Network Working Group                                         P. Hoffman
Internet-Draft                                            VPN Consortium
Updates: 2560, 2986, 3279, 3280,                               J. Schaad
3281, 3852, 4055, 4210, 4211, 5055               Soaring Hawk Consulting
(if approved)                                              July 10, 2008
Intended status: Standards Track
Expires: January 11, 2009


                       New ASN.1 Modules for PKIX
                    draft-ietf-pkix-new-asn1-01.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on January 11, 2009.

Copyright Notice

   Copyright (C) The IETF Trust (2008).

Abstract

   The PKIX certificate format, and many associated formats, are
   expressed using ASN.1.  The current ASN.1 modules conform to the 1988
   version of ASN.1.  This document updates those ASN.1 modules to
   conform to the 2002 version of ASN.1.  There are no bits-on-the-wire
   changes to any of the formats; this is simply a change to the syntax.



Hoffman & Schaad        Expires January 11, 2009                [Page 1]


Internet-Draft             New ASN.1 for PKIX                  July 2008


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1.  Issues . . . . . . . . . . . . . . . . . . . . . . . . . .  4
       1.1.1.  More Modules To Be Added . . . . . . . . . . . . . . .  4
       1.1.2.  Algorithm Structure  . . . . . . . . . . . . . . . . .  4
       1.1.3.  Module OIDs Changing . . . . . . . . . . . . . . . . .  4
   2.  ASN.1 Module PKIX-CommonTypes  . . . . . . . . . . . . . . . .  4
   3.  ASN.1 Module AlgorithmInformation  . . . . . . . . . . . . . .  6
   4.  ASN.1 Module for RFC 2560  . . . . . . . . . . . . . . . . . . 13
   5.  ASN.1 Module for RFC 2986  . . . . . . . . . . . . . . . . . . 16
   6.  ASN.1 Module for RFC 3279  . . . . . . . . . . . . . . . . . . 17
   7.  ASN.1 Module for RFC 3280, Explicit and Implicit . . . . . . . 26
   8.  ASN.1 Module for RFC 3281  . . . . . . . . . . . . . . . . . . 48
   9.  ASN.1 Module for RFC 3852 (Attribute Certificate v1) . . . . . 54
   10. ASN.1 Module for RFC 4055  . . . . . . . . . . . . . . . . . . 55
   11. ASN.1 Module for RFC 4210  . . . . . . . . . . . . . . . . . . 59
   12. ASN.1 Module for RFC 4211  . . . . . . . . . . . . . . . . . . 69
   13. ASN.1 Module for RFC 5055  . . . . . . . . . . . . . . . . . . 76
   14. Security Considerations  . . . . . . . . . . . . . . . . . . . 87
   15. Normative References . . . . . . . . . . . . . . . . . . . . . 87
   Appendix A.  Change History  . . . . . . . . . . . . . . . . . . . 88
     A.1.  Changes between draft-hoffman-pkix-new-asn1-00 and
           draft-ietf-pkix-new-asn1-00  . . . . . . . . . . . . . . . 89
     A.2.  Changes between draft-ietf-pkix-new-asn1-00 and -01  . . . 89
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 89
   Intellectual Property and Copyright Statements . . . . . . . . . . 91
























Hoffman & Schaad        Expires January 11, 2009                [Page 2]


Internet-Draft             New ASN.1 for PKIX                  July 2008


1.  Introduction

   Some developers would like the IETF to use the latest version of
   ASN.1 in its standards.  Most of the RFCs that relate to security
   protocols still use ASN.1 from the 1988 standard, which has been
   deprecated.  This is particularly true for the standards that relate
   to PKIX, CMS, and S/MIME.

   This document updates the following RFCs to use ASN.1 modules that
   conform to the 2002 version of ASN.1 [ASN1-2002].  Note that not all
   the modules are updated; some are included to simply make the set
   complete.

   o  RFC 2560, PKIX Online Certificate Status Protocol (OCSP) [RFC2560]

   o  RFC 2986, PKCS #10 certificate request [RFC2986]

   o  RFC 3279, PKIX algorithms and identifier [RFC3279]

   o  RFC 3280, PKIX certificate and CRL profile [RFC3280] (both the
      implicit and explicit modules)

   o  RFC 3281, PKIX attribute certificates, version 2 [RFC3281]

   o  RFC 3852, contains PKIX attribute certificates, version 1
      [RFC3852]

   o  RFC 4055, Additional Algorithms and Identifiers for RSA
      Cryptography [RFC4055]

   o  RFC 4210, PKIX CMP (Certificate Management Protocol) [RFC4210]

   o  RFC 4211, PKIX CRMF (Certificate Request Message Format) [RFC4211]

   o  RFC 5055, PKIX SCVP (Server-based Certificate Validation Protocol)
      [RFC5055]

   Note that some of the modules in this document get some of their
   definitions from places different than the modules in the original
   RFCs.  The idea is that these modules, when combined with the modules
   in [NEW-CMS-SMIME] can stand on their own and do not need to import
   definitions from anywhere else.

   The document also includes a module of common defintions called
   "PKIX-CommonTypes".  These definitions are used here and in
   [NEW-CMS-SMIME].

   The document also includes a module of common defintions called



Hoffman & Schaad        Expires January 11, 2009                [Page 3]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   "AlgorithmInformation".  These definitions are used here and in
   [NEW-CMS-SMIME].

1.1.  Issues

   This section will be removed before final publication.

1.1.1.  More Modules To Be Added

   There are many modules from standards-track RFCs that are not listed
   in this document or the companion document on CMS and S/MIME.  We
   will discuss with the two communities which modules are appropriate
   for the two documents.  We will also consider making "super-modules",
   individual modules which might update multiple RFCs at one time.  We
   may also add objects to some of the modules.

1.1.2.  Algorithm Structure

   Algorithms are currently not defined here.  We need to discuss what
   structure we want for algorithm objects.  Currently, we just do
   "parameter, OID", but we could add more.  Because we don't know what
   the final structure is, the object sets in the various modules are
   commented out.  We will fix this before finishing this project.

1.1.3.  Module OIDs Changing

   The OIDs given in the modules in this version of the document are the
   same as the OIDs from the original modules, even though some of the
   modules have changed syntax.  That is clearly incorrect.  In a later
   version of this document, we will change the OIDs for every changed
   module.


2.  ASN.1 Module PKIX-CommonTypes

   This section contains a module that is imported by many other modules
   in this document and in [NEW-CMS-SMIME].  This module does not come
   from any existing RFC.

   PKIX-CommonTypes
       {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43)}

   DEFINITIONS IMPLICIT TAGS ::=
   BEGIN

   ATTRIBUTE ::= CLASS {
       &Type           OPTIONAL,



Hoffman & Schaad        Expires January 11, 2009                [Page 4]


Internet-Draft             New ASN.1 for PKIX                  July 2008


       &minCount       INTEGER DEFAULT 1,
       &maxCount       INTEGER OPTIONAL,
       &id             OBJECT IDENTIFIER UNIQUE
   } WITH SYNTAX {
       [TYPE &Type]
       [COUNTS [MIN &minCount] [MAX &maxCount] ]
       IDENTIFIED BY &id
   }

   Attribute{ATTRIBUTE:AttributeSet} ::= SEQUENCE {
       type      ATTRIBUTE.&id({AttributeSet}),
       values    SET SIZE (1..MAX) OF ATTRIBUTE.
                     &Type({AttributeSet}{@type})
   }

   Extensions{EXTENSION:ExtensionSet} ::=
       SEQUENCE SIZE (1..MAX) OF Extension{{ExtensionSet}}

   EXTENSION ::= CLASS {
       &id  OBJECT IDENTIFIER UNIQUE, &ExtnType
   } WITH SYNTAX {
       SYNTAX &ExtnType IDENTIFIED BY &id
   }

   Extension{EXTENSION:ExtensionSet} ::= SEQUENCE {
       extnID      EXTENSION.&id({ExtensionSet}),
       critical    BOOLEAN DEFAULT FALSE,
       extnValue   OCTET STRING (CONTAINING
                   EXTENSION.&ExtnType({ExtensionSet}{@extnID}))
   }

   ALGORITHM ::= CLASS {
       &id OBJECT IDENTIFIER UNIQUE,
       &Type OPTIONAL
   } WITH SYNTAX {
       OID &id [PARAMS &Type]
   }

   AlgorithmIdentifier{ALGORITHM:AlgorithmSet} ::=  SEQUENCE {
       algorithm      ALGORITHM.&id({AlgorithmSet}),
       parameters     ALGORITHM.
          &Type({AlgorithmSet}{@algorithm}) OPTIONAL
          -- contains a value of the type
          -- registered for use with the
          -- algorithm object identifier value
   }

   END



Hoffman & Schaad        Expires January 11, 2009                [Page 5]


Internet-Draft             New ASN.1 for PKIX                  July 2008


3.  ASN.1 Module AlgorithmInformation

   This section contains a module that is imported by many other modules
   in this document and in [NEW-CMS-SMIME].  This module does not come
   from any existing RFC.

   AlgorithmInformation
       {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-algorithInformation(99)}

   DEFINITIONS ::=
   BEGIN

   EXPORTS ALL;
   IMPORTS ;

   --  Suggested prefixes for algorithm objects are:
   --
   --  mda-   Message Digest Algorithms
   --  sa-    Signature Algorithms
   --  kta-   Key Transport Algorithms (Asymetric)
   --  kaa-   Key Agreement Algorithms  (Asymetric)
   --  kwa-   Key Wrap Algorithms (Symetric)
   --  kda-   Key Derivation Algorithms
   --  maca-  Message Authentication Code Algorithms
   --  pk-    Public Key
   --  sea-   Symmetric Encryption Algorithm

   ParamOptions ::= ENUMERATED {
       required,        -- Parameters MUST be encoded in structure
       preferedPresent, -- Parameters SHOULD be encoded in structure
       preferedAbsent,  -- Parameters SHOULD NOT be encoded in structure
       absent,          -- Parameters MUST NOT be encoded in structure
       notPresent,
       inheritable      -- Parameters are inheritied if not present
   }

   --  DIGEST-ALGORITHM
   --
   --  Describes the basic information for ASN.1 and a digest
   --      algorithm.
   --
   --  &id - contains the OID identifying the digest algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --
   --  Additional information such as the length of the hash could also



Hoffman & Schaad        Expires January 11, 2009                [Page 6]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   --      be encoded.
   --
   --  Example:
   --  sha1 DIGEST-ALGORITHM ::= {
   --      IDENTIFIER id-sha1
   --      PARAM NULL
   --      PARMS ARE preferedAbsent
   --  }

   DIGEST-ALGORITHM ::= CLASS {
       &id                 OBJECT IDENTIFIER,
       &Params             OPTIONAL,
       &paramPresence      ParamOptions DEFAULT required
   } WITH SYNTAX {
       IDENTIFIER &id
       [PARAMS [&Params] [ARE &paramPresence] ]
   }

   --  SIGNATURE-ALGORITHM
   --
   --  Describes the basic properities of a signature algorithm
   --
   --  &id - contains the OID identifying the signature algoithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --  &HashSet - The set of hash algorithms used with this
   --                  signature algoirthm
   --  &PublicKeySet - the set of public key algorithms for this
   --                  signature algorithm
   --  Example:
   --  sig-RSA-PSS SIGNATURE-ALGORITHM ::= {
   --     IDENTIFIER id-RSASSA-PSS
   --      PARAMS RSASSA-PSS-params
   --      ARE required
   --      HASH SET {sha1 | md5, ... }
   --      PUBLIC KEY SET { pk-rsa | pk-rsa-pss }
   -- }

   SIGNATURE-ALGORITHM ::= CLASS {
       &id             OBJECT IDENTIFIER,
       &Params         OPTIONAL,
       &Value          OPTIONAL,
       &paramPresence  ParamOptions DEFAULT required,
       &HashSet        DIGEST-ALGORITHM OPTIONAL,
       &PublicKeySet   PUBLIC-KEY OPTIONAL
   } WITH SYNTAX {
       IDENTIFIER &id



Hoffman & Schaad        Expires January 11, 2009                [Page 7]


Internet-Draft             New ASN.1 for PKIX                  July 2008


       [VALUE &Value]
       [PARAMS [&Params] ARE &paramPresence ]
       [USES &HashSet]
       [PUBKEYS &PublicKeySet]
   }

   --  PUBLIC-KEY
   --
   --  Describes the basic properities of a public key
   --
   --  &id - contains the OID identifying the public key
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --  &KeyValue - contains the type for the key value
   --
   --  Could add information about the keyUsage bits
   --
   --  Example:
   --  pk-rsa-pss PUBLIC-KEY ::= {
   --      IDENTIFIER id-RSASSA-PSS
   --      KEY RSAPublicKey
   --      HAS PARAMS RSASSA-PSS-params
   --      PARAMS ARE optional
   --  }

   PUBLIC-KEY ::= CLASS {
       &id             OBJECT IDENTIFIER,
       &Params         OPTIONAL,
       &paramPresence  ParamOptions DEFAULT required,
       &KeyValue,
       &PrivateKey     OPTIONAL
   } WITH SYNTAX {
       IDENTIFIER &id
       KEY &KeyValue
       [PARAMS [&Params] ARE &paramPresence]
       [PRIVATE KEY &PrivateKey]
   }

   --  KEY-TRANSPORT
   --
   --  Describes the basic properities of a key transport algorithm
   --
   --  &id - contains the OID identifying the key transport algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --  &PublicKeySet - specify which public keys are used with



Hoffman & Schaad        Expires January 11, 2009                [Page 8]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   --                       this algorithm
   --
   --  Example:
   --  rsaTransport KEY-TRANSPORT ::= {
   --      &id rsaEncryption
   --      &Params NULL
   --      &paramPresence required
   --      &PublicKeySet { pk-rsa | pk-rsa-pss }
   --  }

   KEY-TRANSPORT ::= CLASS {
       &id OBJECT IDENTIFIER UNIQUE,
       &Params,
       &paramPresnce   ParamOptions,
       &PublicKeySet   PUBLIC-KEY OPTIONAL
   }

   --  KEY-AGREE
   --
   --  Describes the basic properities of a key agreement algorithm
   --
   --  &id - contains the OID identifying the key transport algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --  &Ukm - type of user keying material used
   --  &PublicKeySet - specify which public keys are used with
   --                        this algorithm
   --
   --  Additional items could be a restricted set of key wrap algoithms
   --
   --  Example:
   --  dh-static-ephemerial KEY-TRANSPORT ::= {
   --      &id id-alg-ESDH
   --      &Params KeyWrapAlgorithm
   --      &paramPresence required
   --      - - user key material is not ASN.1 encoded.
   --      &PublicKeySet {
   --         {IDENTIFIER dh-public-number KEY DHPublicKey
   --            HASH PARAMS DHDomainParamters PARAMS ARE inheritable }
   --      }
   --  }

   KEY-AGREE ::= CLASS {
       &id            OBJECT IDENTIFIER UNIQUE,
       &Params         OPTIONAL,
       &paramPresence  ParamOptions DEFAULT required,
       &Ukm            OPTIONAL,



Hoffman & Schaad        Expires January 11, 2009                [Page 9]


Internet-Draft             New ASN.1 for PKIX                  July 2008


       &PublicKeySet   PUBLIC-KEY OPTIONAL
   } WITH SYNTAX {
       IDENTIFIER &id
       [PARAMS [&Params] ARE &paramPresence]
       [PUBLIC KEY &PublicKeySet]
       [UKM &Ukm]
   }

   --  KEY-WRAP
   --
   --  Describes the basic properities of a key wrap algorithm
   --
   --  &id - contains the OID identifying the key transport algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --
   --  Example:
   --  cms3DESwrap KEY-WRAP ::= {
   --      &id id-alg-CMS3DESwrap
   --      &Params NULL
   --      &paramPresence required
   --  }

   KEY-WRAP ::= CLASS {
       &id                OBJECT IDENTIFIER UNIQUE,
       &Params             OPTIONAL,
       &paramPresence      ParamOptions DEFAULT required
   } WITH SYNTAX {
       IDENTIFIER &id
       [PARAMS [&Params] ARE &paramPresence]
   }

   --  KEY-DERIVATION
   --
   --  Describes the basic properities of a key transport algorithm
   --
   --  &id - contains the OID identifying the key transport algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --
   --  Could add information about defaults for the derivation algorithm
   --      such as PRFs
   --
   --  Example:
   --  pbkdf2 KEY-DERIVATION ::= {
   --      &id id-PBKF2



Hoffman & Schaad        Expires January 11, 2009               [Page 10]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   --      &Params PBKDF2-params
   --      &paramPresence required
   --  }

   KEY-DERIVATION ::= CLASS {
       &id                OBJECT IDENTIFIER UNIQUE,
       &Params             OPTIONAL,
       &paramPresence      ParamOptions DEFAULT required
   } WITH SYNTAX {
        IDENTIFIER &id
        PARAMS [&Params] ARE &paramPresence
   }

   --  BULK-ENCRYPTION
   --
   --  Describes the basic properities of a bulk encryption algorithm
   --
   --  &id - contains the OID identifying the key transport algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --
   --  Example:
   --  aes128 BULK-ENCRYPTION ::= {
   --      &id id-aes128-CBC
   --      &Params AES-IV
   --      &paramPresence required
   --  }

   BULK-ENCRYPTION ::= CLASS {
       &id    OBJECT IDENTIFIER UNIQUE,
       &Params,
       &paramPresence      ParamOptions DEFAULT required
   } WITH SYNTAX {
       OID &id
       PARAMS &Params [ARE &paramPresence]
   }

   -- MAC-ALGORITHM
   --
   --  Describes the basic properities of a key transport algorithm
   --
   --  &id - contains the OID identifying the key transport algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --
   --  It would make sense to also add minimum and maximum MAC lengths



Hoffman & Schaad        Expires January 11, 2009               [Page 11]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   --
   --  Example:
   --  hmac-sha1 MAC-ALGORITHM ::= {
   --      &id hMAC-SHA1
   --      &Params NULL
   --      &paramPresence perferedAbsent
   --  }

   MAC-ALGORITHM ::= CLASS {
       &id    OBJECT IDENTIFIER UNIQUE,
       &Params             OPTIONAL,
       &paramPresence      ParamOptions DEFAULT required
   } WITH SYNTAX {
       OID &id
       [PARAMS [&Params] [ARE &paramPresence]]
   }

   --  CONTENT-ENCRYPTION
   --
   --  Describes the basic properities of a symetric encryption
   --      algorithm
   --
   --  &id - contains the OID identifying the key transport algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --  &paramPresence - parameter presence requirement
   --
   --  Example:
   --  cms3DESwrap KEY-WRAP ::= {
   --      &id id-alg-CMS3DESwrap
   --      &Params NULL
   --      &paramPresence required
   --  }

   CONTENT-ENCRYPTION ::= CLASS {
       &id                OBJECT IDENTIFIER UNIQUE,
       &Params             OPTIONAL,
       &paramPresence      ParamOptions DEFAULT required
   } WITH SYNTAX {
       IDENTIFIER &id
       [PARAMS [&Params] ARE &paramPresence]
   }

   AlgorithmIdentifier{ALGORITHM-TYPE, ALGORITHM-TYPE:AlgorithmSet} ::=
   SEQUENCE {
       algorithm   ALGORITHM-TYPE.&id({AlgorithmSet}),
       parameters  ALGORITHM-TYPE.
              &Params({AlgorithmSet}{@algorithm}) OPTIONAL



Hoffman & Schaad        Expires January 11, 2009               [Page 12]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   }

   -- ALGORITHM
   --
   -- Describes a generic algorithm identifier
   --
   --  &id - contains the OID identifying the key transport algorithm
   --  &Params - contains the type for the algoithm parameters,
   --               if present; absent implies no paameters
   --
   --  This would be used for cases where an unknown algorithm is
   --  used.  One should consider using TYPE-IDENTIFIER in these cases.

   ALGORITHM ::= CLASS {
       &id OBJECT   IDENTIFIER UNIQUE,
       &Params      OPTIONAL
   } WITH SYNTAX {
       IDENTIFIER &id [PARAMS &Params]
   }

   END


4.  ASN.1 Module for RFC 2560

   OCSP
       {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-ocsp(14)}
   DEFINITIONS EXPLICIT TAGS ::=
   BEGIN

   IMPORTS

   Attribute{}, AlgorithmIdentifier{}, Extensions{}, EXTENSION,
       ATTRIBUTE, ALGORITHM
   FROM PKIX-CommonTypes
       {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) }

   AuthorityInfoAccessSyntax, GeneralName
   FROM PKIX1Implicit88
       {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) 19}

   Name, CertificateSerialNumber, id-kp, id-ad-ocsp, Certificate
   FROM PKIX1Explicit88
       {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) 18};



Hoffman & Schaad        Expires January 11, 2009               [Page 13]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   CRLReason ::= INTEGER

   OCSPRequest     ::=     SEQUENCE {
       tbsRequest                  TBSRequest,
       optionalSignature   [0]     EXPLICIT Signature OPTIONAL }

   TBSRequest      ::=     SEQUENCE {
       version             [0] EXPLICIT Version DEFAULT v1,
       requestorName       [1] EXPLICIT GeneralName OPTIONAL,
       requestList             SEQUENCE OF Request,
       requestExtensions   [2] EXPLICIT Extensions{{...}} OPTIONAL }

   Signature       ::=     SEQUENCE {
       signatureAlgorithm   AlgorithmIdentifier{{...}},
       signature            BIT STRING,
       certs            [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }

   Version  ::=  INTEGER  {  v1(0) }

   Request ::=     SEQUENCE {
       reqCert                    CertID,
       singleRequestExtensions    [0] EXPLICIT Extensions{{...}}
                                      OPTIONAL }

   CertID ::= SEQUENCE {
       hashAlgorithm            AlgorithmIdentifier{{...}},
       issuerNameHash     OCTET STRING, -- Hash of Issuer's DN
       issuerKeyHash      OCTET STRING, -- Hash of Issuers public key
       serialNumber       CertificateSerialNumber }

   OCSPResponse ::= SEQUENCE {
      responseStatus         OCSPResponseStatus,
      responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }

   OCSPResponseStatus ::= ENUMERATED {
       successful            (0), --Response has valid confirmations
       malformedRequest      (1), --Illegal confirmation request
       internalError         (2), --Internal error in issuer
       tryLater              (3), --Try again later
                                  -- (4) is not used
       sigRequired           (5), --Must sign the request
       unauthorized          (6)  --Request unauthorized
   }

   RESPONSE ::= TYPE-IDENTIFIER

   ResponseSet RESPONSE ::= {...}




Hoffman & Schaad        Expires January 11, 2009               [Page 14]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   ResponseBytes ::=       SEQUENCE {
       responseType        RESPONSE.
                               &id ({ResponseSet}),
       response            OCTET STRING (CONTAINING RESPONSE.
                               &Type({ResponseSet}{@responseType}))}

   basicResponse RESPONSE ::=
       { BasicOCSPResponse IDENTIFIED BY id-pkix-ocsp-basic }

   BasicOCSPResponse       ::= SEQUENCE {
      tbsResponseData      ResponseData,
      signatureAlgorithm   AlgorithmIdentifier{{...}},
      signature            BIT STRING,
      certs            [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }

   ResponseData ::= SEQUENCE {
      version              [0] EXPLICIT Version DEFAULT v1,
      responderID              ResponderID,
      producedAt               GeneralizedTime,
      responses                SEQUENCE OF SingleResponse,
      responseExtensions   [1] EXPLICIT Extensions{{...}} OPTIONAL }

   ResponderID ::= CHOICE {
      byName   [1] Name,
      byKey    [2] KeyHash }

   KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key
                            -- (excluding the tag and length fields)

   SingleResponse ::= SEQUENCE {
      certID                       CertID,
      certStatus                   CertStatus,
      thisUpdate                   GeneralizedTime,
      nextUpdate           [0]     EXPLICIT GeneralizedTime OPTIONAL,
      singleExtensions     [1]     EXPLICIT Extensions{{...}} OPTIONAL }

   CertStatus ::= CHOICE {
       good                [0]     IMPLICIT NULL,
       revoked             [1]     IMPLICIT RevokedInfo,
       unknown             [2]     IMPLICIT UnknownInfo }

   RevokedInfo ::= SEQUENCE {
       revocationTime              GeneralizedTime,
       revocationReason    [0]     EXPLICIT CRLReason OPTIONAL }

   UnknownInfo ::= NULL -- this can be replaced with an enumeration

   ArchiveCutoff ::= GeneralizedTime



Hoffman & Schaad        Expires January 11, 2009               [Page 15]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   AcceptableResponses ::= SEQUENCE OF OBJECT IDENTIFIER

   ServiceLocator ::= SEQUENCE {
       issuer    Name,
       locator   AuthorityInfoAccessSyntax }

   -- Object Identifiers

   id-kp-OCSPSigning            OBJECT IDENTIFIER ::= { id-kp 9 }
   id-pkix-ocsp                 OBJECT IDENTIFIER ::= id-ad-ocsp
   id-pkix-ocsp-basic           OBJECT IDENTIFIER ::= { id-pkix-ocsp 1 }
   id-pkix-ocsp-nonce           OBJECT IDENTIFIER ::= { id-pkix-ocsp 2 }
   id-pkix-ocsp-crl             OBJECT IDENTIFIER ::= { id-pkix-ocsp 3 }
   id-pkix-ocsp-response        OBJECT IDENTIFIER ::= { id-pkix-ocsp 4 }
   id-pkix-ocsp-nocheck         OBJECT IDENTIFIER ::= { id-pkix-ocsp 5 }
   id-pkix-ocsp-archive-cutoff  OBJECT IDENTIFIER ::= { id-pkix-ocsp 6 }
   id-pkix-ocsp-service-locator OBJECT IDENTIFIER ::= { id-pkix-ocsp 7 }

   END



5.  ASN.1 Module for RFC 2986

  PKCS-10
      {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-10(10)
      modules(1) pkcs-10(1)}
  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN
  IMPORTS

  ALGORITHM, ATTRIBUTE, Name
  FROM PKIX1Explicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-explicit(18) };


  -- Certificate requests
  CertificationRequestInfo ::= SEQUENCE {
      version       INTEGER { v1(0) } (v1, ... ),
      subject       Name,
      subjectPKInfo SubjectPublicKeyInfo{{ PKInfoAlgorithms }},
      attributes    [0] Attributes{{ CRIAttributes }}
  }

  SubjectPublicKeyInfo {ALGORITHM: IOSet} ::= SEQUENCE {
      algorithm        AlgorithmIdentifier {{IOSet}},
      subjectPublicKey BIT STRING



Hoffman & Schaad        Expires January 11, 2009               [Page 16]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  }

  PKInfoAlgorithms ALGORITHM ::= {
      ... -- add any locally defined algorithms here -- }

  Attributes { ATTRIBUTE:IOSet } ::= SET OF Attribute{{ IOSet }}


  CRIAttributes  ATTRIBUTE  ::= {
      ... -- add any locally defined attributes here -- }

  Attribute { ATTRIBUTE:IOSet } ::= SEQUENCE {
      type   ATTRIBUTE.&id({IOSet}),
      values SET SIZE(1..MAX) OF ATTRIBUTE.&Type({IOSet}{@type})
  }

  CertificationRequest ::= SEQUENCE {
      certificationRequestInfo CertificationRequestInfo,
      signatureAlgorithm AlgorithmIdentifier{{ SignatureAlgorithms }},
      signature          BIT STRING
  }

  AlgorithmIdentifier {ALGORITHM:IOSet } ::= SEQUENCE {
      algorithm  ALGORITHM.&id({IOSet}),
      parameters ALGORITHM.&Type({IOSet}{@algorithm}) OPTIONAL
  }

  SignatureAlgorithms ALGORITHM ::= {
      ... -- add any locally defined algorithms here -- }

  END


6.  ASN.1 Module for RFC 3279

  PKIX1Algorithms88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-algorithms(17) }
  DEFINITIONS EXPLICIT TAGS ::=
  BEGIN

  IMPORTS
     ParamOptions, DIGEST-ALGORITHM, SIGNATURE-ALGORITHM,
     PUBLIC-KEY
  FROM AlgorithmInformation
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-algorithInformation(99)}
     ;



Hoffman & Schaad        Expires January 11, 2009               [Page 17]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  --
  --  Create the object sets for each of the different type of signature
  --  algorithms defined by this module.
  --
  --  Philosophy:  Sean Turner raised the question about wheither these
  --  object sets should be defined as being extensible. My response is
  --  as follows:
  --
  --  If the working group believes that this document would be updated
  --    in the future for the definition of new algorithms, or that
  --    this document would be updated to reference (and thus include)
  --    new algorithms defined in other documents, then these object
  --    sets need to be marked as extensible.
  --  If the working group believes that new algorithms will be defined
  --     by the creation of new documents, then these object sets do not
  --     need to be extensible.
  --  In either case, documents that are referencing these objects sets
  --     should probably be marked as being extensible in the location
  --     they are being used. Thus in the main PKIX document you would
  --     have
  --
  --  SIGNED{ToBeSigned} ::= SEQUENCE {
  --      toBeSigned  ToBeSigned,
  --      algorithm   AlgorithmIdentifier
  --         {SIGNATURE-ALGORITHM, {Sa-PKIXAlgorithms, ...}},
  --      signature   BIT STRING
  --  }
  --
  --  Future versions might include additional algorithm drafts and
  --      use the line
  --      algorithm   AlgorithmIdentifier
  --          {SIGNATURE-ALGORITHM,
  --             {Sa-PKIXAlgorithms, ..., Sa-NewPKIXAlgorithms}},
  --

  --  Signature algorithms in this document

  Sa-PKIXAlgorithms SIGNATURE-ALGORITHM ::= {
          sa-dsa-with-sha1 | sa-md2WithRSAEncryption |
          sa-md5WithRSAEncryption |
          sa-sha1WithRSAEncryption | sa-ecdsa-with-SHA1 }

  --  Hash algorthms in this document

  Mda-PKIXAlgorithms DIGEST-ALGORITHM ::= { mda-md2 | mda-md5 |
          mda-sha1 }

  --  Public Key Algorithms in this document



Hoffman & Schaad        Expires January 11, 2009               [Page 18]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  Pk-PKIXAlgorithms PUBLIC-KEY ::= { pk-dsa | pk-rsa | pk-dh |
          pk-keyExchangeAlgorithm | pk-ecPublicKey }

  --
  --   One-way Hash Functions
  --

  md2  OBJECT IDENTIFIER ::= {
      iso(1) member-body(2) us(840) rsadsi(113549)
      digestAlgorithm(2) 2 }

  md5  OBJECT IDENTIFIER ::= {
      iso(1) member-body(2) us(840) rsadsi(113549)
      digestAlgorithm(2) 5 }

  id-sha1  OBJECT IDENTIFIER ::= {
      iso(1) identified-organization(3) oiw(14) secsig(3)
      algorithms(2) 26 }

  mda-md2 DIGEST-ALGORITHM ::= {
          IDENTIFIER md2 PARAMS NULL ARE preferedAbsent }

  mda-md5 DIGEST-ALGORITHM ::= {
          IDENTIFIER md5 PARAMS NULL ARE preferedAbsent }

  mda-sha1 DIGEST-ALGORITHM ::= {
          IDENTIFIER id-sha1 PARAMS NULL ARE preferedAbsent }

  --
  --   DSA Keys and Signatures
  --

  -- OID for DSA public key

  id-dsa OBJECT IDENTIFIER ::= {
      iso(1) member-body(2) us(840) x9-57(10040) x9algorithm(4) 1 }

  -- encoding for DSA public key

  DSAPublicKey ::= INTEGER  -- public key, y

  Dss-Parms  ::=  SEQUENCE  {
    p             INTEGER,
    q             INTEGER,
    g             INTEGER  }

  pk-dsa PUBLIC-KEY ::= {
          IDENTIFIER id-dsa



Hoffman & Schaad        Expires January 11, 2009               [Page 19]


Internet-Draft             New ASN.1 for PKIX                  July 2008


          KEY DSAPublicKey
          PARAMS Dss-Parms ARE inheritable
  }

  -- OID for DSA signature generated with SHA-1 hash

  id-dsa-with-sha1 OBJECT IDENTIFIER ::=  {
      iso(1) member-body(2) us(840) x9-57 (10040) x9algorithm(4) 3 }

  -- encoding for DSA signature generated with SHA-1 hash

  Dss-Sig-Value  ::=  SEQUENCE  {
    r       INTEGER,
    s       INTEGER  }

  sa-dsa-with-sha1 SIGNATURE-ALGORITHM ::=
          { IDENTIFIER id-dsa-with-sha1
            VALUE Dss-Sig-Value
            PARAMS NULL ARE absent
            USES {mda-sha1}
            PUBKEYS {pk-dsa}}

  --
  --   RSA Keys and Signatures
  --

  -- arc for RSA public key and RSA signature OIDs

  pkcs-1 OBJECT IDENTIFIER ::= {
       iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 }

  -- OID for RSA public keys

  rsaEncryption OBJECT IDENTIFIER ::=  { pkcs-1 1 }

  pk-rsa PUBLIC-KEY ::= {
    IDENTIFIER rsaEncryption
    KEY RSAPublicKey
    PARAMS NULL ARE required
  }

  -- OID for RSA signature generated with MD2 hash

  md2WithRSAEncryption OBJECT IDENTIFIER  ::=  { pkcs-1 2 }

  sa-md2WithRSAEncryption SIGNATURE-ALGORITHM ::= {
          IDENTIFIER md2WithRSAEncryption
          PARAMS NULL ARE required



Hoffman & Schaad        Expires January 11, 2009               [Page 20]


Internet-Draft             New ASN.1 for PKIX                  July 2008


          USES {mda-md2 }
          PUBKEYS { pk-rsa } }

  -- OID for RSA signature generated with MD5 hash

  md5WithRSAEncryption OBJECT IDENTIFIER  ::=  { pkcs-1 4 }

  sa-md5WithRSAEncryption SIGNATURE-ALGORITHM ::= {
          IDENTIFIER md5WithRSAEncryption
          PARAMS NULL  ARE required
          USES {mda-md5 }
          PUBKEYS {pk-rsa }}

  -- OID for RSA signature generated with SHA-1 hash

  sha1WithRSAEncryption OBJECT IDENTIFIER  ::=  { pkcs-1 5 }
  sa-sha1WithRSAEncryption SIGNATURE-ALGORITHM ::= {
          IDENTIFIER sha1WithRSAEncryption
          PARAMS NULL ARE required
          USES {mda-sha1 }
          PUBKEYS { pk-rsa }}

  -- encoding for RSA public key

  RSAPublicKey ::= SEQUENCE {
    modulus            INTEGER,    -- n
    publicExponent     INTEGER  }  -- e

  --
  --   Diffie-Hellman Keys
  --

  dhpublicnumber OBJECT IDENTIFIER ::= {
      iso(1) member-body(2) us(840) ansi-x942(10046)
      number-type(2) 1 }

  -- encoding for DH public key

  DHPublicKey ::= INTEGER  -- public key, y = g^x mod p

  DomainParameters ::= SEQUENCE {
    p       INTEGER,           -- odd prime, p=jq +1
    g       INTEGER,           -- generator, g
    q       INTEGER,           -- factor of p-1
    j       INTEGER OPTIONAL,  -- subgroup factor, j>= 2
    validationParms  ValidationParms OPTIONAL }

  ValidationParms ::= SEQUENCE {



Hoffman & Schaad        Expires January 11, 2009               [Page 21]


Internet-Draft             New ASN.1 for PKIX                  July 2008


    seed             BIT STRING,
    pgenCounter      INTEGER }

  pk-dh PUBLIC-KEY ::= {
      IDENTIFIER dhpublicnumber
      KEY DHPublicKey
      PARAMS DomainParameters ARE inheritable
  }

  --
  --   KEA Keys
  --

  id-keyExchangeAlgorithm  OBJECT IDENTIFIER  ::=
      { 2 16 840 1 101 2 1 1 22 }

  KEA-Parms-Id ::= OCTET STRING

  pk-keyExchangeAlgorithm PUBLIC-KEY ::= {
          IDENTIFIER id-keyExchangeAlgorithm
          KEY NULL
          -- no encoding on the key
          PARAMS KEA-Parms-Id ARE required
  }

  --
  --   Elliptic Curve Keys, Signatures, and Curves
  --

  ansi-X9-62 OBJECT IDENTIFIER ::= {
      iso(1) member-body(2) us(840) 10045 }

  pk-ecPublicKey PUBLIC-KEY ::= {
      IDENTIFIER id-ecPublicKey
      KEY OCTET STRING
      PARAMS EcpkParameters ARE required
  }

  FIELD-ID ::= TYPE-IDENTIFIER

  FieldID ::=                -- Finite field
      SEQUENCE {
          fieldType   FIELD-ID.
              &id({SupportedFields}),
          parameters  FIELD-ID.
              &Type({SupportedFields}{@fieldType}) OPTIONAL
      }




Hoffman & Schaad        Expires January 11, 2009               [Page 22]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  SupportedFields FIELD-ID ::=
      {fid-prime-field | fid-characteristic-two-field}

  -- Arc for ECDSA signature OIDS

  id-ecSigType OBJECT IDENTIFIER ::= { ansi-X9-62 signatures(4) }

  -- OID for ECDSA signatures with SHA-1

  ecdsa-with-SHA1 OBJECT IDENTIFIER ::= { id-ecSigType 1 }

  sa-ecdsa-with-SHA1 SIGNATURE-ALGORITHM ::= {
          IDENTIFIER ecdsa-with-SHA1
          VALUE ECDSA-Sig-Value
          PARAMS NULL ARE notPresent
          USES {mda-sha1}
          PUBKEYS {pk-ecPublicKey}}

  -- OID for an elliptic curve signature
  -- format for the value of an ECDSA signature value

  ECDSA-Sig-Value ::= SEQUENCE {
    r     INTEGER,
    s     INTEGER }

  -- recognized field type OIDs are defined in the following arc

  id-fieldType OBJECT IDENTIFIER ::= { ansi-X9-62 fieldType(1) }

  -- where fieldType is prime-field, the parameters are of type Prime-p

  fid-prime-field FIELD-ID ::= {Prime-p IDENTIFIED BY prime-field}

  prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 }

  Prime-p ::= INTEGER -- Finite field F(p), where p is an odd prime

  -- where fieldType is characteristic-two-field, the parameters are
  -- of type Characteristic-two

  fid-characteristic-two-field FIELD-ID ::=
      {Characteristic-two IDENTIFIED BY characteristic-two-field}

  characteristic-two-field OBJECT IDENTIFIER ::= { id-fieldType 2 }

  CHARACTERISTIC-TWO ::= TYPE-IDENTIFIER

  Characteristic-two ::= SEQUENCE {



Hoffman & Schaad        Expires January 11, 2009               [Page 23]


Internet-Draft             New ASN.1 for PKIX                  July 2008


    m           INTEGER,                   -- Field size 2^m
    basis       CHARACTERISTIC-TWO.
                  &id({SupportedCharacteristicTwo}),
    parameters  CHARACTERISTIC-TWO.
                  &Type({SupportedCharacteristicTwo}{@basis})
  }

  SupportedCharacteristicTwo CHARACTERISTIC-TWO ::=
              {char2-gnBasis | char2-tpBasis | char2-ppBasis }

  -- recognized basis type OIDs are defined in the following arc

  id-characteristic-two-basis OBJECT IDENTIFIER ::= {
      characteristic-two-field basisType(3) }

  -- gnbasis is identified by OID gnBasis and indicates
  -- parameters are NULL

  char2-gnBasis CHARACTERISTIC-TWO ::= {NULL IDENTIFIED BY gnBasis}

  gnBasis OBJECT IDENTIFIER ::= { id-characteristic-two-basis 1 }

  -- parameters for this basis are NULL

  -- trinomial basis is identified by OID tpBasis and indicates
  -- parameters of type Pentanomial

  char2-tpBasis CHARACTERISTIC-TWO ::=
      {Trinomial IDENTIFIED BY tpBasis}

  tpBasis OBJECT IDENTIFIER ::= { id-characteristic-two-basis 2 }

  -- Trinomial basis representation of F2^m
  -- Integer k for reduction polynomial xm + xk + 1

  Trinomial ::= INTEGER

  -- for pentanomial basis is identified by OID ppBasis and indicates
  -- parameters of type Pentanomial

  char2-ppBasis CHARACTERISTIC-TWO ::=
      {Pentanomial IDENTIFIED BY ppBasis}

  ppBasis OBJECT IDENTIFIER ::= { id-characteristic-two-basis 3 }

  -- Pentanomial basis representation of F2^m
  -- reduction polynomial integers k1, k2, k3
  -- f(x) = x**m + x**k3 + x**k2 + x**k1 + 1



Hoffman & Schaad        Expires January 11, 2009               [Page 24]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  Pentanomial ::= SEQUENCE {
    k1  INTEGER,
    k2  INTEGER,
    k3  INTEGER }

  -- The object identifiers gnBasis, tpBasis and ppBasis name
  -- three kinds of basis for characteristic-two finite fields

  FieldElement ::= OCTET STRING             -- Finite field element

  ECPoint  ::= OCTET STRING                 -- Elliptic curve point

  -- Elliptic Curve parameters may be specified explicitly,
  -- specified implicitly through a "named curve", or
  -- inherited from the CA

  EcpkParameters ::= CHOICE {
    ecParameters  ECParameters,
    namedCurve    OBJECT IDENTIFIER,
    implicitlyCA  NULL }

  ECParameters  ::= SEQUENCE {         -- Elliptic curve parameters
    version   ECPVer,
    fieldID   FieldID,
    curve     Curve,
    base      ECPoint,                -- Base point G
    order     INTEGER,                -- Order n of the base point
    cofactor  INTEGER  OPTIONAL }     -- The integer h = #E(Fq)/n

  ECPVer ::= INTEGER {ecpVer1(1)}

  Curve  ::= SEQUENCE {
    a     FieldElement,            -- Elliptic curve coefficient a
    b     FieldElement,            -- Elliptic curve coefficient b
    seed  BIT STRING  OPTIONAL }

  id-publicKeyType OBJECT IDENTIFIER  ::= { ansi-X9-62 keyType(2) }

  id-ecPublicKey OBJECT IDENTIFIER ::= { id-publicKeyType 1 }

  -- Named Elliptic Curves in ANSI X9.62.

  ellipticCurve OBJECT IDENTIFIER ::= { ansi-X9-62 curves(3) }

  c-TwoCurve OBJECT IDENTIFIER ::= {
      ellipticCurve characteristicTwo(0) }

  c2pnb163v1  OBJECT IDENTIFIER  ::=  { c-TwoCurve  1 }



Hoffman & Schaad        Expires January 11, 2009               [Page 25]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  c2pnb163v2  OBJECT IDENTIFIER  ::=  { c-TwoCurve  2 }
  c2pnb163v3  OBJECT IDENTIFIER  ::=  { c-TwoCurve  3 }
  c2pnb176w1  OBJECT IDENTIFIER  ::=  { c-TwoCurve  4 }
  c2tnb191v1  OBJECT IDENTIFIER  ::=  { c-TwoCurve  5 }
  c2tnb191v2  OBJECT IDENTIFIER  ::=  { c-TwoCurve  6 }
  c2tnb191v3  OBJECT IDENTIFIER  ::=  { c-TwoCurve  7 }
  c2onb191v4  OBJECT IDENTIFIER  ::=  { c-TwoCurve  8 }
  c2onb191v5  OBJECT IDENTIFIER  ::=  { c-TwoCurve  9 }
  c2pnb208w1  OBJECT IDENTIFIER  ::=  { c-TwoCurve 10 }
  c2tnb239v1  OBJECT IDENTIFIER  ::=  { c-TwoCurve 11 }
  c2tnb239v2  OBJECT IDENTIFIER  ::=  { c-TwoCurve 12 }
  c2tnb239v3  OBJECT IDENTIFIER  ::=  { c-TwoCurve 13 }
  c2onb239v4  OBJECT IDENTIFIER  ::=  { c-TwoCurve 14 }
  c2onb239v5  OBJECT IDENTIFIER  ::=  { c-TwoCurve 15 }
  c2pnb272w1  OBJECT IDENTIFIER  ::=  { c-TwoCurve 16 }
  c2pnb304w1  OBJECT IDENTIFIER  ::=  { c-TwoCurve 17 }
  c2tnb359v1  OBJECT IDENTIFIER  ::=  { c-TwoCurve 18 }
  c2pnb368w1  OBJECT IDENTIFIER  ::=  { c-TwoCurve 19 }
  c2tnb431r1  OBJECT IDENTIFIER  ::=  { c-TwoCurve 20 }

  primeCurve OBJECT IDENTIFIER ::= { ellipticCurve prime(1) }

  prime192v1  OBJECT IDENTIFIER  ::=  { primeCurve  1 }
  prime192v2  OBJECT IDENTIFIER  ::=  { primeCurve  2 }
  prime192v3  OBJECT IDENTIFIER  ::=  { primeCurve  3 }
  prime239v1  OBJECT IDENTIFIER  ::=  { primeCurve  4 }
  prime239v2  OBJECT IDENTIFIER  ::=  { primeCurve  5 }
  prime239v3  OBJECT IDENTIFIER  ::=  { primeCurve  6 }
  prime256v1  OBJECT IDENTIFIER  ::=  { primeCurve  7 }

  END


7.  ASN.1 Module for RFC 3280, Explicit and Implicit

   Note that many of the changes in this module are similar or the same
   as the changes made in more recent versions of X.509 itself.

  PKIX1Explicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-explicit(18) }
  DEFINITIONS EXPLICIT TAGS ::=
  BEGIN

  IMPORTS

  Attribute{}, AlgorithmIdentifier{}, Extensions{}, EXTENSION,
      ATTRIBUTE, ALGORITHM



Hoffman & Schaad        Expires January 11, 2009               [Page 26]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  FROM PKIX-CommonTypes
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) }

  CertExtensions, CrlExtensions, CrlEntryExtensions
  FROM PKIX1Implicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-implicit(19) };


  id-pkix  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) }

  -- PKIX arcs

  id-pe OBJECT IDENTIFIER  ::=  { id-pkix 1 }
      -- arc for private certificate extensions
  id-qt OBJECT IDENTIFIER ::= { id-pkix 2 }
      -- arc for policy qualifier types
  id-kp OBJECT IDENTIFIER ::= { id-pkix 3 }
      -- arc for extended key purpose OIDS
  id-ad OBJECT IDENTIFIER ::= { id-pkix 48 }
      -- arc for access descriptors

  -- policyQualifierIds for Internet policy qualifiers

  id-qt-cps      OBJECT IDENTIFIER ::=  { id-qt 1 }
      -- OID for CPS qualifier
  id-qt-unotice  OBJECT IDENTIFIER ::=  { id-qt 2 }
      -- OID for user notice qualifier

  -- access descriptor definitions

  id-ad-ocsp         OBJECT IDENTIFIER ::= { id-ad 1 }
  id-ad-caIssuers    OBJECT IDENTIFIER ::= { id-ad 2 }
  id-ad-timeStamping OBJECT IDENTIFIER ::= { id-ad 3 }
  id-ad-caRepository OBJECT IDENTIFIER ::= { id-ad 5 }

  -- attribute data types

  SupportedAttributes ATTRIBUTE ::=
      { x520CommonName | x520name | x520LocalityName |
      x520StateOrProvinceName | x520OrganizationName |
      x520OrganizationalUnitName | x520Title | x520dnQualifier |
      x520countryName | x520SerialNumber | x520Pseudonym |
      domainComponent | emailAddress, ... }




Hoffman & Schaad        Expires January 11, 2009               [Page 27]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  AttributeType           ::=  OBJECT IDENTIFIER

  AttributeTypeAndValue   ::=  SEQUENCE {
      type    ATTRIBUTE.&id({SupportedAttributes}),
      value   ATTRIBUTE.&Type({SupportedAttributes}{@type}) }

  -- suggested naming attributes: Definition of the following
  --   information object set may be augmented to meet local
  --   requirements.  Note that deleting members of the set may
  --   prevent interoperability with conforming implementations.
  -- presented in pairs: the AttributeType followed by the
  --   type definition for the corresponding AttributeValue
  --Arc for standard naming attributes

  id-at OBJECT IDENTIFIER ::= { joint-iso-ccitt(2) ds(5) 4 }

  -- Naming attributes of type X520name

  id-at-name              AttributeType ::= { id-at 41 }
  id-at-surname           AttributeType ::= { id-at 4 }
  id-at-givenName         AttributeType ::= { id-at 42 }
  id-at-initials          AttributeType ::= { id-at 43 }
  id-at-generationQualifier AttributeType ::= { id-at 44 }

  -- Directory string type --

  DirectoryString{INTEGER:maxSize} ::= CHOICE {
      teletexString    TeletexString(SIZE (1..maxSize)),
      printableString  PrintableString(SIZE (1..maxSize)),
      bmpString        BMPString(SIZE (1..maxSize)),
      universalString  UniversalString(SIZE (1..maxSize)),
      uTF8String       UTF8String(SIZE (1..maxSize))
  }

  x520name ATTRIBUTE ::= {TYPE X520name IDENTIFIED BY id-at-name }
  X520name ::= DirectoryString {ub-name}

  -- Naming attributes of type X520CommonName

  id-at-commonName        AttributeType ::= { id-at 3 }

  x520CommonName ATTRIBUTE ::=
      {TYPE X520CommonName IDENTIFIED BY id-at-commonName }
  X520CommonName ::= DirectoryString {ub-common-name}

  -- Naming attributes of type X520LocalityName

  id-at-localityName      AttributeType ::= { id-at 7 }



Hoffman & Schaad        Expires January 11, 2009               [Page 28]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  x520LocalityName ATTRIBUTE ::=
      { TYPE DirectoryString {ub-locality-name}
          IDENTIFIED BY id-at-localityName }

  -- Naming attributes of type X520StateOrProvinceName

  id-at-stateOrProvinceName AttributeType ::= { id-at 8 }

  x520StateOrProvinceName ATTRIBUTE ::=
      { TYPE DirectoryString {ub-state-name}
          IDENTIFIED BY id-at-stateOrProvinceName }

  -- Naming attributes of type X520OrganizationName

  id-at-organizationName  AttributeType ::= { id-at 10 }

  x520OrganizationName ATTRIBUTE ::=
      { TYPE DirectoryString {ub-organization-name}
          IDENTIFIED BY id-at-organizationName }

  -- Naming attributes of type X520OrganizationalUnitName

  id-at-organizationalUnitName AttributeType ::= { id-at 11 }

  x520OrganizationalUnitName ATTRIBUTE ::=
      { TYPE DirectoryString  {ub-organizational-unit-name}
          IDENTIFIED BY id-at-organizationalUnitName }

  -- Naming attributes of type X520Title

  id-at-title             AttributeType ::= { id-at 12 }

  x520Title ATTRIBUTE ::= { TYPE DirectoryString { ub-title }
      IDENTIFIED BY id-at-title }

  -- Naming attributes of type X520dnQualifier

  id-at-dnQualifier       AttributeType ::= { id-at 46 }

  x520dnQualifier ATTRIBUTE ::= { TYPE PrintableString
      IDENTIFIED BY id-at-dnQualifier }

  -- Naming attributes of type X520countryName (digraph from IS 3166)

  id-at-countryName       AttributeType ::= { id-at 6 }

  x520countryName ATTRIBUTE ::=  { TYPE PrintableString (SIZE (2))
      IDENTIFIED BY id-at-countryName }



Hoffman & Schaad        Expires January 11, 2009               [Page 29]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  -- Naming attributes of type X520SerialNumber

  id-at-serialNumber      AttributeType ::= { id-at 5 }

  x520SerialNumber ATTRIBUTE ::=  {TYPE PrintableString
      (SIZE (1..ub-serial-number)) IDENTIFIED BY id-at-serialNumber }

  -- Naming attributes of type X520Pseudonym

  id-at-pseudonym         AttributeType ::= { id-at 65 }

  x520Pseudonym ATTRIBUTE ::= { TYPE DirectoryString {ub-pseudonym}
      IDENTIFIED BY id-at-pseudonym }
  -- Naming attributes of type DomainComponent (from RFC 2247)

  id-domainComponent      AttributeType ::=
      { 0 9 2342 19200300 100 1 25 }

  domainComponent ATTRIBUTE ::= {TYPE IA5String
      IDENTIFIED BY id-domainComponent }

  -- Legacy attributes

  pkcs-9 OBJECT IDENTIFIER ::=
      { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 9 }

  id-emailAddress          AttributeType ::= { pkcs-9 1 }

  emailAddress ATTRIBUTE ::= {TYPE IA5String
      (SIZE (1..ub-emailaddress-length)) IDENTIFIED BY
      id-emailAddress }

  -- naming data types --

  Name ::= CHOICE { -- only one possibility for now --
      rdnSequence  RDNSequence }

  RDNSequence ::= SEQUENCE OF RelativeDistinguishedName

  DistinguishedName ::=   RDNSequence

  RelativeDistinguishedName  ::=
      SET SIZE (1 .. MAX) OF AttributeTypeAndValue

  -- certificate and CRL specific structures begin here

  Certificate  ::=  SIGNED{TBSCertificate}




Hoffman & Schaad        Expires January 11, 2009               [Page 30]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  TBSCertificate  ::=  SEQUENCE  {
      version         [0]  Version DEFAULT v1,
      serialNumber         CertificateSerialNumber,
      signature            AlgorithmIdentifier{{SupportedAlgorithms}},
      issuer               Name,
      validity             Validity,
      subject              Name,
      subjectPublicKeyInfo SubjectPublicKeyInfo,
      ... ,
      [[2:               -- If present, version MUST be v2 or v3
      issuerUniqueID  [1]  IMPLICIT UniqueIdentifier OPTIONAL,
      subjectUniqueID [2]  IMPLICIT UniqueIdentifier OPTIONAL
      ]],
      [[3:               -- If present, version MUST be v3 --
      extensions      [3]  Extensions{{CertExtensions}} OPTIONAL
      ]], ... }

  Version  ::=  INTEGER  {  v1(0), v2(1), v3(2)  }

  CertificateSerialNumber  ::=  INTEGER

  Validity ::= SEQUENCE {
      notBefore      Time,
      notAfter       Time  }

  Time ::= CHOICE {
      utcTime        UTCTime,
      generalTime    GeneralizedTime }

  UniqueIdentifier  ::=  BIT STRING

  SubjectPublicKeyInfo  ::=  SEQUENCE  {
      algorithm            AlgorithmIdentifier{{SupportedAlgorithms}},
      subjectPublicKey     BIT STRING  }


  -- CRL structures

  CertificateList  ::=  SIGNED{TBSCertList}

  TBSCertList  ::=  SEQUENCE  {
      version              Version OPTIONAL,
                                 -- if present, MUST be v2
      signature            AlgorithmIdentifier{{SupportedAlgorithms}},
      issuer               Name,
      thisUpdate           Time,
      nextUpdate           Time OPTIONAL,
      revokedCertificates  SEQUENCE SIZE (1..MAX) OF SEQUENCE {



Hoffman & Schaad        Expires January 11, 2009               [Page 31]


Internet-Draft             New ASN.1 for PKIX                  July 2008


          userCertificate  CertificateSerialNumber,
          revocationDate   Time,
          ... ,
          [[2:                  -- if present, MUST be v2
          crlEntryExtensions  Extensions{{CrlEntryExtensions}} OPTIONAL
          ]], ...
      } OPTIONAL,
      ... ,
      [[2:                       -- if present, MUST be v2
      crlExtensions       [0] Extensions{{CrlExtensions}} OPTIONAL
      ]], ... }

  -- Version, Time, CertificateSerialNumber, and Extensions were
  -- defined earlier for use in the certificate structure

  SupportedAlgorithms ALGORITHM ::= { ... }

  -- X.400 address syntax starts here

  ORAddress ::= SEQUENCE {
     built-in-standard-attributes BuiltInStandardAttributes,
     built-in-domain-defined-attributes
                     BuiltInDomainDefinedAttributes OPTIONAL,
     -- see also teletex-domain-defined-attributes
     extension-attributes ExtensionAttributes OPTIONAL }

  -- Built-in Standard Attributes

  BuiltInStandardAttributes ::= SEQUENCE {
     country-name                  CountryName OPTIONAL,
     administration-domain-name    AdministrationDomainName OPTIONAL,
     network-address           [0] IMPLICIT NetworkAddress OPTIONAL,
       -- see also extended-network-address
     terminal-identifier       [1] IMPLICIT TerminalIdentifier OPTIONAL,
     private-domain-name       [2] PrivateDomainName OPTIONAL,
     organization-name         [3] IMPLICIT OrganizationName OPTIONAL,
       -- see also teletex-organization-name
     numeric-user-identifier   [4] IMPLICIT NumericUserIdentifier
                                   OPTIONAL,
     personal-name             [5] IMPLICIT PersonalName OPTIONAL,
       -- see also teletex-personal-name
     organizational-unit-names [6] IMPLICIT OrganizationalUnitNames
                                   OPTIONAL }
       -- see also teletex-organizational-unit-names

  CountryName ::= [APPLICATION 1] CHOICE {
     x121-dcc-code         NumericString
                             (SIZE (ub-country-name-numeric-length)),



Hoffman & Schaad        Expires January 11, 2009               [Page 32]


Internet-Draft             New ASN.1 for PKIX                  July 2008


     iso-3166-alpha2-code  PrintableString
                             (SIZE (ub-country-name-alpha-length)) }

  AdministrationDomainName ::= [APPLICATION 2] CHOICE {
     numeric   NumericString   (SIZE (0..ub-domain-name-length)),
     printable PrintableString (SIZE (0..ub-domain-name-length)) }

  NetworkAddress ::= X121Address  -- see also extended-network-address

  X121Address ::= NumericString (SIZE (1..ub-x121-address-length))

  TerminalIdentifier ::= PrintableString (SIZE
  (1..ub-terminal-id-length))

  PrivateDomainName ::= CHOICE {
     numeric   NumericString   (SIZE (1..ub-domain-name-length)),
     printable PrintableString (SIZE (1..ub-domain-name-length)) }

  OrganizationName ::= PrintableString
                              (SIZE (1..ub-organization-name-length))
    -- see also teletex-organization-name

  NumericUserIdentifier ::= NumericString
                              (SIZE (1..ub-numeric-user-id-length))

  PersonalName ::= SET {
     surname     [0] IMPLICIT PrintableString
                      (SIZE (1..ub-surname-length)),
     given-name  [1] IMPLICIT PrintableString
                      (SIZE (1..ub-given-name-length)) OPTIONAL,
     initials    [2] IMPLICIT PrintableString
                      (SIZE (1..ub-initials-length)) OPTIONAL,
     generation-qualifier [3] IMPLICIT PrintableString
                      (SIZE (1..ub-generation-qualifier-length))
                      OPTIONAL }
    -- see also teletex-personal-name

  OrganizationalUnitNames ::= SEQUENCE SIZE (1..ub-organizational-units)
                               OF OrganizationalUnitName
    -- see also teletex-organizational-unit-names

  OrganizationalUnitName ::= PrintableString (SIZE
                      (1..ub-organizational-unit-name-length))

  -- Built-in Domain-defined Attributes

  BuiltInDomainDefinedAttributes ::= SEQUENCE SIZE
                      (1..ub-domain-defined-attributes) OF



Hoffman & Schaad        Expires January 11, 2009               [Page 33]


Internet-Draft             New ASN.1 for PKIX                  July 2008


                      BuiltInDomainDefinedAttribute

  BuiltInDomainDefinedAttribute ::= SEQUENCE {
     type PrintableString (SIZE
                     (1..ub-domain-defined-attribute-type-length)),
     value PrintableString (SIZE
                     (1..ub-domain-defined-attribute-value-length)) }

  -- Extension Attributes

  ExtensionAttributes ::= SET SIZE (1..ub-extension-attributes) OF
                 ExtensionAttribute

  EXTENSION-ATTRIBUTE ::= CLASS {
      &id             INTEGER (0..ub-extension-attributes) UNIQUE,
      &Type
  } WITH SYNTAX { &Type IDENTIFIED BY &id }

  ExtensionAttribute ::=  SEQUENCE {
     extension-attribute-type [0] IMPLICIT EXTENSION-ATTRIBUTE.
          &id({SupportedExtensionAttributes}),
     extension-attribute-value [1] EXTENSION-ATTRIBUTE.
          &Type({SupportedExtensionAttributes}
              {@extension-attribute-type})}

  SupportedExtensionAttributes EXTENSION-ATTRIBUTE ::= {
      ea-commonName | teletexCommonName | teletexOrganizationName |
      teletexPersonalName | teletexOrganizationalUnitNames |
      pDSName | physicalDeliveryCountryName | postalCode |
      physicalDeliveryOfficeName | physicalDeliveryOfficeNumber |
      extensionORAddressComponents | physicalDeliveryPersonalName |
      physicalDeliveryOrganizationName |
      extensionPhysicalDeliveryAddressComponents |
      unformattedPostalAddress | streetAddress | postOfficeBoxAddress |
      posteRestanteAddress | uniquePostalName | localPostalAttributes |
      extendedNetworkAddress |
      terminalType | teletexDomainDefinedAttributes, ... }

  -- Extension types and attribute values

  ea-commonName EXTENSION-ATTRIBUTE ::= { PrintableString
      (SIZE (1..ub-common-name-length)) IDENTIFIED BY 1}

  teletexCommonName EXTENSION-ATTRIBUTE ::= {TeletexString
      (SIZE (1..ub-common-name-length)) IDENTIFIED BY 2 }

  teletexOrganizationName EXTENSION-ATTRIBUTE::= { TeletexString
      (SIZE (1..ub-organization-name-length)) IDENTIFIED BY 3 }



Hoffman & Schaad        Expires January 11, 2009               [Page 34]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  teletexPersonalName EXTENSION-ATTRIBUTE ::= {SET {
     surname     [0] IMPLICIT TeletexString
                      (SIZE (1..ub-surname-length)),
     given-name  [1] IMPLICIT TeletexString
                      (SIZE (1..ub-given-name-length)) OPTIONAL,
     initials    [2] IMPLICIT TeletexString
                      (SIZE (1..ub-initials-length)) OPTIONAL,
     generation-qualifier [3] IMPLICIT TeletexString
                      (SIZE (1..ub-generation-qualifier-length))
                      OPTIONAL } IDENTIFIED BY 4 }

  teletexOrganizationalUnitNames EXTENSION-ATTRIBUTE ::= { SEQUENCE SIZE
      (1..ub-organizational-units) OF TeletexOrganizationalUnitName
          IDENTIFIED BY 5 }

  TeletexOrganizationalUnitName ::= TeletexString
      (SIZE (1..ub-organizational-unit-name-length))


  pDSName EXTENSION-ATTRIBUTE ::= {PrintableString
      (SIZE (1..ub-pds-name-length)) IDENTIFIED BY 7 }

  physicalDeliveryCountryName EXTENSION-ATTRIBUTE ::= { CHOICE {
       x121-dcc-code NumericString (SIZE
          (ub-country-name-numeric-length)),
       iso-3166-alpha2-code PrintableString
          (SIZE (ub-country-name-alpha-length)) }
       IDENTIFIED BY 8 }

  postalCode EXTENSION-ATTRIBUTE ::= { CHOICE {
     numeric-code NumericString (SIZE (1..ub-postal-code-length)),
     printable-code PrintableString (SIZE (1..ub-postal-code-length)) }
     IDENTIFIED BY 9 }

  physicalDeliveryOfficeName EXTENSION-ATTRIBUTE ::=
      { PDSParameter IDENTIFIED BY 10 }

  physicalDeliveryOfficeNumber EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 11 }

  extensionORAddressComponents EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 12 }

  physicalDeliveryPersonalName EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 13}

  physicalDeliveryOrganizationName EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 14 }



Hoffman & Schaad        Expires January 11, 2009               [Page 35]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  extensionPhysicalDeliveryAddressComponents EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 15 }

  unformattedPostalAddress EXTENSION-ATTRIBUTE ::= { SET {
     printable-address SEQUENCE SIZE (1..ub-pds-physical-address-lines)
           OF PrintableString (SIZE (1..ub-pds-parameter-length))
           OPTIONAL,
     teletex-string TeletexString
           (SIZE (1..ub-unformatted-address-length)) OPTIONAL }
     IDENTIFIED BY 16 }

  streetAddress EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 17 }

  postOfficeBoxAddress EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 18 }

  posteRestanteAddress EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 19 }

  uniquePostalName EXTENSION-ATTRIBUTE ::=
      { PDSParameter IDENTIFIED BY 20 }

  localPostalAttributes EXTENSION-ATTRIBUTE ::=
      {PDSParameter IDENTIFIED BY 21 }

  PDSParameter ::= SET {
     printable-string PrintableString
                  (SIZE(1..ub-pds-parameter-length)) OPTIONAL,
     teletex-string TeletexString
                  (SIZE(1..ub-pds-parameter-length)) OPTIONAL }

  extendedNetworkAddress EXTENSION-ATTRIBUTE ::= { CHOICE {
     e163-4-address SEQUENCE {
         number      [0] IMPLICIT NumericString
                          (SIZE (1..ub-e163-4-number-length)),
         sub-address [1] IMPLICIT NumericString
                          (SIZE (1..ub-e163-4-sub-address-length))
                              OPTIONAL },
     psap-address [0] IMPLICIT PresentationAddress }
     IDENTIFIED BY 22 }

  PresentationAddress ::= SEQUENCE {
      pSelector     [0] EXPLICIT OCTET STRING OPTIONAL,
      sSelector     [1] EXPLICIT OCTET STRING OPTIONAL,
      tSelector     [2] EXPLICIT OCTET STRING OPTIONAL,
      nAddresses    [3] EXPLICIT SET SIZE (1..MAX) OF OCTET STRING }




Hoffman & Schaad        Expires January 11, 2009               [Page 36]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  terminalType EXTENSION-ATTRIBUTE ::= {INTEGER {
     telex (3),
     teletex (4),
     g3-facsimile (5),
     g4-facsimile (6),
     ia5-terminal (7),
     videotex (8) } (0..ub-integer-options)
     IDENTIFIED BY 23 }

  -- Extension Domain-defined Attributes

  teletexDomainDefinedAttributes EXTENSION-ATTRIBUTE ::= {SEQUENCE SIZE
     (1..ub-domain-defined-attributes) OF TeletexDomainDefinedAttribute
     IDENTIFIED BY 6 }

  TeletexDomainDefinedAttribute ::= SEQUENCE {
      type TeletexString
          (SIZE (1..ub-domain-defined-attribute-type-length)),
      value TeletexString
          (SIZE (1..ub-domain-defined-attribute-value-length)) }

  --  specifications of Upper Bounds MUST be regarded as mandatory
  --  from Annex B of ITU-T X.411 Reference Definition of MTS Parameter
  --  Upper Bounds

  -- Upper Bounds
  ub-name INTEGER ::= 32768
  ub-common-name INTEGER ::= 64
  ub-locality-name INTEGER ::= 128
  ub-state-name INTEGER ::= 128
  ub-organization-name INTEGER ::= 64
  ub-organizational-unit-name INTEGER ::= 64
  ub-title INTEGER ::= 64
  ub-serial-number INTEGER ::= 64
  ub-match INTEGER ::= 128
  ub-emailaddress-length INTEGER ::= 255
  ub-common-name-length INTEGER ::= 64
  ub-country-name-alpha-length INTEGER ::= 2
  ub-country-name-numeric-length INTEGER ::= 3
  ub-domain-defined-attributes INTEGER ::= 4
  ub-domain-defined-attribute-type-length INTEGER ::= 8
  ub-domain-defined-attribute-value-length INTEGER ::= 128
  ub-domain-name-length INTEGER ::= 16
  ub-extension-attributes INTEGER ::= 256
  ub-e163-4-number-length INTEGER ::= 15
  ub-e163-4-sub-address-length INTEGER ::= 40
  ub-generation-qualifier-length INTEGER ::= 3
  ub-given-name-length INTEGER ::= 16



Hoffman & Schaad        Expires January 11, 2009               [Page 37]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  ub-initials-length INTEGER ::= 5
  ub-integer-options INTEGER ::= 256
  ub-numeric-user-id-length INTEGER ::= 32
  ub-organization-name-length INTEGER ::= 64
  ub-organizational-unit-name-length INTEGER ::= 32
  ub-organizational-units INTEGER ::= 4
  ub-pds-name-length INTEGER ::= 16
  ub-pds-parameter-length INTEGER ::= 30
  ub-pds-physical-address-lines INTEGER ::= 6
  ub-postal-code-length INTEGER ::= 16
  ub-pseudonym INTEGER ::= 128
  ub-surname-length INTEGER ::= 40
  ub-terminal-id-length INTEGER ::= 24
  ub-unformatted-address-length INTEGER ::= 180
  ub-x121-address-length INTEGER ::= 16

  -- Note - upper bounds on string types, such as TeletexString, are
  -- measured in characters.  Excepting PrintableString or IA5String, a
  -- significantly greater number of octets will be required to hold
  -- such a value.  As a minimum, 16 octets, or twice the specified
  -- upper bound, whichever is the larger, should be allowed for
  -- TeletexString.  For UTF8String or UniversalString at least four
  -- times the upper bound should be allowed.

  -- information object classes used in the defintion
  -- of certificates and CRLs
  -- Parameterized Type SIGNED

  -- Three different versions of doing SIGNED
  --  1.  Simple and close to the previous version
  --
  SIGNED{ToBeSigned} ::= SEQUENCE {
    toBeSigned  ToBeSigned,
    algorithm   AlgorithmIdentifier{{SupportedAlgorithms}},
    signature   BIT STRING
  }

  --  2.  From Authenticated Framework
  --
  --  SIGNED{ToBeSigned} ::= SEQUENCE {
  --    toBeSigned        ToBeSigned,
  --    COMPONENTS OF SIGNATUR{ToBeSigned}
  --  }
  --  SIGNATURE{ToBeSigned} ::= SEQUENCE {
  --    algorithmIdentifier   AlgorithmIdentifier,
  --    encrypted             ENCRYPTED-HASH{ToBeSigned}
  --  }
  --  ENCRYPTED-HASH{ToBeSigned} ::=



Hoffman & Schaad        Expires January 11, 2009               [Page 38]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  --    BIT STRING
  --      (CONSTRAINED BY {
  --        shall be the result of applying a hashing procedure to
  --        the DER-encoded (see 6.1) octets of a value of
  --        ToBeSigned and then applying an encipherment procedure
  --        to those octets
  --      })

  --
  --  3.
  --  SIGNED{ToBeSigned} ::= SEQUENCE {
  --     toBeSigned           ToBeSigned,
  --     algorithmIdentifier  SEQUENCE {
  --         algorithm        ALGORITHM.
  --                              &id({SignatureParameters}),
  --         parameters       ALGORITHM.
  --                              &Type({SignatureParameters}
  --                                  {@algorithmIdentifier.algorithm})
  --     }
  --     BIT STRING (CONTAINING ALGORITHM.&Type({SignatureValue}
  --         {@algorithmIdentifier.algorithm})
  --  }

  END


  PKIX1Implicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-implicit(19) }
  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN

  IMPORTS

  Attribute{}, Extensions{}, EXTENSION, ATTRIBUTE
  FROM PKIX-CommonTypes
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) }

  id-pe, id-kp, id-qt-unotice, id-qt-cps, ORAddress, Name,
      RelativeDistinguishedName, CertificateSerialNumber,
      DirectoryString{}, SupportedAttributes
  FROM PKIX1Explicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-explicit(18) };


  CertExtensions EXTENSION ::= {



Hoffman & Schaad        Expires January 11, 2009               [Page 39]


Internet-Draft             New ASN.1 for PKIX                  July 2008


          ext-AuthorityKeyIdentifier | ext-SubjectKeyIdentifier |
          ext-KeyUsage | ext-PrivateKeyUsagePeriod |
          ext-CertificatePolicies | ext-PolicyMappings |
          ext-SubjectAltName | ext-IssuerAltName |
          ext-SubjectDirectoryAttributes |
          ext-BasicConstraints | ext-NameConstraints |
          ext-PolicyConstraints | ext-ExtKeyUsageSyntax |
          ext-CRLDistributionPoints | ext-InhibitAnyPolicy |
          ext-FreshestCRL | ext-AuthorityInfoAccessSyntax |
          ext-SubjectInfoAccessSyntax }

  CrlExtensions EXTENSION ::= {
          ext-AuthorityKeyIdentifier | ext-IssuerAltName |
          ext-CRLNumber | ext-DeltaCRLIndicator |
          ext-IssuingDistributionPoint |  ext-FreshestCRL }

  CrlEntryExtensions EXTENSION ::= {
          ext-CRLReason | ext-CertificateIssuer |
          ext-HoldInstructionCode | ext-InvalidityDate }

  -- ISO arc for standard certificate and CRL extensions

  id-ce OBJECT IDENTIFIER  ::=  {joint-iso-ccitt(2) ds(5) 29}

  -- authority key identifier OID and syntax

  ext-AuthorityKeyIdentifier EXTENSION ::= { SYNTAX
      AuthorityKeyIdentifier IDENTIFIED BY
      id-ce-authorityKeyIdentifier }

  id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::=  { id-ce 35 }

  AuthorityKeyIdentifier ::= SEQUENCE {
      keyIdentifier             [0] KeyIdentifier            OPTIONAL,
      authorityCertIssuer       [1] GeneralNames             OPTIONAL,
      authorityCertSerialNumber [2] CertificateSerialNumber  OPTIONAL }
      -- authorityCertIssuer and authorityCertSerialNumber MUST both
      -- be present or both be absent

  KeyIdentifier ::= OCTET STRING

  -- subject key identifier OID and syntax

  id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::=  { id-ce 14 }

  ext-SubjectKeyIdentifier EXTENSION ::= { SYNTAX
      KeyIdentifier IDENTIFIED BY id-ce-subjectKeyIdentifier }




Hoffman & Schaad        Expires January 11, 2009               [Page 40]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  -- key usage extension OID and syntax

  ext-KeyUsage EXTENSION ::= { SYNTAX
      KeyUsage IDENTIFIED BY id-ce-keyUsage }

  id-ce-keyUsage OBJECT IDENTIFIER ::=  { id-ce 15 }

  KeyUsage ::= BIT STRING {
       digitalSignature        (0),
       nonRepudiation          (1),
       keyEncipherment         (2),
       dataEncipherment        (3),
       keyAgreement            (4),
       keyCertSign             (5),
       cRLSign                 (6),
       encipherOnly            (7),
       decipherOnly            (8) }

  -- private key usage period extension OID and syntax

  ext-PrivateKeyUsagePeriod EXTENSION ::= { SYNTAX
      PrivateKeyUsagePeriod IDENTIFIED BY id-ce-privateKeyUsagePeriod }

  id-ce-privateKeyUsagePeriod OBJECT IDENTIFIER ::=  { id-ce 16 }

  PrivateKeyUsagePeriod ::= SEQUENCE {
       notBefore       [0]     GeneralizedTime OPTIONAL,
       notAfter        [1]     GeneralizedTime OPTIONAL }
       -- either notBefore or notAfter MUST be present

  -- certificate policies extension OID and syntax

  ext-CertificatePolicies EXTENSION ::= { SYNTAX
      CertificatePolicies IDENTIFIED BY id-ce-certificatePolicies}

  id-ce-certificatePolicies OBJECT IDENTIFIER ::=  { id-ce 32 }

  anyPolicy OBJECT IDENTIFIER ::= { id-ce-certificatePolicies 0 }

  CertificatePolicies ::= SEQUENCE SIZE (1..MAX) OF PolicyInformation

  PolicyInformation ::= SEQUENCE {
       policyIdentifier   CertPolicyId,
       policyQualifiers   SEQUENCE SIZE (1..MAX) OF
               PolicyQualifierInfo OPTIONAL }

  CertPolicyId ::= OBJECT IDENTIFIER




Hoffman & Schaad        Expires January 11, 2009               [Page 41]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  POLICY-QUALIFIER-INFO ::= TYPE-IDENTIFIER

  PolicyQualifierInfo ::= SEQUENCE {
         policyQualifierId  POLICY-QUALIFIER-INFO.
              &id({PolicyQualifierId}),
         qualifier          POLICY-QUALIFIER-INFO.
              &Type({PolicyQualifierId}{@policyQualifierId})}

  -- Implementations that recognize additional policy qualifiers MUST
  -- augment the following definition for PolicyQualifierId

  PolicyQualifierId POLICY-QUALIFIER-INFO ::=
      { pqid-cps | pqid-unotice }

  pqid-cps POLICY-QUALIFIER-INFO ::= { CPSuri IDENTIFIED BY id-qt-cps }

  pqid-unotice POLICY-QUALIFIER-INFO ::= { UserNotice
      IDENTIFIED BY id-qt-unotice }

  -- CPS pointer qualifier

  CPSuri ::= IA5String

  -- user notice qualifier

  UserNotice ::= SEQUENCE {
       noticeRef        NoticeReference OPTIONAL,
       explicitText     DisplayText OPTIONAL}

  NoticeReference ::= SEQUENCE {
       organization     DisplayText,
       noticeNumbers    SEQUENCE OF INTEGER }

  DisplayText ::= CHOICE {
       ia5String        IA5String      (SIZE (1..200)),
       visibleString    VisibleString  (SIZE (1..200)),
       bmpString        BMPString      (SIZE (1..200)),
       utf8String       UTF8String     (SIZE (1..200)) }

  -- policy mapping extension OID and syntax

  ext-PolicyMappings EXTENSION ::= { SYNTAX
      PolicyMappings IDENTIFIED BY id-ce-policyMappings }

  id-ce-policyMappings OBJECT IDENTIFIER ::=  { id-ce 33 }

  PolicyMappings ::= SEQUENCE SIZE (1..MAX) OF SEQUENCE {
       issuerDomainPolicy      CertPolicyId,



Hoffman & Schaad        Expires January 11, 2009               [Page 42]


Internet-Draft             New ASN.1 for PKIX                  July 2008


       subjectDomainPolicy     CertPolicyId }

  -- subject alternative name extension OID and syntax

  ext-SubjectAltName EXTENSION ::= { SYNTAX
      GeneralNames IDENTIFIED BY id-ce-subjectAltName }

  id-ce-subjectAltName OBJECT IDENTIFIER ::=  { id-ce 17 }

  GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName

  GeneralName ::= CHOICE {
       otherName                       [0]     INSTANCE OF OTHER-NAME,
       rfc822Name                      [1]     IA5String,
       dNSName                         [2]     IA5String,
       x400Address                     [3]     ORAddress,
       directoryName                   [4]     Name,
       ediPartyName                    [5]     EDIPartyName,
       uniformResourceIdentifier       [6]     IA5String,
       iPAddress                       [7]     OCTET STRING,
       registeredID                    [8]     OBJECT IDENTIFIER }

  -- AnotherName replaces OTHER-NAME ::= TYPE-IDENTIFIER, as
  -- TYPE-IDENTIFIER is not supported in the '88 ASN.1 syntax

  OTHER-NAME ::= TYPE-IDENTIFIER

  EDIPartyName ::= SEQUENCE {
       nameAssigner    [0]     DirectoryString {ubMax} OPTIONAL,
       partyName       [1]     DirectoryString {ubMax} }

  -- issuer alternative name extension OID and syntax

  ext-IssuerAltName EXTENSION ::= { SYNTAX
      GeneralNames IDENTIFIED BY id-ce-issuerAltName }

  id-ce-issuerAltName OBJECT IDENTIFIER ::=  { id-ce 18 }

  ext-SubjectDirectoryAttributes EXTENSION ::= { SYNTAX
      SubjectDirectoryAttributes IDENTIFIED BY
      id-ce-subjectDirectoryAttributes }

  id-ce-subjectDirectoryAttributes OBJECT IDENTIFIER ::=  { id-ce 9 }

  SubjectDirectoryAttributes ::= SEQUENCE SIZE (1..MAX) OF
      Attribute{{SupportedAttributes}}

  -- basic constraints extension OID and syntax



Hoffman & Schaad        Expires January 11, 2009               [Page 43]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  ext-BasicConstraints EXTENSION ::= { SYNTAX
      BasicConstraints IDENTIFIED BY id-ce-basicConstraints }

  id-ce-basicConstraints OBJECT IDENTIFIER ::=  { id-ce 19 }

  BasicConstraints ::= SEQUENCE {
       cA                      BOOLEAN DEFAULT FALSE,
       pathLenConstraint       INTEGER (0..MAX) OPTIONAL }

  -- name constraints extension OID and syntax

  ext-NameConstraints EXTENSION ::= { SYNTAX
      NameConstraints IDENTIFIED BY id-ce-nameConstraints }

  id-ce-nameConstraints OBJECT IDENTIFIER ::=  { id-ce 30 }

  NameConstraints ::= SEQUENCE {
       permittedSubtrees       [0]     GeneralSubtrees OPTIONAL,
       excludedSubtrees        [1]     GeneralSubtrees OPTIONAL }

  GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree

  GeneralSubtree ::= SEQUENCE {
       base                    GeneralName,
       minimum         [0]     BaseDistance DEFAULT 0,
       maximum         [1]     BaseDistance OPTIONAL }

  BaseDistance ::= INTEGER (0..MAX)

  -- policy constraints extension OID and syntax

  ext-PolicyConstraints EXTENSION ::= { SYNTAX
      PolicyConstraints IDENTIFIED BY id-ce-policyConstraints }

  id-ce-policyConstraints OBJECT IDENTIFIER ::=  { id-ce 36 }

  PolicyConstraints ::= SEQUENCE {
       requireExplicitPolicy           [0] SkipCerts OPTIONAL,
       inhibitPolicyMapping            [1] SkipCerts OPTIONAL }

  SkipCerts ::= INTEGER (0..MAX)

  -- CRL distribution points extension OID and syntax

  ext-CRLDistributionPoints EXTENSION ::= { SYNTAX
      CRLDistributionPoints IDENTIFIED BY id-ce-cRLDistributionPoints}

  id-ce-cRLDistributionPoints     OBJECT IDENTIFIER  ::=  {id-ce 31}



Hoffman & Schaad        Expires January 11, 2009               [Page 44]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  CRLDistributionPoints ::= SEQUENCE SIZE (1..MAX) OF DistributionPoint

  DistributionPoint ::= SEQUENCE {
       distributionPoint       [0]     DistributionPointName OPTIONAL,
       reasons                 [1]     ReasonFlags OPTIONAL,
       cRLIssuer               [2]     GeneralNames OPTIONAL }

  DistributionPointName ::= CHOICE {
       fullName                [0]     GeneralNames,
       nameRelativeToCRLIssuer [1]     RelativeDistinguishedName }

  ReasonFlags ::= BIT STRING {
       unused                  (0),
       keyCompromise           (1),
       cACompromise            (2),
       affiliationChanged      (3),
       superseded              (4),
       cessationOfOperation    (5),
       certificateHold         (6),
       privilegeWithdrawn      (7),
       aACompromise            (8) }

  -- extended key usage extension OID and syntax

  ext-ExtKeyUsageSyntax EXTENSION ::= { SYNTAX
      ExtKeyUsageSyntax IDENTIFIED BY id-ce-extKeyUsage }

  id-ce-extKeyUsage OBJECT IDENTIFIER ::= {id-ce 37}

  ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId

  KeyPurposeId ::= OBJECT IDENTIFIER

  -- permit unspecified key uses

  anyExtendedKeyUsage OBJECT IDENTIFIER ::= { id-ce-extKeyUsage 0 }

  -- extended key purpose OIDs

  id-kp-serverAuth             OBJECT IDENTIFIER ::= { id-kp 1 }
  id-kp-clientAuth             OBJECT IDENTIFIER ::= { id-kp 2 }
  id-kp-codeSigning            OBJECT IDENTIFIER ::= { id-kp 3 }
  id-kp-emailProtection        OBJECT IDENTIFIER ::= { id-kp 4 }
  id-kp-timeStamping           OBJECT IDENTIFIER ::= { id-kp 8 }
  id-kp-OCSPSigning            OBJECT IDENTIFIER ::= { id-kp 9 }

  -- inhibit any policy OID and syntax




Hoffman & Schaad        Expires January 11, 2009               [Page 45]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  ext-InhibitAnyPolicy EXTENSION  ::= {SYNTAX
      SkipCerts IDENTIFIED BY id-ce-inhibitAnyPolicy }

  id-ce-inhibitAnyPolicy OBJECT IDENTIFIER ::=  { id-ce 54 }

  -- freshest (delta)CRL extension OID and syntax

  ext-FreshestCRL EXTENSION ::= {SYNTAX
      CRLDistributionPoints IDENTIFIED BY id-ce-freshestCRL }

  id-ce-freshestCRL OBJECT IDENTIFIER ::=  { id-ce 46 }

  -- authority info access

  ext-AuthorityInfoAccessSyntax EXTENSION ::= { SYNTAX
      AuthorityInfoAccessSyntax IDENTIFIED BY
      id-pe-authorityInfoAccess }

  id-pe-authorityInfoAccess OBJECT IDENTIFIER ::= { id-pe 1 }

  AuthorityInfoAccessSyntax  ::=
          SEQUENCE SIZE (1..MAX) OF AccessDescription

  AccessDescription  ::=  SEQUENCE {
          accessMethod          OBJECT IDENTIFIER,
          accessLocation        GeneralName  }

  -- subject info access

  ext-SubjectInfoAccessSyntax EXTENSION ::= { SYNTAX
      SubjectInfoAccessSyntax IDENTIFIED BY id-pe-subjectInfoAccess }

  id-pe-subjectInfoAccess OBJECT IDENTIFIER ::= { id-pe 11 }

  SubjectInfoAccessSyntax  ::=
          SEQUENCE SIZE (1..MAX) OF AccessDescription

  -- CRL number extension OID and syntax

  ext-CRLNumber EXTENSION ::= {SYNTAX
      INTEGER (0..MAX) IDENTIFIED BY id-ce-cRLNumber }

  id-ce-cRLNumber OBJECT IDENTIFIER ::= { id-ce 20 }

  CRLNumber ::= INTEGER (0..MAX)

  -- issuing distribution point extension OID and syntax




Hoffman & Schaad        Expires January 11, 2009               [Page 46]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  ext-IssuingDistributionPoint EXTENSION ::= { SYNTAX
      IssuingDistributionPoint IDENTIFIED BY
      id-ce-issuingDistributionPoint }

  id-ce-issuingDistributionPoint OBJECT IDENTIFIER ::= { id-ce 28 }

  IssuingDistributionPoint ::= SEQUENCE {
       distributionPoint          [0] DistributionPointName OPTIONAL,
       onlyContainsUserCerts      [1] BOOLEAN DEFAULT FALSE,
       onlyContainsCACerts        [2] BOOLEAN DEFAULT FALSE,
       onlySomeReasons            [3] ReasonFlags OPTIONAL,
       indirectCRL                [4] BOOLEAN DEFAULT FALSE,
       onlyContainsAttributeCerts [5] BOOLEAN DEFAULT FALSE }

  ext-DeltaCRLIndicator EXTENSION ::= { SYNTAX
      CRLNumber IDENTIFIED BY id-ce-deltaCRLIndicator }

  id-ce-deltaCRLIndicator OBJECT IDENTIFIER ::= { id-ce 27 }

  -- CRL reasons extension OID and syntax

  ext-CRLReason EXTENSION ::= { SYNTAX
      CRLReason IDENTIFIED BY id-ce-cRLReasons }

  id-ce-cRLReasons OBJECT IDENTIFIER ::= { id-ce 21 }

  CRLReason ::= ENUMERATED {
       unspecified             (0),
       keyCompromise           (1),
       cACompromise            (2),
       affiliationChanged      (3),
       superseded              (4),
       cessationOfOperation    (5),
       certificateHold         (6),
       removeFromCRL           (8),
       privilegeWithdrawn      (9),
       aACompromise           (10) }

  -- certificate issuer CRL entry extension OID and syntax

  ext-CertificateIssuer EXTENSION ::= { SYNTAX
      GeneralNames IDENTIFIED BY id-ce-certificateIssuer }

  id-ce-certificateIssuer OBJECT IDENTIFIER ::= { id-ce 29 }

  -- hold instruction extension OID and syntax

  ext-HoldInstructionCode EXTENSION ::= { SYNTAX



Hoffman & Schaad        Expires January 11, 2009               [Page 47]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      OBJECT IDENTIFIER IDENTIFIED BY id-ce-holdInstructionCode }

  id-ce-holdInstructionCode OBJECT IDENTIFIER ::= { id-ce 23 }

  -- ANSI x9 holdinstructions

  -- ANSI x9 arc holdinstruction arc

  holdInstruction OBJECT IDENTIFIER ::=
            {joint-iso-itu-t(2) member-body(2) us(840) x9cm(10040) 2}

  -- ANSI X9 holdinstructions referenced by this standard

  id-holdinstruction-none OBJECT IDENTIFIER  ::=
                  {holdInstruction 1} -- deprecated

  id-holdinstruction-callissuer OBJECT IDENTIFIER ::=
                  {holdInstruction 2}

  id-holdinstruction-reject OBJECT IDENTIFIER ::=
                  {holdInstruction 3}

  -- invalidity date CRL entry extension OID and syntax

  ext-InvalidityDate EXTENSION  ::=  { SYNTAX
      GeneralizedTime IDENTIFIED BY id-ce-invalidityDate }

  id-ce-invalidityDate OBJECT IDENTIFIER ::= { id-ce 24 }

  ubMax INTEGER ::= 32768

  END




8.  ASN.1 Module for RFC 3281

  PKIXAttributeCertificate
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-attribute-cert(12)}
  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN

  IMPORTS

  Attribute{}, AlgorithmIdentifier{}, Extensions{}, EXTENSION, ATTRIBUTE
  FROM PKIX-CommonTypes



Hoffman & Schaad        Expires January 11, 2009               [Page 48]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) }

  CertificateSerialNumber, UniqueIdentifier, id-pkix, id-pe, id-kp,
      id-ad, id-at, SIGNED{}
  FROM PKIX1Explicit88
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-explicit(18)}

  GeneralName, GeneralNames, id-ce, AuthorityKeyIdentifier,
      AuthorityInfoAccessSyntax, CRLDistributionPoints
  FROM PKIX1Implicit88
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-implicit(19)} ;


  AttributeCertExtensions EXTENSION ::= {
      auditIdentity | targetInformation | ce-authorityKeyIdentifier |
      ce-authorityInfoAccess | ce-cRLDistributionPoints | ce-noRevAvail
      | pe-ac-proxying | pe-aaControls }

  auditIdentity EXTENSION ::= { SYNTAX
      OCTET STRING IDENTIFIED BY id-pe-ac-auditIdentity}

  targetInformation EXTENSION ::= { SYNTAX
      Targets IDENTIFIED BY id-ce-targetInformation }

  ce-authorityKeyIdentifier EXTENSION ::= { SYNTAX
      AuthorityKeyIdentifier IDENTIFIED BY
      id-ce-authorityKeyIdentifier }

  ce-authorityInfoAccess EXTENSION ::= { SYNTAX
      AuthorityInfoAccessSyntax
      IDENTIFIED BY id-ce-authorityInfoAccess}

  ce-cRLDistributionPoints EXTENSION ::= { SYNTAX
      CRLDistPointsSyntax IDENTIFIED BY id-ce-cRLDistributionPoints }

  ce-noRevAvail EXTENSION ::= { SYNTAX
      NULL IDENTIFIED BY id-ce-noRevAvail}

  pe-ac-proxying EXTENSION ::= { SYNTAX
      ProxyInfo IDENTIFIED BY id-pe-ac-proxying}

  pe-aaControls EXTENSION ::= { SYNTAX
      AAControls IDENTIFIED BY id-pe-aaControls}

  -- Another way to do the following might be:



Hoffman & Schaad        Expires January 11, 2009               [Page 49]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  AttributesDefined ATTRIBUTE ::= { ... , aca-authenticationInfo |
       aca-accesIdentity | aca-chargingIdentity | aca-group |
       at-role | at-clearance | aca-encAttrs }

  aca-authenticationInfo ATTRIBUTE ::= { TYPE SvceAuthInfo
      IDENTIFIED BY id-aca-authenticationInfo}

  aca-accesIdentity ATTRIBUTE ::= { TYPE SvceAuthInfo
      IDENTIFIED BY id-aca-accessIdentity}

  aca-chargingIdentity ATTRIBUTE ::= { TYPE IetfAttrSyntax
      IDENTIFIED BY id-aca-chargingIdentity}

  aca-group ATTRIBUTE ::= { TYPE IetfAttrSyntax
      IDENTIFIED BY id-aca-group}

  at-role ATTRIBUTE ::= { TYPE RoleSyntax
      IDENTIFIED BY id-at-role}

  at-clearance ATTRIBUTE ::= { TYPE Clearance
      IDENTIFIED BY id-at-clearance}

  aca-encAttrs ATTRIBUTE ::= { TYPE ContentInfo
      IDENTIFIED BY id-aca-encAttrs}

  id-ce-authorityInfoAccess    OBJECT IDENTIFIER ::= { id-pe 1 }
  id-pe-ac-auditIdentity       OBJECT IDENTIFIER ::= { id-pe 4 }
  id-pe-aaControls             OBJECT IDENTIFIER ::= { id-pe 6 }
  id-pe-ac-proxying            OBJECT IDENTIFIER ::= { id-pe 10 }
  id-ce-cRLDistributionPoints  OBJECT IDENTIFIER ::= { id-ce 31 }
  id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 35 }
  id-ce-targetInformation      OBJECT IDENTIFIER ::= { id-ce 55 }
  id-ce-noRevAvail             OBJECT IDENTIFIER ::= { id-ce 56 }

  id-aca                       OBJECT IDENTIFIER ::= { id-pkix 10 }

  id-aca-authenticationInfo    OBJECT IDENTIFIER ::= { id-aca 1 }
  id-aca-accessIdentity        OBJECT IDENTIFIER ::= { id-aca 2 }
  id-aca-chargingIdentity      OBJECT IDENTIFIER ::= { id-aca 3 }
  id-aca-group                 OBJECT IDENTIFIER ::= { id-aca 4 }
  -- { id-aca 5 } is reserved
  id-aca-encAttrs              OBJECT IDENTIFIER ::= { id-aca 6 }

  id-at-role                   OBJECT IDENTIFIER ::= { id-at 72}
  id-at-clearance              OBJECT IDENTIFIER ::=
             { joint-iso-ccitt(2) ds(5) module(1)
               selected-attribute-types(5) clearance (55) }




Hoffman & Schaad        Expires January 11, 2009               [Page 50]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  AttributeCertificate ::= SIGNED{AttributeCertificateInfo}

  AttributeCertificateInfo ::= SEQUENCE {
      version        AttCertVersion,  -- version is v2,
      holder         Holder,
      issuer         AttCertIssuer,
      signature      AlgorithmIdentifier{{...}},
      serialNumber   CertificateSerialNumber,
      attrCertValidityPeriod   AttCertValidityPeriod,
      attributes     SEQUENCE SIZE (1..MAX) OF
                         Attribute{{AttributesDefined}},
      issuerUniqueID UniqueIdentifier OPTIONAL,
      extensions     Extensions{{AttributeCertExtensions}} OPTIONAL
  }

  AttCertVersion ::= INTEGER { v2(1) }

  Holder ::= SEQUENCE {
      baseCertificateID   [0] IssuerSerial OPTIONAL,
                -- the issuer and serial number of
                -- the holder's Public Key Certificate
      entityName          [1] GeneralNames OPTIONAL,
                -- the name of the claimant or role
      objectDigestInfo    [2] ObjectDigestInfo OPTIONAL
                -- used to directly authenticate the
                -- holder, for example, an executable
  }

  ObjectDigestInfo    ::= SEQUENCE {
      digestedObjectType  ENUMERATED {
           publicKey            (0),
           publicKeyCert        (1),
           otherObjectTypes     (2) },
                   -- otherObjectTypes MUST NOT
                   -- MUST NOT be used in this profile
      otherObjectTypeID   OBJECT IDENTIFIER  OPTIONAL,
      digestAlgorithm     AlgorithmIdentifier{{...}},
      objectDigest        BIT STRING
  }

  AttCertIssuer ::= CHOICE {
      v1Form   GeneralNames,  -- MUST NOT be used in this
                              -- profile
      v2Form   [0] V2Form     -- v2 only
  }

  V2Form ::= SEQUENCE {
      issuerName            GeneralNames  OPTIONAL,



Hoffman & Schaad        Expires January 11, 2009               [Page 51]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      baseCertificateID     [0] IssuerSerial  OPTIONAL,
      objectDigestInfo      [1] ObjectDigestInfo  OPTIONAL
         -- issuerName MUST be present in this profile
         -- baseCertificateID and objectDigestInfo MUST
         -- NOT be present in this profile
  }

  IssuerSerial  ::=  SEQUENCE {
      issuer         GeneralNames,
      serial         CertificateSerialNumber,
      issuerUID      UniqueIdentifier OPTIONAL
  }

  AttCertValidityPeriod  ::= SEQUENCE {
      notBeforeTime  GeneralizedTime,
      notAfterTime   GeneralizedTime
  }

  Targets ::= SEQUENCE OF Target

  Target  ::= CHOICE {
      targetName     [0] GeneralName,
      targetGroup    [1] GeneralName,
      targetCert     [2] TargetCert
  }

  TargetCert  ::= SEQUENCE {
      targetCertificate  IssuerSerial,
      targetName         GeneralName OPTIONAL,
      certDigestInfo     ObjectDigestInfo OPTIONAL
  }

  IetfAttrSyntax ::= SEQUENCE {
     policyAuthority[0] GeneralNames    OPTIONAL,
     values         SEQUENCE OF CHOICE {
                    octets    OCTET STRING,
                    oid       OBJECT IDENTIFIER,
                    string    UTF8String
    }
  }

  SvceAuthInfo ::=    SEQUENCE {
      service       GeneralName,
      ident         GeneralName,
      authInfo      OCTET STRING OPTIONAL
  }

  RoleSyntax ::= SEQUENCE {



Hoffman & Schaad        Expires January 11, 2009               [Page 52]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      roleAuthority  [0] GeneralNames OPTIONAL,
      roleName       [1] GeneralName
  }

  Clearance  ::=  SEQUENCE {
      policyId       [0] OBJECT IDENTIFIER,
      classList      [1] ClassList DEFAULT {unclassified},
      securityCategories
                     [2] SET OF SecurityCategory  OPTIONAL
  }

  ClassList  ::=  BIT STRING {
      unmarked       (0),
      unclassified   (1),
      restricted     (2),
      confidential   (3),
      secret         (4),
      topSecret      (5)
  }

  SECURITY-CATEGORY ::= TYPE-IDENTIFIER

  SecurityCategory ::= SEQUENCE {
      type      [0]  IMPLICIT SECURITY-CATEGORY.
              &id({SupportedSecurityCategories}),
      value     [1]  SECURITY-CATEGORY.
              &Type({SupportedSecurityCategories}{@type})
  }

  SupportedSecurityCategories SECURITY-CATEGORY ::= { ... }

  AAControls ::= SEQUENCE {
      pathLenConstraint INTEGER (0..MAX) OPTIONAL,
      permittedAttrs    [0] AttrSpec OPTIONAL,
      excludedAttrs     [1] AttrSpec OPTIONAL,
      permitUnSpecified BOOLEAN DEFAULT TRUE
  }

  AttrSpec::= SEQUENCE OF OBJECT IDENTIFIER

  ACClearAttrs ::= SEQUENCE {
      acIssuer          GeneralName,
      acSerial          INTEGER,
      attrs             SEQUENCE OF Attribute{{AttributesDefined}}
  }

  ProxyInfo ::= SEQUENCE OF Targets




Hoffman & Schaad        Expires January 11, 2009               [Page 53]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  CRLDistPointsSyntax ::= CRLDistributionPoints

  ContentInfo ::= INTEGER

  END



9.  ASN.1 Module for RFC 3852 (Attribute Certificate v1)

  AttributeCertificateVersion1
      { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
      smime(16) modules(0) v1AttrCert(15) }
  DEFINITIONS EXPLICIT TAGS ::=
  BEGIN

  IMPORTS

  Attribute{}, AlgorithmIdentifier{}, Extensions{}, EXTENSION,
      ATTRIBUTE, ALGORITHM
  FROM PKIX-CommonTypes
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) }

  CertificateSerialNumber, UniqueIdentifier
  FROM PKIX1Explicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-explicit(18) }

  GeneralNames
  FROM PKIX1Implicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-implicit(19) }

  AttCertValidityPeriod, IssuerSerial
  FROM PKIXAttributeCertificate
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-attribute-cert(12) } ;


  AttributeCertExtensionsV1 EXTENSION ::= {...}

  -- Definition extracted from X.509-1997 [X.509-97], but
  -- different type names are used to avoid collisions.

  AttributeCertificateV1 ::= SEQUENCE {
      acInfo AttributeCertificateInfoV1,
      signatureAlgorithm AlgorithmIdentifier{{...}},



Hoffman & Schaad        Expires January 11, 2009               [Page 54]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      signature BIT STRING }

  AttributeCertificateInfoV1 ::= SEQUENCE {
      version AttCertVersionV1 DEFAULT v1,
      subject CHOICE {
     baseCertificateID [0] IssuerSerial,
       -- associated with a Public Key Certificate
     subjectName [1] GeneralNames },
       -- associated with a name
      issuer GeneralNames,
      signature AlgorithmIdentifier{{...}},
      serialNumber CertificateSerialNumber,
      attCertValidityPeriod AttCertValidityPeriod,
      attributes SEQUENCE OF Attribute{{AttrList}},
      issuerUniqueID UniqueIdentifier OPTIONAL,
      extensions Extensions{{AttributeCertExtensionsV1}} OPTIONAL }

  AttCertVersionV1 ::= INTEGER { v1(0) }

  AttrList ATTRIBUTE ::= {...}


  END



10.  ASN.1 Module for RFC 4055

   PKIX1-PSS-OAEP-Algorithms
        { iso(1) identified-organization(3) dod(6)
          internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
          id-mod-pkix1-rsa-pkalgs(33) }
   DEFINITIONS EXPLICIT TAGS ::=
   BEGIN

   IMPORTS
   AlgorithmIdentifier{}, ALGORITHM
   FROM PKIX-CommonTypes
       {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) };


   --  Public Key Parameters

   --  Public Key Value
   pkpubkey-RSA ALGORITHM ::=
       { OID rsaEncryption PARAMS RSAPublicKey }




Hoffman & Schaad        Expires January 11, 2009               [Page 55]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   --  Signature Parameters
   pkparam-RSASSA-PSS ALGORITHM ::=
       { OID id-RSASSA-PSS PARAMS RSASSA-PSS-params }

   --  Signature Value

   --  Enveloped Key Parameters
   pkparam-RSAES-OAEP ALGORITHM ::=
       { OID id-RSAES-OAEP PARAMS RSAES-OAEP-params }

   --  Enveloped Key Value


   -- ============================
   --   Basic object identifiers
   -- ============================

   pkcs-1  OBJECT IDENTIFIER  ::=
       { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 }

   -- When rsaEncryption is used in an AlgorithmIdentifier the
   -- parameters MUST be present and MUST be NULL.

   rsaEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 1 }

   -- When id-RSAES-OAEP is used in an AlgorithmIdentifier,
   -- and the parameters field is present, it MUST be
   -- RSAES-OAEP-params

   id-RSAES-OAEP  OBJECT IDENTIFIER  ::=  { pkcs-1 7 }

   -- When id-mgf1 is used in an AlgorithmIdentifier the parameters
   -- MUST be present and MUST be a HashAlgorithm.

   id-mgf1  OBJECT IDENTIFIER  ::=  { pkcs-1 8 }

   -- When id-pSpecified is used in an AlgorithmIdentifier the
   -- parameters MUST be an OCTET STRING.

   id-pSpecified  OBJECT IDENTIFIER  ::=  { pkcs-1 9 }

   -- When id-RSASSA-PSS is used in an AlgorithmIdentifier, and the
   -- parameters field is present, it MUST be RSASSA-PSS-params.

   id-RSASSA-PSS  OBJECT IDENTIFIER  ::=  { pkcs-1 10 }

   -- When the following OIDs are used in an AlgorithmIdentifier the
   -- parameters SHOULD be absent, but if the parameters are present,



Hoffman & Schaad        Expires January 11, 2009               [Page 56]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   -- they MUST be NULL.

   id-sha1  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) oiw(14) secsig(3)
       algorithms(2) 26 }

   id-sha224  OBJECT IDENTIFIER  ::=
       { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
       csor(3) nistalgorithm(4) hashalgs(2) 4 }

   id-sha256  OBJECT IDENTIFIER  ::=
       { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
       csor(3) nistalgorithm(4) hashalgs(2) 1 }

   id-sha384  OBJECT IDENTIFIER  ::=
       { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
       csor(3) nistalgorithm(4) hashalgs(2) 2 }

   id-sha512  OBJECT IDENTIFIER  ::=
       { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)
       csor(3) nistalgorithm(4) hashalgs(2) 3 }

   -- =============
   --   Constants
   -- =============

   EncodingParameters ::= OCTET STRING(SIZE(0..MAX))

   nullOctetString  EncodingParameters  ::=  ''H

   nullParameters NULL  ::=  NULL

   -- =========================
   --   Algorithm Identifiers
   -- =========================

   HashAlgorithms ALGORITHM ::=  {
       { OID id-sha1 PARAMS NULL  } |
       { OID id-sha224 PARAMS NULL  } |
       { OID id-sha256 PARAMS NULL  } |
       { OID id-sha384 PARAMS NULL  } |
       { OID id-sha512 PARAMS NULL  }
   }

   sha1Identifier HashAlgorithm ::= {
       algorithm id-sha1,
       parameters NULL : NULL
    }



Hoffman & Schaad        Expires January 11, 2009               [Page 57]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   --
   --  We have a default algorithm - create the value here
   --

   mgf1SHA1 MaskGenAlgorithm ::= {
       algorithm id-mgf1,
       parameters HashAlgorithm : sha1Identifier
   }

   --
   --  Define the set of mask generation fucntions
   --
   --  If the identifier is id-mgf1, any of the listed hash
   --    algorithms may be used.
   --

   PKCS1MGFAlgorithms ALGORITHM ::= {
       { OID id-mgf1 PARAMS HashAlgorithm },
       ...
   }

   --
   -- Define the set of known source algorithms for PSS
   --

   PSourceAlgorithm ::= AlgorithmIdentifier{{PSS-SourceAlgorithms}}

   PSS-SourceAlgorithms ALGORITHM ::= {
       { OID id-pSpecified PARAMS EncodingParameters },
       ...
   }

   pSpecifiedEmpty PSourceAlgorithm ::=  {
       algorithm id-pSpecified,
       parameters EncodingParameters : nullOctetString
   }

   -- ===================
   --   Main structures
   -- ===================

   -- Used in SubjectPublicKeyInfo of X.509 Certificate.

   RSAPublicKey  ::=  SEQUENCE  {
       modulus           INTEGER,    -- n
       publicExponent    INTEGER  }  -- e

   -- AlgorithmIdentifier parameters for id-RSASSA-PSS.



Hoffman & Schaad        Expires January 11, 2009               [Page 58]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   -- Note that the tags in this Sequence are explicit.
   -- Note The hash algorithm in hashAlgorithm and in
   -- maskGenAlgorithm should be the same.

   RSASSA-PSS-params  ::=  SEQUENCE  {
       hashAlgorithm     [0] HashAlgorithm DEFAULT sha1Identifier,
       maskGenAlgorithm  [1] MaskGenAlgorithm DEFAULT mgf1SHA1,
       saltLength        [2] INTEGER DEFAULT 20,
       trailerField      [3] INTEGER DEFAULT 1
   }

   HashAlgorithm  ::=  AlgorithmIdentifier{{HashAlgorithms}}

   MaskGenAlgorithm  ::=  AlgorithmIdentifier{{PKCS1MGFAlgorithms}}

   -- AlgorithmIdentifier parameters for id-RSAES-OAEP.
   -- Note that the tags in this Sequence are explicit.
   -- Note:  The hash algorithm in hashFunc and in
   -- maskGenFunc should be the same

   RSAES-OAEP-params  ::=  SEQUENCE  {
       hashFunc          [0] HashAlgorithm DEFAULT sha1Identifier,
       maskGenFunc       [1] MaskGenAlgorithm DEFAULT mgf1SHA1,
       pSourceFunc       [2] PSourceAlgorithm DEFAULT
                                 pSpecifiedEmpty
   }

   END



11.  ASN.1 Module for RFC 4210

  PKIXCMP
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-cmp2000(16) }
  DEFINITIONS EXPLICIT TAGS ::=
  BEGIN

  IMPORTS

  Attribute{}, AlgorithmIdentifier{}, Extensions{}, EXTENSION,
      ATTRIBUTE, ALGORITHM
  FROM PKIX-CommonTypes
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) }

  Certificate, CertificateList



Hoffman & Schaad        Expires January 11, 2009               [Page 59]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  FROM PKIX1Explicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-explicit(18) }

  GeneralName, KeyIdentifier
  FROM PKIX1Implicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-implicit(19) }

  CertTemplate, PKIPublicationInfo, EncryptedValue, CertId,
       CertReqMessages
  FROM PKIXCRMF-2005
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-crmf2005(36) }
  -- see also the behavioral clarifications to CRMF codified in
  -- Appendix C of this specification

  CertificationRequest
  FROM PKCS-10
      { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-10(10)
      modules(1) pkcs-10(1) };
  -- (specified in RFC 2986 with 1993 ASN.1 syntax and IMPLICIT
  -- tags).  Alternatively, implementers may directly include
  -- the [PKCS10] syntax in this module


  -- the rest of the module contains locally-defined OIDs and
  -- constructs

  CMPCertificate ::= CHOICE { x509v3PKCert Certificate, ... }
  -- This syntax, while bits-on-the-wire compatible with the
  -- standard X.509 definition of "Certificate", allows the
  -- possibility of future certificate types (such as X.509
  -- attribute certificates, WAP WTLS certificates, or other kinds
  -- of certificates) within this certificate management protocol,
  -- should a need ever arise to support such generality.  Those
  -- implementations that do not foresee a need to ever support
  -- other certificate types MAY, if they wish, comment out the
  -- above structure and "un-comment" the following one prior to
  -- compiling this ASN.1 module.  (Note that interoperability
  -- with implementations that don't do this will be unaffected by
  -- this change.)

  -- CMPCertificate ::= Certificate

  PKIMessage ::= SEQUENCE {
      header           PKIHeader,
      body             PKIBody,



Hoffman & Schaad        Expires January 11, 2009               [Page 60]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      protection   [0] PKIProtection OPTIONAL,
      extraCerts   [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
                    OPTIONAL }

  PKIMessages ::= SEQUENCE SIZE (1..MAX) OF PKIMessage

  PKIHeader ::= SEQUENCE {
      pvno                INTEGER     { cmp1999(1), cmp2000(2) },
      sender              GeneralName,
      -- identifies the sender
      recipient           GeneralName,
      -- identifies the intended recipient
      messageTime     [0] GeneralizedTime         OPTIONAL,
      -- time of production of this message (used when sender
      -- believes that the transport will be "suitable"; i.e.,
      -- that the time will still be meaningful upon receipt)
      protectionAlg   [1] AlgorithmIdentifier{{...}}     OPTIONAL,
      -- algorithm used for calculation of protection bits
      senderKID       [2] KeyIdentifier           OPTIONAL,
      recipKID        [3] KeyIdentifier           OPTIONAL,
      -- to identify specific keys used for protection
      transactionID   [4] OCTET STRING            OPTIONAL,
      -- identifies the transaction; i.e., this will be the same in
      -- corresponding request, response, certConf, and PKIConf
      -- messages
      senderNonce     [5] OCTET STRING            OPTIONAL,
      recipNonce      [6] OCTET STRING            OPTIONAL,
      -- nonces used to provide replay protection, senderNonce
      -- is inserted by the creator of this message; recipNonce
      -- is a nonce previously inserted in a related message by
      -- the intended recipient of this message
      freeText        [7] PKIFreeText             OPTIONAL,
      -- this may be used to indicate context-specific instructions
      -- (this field is intended for human consumption)
      generalInfo     [8] SEQUENCE SIZE (1..MAX) OF
                          InfoTypeAndValue     OPTIONAL
      -- this may be used to convey context-specific information
      -- (this field not primarily intended for human consumption)
  }

  PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
      -- text encoded as UTF-8 String [RFC3629] (note: each
      -- UTF8String MAY include an [RFC3066] language tag
      -- to indicate the language of the contained text
      -- see [RFC2482] for details)

  PKIBody ::= CHOICE {       -- message-specific body elements
      ir       [0]  CertReqMessages,        --Initialization Request



Hoffman & Schaad        Expires January 11, 2009               [Page 61]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      ip       [1]  CertRepMessage,         --Initialization Response
      cr       [2]  CertReqMessages,        --Certification Request
      cp       [3]  CertRepMessage,         --Certification Response
      p10cr    [4]  CertificationRequest,   --imported from [PKCS10]
      popdecc  [5]  POPODecKeyChallContent, --pop Challenge
      popdecr  [6]  POPODecKeyRespContent,  --pop Response
      kur      [7]  CertReqMessages,        --Key Update Request
      kup      [8]  CertRepMessage,         --Key Update Response
      krr      [9]  CertReqMessages,        --Key Recovery Request
      krp      [10] KeyRecRepContent,       --Key Recovery Response
      rr       [11] RevReqContent,          --Revocation Request
      rp       [12] RevRepContent,          --Revocation Response
      ccr      [13] CertReqMessages,        --Cross-Cert. Request
      ccp      [14] CertRepMessage,         --Cross-Cert. Response
      ckuann   [15] CAKeyUpdAnnContent,     --CA Key Update Ann.
      cann     [16] CertAnnContent,         --Certificate Ann.
      rann     [17] RevAnnContent,          --Revocation Ann.
      crlann   [18] CRLAnnContent,          --CRL Announcement
      pkiconf  [19] PKIConfirmContent,      --Confirmation
      nested   [20] NestedMessageContent,   --Nested Message
      genm     [21] GenMsgContent,          --General Message
      genp     [22] GenRepContent,          --General Response
      error    [23] ErrorMsgContent,        --Error Message
      certConf [24] CertConfirmContent,     --Certificate confirm
      pollReq  [25] PollReqContent,         --Polling request
      pollRep  [26] PollRepContent          --Polling response
  }

  PKIProtection ::= BIT STRING

  ProtectedPart ::= SEQUENCE {
      header    PKIHeader,
      body      PKIBody }

  id-PasswordBasedMac OBJECT IDENTIFIER ::= { 1 2 840 113533 7 66 13 }
  PBMParameter ::= SEQUENCE {
      salt                OCTET STRING,
      -- note:  implementations MAY wish to limit acceptable sizes
      -- of this string to values appropriate for their environment
      -- in order to reduce the risk of denial-of-service attacks
      owf                 AlgorithmIdentifier{{...}},
      -- AlgId for a One-Way Function (SHA-1 recommended)
      iterationCount      INTEGER,
      -- number of times the OWF is applied
      -- note:  implementations MAY wish to limit acceptable sizes
      -- of this integer to values appropriate for their environment
      -- in order to reduce the risk of denial-of-service attacks
      mac                 AlgorithmIdentifier{{...}}



Hoffman & Schaad        Expires January 11, 2009               [Page 62]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
      -- or HMAC [RFC2104, RFC2202])
  }

  id-DHBasedMac OBJECT IDENTIFIER ::= { 1 2 840 113533 7 66 30 }
  DHBMParameter ::= SEQUENCE {
      owf                 AlgorithmIdentifier{{...}},
      -- AlgId for a One-Way Function (SHA-1 recommended)
      mac                 AlgorithmIdentifier{{...}}
      -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
      -- or HMAC [RFC2104, RFC2202])
  }

  NestedMessageContent ::= PKIMessages

  PKIStatus ::= INTEGER {
      accepted                (0),
      -- you got exactly what you asked for
      grantedWithMods        (1),
      -- you got something like what you asked for; the
      -- requester is responsible for ascertaining the differences
      rejection              (2),
      -- you don't get it, more information elsewhere in the message
      waiting                (3),
      -- the request body part has not yet been processed; expect to
      -- hear more later (note: proper handling of this status
      -- response MAY use the polling req/rep PKIMessages specified
      -- in Section 5.3.22; alternatively, polling in the underlying
      -- transport layer MAY have some utility in this regard)
      revocationWarning      (4),
      -- this message contains a warning that a revocation is
      -- imminent
      revocationNotification (5),
      -- notification that a revocation has occurred
      keyUpdateWarning       (6)
      -- update already done for the oldCertId specified in
      -- CertReqMsg
  }

  PKIFailureInfo ::= BIT STRING {
  -- since we can fail in more than one way!
  -- More codes may be added in the future if/when required.
      badAlg              (0),
      -- unrecognized or unsupported Algorithm Identifier
      badMessageCheck     (1),
      -- integrity check failed (e.g., signature did not verify)
      badRequest          (2),
      -- transaction not permitted or supported



Hoffman & Schaad        Expires January 11, 2009               [Page 63]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      badTime             (3),
      -- messageTime was not sufficiently close to the system time,
      -- as defined by local policy
      badCertId           (4),
      -- no certificate could be found matching the provided criteria
      badDataFormat       (5),
      -- the data submitted has the wrong format
      wrongAuthority      (6),
      -- the authority indicated in the request is different from the
      -- one creating the response token
      incorrectData       (7),
      -- the requester's data is incorrect (for notary services)
      missingTimeStamp    (8),
      -- when the timestamp is missing but should be there
      -- (by policy)
      badPOP              (9),
      -- the proof-of-possession failed
      certRevoked         (10),
      -- the certificate has already been revoked
      certConfirmed       (11),
      -- the certificate has already been confirmed
      wrongIntegrity      (12),
      -- invalid integrity, password based instead of signature or
      -- vice versa
      badRecipientNonce   (13),
      -- invalid recipient nonce, either missing or wrong value
      timeNotAvailable    (14),
      -- the TSA's time source is not available
      unacceptedPolicy    (15),
      -- the requested TSA policy is not supported by the TSA.
      unacceptedExtension (16),
      -- the requested extension is not supported by the TSA.
      addInfoNotAvailable (17),
      -- the additional information requested could not be
      -- understood or is not available
      badSenderNonce      (18),
      -- invalid sender nonce, either missing or wrong size
      badCertTemplate     (19),
      -- invalid cert. template or missing mandatory information
      signerNotTrusted    (20),
      -- signer of the message unknown or not trusted
      transactionIdInUse  (21),
      -- the transaction identifier is already in use
      unsupportedVersion  (22),
      -- the version of the message is not supported
      notAuthorized       (23),
      -- the sender was not authorized to make the preceding
      -- request or perform the preceding action



Hoffman & Schaad        Expires January 11, 2009               [Page 64]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      systemUnavail       (24),
      -- the request cannot be handled due to system unavailability
      systemFailure       (25),
      -- the request cannot be handled due to system failure
      duplicateCertReq    (26)
      -- certificate cannot be issued because a duplicate
      -- certificate already exists
  }

  PKIStatusInfo ::= SEQUENCE {
      status        PKIStatus,
      statusString  PKIFreeText     OPTIONAL,
      failInfo      PKIFailureInfo  OPTIONAL }

  OOBCert ::= CMPCertificate

  OOBCertHash ::= SEQUENCE {
      hashAlg     [0] AlgorithmIdentifier{{...}}     OPTIONAL,
      certId      [1] CertId                  OPTIONAL,
      hashVal         BIT STRING
      -- hashVal is calculated over the DER encoding of the
      -- self-signed certificate with the identifier certID.
  }

  POPODecKeyChallContent ::= SEQUENCE OF Challenge
  -- One Challenge per encryption key certification request (in the
  -- same order as these requests appear in CertReqMessages).

  Challenge ::= SEQUENCE {
      owf                 AlgorithmIdentifier{{...}}  OPTIONAL,
      -- MUST be present in the first Challenge; MAY be omitted in
      -- any subsequent Challenge in POPODecKeyChallContent (if
      -- omitted, then the owf used in the immediately preceding
      -- Challenge is to be used).
      witness             OCTET STRING,
      -- the result of applying the one-way function (owf) to a
      -- randomly-generated INTEGER, A.  [Note that a different
      -- INTEGER MUST be used for each Challenge.]
      challenge           OCTET STRING
      -- the encryption (under the public key for which the cert.
      -- request is being made) of Rand, where Rand is specified as
      --   Rand ::= SEQUENCE {
      --      int      INTEGER,
      --       - the randomly-generated INTEGER A (above)
      --      sender   GeneralName
      --       - the sender's name (as included in PKIHeader)
      --   }
  }



Hoffman & Schaad        Expires January 11, 2009               [Page 65]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  POPODecKeyRespContent ::= SEQUENCE OF INTEGER
  -- One INTEGER per encryption key certification request (in the
  -- same order as these requests appear in CertReqMessages).  The
  -- retrieved INTEGER A (above) is returned to the sender of the
  -- corresponding Challenge.

  CertRepMessage ::= SEQUENCE {
      caPubs       [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
                    OPTIONAL,
      response         SEQUENCE OF CertResponse }

  CertResponse ::= SEQUENCE {
      certReqId           INTEGER,
      -- to match this response with corresponding request (a value
      -- of -1 is to be used if certReqId is not specified in the
      -- corresponding request)
      status              PKIStatusInfo,
      certifiedKeyPair    CertifiedKeyPair    OPTIONAL,
      rspInfo             OCTET STRING        OPTIONAL
      -- analogous to the id-regInfo-utf8Pairs string defined
      -- for regInfo in CertReqMsg [CRMF]
  }

  CertifiedKeyPair ::= SEQUENCE {
      certOrEncCert       CertOrEncCert,
      privateKey      [0] EncryptedValue      OPTIONAL,
      -- see [CRMF] for comment on encoding
      publicationInfo [1] PKIPublicationInfo  OPTIONAL }

  CertOrEncCert ::= CHOICE {
      certificate     [0] CMPCertificate,
      encryptedCert   [1] EncryptedValue }

  KeyRecRepContent ::= SEQUENCE {
      status                  PKIStatusInfo,
      newSigCert          [0] CMPCertificate OPTIONAL,
      caCerts             [1] SEQUENCE SIZE (1..MAX) OF
                                       CMPCertificate OPTIONAL,
      keyPairHist         [2] SEQUENCE SIZE (1..MAX) OF
                                       CertifiedKeyPair OPTIONAL }

  RevReqContent ::= SEQUENCE OF RevDetails

  RevDetails ::= SEQUENCE {
      certDetails         CertTemplate,
      -- allows requester to specify as much as they can about
      -- the cert. for which revocation is requested
      -- (e.g., for cases in which serialNumber is not available)



Hoffman & Schaad        Expires January 11, 2009               [Page 66]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      crlEntryDetails     Extensions{{...}}    OPTIONAL
      -- requested crlEntryExtensions
  }

  RevRepContent ::= SEQUENCE {
      status       SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
      -- in same order as was sent in RevReqContent
      revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId
                                       OPTIONAL,
      -- IDs for which revocation was requested
      -- (same order as status)
      crls     [1] SEQUENCE SIZE (1..MAX) OF CertificateList
                                       OPTIONAL
      -- the resulting CRLs (there may be more than one)
  }

  CAKeyUpdAnnContent ::= SEQUENCE {
      oldWithNew   CMPCertificate, -- old pub signed with new priv
      newWithOld   CMPCertificate, -- new pub signed with old priv
      newWithNew   CMPCertificate  -- new pub signed with new priv
  }

  CertAnnContent ::= CMPCertificate

  RevAnnContent ::= SEQUENCE {
      status              PKIStatus,
      certId              CertId,
      willBeRevokedAt     GeneralizedTime,
      badSinceDate        GeneralizedTime,
      crlDetails          Extensions{{...}}  OPTIONAL
      -- extra CRL details (e.g., crl number, reason, location, etc.)
  }

  CRLAnnContent ::= SEQUENCE OF CertificateList

  CertConfirmContent ::= SEQUENCE OF CertStatus

  CertStatus ::= SEQUENCE {
      certHash    OCTET STRING,
      -- the hash of the certificate, using the same hash algorithm
      -- as is used to create and verify the certificate signature
      certReqId   INTEGER,
      -- to match this confirmation with the corresponding req/rep
      statusInfo  PKIStatusInfo OPTIONAL }

  PKIConfirmContent ::= NULL

  INFO-TYPE-AND-VALUE ::= TYPE-IDENTIFIER



Hoffman & Schaad        Expires January 11, 2009               [Page 67]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  InfoTypeAndValue ::= SEQUENCE {
      infoType    INFO-TYPE-AND-VALUE.
                      &id({SupportedInfoSet}),
      infoValue   INFO-TYPE-AND-VALUE.
                      &Type({SupportedInfoSet}{@infoType}) }

  SupportedInfoSet INFO-TYPE-AND-VALUE ::= { ... }

  -- Example InfoTypeAndValue contents include, but are not limited
  -- to, the following (un-comment in this ASN.1 module and use as
  -- appropriate for a given environment):
  --
  --   id-it-caProtEncCert    OBJECT IDENTIFIER ::= {id-it 1}
  --      CAProtEncCertValue      ::= CMPCertificate
  --   id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2}
  --      SignKeyPairTypesValue   ::= SEQUENCE OF
  --                                      AlgorithmIdentifier{{...}}
  --   id-it-encKeyPairTypes  OBJECT IDENTIFIER ::= {id-it 3}
  --      EncKeyPairTypesValue    ::= SEQUENCE OF
  --                                      AlgorithmIdentifier{{...}}
  --   id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4}
  --      PreferredSymmAlgValue   ::= AlgorithmIdentifier{{...}}
  --   id-it-caKeyUpdateInfo  OBJECT IDENTIFIER ::= {id-it 5}
  --      CAKeyUpdateInfoValue    ::= CAKeyUpdAnnContent
  --   id-it-currentCRL       OBJECT IDENTIFIER ::= {id-it 6}
  --      CurrentCRLValue         ::= CertificateList
  --   id-it-unsupportedOIDs  OBJECT IDENTIFIER ::= {id-it 7}
  --      UnsupportedOIDsValue    ::= SEQUENCE OF OBJECT IDENTIFIER
  --   id-it-keyPairParamReq  OBJECT IDENTIFIER ::= {id-it 10}
  --      KeyPairParamReqValue    ::= OBJECT IDENTIFIER
  --   id-it-keyPairParamRep  OBJECT IDENTIFIER ::= {id-it 11}
  --      KeyPairParamRepValue    ::= AlgorithmIdentifer
  --   id-it-revPassphrase    OBJECT IDENTIFIER ::= {id-it 12}
  --      RevPassphraseValue      ::= EncryptedValue
  --   id-it-implicitConfirm  OBJECT IDENTIFIER ::= {id-it 13}
  --      ImplicitConfirmValue    ::= NULL
  --   id-it-confirmWaitTime  OBJECT IDENTIFIER ::= {id-it 14}
  --      ConfirmWaitTimeValue    ::= GeneralizedTime
  --   id-it-origPKIMessage   OBJECT IDENTIFIER ::= {id-it 15}
  --      OrigPKIMessageValue     ::= PKIMessages
  --   id-it-suppLangTags     OBJECT IDENTIFIER ::= {id-it 16}
  --      SuppLangTagsValue       ::= SEQUENCE OF UTF8String
  --
  -- where
  --
  --   id-pkix OBJECT IDENTIFIER ::= {
  --      iso(1) identified-organization(3)
  --      dod(6) internet(1) security(5) mechanisms(5) pkix(7)}



Hoffman & Schaad        Expires January 11, 2009               [Page 68]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  -- and
  --   id-it   OBJECT IDENTIFIER ::= {id-pkix 4}
  --
  --
  -- This construct MAY also be used to define new PKIX Certificate
  -- Management Protocol request and response messages, or general-
  -- purpose (e.g., announcement) messages for future needs or for
  -- specific environments.

  GenMsgContent ::= SEQUENCE OF InfoTypeAndValue

  -- May be sent by EE, RA, or CA (depending on message content).
  -- The OPTIONAL infoValue parameter of InfoTypeAndValue will
  -- typically be omitted for some of the examples given above.
  -- The receiver is free to ignore any contained OBJ. IDs that it
  -- does not recognize. If sent from EE to CA, the empty set
  -- indicates that the CA may send
  -- any/all information that it wishes.

  GenRepContent ::= SEQUENCE OF InfoTypeAndValue
  -- Receiver MAY ignore any contained OIDs that it does not
  -- recognize.

  ErrorMsgContent ::= SEQUENCE {
      pKIStatusInfo          PKIStatusInfo,
      errorCode              INTEGER           OPTIONAL,
      -- implementation-specific error codes
      errorDetails           PKIFreeText       OPTIONAL
      -- implementation-specific error details
  }

  PollReqContent ::= SEQUENCE OF SEQUENCE {
      certReqId              INTEGER }

  PollRepContent ::= SEQUENCE OF SEQUENCE {
      certReqId              INTEGER,
      checkAfter             INTEGER,  -- time in seconds
      reason                 PKIFreeText OPTIONAL }

  END


12.  ASN.1 Module for RFC 4211

  PKIXCRMF-2005
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-crmf2005(36)}
  DEFINITIONS IMPLICIT TAGS ::=



Hoffman & Schaad        Expires January 11, 2009               [Page 69]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  BEGIN

  IMPORTS

  Attribute{}, AlgorithmIdentifier{}, Extensions{}, EXTENSION,
      ATTRIBUTE, ALGORITHM
  FROM PKIX-CommonTypes
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) }

  Version, Name, Time, SubjectPublicKeyInfo, UniqueIdentifier
  FROM PKIX1Explicit88
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-explicit(18)}

  GeneralName, CertExtensions
  FROM PKIX1Implicit88
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-pkix1-implicit(19)}

  EnvelopedData, CONTENT-TYPE
  FROM CryptographicMessageSyntax2004
      { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
      smime(16) modules(0) cms-2004(24) };  -- found in [CMS]


  id-pkix  OBJECT IDENTIFIER  ::= { iso(1) identified-organization(3)
      dod(6) internet(1) security(5) mechanisms(5) 7 }

  -- arc for Internet X.509 PKI protocols and their components

  id-pkip  OBJECT IDENTIFIER ::= { id-pkix 5 }

  id-smime OBJECT IDENTIFIER ::= { iso(1) member-body(2)
       us(840) rsadsi(113549) pkcs(1) pkcs9(9) 16 }

  id-ct   OBJECT IDENTIFIER ::= { id-smime  1 }  -- content types

  -- Core definitions for this module

  CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsg

  CertReqMsg ::= SEQUENCE {
      certReq   CertRequest,
      popo       ProofOfPossession  OPTIONAL,
      -- content depends upon key type
      regInfo   SEQUENCE SIZE(1..MAX) OF
          AttributeTypeAndValue OPTIONAL }



Hoffman & Schaad        Expires January 11, 2009               [Page 70]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  CertRequest ::= SEQUENCE {
    certReqId     INTEGER,      -- ID for matching request and reply
    certTemplate  CertTemplate, -- Selected fields of cert to be issued
    controls      Controls OPTIONAL }  -- Attributes affecting issuance

  CertTemplate ::= SEQUENCE {
      version      [0] Version               OPTIONAL,
      serialNumber [1] INTEGER               OPTIONAL,
      signingAlg   [2] AlgorithmIdentifier{{...}}   OPTIONAL,
      issuer       [3] Name                  OPTIONAL,
      validity     [4] OptionalValidity      OPTIONAL,
      subject      [5] Name                  OPTIONAL,
      publicKey    [6] SubjectPublicKeyInfo  OPTIONAL,
      issuerUID    [7] UniqueIdentifier      OPTIONAL,
      subjectUID   [8] UniqueIdentifier      OPTIONAL,
      extensions   [9] Extensions{{CertExtensions}}  OPTIONAL }

  OptionalValidity ::= SEQUENCE {
      notBefore  [0] Time OPTIONAL,
      notAfter   [1] Time OPTIONAL } -- at least one MUST be present

  Controls  ::= SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue

  AttributeTypeAndValue ::= SEQUENCE {
      type         ATTRIBUTE.&id({SupportedAttributes}),
      value        ATTRIBUTE.&Type({SupportedAttributes})}

  SupportedAttributes ATTRIBUTE ::= { ... }

  ProofOfPossession ::= CHOICE {
      raVerified        [0] NULL,
      -- used if the RA has already verified that the requester is in
      -- possession of the private key
      signature         [1] POPOSigningKey,
      keyEncipherment   [2] POPOPrivKey,
      keyAgreement      [3] POPOPrivKey }

  POPOSigningKey ::= SEQUENCE {
      poposkInput           [0] POPOSigningKeyInput OPTIONAL,
      algorithmIdentifier   AlgorithmIdentifier{{...}},
      signature             BIT STRING }
      -- The signature (using "algorithmIdentifier") is on the
      -- DER-encoded value of poposkInput.  NOTE: If the CertReqMsg
      -- certReq CertTemplate contains the subject and publicKey values,
      -- then poposkInput MUST be omitted and the signature MUST be
      -- computed over the DER-encoded value of CertReqMsg certReq.  If
      -- the CertReqMsg certReq CertTemplate does not contain both the
      -- public key and subject values (i.e., if it contains only one



Hoffman & Schaad        Expires January 11, 2009               [Page 71]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      -- of these, or neither), then poposkInput MUST be present and
      -- MUST be signed.

  POPOSigningKeyInput ::= SEQUENCE {
      authInfo            CHOICE {
       sender              [0] GeneralName,
       -- used only if an authenticated identity has been
       -- established for the sender (e.g., a DN from a
       -- previously-issued and currently-valid certificate)
       publicKeyMAC        PKMACValue },
       -- used if no authenticated GeneralName currently exists for
       -- the sender; publicKeyMAC contains a password-based MAC
       -- on the DER-encoded value of publicKey
      publicKey           SubjectPublicKeyInfo }  -- from CertTemplate

  PKMACValue ::= SEQUENCE {
      algId  AlgorithmIdentifier{{...}},
      -- algorithm value shall be PasswordBasedMac
      --     {1 2 840 113533 7 66 13}
      -- parameter value is PBMParameter
      value  BIT STRING }

  PBMParameter ::= SEQUENCE {
     salt                OCTET STRING,
     owf                 AlgorithmIdentifier{{...}},
     -- AlgId for a One-Way Function (SHA-1 recommended)
     iterationCount      INTEGER,
     -- number of times the OWF is applied
     mac                 AlgorithmIdentifier{{...}}
     -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
  }   -- or HMAC [HMAC, RFC2202])

  POPOPrivKey ::= CHOICE {
      thisMessage       [0] BIT STRING,         -- Deprecated
      -- possession is proven in this message (which contains
      -- the private key itself (encrypted for the CA))
      subsequentMessage [1] SubsequentMessage,
      -- possession will be proven in a subsequent message
      dhMAC             [2] BIT STRING,         -- Deprecated
      agreeMAC          [3] PKMACValue,
      encryptedKey      [4] EnvelopedData }
      -- for keyAgreement (only), possession is proven in this message
      -- (which contains a MAC (over the DER-encoded value of the
      -- certReq parameter in CertReqMsg, which MUST include both
      -- subject and publicKey) based on a key derived from the end
      -- entity's private DH key and the CA's public DH key);

  SubsequentMessage ::= INTEGER {



Hoffman & Schaad        Expires January 11, 2009               [Page 72]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      encrCert (0),
      -- requests that resulting certificate be encrypted for the
      -- end entity (following which, POP will be proven in a
      -- confirmation message)
      challengeResp (1) }
      -- requests that CA engage in challenge-response exchange with
      -- end entity in order to prove private key possession

  -- Object identifier assignments --

  -- Registration Controls in CRMF
      id-regCtrl OBJECT IDENTIFIER ::= { id-pkip 1 }

  RegControlSet ATTRIBUTE ::= {
      regCtrl-regToken | regCtrl-authenticator |
      regCtrl-pkiPublicationInfo | regCtrl-pkiArchiveOptions |
      regCtrl-oldCertID | regCtrl-protocolEncrKey }

  regCtrl-regToken ATTRIBUTE ::=
      { TYPE RegToken IDENTIFIED BY id-regCtrl-regToken }

  id-regCtrl-regToken OBJECT IDENTIFIER ::= { id-regCtrl 1 }

  RegToken ::= UTF8String

  regCtrl-authenticator ATTRIBUTE ::=
      { TYPE Authenticator IDENTIFIED BY id-regCtrl-authenticator }

  id-regCtrl-authenticator OBJECT IDENTIFIER ::= { id-regCtrl 2 }

  Authenticator ::= UTF8String

  regCtrl-pkiPublicationInfo ATTRIBUTE ::=
      { TYPE PKIPublicationInfo IDENTIFIED BY
          id-regCtrl-pkiPublicationInfo }

  id-regCtrl-pkiPublicationInfo OBJECT IDENTIFIER ::= { id-regCtrl 3 }

  PKIPublicationInfo ::= SEQUENCE {
      action     INTEGER {
                     dontPublish (0),
                     pleasePublish (1) },
      pubInfos  SEQUENCE SIZE (1..MAX) OF SinglePubInfo OPTIONAL }
      -- pubInfos MUST NOT be present if action is "dontPublish"
      -- (if action is "pleasePublish" and pubInfos is omitted,
      -- "dontCare" is assumed)

  SinglePubInfo ::= SEQUENCE {



Hoffman & Schaad        Expires January 11, 2009               [Page 73]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      pubMethod    INTEGER {
          dontCare    (0),
          x500        (1),
          web         (2),
          ldap        (3) },
      pubLocation  GeneralName OPTIONAL }

  regCtrl-pkiArchiveOptions ATTRIBUTE ::=
      { TYPE PKIArchiveOptions IDENTIFIED BY
          id-regCtrl-pkiArchiveOptions }

  id-regCtrl-pkiArchiveOptions OBJECT IDENTIFIER ::= { id-regCtrl 4 }

  PKIArchiveOptions ::= CHOICE {
      encryptedPrivKey     [0] EncryptedKey,
      -- the actual value of the private key
      keyGenParameters     [1] KeyGenParameters,
      -- parameters that allow the private key to be re-generated
      archiveRemGenPrivKey [2] BOOLEAN }
      -- set to TRUE if sender wishes receiver to archive the private
      -- key of a key pair that the receiver generates in response to
      -- this request; set to FALSE if no archival is desired.

  EncryptedKey ::= CHOICE {
      encryptedValue        EncryptedValue,   -- Deprecated
      envelopedData     [0] EnvelopedData }
      -- The encrypted private key MUST be placed in the envelopedData
      -- encryptedContentInfo encryptedContent OCTET STRING.

  EncryptedValue ::= SEQUENCE {
      intendedAlg   [0] AlgorithmIdentifier{{...}}  OPTIONAL,
      -- the intended algorithm for which the value will be used
      symmAlg       [1] AlgorithmIdentifier{{...}}  OPTIONAL,
      -- the symmetric algorithm used to encrypt the value
      encSymmKey    [2] BIT STRING           OPTIONAL,
      -- the (encrypted) symmetric key used to encrypt the value
      keyAlg        [3] AlgorithmIdentifier{{...}}  OPTIONAL,
      -- algorithm used to encrypt the symmetric key
      valueHint     [4] OCTET STRING         OPTIONAL,
      -- a brief description or identifier of the encValue content
      -- (may be meaningful only to the sending entity, and used only
      -- if EncryptedValue might be re-examined by the sending entity
      -- in the future)
      encValue       BIT STRING }
      -- the encrypted value itself
  -- When EncryptedValue is used to carry a private key (as opposed to
  -- a certificate), implementations MUST support the encValue field
  -- containing an encrypted PrivateKeyInfo as defined in [PKCS11],



Hoffman & Schaad        Expires January 11, 2009               [Page 74]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  -- section 12.11.  If encValue contains some other format/encoding
  -- for the private key, the first octet of valueHint MAY be used
  -- to indicate the format/encoding (but note that the possible values
  -- of this octet are not specified at this time).  In all cases, the
  -- intendedAlg field MUST be used to indicate at least the OID of
  -- the intended algorithm of the private key, unless this information
  -- is known a priori to both sender and receiver by some other means.

  KeyGenParameters ::= OCTET STRING

  regCtrl-oldCertID ATTRIBUTE ::=
      { TYPE OldCertId IDENTIFIED BY id-regCtrl-oldCertID }

  id-regCtrl-oldCertID  OBJECT IDENTIFIER ::= { id-regCtrl 5 }

  OldCertId ::= CertId

  CertId ::= SEQUENCE {
      issuer           GeneralName,
      serialNumber     INTEGER }

  regCtrl-protocolEncrKey ATTRIBUTE ::=
      { TYPE ProtocolEncrKey IDENTIFIED BY id-regCtrl-protocolEncrKey }

  id-regCtrl-protocolEncrKey    OBJECT IDENTIFIER ::= { id-regCtrl 6 }

  ProtocolEncrKey ::= SubjectPublicKeyInfo

  -- Registration Info in CRMF
  id-regInfo OBJECT IDENTIFIER ::= { id-pkip 2 }

  RegInfoSet ATTRIBUTE ::=
      { regInfo-utf8Pairs | regInfo-certReq }

  regInfo-utf8Pairs ATTRIBUTE ::=
      { TYPE UTF8Pairs IDENTIFIED BY id-regInfo-utf8Pairs }

  id-regInfo-utf8Pairs    OBJECT IDENTIFIER ::= { id-regInfo 1 }
  --with syntax
  UTF8Pairs ::= UTF8String

  regInfo-certReq ATTRIBUTE ::=
      { TYPE CertReq IDENTIFIED BY id-regInfo-certReq }

  id-regInfo-certReq       OBJECT IDENTIFIER ::= { id-regInfo 2 }
  --with syntax
  CertReq ::= CertRequest




Hoffman & Schaad        Expires January 11, 2009               [Page 75]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  -- id-ct-encKeyWithID is a new content type used for CMS objects.
  -- it contains both a private key and an identifier for key escrow
  -- agents to check against recovery requestors.

  ct-encKeyWithID CONTENT-TYPE ::=
      { EncKeyWithID IDENTIFIED BY id-ct-encKeyWithID }

  id-ct-encKeyWithID OBJECT IDENTIFIER ::= {id-ct 21}

  EncKeyWithID ::= SEQUENCE {
      privateKey           PrivateKeyInfo,
      identifier CHOICE {
          string             UTF8String,
          generalName        GeneralName
      } OPTIONAL
  }

  PrivateKeyInfo ::= SEQUENCE {
     version                   INTEGER,
     privateKeyAlgorithm       AlgorithmIdentifier{{...}},
     privateKey                OCTET STRING,
     attributes                [0] IMPLICIT Attributes OPTIONAL
  }

  EmptyAttributeSet ATTRIBUTE ::= {...}

  Attributes ::= SET OF Attribute{{EmptyAttributeSet}}

  END



13.  ASN.1 Module for RFC 5055

  SCVP
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) 21 }
  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN

  IMPORTS

  Attribute{}, AlgorithmIdentifier{}, Extensions{}, EXTENSION,
      ATTRIBUTE, ALGORITHM
  FROM PKIX-CommonTypes
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon(43) }




Hoffman & Schaad        Expires January 11, 2009               [Page 76]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  Certificate, CertificateList, CertificateSerialNumber
  FROM PKIX1Explicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) 18 }

  GeneralNames, GeneralName, KeyUsage, KeyPurposeId
  FROM PKIX1Implicit88
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) 19 }

  AttributeCertificate
  FROM PKIXAttributeCertificate
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) 12 }

  OCSPResponse
  FROM OCSP
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) 14 }

  ContentInfo, CONTENT-TYPE
  FROM CryptographicMessageSyntax2004
      { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
      smime(16) modules(0) cms-2004(24) } ;


  ScvpContentTypeSet CONTENT-TYPE ::= {ct-scvp-certValRequest |
      ct-scvp-certValResponse | ct-scvp-valPolRequest |
      ct-scvp-valPolResponse }

  -- SCVP Certificate Validation Request

  id-ct OBJECT IDENTIFIER ::=
      { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
      id-smime(16) 1 }

  ct-scvp-certValRequest CONTENT-TYPE ::=
      { CVRequest IDENTIFIED BY id-ct-scvp-certValRequest }

  id-ct-scvp-certValRequest OBJECT IDENTIFIER ::= { id-ct 10 }

  CVRequest ::= SEQUENCE {
      cvRequestVersion           INTEGER DEFAULT 1,
      query                      Query,
      requestorRef           [0] GeneralNames OPTIONAL,
      requestNonce           [1] OCTET STRING OPTIONAL,
      requestorName          [2] GeneralName OPTIONAL,
      responderName          [3] GeneralName OPTIONAL,



Hoffman & Schaad        Expires January 11, 2009               [Page 77]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      requestExtensions      [4] Extensions{{...}} OPTIONAL,
      signatureAlg           [5] AlgorithmIdentifier{{...}} OPTIONAL,
      hashAlg                [6] OBJECT IDENTIFIER OPTIONAL,
      requestorText          [7] UTF8String (SIZE (1..256)) OPTIONAL
  }

  Query ::= SEQUENCE {
      queriedCerts             CertReferences,
      checks                   CertChecks,
      wantBack             [1] WantBack OPTIONAL,
      validationPolicy         ValidationPolicy,
      responseFlags            ResponseFlags OPTIONAL,
      serverContextInfo    [2] OCTET STRING OPTIONAL,
      validationTime       [3] GeneralizedTime OPTIONAL,
      intermediateCerts    [4] CertBundle OPTIONAL,
      revInfos             [5] RevocationInfos OPTIONAL,
      producedAt           [6] GeneralizedTime OPTIONAL,
      queryExtensions      [7] Extensions{{...}} OPTIONAL
  }

  CertReferences ::= CHOICE {
      pkcRefs       [0] SEQUENCE SIZE (1..MAX) OF PKCReference,
      acRefs        [1] SEQUENCE SIZE (1..MAX) OF ACReference
  }

  CertReference::= CHOICE {
      pkc               PKCReference,
      ac                ACReference
  }

  PKCReference ::= CHOICE {
      cert          [0] Certificate,
      pkcRef        [1] SCVPCertID
  }

  ACReference ::= CHOICE {
      attrCert      [2] AttributeCertificate,
      acRef         [3] SCVPCertID
  }

  HashAlgorithm ::= AlgorithmIdentifier{{...}}

  SCVPCertID ::= SEQUENCE {
     certHash        OCTET STRING,
     issuerSerial    SCVPIssuerSerial,
     hashAlgorithm   HashAlgorithm
                         DEFAULT { algorithm sha-1 }
  }



Hoffman & Schaad        Expires January 11, 2009               [Page 78]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  SCVPIssuerSerial ::= SEQUENCE {
      issuer         GeneralNames,
      serialNumber   CertificateSerialNumber
  }

  ValidationPolicy ::= SEQUENCE {
      validationPolRef           ValidationPolRef,
      validationAlg          [0] ValidationAlg OPTIONAL,
      userPolicySet          [1] SEQUENCE SIZE (1..MAX) OF OBJECT
                                IDENTIFIER OPTIONAL,
      inhibitPolicyMapping   [2] BOOLEAN OPTIONAL,
      requireExplicitPolicy  [3] BOOLEAN OPTIONAL,
      inhibitAnyPolicy       [4] BOOLEAN OPTIONAL,
      trustAnchors           [5] TrustAnchors OPTIONAL,
      keyUsages              [6] SEQUENCE OF KeyUsage OPTIONAL,
      extendedKeyUsages      [7] SEQUENCE OF KeyPurposeId OPTIONAL,
      specifiedKeyUsages     [8] SEQUENCE OF KeyPurposeId OPTIONAL
  }

  CertChecks ::= SEQUENCE SIZE (1..MAX) OF
      OBJECT IDENTIFIER (CertCheckSet | ACertCheckSet, ... )

  WantBack ::= SEQUENCE SIZE (1..MAX) OF
      OBJECT IDENTIFIER ( WantBackSet, ... )

  POLICY ::= ATTRIBUTE

  ValidationPolRefSet POLICY ::= {
      svp-defaultValPolicy, ...
  }

  ValidationPolRef ::= SEQUENCE {
     valPolId             POLICY.&id,
     valPolParams         POLICY.&Type OPTIONAL
  }

  ValidationAlgSet POLICY ::= {
          svp-basicValAlg, ...
  }

  ValidationAlg ::= SEQUENCE {
      valAlgId               POLICY.&id,
      parameters             POLICY.&Type OPTIONAL
  }

  NameValiationAlgSet POLICY ::= {
      svp-nameValAlg, ...
  }



Hoffman & Schaad        Expires January 11, 2009               [Page 79]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  NameValidationAlgParms ::= SEQUENCE {
      nameCompAlgId          OBJECT IDENTIFIER (NameCompAlgSet, ... ),
      validationNames        GeneralNames
  }

  TrustAnchors ::= SEQUENCE SIZE (1..MAX) OF PKCReference

  KeyAgreePublicKey ::= SEQUENCE {
      algorithm           AlgorithmIdentifier{{...}},
      publicKey           BIT STRING,
      macAlgorithm        AlgorithmIdentifier{{...}},
      kDF                 AlgorithmIdentifier{{...}} OPTIONAL
  }

  ResponseFlags ::= SEQUENCE {
      fullRequestInResponse      [0] BOOLEAN DEFAULT FALSE,
      responseValidationPolByRef [1] BOOLEAN DEFAULT TRUE,
      protectResponse            [2] BOOLEAN DEFAULT TRUE,
      cachedResponse             [3] BOOLEAN DEFAULT TRUE
  }

  CertBundle ::= SEQUENCE SIZE (1..MAX) OF Certificate

  RevocationInfos ::= SEQUENCE SIZE (1..MAX) OF RevocationInfo

  RevocationInfo ::= CHOICE {
      crl                    [0] CertificateList,
      delta-crl              [1] CertificateList,
      ocsp                   [2] OCSPResponse,
      other                  [3] OtherRevInfo
  }

  REV-INFO ::= TYPE-IDENTIFIER

  OtherRevInfo ::= SEQUENCE {
      riType                     REV-INFO.&id,
      riValue                    REV-INFO.&Type
  }

  -- SCVP Certificate Validation Response

  ct-scvp-certValResponse CONTENT-TYPE ::=
      { CVResponse IDENTIFIED BY id-ct-scvp-certValResponse }

  id-ct-scvp-certValResponse OBJECT IDENTIFIER ::= { id-ct 11 }

  CVResponse ::= SEQUENCE {
      cvResponseVersion          INTEGER,



Hoffman & Schaad        Expires January 11, 2009               [Page 80]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      serverConfigurationID      INTEGER,
      producedAt                 GeneralizedTime,
      responseStatus             ResponseStatus,
      respValidationPolicy   [0] RespValidationPolicy OPTIONAL,
      requestRef             [1] RequestReference OPTIONAL,
      requestorRef           [2] GeneralNames OPTIONAL,
      requestorName          [3] GeneralNames OPTIONAL,
      replyObjects           [4] ReplyObjects OPTIONAL,
      respNonce              [5] OCTET STRING OPTIONAL,
      serverContextInfo      [6] OCTET STRING OPTIONAL,
      cvResponseExtensions   [7] Extensions{{...}} OPTIONAL,
      requestorText          [8] UTF8String (SIZE (1..256)) OPTIONAL
  }

  ResponseStatus ::= SEQUENCE {
     statusCode               CVStatusCode DEFAULT  okay,
     errorMessage             UTF8String OPTIONAL
  }

  CVStatusCode ::= ENUMERATED {
     okay                               (0),
     skipUnrecognizedItems              (1),
     tooBusy                           (10),
     invalidRequest                    (11),
     internalError                     (12),
     badStructure                      (20),
     unsupportedVersion                (21),
     abortUnrecognizedItems            (22),
     unrecognizedSigKey                (23),
     badSignatureOrMAC                 (24),
     unableToDecode                    (25),
     notAuthorized                     (26),
     unsupportedChecks                 (27),
     unsupportedWantBacks              (28),
     unsupportedSignatureOrMAC         (29),
     invalidSignatureOrMAC             (30),
     protectedResponseUnsupported      (31),
     unrecognizedResponderName         (32),
     relayingLoop                      (40),
     unrecognizedValPol                (50),
     unrecognizedValAlg                (51),
     fullRequestInResponseUnsupported  (52),
     fullPolResponseUnsupported        (53),
     inhibitPolicyMappingUnsupported   (54),
     requireExplicitPolicyUnsupported  (55),
     inhibitAnyPolicyUnsupported       (56),
     validationTimeUnsupported         (57),
     unrecognizedCritQueryExt          (63),



Hoffman & Schaad        Expires January 11, 2009               [Page 81]


Internet-Draft             New ASN.1 for PKIX                  July 2008


     unrecognizedCritRequestExt        (64)
  }

  RespValidationPolicy ::= ValidationPolicy

  RequestReference ::= CHOICE {
      requestHash   [0] HashValue, -- hash of CVRequest
      fullRequest   [1] CVRequest }

  HashValue ::= SEQUENCE {
      algorithm         HashAlgorithm
                            DEFAULT { algorithm sha-1 },
      value             OCTET STRING }

  sha-1 OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
           oiw(14) secsig(3) algorithm(2) 26 }

  ReplyObjects ::= SEQUENCE SIZE (1..MAX) OF CertReply

  CertReply ::= SEQUENCE {
      cert                       CertReference,
      replyStatus                ReplyStatus DEFAULT success,
      replyValTime               GeneralizedTime,
      replyChecks                ReplyChecks,
      replyWantBacks             ReplyWantBacks,
      validationErrors       [0] SEQUENCE SIZE (1..MAX) OF
          OBJECT IDENTIFIER ( BasicValidationErrorSet |
                              NameValidationErrorSet,
                              ... ) OPTIONAL,
      nextUpdate             [1] GeneralizedTime OPTIONAL,
      certReplyExtensions    [2] Extensions{{...}} OPTIONAL
  }

  ReplyStatus ::= ENUMERATED {
      success                    (0),
      malformedPKC               (1),
      malformedAC                (2),
      unavailableValidationTime  (3),
      referenceCertHashFail      (4),
      certPathConstructFail      (5),
      certPathNotValid           (6),
      certPathNotValidNow        (7),
      wantBackUnsatisfied        (8)
  }

  ReplyChecks ::= SEQUENCE OF ReplyCheck

  ReplyCheck ::= SEQUENCE {



Hoffman & Schaad        Expires January 11, 2009               [Page 82]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      check                      OBJECT IDENTIFIER,
      status                     INTEGER DEFAULT 0
  }

  ReplyWantBacks ::= SEQUENCE OF ReplyWantBack

  ReplyWantBack::= SEQUENCE {
      wb                         OBJECT IDENTIFIER,
      value                      OCTET STRING
  }

  CertBundles ::= SEQUENCE SIZE (1..MAX) OF CertBundle

  RevInfoWantBack ::= SEQUENCE {
      revocationInfo             RevocationInfos,
      extraCerts                 CertBundle OPTIONAL
  }

  SCVPResponses ::= SEQUENCE OF ContentInfo

  -- SCVP Validation Policies Request

  ct-scvp-valPolRequest CONTENT-TYPE ::=
      { ValPolRequest IDENTIFIED BY id-ct-scvp-valPolRequest }

  id-ct-scvp-valPolRequest OBJECT IDENTIFIER ::= { id-ct 12 }

  ValPolRequest ::= SEQUENCE {
      vpRequestVersion           INTEGER DEFAULT 1,
      requestNonce               OCTET STRING
  }

  -- SCVP Validation Policies Response

  ct-scvp-valPolResponse CONTENT-TYPE ::=
      { ValPolResponse IDENTIFIED BY id-ct-scvp-valPolResponse }

  id-ct-scvp-valPolResponse OBJECT IDENTIFIER ::= { id-ct 13 }

  ValPolResponse ::= SEQUENCE {
      vpResponseVersion       INTEGER,
      maxCVRequestVersion     INTEGER,
      maxVPRequestVersion     INTEGER,
      serverConfigurationID   INTEGER,
      thisUpdate              GeneralizedTime,
      nextUpdate              GeneralizedTime OPTIONAL,
      supportedChecks         CertChecks,
      supportedWantBacks      WantBack,



Hoffman & Schaad        Expires January 11, 2009               [Page 83]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      validationPolicies      SEQUENCE OF OBJECT IDENTIFIER,
      validationAlgs          SEQUENCE OF OBJECT IDENTIFIER,
      authPolicies            SEQUENCE OF AuthPolicy,
      responseTypes           ResponseTypes,
      defaultPolicyValues     RespValidationPolicy,
      revocationInfoTypes     RevocationInfoTypes,
      signatureGeneration     SEQUENCE OF AlgorithmIdentifier{{...}},
      signatureVerification   SEQUENCE OF AlgorithmIdentifier{{...}},
      hashAlgorithms          SEQUENCE SIZE (1..MAX) OF
                                 OBJECT IDENTIFIER,
      serverPublicKeys        SEQUENCE OF KeyAgreePublicKey
                                 OPTIONAL,
      clockSkew               INTEGER DEFAULT 10,
      requestNonce            OCTET STRING OPTIONAL
  }

  ResponseTypes  ::= ENUMERATED {
      cached-only                (0),
      non-cached-only            (1),
      cached-and-non-cached      (2)
  }

  RevocationInfoTypes ::= BIT STRING {
      fullCRLs                   (0),
      deltaCRLs                  (1),
      indirectCRLs               (2),
      oCSPResponses              (3)
  }

  AuthPolicy ::= OBJECT IDENTIFIER

  -- SCVP Check Identifiers

  id-stc OBJECT IDENTIFIER ::=
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) 17 }

  CertCheckSet OBJECT IDENTIFIER ::= {
      id-stc-build-pkc-path | id-stc-build-valid-pkc-path |
      id-stc-build-status-checked-pkc-path, ... }

  id-stc-build-pkc-path        OBJECT IDENTIFIER ::= { id-stc 1 }
  id-stc-build-valid-pkc-path  OBJECT IDENTIFIER ::= { id-stc 2 }
  id-stc-build-status-checked-pkc-path
                              OBJECT IDENTIFIER ::= { id-stc 3 }

  ACertCheckSet OBJECT IDENTIFIER ::= {
      id-stc-build-aa-path | id-stc-build-valid-aa-path |



Hoffman & Schaad        Expires January 11, 2009               [Page 84]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      id-stc-build-status-checked-aa-path |
      id-stc-status-check-ac-and-build-status-checked-aa-path
  }

  id-stc-build-aa-path         OBJECT IDENTIFIER ::= { id-stc 4 }
  id-stc-build-valid-aa-path   OBJECT IDENTIFIER ::= { id-stc 5 }
  id-stc-build-status-checked-aa-path
                              OBJECT IDENTIFIER ::= { id-stc 6 }
  id-stc-status-check-ac-and-build-status-checked-aa-path
                              OBJECT IDENTIFIER ::= { id-stc 7 }

  -- SCVP WantBack Identifiers

  id-swb OBJECT IDENTIFIER ::=
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) 18 }

  WantBackSet OBJECT IDENTIFIER ::= {
      id-swb-pkc-best-cert-path | id-swb-pkc-revocation-info |
      id-swb-pkc-public-key-info | id-swb-aa-cert-path |
      id-swb-aa-revocation-info | id-swb-ac-revocation-info |
      id-swb-relayed-responses | id-swb-pkc-cert | id-swb-ac-cert |
      id-swb-pkc-all-cert-paths | id-swb-pkc-ee-revocation-info |
      id-swb-pkc-CAs-revocation-info
  }

  id-swb-pkc-best-cert-path       OBJECT IDENTIFIER ::= { id-swb 1 }
  id-swb-pkc-revocation-info      OBJECT IDENTIFIER ::= { id-swb 2 }
  id-swb-pkc-public-key-info      OBJECT IDENTIFIER ::= { id-swb 4 }
  id-swb-aa-cert-path             OBJECT IDENTIFIER ::= { id-swb 5 }
  id-swb-aa-revocation-info       OBJECT IDENTIFIER ::= { id-swb 6 }
  id-swb-ac-revocation-info       OBJECT IDENTIFIER ::= { id-swb 7 }
  id-swb-relayed-responses        OBJECT IDENTIFIER ::= { id-swb 9 }
  id-swb-pkc-cert                 OBJECT IDENTIFIER ::= { id-swb 10}
  id-swb-ac-cert                  OBJECT IDENTIFIER ::= { id-swb 11}
  id-swb-pkc-all-cert-paths       OBJECT IDENTIFIER ::= { id-swb 12}
  id-swb-pkc-ee-revocation-info   OBJECT IDENTIFIER ::= { id-swb 13}
  id-swb-pkc-CAs-revocation-info  OBJECT IDENTIFIER ::= { id-swb 14}

  -- SCVP Validation Policy and Algorithm Identifiers

  id-svp OBJECT IDENTIFIER ::=
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) 19 }

  svp-defaultValPolicy POLICY ::=
      { IDENTIFIED BY id-svp-defaultValPolicy }




Hoffman & Schaad        Expires January 11, 2009               [Page 85]


Internet-Draft             New ASN.1 for PKIX                  July 2008


  id-svp-defaultValPolicy OBJECT IDENTIFIER ::= { id-svp 1 }

  -- SCVP Basic Validation Algorithm Identifier

  svp-basicValAlg POLICY ::= {IDENTIFIED BY id-svp-basicValAlg }

  id-svp-basicValAlg OBJECT IDENTIFIER ::= { id-svp 3 }

  -- SCVP Basic Validation Algorithm Errors

  id-bvae OBJECT IDENTIFIER ::= id-svp-basicValAlg

  BasicValidationErrorSet OBJECT IDENTIFIER ::= {
      id-bvae-expired | id-bvae-not-yet-valid |
      id-bvae-wrongTrustAnchor | id-bvae-noValidCertPath |
      id-bvae-revoked | id-bvae-invalidKeyPurpose |
      id-bvae-invalidKeyUsage | id-bvae-invalidCertPolicy
  }

  id-bvae-expired              OBJECT IDENTIFIER ::= { id-bvae 1 }
  id-bvae-not-yet-valid        OBJECT IDENTIFIER ::= { id-bvae 2 }
  id-bvae-wrongTrustAnchor     OBJECT IDENTIFIER ::= { id-bvae 3 }
  id-bvae-noValidCertPath      OBJECT IDENTIFIER ::= { id-bvae 4 }
  id-bvae-revoked              OBJECT IDENTIFIER ::= { id-bvae 5 }
  id-bvae-invalidKeyPurpose    OBJECT IDENTIFIER ::= { id-bvae 9 }
  id-bvae-invalidKeyUsage      OBJECT IDENTIFIER ::= { id-bvae 10 }
  id-bvae-invalidCertPolicy    OBJECT IDENTIFIER ::= { id-bvae 11 }

  -- SCVP Name Validation Algorithm Identifier

  svp-nameValAlg POLICY ::=
      {TYPE NameValidationAlgParms IDENTIFIED BY id-svp-nameValAlg }

  id-svp-nameValAlg OBJECT IDENTIFIER ::= { id-svp 2 }

  -- SCVP Name Validation Algorithm DN comparison algorithm

  NameCompAlgSet OBJECT IDENTIFIER ::= {
      id-nva-dnCompAlg
  }

  id-nva-dnCompAlg   OBJECT IDENTIFIER ::= { id-svp 4 }

  -- SCVP Name Validation Algorithm Errors

  id-nvae OBJECT IDENTIFIER ::= id-svp-nameValAlg

  NameValidationErrorSet OBJECT IDENTIFIER ::= {



Hoffman & Schaad        Expires January 11, 2009               [Page 86]


Internet-Draft             New ASN.1 for PKIX                  July 2008


      id-nvae-name-mismatch | id-nvae-no-name | id-nvae-unknown-alg |
      id-nvae-bad-name | id-nvae-bad-name-type | id-nvae-mixed-names
  }

  id-nvae-name-mismatch   OBJECT IDENTIFIER ::= { id-nvae 1 }
  id-nvae-no-name         OBJECT IDENTIFIER ::= { id-nvae 2 }
  id-nvae-unknown-alg     OBJECT IDENTIFIER ::= { id-nvae 3 }
  id-nvae-bad-name        OBJECT IDENTIFIER ::= { id-nvae 4 }
  id-nvae-bad-name-type   OBJECT IDENTIFIER ::= { id-nvae 5 }
  id-nvae-mixed-names     OBJECT IDENTIFIER ::= { id-nvae 6 }

  -- SCVP Extended Key Usage Key Purpose Identifiers

  id-kp OBJECT IDENTIFIER ::=
      { iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) 3 }

  SvcpExtKeyUsageSet OBJECT IDENTIFIER ::= {
      id-kp-scvpServer | id-kp-scvpClient
  }

  id-kp-scvpServer   OBJECT IDENTIFIER ::= { id-kp 15 }

  id-kp-scvpClient   OBJECT IDENTIFIER ::= { id-kp 16 }

  END


14.  Security Considerations

   Even though all the RFCs in this document are security-related, the
   document itself does not have any security considerations.  The ASN.1
   modules keep the same bits-on-the-wire as the modules that they
   replace.


15.  Normative References

   [ASN1-2002]
              ITU-T, "ITU-T Recommendation X.680 Information technology
              Abstract Syntax Notation One (ASN.1): Specification of
              basic notation", ITU-T X.680, 2002.

   [NEW-CMS-SMIME]
              Hoffman, P. and J. Schaad, "New ASN.1 Modules for CMS and
              S/MIME", draft-ietf-smime-new-asn1 (work in progress),
              December 2007.




Hoffman & Schaad        Expires January 11, 2009               [Page 87]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   [RFC2560]  Myers, M., Ankney, R., Malpani, A., Galperin, S., and C.
              Adams, "X.509 Internet Public Key Infrastructure Online
              Certificate Status Protocol - OCSP", RFC 2560, June 1999.

   [RFC2986]  Nystrom, M. and B. Kaliski, "PKCS #10: Certification
              Request Syntax Specification Version 1.7", RFC 2986,
              November 2000.

   [RFC3279]  Bassham, L., Polk, W., and R. Housley, "Algorithms and
              Identifiers for the Internet X.509 Public Key
              Infrastructure Certificate and Certificate Revocation List
              (CRL) Profile", RFC 3279, April 2002.

   [RFC3280]  Housley, R., Polk, W., Ford, W., and D. Solo, "Internet
              X.509 Public Key Infrastructure Certificate and
              Certificate Revocation List (CRL) Profile", RFC 3280,
              April 2002.

   [RFC3281]  Farrell, S. and R. Housley, "An Internet Attribute
              Certificate Profile for Authorization", RFC 3281,
              April 2002.

   [RFC3852]  Housley, R., "Cryptographic Message Syntax (CMS)",
              RFC 3852, July 2004.

   [RFC4055]  Schaad, J., Kaliski, B., and R. Housley, "Additional
              Algorithms and Identifiers for RSA Cryptography for use in
              the Internet X.509 Public Key Infrastructure Certificate
              and Certificate Revocation List (CRL) Profile", RFC 4055,
              June 2005.

   [RFC4210]  Adams, C., Farrell, S., Kause, T., and T. Mononen,
              "Internet X.509 Public Key Infrastructure Certificate
              Management Protocol (CMP)", RFC 4210, September 2005.

   [RFC4211]  Schaad, J., "Internet X.509 Public Key Infrastructure
              Certificate Request Message Format (CRMF)", RFC 4211,
              September 2005.

   [RFC5055]  Freeman, T., Housley, R., Malpani, A., Cooper, D., and W.
              Polk, "Server-Based Certificate Validation Protocol
              (SCVP)", RFC 5055, December 2007.


Appendix A.  Change History

   [[ This entire section is to be removed upon publication. ]]




Hoffman & Schaad        Expires January 11, 2009               [Page 88]


Internet-Draft             New ASN.1 for PKIX                  July 2008


A.1.  Changes between draft-hoffman-pkix-new-asn1-00 and
      draft-ietf-pkix-new-asn1-00

   Changed the draft name.

   Added the PKIX common definitions module.

   Added RFC 4055.

   Made RFC-to-be 5055 into RFC 5055.

   In RFC 2560, there was an error.  Changed from "id-pkix-ocsp OBJECT
   IDENTIFIER ::= { id-ad-ocsp }" to "id-pkix-ocsp OBJECT IDENTIFIER ::=
   id-ad-ocsp".

   In RFC 3280, made the DirectoryString definition match the order and
   spelling of that of X.520.

   In the imports of the RFC 3280 implicit module, the DirectoryString
   type is now SIGNED{} because it is a parameterized type.

   In the imports of the RFC 3281 module, the SIGNED type is now
   SIGNED{} because it is a parameterized type.

   Combined the two modules for RFC 3280 (explicit and implicit) into
   one section.

A.2.  Changes between draft-ietf-pkix-new-asn1-00 and -01

   Added module for algorithm classes and modified RFC 3279 ASN.1 to use
   the classes defined.


Authors' Addresses

   Paul Hoffman
   VPN Consortium
   127 Segre Place
   Santa Cruz, CA  95060
   US

   Phone: 1-831-426-9827
   Email: paul.hoffman@vpnc.org








Hoffman & Schaad        Expires January 11, 2009               [Page 89]


Internet-Draft             New ASN.1 for PKIX                  July 2008


   Jim Schaad
   Soaring Hawk Consulting

   Email: jimsch@exmsft.com















































Hoffman & Schaad        Expires January 11, 2009               [Page 90]


Internet-Draft             New ASN.1 for PKIX                  July 2008


Full Copyright Statement

   Copyright (C) The IETF Trust (2008).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Acknowledgment

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).





Hoffman & Schaad        Expires January 11, 2009               [Page 91]