<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" docName="draft-deremin-rfc4491-bis-11" indexInclude="true" ipr="trust200902" number="9215" prepTime="2022-03-20T23:53:42" scripts="Common,Latin" sortRefs="true" submissionType="independent" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-deremin-rfc4491-bis-11" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9215" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="PKIX: GOST R 34.10-2012, 34.11-2012">Using GOST R 34.10-2012 and GOST R 34.11-2012 Algorithms with the Internet X.509 Public Key Infrastructure</title>
    <seriesInfo name="RFC" value="9215" stream="independent"/>
    <author fullname="Dmitry Baryshkov" initials="D." surname="Baryshkov" role="editor">
      <organization showOnFrontPage="true">Linaro Ltd.</organization>
      <address>
        <postal>
          <street>Harston Mill Royston Rd</street>
          <city>Harston, Cambridge</city>
          <code>CB22 7GG</code>
          <country>United Kingdom</country>
        </postal>
        <email>dbaryshkov@gmail.com</email>
      </address>
    </author>
    <author fullname="Vasily Nikolaev" initials="V." surname="Nikolaev">
      <organization showOnFrontPage="true">CryptoPro</organization>
      <address>
        <postal>
          <street>18, Suschevsky val</street>
          <city>Moscow</city>
          <code>127018</code>
          <country>Russian Federation</country>
        </postal>
        <phone>+7 (495) 995-48-20</phone>
        <email>nikolaev@cryptopro.ru</email>
      </address>
    </author>
    <author fullname="Alexander Chelpanov" initials="A." surname="Chelpanov">
      <organization showOnFrontPage="true">InfoTeCS JSC</organization>
      <address>
        <email>Aleksandr.Chelpanov@infotecs.ru</email>
      </address>
    </author>
    <date month="03" year="2022"/>
    <keyword>GOST</keyword>
    <keyword>PKI</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document describes encoding
        formats, identifiers, and parameter formats for the GOST R
        34.10-2012 and GOST R 34.11-2012 algorithms for use in the Internet X.509 Public Key
        Infrastructure (PKI).</t>
      <t indent="0" pn="section-abstract-2">This specification is developed to facilitate implementations that
        wish to support the GOST algorithms. This document does not imply
        IETF endorsement of the cryptographic algorithms used in this
        document.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This is a contribution to the RFC Series, independently of any
            other RFC stream.  The RFC Editor has chosen to publish this
            document at its discretion and makes no statement about its value
            for implementation or deployment.  Documents approved for
            publication by the RFC Editor are not candidates for any level of
            Internet Standard; see Section 2 of RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9215" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2022 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-signature-algorithm-support">Signature Algorithm Support</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-hash-function-support">Hash Function Support</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-subject-public-keys-informa">Subject Public Keys Information Fields</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-public-key-identifiers">Public Key Identifiers</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-public-key-parameters">Public Key Parameters</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-public-key-encoding">Public Key Encoding</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t indent="0" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-key-usage-extension">Key Usage Extension</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-qualified-certificate-exten">Qualified Certificate Extensions</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-distinguished-name-addition">Distinguished Name Additions</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-policies">Certificate Policies</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t indent="0" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-subject-sign-tool">Subject Sign Tool</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.4">
                <t indent="0" pn="section-toc.1-1.5.2.4.1"><xref derivedContent="5.4" format="counter" sectionFormat="of" target="section-5.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-issuer-sign-tool">Issuer Sign Tool</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-historical-considerations">Historical Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-gostr3410-2012-pkisyntax">GostR3410-2012-PKISyntax</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="Appendix B" format="default" sectionFormat="of" target="section-appendix.b"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-gostr3410-2012-rustrongcert">GostR3410-2012-RuStrongCertsSyntax</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="Appendix C" format="default" sectionFormat="of" target="section-appendix.c"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-public-key-parameters-2">Public Key Parameters</xref></t>
          </li>
          <li pn="section-toc.1-1.13">
            <t indent="0" pn="section-toc.1-1.13.1"><xref derivedContent="Appendix D" format="default" sectionFormat="of" target="section-appendix.d"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-test-examples">Test Examples</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.13.2">
              <li pn="section-toc.1-1.13.2.1">
                <t indent="0" pn="section-toc.1-1.13.2.1.1"><xref derivedContent="D.1" format="counter" sectionFormat="of" target="section-appendix.d.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-gost-r-3410-2001-test-param">GOST R 34.10-2001 Test Parameters (256-Bit Private Key Length)</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.13.2.1.2">
                  <li pn="section-toc.1-1.13.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.13.2.1.2.1.1"><xref derivedContent="D.1.1" format="counter" sectionFormat="of" target="section-appendix.d.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-request">Certificate Request</xref></t>
                  </li>
                  <li pn="section-toc.1-1.13.2.1.2.2">
                    <t indent="0" pn="section-toc.1-1.13.2.1.2.2.1"><xref derivedContent="D.1.2" format="counter" sectionFormat="of" target="section-appendix.d.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate">Certificate</xref></t>
                  </li>
                  <li pn="section-toc.1-1.13.2.1.2.3">
                    <t indent="0" pn="section-toc.1-1.13.2.1.2.3.1"><xref derivedContent="D.1.3" format="counter" sectionFormat="of" target="section-appendix.d.1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-revocation-list">Certificate Revocation List</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.13.2.2">
                <t indent="0" pn="section-toc.1-1.13.2.2.1"><xref derivedContent="D.2" format="counter" sectionFormat="of" target="section-appendix.d.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-gost-r-3410-2012-tc26-256-a">GOST R 34.10-2012 TC26-256-A Parameters (256-Bit Private Key Length)</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.13.2.2.2">
                  <li pn="section-toc.1-1.13.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.13.2.2.2.1.1"><xref derivedContent="D.2.1" format="counter" sectionFormat="of" target="section-appendix.d.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-request-2">Certificate Request</xref></t>
                  </li>
                  <li pn="section-toc.1-1.13.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.13.2.2.2.2.1"><xref derivedContent="D.2.2" format="counter" sectionFormat="of" target="section-appendix.d.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-2">Certificate</xref></t>
                  </li>
                  <li pn="section-toc.1-1.13.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.13.2.2.2.3.1"><xref derivedContent="D.2.3" format="counter" sectionFormat="of" target="section-appendix.d.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-revocation-list-2">Certificate Revocation List</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.13.2.3">
                <t indent="0" pn="section-toc.1-1.13.2.3.1"><xref derivedContent="D.3" format="counter" sectionFormat="of" target="section-appendix.d.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-gost-r-3410-2012-test-param">GOST R 34.10-2012 Test Parameters (512-Bit Private Key Length)</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.13.2.3.2">
                  <li pn="section-toc.1-1.13.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.13.2.3.2.1.1"><xref derivedContent="D.3.1" format="counter" sectionFormat="of" target="section-appendix.d.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-request-3">Certificate Request</xref></t>
                  </li>
                  <li pn="section-toc.1-1.13.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.13.2.3.2.2.1"><xref derivedContent="D.3.2" format="counter" sectionFormat="of" target="section-appendix.d.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-3">Certificate</xref></t>
                  </li>
                  <li pn="section-toc.1-1.13.2.3.2.3">
                    <t indent="0" pn="section-toc.1-1.13.2.3.2.3.1"><xref derivedContent="D.3.3" format="counter" sectionFormat="of" target="section-appendix.d.3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-certificate-revocation-list-3">Certificate Revocation List</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.14">
            <t indent="0" pn="section-toc.1-1.14.1"><xref derivedContent="Appendix E" format="default" sectionFormat="of" target="section-appendix.e"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-gost-r-3410-2012-test-parame">GOST R 34.10-2012 Test Parameters (Curve Definition)</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.14.2">
              <li pn="section-toc.1-1.14.2.1">
                <t indent="0" pn="section-toc.1-1.14.2.1.1"><xref derivedContent="E.1" format="counter" sectionFormat="of" target="section-appendix.e.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-elliptic-curve-modulus">Elliptic Curve Modulus</xref></t>
              </li>
              <li pn="section-toc.1-1.14.2.2">
                <t indent="0" pn="section-toc.1-1.14.2.2.1"><xref derivedContent="E.2" format="counter" sectionFormat="of" target="section-appendix.e.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-elliptic-curve-coefficients">Elliptic Curve Coefficients</xref></t>
              </li>
              <li pn="section-toc.1-1.14.2.3">
                <t indent="0" pn="section-toc.1-1.14.2.3.1"><xref derivedContent="E.3" format="counter" sectionFormat="of" target="section-appendix.e.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-elliptic-curve-points-group">Elliptic Curve Points Group Order</xref></t>
              </li>
              <li pn="section-toc.1-1.14.2.4">
                <t indent="0" pn="section-toc.1-1.14.2.4.1"><xref derivedContent="E.4" format="counter" sectionFormat="of" target="section-appendix.e.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-order-of-cyclic-subgroup-of">Order of Cyclic Subgroup of Elliptic Curve Points Group</xref></t>
              </li>
              <li pn="section-toc.1-1.14.2.5">
                <t indent="0" pn="section-toc.1-1.14.2.5.1"><xref derivedContent="E.5" format="counter" sectionFormat="of" target="section-appendix.e.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-elliptic-curve-point-coordi">Elliptic Curve Point Coordinates</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.15">
            <t indent="0" pn="section-toc.1-1.15.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.f"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.16">
            <t indent="0" pn="section-toc.1-1.16.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.g"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">This document describes the
        conventions for using the <xref target="GOSTR3410-2012" format="default" sectionFormat="of" derivedContent="GOSTR3410-2012">GOST R
          34.10-2012 signature algorithm</xref> <xref target="RFC7091" format="default" sectionFormat="of" derivedContent="RFC7091"/> and the <xref target="GOSTR3411-2012" format="default" sectionFormat="of" derivedContent="GOSTR3411-2012"> GOST R 34.11-2012 hash function</xref>
        <xref target="RFC6986" format="default" sectionFormat="of" derivedContent="RFC6986"/> in the Internet
        X.509 Public Key Infrastructure (PKI) <xref target="RFC5280" format="default" sectionFormat="of" derivedContent="RFC5280"/>.</t>
      <t indent="0" pn="section-1-2">This specification defines the contents of the signatureAlgorithm,
        signatureValue, signature, and subjectPublicKeyInfo fields within X.509
        Certificates and Certificate Revocation Lists (CRLs). For each algorithm, the appropriate
        alternatives for the keyUsage certificate extension are provided.</t>
      <t indent="0" pn="section-1-3">This specification is developed to facilitate implementations that
        wish to support the GOST algorithms.  This document does not imply
        IETF endorsement of the cryptographic algorithms used in this
        document.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t indent="0" pn="section-1.1-1">The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
        "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>",
        "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>",
        "<bcp14>SHOULD NOT</bcp14>",
        "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
        "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document
        are to be interpreted as described in BCP 14
        <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-signature-algorithm-support">Signature Algorithm Support</name>
      <t indent="0" pn="section-2-1">Conforming Certificate Authorities (CAs) <bcp14>MAY</bcp14> use the GOST R 34.10-2012 signature algorithm to sign
        certificates and CRLs. This signature algorithm <bcp14>MUST</bcp14> always be used 
        with the GOST R 34.11-2012 hash function. It may use a key length of either 
        256 bits or 512 bits.</t>
      <t indent="0" pn="section-2-2">The ASN.1 object identifier (OID) used to identify the GOST R 34.10-2012
        signature algorithm with a 256-bit key length and the GOST R 34.11-2012 hash
        function with a 256-bit hash code is:</t>
      <sourcecode name="" type="asn.1" markers="false" pn="section-2-3">id-tc26-signwithdigest-gost3410-12-256 OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        algorithms(1) signwithdigest(3) gost3410-12-256(2)}
</sourcecode>
      <t indent="0" pn="section-2-4">The GOST R 34.10-2012 signature algorithm with a 256-bit key length generates a digital
        signature in the form of two 256-bit integers: r and s.  Its octet
        string representation consists of 64 octets, where the first 32
        octets contain the big-endian representation of s and the second 32
        octets contain the big-endian representation of r.</t>
      <t indent="0" pn="section-2-5">The ASN.1 OID used to identify the GOST R 34.10-2012
        signature algorithm with a 512-bit key length and the GOST R 34.11-2012 hash
        function with a 512-bit hash code is:</t>
      <sourcecode name="" type="asn.1" markers="false" pn="section-2-6">id-tc26-signwithdigest-gost3410-12-512 OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        algorithms(1) signwithdigest(3) gost3410-12-512(3)}
</sourcecode>
      <t indent="0" pn="section-2-7">The GOST R 34.10-2012 signature algorithm with a 512-bit key length generates a digital
        signature in the form of two 512-bit integers: r and s.  Its octet
        string representation consists of 128 octets, where the first 64
        octets contain the big-endian representation of s and the second 64
        octets contain the big-endian representation of r.</t>
      <t indent="0" pn="section-2-8">When either of these OIDs is used as the algorithm field in an
        AlgorithmIdentifier structure, the encoding <bcp14>MUST</bcp14> omit the parameters
        field.</t>
      <t indent="0" pn="section-2-9">The described definition of a signature value is directly usable in the Cryptographic Message Syntax (CMS) <xref target="RFC5652" format="default" sectionFormat="of" derivedContent="RFC5652"/>,
        where such values are represented as octet strings.  However,
        signature values in certificates and CRLs <xref target="RFC5280" format="default" sectionFormat="of" derivedContent="RFC5280"/> are represented
        as bit strings, and thus the octet string representation must be
        converted.</t>
      <t indent="0" pn="section-2-10">To convert an octet string signature value to a bit string, the most
        significant bit of the first octet of the signature value <bcp14>SHALL</bcp14>
        become the first bit of the bit string, and so on through the least
        significant bit of the last octet of the signature value, which <bcp14>SHALL</bcp14>
        become the last bit of the bit string.</t>
    </section>
    <section anchor="streebog" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-hash-function-support">Hash Function Support</name>
      <t indent="0" pn="section-3-1">The ASN.1 OID used to identify the GOST R 34.11-2012 hash
        function with a 256-bit hash code is:</t>
      <sourcecode name="" type="asn.1" markers="false" pn="section-3-2">id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        algorithms(1) digest(2) gost3411-12-256(2)}
</sourcecode>
      <t indent="0" pn="section-3-3">The ASN.1 OID used to identify the GOST R 34.11-2012 hash
        function with a 512-bit hash code is:</t>
      <sourcecode name="" type="asn.1" markers="false" pn="section-3-4">id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        algorithms(1) digest(2) gost3411-12-512(3)}
</sourcecode>
      <t indent="0" pn="section-3-5">When either of these OIDs is used as the algorithm field in an
        AlgorithmIdentifier structure, the encoding <bcp14>MUST</bcp14> omit the parameters
        field.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-subject-public-keys-informa">Subject Public Keys Information Fields</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-public-key-identifiers">Public Key Identifiers</name>
        <t indent="0" pn="section-4.1-1">GOST R 34.10-2012 public keys with a 256-bit private key length are
          identified by the following OID:</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-4.1-2">id-tc26-gost3410-12-256 OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        algorithms(1) sign(1) gost3410-12-256(1)}
</sourcecode>
        <t indent="0" pn="section-4.1-3">GOST R 34.10-2012 public keys with a 512-bit private key length are
          identified by the following OID:</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-4.1-4">id-tc26-gost3410-12-512 OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        algorithms(1) sign(1) gost3410-12-512(2)}
</sourcecode>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-public-key-parameters">Public Key Parameters</name>
        <t indent="0" pn="section-4.2-1">When either of these identifiers appears as the algorithm field in the
          SubjectPublicKeyInfo.algorithm.algorithm field, the parameters field <bcp14>MUST</bcp14>
          have the following structure:
        </t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-4.2-2">GostR3410-2012-PublicKeyParameters ::= SEQUENCE
    {
        publicKeyParamSet OBJECT IDENTIFIER,
        digestParamSet OBJECT IDENTIFIER OPTIONAL
    }
</sourcecode>
        <t indent="0" pn="section-4.2-3">where:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.2-4">
          <li pn="section-4.2-4.1">
            <tt>publicKeyParamSet</tt> is the public key parameters identifier
for GOST R 34.10-2012 parameters (see Sections <xref target="RFC7836" section="5.1.1" sectionFormat="bare" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7836#section-5.1.1" derivedContent="RFC7836"/> and <xref target="RFC7836" section="5.2.1" sectionFormat="bare" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7836#section-5.2.1" derivedContent="RFC7836"/> of <xref target="RFC7836" format="default" sectionFormat="of" derivedContent="RFC7836"/> or <xref target="pkparamsBCD" format="default" sectionFormat="of" derivedContent="Appendix C"/>) or GOST R 34.10-2001 parameters (see <xref target="RFC4357" sectionFormat="of" section="8.4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4357#section-8.4" derivedContent="RFC4357"/>).</li>
          <li pn="section-4.2-4.2">
            <tt>digestParamSet</tt> is the parameters identifier for the corresponding GOST R 34.11-2012 parameters (see <xref target="streebog" format="default" sectionFormat="of" derivedContent="Section 3"/>).</li>
        </ul>
        <t indent="0" pn="section-4.2-5">The following values, when used as <tt>publicKeyParamSet</tt>, define
          test public key parameter sets and <bcp14>MUST NOT</bcp14> be used outside of testing scenarios:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.2-6">
          <li pn="section-4.2-6.1">
            <tt>id-GostR3410-2001-TestParamSet</tt></li>
          <li pn="section-4.2-6.2">
            <tt>id-tc26-gost-3410-2012-512-paramSetTest</tt></li>
        </ul>
        <t indent="0" pn="section-4.2-7">The <tt>digestParamSet</tt> field:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.2-8">
          <li pn="section-4.2-8.1">
            <bcp14>SHOULD</bcp14> be omitted if the GOST R 34.10-2012 signature algorithm is used with a 512-bit key length</li>
          <li pn="section-4.2-8.2">
            <t indent="0" pn="section-4.2-8.2.1"><bcp14>MUST</bcp14> be present and must be equal to <tt>id-tc26-digest-gost3411-12-256</tt> if one of the following values is used as <tt>publicKeyParamSet</tt>:
            </t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.2-8.2.2">
              <li pn="section-4.2-8.2.2.1">
                <tt>id-GostR3410-2001-TestParamSet</tt></li>
              <li pn="section-4.2-8.2.2.2">
                <tt>id-GostR3410-2001-CryptoPro-A-ParamSet</tt></li>
              <li pn="section-4.2-8.2.2.3">
                <tt>id-GostR3410-2001-CryptoPro-B-ParamSet</tt></li>
              <li pn="section-4.2-8.2.2.4">
                <tt>id-GostR3410-2001-CryptoPro-C-ParamSet</tt></li>
              <li pn="section-4.2-8.2.2.5">
                <tt>id-GostR3410-2001-CryptoPro-XchA-ParamSet</tt></li>
              <li pn="section-4.2-8.2.2.6">
                <tt>id-GostR3410-2001-CryptoPro-XchB-ParamSet</tt></li>
            </ul>
          </li>
          <li pn="section-4.2-8.3">
            <t indent="0" pn="section-4.2-8.3.1"><bcp14>SHOULD</bcp14> be omitted if publicKeyParamSet is equal to:
            </t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.2-8.3.2">
              <li pn="section-4.2-8.3.2.1">
                <tt>id-tc26-gost-3410-2012-256-paramSetA</tt></li>
            </ul>
          </li>
          <li pn="section-4.2-8.4">
            <t indent="0" pn="section-4.2-8.4.1"><bcp14>MUST</bcp14> be omitted if one of the following values is used as publicKeyParamSet:
            </t>
            <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.2-8.4.2">
              <li pn="section-4.2-8.4.2.1">
                <tt>id-tc26-gost-3410-2012-256-paramSetB</tt></li>
              <li pn="section-4.2-8.4.2.2">
                <tt>id-tc26-gost-3410-2012-256-paramSetC</tt></li>
              <li pn="section-4.2-8.4.2.3">
                <tt>id-tc26-gost-3410-2012-256-paramSetD</tt></li>
            </ul>
          </li>
        </ul>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-public-key-encoding">Public Key Encoding</name>
        <t indent="0" pn="section-4.3-1">The GOST R 34.10-2012 public key <bcp14>MUST</bcp14> be ASN.1 DER encoded as an
          OCTET STRING. This encoding <bcp14>SHALL</bcp14> be used as the content (i.e., the
          value) of the subjectPublicKey field (a BIT STRING) of the 
          SubjectPublicKeyInfo structure.</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-4.3-2">GostR3410-2012-256-PublicKey ::= OCTET STRING (SIZE(64))
GostR3410-2012-512-PublicKey ::= OCTET STRING (SIZE (128))
</sourcecode>
        <t indent="0" pn="section-4.3-3"><tt>GostR3410-2012-256-PublicKey</tt> <bcp14>MUST</bcp14>
          contain 64 octets, where the first 32 octets contain the
          little-endian representation of the <tt>x</tt> coordinate of the public key and the
          second 32 octets contain the little-endian representation of the <tt>y</tt> coordinate of the public key.</t>
        <t indent="0" pn="section-4.3-4"><tt>GostR3410-2012-512-PublicKey</tt> <bcp14>MUST</bcp14>
          contain 128 octets, where the first 64 octets contain the
          little-endian representation of the <tt>x</tt> coordinate of the public key and the
          second 64 octets contain the little-endian representation of the <tt>y</tt> coordinate of the public key.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-key-usage-extension">Key Usage Extension</name>
        <t indent="0" pn="section-4.4-1">If the KeyUsage extension is present in a certificate with the GOST R 34.10-2012 public key, the following values <bcp14>MAY</bcp14> be present:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-4.4-2">
          <li pn="section-4.4-2.1">
            <tt>digitalSignature</tt> (0)</li>
          <li pn="section-4.4-2.2">
            <tt>contentCommitment</tt> (1)</li>
          <li pn="section-4.4-2.3">
            <tt>keyEncipherment</tt> (2)</li>
          <li pn="section-4.4-2.4">
            <tt>dataEncipherment</tt> (3)</li>
          <li pn="section-4.4-2.5">
            <tt>keyAgreement</tt> (4)</li>
          <li pn="section-4.4-2.6">
            <tt>keyCertSign</tt> (5)</li>
          <li pn="section-4.4-2.7">
            <tt>cRLSign</tt> (6)</li>
          <li pn="section-4.4-2.8">
            <tt>encipherOnly</tt> (7)</li>
          <li pn="section-4.4-2.9">
            <tt>decipherOnly</tt> (8)</li>
        </ul>
        <t indent="0" pn="section-4.4-3">Note that <tt>contentCommitment</tt> was named <tt>nonRepudiation</tt> in previous versions of X.509.</t>
        <t indent="0" pn="section-4.4-4">If the key is going to be used for key agreement, the <tt>keyAgreement</tt> flag <bcp14>MUST</bcp14> be present in the <tt>KeyUsage</tt> extension, with the <tt>encipherOnly</tt> and <tt>decipherOnly</tt> flags being optional.  However,
          the <tt>encipherOnly</tt> and <tt>decipherOnly</tt> flags <bcp14>MUST NOT</bcp14> be present
          simultaneously.</t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-qualified-certificate-exten">Qualified Certificate Extensions</name>
      <t indent="0" pn="section-5-1">This section defines additional OIDs for use in
        qualified certificates for checking digital signatures.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-distinguished-name-addition">Distinguished Name Additions</name>
        <t keepWithNext="true" indent="0" pn="section-5.1-1">OGRN is the main state registration number of juridical entities.</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-5.1-2">OGRN ::= NUMERIC STRING (SIZE(13))
</sourcecode>
        <t keepWithPrevious="true" indent="0" pn="section-5.1-3">The corresponding OID is <tt>1.2.643.100.1</tt>.</t>
        <t keepWithNext="true" indent="0" pn="section-5.1-4">SNILS is the individual insurance account number.</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-5.1-5">SNILS ::= NUMERIC STRING (SIZE(11))
</sourcecode>
        <t keepWithPrevious="true" indent="0" pn="section-5.1-6">The corresponding OID is <tt>1.2.643.100.3</tt>.</t>
        <t keepWithNext="true" indent="0" pn="section-5.1-7">INNLE is the individual taxpayer number (ITN) of the legal entity.</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-5.1-8">INNLE ::= NUMERIC STRING (SIZE(10))
</sourcecode>
        <t keepWithPrevious="true" indent="0" pn="section-5.1-9">The corresponding OID is <tt>1.2.643.100.4</tt>.</t>
        <t keepWithNext="true" indent="0" pn="section-5.1-10">OGRNIP is the main state registration number of individual entrepreneurs (sole traders).</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-5.1-11">OGRNIP ::= NUMERIC STRING (SIZE(15))
</sourcecode>
        <t keepWithPrevious="true" indent="0" pn="section-5.1-12">The corresponding OID is <tt>1.2.643.100.5</tt>.</t>
        <t keepWithNext="true" indent="0" pn="section-5.1-13">IdentificationKind represents the way the receiver of the certificate was identified by the CA.</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-5.1-14">IdentificationKind ::= INTEGER { personal(0), remote-cert(1),
            remote-passport(2), remote-system(3) }
</sourcecode>
        <t keepWithPrevious="true" indent="0" pn="section-5.1-15">The corresponding OID is <tt>1.2.643.100.114</tt>.</t>
        <t keepWithNext="true" indent="0" pn="section-5.1-16">INN is the individual taxpayer number (ITN).</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-5.1-17">INN ::= NUMERIC STRING (SIZE(12))
</sourcecode>
        <t keepWithPrevious="true" indent="0" pn="section-5.1-18">The corresponding OID is <tt>1.2.643.3.131.1.1</tt>.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-certificate-policies">Certificate Policies</name>
        <t indent="0" pn="section-5.2-1">The Russian national regulation body for cryptography defines several security 
          levels of cryptographic tools. Depending on
          the class of cryptographic token used by the certificate owner, the
          following OIDs must be included in certificate policies.
          Certificates should include OIDs, starting from the lowest (KC1) up
          to the strongest applicable.
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5.2-2">
          <li pn="section-5.2-2.1">
            <tt>1.2.643.100.113.1</tt> - class KC1</li>
          <li pn="section-5.2-2.2">
            <tt>1.2.643.100.113.2</tt> - class KC2</li>
          <li pn="section-5.2-2.3">
            <tt>1.2.643.100.113.3</tt> - class KC3</li>
          <li pn="section-5.2-2.4">
            <tt>1.2.643.100.113.4</tt> - class KB1</li>
          <li pn="section-5.2-2.5">
            <tt>1.2.643.100.113.5</tt> - class KB2</li>
          <li pn="section-5.2-2.6">
            <tt>1.2.643.100.113.6</tt> - class KA1</li>
        </ul>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-5.3">
        <name slugifiedName="name-subject-sign-tool">Subject Sign Tool</name>
        <t keepWithNext="true" indent="0" pn="section-5.3-1">To denote the token or software type used by the certificate owner, the following non-critical <tt>SubjectSignTool</tt> extension with OID <tt>1.2.643.100.111</tt> should be included. It is defined as</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-5.3-2">SubjectSignTool ::= UTF8String(SIZE(1..200))
</sourcecode>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-5.4">
        <name slugifiedName="name-issuer-sign-tool">Issuer Sign Tool</name>
        <t keepWithNext="true" indent="0" pn="section-5.4-1">To denote the tools used to generate key pairs and tools used by the CA to sign certificates, the following non-critical <tt>IssuerSignTool</tt> extension with OID <tt>1.2.643.100.112</tt> should be included. It is defined as</t>
        <sourcecode name="" type="asn.1" markers="false" pn="section-5.4-2">IssuerSignTool ::= SEQUENCE {
  signTool     UTF8String(SIZE(1..200)),
  cATool       UTF8String(SIZE(1..200)),
  signToolCert UTF8String(SIZE(1..100)),
  cAToolCert   UTF8String(SIZE(1..100)) }
</sourcecode>
        <t indent="0" pn="section-5.4-3">where:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5.4-4">
          <li pn="section-5.4-4.1">
            <tt>signTool</tt> identifies tools used to
              create key pairs.</li>
          <li pn="section-5.4-4.2">
            <tt>cATool</tt> identifies tools used by the CA.</li>
          <li pn="section-5.4-4.3">
            <tt>signToolCert</tt> and <tt>cAToolCert</tt> contain the notice of
                the conformance of respective tools to Russian federal law on
                digital signatures.</li>
        </ul>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-historical-considerations">Historical Considerations</name>
      <t indent="0" pn="section-6-1">Note that, for a significant period of time, there were no documents describing <tt>GostR3410-2012-PublicKeyParameters</tt>.
        Several old implementations have used <tt>GostR3410-2001-PublicKeyParameters</tt> instead.
        These implementations will return an error if the <tt>digestParamSet</tt> field is not included in public key parameters.
        Thus, an implementation wishing to collaborate with old implementations might want to include <tt>digestParamSet</tt> equal to <tt>id-tc26-digest-gost3411-12-512</tt> if one of the following values is used as <tt>publicKeyParamSet</tt>:
      </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-2">
        <li pn="section-6-2.1">
          <tt>id-tc26-gost-3410-12-512-paramSetA</tt></li>
        <li pn="section-6-2.2">
          <tt>id-tc26-gost-3410-12-512-paramSetB</tt></li>
      </ul>
      <t indent="0" pn="section-6-3">Note that the usage of <tt>keyEncipherment</tt> and <tt>dataEncipherment</tt> values for the
        <tt>KeyUsage</tt> extension is not fully defined for the GOST R 34.10-2012 public
        keys, so they <bcp14>SHOULD</bcp14> be used with additional care.</t>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-7-1">This document has no IANA actions.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-8-1">It is <bcp14>RECOMMENDED</bcp14> that applications verify signature values and subject 
        public keys to conform to the GOST R 34.10-2012 standard <xref target="GOSTR3410-2012" format="default" sectionFormat="of" derivedContent="GOSTR3410-2012"/> <xref target="RFC7091" format="default" sectionFormat="of" derivedContent="RFC7091"/> prior to their use.</t>
      <t indent="0" pn="section-8-2">It is <bcp14>RECOMMENDED</bcp14> that CAs and applications make sure that the private key 
        for creating signatures is not used for more than its allowed validity period 
        (typically 15 months for the GOST R 34.10-2012 algorithm).</t>
      <t indent="0" pn="section-8-3">Test parameter sets (<tt>id-GostR3410-2001-TestParamSet</tt>
        and <tt>id-tc26-gost-3410-2012-512-paramSetTest</tt>) <bcp14>MUST NOT</bcp14>
        be used outside of testing scenarios.
        The use of parameter sets not described herein
        is <bcp14>NOT RECOMMENDED</bcp14>. When different parameters are used, it is
        <bcp14>RECOMMENDED</bcp14> that they be subjected to examination by an authorized
        agency with approved methods of cryptographic analysis.</t>
      <t indent="0" pn="section-8-4">For security discussions concerning the use of algorithm parameters, see <xref target="ANS17" format="default" sectionFormat="of" derivedContent="ANS17"/> 
        and the Security Considerations sections in <xref target="RFC4357" format="default" sectionFormat="of" derivedContent="RFC4357"/> and <xref target="RFC7836" format="default" sectionFormat="of" derivedContent="RFC7836"/>.</t>
    </section>
  </middle>
  <back>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4357" target="https://www.rfc-editor.org/info/rfc4357" quoteTitle="true" derivedAnchor="RFC4357">
          <front>
            <title>Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms</title>
            <author initials="V." surname="Popov" fullname="V. Popov">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Kurepkin" fullname="I. Kurepkin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Leontiev" fullname="S. Leontiev">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="January"/>
            <abstract>
              <t indent="0">This document describes the cryptographic algorithms and parameters supplementary to the original GOST specifications, GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94, for use in Internet applications.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4357"/>
          <seriesInfo name="DOI" value="10.17487/RFC4357"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" quoteTitle="true" derivedAnchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author initials="D." surname="Cooper" fullname="D. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Santesson" fullname="S. Santesson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Farrell" fullname="S. Farrell">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Boeyen" fullname="S. Boeyen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Polk" fullname="W. Polk">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="May"/>
            <abstract>
              <t indent="0">This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652" target="https://www.rfc-editor.org/info/rfc5652" quoteTitle="true" derivedAnchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author initials="R." surname="Housley" fullname="R. Housley">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="September"/>
            <abstract>
              <t indent="0">This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6986" target="https://www.rfc-editor.org/info/rfc6986" quoteTitle="true" derivedAnchor="RFC6986">
          <front>
            <title>GOST R 34.11-2012: Hash Function</title>
            <author initials="V." surname="Dolmatov" fullname="V. Dolmatov" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Degtyarev" fullname="A. Degtyarev">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="August"/>
            <abstract>
              <t indent="0">This document is intended to be a source of information about the Russian Federal standard hash function (GOST R 34.11-2012), which is one of the Russian cryptographic standard algorithms (called GOST algorithms).  This document updates RFC 5831.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6986"/>
          <seriesInfo name="DOI" value="10.17487/RFC6986"/>
        </reference>
        <reference anchor="RFC7091" target="https://www.rfc-editor.org/info/rfc7091" quoteTitle="true" derivedAnchor="RFC7091">
          <front>
            <title>GOST R 34.10-2012: Digital Signature Algorithm</title>
            <author initials="V." surname="Dolmatov" fullname="V. Dolmatov" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Degtyarev" fullname="A. Degtyarev">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="December"/>
            <abstract>
              <t indent="0">This document provides information about the Russian Federal standard for digital signatures (GOST R 34.10-2012), which is one of the Russian cryptographic standard algorithms (called GOST algorithms). Recently, Russian cryptography is being used in Internet applications, and this document provides information for developers and users of GOST R 34.10-2012 regarding digital signature generation and verification.  This document updates RFC 5832.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7091"/>
          <seriesInfo name="DOI" value="10.17487/RFC7091"/>
        </reference>
        <reference anchor="RFC7836" target="https://www.rfc-editor.org/info/rfc7836" quoteTitle="true" derivedAnchor="RFC7836">
          <front>
            <title>Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012</title>
            <author initials="S." surname="Smyshlyaev" fullname="S. Smyshlyaev" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Alekseev" fullname="E. Alekseev">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Oshkin" fullname="I. Oshkin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Popov" fullname="V. Popov">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Leontiev" fullname="S. Leontiev">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="V." surname="Podobaev" fullname="V. Podobaev">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Belyavsky" fullname="D. Belyavsky">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="March"/>
            <abstract>
              <t indent="0">The purpose of this document is to make the specifications of the cryptographic algorithms defined by the Russian national standards GOST R 34.10-2012 and GOST R 34.11-2012 available to the Internet community for their implementation in the cryptographic protocols based on the accompanying algorithms.</t>
              <t indent="0">These specifications define the pseudorandom functions, the key agreement algorithm based on the Diffie-Hellman algorithm and a hash function, the parameters of elliptic curves, the key derivation functions, and the key export functions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7836"/>
          <seriesInfo name="DOI" value="10.17487/RFC7836"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="ANS17" quoteTitle="true" target="https://doi.org/10.4213/mvk260" derivedAnchor="ANS17">
          <front>
            <title>On the security properties of Russian standardized elliptic curves</title>
            <author fullname="E.K. Alekseev" initials="E.K." surname="Alekseev"/>
            <author fullname="V.D. Nikolaev" initials="V.D." surname="Nikolaev"/>
            <author fullname="S.V. Smyshlyaev" initials="S.V." surname="Smyshlyaev"/>
            <date year="2018"/>
          </front>
          <refcontent>Mathematical Aspects of Cryptography, 9:3, P. 5-32</refcontent>
          <seriesInfo name="DOI" value="10.4213/mvk260"/>
        </reference>
        <reference anchor="GOSTR3410-2012" quoteTitle="true" derivedAnchor="GOSTR3410-2012">
          <front>
            <title>Information technology.  Cryptographic data security.  Signature and verification processes of [electronic] digital signature</title>
            <author>
              <organization showOnFrontPage="true"></organization>
            </author>
            <date year="2012"/>
          </front>
          <refcontent>GOST R 34.10-2012, Federal Agency on Technical Regulating and Metrology</refcontent>
        </reference>
        <reference anchor="GOSTR3411-2012" quoteTitle="true" derivedAnchor="GOSTR3411-2012">
          <front>
            <title>Information technology.  Cryptographic Data Security.  Hashing function</title>
            <author>
              <organization showOnFrontPage="true"></organization>
            </author>
            <date year="2012"/>
          </front>
          <refcontent>GOST R 34.11-2012, Federal Agency on Technical Regulating and Metrology</refcontent>
        </reference>
      </references>
    </references>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-gostr3410-2012-pkisyntax">GostR3410-2012-PKISyntax</name>
      <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.a-1">GostR3410-2012-PKISyntax
    { iso(1) member-body(2) ru(643) rosstandart(7)
      tc26(1) modules(0) gostR3410-2012-PKISyntax(2) }

DEFINITIONS ::=
BEGIN
-- EXPORTS All --

    -- ASN.1 TC 26 root
    id-tc26 OBJECT IDENTIFIER ::=
        { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1) }

    -- Signature algorithm
    id-tc26-sign OBJECT IDENTIFIER ::=
    { id-tc26 algorithms(1) sign(1) }

    -- Hash algorithm
    id-tc26-digest OBJECT IDENTIFIER ::=
    { id-tc26 algorithms(1) digest(2) }

    -- Public key identifiers
    id-tc26-sign-constants OBJECT IDENTIFIER ::=
    { id-tc26 constants(2) sign(1) }

    -- Public key algorithm GOST R 34.10-2012 / 256-bit identifiers
    id-tc26-gost-3410-2012-256-constants OBJECT IDENTIFIER ::=
    { id-tc26-sign-constants gost-3410-2012-256(1) }

    -- Public key algorithm GOST R 34.10-2012 / 512-bit identifiers
    id-tc26-gost-3410-2012-512-constants OBJECT IDENTIFIER ::=
    { id-tc26-sign-constants gost-3410-2012-512(2) }

    -- GOST R 34.10-2012 / 256-bit signature algorithm
    id-tc26-gost3410-12-256 OBJECT IDENTIFIER ::=
    { id-tc26-sign gost3410-12-256(1) }

    -- GOST R 34.10-2012 / 512-bit signature algorithm
    id-tc26-gost3410-12-512 OBJECT IDENTIFIER ::=
    { id-tc26-sign gost3410-12-512(2) }

    -- GOST R 34.11-2012 / 256-bit hash algorithm
    id-tc26-gost3411-12-256 OBJECT IDENTIFIER ::=
    { id-tc26-digest gost3411-12-256(2)}

    -- GOST R 34.11-2012 / 512-bit hash algorithm
    id-tc26-gost3411-12-512 OBJECT IDENTIFIER ::=
    { id-tc26-digest gost3411-12-512(3)}

    -- GOST R 34.10-2012 / GOST R 34.11-2012 sign/hash algorithm
    id-tc26-signwithdigest OBJECT IDENTIFIER ::=
    { id-tc26 algorithms(1) signwithdigest(3) }

    -- Signature &amp; hash algorithm GOST R 34.10-2012 / 256 bits
    -- with GOST R 34.11-2012
    id-tc26-signwithdigest-gost3410-12-256 OBJECT IDENTIFIER ::=
    { id-tc26-signwithdigest gost3410-12-256(2) }

    -- Signature &amp; hash algorithm GOST R 34.10-2012 / 512 bits
    -- with GOST R 34.11-2012
    id-tc26-signwithdigest-gost3410-12-512 OBJECT IDENTIFIER ::=
    { id-tc26-signwithdigest gost3410-12-512(3) }

    -- GOST R 34.10-2012 / 256-bit signature algorithm
    -- parameters identifier: "Set A"
    id-tc26-gost-3410-2012-256-paramSetA OBJECT IDENTIFIER ::=
    { id-tc26-gost-3410-2012-256-constants paramSetA(1) }

    -- GOST R 34.10-2012 / 256-bit signature algorithm
    -- parameters identifier: "Set B"
    id-tc26-gost-3410-2012-256-paramSetB OBJECT IDENTIFIER ::=
    { id-tc26-gost-3410-2012-256-constants paramSetB(2) }

    -- GOST R 34.10-2012 / 256-bit signature algorithm
    -- parameters identifier: "Set C"
    id-tc26-gost-3410-2012-256-paramSetC OBJECT IDENTIFIER ::=
    { id-tc26-gost-3410-2012-256-constants paramSetC(3) }

    -- GOST R 34.10-2012 / 256-bit signature algorithm
    -- parameters identifier: "Set D"
    id-tc26-gost-3410-2012-256-paramSetD OBJECT IDENTIFIER ::=
    { id-tc26-gost-3410-2012-256-constants paramSetD(4) }

    -- GOST R 34.10-2012 / 512-bit signature algorithm
    -- parameters identifier: "Test set"
    id-tc26-gost-3410-2012-512-paramSetTest OBJECT IDENTIFIER ::=
    { id-tc26-gost-3410-2012-512-constants paramSetTest(0) }

    -- GOST R 34.10-2012 / 512-bit signature algorithm
    -- parameters identifier: "Set A"
    id-tc26-gost-3410-2012-512-paramSetA OBJECT IDENTIFIER ::=
    { id-tc26-gost-3410-2012-512-constants paramSetA(1) }

    -- GOST R 34.10-2012 / 512-bit signature algorithm
    -- parameters identifier: "Set B"
    id-tc26-gost-3410-2012-512-paramSetB OBJECT IDENTIFIER ::=
    { id-tc26-gost-3410-2012-512-constants paramSetB(2) }

    -- GOST R 34.10-2012 / 512-bit signature algorithm
    -- parameters identifier: "Set C"
    id-tc26-gost-3410-2012-512-paramSetC OBJECT IDENTIFIER ::=
    { id-tc26-gost-3410-2012-512-constants paramSetC(3) }

    -- Public key GOST R 34.10-2012 / 256 bits
    GostR3410-2012-256-PublicKey ::= OCTET STRING (SIZE (64))
    -- Public key GOST R 34.10-2012 / 512 bits
    GostR3410-2012-512-PublicKey ::= OCTET STRING (SIZE (128))
    -- Public key GOST R 34.10-2012
    GostR3410-2012-PublicKey ::= OCTET STRING (SIZE (64 | 128))

    -- Public key parameters GOST R 34.10-2012
    GostR3410-2012-PublicKeyParameters ::=
        SEQUENCE {
            publicKeyParamSet OBJECT IDENTIFIER,
            digestParamSet OBJECT IDENTIFIER OPTIONAL
            }

END -- GostR3410-2012-PKISyntax
</sourcecode>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-gostr3410-2012-rustrongcert">GostR3410-2012-RuStrongCertsSyntax</name>
      <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.b-1">RuStrongCertsSyntax
    { iso(1) member-body(2) ru(643) rosstandart(7)
      tc26(1) modules(0) ruStrongCertsSyntax(6) }

DEFINITIONS ::=
BEGIN
-- EXPORTS All --

    id-ca OBJECT IDENTIFIER ::=
        { iso(1) member-body(2) ru(643) ca(3) }

    id-fss OBJECT IDENTIFIER ::=
        { iso(1) member-body(2) ru(643) fss(100) }

    id-fns OBJECT IDENTIFIER ::=
        { id-ca fns(131) }

    -- The main state registration number of juridical entities.
    OGRN ::= NumericString(SIZE (13))

    id-OGRN OBJECT IDENTIFIER ::=
         { id-fss ogrn(1) }

    --  The individual insurance account number.
    SNILS ::= NumericString(SIZE (11))

    id-SNILS OBJECT IDENTIFIER ::=
         { id-fss snils(3) }

    -- The main state registration number of
    -- individual entrepreneurs (sole traders).
    OGRNIP ::= NumericString(SIZE (15))

    id-OGRNIP OBJECT IDENTIFIER ::=
         { id-fss ogrnip(5) }

    id-class OBJECT IDENTIFIER ::=
         { id-fss class(113) }

    id-class-kc1 OBJECT IDENTIFIER ::=
         { id-class kc1(1) }

    id-class-kc2 OBJECT IDENTIFIER ::=
         { id-class kc2(2) }

    id-class-kc3 OBJECT IDENTIFIER ::=
         { id-class kc3(3) }

    id-class-kb1 OBJECT IDENTIFIER ::=
         { id-class kb1(4) }

    id-class-kb2 OBJECT IDENTIFIER ::=
         { id-class kb2(5) }

    id-class-ka OBJECT IDENTIFIER ::=
         { id-class ka(6) }

    -- The individual taxpayer number (ITN).
    INN ::= NumericString(SIZE (12))

    id-INN OBJECT IDENTIFIER ::=
         { id-fns ids(1) inn(1) }

    -- The organization taxpayer number (OTN).
    INNLE ::= NumericString(SIZE (10))

    id-INNLE OBJECT IDENTIFIER ::=
         { id-fss innle(4) }

    -- The token or software type used by the certificate owner.
    SubjectSignTool ::= UTF8String(SIZE(1..200))

    id-SubjectSignTool OBJECT IDENTIFIER ::=
         { id-fss subjectSignTool(111) }

    -- The tools used to generate key pairs and tools used by
    -- the CA to sign certificates.
    IssuerSignTool ::= SEQUENCE {
         signTool     UTF8String(SIZE(1..200)),
         cATool       UTF8String(SIZE(1..200)),
         signToolCert UTF8String(SIZE(1..100)),
         cAToolCert   UTF8String(SIZE(1..100)) }

    id-IssuerSignTool OBJECT IDENTIFIER ::=
         { id-fss issuerSignTool(112) }

    -- The method of identifying the owner, when it applies/receives
    -- the certificate in the CA.
    IdentificationKind ::= INTEGER { personal(0), remote-cert(1),
         remote-passport(2), remote-system(3) }

    id-IdentificationKind OBJECT IDENTIFIER ::=
         { id-fss identificationKind(114) }

END -- RuStrongCertsSyntax
</sourcecode>
    </section>
    <section anchor="pkparamsBCD" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.c">
      <name slugifiedName="name-public-key-parameters-2">Public Key Parameters</name>
      <t indent="0" pn="section-appendix.c-1">Here we define three new OIDs for three existing public key parameter sets
        defined in <xref target="RFC4357" format="default" sectionFormat="of" derivedContent="RFC4357"/>. These OIDs <bcp14>MUST</bcp14> be used with 
        GOST R 34.10-2012 public keys only.</t>
      <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.c-2">id-tc26-gost-3410-2012-256-paramSetB OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        constants(2) sign-constants(1) gost-3410-12-256-constants(1)
          paramSetB(2)}
</sourcecode>
      <t indent="0" pn="section-appendix.c-3">The elliptic curve of this parameter set is the same as that of 
         <tt>id-GostR3410-2001-CryptoPro-A-ParamSet</tt> (and <tt>id-GostR3410-2001-CryptoPro-XchA-ParamSet</tt>),
         which can be found in <xref target="RFC4357" format="default" sectionFormat="of" derivedContent="RFC4357"/>.
      </t>
      <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.c-4">id-tc26-gost-3410-2012-256-paramSetC OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        constants(2) sign-constants(1) gost-3410-12-256-constants(1)
          paramSetC(3)}
</sourcecode>
      <t indent="0" pn="section-appendix.c-5">The elliptic curve of this parameter set is the same as that of 
         <tt>id-GostR3410-2001-CryptoPro-B-ParamSet</tt>, which can be found in <xref target="RFC4357" format="default" sectionFormat="of" derivedContent="RFC4357"/>.</t>
      <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.c-6">id-tc26-gost-3410-2012-256-paramSetD OBJECT IDENTIFIER ::=
    { iso(1) member-body(2) ru(643) rosstandart(7) tc26(1)
        constants(2) sign-constants(1) gost-3410-12-256-constants(1)
          paramSetD(4)}
</sourcecode>
      <t indent="0" pn="section-appendix.c-7">The elliptic curve of this parameter set is the same as that of 
         <tt>id-GostR3410-2001-CryptoPro-C-ParamSet</tt> (and <tt>id-GostR3410-2001-CryptoPro-XchB-ParamSet</tt>),
         which can be found in <xref target="RFC4357" format="default" sectionFormat="of" derivedContent="RFC4357"/>.</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d">
      <name slugifiedName="name-test-examples">Test Examples</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.1">
        <name slugifiedName="name-gost-r-3410-2001-test-param">GOST R 34.10-2001 Test Parameters (256-Bit Private Key Length)</name>
        <t indent="0" pn="section-appendix.d.1-1">This example uses the curve defined in <xref target="RFC7091" sectionFormat="of" section="7.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7091#section-7.1" derivedContent="RFC7091"/>.</t>
        <t keepWithNext="true" indent="0" pn="section-appendix.d.1-2">The private key is</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.d.1-3">d = 0x7A929ADE789BB9BE10ED359DD39A72C1\\
      1B60961F49397EEE1D19CE9891EC3B28
</artwork>
        <t keepWithNext="true" indent="0" pn="section-appendix.d.1-4">The public key is</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.d.1-5">x = 0x7F2B49E270DB6D90D8595BEC458B50C5\\
      8585BA1D4E9B788F6689DBD8E56FD80B

y = 0x26F1B489D6701DD185C8413A977B3CBB\\
      AF64D1C593D26627DFFB101A87FF77DA
</artwork>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.1.1">
          <name slugifiedName="name-certificate-request">Certificate Request</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.1.1-1">
-----BEGIN CERTIFICATE REQUEST-----
MIHTMIGBAgEAMBIxEDAOBgNVBAMTB0V4YW1wbGUwZjAfBggqhQMHAQEBATATBgcq
hQMCAiMABggqhQMHAQECAgNDAARAC9hv5djbiWaPeJtOHbqFhcVQi0XsW1nYkG3b
cOJJK3/ad/+HGhD73ydm0pPF0WSvuzx7lzpByIXRHXDWibTxJqAAMAoGCCqFAwcB
AQMCA0EAaqqzjjXUqqUXlAMBeZEi2FVIT1efTLuW1jzf3zrMQypBqijS8asUgoDN
ntVv7aQZdAU1VKQnZ7g60EP9OdwEkw==
-----END CERTIFICATE REQUEST-----

  0 211: SEQUENCE {
  3 129:   SEQUENCE {
  6   1:     INTEGER 0
  9  18:     SEQUENCE {
 11  16:       SET {
 13  14:         SEQUENCE {
 15   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 20   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 29 102:     SEQUENCE {
 31  31:       SEQUENCE {
 33   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 1'
 43  19:         SEQUENCE {
 45   7:           OBJECT IDENTIFIER '1 2 643 2 2 35 0'
 54   8:           OBJECT IDENTIFIER '1 2 643 7 1 1 2 2'
       :           }
       :         }
 64  67:       BIT STRING, encapsulates {
 67  64:         OCTET STRING
       :           0B D8 6F E5 D8 DB 89 66 8F 78 9B 4E 1D BA 85 85
       :           C5 50 8B 45 EC 5B 59 D8 90 6D DB 70 E2 49 2B 7F
       :           DA 77 FF 87 1A 10 FB DF 27 66 D2 93 C5 D1 64 AF
       :           BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26
       :         }
       :       }
133   0:     [0] {}
       :     }
135  10:   SEQUENCE {
137   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :     }
147  65:   BIT STRING
       :     6A AA B3 8E 35 D4 AA A5 17 94 03 01 79 91 22 D8
       :     55 48 4F 57 9F 4C BB 96 D6 3C DF DF 3A CC 43 2A
       :     41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19
       :     74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93
       :   }
</sourcecode>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.1.2">
          <name slugifiedName="name-certificate">Certificate</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.1.2-1">
-----BEGIN CERTIFICATE-----
MIIBLTCB26ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTB0V4YW1wbGUw
IBcNMDEwMTAxMDAwMDAwWhgPMjA1MDEyMzEwMDAwMDBaMBIxEDAOBgNVBAMTB0V4
YW1wbGUwZjAfBggqhQMHAQEBATATBgcqhQMCAiMABggqhQMHAQECAgNDAARAC9hv
5djbiWaPeJtOHbqFhcVQi0XsW1nYkG3bcOJJK3/ad/+HGhD73ydm0pPF0WSvuzx7
lzpByIXRHXDWibTxJqMTMBEwDwYDVR0TAQH/BAUwAwEB/zAKBggqhQMHAQEDAgNB
AE1T8BL+CBd2UH1Nm7gfAO/bTu/Uq4O6xLrPc1Fzz6gcQaoo0vGrFIKAzZ7Vb+2k
GXQFNVSkJ2e4OtBD/TncBJM=
-----END CERTIFICATE-----

  0 301: SEQUENCE {
  4 219:   SEQUENCE {
  7   3:     [0] {
  9   1:       INTEGER 2
       :       }
 12   1:     INTEGER 10
 15  10:     SEQUENCE {
 17   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :       }
 27  18:     SEQUENCE {
 29  16:       SET {
 31  14:         SEQUENCE {
 33   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 38   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 47  32:     SEQUENCE {
 49  13:       UTCTime 01/01/2001 00:00:00 GMT
 64  15:       GeneralizedTime 31/12/2050 00:00:00 GMT
       :       }
 81  18:     SEQUENCE {
 83  16:       SET {
 85  14:         SEQUENCE {
 87   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 92   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
101 102:     SEQUENCE {
103  31:       SEQUENCE {
105   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 1'
115  19:         SEQUENCE {
117   7:           OBJECT IDENTIFIER '1 2 643 2 2 35 0'
126   8:           OBJECT IDENTIFIER '1 2 643 7 1 1 2 2'
       :           }
       :         }
136  67:       BIT STRING, encapsulates {
139  64:         OCTET STRING
       :           0B D8 6F E5 D8 DB 89 66 8F 78 9B 4E 1D BA 85 85
       :           C5 50 8B 45 EC 5B 59 D8 90 6D DB 70 E2 49 2B 7F
       :           DA 77 FF 87 1A 10 FB DF 27 66 D2 93 C5 D1 64 AF
       :           BB 3C 7B 97 3A 41 C8 85 D1 1D 70 D6 89 B4 F1 26
       :         }
       :       }
205  19:     [3] {
207  17:       SEQUENCE {
209  15:         SEQUENCE {
211   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
216   1:           BOOLEAN TRUE
219   5:           OCTET STRING, encapsulates {
221   3:             SEQUENCE {
223   1:               BOOLEAN TRUE
       :               }
       :             }
       :           }
       :         }
       :       }
       :     }
226  10:   SEQUENCE {
228   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :     }
238  65:   BIT STRING
       :     4D 53 F0 12 FE 08 17 76 50 7D 4D 9B B8 1F 00 EF
       :     DB 4E EF D4 AB 83 BA C4 BA CF 73 51 73 CF A8 1C
       :     41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19
       :     74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93
       :   }
</sourcecode>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.1.3">
          <name slugifiedName="name-certificate-revocation-list">Certificate Revocation List</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.1.3-1">
-----BEGIN X509 CRL-----
MIGSMEECAQEwCgYIKoUDBwEBAwIwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx
MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAgNBAEK/OSoU0+vpV68+
RstQv19CIaADrT0XJ1PJSpw3ox0gQaoo0vGrFIKAzZ7Vb+2kGXQFNVSkJ2e4OtBD
/TncBJM=
-----END X509 CRL-----

  0 146: SEQUENCE {
  3  65:   SEQUENCE {
  5   1:     INTEGER 1
  8  10:     SEQUENCE {
 10   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :       }
 20  18:     SEQUENCE {
 22  16:       SET {
 24  14:         SEQUENCE {
 26   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 31   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 40  13:     UTCTime 01/01/2014 00:00:00 GMT
 55  13:     UTCTime 02/01/2014 00:00:00 GMT
       :     }
 70  10:   SEQUENCE {
 72   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :     }
 82  65:   BIT STRING
       :     42 BF 39 2A 14 D3 EB E9 57 AF 3E 46 CB 50 BF 5F
       :     42 21 A0 03 AD 3D 17 27 53 C9 4A 9C 37 A3 1D 20
       :     41 AA 28 D2 F1 AB 14 82 80 CD 9E D5 6F ED A4 19
       :     74 05 35 54 A4 27 67 B8 3A D0 43 FD 39 DC 04 93
       :   }
</sourcecode>
        </section>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.2">
        <name slugifiedName="name-gost-r-3410-2012-tc26-256-a">GOST R 34.10-2012 TC26-256-A Parameters (256-Bit Private Key Length)</name>
        <t indent="0" pn="section-appendix.d.2-1">This example uses the curve defined in <xref target="RFC7836" sectionFormat="of" section="A.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7836#appendix-A.2" derivedContent="RFC7836"/>.</t>
        <t keepWithNext="true" indent="0" pn="section-appendix.d.2-2">The private key is</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.d.2-3">d = 0x3A929ADE789BB9BE10ED359DD39A72C1\\
      0B87C83F80BE18B85C041F4325B62EC1
</artwork>
        <t keepWithNext="true" indent="0" pn="section-appendix.d.2-4">The public key is</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.d.2-5">x = 0x99C3DF265EA59350640BA69D1DE04418\\
      AF3FEA03EC0F85F2DD84E8BED4952774

y = 0xE218631A69C47C122E2D516DA1C09E6B\\
      D19344D94389D1F16C0C4D4DCF96F578
</artwork>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.2.1">
          <name slugifiedName="name-certificate-request-2">Certificate Request</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.2.1-1">
-----BEGIN CERTIFICATE REQUEST-----
MIHKMHkCAQAwEjEQMA4GA1UEAxMHRXhhbXBsZTBeMBcGCCqFAwcBAQEBMAsGCSqF
AwcBAgEBAQNDAARAdCeV1L7ohN3yhQ/sA+o/rxhE4B2dpgtkUJOlXibfw5l49ZbP
TU0MbPHRiUPZRJPRa57AoW1RLS4SfMRpGmMY4qAAMAoGCCqFAwcBAQMCA0EAG9wq
Exdnm2YjL2PqFv98ZMyqua2FX8bhgJFmHbedSBIdDh2lvjR8bxtSVseurCAK1krH
em9bOg4Jcxjnrm7naQ==
-----END CERTIFICATE REQUEST-----

  0 202: SEQUENCE {
  3 121:   SEQUENCE {
  5   1:     INTEGER 0
  8  18:     SEQUENCE {
 10  16:       SET {
 12  14:         SEQUENCE {
 14   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 19   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 28  94:     SEQUENCE {
 30  23:       SEQUENCE {
 32   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 1'
 42  11:         SEQUENCE {
 44   9:           OBJECT IDENTIFIER '1 2 643 7 1 2 1 1 1'
       :           }
       :         }
 55  67:       BIT STRING, encapsulates {
 58  64:         OCTET STRING
       :           74 27 95 D4 BE E8 84 DD F2 85 0F EC 03 EA 3F AF
       :           18 44 E0 1D 9D A6 0B 64 50 93 A5 5E 26 DF C3 99
       :           78 F5 96 CF 4D 4D 0C 6C F1 D1 89 43 D9 44 93 D1
       :           6B 9E C0 A1 6D 51 2D 2E 12 7C C4 69 1A 63 18 E2
       :         }
       :       }
124   0:     [0] {}
       :     }
126  10:   SEQUENCE {
128   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :     }
138  65:   BIT STRING
       :     1B DC 2A 13 17 67 9B 66 23 2F 63 EA 16 FF 7C 64
       :     CC AA B9 AD 85 5F C6 E1 80 91 66 1D B7 9D 48 12
       :     1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A
       :     D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69
       :   }
</sourcecode>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.2.2">
          <name slugifiedName="name-certificate-2">Certificate</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.2.2-1">
-----BEGIN CERTIFICATE-----
MIIBJTCB06ADAgECAgEKMAoGCCqFAwcBAQMCMBIxEDAOBgNVBAMTB0V4YW1wbGUw
IBcNMDEwMTAxMDAwMDAwWhgPMjA1MDEyMzEwMDAwMDBaMBIxEDAOBgNVBAMTB0V4
YW1wbGUwXjAXBggqhQMHAQEBATALBgkqhQMHAQIBAQEDQwAEQHQnldS+6ITd8oUP
7APqP68YROAdnaYLZFCTpV4m38OZePWWz01NDGzx0YlD2UST0WuewKFtUS0uEnzE
aRpjGOKjEzARMA8GA1UdEwEB/wQFMAMBAf8wCgYIKoUDBwEBAwIDQQAUC02pEksJ
yw1c6Sjuh0JzoxASlJLsDik2njt5EkhXjB0OHaW+NHxvG1JWx66sIArWSsd6b1s6
DglzGOeubudp
-----END CERTIFICATE-----

  0 293: SEQUENCE {
  4 211:   SEQUENCE {
  7   3:     [0] {
  9   1:       INTEGER 2
       :       }
 12   1:     INTEGER 10
 15  10:     SEQUENCE {
 17   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :       }
 27  18:     SEQUENCE {
 29  16:       SET {
 31  14:         SEQUENCE {
 33   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 38   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 47  32:     SEQUENCE {
 49  13:       UTCTime 01/01/2001 00:00:00 GMT
 64  15:       GeneralizedTime 31/12/2050 00:00:00 GMT
       :       }
 81  18:     SEQUENCE {
 83  16:       SET {
 85  14:         SEQUENCE {
 87   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 92   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
101  94:     SEQUENCE {
103  23:       SEQUENCE {
105   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 1'
115  11:         SEQUENCE {
117   9:           OBJECT IDENTIFIER '1 2 643 7 1 2 1 1 1'
       :           }
       :         }
128  67:       BIT STRING, encapsulates {
131  64:         OCTET STRING
       :           74 27 95 D4 BE E8 84 DD F2 85 0F EC 03 EA 3F AF
       :           18 44 E0 1D 9D A6 0B 64 50 93 A5 5E 26 DF C3 99
       :           78 F5 96 CF 4D 4D 0C 6C F1 D1 89 43 D9 44 93 D1
       :           6B 9E C0 A1 6D 51 2D 2E 12 7C C4 69 1A 63 18 E2
       :         }
       :       }
197  19:     [3] {
199  17:       SEQUENCE {
201  15:         SEQUENCE {
203   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
208   1:           BOOLEAN TRUE
211   5:           OCTET STRING, encapsulates {
213   3:             SEQUENCE {
215   1:               BOOLEAN TRUE
       :               }
       :             }
       :           }
       :         }
       :       }
       :     }
218  10:   SEQUENCE {
220   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :     }
230  65:   BIT STRING
       :     14 0B 4D A9 12 4B 09 CB 0D 5C E9 28 EE 87 42 73
       :     A3 10 12 94 92 EC 0E 29 36 9E 3B 79 12 48 57 8C
       :     1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A
       :     D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69
       :   }
</sourcecode>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.2.3">
          <name slugifiedName="name-certificate-revocation-list-2">Certificate Revocation List</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.2.3-1">
-----BEGIN X509 CRL-----
MIGSMEECAQEwCgYIKoUDBwEBAwIwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx
MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAgNBABS9aAh8O5A8eqKL
B/6y571v4JY/VjJnNZ9c2Oq0UFmtHQ4dpb40fG8bUlbHrqwgCtZKx3pvWzoOCXMY
565u52k=
-----END X509 CRL-----

  0 146: SEQUENCE {
  3  65:   SEQUENCE {
  5   1:     INTEGER 1
  8  10:     SEQUENCE {
 10   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :       }
 20  18:     SEQUENCE {
 22  16:       SET {
 24  14:         SEQUENCE {
 26   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 31   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 40  13:     UTCTime 01/01/2014 00:00:00 GMT
 55  13:     UTCTime 02/01/2014 00:00:00 GMT
       :     }
 70  10:   SEQUENCE {
 72   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 2'
       :     }
 82  65:   BIT STRING
       :     14 BD 68 08 7C 3B 90 3C 7A A2 8B 07 FE B2 E7 BD
       :     6F E0 96 3F 56 32 67 35 9F 5C D8 EA B4 50 59 AD
       :     1D 0E 1D A5 BE 34 7C 6F 1B 52 56 C7 AE AC 20 0A
       :     D6 4A C7 7A 6F 5B 3A 0E 09 73 18 E7 AE 6E E7 69
       :   }
</sourcecode>
        </section>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.3">
        <name slugifiedName="name-gost-r-3410-2012-test-param">GOST R 34.10-2012 Test Parameters (512-Bit Private Key Length)</name>
        <t indent="0" pn="section-appendix.d.3-1">This example uses the curve defined in <xref target="curve512test" format="default" sectionFormat="of" derivedContent="Appendix E"/>.</t>
        <t keepWithNext="true" indent="0" pn="section-appendix.d.3-2">The private key is</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.d.3-3">d = 0x0BA6048AADAE241BA40936D47756D7C9\\
      3091A0E8514669700EE7508E508B1020\\
      72E8123B2200A0563322DAD2827E2714\\
      A2636B7BFD18AADFC62967821FA18DD4
</artwork>
        <t keepWithNext="true" indent="0" pn="section-appendix.d.3-4">The public key is</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.d.3-5">x = 0x115DC5BC96760C7B48598D8AB9E740D4\\
      C4A85A65BE33C1815B5C320C854621DD\\
      5A515856D13314AF69BC5B924C8B4DDF\\
      F75C45415C1D9DD9DD33612CD530EFE1

y = 0x37C7C90CD40B0F5621DC3AC1B751CFA0\\
      E2634FA0503B3D52639F5D7FB72AFD61\\
      EA199441D943FFE7F0C70A2759A3CDB8\\
      4C114E1F9339FDF27F35ECA93677BEEC
</artwork>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.3.1">
          <name slugifiedName="name-certificate-request-3">Certificate Request</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.3.1-1">
-----BEGIN CERTIFICATE REQUEST-----
MIIBTzCBvAIBADASMRAwDgYDVQQDEwdFeGFtcGxlMIGgMBcGCCqFAwcBAQECMAsG
CSqFAwcBAgECAAOBhAAEgYDh7zDVLGEz3dmdHVxBRVz3302LTJJbvGmvFDPRVlhR
Wt0hRoUMMlxbgcEzvmVaqMTUQOe5io1ZSHsMdpa8xV0R7L53NqnsNX/y/TmTH04R
TLjNo1knCsfw5/9D2UGUGeph/Sq3f12fY1I9O1CgT2PioM9Rt8E63CFWDwvUDMnH
N6AAMAoGCCqFAwcBAQMDA4GBAEM7HWzkClHx5XN+sWqixoOCmkBbnZEn4hJg/J1q
wF2HvyTibEUnilwhkqdbqUmTq9YHTn/xvwP9L1OXr6HZRVgvhvpgoIEJGiPdeV4e
PGie5RKjyC7g3MJkPHjuqPys01SSVYSGsg8cnsGXyQaZhQJgyTvLzZxcMxfhk0Th
c642
-----END CERTIFICATE REQUEST-----

  0 335: SEQUENCE {
  4 188:   SEQUENCE {
  7   1:     INTEGER 0
 10  18:     SEQUENCE {
 12  16:       SET {
 14  14:         SEQUENCE {
 16   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 21   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 30 160:     SEQUENCE {
 33  23:       SEQUENCE {
 35   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 2'
 45  11:         SEQUENCE {
 47   9:           OBJECT IDENTIFIER '1 2 643 7 1 2 1 2 0'
       :           }
       :         }
 58 132:       BIT STRING, encapsulates {
 62 128:         OCTET STRING
       :           E1 EF 30 D5 2C 61 33 DD D9 9D 1D 5C 41 45 5C F7
       :           DF 4D 8B 4C 92 5B BC 69 AF 14 33 D1 56 58 51 5A
       :           DD 21 46 85 0C 32 5C 5B 81 C1 33 BE 65 5A A8 C4
       :           D4 40 E7 B9 8A 8D 59 48 7B 0C 76 96 BC C5 5D 11
       :           EC BE 77 36 A9 EC 35 7F F2 FD 39 93 1F 4E 11 4C
       :           B8 CD A3 59 27 0A C7 F0 E7 FF 43 D9 41 94 19 EA
       :           61 FD 2A B7 7F 5D 9F 63 52 3D 3B 50 A0 4F 63 E2
       :           A0 CF 51 B7 C1 3A DC 21 56 0F 0B D4 0C C9 C7 37
       :         }
       :       }
193   0:     [0] {}
       :     }
195  10:   SEQUENCE {
197   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
       :     }
207 129:   BIT STRING
       :     43 3B 1D 6C E4 0A 51 F1 E5 73 7E B1 6A A2 C6 83
       :     82 9A 40 5B 9D 91 27 E2 12 60 FC 9D 6A C0 5D 87
       :     BF 24 E2 6C 45 27 8A 5C 21 92 A7 5B A9 49 93 AB
       :     D6 07 4E 7F F1 BF 03 FD 2F 53 97 AF A1 D9 45 58
       :     2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E
       :     E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3
       :     54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02
       :     60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36
       :   }
</sourcecode>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.3.2">
          <name slugifiedName="name-certificate-3">Certificate</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.3.2-1">
-----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----

  0 426: SEQUENCE {
  4 278:   SEQUENCE {
  8   3:     [0] {
 10   1:       INTEGER 2
       :       }
 13   1:     INTEGER 11
 16  10:     SEQUENCE {
 18   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
       :       }
 28  18:     SEQUENCE {
 30  16:       SET {
 32  14:         SEQUENCE {
 34   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 39   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 48  32:     SEQUENCE {
 50  13:       UTCTime 01/01/2001 00:00:00 GMT
 65  15:       GeneralizedTime 31/12/2050 00:00:00 GMT
       :       }
 82  18:     SEQUENCE {
 84  16:       SET {
 86  14:         SEQUENCE {
 88   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 93   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
102 160:     SEQUENCE {
105  23:       SEQUENCE {
107   8:         OBJECT IDENTIFIER '1 2 643 7 1 1 1 2'
117  11:         SEQUENCE {
119   9:           OBJECT IDENTIFIER '1 2 643 7 1 2 1 2 0'
       :           }
       :         }
130 132:       BIT STRING, encapsulates {
134 128:         OCTET STRING
       :           E1 EF 30 D5 2C 61 33 DD D9 9D 1D 5C 41 45 5C F7
       :           DF 4D 8B 4C 92 5B BC 69 AF 14 33 D1 56 58 51 5A
       :           DD 21 46 85 0C 32 5C 5B 81 C1 33 BE 65 5A A8 C4
       :           D4 40 E7 B9 8A 8D 59 48 7B 0C 76 96 BC C5 5D 11
       :           EC BE 77 36 A9 EC 35 7F F2 FD 39 93 1F 4E 11 4C
       :           B8 CD A3 59 27 0A C7 F0 E7 FF 43 D9 41 94 19 EA
       :           61 FD 2A B7 7F 5D 9F 63 52 3D 3B 50 A0 4F 63 E2
       :           A0 CF 51 B7 C1 3A DC 21 56 0F 0B D4 0C C9 C7 37
       :         }
       :       }
265  19:     [3] {
267  17:       SEQUENCE {
269  15:         SEQUENCE {
271   3:           OBJECT IDENTIFIER basicConstraints (2 5 29 19)
276   1:           BOOLEAN TRUE
279   5:           OCTET STRING, encapsulates {
281   3:             SEQUENCE {
283   1:               BOOLEAN TRUE
       :               }
       :             }
       :           }
       :         }
       :       }
       :     }
286  10:   SEQUENCE {
288   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
       :     }
298 129:   BIT STRING
       :     41 57 03 D8 92 F1 A5 F3 F6 8C 43 53 18 9A 7E E2
       :     07 B8 0B 56 31 EF 9D 49 52 9A 4D 6B 54 2C 2C FA
       :     15 AA 2E AC F1 1F 47 0F DE 7D 95 48 56 90 3C 35
       :     FD 8F 95 5E F3 00 D9 5C 77 53 4A 72 4A 0E EE 70
       :     2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E
       :     E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3
       :     54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02
       :     60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36
       :   }
</sourcecode>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.d.3.3">
          <name slugifiedName="name-certificate-revocation-list-3">Certificate Revocation List</name>
          <sourcecode name="" type="asn.1" markers="false" pn="section-appendix.d.3.3-1">
-----BEGIN X509 CRL-----
MIHTMEECAQEwCgYIKoUDBwEBAwMwEjEQMA4GA1UEAxMHRXhhbXBsZRcNMTQwMTAx
MDAwMDAwWhcNMTQwMTAyMDAwMDAwWjAKBggqhQMHAQEDAwOBgQA6E/t67NtVYO72
E3z8XdZGkXMuv7NpCh/Ax+ik7uoIMH1kjU3AmGxGqHs/vkx69C6jQ1nHlZVMo5/z
q77ZBR9NL4b6YKCBCRoj3XleHjxonuUSo8gu4NzCZDx47qj8rNNUklWEhrIPHJ7B
l8kGmYUCYMk7y82cXDMX4ZNE4XOuNg==
-----END X509 CRL-----

  0 211: SEQUENCE {
  3  65:   SEQUENCE {
  5   1:     INTEGER 1
  8  10:     SEQUENCE {
 10   8:       OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
       :       }
 20  18:     SEQUENCE {
 22  16:       SET {
 24  14:         SEQUENCE {
 26   3:           OBJECT IDENTIFIER commonName (2 5 4 3)
 31   7:           PrintableString 'Example'
       :           }
       :         }
       :       }
 40  13:     UTCTime 01/01/2014 00:00:00 GMT
 55  13:     UTCTime 02/01/2014 00:00:00 GMT
       :     }
 70  10:   SEQUENCE {
 72   8:     OBJECT IDENTIFIER '1 2 643 7 1 1 3 3'
       :     }
 82 129:   BIT STRING
       :     3A 13 FB 7A EC DB 55 60 EE F6 13 7C FC 5D D6 46
       :     91 73 2E BF B3 69 0A 1F C0 C7 E8 A4 EE EA 08 30
       :     7D 64 8D 4D C0 98 6C 46 A8 7B 3F BE 4C 7A F4 2E
       :     A3 43 59 C7 95 95 4C A3 9F F3 AB BE D9 05 1F 4D
       :     2F 86 FA 60 A0 81 09 1A 23 DD 79 5E 1E 3C 68 9E
       :     E5 12 A3 C8 2E E0 DC C2 64 3C 78 EE A8 FC AC D3
       :     54 92 55 84 86 B2 0F 1C 9E C1 97 C9 06 99 85 02
       :     60 C9 3B CB CD 9C 5C 33 17 E1 93 44 E1 73 AE 36
       :   }
</sourcecode>
        </section>
      </section>
    </section>
    <section anchor="curve512test" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.e">
      <name slugifiedName="name-gost-r-3410-2012-test-parame">GOST R 34.10-2012 Test Parameters (Curve Definition)</name>
      <t indent="0" pn="section-appendix.e-1">The following parameters must be used for digital signature generation
        and verification.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.e.1">
        <name slugifiedName="name-elliptic-curve-modulus">Elliptic Curve Modulus</name>
        <t indent="0" pn="section-appendix.e.1-1">The following value is assigned to parameter p in this example:</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.1-2">p = 36239861022290036359077887536838743060213209255346786050\\
    86546150450856166624002482588482022271496854025090823603\\
    058735163734263822371964987228582907372403
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.1-3">p = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\
      09B5D2D15DF1D852741AF4704A0458047E80E4546D35B8336FAC22\\
      4DD81664BBF528BE6373
</artwork>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.e.2">
        <name slugifiedName="name-elliptic-curve-coefficients">Elliptic Curve Coefficients</name>
        <t indent="0" pn="section-appendix.e.2-1">Parameters a and b take the following values in this example:</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.2-2">a = 7
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.2-3">a = 0x7
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.2-4">b = 15186550692108285345089500347140431549287475277402064361\\
    94018823352809982443793732829756914785974674866041605397\\
    883677596626326413990136959047435811826396
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.2-5">b = 0x1CFF0806A31116DA29D8CFA54E57EB748BC5F377E49400FDD788B6\\
      49ECA1AC4361834013B2AD7322480A89CA58E0CF74BC9E540C2ADD\\
      6897FAD0A3084F302ADC
</artwork>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.e.3">
        <name slugifiedName="name-elliptic-curve-points-group">Elliptic Curve Points Group Order</name>
        <t indent="0" pn="section-appendix.e.3-1">Parameter m takes the following value in this example:</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.3-2">m = 36239861022290036359077887536838743060213209255346786050\\
    86546150450856166623969164898305032863068499961404079437\\
    936585455865192212970734808812618120619743
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.3-3">m = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\
      09B5D2D15DA82F2D7ECB1DBAC719905C5EECC423F1D86E25EDBE23\\
      C595D644AAF187E6E6DF
</artwork>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.e.4">
        <name slugifiedName="name-order-of-cyclic-subgroup-of">Order of Cyclic Subgroup of Elliptic Curve Points Group</name>
        <t indent="0" pn="section-appendix.e.4-1">Parameter q takes the following value in this example:</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.4-2">q = 36239861022290036359077887536838743060213209255346786050\\
    86546150450856166623969164898305032863068499961404079437\\
    936585455865192212970734808812618120619743
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.4-3">q = 0x4531ACD1FE0023C7550D267B6B2FEE80922B14B2FFB90F04D4EB7C\\
      09B5D2D15DA82F2D7ECB1DBAC719905C5EECC423F1D86E25EDBE23\\
      C595D644AAF187E6E6DF
</artwork>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.e.5">
        <name slugifiedName="name-elliptic-curve-point-coordi">Elliptic Curve Point Coordinates</name>
        <t indent="0" pn="section-appendix.e.5-1">Point P coordinates take the following values in this example:</t>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.5-2">x = 19283569440670228493993094012431375989977866354595079743\\
    57075491307766592685835441065557681003184874819658004903\\
    212332884252335830250729527632383493573274
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.5-3">x = 0x24D19CC64572EE30F396BF6EBBFD7A6C5213B3B3D7057CC825F910\\
      93A68CD762FD60611262CD838DC6B60AA7EEE804E28BC849977FAC\\
      33B4B530F1B120248A9A
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.5-4">y = 22887286933719728599700121555294784163535623273295061803\\
    14497425931102860301572814141997072271708807066593850650\\
    334152381857347798885864807605098724013854
</artwork>
        <artwork name="" type="ascii-art" align="left" alt="" pn="section-appendix.e.5-5">y = 0x2BB312A43BD2CE6E0D020613C857ACDDCFBF061E91E5F2C3F32447\\
      C259F39B2C83AB156D77F1496BF7EB3351E1EE4E43DC1A18B91B24\\
      640B6DBB92CB1ADD371E
</artwork>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.f">
      <name slugifiedName="name-contributors">Contributors</name>
      <contact fullname="Semen Pianov">
        <organization showOnFrontPage="true">InfoTeCS JSC</organization>
        <address>
          <email>Semen.Pianov@infotecs.ru</email>
        </address>
      </contact>
      <contact fullname="Ekaterina Karelina">
        <organization showOnFrontPage="true">InfoTeCS JSC</organization>
        <address>
          <email>Ekaterina.Karelina@infotecs.ru</email>
        </address>
      </contact>
      <contact fullname="Dmitry Belyavsky">
        <organization showOnFrontPage="true">Cryptocom</organization>
        <address>
          <email>beldmit@gmail.com</email>
        </address>
      </contact>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.g">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Dmitry Baryshkov" initials="D." surname="Baryshkov" role="editor">
        <organization showOnFrontPage="true">Linaro Ltd.</organization>
        <address>
          <postal>
            <street>Harston Mill Royston Rd</street>
            <city>Harston, Cambridge</city>
            <code>CB22 7GG</code>
            <country>United Kingdom</country>
          </postal>
          <email>dbaryshkov@gmail.com</email>
        </address>
      </author>
      <author fullname="Vasily Nikolaev" initials="V." surname="Nikolaev">
        <organization showOnFrontPage="true">CryptoPro</organization>
        <address>
          <postal>
            <street>18, Suschevsky val</street>
            <city>Moscow</city>
            <code>127018</code>
            <country>Russian Federation</country>
          </postal>
          <phone>+7 (495) 995-48-20</phone>
          <email>nikolaev@cryptopro.ru</email>
        </address>
      </author>
      <author fullname="Alexander Chelpanov" initials="A." surname="Chelpanov">
        <organization showOnFrontPage="true">InfoTeCS JSC</organization>
        <address>
          <email>Aleksandr.Chelpanov@infotecs.ru</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
