3HjPgvF+mSP6BTwXeK8V4tHvNSBoRv+a9enbq+DBLorrLnqp6uHt | ||||
FZCnU9X8MRd/mdIsSMEw2fvZ9EsYVTMY53l6klU375qF3071RnlWBdcxfFLU | ||||
v7ELmFyu9lneXk5LXiTqSH0nnOePC64K6Eqf1w3VQCrPo5RvJPQcgX0X129H | ||||
+df/+WLwzAsXZkPd/e2luUYeoKKLyvr2VkYPWH5y6L9K4SmdN6b/19t5zZfF | ||||
WE70x64D/7zOLxEYcxHigox2RVhP1V9fXpSsAgRGz+mAEKAg9arlgH+p3Adr | ||||
2I/JcuIEXrtl3ksZdclCTDtGS7cAb4DSYWj6v8Fwkg1Xz/8rWGc4LBL44ylU | ||||
/wIm8Of3rgNAKkCykPeszwcEaK8chlm3nCZ51+sTBXpiENVyulQujHjd/Pbi | ||||
G78vEmfx0GtHmmXYRd7L8vzt5e994/Xl/8iiIf5r3SVvYPS7QETwTN3Ny49A | ||||
z0e/H8AsGRAt88Z3DNT05fUobRni13/9b7+ud8+l/PY3AoJeXn59oYDKzV/F | ||||
9xIAbqqx+SC38FnlC4R2y6Lp5+bdfjLv7nVepu6e8vqy0ukbY8sfjWj5d/R+ | ||||
bLdo4HJq9dw+fu2/zvXrGv85avBPqNm+SSEMAaf1OPjPdhBgf4I9WgXLQGBu | ||||
L+jqai77F41TfnlhDPn1wE5lTG1pE+FVRf9iDtHkdcML3XnLDnkOGgRgY4C1 | ||||
vwIJl3UIVAJM8js8/Rwrm09YwZ8fPZhTNgC78XzJFCkcTAUeBf9Cln2jUMxL | ||||
kEZB0Y/lYhQWYv4LeOT1KLT/5UnWs81F3byeMx6iGewo8CjgJurBVqiAugaq | ||||
+defIxj7hODNk2C1A8YDqNuTAvjZIaN7YY9Pi1tXQHz9svf6oG6ivy7PayPY | ||||
VB8bh/yDrhzPlh31Fy6BGR0iL3x+ZRFd4/cBumdPEOq3bV5+hj30E/awJ3vv | ||||
eg60CWgA2EdgchNeQMaXz1HGJ5Ovc7385SPo+aUhyF+Wyf7yO91C/vJ8H+jz | ||||
R8BUq4HFyV5Rz8VAfSMy79mrJPz1+34l/ZexgB3yquzxdiReffsDsBpjlQ3v | ||||
g/8BMSKfiBGFoC8b9Jt1/2adF731gdsC69h/ff4fCvpDPdKTpTe0J/qKPi+u | ||||
85d3ZPb12r7FMCzxwBPmbbzOKyMgyldBcVU/Pr060K6nLa3G0gd/fPGWX6PE | ||||
W/h/exIow9M12wve85Wmp6cusyorx/LXa1QlgCNasl5My5COws+Kc/2JOJEP | ||||
4mTG7ha99p559XTfyvRflt5HDPXLm5B++SKl//pDZAA3+rtmd/2kwhFevLB+ | ||||
lfW/gMdflhjhbYxXhV5efY0kfm7OD/bxCxnPKYEFf/Gvtf+2KPUE3G09dkG0 | ||||
LMjff3mGZH9/w0v+/lNTYt9P+Wrg2KgPugyEIuGiKsvi9gPw/0vk9vXex+VB | ||||
EH9E1w8UPu3vAsYsuM1TM86K/FM0od/T9GqVKGAPXnf+cg/0IobIA14j9ZYY | ||||
bQLvLDRWCzj2QSH+Boz/gjZ1wLu9xjhV8sv7bx/2zauivIU5z/ATUAGC1CD9 | ||||
Mf19JxX5nvpXY/Abr/VcyjC6Ahkvd2wCZ/sRKHsDyRZgrEk7EKn1P0XE+nsi | ||||
XrfQa5wZPk3e84rHL6wu2cDSg+qDuwH/+6tmmst7/WuCAExA1qSLFa6Gr4Yg | ||||
vnrJx/dCb/C+eRIoAcc9V2VhAzjlAizeNQqTaPnze2Hlk97nxaNgrCbrXtFm | ||||
IIns6nUvi26/pj3Ri9pElSZoLyDmDJ7fGtK511XZizFW4MllHfMxAUHK8PJv | ||||
/yb9yv7V76JfgSeumqR5j46fACXXgbUGYVtQd1fvJY2uDZizb+rhtefVmzJ/ | ||||
/DjnFWJdTJoJIs6ll0y14Jd19szKgBifWO0GwZbrT58obFa/0g5eYSMfeNb6 | ||||
CvbQ10D1+UnOt5r9lhE99bqPFns9RN87jjddfvOE72oMpnHqawz8XPIiLlH8 | ||||
9Z0vQJw/ZtclTgRJYTgG2XKV69ubbyHeB/3867PDDiCxAjQBpqvqJQGCWcQP | ||||
NvQ3BuiZ2IDoe2Fzoehr7rWs6MK4dwNZH/XXhfsGyOsZYL4GloAUf7mW+is+ | ||||
/A2jC3NfZRW8hiWLywGjylk+Vi9y5tXvLCbRK4GvFqu+1sn80mVJutDwTaj7 | ||||
HNeoAVeLawD56fS83DZb/MvXrOJt4tfp/jd2zBPBKA8BAA== | ||||
<section anchor="acknowledgements" numbered="false" toc="default"> | ||||
<name>Acknowledgements</name> | ||||
<t>This document was inspired by similar work in the OpenPGP space by <con | ||||
tact fullname="Bjarni Rúnar Einarsson"/> and <contact fullname="juga"/>; see <xr | ||||
ef target="I-D.bre-openpgp-samples" format="default"/>.</t> | ||||
<t><contact fullname="Eric Rescorla"/> helped spot issues with certificate | ||||
formats.</t> | ||||
<t><contact fullname="Sean Turner"/> pointed to <xref target="RFC4134" for | ||||
mat="default"/> as prior work.</t> | ||||
<t><contact fullname="Deb Cooley"/> suggested that Alice and Bob should ha | ||||
ve separate certificates for signing and encryption.</t> | ||||
<t><contact fullname="Wolfgang Hommel"/> helped to build reproducible encr | ||||
ypted PKCS #12 objects.</t> | ||||
<t><contact fullname="Carsten Bormann"/> got the XML <tt>sourcecode</tt> m | ||||
arkup working for this document.</t> | ||||
<t><contact fullname="David A. Cooper"/> identified problems with the cert | ||||
ificates and suggested corrections.</t> | ||||
<t><contact fullname="Lijun Liao"/> helped get the terminology right.</t> | ||||
<t><contact fullname="Stewart Bryant"/> and <contact fullname="Roman Danyl | ||||
iw"/> provided editorial suggestions.</t> | ||||
</section> | ||||
</back> | ||||
</rfc> | </rfc> | |||
End of changes. 86 change blocks. | ||||
1644 lines changed or deleted | 434 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |