<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-edhoc-impl-cons-06" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Implementation Considerations for EDHOC">Implementation Considerations for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-impl-cons-06"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 60?>

<t>This document provides considerations for guiding the implementation of the authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/lake-wg/edhoc-impl-cons"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios.</t>
      <t>During the development of EDHOC, a number of side topics were raised and discussed, as emerging from reviews of the protocol latest design and from implementation activities. These topics were identified as strongly pertaining to the implementation of EDHOC rather than to the protocol in itself. Hence, they are not discussed in <xref target="RFC9528"/>, which rightly focuses on specifying the actual protocol.</t>
      <t>At the same time, implementers of an application using the EDHOC protocol or of an "EDHOC library" enabling its use cannot simply ignore such topics and will have to take them into account throughout their implementation work.</t>
      <t>In order to prevent multiple, independent re-discoveries and assessments of those topics, as well as to facilitate and guide implementation activities, this document collects such topics and discusses them through considerations about the implementation of EDHOC. At a high-level, the topics in question are summarized below:</t>
      <ul spacing="normal">
        <li>
          <t>Handling of completed EDHOC sessions when they become invalid and of application keys derived from an EDHOC session when those become invalid. This topic is discussed in <xref target="sec-session-handling"/>.</t>
        </li>
        <li>
          <t>Enforcement of different trust policies, with respect to learning new authentication credentials during an execution of EDHOC. This topic is discussed in <xref target="sec-trust-models"/>.</t>
        </li>
        <li>
          <t>Branched-off side processing of incoming EDHOC messages, with particular reference to: i) fetching and validation of authentication credentials; and ii) processing of External Authorization Data (EAD) items, which in turn might play a role in the fetching and validation of authentication credentials. This topic is discussed in <xref target="sec-message-side-processing"/>.</t>
        </li>
        <li>
          <t>Effectively using EDHOC over the Constrained Application Protocol (CoAP) <xref target="RFC7252"/> in combination with Block-wise transfers for CoAP <xref target="RFC7959"/>, possibly together with the optimized EDHOC execution workflow defined in <xref target="RFC9668"/>. This topic is discussed in <xref target="sec-block-wise"/>.</t>
        </li>
      </ul>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The reader is expected to be familiar with terms and concepts related to the EDHOC protocol <xref target="RFC9528"/>, (CoAP) <xref target="RFC7252"/>, and Block-wise transfers for CoAP <xref target="RFC7959"/>.</t>
      </section>
    </section>
    <section anchor="sec-session-handling">
      <name>Handling of Invalid EDHOC Sessions and Application Keys</name>
      <t>This section considers the most common situation where, given a certain peer, only the application at that peer has visibility and control of both:</t>
      <ul spacing="normal">
        <li>
          <t>The EDHOC sessions at that peer; and</t>
        </li>
        <li>
          <t>The application keys for that application at that peer, including the knowledge of whether they have been derived from an EDHOC session, i.e., by means of the EDHOC_Exporter interface after the successful completion of an execution of EDHOC (see <xref section="4.2" sectionFormat="of" target="RFC9528"/>).</t>
        </li>
      </ul>
      <t>Building on the above, the following expands on three relevant cases concerning the handling of EDHOC sessions and application keys, in the event that any of those becomes invalid.</t>
      <t>To provide more concrete guidance, the following considers the case where "applications keys" stands for the keying material and parameters that compose a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>, i.e., when specifically those application keys are derived from an EDHOC session (see <xref section="A.1" sectionFormat="of" target="RFC9528"/>).</t>
      <t>Nevertheless, the same considerations are applicable if EDHOC is used to derive other application keys, e.g., when used to key different security protocols than OSCORE or to provide the application with secure values that are bound to an EDHOC session.</t>
      <section anchor="sec-session-invalid">
        <name>EDHOC Sessions Become Invalid</name>
        <t>The application at a peer P may have learned that a completed EDHOC session S has to be invalidated. When S is marked as invalid, the application at P purges S and deletes each set of application keys (e.g., the OSCORE Security Context) that was generated from S.</t>
        <t>Then, the application runs a new execution of the EDHOC protocol with the other peer. Upon successfully completing the EDHOC execution, the two peers derive and install a new set of application keys from this latest EDHOC session.</t>
        <t>The flowchart in <xref target="fig-flowchart-session-invalid"/> shows the handling of an EDHOC session that has become invalid.</t>
        <figure anchor="fig-flowchart-session-invalid">
          <name>Handling of an EDHOC Session that Has Become Invalid.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="80" width="568" viewBox="0 0 568 80" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 72,48 L 96,48" fill="none" stroke="black"/>
                <path d="M 312,48 L 336,48" fill="none" stroke="black"/>
                <path d="M 400,48 L 424,48" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="432,48 420,42.4 420,53.6" fill="black" transform="rotate(0,424,48)"/>
                <polygon class="arrowhead" points="344,48 332,42.4 332,53.6" fill="black" transform="rotate(0,336,48)"/>
                <polygon class="arrowhead" points="104,48 92,42.4 92,53.6" fill="black" transform="rotate(0,96,48)"/>
                <g class="text">
                  <text x="32" y="36">Invalid</text>
                  <text x="132" y="36">Delete</text>
                  <text x="176" y="36">the</text>
                  <text x="216" y="36">EDHOC</text>
                  <text x="272" y="36">session</text>
                  <text x="368" y="36">Rerun</text>
                  <text x="460" y="36">Derive</text>
                  <text x="504" y="36">and</text>
                  <text x="24" y="52">EDHOC</text>
                  <text x="120" y="52">and</text>
                  <text x="152" y="52">the</text>
                  <text x="216" y="52">application</text>
                  <text x="284" y="52">keys</text>
                  <text x="368" y="52">EDHOC</text>
                  <text x="464" y="52">install</text>
                  <text x="512" y="52">new</text>
                  <text x="32" y="68">session</text>
                  <text x="136" y="68">derived</text>
                  <text x="188" y="68">from</text>
                  <text x="220" y="68">it</text>
                  <text x="480" y="68">application</text>
                  <text x="548" y="68">keys</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
Invalid      Delete the EDHOC session      Rerun      Derive and
EDHOC   ---> and the application keys ---> EDHOC ---> install new
session      derived from it                          application keys
]]></artwork>
          </artset>
        </figure>
        <t>An EDHOC session may have become invalid, for example, because an authentication credential CRED_X has expired, or because the peer P has learned from a trusted source that CRED_X has been revoked. This effectively invalidates CRED_X, and therefore also invalidates any EDHOC session where CRED_X was used as authentication credential associated with either peer in the session (i.e., P itself or the other peer). In such a case, the application at P has to additionally delete CRED_X and any stored, corresponding credential identifier.</t>
      </section>
      <section anchor="sec-keys-invalid">
        <name>Application Keys Become Invalid</name>
        <t>The application at a peer P may have learned that a set of application keys is not safe to use anymore. When such a set is specifically an OSCORE Security Context, the application may have learned that from the OSCORE library used or from an OSCORE layer that takes part in the communication stack.</t>
        <t>A current set SET of application keys shared with another peer can become unsafe to use, for example, due to the following reasons:</t>
        <ul spacing="normal">
          <li>
            <t>SET has reached a pre-determined expiration time;</t>
          </li>
          <li>
            <t>SET has been established to use for an amount of time that is now elapsed, according to enforced application policies; or</t>
          </li>
          <li>
            <t>Some elements of SET have been used enough times to approach cryptographic limits that should not be passed, e.g., according to the properties of the security algorithms specifically used. With particular reference to an OSCORE Security Context, such limits are discussed in <xref target="I-D.ietf-core-oscore-key-limits"/>.</t>
          </li>
        </ul>
        <t>When this happens, the application at the peer P proceeds as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the following conditions both hold, then the application moves to Step 2. Otherwise, it moves to Step 3.  </t>
            <ul spacing="normal">
              <li>
                <t>Let us define S as the EDHOC session from which the peer P has derived SET or the eldest SET's ancestor set of application keys. Then, since the completion of S with the other peer, the application at P has received from the other peer and successfully verified at least one message protected with any set of application keys derived from S. That is, P has persisted S (see <xref section="5.4.2" sectionFormat="of" target="RFC9528"/>).</t>
              </li>
              <li>
                <t>The peer P supports a key update protocol, as an alternative to performing a new execution of EDHOC with the other peer. When SET is an OSCORE Security Context, the key update protocol supported by the peer P can be KUDOS <xref target="I-D.ietf-core-oscore-key-update"/>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The application at P runs the key update protocol mentioned at Step 1 with the other peer, in order to update SET. When SET is an OSCORE Security Context, the application at P can run the key update protocol KUDOS with the other peer.  </t>
            <t>
If the key update protocol terminates successfully, the updated application keys are installed and no further actions are taken. Otherwise, the application at P moves to Step 3.</t>
          </li>
          <li>
            <t>The application at the peer P performs the following actions:  </t>
            <ul spacing="normal">
              <li>
                <t>It deletes SET.</t>
              </li>
              <li>
                <t>It deletes the EDHOC session from which SET was generated, or from which the eldest SET's ancestor set of application keys was generated before any key update occurred (e.g., by means of the EDHOC_KeyUpdate interface defined in <xref section="H" sectionFormat="of" target="RFC9528"/> or other key update methods).</t>
              </li>
              <li>
                <t>It runs a new execution of the EDHOC protocol with the other peer. Upon successfully completing the EDHOC execution, the two peers derive and install a new set of application keys from this latest EDHOC session.</t>
              </li>
            </ul>
          </li>
        </ol>
        <t>The flowchart in <xref target="fig-flowchart-keys-invalid"/> shows the handling of a set of application keys that has become invalid. In particular, it assumes such a set to be an OSCORE Security Context and the key update protocol to be KUDOS.</t>
        <figure anchor="fig-flowchart-keys-invalid">
          <name>Handling of a Set of Application Keys that Has Become Invalid.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="608" width="568" viewBox="0 0 568 608" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,64 L 24,96" fill="none" stroke="black"/>
                <path d="M 24,192 L 24,224" fill="none" stroke="black"/>
                <path d="M 24,304 L 24,336" fill="none" stroke="black"/>
                <path d="M 24,400 L 24,432" fill="none" stroke="black"/>
                <path d="M 24,512 L 24,544" fill="none" stroke="black"/>
                <path d="M 240,176 L 240,272" fill="none" stroke="black"/>
                <path d="M 312,176 L 312,480" fill="none" stroke="black"/>
                <path d="M 472,176 L 472,208" fill="none" stroke="black"/>
                <path d="M 144,128 L 176,128" fill="none" stroke="black"/>
                <path d="M 408,128 L 440,128" fill="none" stroke="black"/>
                <path d="M 96,272 L 240,272" fill="none" stroke="black"/>
                <path d="M 96,480 L 312,480" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="480,208 468,202.4 468,213.6" fill="black" transform="rotate(90,472,208)"/>
                <polygon class="arrowhead" points="448,128 436,122.4 436,133.6" fill="black" transform="rotate(0,440,128)"/>
                <polygon class="arrowhead" points="320,176 308,170.4 308,181.6" fill="black" transform="rotate(270,312,176)"/>
                <polygon class="arrowhead" points="248,176 236,170.4 236,181.6" fill="black" transform="rotate(270,240,176)"/>
                <polygon class="arrowhead" points="184,128 172,122.4 172,133.6" fill="black" transform="rotate(0,176,128)"/>
                <polygon class="arrowhead" points="32,544 20,538.4 20,549.6" fill="black" transform="rotate(90,24,544)"/>
                <polygon class="arrowhead" points="32,432 20,426.4 20,437.6" fill="black" transform="rotate(90,24,432)"/>
                <polygon class="arrowhead" points="32,336 20,330.4 20,341.6" fill="black" transform="rotate(90,24,336)"/>
                <polygon class="arrowhead" points="32,224 20,218.4 20,229.6" fill="black" transform="rotate(90,24,224)"/>
                <polygon class="arrowhead" points="32,96 20,90.4 20,101.6" fill="black" transform="rotate(90,24,96)"/>
                <g class="text">
                  <text x="32" y="36">Invalid</text>
                  <text x="112" y="36">application</text>
                  <text x="180" y="36">keys</text>
                  <text x="156" y="116">NO</text>
                  <text x="16" y="132">Are</text>
                  <text x="48" y="132">the</text>
                  <text x="212" y="132">Delete</text>
                  <text x="256" y="132">the</text>
                  <text x="320" y="132">application</text>
                  <text x="472" y="132">Rerun</text>
                  <text x="48" y="148">application</text>
                  <text x="116" y="148">keys</text>
                  <text x="204" y="148">keys</text>
                  <text x="240" y="148">and</text>
                  <text x="272" y="148">the</text>
                  <text x="312" y="148">EDHOC</text>
                  <text x="368" y="148">session</text>
                  <text x="472" y="148">EDHOC</text>
                  <text x="44" y="164">persisted?</text>
                  <text x="48" y="212">YES</text>
                  <text x="428" y="244">Derive</text>
                  <text x="472" y="244">and</text>
                  <text x="520" y="244">install</text>
                  <text x="12" y="260">Is</text>
                  <text x="48" y="260">KUDOS</text>
                  <text x="108" y="260">NO</text>
                  <text x="416" y="260">new</text>
                  <text x="480" y="260">application</text>
                  <text x="548" y="260">keys</text>
                  <text x="44" y="276">supported?</text>
                  <text x="48" y="324">YES</text>
                  <text x="16" y="372">Run</text>
                  <text x="56" y="372">KUDOS</text>
                  <text x="16" y="468">Has</text>
                  <text x="56" y="468">KUDOS</text>
                  <text x="108" y="468">NO</text>
                  <text x="44" y="484">succeeded?</text>
                  <text x="48" y="532">YES</text>
                  <text x="32" y="580">Install</text>
                  <text x="80" y="580">the</text>
                  <text x="128" y="580">updated</text>
                  <text x="48" y="596">application</text>
                  <text x="116" y="596">keys</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
Invalid application keys

  |
  |
  v
                  NO
Are the          ----> Delete the application     ----> Rerun
application keys       keys and the EDHOC session       EDHOC
persisted?
                             ^        ^                   |
  |                          |        |                   |
  | YES                      |        |                   v
  v                          |        |
                             |        |           Derive and install
Is KUDOS    NO               |        |           new application keys
supported? ------------------+        |
                                      |
  |                                   |
  | YES                               |
  v                                   |
                                      |
Run KUDOS                             |
                                      |
  |                                   |
  |                                   |
  v                                   |
                                      |
Has KUDOS   NO                        |
succeeded? ---------------------------+

  |
  | YES
  v

Install the updated
application keys
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sec-keys-token-invalid">
        <name>Application Keys or Bound Access Rights Become Invalid</name>
        <t>The following considers two peers that use the ACE framework for authentication and authorization in constrained environments <xref target="RFC9200"/> and specifically the EDHOC and OSCORE profile of ACE defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>When doing so, one of the two peers acts as ACE resource server (RS) hosting protected resources. The other peer acts as ACE client and requests an access token from an ACE authorization server (AS) that is in a trust relationship with the RS. The access token specifies access rights for accessing protected resources at the RS as well as the public authentication credential of the client, namely AUTH_CRED_C.</t>
        <t>After that, C uploads the access token to the RS, by means of an EAD item included in an EDHOC message during the EDHOC execution (see below). Alternatively, the AS can upload the access token to the RS on behalf of the client, as per the alternative Short Distribution Chain (SDC) workflow defined in <xref target="I-D.ietf-ace-workflow-and-params"/>.</t>
        <t>Consistent with the EDHOC and OSCORE profile of ACE, the two peers run EDHOC in order to specifically derive an OSCORE Security Context as their shared set of application keys (see <xref section="A.1" sectionFormat="of" target="RFC9528"/>). At the RS, the access token is bound to the successfully completed EDHOC session and to the established OSCORE Security Context.</t>
        <t>After that, the peer acting as ACE client can access the protected resources hosted at the other peer acting as RS, according to the access rights specified in the access token. The communications between the two peers are protected by means of the established OSCORE Security Context.</t>
        <t>Later on, the application at one of the two peers P may have learned that the established OSCORE Security Context CTX is not safe to use anymore, e.g., from the OSCORE library used or from an OSCORE layer that takes part in the communication stack. The reasons that make CTX not safe to use anymore are the same ones discussed in <xref target="sec-keys-invalid"/> when considering a set of application keys in general, plus the event that the access token bound to CTX becomes invalid (e.g., it has expired or it has been revoked).</t>
        <t>When this happens, the application at the peer P proceeds as follows.</t>
        <ol spacing="normal" type="1"><li>
            <t>If the following conditions both hold, then the application moves to Step 2. Otherwise, it moves to Step 3:  </t>
            <ul spacing="normal">
              <li>
                <t>The access token is still believed to be valid. That is, it has not expired yet and the peer P is not aware that it has been revoked.</t>
              </li>
              <li>
                <t>Let us define S as the EDHOC session from which the peer P has derived CTX or the eldest CTX's ancestor OSCORE Security Context. Then, since the completion of S with the other peer, the application at P has received from the other peer and successfully verified at least one message protected with any set of application keys derived from S. That is, P has persisted S (see <xref section="5.4.2" sectionFormat="of" target="RFC9528"/>).</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the peer P supports the key update protocol KUDOS <xref target="I-D.ietf-core-oscore-key-update"/>, then P runs KUDOS with the other peer, in order to update CTX. If the execution of KUDOS terminates successfully, the updated OSCORE Security Context is installed and no further actions are taken.  </t>
            <t>
If the execution of KUDOS does not terminate successfully or if the peer P does not support KUDOS altogether, then the application at P moves to Step 3.</t>
          </li>
          <li>
            <t>The application at the peer P performs the following actions.  </t>
            <ul spacing="normal">
              <li>
                <t>If the access token is not believed to be valid anymore, the peer P deletes all the EDHOC sessions associated with the access token as well as the OSCORE Security Context derived from each of those sessions.      </t>
                <t>
Note that, when specifically considering the EDHOC and OSCORE profile of ACE, an access token is associated with at most one EDHOC session (see <xref section="4.2" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>).      </t>
                <t>
If the peer P acted as ACE client, then P obtains from the ACE AS a new access token, which is uploaded to the other peer acting as ACE RS.      </t>
                <t>
Finally, the application at P moves to Step 4.</t>
              </li>
              <li>
                <t>If the access token is valid while the OSCORE Security Context CTX is not, then the peer P deletes CTX.      </t>
                <t>
After that, the peer P deletes the EDHOC session from which CTX was generated, or from which the eldest CTX's ancestor OSCORE Security Context was generated before any key update occurred (e.g., by means of KUDOS or other key update methods).      </t>
                <t>
Finally, the application at P moves to Step 4.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The peer P runs a new execution of the EDHOC protocol with the other peer. Upon successfully completing the EDHOC execution, the two peers derive and install a new OSCORE Security Context from this latest EDHOC session.  </t>
            <t>
At the RS, the access token is bound to this latest EDHOC session and the newly established OSCORE Security Context.</t>
          </li>
        </ol>
        <t>The flowchart in <xref target="fig-flowchart-keys-token-invalid"/> shows the handling of an access token or of a set of application keys that have become invalid, when using the EDHOC and OSCORE profile of the ACE framework.</t>
        <figure anchor="fig-flowchart-keys-token-invalid">
          <name>Handling of an Access Token or of a Set of Application Keys that Have Become Invalid.</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="912" width="576" viewBox="0 0 576 912" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,96 L 24,128" fill="none" stroke="black"/>
                <path d="M 24,224 L 24,288" fill="none" stroke="black"/>
                <path d="M 24,368 L 24,400" fill="none" stroke="black"/>
                <path d="M 24,496 L 24,528" fill="none" stroke="black"/>
                <path d="M 24,608 L 24,640" fill="none" stroke="black"/>
                <path d="M 24,704 L 24,736" fill="none" stroke="black"/>
                <path d="M 24,816 L 24,848" fill="none" stroke="black"/>
                <path d="M 264,496 L 264,576" fill="none" stroke="black"/>
                <path d="M 336,496 L 336,784" fill="none" stroke="black"/>
                <path d="M 504,208 L 504,448" fill="none" stroke="black"/>
                <path d="M 560,160 L 560,576" fill="none" stroke="black"/>
                <path d="M 112,160 L 144,160" fill="none" stroke="black"/>
                <path d="M 336,160 L 352,160" fill="none" stroke="black"/>
                <path d="M 456,160 L 472,160" fill="none" stroke="black"/>
                <path d="M 536,160 L 560,160" fill="none" stroke="black"/>
                <path d="M 144,448 L 184,448" fill="none" stroke="black"/>
                <path d="M 456,448 L 504,448" fill="none" stroke="black"/>
                <path d="M 96,576 L 264,576" fill="none" stroke="black"/>
                <path d="M 96,784 L 336,784" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="568,576 556,570.4 556,581.6" fill="black" transform="rotate(90,560,576)"/>
                <polygon class="arrowhead" points="512,208 500,202.4 500,213.6" fill="black" transform="rotate(270,504,208)"/>
                <polygon class="arrowhead" points="480,160 468,154.4 468,165.6" fill="black" transform="rotate(0,472,160)"/>
                <polygon class="arrowhead" points="360,160 348,154.4 348,165.6" fill="black" transform="rotate(0,352,160)"/>
                <polygon class="arrowhead" points="344,496 332,490.4 332,501.6" fill="black" transform="rotate(270,336,496)"/>
                <polygon class="arrowhead" points="272,496 260,490.4 260,501.6" fill="black" transform="rotate(270,264,496)"/>
                <polygon class="arrowhead" points="192,448 180,442.4 180,453.6" fill="black" transform="rotate(0,184,448)"/>
                <polygon class="arrowhead" points="152,160 140,154.4 140,165.6" fill="black" transform="rotate(0,144,160)"/>
                <polygon class="arrowhead" points="32,848 20,842.4 20,853.6" fill="black" transform="rotate(90,24,848)"/>
                <polygon class="arrowhead" points="32,736 20,730.4 20,741.6" fill="black" transform="rotate(90,24,736)"/>
                <polygon class="arrowhead" points="32,640 20,634.4 20,645.6" fill="black" transform="rotate(90,24,640)"/>
                <polygon class="arrowhead" points="32,528 20,522.4 20,533.6" fill="black" transform="rotate(90,24,528)"/>
                <polygon class="arrowhead" points="32,400 20,394.4 20,405.6" fill="black" transform="rotate(90,24,400)"/>
                <polygon class="arrowhead" points="32,288 20,282.4 20,293.6" fill="black" transform="rotate(90,24,288)"/>
                <polygon class="arrowhead" points="32,128 20,122.4 20,133.6" fill="black" transform="rotate(90,24,128)"/>
                <g class="text">
                  <text x="32" y="36">Invalid</text>
                  <text x="92" y="36">access</text>
                  <text x="144" y="36">token</text>
                  <text x="44" y="52">specifying</text>
                  <text x="140" y="52">AUTH_CRED_C,</text>
                  <text x="12" y="68">or</text>
                  <text x="56" y="68">invalid</text>
                  <text x="136" y="68">application</text>
                  <text x="204" y="68">keys</text>
                  <text x="124" y="148">NO</text>
                  <text x="12" y="164">Is</text>
                  <text x="40" y="164">the</text>
                  <text x="180" y="164">Delete</text>
                  <text x="224" y="164">the</text>
                  <text x="284" y="164">associated</text>
                  <text x="388" y="164">Obtain</text>
                  <text x="432" y="164">and</text>
                  <text x="504" y="164">Rerun</text>
                  <text x="28" y="180">access</text>
                  <text x="80" y="180">token</text>
                  <text x="176" y="180">EDHOC</text>
                  <text x="236" y="180">sessions</text>
                  <text x="288" y="180">and</text>
                  <text x="388" y="180">upload</text>
                  <text x="424" y="180">a</text>
                  <text x="504" y="180">EDHOC</text>
                  <text x="24" y="196">still</text>
                  <text x="84" y="196">believed</text>
                  <text x="168" y="196">the</text>
                  <text x="232" y="196">application</text>
                  <text x="300" y="196">keys</text>
                  <text x="376" y="196">new</text>
                  <text x="420" y="196">access</text>
                  <text x="12" y="212">to</text>
                  <text x="36" y="212">be</text>
                  <text x="76" y="212">valid?</text>
                  <text x="184" y="212">derived</text>
                  <text x="236" y="212">from</text>
                  <text x="280" y="212">those</text>
                  <text x="384" y="212">token</text>
                  <text x="48" y="276">YES</text>
                  <text x="16" y="324">The</text>
                  <text x="80" y="324">application</text>
                  <text x="148" y="324">keys</text>
                  <text x="16" y="340">are</text>
                  <text x="48" y="340">not</text>
                  <text x="88" y="340">valid</text>
                  <text x="144" y="340">anymore</text>
                  <text x="16" y="436">Are</text>
                  <text x="48" y="436">the</text>
                  <text x="156" y="436">NO</text>
                  <text x="48" y="452">application</text>
                  <text x="116" y="452">keys</text>
                  <text x="220" y="452">Delete</text>
                  <text x="264" y="452">the</text>
                  <text x="328" y="452">application</text>
                  <text x="396" y="452">keys</text>
                  <text x="432" y="452">and</text>
                  <text x="44" y="468">persisted?</text>
                  <text x="208" y="468">the</text>
                  <text x="268" y="468">associated</text>
                  <text x="336" y="468">EDHOC</text>
                  <text x="392" y="468">session</text>
                  <text x="48" y="516">YES</text>
                  <text x="12" y="564">Is</text>
                  <text x="48" y="564">KUDOS</text>
                  <text x="124" y="564">NO</text>
                  <text x="44" y="580">supported?</text>
                  <text x="452" y="612">Derive</text>
                  <text x="496" y="612">and</text>
                  <text x="544" y="612">install</text>
                  <text x="48" y="628">YES</text>
                  <text x="424" y="628">new</text>
                  <text x="488" y="628">application</text>
                  <text x="556" y="628">keys</text>
                  <text x="16" y="676">Run</text>
                  <text x="56" y="676">KUDOS</text>
                  <text x="16" y="772">Has</text>
                  <text x="56" y="772">KUDOS</text>
                  <text x="124" y="772">NO</text>
                  <text x="44" y="788">succeeded?</text>
                  <text x="48" y="836">YES</text>
                  <text x="32" y="884">Install</text>
                  <text x="80" y="884">the</text>
                  <text x="128" y="884">updated</text>
                  <text x="48" y="900">application</text>
                  <text x="116" y="900">keys</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
Invalid access token
specifying AUTH_CRED_C,
or invalid application keys

  |
  |
  v
              NO
Is the       ----> Delete the associated --> Obtain and --> Rerun ---+
access token       EDHOC sessions and        upload a       EDHOC    |
still believed     the application keys      new access              |
to be valid?       derived from those        token            ^      |
  |                                                           |      |
  |                                                           |      |
  |                                                           |      |
  | YES                                                       |      |
  v                                                           |      |
                                                              |      |
The application keys                                          |      |
are not valid anymore                                         |      |
                                                              |      |
  |                                                           |      |
  |                                                           |      |
  v                                                           |      |
                                                              |      |
Are the           NO                                          |      |
application keys -----> Delete the application keys and ------+      |
persisted?              the associated EDHOC session                 |
                                                                     |
  |                             ^        ^                           |
  | YES                         |        |                           |
  v                             |        |                           |
                                |        |                           |
Is KUDOS      NO                |        |                           |
supported? ---------------------+        |                           v
                                         |
  |                                      |           Derive and install
  | YES                                  |         new application keys
  v                                      |
                                         |
Run KUDOS                                |
                                         |
  |                                      |
  |                                      |
  v                                      |
                                         |
Has KUDOS     NO                         |
succeeded? ------------------------------+

  |
  | YES
  v

Install the updated
application keys
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="sec-trust-models">
      <name>Trust Policies for Learning New Authentication Credentials</name>
      <t>A peer P relies on authentication credentials associated with other peers, in order to authenticate those peers when running EDHOC with them.</t>
      <t>There are different ways for P to acquire an authentication credential CRED associated with another peer. For example, CRED can be supplied to P out-of-band by a trusted provider.</t>
      <t>Alternatively, CRED can be specified by the other peer during the EDHOC execution with P. This can rely on EDHOC message_2 or message_3, whose respective ID_CRED_R and ID_CRED_I field can specify CRED by value, or instead a URI or other external reference where CRED can be retrieved from (see <xref section="3.5.3" sectionFormat="of" target="RFC9528"/>).</t>
      <t>Also during the EDHOC execution, an External Authorization Data (EAD) field might include an EAD item that specifies CRED by value or reference. This is the case, e.g., for the EAD items defined by the EDHOC and OSCORE profile of the ACE framework <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. In particular, they can be used for transporting (a reference to) an access token, which in turn specifies by value or by reference the public authentication credential associated with the EDHOC peer acting as ACE client.</t>
      <t>When obtaining a new credential CRED, the peer P has to validate it before storing it. The validation steps to perform depend on the specific type of CRED (e.g., a public key certificate <xref target="RFC5280"/><xref target="I-D.ietf-cose-cbor-encoded-cert"/>) and can rely on (the authentication credential associated with) a trusted third party acting as a trust anchor.</t>
      <t>Upon retrieving a new CRED through the processing of a received EDHOC message and following the successful validation of CRED, the peer P stores CRED only if it assesses CRED to also be (provisionally) trusted, while it must not store CRED otherwise.</t>
      <t>An exception applies for the two unauthenticated operations described in <xref section="D.5" sectionFormat="of" target="RFC9528"/>, where a trust relationship with an unknown or not-yet-trusted endpoint is established later. In such a case, CRED is verified out-of-band at a later stage, or an EDHOC session key is bound to an identity out-of-band at a later stage.</t>
      <t>When processing a received EDHOC message M that specifies an authentication credential CRED, the peer P can enforce one of the trust policies LEARNING and NO-LEARNING specified in <xref target="sec-policy-learning"/> and <xref target="sec-policy-no-learning"/>, in order to determine whether to trust CRED.</t>
      <t>Irrespective of the adopted trust policy, P actually uses CRED only if it is determined to be fine to use in the context of the ongoing EDHOC session, also depending on the specific identity of the other peer (see Sections <xref target="RFC9528" section="3.5" sectionFormat="bare"/> and <xref target="RFC9528" section="D.2" sectionFormat="bare"/> of <xref target="RFC9528"/>). If this is not the case, P aborts the EDHOC session with the other peer.</t>
      <t>If P stores CRED, then P will consider CRED as valid and trusted until:</t>
      <ul spacing="normal">
        <li>
          <t>CRED possibly becomes invalid, e.g., because it expires or because P gains knowledge that it has been revoked; or</t>
        </li>
        <li>
          <t>CRED becomes non-trusted, e.g., because P originally assessed CRED to be provisionally trusted, and later on failed to obtain an expected final confirmation of trust.</t>
        </li>
      </ul>
      <t>P must delete CRED from its local storage if CRED becomes invalid or non-trusted.</t>
      <t>When storing CRED, the peer P should generate the authentication credential identifier(s) corresponding to CRED and store them as associated with CRED. For example, if CRED is a public key certificate, an identifier of CRED can be the hash of the certificate. In general, P should generate and associate with CRED one corresponding identifier for each type of authentication credential identifier that P supports and that is compatible with CRED.</t>
      <t>In future executions of EDHOC with the other peer associated with CRED, this allows such other peer to specify CRED by reference, e.g., by indicating its credential identifier as ID_CRED_R/ID_CRED_I in the EDHOC message_2 or message_3 addressed to the peer P. In turn, this allows P to retrieve CRED from its local storage.</t>
      <section anchor="sec-policy-learning">
        <name>Trust Policy LEARNING</name>
        <t>When enforcing the LEARNING policy, the peer P trusts CRED even if P is not already storing CRED at message reception time.</t>
        <t>That is, upon receiving M, the peer P performs the following steps.</t>
        <ol spacing="normal" type="1"><li>
            <t>P retrieves CRED, as specified by reference or by value in the ID_CRED_I/ID_CRED_R field of M or in the value of an EAD item of M.</t>
          </li>
          <li>
            <t>P checks whether CRED is already being stored and if it is still valid and trusted. In such a case, P trusts CRED and can continue the EDHOC execution. Otherwise, P moves to Step 3.</t>
          </li>
          <li>
            <t>P attempts to validate CRED. If the validation process is not successful, P aborts the EDHOC session with the other peer. Otherwise, P trusts and stores CRED, and can continue the EDHOC execution.</t>
          </li>
        </ol>
      </section>
      <section anchor="sec-policy-no-learning">
        <name>Trust Policy NO-LEARNING</name>
        <t>When enforcing the NO-LEARNING policy, the peer P trusts CRED only if P is already storing CRED at message reception time, unless in cases where situation-specific exceptions apply and are deliberately enforced (see below).</t>
        <t>That is, upon receiving M, the peer P continues the execution of EDHOC only if both the following conditions hold:</t>
        <ul spacing="normal">
          <li>
            <t>P currently stores CRED, as specified by reference or by value in the ID_CRED_I/ID_CRED_R field of M or in the value of an EAD item of M; and</t>
          </li>
          <li>
            <t>CRED is still valid (i.e., P believes CRED to not be expired or revoked) and trusted.</t>
          </li>
        </ul>
        <t>Exceptions may apply and be actually enforced in cases where, during an EDHOC execution, P obtains additional information that allows it to trust and successfully validate CRED, even though CRED is not already stored upon receiving M.</t>
        <t>Such exceptions typically rely on a trusted party that vouches for CRED, e.g., in the cases discussed in <xref target="sec-trust-models-specific"/>. From the point of view of the peer P, the trusted party might have been involved in the background, so that the vouching information about CRED is conveyed within an EDHOC message received during the EDHOC session (e.g., transported by an EAD item). Alternatively, P might directly interact with the trusted party for retrieving the vouching information about CRED, e.g., after having received M and before continuing the EDHOC execution.</t>
        <t>If the peer P admits such an exception and actually enforces it on an authentication credential CRED, then P effectively handles CRED according to the trust policy "LEARNING" specified in <xref target="sec-policy-learning"/>. When doing so, P still attempts to validate CRED, and it aborts the EDHOC session if the validation process is not successful.</t>
      </section>
      <section anchor="sec-trust-models-specific">
        <name>Enforcement of Trust Policies in Specific Scenarios</name>
        <t>The following subsections discuss how an EDHOC peer enforces the trust policies LEARNING and NO-LEARNING in specific scenarios.</t>
        <section anchor="sec-trust-models-ace-prof">
          <name>In the EDHOC and OSCORE Profile of ACE</name>
          <t>As discussed in <xref target="sec-keys-token-invalid"/>, two EDHOC peers can be using the ACE framework <xref target="RFC9200"/> and specifically the EDHOC and OSCORE profile of ACE defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
          <t>In this case, one of the two EDHOC peers, namely PEER_RS, acts as ACE resource server (RS). Instead, the other EDHOC peer, namely PEER_C, acts as ACE client and obtains from an ACE authorization server (AS) an access token for accessing protected resources at PEER_RS. The AS and PEER_RS are in a trust relationship.</t>
          <t>Together with other information, the access token specifies (by value or by reference) the public authentication credential AUTH_CRED_C associated with PEER_C that PEER_C is going to use when running EDHOC with PEER_RS. Note that AUTH_CRED_C will be used as either CRED_I or CRED_R in EDHOC, depending on whether the two peers use the EDHOC forward message flow (i.e., PEER_C is the EDHOC Initiator) or the EDHOC reverse message flow (i.e., PEER_C is the EDHOC Responder), respectively (see <xref section="A.2" sectionFormat="of" target="RFC9528"/>).</t>
          <t>When the AS issues the first access token that specifies AUTH_CRED_C and is intended to be uploaded to PEER_RS, it is expected that the access token specifies AUTH_CRED_C by value and that PEER_RS is not currently storing AUTH_CRED_C, but instead will obtain it and learn it upon receiving the access token.</t>
          <t>Although the AS can upload the access token to PEER_RS on behalf of PEER_C as per the alternative SDC workflow defined in <xref target="I-D.ietf-ace-workflow-and-params"/>, the access token is typically uploaded to PEER_RS by PEER_C through a dedicated EAD item, when running EDHOC with PEER_RS. Consequently, PEER_RS has to learn AUTH_CRED_C as a new authentication credential during an EDHOC session with PEER_C.</t>
          <t>At least for its EDHOC resource used for exchanging the EDHOC messages of the EDHOC session in question, this requires PEER_RS to:</t>
          <ul spacing="normal">
            <li>
              <t>Enforce the trust policy "LEARNING"; or</t>
            </li>
            <li>
              <t>If enforcing the trust policy "NO-LEARNING", additionally enforce an overriding exception when an incoming EDHOC message includes an EAD item conveying (a reference to) a valid access token issued by a trusted AS.  </t>
              <t>
That is, through a successful verification of the access token, PEER_RS is able to trust AUTH_CRED_C (if found valid), even though it did not already store AUTH_CRED_C upon receiving the EDHOC message with the EAD item.</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-trust-models-ela">
          <name>In the Lightweight Authorization using EDHOC (ELA) Procedure</name>
          <t>Editor's note: the text in this section reflects an upcoming update in draft-ietf-lake-authz, which is expected to appear in version -07 of that document.</t>
          <t>When the execution of EDHOC embeds the ELA procedure defined in <xref target="I-D.ietf-lake-authz"/>, the EDHOC peer U receives an EDHOC message_2 (message_3) where ID_CRED_R (ID_CRED_I) specifies by value the authentication credential CRED associated with the other peer V.</t>
          <t>Furthermore, an EDHOC message sent to U includes an EAD item, which specifies a voucher issued by a trusted enrollment server W. The voucher is an assertion to U that W has authorized V and has endorsed CRED.</t>
          <t>The specific EDHOC message that includes the EAD item conveying the voucher depends on whether U and V use the EDHOC forward message flow (i.e., U is the EDHOC Initiator) or the EDHOC reverse message flow (i.e., U is the EDHOC Responder). In particular:</t>
          <ul spacing="normal">
            <li>
              <t>When using the EDHOC forward message flow, the EAD item is included in EDHOC message_4, thereby endorsing CRED that was specified by ID_CRED_R in the previous EDHOC message_2.  </t>
              <t>
Since it is indeed expected that U does not already store CRED upon receiving EDHOC message_2, U can at best provisionally trust CRED (if found valid) when retrieving it from EDHOC message_2.</t>
            </li>
            <li>
              <t>When using the EDHOC reverse message flow, the EAD item is included in EDHOC message_3, thereby endorsing CRED that is specified by ID_CRED_I in the same EDHOC message.</t>
            </li>
          </ul>
          <t>In either case, through a successful verification of the voucher, U is able to ultimately trust CRED (if found valid), even though U did not already store CRED upon receiving the EDHOC message specifying CRED.</t>
          <t>Therefore, if U enforces the trust policy "NO-LEARNING", it can additionally enforce an overriding exception as below:</t>
          <ul spacing="normal">
            <li>
              <t>When using the EDHOC forward message flow, the exception is enforced when processing an EDHOC message_2, and it is raised by the intention of using the ELA procedure. That is, U intends to proceed with sending a consistent EDHOC message_3 that indicates the wish to obtain a voucher issued by W.  </t>
              <t>
At that point in time, the authentication credential CRED is only provisionally trusted (if found valid), with the expectation to receive an EDHOC message_4 in the same EDHOC session, conveying a valid voucher issued by W and thus confirming that CRED can be ultimately trusted.</t>
            </li>
            <li>
              <t>When using the EDHOC reverse message flow, the exception is enforced when processing an EDHOC message_3, and it is raised by the EDHOC message_3 including an EAD item that conveys a valid voucher issued by W, thus confirming that CRED can be ultimately trusted.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-message-side-processing">
      <name>Side Processing of Incoming EDHOC Messages</name>
      <t>This section describes an approach that EDHOC peers can use upon receiving EDHOC messages, in order to fetch/validate authentication credentials and to process External Authorization Data (EAD) items.</t>
      <t>As per <xref section="9.1" sectionFormat="of" target="RFC9528"/>, the EDHOC protocol provides a transport mechanism for conveying EAD items, but specifications defining those items have to set the ground for "agreeing on the surrounding context and the meaning of the information passed to and from the application".</t>
      <t>The approach described in this section aims to help implementers navigate the surrounding context mentioned above, irrespective of the specific EAD items conveyed in the EDHOC messages. In particular, the described approach takes into account the following points:</t>
      <ul spacing="normal">
        <li>
          <t>The fetching and validation of the authentication credential associated with the other peer relies on ID_CRED_I in EDHOC message_2, or on ID_CRED_R in EDHOC message_3, or on the value of an EAD item. When this occurs upon receiving EDHOC message_2 or message_3, the decryption of the EDHOC message has to be completed first.  </t>
          <t>
Validating the authentication credential or assessing whether it is trusted might depend on using the value of an EAD item, which in turn has to be validated first.</t>
        </li>
        <li>
          <t>It is possible that some EAD items can be processed only after having successfully verified the EDHOC message, i.e., after a successful verification of the Signature_or_MAC field in EDHOC message_2 or message_3.  </t>
          <t>
For instance, an EAD item within the EAD_3 field of EDHOC message_3 might contain a Certificate Signing Request (CSR) <xref target="RFC2986"/>. Hence, such an EAD item can be processed only once the recipient peer has attained proof that the other peer possesses its own private key.</t>
        </li>
      </ul>
      <t>In order to conveniently handle such processing, the application can prepare in advance a "side-processor object" (SPO), which takes care of the operations above during the EDHOC execution.</t>
      <t>In particular, the application provides EDHOC with the SPO before starting an EDHOC execution, during which EDHOC will temporarily transfer control to the SPO at the right point in time, in order to perform the required side-processing of an incoming EDHOC message.</t>
      <t>Furthermore, the application has to instruct the SPO about:</t>
      <ul spacing="normal">
        <li>
          <t>How to prepare any EAD item such that: it has to be included in an outgoing EDHOC message; and it is independent of the processing of other EAD items included in incoming EDHOC messages. This includes, for instance, the preparation of padding EAD items (see <xref section="3.8.1" sectionFormat="of" target="RFC9528"/>).</t>
        </li>
        <li>
          <t>The list of EAD items that are expected to be present in specific, incoming EDHOC messages during the EDHOC session. This takes into account, for instance, external security applications that will be integrated in the EDHOC session (e.g., see <xref target="I-D.ietf-lake-authz"/>).  </t>
          <t>
Throughout the EDHOC session, the SPO keeps such a list of expected EAD items up-to-date. This takes into account, for instance, external security applications that have been run integrated in the EDHOC session, the current status of the session, as well as the EDHOC messages that have been exchanged during the session and the outcome of their processing.</t>
        </li>
      </ul>
      <t>At the right point in time during the processing of an incoming EDHOC message M at the peer P, EDHOC invokes the SPO and provides it with the following input:</t>
      <ul spacing="normal">
        <li>
          <t>When M is EDHOC message_2 or message_3, an indication of whether this invocation is happening before or after the message verification (i.e., before or after having verified the Signature_or_MAC field).</t>
        </li>
        <li>
          <t>The full set of information related to the current EDHOC session. This especially includes the selected cipher suite and the ephemeral Diffie-Hellman public keys G_X and G_Y that the two peers have exchanged in the EDHOC session.</t>
        </li>
        <li>
          <t>The authentication credentials that the peer P stores as associated with other peers.</t>
        </li>
        <li>
          <t>All the decrypted information elements retrieved from M.</t>
        </li>
        <li>
          <t>The EAD items included in M.  </t>
          <ul spacing="normal">
            <li>
              <t>Note that EDHOC might do some preliminary work on M before invoking the SPO, in order to provide the SPO only with actually relevant EAD items. This requires the application to additionally provide EDHOC with the ead_labels of the EAD items that the peer P recognizes (see <xref section="3.8" sectionFormat="of" target="RFC9528"/>).      </t>
              <t>
With such information available, EDHOC can early abort the current session in case M includes any EAD item which is both critical and not recognized by the peer P.      </t>
              <t>
If no such EAD items are found, EDHOC can remove any padding EAD item (see <xref section="3.8.1" sectionFormat="of" target="RFC9528"/>), as well as any EAD item which is neither critical nor recognized (since the SPO is going to ignore it anyway). This results in EDHOC providing the SPO only with EAD items that will be recognized and that require actual processing.</t>
            </li>
            <li>
              <t>Note that, after having processed the EAD items, the SPO might actually need to store them throughout the whole EDHOC execution, e.g., in order to refer to them also when processing later EDHOC messages in the current EDHOC session.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>The SPO performs the following tasks on an incoming EDHOC message M:</t>
      <ul spacing="normal">
        <li>
          <t>The SPO checks whether M does not include an EAD item whose presence was expected, based on the related list maintained throughout the EDHOC session. If such an EAD item is absent, the SPO can come to an early determination about whether and how to proceed with the processing of M.  </t>
          <t>
In particular, if an EAD item is absent although its presence was strictly required, then the SPO can early abort the EDHOC session, thereby avoiding potentially costly operations (e.g., the retrieval and validation of the authentication credential associated with the other peer).</t>
        </li>
        <li>
          <t>The SPO fetches and/or validates the authentication credential CRED associated with the other peer, based on a dedicated EAD item of M or on the ID_CRED field of M (for EDHOC message_2 or message_3).</t>
        </li>
        <li>
          <t>The SPO processes the EAD items conveyed in the EAD field of M.</t>
        </li>
        <li>
          <t>The SPO stores the results of the performed operations and makes such results available to the application.</t>
        </li>
        <li>
          <t>When the SPO has completed its side processing and transfers control back to EDHOC, the SPO provides EDHOC with the produced EAD items to include in the EAD field of the next outgoing EDHOC message. The production of such EAD items can be triggered, e.g., by:  </t>
          <ul spacing="normal">
            <li>
              <t>The consumption of EAD items included in M.</t>
            </li>
            <li>
              <t>The execution of instructions that the SPO has received from the application, concerning EAD items to produce irrespective of other EAD items included in M.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>In the following, <xref target="sec-message-side-processing-m1"/> to <xref target="sec-message-side-processing-m2-m3"/> describe more in detail the actions performed by the SPO on the different incoming EDHOC messages. Then, <xref target="sec-consistency-checks-auth-creds"/> describes further special handling of incoming EDHOC messages, as to consistency checks concerning authentication credentials in particular situations.</t>
      <t>After completing the EDHOC execution, control is transferred back to the application. In particular, the application is provided with the overall outcome of the EDHOC execution (i.e., successful completion or failure), together with possible specific results produced by the SPO throughout the EDHOC execution (e.g., due to the processing of EAD items).</t>
      <t>After that, the application might need to perform follow-up actions, depending on the outcome of the EDHOC execution. For example, the SPO might have preliminarily filled application-level data structures, as a result of processing EAD items. In case of successful EDHOC execution, the application might need to finalize such data structures. Instead, in case of unsuccessful EDHOC execution, the application might need to clean-up or amend such data structures, or even roll back what the SPO did, unless the SPO already performed such actions before control was transferred back to the application.</t>
      <section anchor="sec-message-side-processing-m1">
        <name>EDHOC message_1</name>
        <t>During the processing of an incoming EDHOC message_1, EDHOC invokes the SPO only once, after the Responder peer has successfully decoded the message and accepted the selected cipher suite.</t>
        <t>If the EAD_1 field is present, the SPO processes the EAD items included therein.</t>
        <t>Once all such EAD items have been processed, the SPO transfers control back to EDHOC. When doing so, the SPO also provides EDHOC with any produced EAD items to include in the EAD field of the next outgoing EDHOC message.</t>
        <t>Then, EDHOC resumes its execution and advances its protocol state.</t>
        <t>Future extensions of EDHOC or external security applications integrated into EDHOC might require a processing of EDHOC message_1 that is more advanced than the currently expected one. In particular, an EAD item conveyed in EDHOC message_1 might specify the authentication credential CRED associated with the Initiator (by value or by reference), as wrapped in a cryptographically protected "envelope". In such a case, the processing of an incoming EDHOC message_1 shares similarities with that of an incoming EDHOC message_2 or message_3 (see <xref target="sec-message-side-processing-m2-m3"/>), as it is further elaborated in <xref target="sec-message-side-processing-m1-advanced"/>.</t>
      </section>
      <section anchor="sec-message-side-processing-m4">
        <name>EDHOC message_4</name>
        <t>During the processing of an incoming EDHOC message_4, EDHOC invokes the SPO only once, after the Initiator peer has successfully decrypted the message.</t>
        <t>If the EAD_4 field is present, the SPO processes the EAD items included therein.</t>
        <t>Once all such EAD items have been processed, the SPO transfers control back to EDHOC, which resumes its execution and advances its protocol state.</t>
      </section>
      <section anchor="sec-message-side-processing-m2-m3">
        <name>EDHOC message_2 and message_3</name>
        <t>The following refers to "message_X" as an incoming EDHOC message_2 or message_3, and to "message verification" as the verification of Signature_or_MAC_X in message_X.</t>
        <t>During the processing of a message_X, EDHOC invokes the SPO two times:</t>
        <ul spacing="normal">
          <li>
            <t>Right after message_X has been decrypted and before its verification starts. Following this invocation, the SPO performs the actions described in <xref target="sec-pre-verif"/>.</t>
          </li>
          <li>
            <t>Right after message_X has been successfully verified. Following this invocation, the SPO performs the actions described in <xref target="sec-post-verif"/>.</t>
          </li>
        </ul>
        <t>The flowcharts in <xref target="sec-m2-m3-flowcharts"/> show the high-level interaction between the core EDHOC processing and the SPO, as well as the different steps taken for processing an incoming message_X.</t>
        <section anchor="sec-pre-verif">
          <name>Pre-Verification Side Processing</name>
          <t>The pre-verification side processing occurs in two sequential phases, namely PHASE_1 (see <xref target="sec-pre-verif-phase-1"/>) and PHASE_2 (see <xref target="sec-pre-verif-phase-2"/>).</t>
          <section anchor="sec-pre-verif-phase-1">
            <name>PHASE_1</name>
            <t>During PHASE_1, the SPO at the recipient peer P determines CRED, i.e., the authentication credential associated with the other peer to be used in the ongoing EDHOC session. In particular, the SPO first checks whether expected EAD items are absent in message_X (see <xref target="sec-message-side-processing"/>), and then performs the following steps.</t>
            <ol spacing="normal" type="1"><li>
                <t>The SPO determines CRED based on ID_CRED_X or on an EAD item included in message_X.  </t>
                <t>
Those may specify CRED by value or by reference, including a URI or other external reference where CRED can be retrieved from.  </t>
                <t>
If CRED is already installed, the SPO moves to Step 2. Otherwise, the SPO moves to Step 3.</t>
              </li>
              <li>
                <t>The SPO determines if the stored CRED is currently trusted and valid, e.g., by verifying that CRED has not expired and has not been revoked.  </t>
                <t>
Performing such a validation might require the SPO to first process an EAD item included in message_X. For example, it can be an EAD item in EDHOC message_2 that confirms or revokes the validity of CRED_R specified by ID_CRED_R, as the result of an OCSP process <xref target="RFC6960"/>.  </t>
                <t>
In case CRED is determined to be valid, the SPO moves to Step 9. Otherwise, the SPO moves to Step 11.</t>
              </li>
              <li>
                <t>The SPO attempts to retrieve CRED via ID_CRED_X or an EAD item considered at Step 1. Then, the SPO moves to Step 4.</t>
              </li>
              <li>
                <t>If the retrieval of CRED has succeeded, the SPO moves to Step 5. Otherwise, the SPO moves to Step 11.</t>
              </li>
              <li>
                <t>If the enforced trust policy for new authentication credentials is "NO-LEARNING" and P does not admit any exceptions that are acceptable to enforce for message_X (see <xref target="sec-policy-no-learning"/>), the SPO moves to Step 11. Otherwise, the SPO moves to Step 6.</t>
              </li>
              <li>
                <t>If this step has been reached, the peer P is not already storing the retrieved CRED and, at the same time, it enforces either the trust policy "LEARNING" or the trust policy "NO-LEARNING" while also enforcing an exception acceptable for message_X (see <xref target="sec-policy-no-learning"/>).  </t>
                <t>
Consistently, the SPO determines if CRED is currently valid, e.g., by verifying that CRED has not expired and has not been revoked.  </t>
                <t>
Validating CRED might require the SPO to first process an EAD item included in message_X. For example, it can be an OCSP response <xref target="RFC6960"/> for validating CRED_R as a public key certificate transported by value or reference in ID_CRED_R.  </t>
                <t>
After successfully validating CRED, the peer P can typically consider CRED as ultimately trusted as well. However, there can be cases where P requires to obtain additional information before doing so.  </t>
                <t>
If such additional information can be retrieved from message_X (e.g., from an EAD item included therein), then P uses it to assess if CRED is trusted. Otherwise, if such additional information is expected later on during the EDHOC session, it can be acceptable for P to consider CRED as provisionally trusted.  </t>
                <t><xref target="sec-trust-models-ela"/> discusses the ELA procedure defined in <xref target="I-D.ietf-lake-authz"/>, as a case in point where additional information required by the peer P to trust CRED could not be included in the same message that specifies CRED.  </t>
                <t>
Editor's note: the previous paragraph reflects an upcoming update in draft-ietf-lake-authz, which is expected to appear in version -07 of that document.  </t>
                <t>
After completing the validation and trust assessment of CRED, the SPO moves to Step 7.</t>
              </li>
              <li>
                <t>If CRED has been determined valid and (provisionally) trusted, the SPO moves to Step 8. Otherwise, the SPO moves to Step 11.</t>
              </li>
              <li>
                <t>The SPO stores CRED as a valid and (provisionally) trusted authentication credential associated with the other peer, together with corresponding authentication credential identifiers (see <xref target="sec-trust-models"/>). Then, the SPO moves to Step 9.</t>
              </li>
              <li>
                <t>The SPO checks if CRED is fine to use in the context of the ongoing EDHOC session, also depending on the specific identity of the other peer (see Sections <xref target="RFC9528" section="3.5" sectionFormat="bare"/> and <xref target="RFC9528" section="D.2" sectionFormat="bare"/> of <xref target="RFC9528"/>).  </t>
                <t>
If this is the case, the SPO moves to Step 10. Otherwise, the SPO moves to Step 11.</t>
              </li>
              <li>
                <t>P uses CRED as authentication credential associated with the other peer in the ongoing EDHOC session.  </t>
                <t>
Then, PHASE_1 ends and the pre-verification side processing moves to the next PHASE_2 (see <xref target="sec-pre-verif-phase-2"/>).</t>
              </li>
              <li>
                <t>The SPO has not found a valid and (provisionally) trusted authentication credential associated with the other peer that can be used in the ongoing EDHOC session. Therefore, the EDHOC session with the other peer is aborted.</t>
              </li>
            </ol>
          </section>
          <section anchor="sec-pre-verif-phase-2">
            <name>PHASE_2</name>
            <t>During PHASE_2, the SPO processes any EAD item included in message_X such that both the following conditions hold:</t>
            <ul spacing="normal">
              <li>
                <t>The EAD item has <em>not</em> already been processed during PHASE_1.</t>
              </li>
              <li>
                <t>The EAD item can be processed before performing the verification of message_X.</t>
              </li>
            </ul>
            <t>Once all such EAD items have been processed, the SPO transfers control back to EDHOC, which either aborts the ongoing EDHOC session or continues the processing of message_X with its corresponding message verification.</t>
          </section>
        </section>
        <section anchor="sec-post-verif">
          <name>Post-Verification Side Processing</name>
          <t>During the post-verification side processing, the SPO processes any EAD item included in message_X such that the processing of that EAD item had to wait for completing the successful message verification.</t>
          <t>The late processing of such EAD items is typically due to the fact that a pre-requirement has to be fulfilled first.</t>
          <t>For example, the recipient peer P has to have first verified that the other peer does possess the private key corresponding to the public key specified by CRED, i.e., the authentication credential associated with the other peer that was determined during the pre-verification side processing (see <xref target="sec-pre-verif"/>). This requirement is fulfilled after a successful verification of message_X.</t>
          <t>Once all such EAD items have been processed, the SPO transfers control back to EDHOC. When doing so, the SPO also provides EDHOC with any produced EAD items to include in the EAD field of the next outgoing EDHOC message.</t>
          <t>Then, EDHOC resumes its execution and advances its protocol state.</t>
        </section>
        <section anchor="sec-m2-m3-flowcharts">
          <name>Flowcharts</name>
          <t>The flowchart in <xref target="fig-flowchart-spo-high-level"/> shows the high-level interaction between the core EDHOC processing and the SPO, with particular reference to an incoming EDHOC message_2 or message_3.</t>
          <figure anchor="fig-flowchart-spo-high-level">
            <name>High-Level Interaction Between the Core EDHOC Processing and the Side-Processor Object (SPO), for EDHOC message_2 and message_3.</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="848" width="576" viewBox="0 0 576 848" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,128 L 8,384" fill="none" stroke="black"/>
                  <path d="M 8,512 L 8,832" fill="none" stroke="black"/>
                  <path d="M 24,176 L 24,224" fill="none" stroke="black"/>
                  <path d="M 24,560 L 24,800" fill="none" stroke="black"/>
                  <path d="M 56,96 L 56,168" fill="none" stroke="black"/>
                  <path d="M 64,288 L 64,336" fill="none" stroke="black"/>
                  <path d="M 120,176 L 120,224" fill="none" stroke="black"/>
                  <path d="M 144,344 L 144,552" fill="none" stroke="black"/>
                  <path d="M 160,176 L 160,224" fill="none" stroke="black"/>
                  <path d="M 176,232 L 176,280" fill="none" stroke="black"/>
                  <path d="M 184,288 L 184,336" fill="none" stroke="black"/>
                  <path d="M 224,288 L 224,336" fill="none" stroke="black"/>
                  <path d="M 240,344 L 240,552" fill="none" stroke="black"/>
                  <path d="M 248,560 L 248,800" fill="none" stroke="black"/>
                  <path d="M 296,176 L 296,224" fill="none" stroke="black"/>
                  <path d="M 296,560 L 296,608" fill="none" stroke="black"/>
                  <path d="M 336,344 L 336,552" fill="none" stroke="black"/>
                  <path d="M 392,288 L 392,336" fill="none" stroke="black"/>
                  <path d="M 400,176 L 400,224" fill="none" stroke="black"/>
                  <path d="M 416,232 L 416,552" fill="none" stroke="black"/>
                  <path d="M 488,608 L 488,640" fill="none" stroke="black"/>
                  <path d="M 536,176 L 536,224" fill="none" stroke="black"/>
                  <path d="M 536,560 L 536,608" fill="none" stroke="black"/>
                  <path d="M 568,128 L 568,384" fill="none" stroke="black"/>
                  <path d="M 568,512 L 568,832" fill="none" stroke="black"/>
                  <path d="M 8,128 L 48,128" fill="none" stroke="black"/>
                  <path d="M 64,128 L 568,128" fill="none" stroke="black"/>
                  <path d="M 24,176 L 120,176" fill="none" stroke="black"/>
                  <path d="M 160,176 L 296,176" fill="none" stroke="black"/>
                  <path d="M 400,176 L 536,176" fill="none" stroke="black"/>
                  <path d="M 128,192 L 152,192" fill="none" stroke="black"/>
                  <path d="M 24,224 L 120,224" fill="none" stroke="black"/>
                  <path d="M 160,224 L 296,224" fill="none" stroke="black"/>
                  <path d="M 400,224 L 536,224" fill="none" stroke="black"/>
                  <path d="M 64,288 L 184,288" fill="none" stroke="black"/>
                  <path d="M 224,288 L 392,288" fill="none" stroke="black"/>
                  <path d="M 64,336 L 184,336" fill="none" stroke="black"/>
                  <path d="M 224,336 L 392,336" fill="none" stroke="black"/>
                  <path d="M 8,384 L 136,384" fill="none" stroke="black"/>
                  <path d="M 152,384 L 232,384" fill="none" stroke="black"/>
                  <path d="M 248,384 L 328,384" fill="none" stroke="black"/>
                  <path d="M 344,384 L 408,384" fill="none" stroke="black"/>
                  <path d="M 424,384 L 568,384" fill="none" stroke="black"/>
                  <path d="M 8,512 L 136,512" fill="none" stroke="black"/>
                  <path d="M 152,512 L 232,512" fill="none" stroke="black"/>
                  <path d="M 248,512 L 328,512" fill="none" stroke="black"/>
                  <path d="M 344,512 L 408,512" fill="none" stroke="black"/>
                  <path d="M 424,512 L 568,512" fill="none" stroke="black"/>
                  <path d="M 24,560 L 248,560" fill="none" stroke="black"/>
                  <path d="M 296,560 L 536,560" fill="none" stroke="black"/>
                  <path d="M 296,608 L 480,608" fill="none" stroke="black"/>
                  <path d="M 496,608 L 536,608" fill="none" stroke="black"/>
                  <path d="M 256,640 L 312,640" fill="none" stroke="black"/>
                  <path d="M 432,640 L 480,640" fill="none" stroke="black"/>
                  <path d="M 24,800 L 248,800" fill="none" stroke="black"/>
                  <path d="M 8,832 L 568,832" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="424,232 412,226.4 412,237.6" fill="black" transform="rotate(270,416,232)"/>
                  <polygon class="arrowhead" points="344,552 332,546.4 332,557.6" fill="black" transform="rotate(90,336,552)"/>
                  <polygon class="arrowhead" points="248,344 236,338.4 236,349.6" fill="black" transform="rotate(270,240,344)"/>
                  <polygon class="arrowhead" points="184,280 172,274.4 172,285.6" fill="black" transform="rotate(90,176,280)"/>
                  <polygon class="arrowhead" points="160,192 148,186.4 148,197.6" fill="black" transform="rotate(0,152,192)"/>
                  <polygon class="arrowhead" points="152,552 140,546.4 140,557.6" fill="black" transform="rotate(90,144,552)"/>
                  <polygon class="arrowhead" points="64,168 52,162.4 52,173.6" fill="black" transform="rotate(90,56,168)"/>
                  <circle cx="248" cy="640" r="6" class="opendot" fill="white" stroke="black"/>
                  <circle cx="488" cy="608" r="6" class="opendot" fill="white" stroke="black"/>
                  <circle cx="488" cy="640" r="6" class="opendot" fill="white" stroke="black"/>
                  <g class="text">
                    <text x="36" y="36">Incoming</text>
                    <text x="24" y="52">EDHOC</text>
                    <text x="88" y="52">message_X</text>
                    <text x="12" y="68">(X</text>
                    <text x="32" y="68">=</text>
                    <text x="48" y="68">2</text>
                    <text x="68" y="68">or</text>
                    <text x="92" y="68">3)</text>
                    <text x="404" y="148">Core</text>
                    <text x="448" y="148">EDHOC</text>
                    <text x="516" y="148">processing</text>
                    <text x="60" y="196">Decode</text>
                    <text x="204" y="196">Retrieve</text>
                    <text x="256" y="196">the</text>
                    <text x="440" y="196">Advance</text>
                    <text x="488" y="196">the</text>
                    <text x="72" y="212">message_X</text>
                    <text x="204" y="212">protocol</text>
                    <text x="264" y="212">state</text>
                    <text x="444" y="212">protocol</text>
                    <text x="504" y="212">state</text>
                    <text x="104" y="308">Decrypt</text>
                    <text x="260" y="308">Verify</text>
                    <text x="124" y="324">CIPHERTEXT_X</text>
                    <text x="308" y="324">Signature_or_MAC_X</text>
                    <text x="496" y="420">.................</text>
                    <text x="108" y="436">Divert</text>
                    <text x="208" y="436">Get</text>
                    <text x="300" y="436">Divert</text>
                    <text x="384" y="436">Get</text>
                    <text x="432" y="436">:</text>
                    <text x="456" y="436">EAD</text>
                    <text x="496" y="436">items</text>
                    <text x="560" y="436">:</text>
                    <text x="212" y="452">back</text>
                    <text x="388" y="452">back</text>
                    <text x="432" y="452">:</text>
                    <text x="456" y="452">for</text>
                    <text x="488" y="452">the</text>
                    <text x="524" y="452">next</text>
                    <text x="560" y="452">:</text>
                    <text x="432" y="468">:</text>
                    <text x="464" y="468">EDHOC</text>
                    <text x="520" y="468">message</text>
                    <text x="560" y="468">:</text>
                    <text x="496" y="484">:...............:</text>
                    <text x="44" y="580">a)</text>
                    <text x="80" y="580">Check</text>
                    <text x="136" y="580">whether</text>
                    <text x="204" y="580">expected</text>
                    <text x="348" y="580">Processing</text>
                    <text x="404" y="580">of</text>
                    <text x="72" y="596">EAD</text>
                    <text x="112" y="596">items</text>
                    <text x="152" y="596">are</text>
                    <text x="196" y="596">absent</text>
                    <text x="376" y="596">post-verification</text>
                    <text x="464" y="596">EAD</text>
                    <text x="504" y="596">items</text>
                    <text x="44" y="612">b)</text>
                    <text x="96" y="612">Retrieval</text>
                    <text x="152" y="612">and</text>
                    <text x="100" y="628">validation</text>
                    <text x="156" y="628">of</text>
                    <text x="200" y="628">CRED_X;</text>
                    <text x="44" y="644">c)</text>
                    <text x="80" y="644">Trust</text>
                    <text x="148" y="644">assessment</text>
                    <text x="348" y="644">Shared</text>
                    <text x="400" y="644">state</text>
                    <text x="68" y="660">of</text>
                    <text x="112" y="660">CRED_X;</text>
                    <text x="44" y="676">d)</text>
                    <text x="100" y="676">Processing</text>
                    <text x="156" y="676">of</text>
                    <text x="404" y="676">......................</text>
                    <text x="124" y="692">pre-verification</text>
                    <text x="320" y="692">:</text>
                    <text x="380" y="692">Instructions</text>
                    <text x="456" y="692">about</text>
                    <text x="488" y="692">:</text>
                    <text x="72" y="708">EAD</text>
                    <text x="112" y="708">items</text>
                    <text x="320" y="708">:</text>
                    <text x="344" y="708">EAD</text>
                    <text x="384" y="708">items</text>
                    <text x="420" y="708">to</text>
                    <text x="488" y="708">:</text>
                    <text x="320" y="724">:</text>
                    <text x="392" y="724">unconditionally</text>
                    <text x="488" y="724">:</text>
                    <text x="40" y="740">-</text>
                    <text x="64" y="740">(b)</text>
                    <text x="96" y="740">and</text>
                    <text x="128" y="740">(d)</text>
                    <text x="168" y="740">might</text>
                    <text x="212" y="740">have</text>
                    <text x="320" y="740">:</text>
                    <text x="360" y="740">produce</text>
                    <text x="408" y="740">for</text>
                    <text x="440" y="740">the</text>
                    <text x="488" y="740">:</text>
                    <text x="60" y="756">to</text>
                    <text x="96" y="756">occur</text>
                    <text x="132" y="756">in</text>
                    <text x="180" y="756">parallel</text>
                    <text x="320" y="756">:</text>
                    <text x="348" y="756">next</text>
                    <text x="392" y="756">EDHOC</text>
                    <text x="448" y="756">message</text>
                    <text x="488" y="756">:</text>
                    <text x="40" y="772">-</text>
                    <text x="64" y="772">(c)</text>
                    <text x="112" y="772">depends</text>
                    <text x="156" y="772">on</text>
                    <text x="184" y="772">the</text>
                    <text x="404" y="772">:....................:</text>
                    <text x="72" y="788">trust</text>
                    <text x="124" y="788">policy</text>
                    <text x="172" y="788">used</text>
                    <text x="396" y="820">Side-Processor</text>
                    <text x="484" y="820">Object</text>
                    <text x="536" y="820">(SPO)</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
Incoming
EDHOC message_X
(X = 2 or 3)

      |
      |
+-----|---------------------------------------------------------------+
|     |                                         Core EDHOC processing |
|     v                                                               |
| +-----------+    +----------------+            +----------------+   |
| | Decode    |--->| Retrieve the   |            | Advance the    |   |
| | message_X |    | protocol state |            | protocol state |   |
| +-----------+    +----------------+            +----------------+   |
|                    |                             ^                  |
|                    |                             |                  |
|                    v                             |                  |
|      +--------------+    +--------------------+  |                  |
|      | Decrypt      |    | Verify             |  |                  |
|      | CIPHERTEXT_X |    | Signature_or_MAC_X |  |                  |
|      +--------------+    +--------------------+  |                  |
|                |           ^           |         |                  |
|                |           |           |         |                  |
+----------------|-----------|-----------|---------|------------------+
                 |           |           |         |
                 |           |           |         | .................
          Divert |      Get  |    Divert |    Get  | : EAD items     :
                 |      back |           |    back | : for the next  :
                 |           |           |         | : EDHOC message :
                 |           |           |         | :...............:
                 |           |           |         |
+----------------|-----------|-----------|---------|------------------+
|                |           |           |         |                  |
|                v           |           v         |                  |
| +---------------------------+     +-----------------------------+   |
| | a) Check whether expected |     | Processing of               |   |
| |    EAD items are absent   |     | post-verification EAD items |   |
| | b) Retrieval and          |     +-----------------------o-----+   |
| |    validation of CRED_X;  |                             |         |
| | c) Trust assessment       o-------- Shared state -------o         |
| |    of CRED_X;             |                                       |
| | d) Processing of          |        ......................         |
| |    pre-verification       |        : Instructions about :         |
| |    EAD items              |        : EAD items to       :         |
| |                           |        : unconditionally    :         |
| | - (b) and (d) might have  |        : produce for the    :         |
| |   to occur in parallel    |        : next EDHOC message :         |
| | - (c) depends on the      |        :....................:         |
| |   trust policy used       |                                       |
| +---------------------------+                                       |
|                                         Side-Processor Object (SPO) |
+---------------------------------------------------------------------+
]]></artwork>
            </artset>
          </figure>
          <t>The flowchart in <xref target="fig-flowchart-spo-low-level"/> shows the different steps taken for processing an incoming EDHOC message_2 and message_3.</t>
          <figure anchor="fig-flowchart-spo-low-level">
            <name>Processing Steps for EDHOC message_2 and message_3.</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="2560" width="576" viewBox="0 0 576 2560" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,512 L 8,1552" fill="none" stroke="black"/>
                  <path d="M 8,1600 L 8,1728" fill="none" stroke="black"/>
                  <path d="M 8,2080 L 8,2320" fill="none" stroke="black"/>
                  <path d="M 16,144 L 16,176" fill="none" stroke="black"/>
                  <path d="M 16,240 L 16,288" fill="none" stroke="black"/>
                  <path d="M 16,352 L 16,384" fill="none" stroke="black"/>
                  <path d="M 16,1904 L 16,1936" fill="none" stroke="black"/>
                  <path d="M 16,2496 L 16,2544" fill="none" stroke="black"/>
                  <path d="M 24,560 L 24,608" fill="none" stroke="black"/>
                  <path d="M 24,672 L 24,752" fill="none" stroke="black"/>
                  <path d="M 24,864 L 24,928" fill="none" stroke="black"/>
                  <path d="M 24,1024 L 24,1104" fill="none" stroke="black"/>
                  <path d="M 24,1392 L 24,1520" fill="none" stroke="black"/>
                  <path d="M 24,1648 L 24,1696" fill="none" stroke="black"/>
                  <path d="M 24,2128 L 24,2176" fill="none" stroke="black"/>
                  <path d="M 24,2240 L 24,2288" fill="none" stroke="black"/>
                  <path d="M 88,96 L 88,136" fill="none" stroke="black"/>
                  <path d="M 88,184 L 88,232" fill="none" stroke="black"/>
                  <path d="M 88,296 L 88,344" fill="none" stroke="black"/>
                  <path d="M 88,392 L 88,416" fill="none" stroke="black"/>
                  <path d="M 88,496 L 88,552" fill="none" stroke="black"/>
                  <path d="M 88,616 L 88,664" fill="none" stroke="black"/>
                  <path d="M 88,760 L 88,856" fill="none" stroke="black"/>
                  <path d="M 88,936 L 88,1016" fill="none" stroke="black"/>
                  <path d="M 88,1112 L 88,1384" fill="none" stroke="black"/>
                  <path d="M 88,1528 L 88,1640" fill="none" stroke="black"/>
                  <path d="M 88,1704 L 88,1776" fill="none" stroke="black"/>
                  <path d="M 88,1856 L 88,1896" fill="none" stroke="black"/>
                  <path d="M 88,1944 L 88,1984" fill="none" stroke="black"/>
                  <path d="M 88,2064 L 88,2120" fill="none" stroke="black"/>
                  <path d="M 88,2184 L 88,2232" fill="none" stroke="black"/>
                  <path d="M 88,2296 L 88,2368" fill="none" stroke="black"/>
                  <path d="M 88,2448 L 88,2488" fill="none" stroke="black"/>
                  <path d="M 152,2496 L 152,2544" fill="none" stroke="black"/>
                  <path d="M 168,864 L 168,928" fill="none" stroke="black"/>
                  <path d="M 168,1904 L 168,1936" fill="none" stroke="black"/>
                  <path d="M 176,144 L 176,176" fill="none" stroke="black"/>
                  <path d="M 176,240 L 176,288" fill="none" stroke="black"/>
                  <path d="M 176,352 L 176,384" fill="none" stroke="black"/>
                  <path d="M 176,1392 L 176,1520" fill="none" stroke="black"/>
                  <path d="M 192,1024 L 192,1104" fill="none" stroke="black"/>
                  <path d="M 200,672 L 200,752" fill="none" stroke="black"/>
                  <path d="M 224,144 L 224,384" fill="none" stroke="black"/>
                  <path d="M 224,560 L 224,608" fill="none" stroke="black"/>
                  <path d="M 248,672 L 248,752" fill="none" stroke="black"/>
                  <path d="M 248,864 L 248,1056" fill="none" stroke="black"/>
                  <path d="M 248,1088 L 248,1424" fill="none" stroke="black"/>
                  <path d="M 296,800 L 296,856" fill="none" stroke="black"/>
                  <path d="M 296,1280 L 296,1328" fill="none" stroke="black"/>
                  <path d="M 296,1392 L 296,1520" fill="none" stroke="black"/>
                  <path d="M 320,1064 L 320,1272" fill="none" stroke="black"/>
                  <path d="M 320,1336 L 320,1384" fill="none" stroke="black"/>
                  <path d="M 344,864 L 344,1056" fill="none" stroke="black"/>
                  <path d="M 368,672 L 368,752" fill="none" stroke="black"/>
                  <path d="M 384,2240 L 384,2288" fill="none" stroke="black"/>
                  <path d="M 392,2128 L 392,2176" fill="none" stroke="black"/>
                  <path d="M 408,864 L 408,976" fill="none" stroke="black"/>
                  <path d="M 416,672 L 416,752" fill="none" stroke="black"/>
                  <path d="M 416,1152 L 416,1216" fill="none" stroke="black"/>
                  <path d="M 416,2080 L 416,2320" fill="none" stroke="black"/>
                  <path d="M 432,760 L 432,800" fill="none" stroke="black"/>
                  <path d="M 480,1648 L 480,1696" fill="none" stroke="black"/>
                  <path d="M 512,760 L 512,856" fill="none" stroke="black"/>
                  <path d="M 512,984 L 512,1144" fill="none" stroke="black"/>
                  <path d="M 512,1224 L 512,1272" fill="none" stroke="black"/>
                  <path d="M 528,672 L 528,752" fill="none" stroke="black"/>
                  <path d="M 544,1152 L 544,1216" fill="none" stroke="black"/>
                  <path d="M 552,864 L 552,976" fill="none" stroke="black"/>
                  <path d="M 552,1280 L 552,1328" fill="none" stroke="black"/>
                  <path d="M 552,1392 L 552,1520" fill="none" stroke="black"/>
                  <path d="M 568,512 L 568,1552" fill="none" stroke="black"/>
                  <path d="M 568,1600 L 568,1728" fill="none" stroke="black"/>
                  <path d="M 16,144 L 176,144" fill="none" stroke="black"/>
                  <path d="M 200,144 L 224,144" fill="none" stroke="black"/>
                  <path d="M 16,176 L 176,176" fill="none" stroke="black"/>
                  <path d="M 16,240 L 176,240" fill="none" stroke="black"/>
                  <path d="M 224,256 L 248,256" fill="none" stroke="black"/>
                  <path d="M 16,288 L 176,288" fill="none" stroke="black"/>
                  <path d="M 16,352 L 176,352" fill="none" stroke="black"/>
                  <path d="M 16,384 L 176,384" fill="none" stroke="black"/>
                  <path d="M 200,384 L 224,384" fill="none" stroke="black"/>
                  <path d="M 8,512 L 80,512" fill="none" stroke="black"/>
                  <path d="M 96,512 L 568,512" fill="none" stroke="black"/>
                  <path d="M 24,560 L 224,560" fill="none" stroke="black"/>
                  <path d="M 24,608 L 224,608" fill="none" stroke="black"/>
                  <path d="M 24,672 L 200,672" fill="none" stroke="black"/>
                  <path d="M 248,672 L 368,672" fill="none" stroke="black"/>
                  <path d="M 416,672 L 528,672" fill="none" stroke="black"/>
                  <path d="M 208,704 L 240,704" fill="none" stroke="black"/>
                  <path d="M 376,704 L 408,704" fill="none" stroke="black"/>
                  <path d="M 24,752 L 200,752" fill="none" stroke="black"/>
                  <path d="M 248,752 L 368,752" fill="none" stroke="black"/>
                  <path d="M 416,752 L 528,752" fill="none" stroke="black"/>
                  <path d="M 296,800 L 432,800" fill="none" stroke="black"/>
                  <path d="M 24,864 L 168,864" fill="none" stroke="black"/>
                  <path d="M 248,864 L 344,864" fill="none" stroke="black"/>
                  <path d="M 408,864 L 552,864" fill="none" stroke="black"/>
                  <path d="M 176,880 L 240,880" fill="none" stroke="black"/>
                  <path d="M 352,880 L 400,880" fill="none" stroke="black"/>
                  <path d="M 24,928 L 168,928" fill="none" stroke="black"/>
                  <path d="M 408,976 L 552,976" fill="none" stroke="black"/>
                  <path d="M 24,1024 L 192,1024" fill="none" stroke="black"/>
                  <path d="M 200,1040 L 240,1040" fill="none" stroke="black"/>
                  <path d="M 248,1056 L 344,1056" fill="none" stroke="black"/>
                  <path d="M 200,1088 L 248,1088" fill="none" stroke="black"/>
                  <path d="M 24,1104 L 192,1104" fill="none" stroke="black"/>
                  <path d="M 416,1152 L 544,1152" fill="none" stroke="black"/>
                  <path d="M 416,1216 L 544,1216" fill="none" stroke="black"/>
                  <path d="M 296,1280 L 552,1280" fill="none" stroke="black"/>
                  <path d="M 296,1328 L 552,1328" fill="none" stroke="black"/>
                  <path d="M 24,1392 L 176,1392" fill="none" stroke="black"/>
                  <path d="M 296,1392 L 552,1392" fill="none" stroke="black"/>
                  <path d="M 248,1424 L 288,1424" fill="none" stroke="black"/>
                  <path d="M 24,1520 L 176,1520" fill="none" stroke="black"/>
                  <path d="M 296,1520 L 552,1520" fill="none" stroke="black"/>
                  <path d="M 8,1552 L 80,1552" fill="none" stroke="black"/>
                  <path d="M 96,1552 L 568,1552" fill="none" stroke="black"/>
                  <path d="M 8,1600 L 80,1600" fill="none" stroke="black"/>
                  <path d="M 96,1600 L 568,1600" fill="none" stroke="black"/>
                  <path d="M 24,1648 L 480,1648" fill="none" stroke="black"/>
                  <path d="M 24,1696 L 480,1696" fill="none" stroke="black"/>
                  <path d="M 8,1728 L 80,1728" fill="none" stroke="black"/>
                  <path d="M 96,1728 L 568,1728" fill="none" stroke="black"/>
                  <path d="M 16,1904 L 168,1904" fill="none" stroke="black"/>
                  <path d="M 16,1936 L 168,1936" fill="none" stroke="black"/>
                  <path d="M 8,2080 L 80,2080" fill="none" stroke="black"/>
                  <path d="M 96,2080 L 416,2080" fill="none" stroke="black"/>
                  <path d="M 24,2128 L 392,2128" fill="none" stroke="black"/>
                  <path d="M 24,2176 L 392,2176" fill="none" stroke="black"/>
                  <path d="M 24,2240 L 384,2240" fill="none" stroke="black"/>
                  <path d="M 24,2288 L 384,2288" fill="none" stroke="black"/>
                  <path d="M 8,2320 L 80,2320" fill="none" stroke="black"/>
                  <path d="M 96,2320 L 416,2320" fill="none" stroke="black"/>
                  <path d="M 16,2496 L 152,2496" fill="none" stroke="black"/>
                  <path d="M 16,2544 L 152,2544" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="520,1272 508,1266.4 508,1277.6" fill="black" transform="rotate(90,512,1272)"/>
                  <polygon class="arrowhead" points="520,1144 508,1138.4 508,1149.6" fill="black" transform="rotate(90,512,1144)"/>
                  <polygon class="arrowhead" points="520,856 508,850.4 508,861.6" fill="black" transform="rotate(90,512,856)"/>
                  <polygon class="arrowhead" points="416,704 404,698.4 404,709.6" fill="black" transform="rotate(0,408,704)"/>
                  <polygon class="arrowhead" points="360,880 348,874.4 348,885.6" fill="black" transform="rotate(180,352,880)"/>
                  <polygon class="arrowhead" points="328,1384 316,1378.4 316,1389.6" fill="black" transform="rotate(90,320,1384)"/>
                  <polygon class="arrowhead" points="328,1064 316,1058.4 316,1069.6" fill="black" transform="rotate(270,320,1064)"/>
                  <polygon class="arrowhead" points="304,856 292,850.4 292,861.6" fill="black" transform="rotate(90,296,856)"/>
                  <polygon class="arrowhead" points="248,1040 236,1034.4 236,1045.6" fill="black" transform="rotate(0,240,1040)"/>
                  <polygon class="arrowhead" points="248,880 236,874.4 236,885.6" fill="black" transform="rotate(0,240,880)"/>
                  <polygon class="arrowhead" points="248,704 236,698.4 236,709.6" fill="black" transform="rotate(0,240,704)"/>
                  <polygon class="arrowhead" points="208,1088 196,1082.4 196,1093.6" fill="black" transform="rotate(180,200,1088)"/>
                  <polygon class="arrowhead" points="96,2488 84,2482.4 84,2493.6" fill="black" transform="rotate(90,88,2488)"/>
                  <polygon class="arrowhead" points="96,2368 84,2362.4 84,2373.6" fill="black" transform="rotate(90,88,2368)"/>
                  <polygon class="arrowhead" points="96,2232 84,2226.4 84,2237.6" fill="black" transform="rotate(90,88,2232)"/>
                  <polygon class="arrowhead" points="96,2120 84,2114.4 84,2125.6" fill="black" transform="rotate(90,88,2120)"/>
                  <polygon class="arrowhead" points="96,1984 84,1978.4 84,1989.6" fill="black" transform="rotate(90,88,1984)"/>
                  <polygon class="arrowhead" points="96,1896 84,1890.4 84,1901.6" fill="black" transform="rotate(90,88,1896)"/>
                  <polygon class="arrowhead" points="96,1776 84,1770.4 84,1781.6" fill="black" transform="rotate(90,88,1776)"/>
                  <polygon class="arrowhead" points="96,1640 84,1634.4 84,1645.6" fill="black" transform="rotate(90,88,1640)"/>
                  <polygon class="arrowhead" points="96,1384 84,1378.4 84,1389.6" fill="black" transform="rotate(90,88,1384)"/>
                  <polygon class="arrowhead" points="96,1016 84,1010.4 84,1021.6" fill="black" transform="rotate(90,88,1016)"/>
                  <polygon class="arrowhead" points="96,856 84,850.4 84,861.6" fill="black" transform="rotate(90,88,856)"/>
                  <polygon class="arrowhead" points="96,664 84,658.4 84,669.6" fill="black" transform="rotate(90,88,664)"/>
                  <polygon class="arrowhead" points="96,344 84,338.4 84,349.6" fill="black" transform="rotate(90,88,344)"/>
                  <polygon class="arrowhead" points="96,232 84,226.4 84,237.6" fill="black" transform="rotate(90,88,232)"/>
                  <polygon class="arrowhead" points="96,136 84,130.4 84,141.6" fill="black" transform="rotate(90,88,136)"/>
                  <g class="text">
                    <text x="52" y="36">Incoming</text>
                    <text x="40" y="52">EDHOC</text>
                    <text x="104" y="52">message_X</text>
                    <text x="28" y="68">(X</text>
                    <text x="48" y="68">=</text>
                    <text x="64" y="68">2</text>
                    <text x="84" y="68">or</text>
                    <text x="108" y="68">3)</text>
                    <text x="52" y="164">Decode</text>
                    <text x="120" y="164">message_X</text>
                    <text x="60" y="260">Retrieve</text>
                    <text x="112" y="260">the</text>
                    <text x="280" y="260">(Core</text>
                    <text x="328" y="260">EDHOC</text>
                    <text x="400" y="260">Processing)</text>
                    <text x="60" y="276">protocol</text>
                    <text x="120" y="276">state</text>
                    <text x="56" y="372">Decrypt</text>
                    <text x="128" y="372">message_X</text>
                    <text x="40" y="452">Control</text>
                    <text x="120" y="452">transferred</text>
                    <text x="180" y="452">to</text>
                    <text x="24" y="468">the</text>
                    <text x="100" y="468">side-processor</text>
                    <text x="188" y="468">object</text>
                    <text x="260" y="532">Pre-verification</text>
                    <text x="348" y="532">side</text>
                    <text x="412" y="532">processing</text>
                    <text x="496" y="532">(PHASE_1)</text>
                    <text x="56" y="580">Check</text>
                    <text x="112" y="580">whether</text>
                    <text x="180" y="580">expected</text>
                    <text x="48" y="596">EAD</text>
                    <text x="88" y="596">items</text>
                    <text x="128" y="596">are</text>
                    <text x="172" y="596">absent</text>
                    <text x="44" y="692">1.</text>
                    <text x="76" y="692">Does</text>
                    <text x="136" y="692">ID_CRED_X</text>
                    <text x="220" y="692">NO</text>
                    <text x="268" y="692">3.</text>
                    <text x="316" y="692">Retrieve</text>
                    <text x="436" y="692">4.</text>
                    <text x="460" y="692">Is</text>
                    <text x="488" y="692">the</text>
                    <text x="44" y="708">or</text>
                    <text x="68" y="708">an</text>
                    <text x="96" y="708">EAD</text>
                    <text x="132" y="708">item</text>
                    <text x="276" y="708">CRED</text>
                    <text x="312" y="708">via</text>
                    <text x="464" y="708">retrieval</text>
                    <text x="56" y="724">point</text>
                    <text x="92" y="724">to</text>
                    <text x="116" y="724">an</text>
                    <text x="160" y="724">already</text>
                    <text x="296" y="724">ID_CRED_X</text>
                    <text x="348" y="724">or</text>
                    <text x="436" y="724">of</text>
                    <text x="468" y="724">CRED</text>
                    <text x="60" y="740">stored</text>
                    <text x="112" y="740">CRED?</text>
                    <text x="268" y="740">an</text>
                    <text x="296" y="740">EAD</text>
                    <text x="332" y="740">item</text>
                    <text x="472" y="740">successful?</text>
                    <text x="452" y="788">NO</text>
                    <text x="536" y="788">YES</text>
                    <text x="112" y="836">YES</text>
                    <text x="188" y="868">NO</text>
                    <text x="384" y="868">YES</text>
                    <text x="44" y="884">2.</text>
                    <text x="68" y="884">Is</text>
                    <text x="100" y="884">this</text>
                    <text x="140" y="884">CRED</text>
                    <text x="272" y="884">11.</text>
                    <text x="312" y="884">Abort</text>
                    <text x="428" y="884">5.</text>
                    <text x="452" y="884">Is</text>
                    <text x="480" y="884">the</text>
                    <text x="520" y="884">trust</text>
                    <text x="56" y="900">still</text>
                    <text x="104" y="900">valid</text>
                    <text x="144" y="900">and</text>
                    <text x="272" y="900">the</text>
                    <text x="312" y="900">EDHOC</text>
                    <text x="444" y="900">policy</text>
                    <text x="492" y="900">used</text>
                    <text x="68" y="916">trusted?</text>
                    <text x="288" y="916">session</text>
                    <text x="476" y="916">"NO-LEARNING",</text>
                    <text x="448" y="932">without</text>
                    <text x="496" y="932">any</text>
                    <text x="460" y="948">acceptable</text>
                    <text x="464" y="964">exceptions?</text>
                    <text x="112" y="996">YES</text>
                    <text x="404" y="1012">Here</text>
                    <text x="440" y="1012">the</text>
                    <text x="480" y="1012">trust</text>
                    <text x="532" y="1012">NO</text>
                    <text x="212" y="1028">NO</text>
                    <text x="412" y="1028">policy</text>
                    <text x="460" y="1028">used</text>
                    <text x="492" y="1028">is</text>
                    <text x="44" y="1044">9.</text>
                    <text x="68" y="1044">Is</text>
                    <text x="100" y="1044">this</text>
                    <text x="140" y="1044">CRED</text>
                    <text x="432" y="1044">"LEARNING",</text>
                    <text x="492" y="1044">or</text>
                    <text x="52" y="1060">good</text>
                    <text x="84" y="1060">to</text>
                    <text x="112" y="1060">use</text>
                    <text x="140" y="1060">in</text>
                    <text x="168" y="1060">the</text>
                    <text x="440" y="1060">"NO-LEARNING"</text>
                    <text x="64" y="1076">context</text>
                    <text x="108" y="1076">of</text>
                    <text x="140" y="1076">this</text>
                    <text x="420" y="1076">together</text>
                    <text x="476" y="1076">with</text>
                    <text x="56" y="1092">EDHOC</text>
                    <text x="116" y="1092">session?</text>
                    <text x="396" y="1092">an</text>
                    <text x="452" y="1092">overriding</text>
                    <text x="424" y="1108">exception</text>
                    <text x="436" y="1172">6.</text>
                    <text x="476" y="1172">Assess</text>
                    <text x="516" y="1172">if</text>
                    <text x="444" y="1188">CRED</text>
                    <text x="476" y="1188">is</text>
                    <text x="512" y="1188">valid</text>
                    <text x="440" y="1204">and</text>
                    <text x="488" y="1204">trusted</text>
                    <text x="112" y="1252">YES</text>
                    <text x="340" y="1252">NO</text>
                    <text x="316" y="1300">7.</text>
                    <text x="340" y="1300">Is</text>
                    <text x="372" y="1300">CRED</text>
                    <text x="416" y="1300">valid</text>
                    <text x="456" y="1300">and</text>
                    <text x="368" y="1316">(provisionally)</text>
                    <text x="468" y="1316">trusted?</text>
                    <text x="344" y="1364">YES</text>
                    <text x="48" y="1412">10.</text>
                    <text x="100" y="1412">Continue</text>
                    <text x="148" y="1412">by</text>
                    <text x="316" y="1412">8.</text>
                    <text x="352" y="1412">Store</text>
                    <text x="396" y="1412">CRED</text>
                    <text x="428" y="1412">as</text>
                    <text x="464" y="1412">valid</text>
                    <text x="504" y="1412">and</text>
                    <text x="80" y="1428">considering</text>
                    <text x="148" y="1428">this</text>
                    <text x="368" y="1428">(provisionally)</text>
                    <text x="468" y="1428">trusted.</text>
                    <text x="52" y="1444">CRED</text>
                    <text x="84" y="1444">as</text>
                    <text x="112" y="1444">the</text>
                    <text x="92" y="1460">authentication</text>
                    <text x="324" y="1460">Pair</text>
                    <text x="364" y="1460">CRED</text>
                    <text x="404" y="1460">with</text>
                    <text x="468" y="1460">consistent</text>
                    <text x="76" y="1476">credential</text>
                    <text x="348" y="1476">credential</text>
                    <text x="444" y="1476">identifiers,</text>
                    <text x="512" y="1476">for</text>
                    <text x="76" y="1492">associated</text>
                    <text x="140" y="1492">with</text>
                    <text x="324" y="1492">each</text>
                    <text x="384" y="1492">supported</text>
                    <text x="444" y="1492">type</text>
                    <text x="476" y="1492">of</text>
                    <text x="48" y="1508">the</text>
                    <text x="88" y="1508">other</text>
                    <text x="132" y="1508">peer</text>
                    <text x="348" y="1508">credential</text>
                    <text x="440" y="1508">identifier.</text>
                    <text x="252" y="1620">Pre-verification</text>
                    <text x="340" y="1620">side</text>
                    <text x="404" y="1620">processing</text>
                    <text x="488" y="1620">(PHASE_2)</text>
                    <text x="64" y="1668">Process</text>
                    <text x="112" y="1668">the</text>
                    <text x="144" y="1668">EAD</text>
                    <text x="184" y="1668">items</text>
                    <text x="228" y="1668">that</text>
                    <text x="268" y="1668">have</text>
                    <text x="304" y="1668">not</text>
                    <text x="340" y="1668">been</text>
                    <text x="400" y="1668">processed</text>
                    <text x="456" y="1668">yet</text>
                    <text x="48" y="1684">and</text>
                    <text x="84" y="1684">that</text>
                    <text x="120" y="1684">can</text>
                    <text x="148" y="1684">be</text>
                    <text x="200" y="1684">processed</text>
                    <text x="268" y="1684">before</text>
                    <text x="328" y="1684">message</text>
                    <text x="412" y="1684">verification</text>
                    <text x="40" y="1812">Control</text>
                    <text x="120" y="1812">transferred</text>
                    <text x="188" y="1812">back</text>
                    <text x="20" y="1828">to</text>
                    <text x="48" y="1828">the</text>
                    <text x="84" y="1828">core</text>
                    <text x="128" y="1828">EDHOC</text>
                    <text x="196" y="1828">processing</text>
                    <text x="52" y="1924">Verify</text>
                    <text x="120" y="1924">message_X</text>
                    <text x="200" y="1924">(Core</text>
                    <text x="248" y="1924">EDHOC</text>
                    <text x="320" y="1924">processing)</text>
                    <text x="40" y="2020">Control</text>
                    <text x="120" y="2020">transferred</text>
                    <text x="180" y="2020">to</text>
                    <text x="24" y="2036">the</text>
                    <text x="100" y="2036">side-processor</text>
                    <text x="188" y="2036">object</text>
                    <text x="248" y="2100">Post-verification</text>
                    <text x="364" y="2100">processing</text>
                    <text x="64" y="2148">Process</text>
                    <text x="112" y="2148">the</text>
                    <text x="144" y="2148">EAD</text>
                    <text x="184" y="2148">items</text>
                    <text x="228" y="2148">that</text>
                    <text x="268" y="2148">have</text>
                    <text x="300" y="2148">to</text>
                    <text x="324" y="2148">be</text>
                    <text x="72" y="2164">processed</text>
                    <text x="140" y="2164">(also)</text>
                    <text x="192" y="2164">after</text>
                    <text x="248" y="2164">message</text>
                    <text x="332" y="2164">verification</text>
                    <text x="52" y="2260">Make</text>
                    <text x="88" y="2260">all</text>
                    <text x="120" y="2260">the</text>
                    <text x="168" y="2260">results</text>
                    <text x="212" y="2260">of</text>
                    <text x="240" y="2260">the</text>
                    <text x="272" y="2260">EAD</text>
                    <text x="332" y="2260">processing</text>
                    <text x="72" y="2276">available</text>
                    <text x="124" y="2276">to</text>
                    <text x="160" y="2276">build</text>
                    <text x="200" y="2276">the</text>
                    <text x="236" y="2276">next</text>
                    <text x="280" y="2276">EDHOC</text>
                    <text x="336" y="2276">message</text>
                    <text x="40" y="2404">Control</text>
                    <text x="120" y="2404">transferred</text>
                    <text x="188" y="2404">back</text>
                    <text x="20" y="2420">to</text>
                    <text x="48" y="2420">the</text>
                    <text x="84" y="2420">core</text>
                    <text x="128" y="2420">EDHOC</text>
                    <text x="196" y="2420">processing</text>
                    <text x="56" y="2516">Advance</text>
                    <text x="104" y="2516">the</text>
                    <text x="184" y="2516">(Core</text>
                    <text x="232" y="2516">EDHOC</text>
                    <text x="304" y="2516">processing)</text>
                    <text x="60" y="2532">protocol</text>
                    <text x="120" y="2532">state</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
  Incoming
  EDHOC message_X
  (X = 2 or 3)

          |
          |
          v
 +-------------------+  ---+
 | Decode message_X  |     |
 +-------------------+     |
          |                |
          |                |
          v                |
 +-------------------+     |
 | Retrieve the      |     +--- (Core EDHOC Processing)
 | protocol state    |     |
 +-------------------+     |
          |                |
          |                |
          v                |
 +-------------------+     |
 | Decrypt message_X |     |
 +-------------------+  ---+
          |
          |

 Control transferred to
 the side-processor object

          |
+---------|-----------------------------------------------------------+
|         |             Pre-verification side processing (PHASE_1)    |
|         |                                                           |
| +------------------------+                                          |
| | Check whether expected |                                          |
| | EAD items are absent   |                                          |
| +------------------------+                                          |
|         |                                                           |
|         |                                                           |
|         v                                                           |
| +---------------------+     +--------------+     +-------------+    |
| | 1. Does ID_CRED_X   | NO  | 3. Retrieve  |     | 4. Is the   |    |
| | or an EAD item      |---->| CRED via     |---->| retrieval   |    |
| | point to an already |     | ID_CRED_X or |     | of CRED     |    |
| | stored CRED?        |     | an EAD item  |     | successful? |    |
| +---------------------+     +--------------+     +-------------+    |
|         |                                          |         |      |
|         |                                          | NO      | YES  |
|         |                         +----------------+         |      |
|         |                         |                          |      |
|         | YES                     |                          |      |
|         v                         v                          v      |
| +-----------------+ NO      +-----------+   YES +-----------------+ |
| | 2. Is this CRED |-------->| 11. Abort |<------| 5. Is the trust | |
| | still valid and |         | the EDHOC |       | policy used     | |
| | trusted?        |         | session   |       | "NO-LEARNING",  | |
| +-----------------+         |           |       | without any     | |
|         |                   |           |       | acceptable      | |
|         |                   |           |       | exceptions?     | |
|         |                   |           |       +-----------------+ |
|         | YES               |           |                    |      |
|         v                   |           |     Here the trust | NO   |
| +--------------------+ NO   |           |     policy used is |      |
| | 9. Is this CRED    |----->|           |     "LEARNING", or |      |
| | good to use in the |      +-----------+     "NO-LEARNING"  |      |
| | context of this    |               ^        together with  |      |
| | EDHOC session?     |<-----+        |        an overriding  |      |
| +--------------------+      |        |        exception      |      |
|         |                   |        |                       |      |
|         |                   |        |                       v      |
|         |                   |        |           +---------------+  |
|         |                   |        |           | 6. Assess if  |  |
|         |                   |        |           | CRED is valid |  |
|         |                   |        |           | and trusted   |  |
|         |                   |        |           +---------------+  |
|         |                   |        |                       |      |
|         | YES               |        | NO                    |      |
|         |                   |        |                       v      |
|         |                   |     +-------------------------------+ |
|         |                   |     | 7. Is CRED valid and          | |
|         |                   |     | (provisionally) trusted?      | |
|         |                   |     +-------------------------------+ |
|         |                   |        |                              |
|         |                   |        | YES                          |
|         v                   |        v                              |
| +------------------+        |     +-------------------------------+ |
| | 10. Continue by  |        |     | 8. Store CRED as valid and    | |
| | considering this |        +-----| (provisionally) trusted.      | |
| | CRED as the      |              |                               | |
| | authentication   |              | Pair CRED with consistent     | |
| | credential       |              | credential identifiers, for   | |
| | associated with  |              | each supported type of        | |
| | the other peer   |              | credential identifier.        | |
| +------------------+              +-------------------------------+ |
|         |                                                           |
+---------|-----------------------------------------------------------+
          |
          |
+---------|-----------------------------------------------------------+
|         |            Pre-verification side processing (PHASE_2)     |
|         v                                                           |
| +--------------------------------------------------------+          |
| | Process the EAD items that have not been processed yet |          |
| | and that can be processed before message verification  |          |
| +--------------------------------------------------------+          |
|         |                                                           |
+---------|-----------------------------------------------------------+
          |
          |
          v

 Control transferred back
 to the core EDHOC processing

          |
          |
          v
 +------------------+
 | Verify message_X | (Core EDHOC processing)
 +------------------+
          |
          |
          v

 Control transferred to
 the side-processor object

          |
+---------|----------------------------------------+
|         |           Post-verification processing |
|         v                                        |
| +---------------------------------------------+  |
| | Process the EAD items that have to be       |  |
| | processed (also) after message verification |  |
| +---------------------------------------------+  |
|         |                                        |
|         |                                        |
|         v                                        |
| +--------------------------------------------+   |
| | Make all the results of the EAD processing |   |
| | available to build the next EDHOC message  |   |
| +--------------------------------------------+   |
|         |                                        |
+---------|----------------------------------------+
          |
          |
          v

 Control transferred back
 to the core EDHOC processing

          |
          |
          v
 +----------------+
 | Advance the    | (Core EDHOC processing)
 | protocol state |
 +----------------+
]]></artwork>
            </artset>
          </figure>
        </section>
      </section>
      <section anchor="sec-consistency-checks-auth-creds">
        <name>Consistency Checks of Authentication Credentials from ID_CRED and EAD Items</name>
        <t>Typically, an EDHOC peer specifies its associated authentication credential (by value or by reference) only in the ID_CRED field of EDHOC message_2 (if acting as Responder) or EDHOC message_3 (if acting as Initiator).</t>
        <t>In addition to that, there may be cases where an EDHOC peer provides the authentication credential also in an EAD item. In particular, such an EAD item can specify a cryptographically protected "envelope" (by value or by reference), which in turn specifies the authentication credential (by value or by reference).</t>
        <t>A case in point is the EDHOC and OSCORE profile of the ACE framework <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>, where the envelope in question is an access token issued to the ACE client. In such a case, the ACE client can rely on an EAD item specifying the access token by value, or instead on a different EAD item specifying a session identifier as a reference to such access token. In either case, the access token specifies the authentication credential (by value or by reference) associated with the client.</t>
        <t>During an EDHOC session, an EDHOC peer P1 might therefore receive the authentication credential CRED associated with the other EDHOC peer P2 as specified by two items:</t>
        <ul spacing="normal">
          <li>
            <t>ITEM_A: the ID_CRED field specifying CRED. If P2 acts as Initiator (Responder), then ITEM_A is the ID_CRED_I (ID_CRED_R) field.</t>
          </li>
          <li>
            <t>ITEM_B: the envelope specified in an EAD item within an EDHOC message sent by P2.</t>
          </li>
        </ul>
        <t>As part of the process where P1 validates CRED during the EDHOC session, P1 must check that both ITEM_A and ITEM_B specify the same authentication credential, and it must abort the EDHOC session if such a consistency check fails.</t>
        <t>The consistency check is successful only if one of the following conditions holds, and it fails otherwise:</t>
        <ul spacing="normal">
          <li>
            <t>If both ITEM_A and ITEM_B specify an authentication credential by value, then both ITEM_A and ITEM_B specify the same value.</t>
          </li>
          <li>
            <t>If one among ITEM_A and ITEM_B specifies an authentication credential by value VALUE while the other one specifies an authentication credential by reference REF, then REF is a valid reference for VALUE.</t>
          </li>
          <li>
            <t>If ITEM_A specifies an authentication credential by reference REF_A and ITEM_B specifies an authentication credential by reference REF_B, then REF_A or REF_B allows to retrieving the value VALUE of an authentication credential from a local or remote storage, such that both REF_A and REF_B are a valid reference for VALUE.</t>
          </li>
        </ul>
        <t>The peer P1 performs the consistency check above as soon as it has both ITEM_A and ITEM_B available. If P1 acts as Responder, that is the case when processing the incoming EDHOC message_3. If P1 acts as Initiator, that is the case when processing the incoming EDHOC message_2 or message_4, i.e., whichever of the two messages includes ITEM_B in an EAD item of its EAD field.</t>
      </section>
    </section>
    <section anchor="sec-block-wise">
      <name>Using EDHOC over CoAP with Block-Wise</name>
      <t><xref section="A.2" sectionFormat="of" target="RFC9528"/> specifies how to transfer EDHOC over CoAP <xref target="RFC7252"/>. In such a case, EDHOC messages (possibly prepended by an EDHOC connection identifier) are transported in the payload of CoAP requests and responses, according to the EDHOC forward message flow or the EDHOC reverse message flow. Furthermore, <xref section="A.1" sectionFormat="of" target="RFC9528"/> specifies how to derive an OSCORE Security Context <xref target="RFC8613"/> from an EDHOC session.</t>
      <t>Building on that, <xref target="RFC9668"/> further details the use of EDHOC with CoAP and OSCORE. In particular, it specifies an optimization approach for the EDHOC forward message flow that combines the EDHOC execution with the first subsequent OSCORE transaction. This is achieved by means of an "EDHOC + OSCORE request", i.e., a single CoAP request message that conveys both EDHOC message_3 of the ongoing EDHOC session and the OSCORE-protected application data, where the latter is protected with the OSCORE Security Context derived from that EDHOC session.</t>
      <t>This section provides guidelines and recommendations for CoAP endpoints supporting Block-wise transfers for CoAP <xref target="RFC7959"/> and specifically for CoAP clients supporting the EDHOC + OSCORE request defined in <xref target="RFC9668"/>. The use of Block-wise transfers can be desirable, e.g., for EDHOC messages that include a large ID_CRED_I or ID_CRED_R, or that include a large EAD field.</t>
      <t>The following especially considers a CoAP endpoint that may perform only "inner" Block-wise, but not "outer" Block-wise operations (see <xref section="4.1.3.4" sectionFormat="of" target="RFC8613"/>). That is, the considered CoAP endpoint does not (further) split an OSCORE-protected message like an intermediary (e.g., a proxy) might do. This is the typical case for CoAP endpoints using OSCORE (see <xref section="4.1.3.4" sectionFormat="of" target="RFC8613"/>).</t>
      <section anchor="notation">
        <name>Notation</name>
        <t>The rest of this section refers to the following notation:</t>
        <ul spacing="normal">
          <li>
            <t>SIZE_BODY: the size in bytes of the data to be transmitted with CoAP. When Block-wise is used, such data is referred to as the "body" to be fragmented into blocks, each of which to be transmitted in one CoAP message.  </t>
            <t>
With the exception pertaining to EDHOC message_3 described in the following paragraph, the considered body can in general be an EDHOC message, possibly prepended by an EDHOC connection identifier encoded as per <xref section="3.3" sectionFormat="of" target="RFC9528"/>.  </t>
            <t>
When specifically using the EDHOC + OSCORE request, the considered body is the application data to be protected with OSCORE, (whose first block is) to be sent together with EDHOC message_3 as part of the EDHOC + OSCORE request.</t>
          </li>
          <li>
            <t>SIZE_EDHOC_M3: the size in bytes of EDHOC message_3, if this is sent as part of the EDHOC + OSCORE request. Otherwise, the size in bytes of EDHOC message_3, plus, if included, the size in bytes of a prepended EDHOC connection identifier encoded as per <xref section="3.3" sectionFormat="of" target="RFC9528"/>.</t>
          </li>
          <li>
            <t>SIZE_MTU: the maximum amount of transmittable bytes before having to use Block-wise. This is, for example, 64 KiB as maximum datagram size when using UDP, or 1280 bytes as the maximum size for an IPv6 MTU.</t>
          </li>
          <li>
            <t>SIZE_OH: the size in bytes of the overall overhead due to all the communication layers underlying the application. This takes into account also the overhead introduced by the OSCORE processing.</t>
          </li>
          <li>
            <t>LIMIT = (SIZE_MTU - SIZE_OH): the practical maximum size in bytes to be considered by the application before using Block-wise.</t>
          </li>
          <li>
            <t>SIZE_BLOCK: the size in bytes of inner blocks.</t>
          </li>
          <li>
            <t>ceil(): the ceiling function.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-block-wise-pre-req">
        <name>Pre-requirements for the EDHOC + OSCORE Request</name>
        <t>Before sending an EDHOC + OSCORE request, a CoAP client has to perform the following checks. Note that, while the CoAP client is able to fragment the plain application data before any OSCORE processing, it cannot fragment the EDHOC + OSCORE request or the EDHOC message_3 added therein.</t>
        <ul spacing="normal">
          <li>
            <t>If inner Block-wise is not used, hence SIZE_BODY &lt;= LIMIT, the CoAP client must verify whether all the following conditions hold:  </t>
            <ul spacing="normal">
              <li>
                <t>COND1: SIZE_EDHOC_M3 &lt;= LIMIT</t>
              </li>
              <li>
                <t>COND2: (SIZE_BODY + SIZE_EDHOC_M3) &lt;= LIMIT</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If inner Block-wise is used, the CoAP client must verify whether all the following conditions hold:  </t>
            <ul spacing="normal">
              <li>
                <t>COND3: SIZE_EDHOC_M3 &lt;= LIMIT</t>
              </li>
              <li>
                <t>COND4: (SIZE_BLOCK + SIZE_EDHOC_M3) &lt;= LIMIT</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>In either case, if not all the corresponding conditions hold, the CoAP client should not send the EDHOC + OSCORE request. Instead, the CoAP client can continue by switching to the purely sequential, original EDHOC workflow (see <xref section="A.2.1" sectionFormat="of" target="RFC9528"/>). That is, the CoAP client first sends EDHOC message_3 prepended by the EDHOC Connection Identifier C_R encoded as per <xref section="3.3" sectionFormat="of" target="RFC9528"/> and then sends the OSCORE-protected CoAP request once the EDHOC execution is completed.</t>
      </section>
      <section anchor="effectively-using-block-wise">
        <name>Effectively Using Block-Wise</name>
        <t>In order to avoid further fragmentation at lower layers when sending an EDHOC + OSCORE request, the CoAP client has to use inner Block-wise if <em>any</em> of the following conditions holds:</t>
        <ul spacing="normal">
          <li>
            <t>COND5: SIZE_BODY &gt; LIMIT</t>
          </li>
          <li>
            <t>COND6: (SIZE_BODY + SIZE_EDHOC_M3) &gt; LIMIT</t>
          </li>
        </ul>
        <t>In particular, consistently with <xref target="sec-block-wise-pre-req"/>, the SIZE_BLOCK used has to be such that the following condition also holds:</t>
        <ul spacing="normal">
          <li>
            <t>COND7: (SIZE_BLOCK + SIZE_EDHOC_M3) &lt;= LIMIT</t>
          </li>
        </ul>
        <t>Note that the CoAP client might still use Block-wise due to reasons different from exceeding the size indicated by LIMIT.</t>
        <t>The following shows the number of round trips for completing both the EDHOC execution and the first OSCORE-protected exchange, under the assumption that the exchange of EDHOC message_1 and EDHOC message_2 does not result in using Block-wise.</t>
        <t>If <em>both</em> the conditions COND5 and COND6 hold, the use of Block-wise results in the following number of round trips experienced by the CoAP client.</t>
        <ul spacing="normal">
          <li>
            <t>If the original EDHOC execution workflow is used (see <xref section="A.2.1" sectionFormat="of" target="RFC9528"/>), the number of round trips RT_ORIG is equal to 1 + ceil(SIZE_EDHOC_M3 / SIZE_BLOCK) + ceil(SIZE_BODY / SIZE_BLOCK).</t>
          </li>
          <li>
            <t>If the optimized EDHOC execution workflow is used (see <xref section="3" sectionFormat="of" target="RFC9668"/>), the number of round trips RT_COMB is equal to 1 + ceil(SIZE_BODY / SIZE_BLOCK).</t>
          </li>
        </ul>
        <t>It follows that RT_COMB &lt; RT_ORIG, i.e., the optimized EDHOC execution workflow always yields a lower number of round trips.</t>
        <t>Instead, the convenience of using the optimized EDHOC execution workflow becomes questionable if <em>both</em> the following conditions hold:</t>
        <ul spacing="normal">
          <li>
            <t>COND8: SIZE_BODY &lt;= LIMIT</t>
          </li>
          <li>
            <t>COND9: (SIZE_BODY + SIZE_EDHOC_M3) &gt; LIMIT</t>
          </li>
        </ul>
        <t>That is, since SIZE_BODY &lt;= LIMIT, using Block-wise would not be required when using the original EDHOC execution workflow, provided that SIZE_EDHOC_M3 &lt;= LIMIT still holds.</t>
        <t>At the same time, using the combined workflow is in itself what actually triggers the use of Block-wise, since (SIZE_BODY + SIZE_EDHOC_M3) &gt; LIMIT.</t>
        <t>Therefore, the following round trips are experienced by the CoAP client.</t>
        <ul spacing="normal">
          <li>
            <t>The original EDHOC execution workflow run without using Block-wise results in a number of round trips RT_ORIG equal to 3.</t>
          </li>
          <li>
            <t>The optimized EDHOC execution workflow run using Block-wise results in a number of round trips RT_COMB equal to 1 + ceil(SIZE_BODY / SIZE_BLOCK).</t>
          </li>
        </ul>
        <t>It follows that RT_COMB &gt;= RT_ORIG, i.e., the optimized EDHOC execution workflow might still be not worse than the original EDHOC execution workflow in terms of round trips. This is the case only if the SIZE_BLOCK used is such that ceil(SIZE_BODY / SIZE_BLOCK) is equal to 2, i.e., the plain application data is fragmented into only 2 inner blocks, and thus the EDHOC + OSCORE request is followed by only one more request message transporting the last block of the body.</t>
        <t>However, even in such a case, there would be no advantage in terms or round trips compared to the original workflow, while still requiring the CoAP client and the CoAP server to perform the processing due to using the EDHOC + OSCORE request and Block-wise transferring.</t>
        <t>Therefore, if both the conditions COND8 and COND9 hold, the CoAP client should not send the EDHOC + OSCORE request. Instead, the CoAP client should continue by switching to the original EDHOC execution workflow. That is, the CoAP client first sends EDHOC message_3 prepended by the EDHOC Connection Identifier C_R encoded as per <xref section="3.3" sectionFormat="of" target="RFC9528"/> and then sends the OSCORE-protected CoAP request once the EDHOC execution is completed.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>There are no new operations or manageability requirements introduced by this document.</t>
      <t>Explanation: this document provides considerations for implementers of the EDHOC protocol, without updating the protocol or introducing extensions thereof.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>This document provides considerations for implementations of the EDHOC protocol. The security considerations compiled in <xref section="9" sectionFormat="of" target="RFC9528"/> and in <xref section="7" sectionFormat="of" target="RFC9668"/> apply. The compliance requirements for implementations that are listed in <xref section="8" sectionFormat="of" target="RFC9528"/> also apply.</t>
      <t>It is foreseeable that the EDHOC protocol will be extended (e.g., in terms of new cipher suites, new methods, and new types of authentication credentials) and that external security applications will be integrated into EDHOC by embedding the transport of their data in EDHOC EAD items. For implementations that support such extensions and external applications, the related security considerations and compliance requirements also apply.</t>
      <section anchor="assessing-the-correctness-of-implementations">
        <name>Assessing the Correctness of Implementations</name>
        <t>Tools relying on fuzz testing such as EDHOC-Fuzzer <xref target="EDHOC-Fuzzer"/> can help assess the correctness of implementations of the EDHOC protocol and of external security applications integrated into EDHOC.</t>
        <t>Such tools help finding and amending implementation errors especially related to the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Non-conformance with the protocol specification (e.g., unintended deviations in performing the protocol steps), which can be a potential source of security vulnerabilities in addition to performance deficiencies.</t>
          </li>
          <li>
            <t>Presence of inappropriate states and state transitions in the modeling of the EDHOC execution, e.g., states that are impossible to reach and traverse or that are not part of the protocol specification (which is a particular case of non-conformance).  </t>
            <t>
These states and transitions should be amended or removed, in order to reduce the memory footprint and code complexity and to simplify the implementation, thus reducing the risks of bugs and related security vulnerabilities.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC9668">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="R. Höglund" initials="R." surname="Höglund"/>
            <author fullname="S. Hristozov" initials="S." surname="Hristozov"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="November" year="2024"/>
            <abstract>
              <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) can be run over the Constrained Application Protocol (CoAP) and used by two peers to establish a Security Context for the security protocol Object Security for Constrained RESTful Environments (OSCORE). This document details this use of the EDHOC protocol by specifying a number of additional and optional mechanisms, including an optimization approach for combining the execution of EDHOC with the first OSCORE transaction. This combination reduces the number of round trips required to set up an OSCORE Security Context and to complete an OSCORE transaction using that Security Context.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9668"/>
          <seriesInfo name="DOI" value="10.17487/RFC9668"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6960">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <author fullname="R. Ankney" initials="R." surname="Ankney"/>
            <author fullname="A. Malpani" initials="A." surname="Malpani"/>
            <author fullname="S. Galperin" initials="S." surname="Galperin"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring Certificate Revocation Lists (CRLs). Additional mechanisms addressing PKIX operational requirements are specified in separate documents. This document obsoletes RFCs 2560 and 6277. It also updates RFC 5912.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6960"/>
          <seriesInfo name="DOI" value="10.17487/RFC6960"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="1" month="March" year="2026"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth client and resource
   server, and it binds an authentication credential of the client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications between the client and resource
   server when accessing protected resources according to the
   authorization information indicated in the access token.  This
   profile can be used to delegate management of authorization
   information from a resource-constrained server to a trusted host with
   less severe limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-10"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-key-update">
          <front>
            <title>Key Update for OSCORE (KUDOS)</title>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   Communications with the Constrained Application Protocol (CoAP) can
   be protected end-to-end at the application-layer by using the
   security protocol Object Security for Constrained RESTful
   Environments (OSCORE).  Under some circumstances, two CoAP endpoints
   need to update their OSCORE keying material before communications can
   securely continue, e.g., due to approaching key usage limits.  This
   document defines Key Update for OSCORE (KUDOS), a lightweight key
   update procedure that two CoAP endpoints can use to update their
   OSCORE keying material by establishing a new OSCORE Security Context.
   Accordingly, this document updates the use of the OSCORE flag bits in
   the CoAP OSCORE Option as well as the protection of CoAP response
   messages with OSCORE.  Also, it deprecates the key update procedure
   specified in Appendix B.2 of RFC 8613.  Therefore, this document
   updates RFC 8613.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-key-update-12"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-key-limits">
          <front>
            <title>Key Usage Limits for OSCORE</title>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="7" month="January" year="2026"/>
            <abstract>
              <t>   Object Security for Constrained RESTful Environments (OSCORE) uses
   AEAD algorithms to ensure confidentiality and integrity of exchanged
   messages.  Due to known issues allowing forgery attacks against AEAD
   algorithms, limits should be followed regarding the number of times a
   specific key is used for encryption or decryption.  Among other
   reasons, approaching key usage limits requires updating the OSCORE
   keying material before communications can securely continue.  This
   document defines how two OSCORE peers can follow these key usage
   limits and what steps they should take to preserve the security of
   their communications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-key-limits-06"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="25" month="January" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280, common certificate
   profiles and is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is over the CBOR encoding instead
   of the DER encoding, avoiding the use of ASN.1.  Both types of
   certificates have the same semantics as X.509 and the same reduced
   size compared to X.509.

   The document also specifies CBOR encoded data structures for
   certificate (signing) requests and certificate request templates, new
   COSE headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698; the TLSA selectors registry is
   extended to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-16"/>
        </reference>
        <reference anchor="I-D.ietf-lake-authz">
          <front>
            <title>Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Geovane Fedrecheski" initials="G." surname="Fedrecheski">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   Ephemeral Diffie-Hellman Over COSE (EDHOC) is a lightweight
   authenticated key exchange protocol intended for use in constrained
   scenarios.  This document specifies Lightweight Authorization using
   EDHOC (ELA).  The procedure allows authorizing enrollment of new
   devices using the extension point defined in EDHOC.  ELA is
   applicable to zero-touch onboarding of new devices to a constrained
   network leveraging trust anchors installed at manufacture time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-authz-06"/>
        </reference>
        <reference anchor="I-D.ietf-ace-workflow-and-params">
          <front>
            <title>Short Distribution Chain (SDC) Workflow and New OAuth Parameters for the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document updates the Authentication and Authorization for
   Constrained Environments Framework (ACE, RFC 9200) as follows. (1) It
   defines the Short Distribution Chain (SDC) workflow that the
   authorization server (AS) can use for uploading an access token to a
   resource server on behalf of the client. (2) For the OAuth 2.0 token
   endpoint, it defines new parameters and encodings and it extends the
   semantics of the "ace_profile" parameter. (3) For the OAuth 2.0
   authz-info endpoint, it defines a new parameter and its encoding. (4)
   It defines how the client and the AS can coordinate on the exchange
   of the client's and resource server's public authentication
   credentials, when those can be transported by value or identified by
   reference; this extends the semantics of the "rs_cnf" parameter for
   the OAuth 2.0 token endpoint, thus updating RFC 9201. (5) It extends
   the error handling at the AS, for which it defines a new error code.
   (6) It deprecates the original payload format of error responses
   conveying an error code, when CBOR is used to encode message
   payloads.  For those responses, it defines a new payload format
   aligned with RFC 9290, thus updating in this respect also the
   profiles defined in RFC 9202, RFC 9203, and RFC 9431. (7) It amends
   two of the requirements on profiles of the framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-workflow-and-params-06"/>
        </reference>
        <reference anchor="EDHOC-Fuzzer" target="https://dl.acm.org/doi/10.1145/3597926.3604922">
          <front>
            <title>EDHOC-Fuzzer: An EDHOC Protocol State Fuzzer</title>
            <author initials="K." surname="Sagonas" fullname="Konstantinos Sagonas">
              <organization/>
            </author>
            <author initials="T." surname="Typaldos" fullname="Thanasis Typaldos">
              <organization/>
            </author>
            <date year="2023" month="July" day="13"/>
          </front>
          <seriesInfo name="ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis" value=""/>
        </reference>
      </references>
    </references>
    <?line 965?>

<section anchor="sec-message-side-processing-m1-advanced">
      <name>Foreseen Advanced Processing of Incoming EDHOC message_1</name>
      <t>As mentioned in <xref target="sec-message-side-processing-m1"/>, future developments in EDHOC and in related external security applications might rely on an EAD item in EDHOC message_1 that specifies the authentication credential CRED associated with the Initiator (by value or by reference), as wrapped in a cryptographically protected "envelope".</t>
      <t>In order to handle such a case, the processing of an incoming EDHOC message_1 as described in <xref target="sec-message-side-processing-m1"/> is extended with additional steps performed by the SPO.</t>
      <t>Such an extended side processing shares similarities with that of an incoming EDHOC message_2 or message_3 (see <xref target="sec-message-side-processing-m2-m3"/>). In particular, similarly to what is compiled in <xref target="sec-pre-verif-phase-1"/> and <xref target="sec-pre-verif-phase-2"/>, the SPO first checks whether expected EAD items are absent in message_X (see <xref target="sec-message-side-processing"/>), and then performs the following steps.</t>
      <ul spacing="normal">
        <li>
          <t>(0) The SPO checks the presence of an EAD item that specifies the authentication credential CRED associated with the Initiator (by value or by reference).  </t>
          <t>
If no such EAD item is found, the SPO moves to Step 12. Otherwise, the SPO moves to Step 1.</t>
        </li>
        <li>
          <t>(1) The SPO determines CRED based on an EAD item retrieved at Step 0.  </t>
          <t>
The EAD item can specify CRED by value or by reference, including a URI or other external reference where CRED can be retrieved from.  </t>
          <t>
If CRED is already installed, the SPO moves to Step 2. Otherwise, the SPO moves to Step 3.</t>
        </li>
        <li>
          <t>(2) The SPO determines if the stored CRED is currently trusted and valid, e.g., by verifying that CRED has not expired and has not been revoked.  </t>
          <t>
Performing such a validation might require the SPO to first process an EAD item included in message_1.  </t>
          <t>
In case CRED is determined to be valid, the SPO moves to Step 9. Otherwise, the SPO moves to Step 11.</t>
        </li>
        <li>
          <t>(3) The SPO attempts to retrieve CRED via an EAD item considered at Step 1. Then, the SPO moves to Step 4.</t>
        </li>
        <li>
          <t>(4) If the retrieval of CRED has succeeded, the SPO moves to Step 5. Otherwise, the SPO moves to Step 11.</t>
        </li>
        <li>
          <t>(5) If the enforced trust policy for new authentication credentials is "NO-LEARNING" and P does not admit any exceptions that are acceptable to enforce for message_1 (see <xref target="sec-policy-no-learning"/>), the SPO moves to Step 11. Otherwise, the SPO moves to Step 6.</t>
        </li>
        <li>
          <t>(6) If this step has been reached, the peer P is not already storing the retrieved CRED and, at the same time, it enforces either the trust policy "LEARNING" or the trust policy "NO-LEARNING" while also enforcing an exception acceptable for message_1 (see <xref target="sec-policy-no-learning"/>).  </t>
          <t>
Consistently, the SPO determines if CRED is currently valid, e.g., by verifying that CRED has not expired and has not been revoked.  </t>
          <t>
Validating CRED might require the SPO to first process an EAD item included in message_1.  </t>
          <t>
After successfully validating CRED, the peer P can typically consider CRED as ultimately trusted as well. However, there can be cases where P requires to obtain additional information before doing so.  </t>
          <t>
If such additional information can be retrieved from message_1 (e.g., from an EAD item included therein), then P uses it to assess if CRED is trusted. Otherwise, if such additional information is expected later on during the EDHOC session, it can be acceptable for P to consider CRED as provisionally trusted.  </t>
          <t>
After completing the validation and trust assessment of CRED, the SPO moves to Step 7.</t>
        </li>
        <li>
          <t>(7) If CRED has been determined valid and (provisionally) trusted, the SPO moves to Step 8. Otherwise, the SPO moves to Step 11.</t>
        </li>
        <li>
          <t>(8) The SPO stores CRED as a valid and (provisionally) trusted authentication credential associated with the other peer, together with corresponding authentication credential identifiers (see <xref target="sec-trust-models"/>). Then, the SPO moves to Step 9.</t>
        </li>
        <li>
          <t>(9) The SPO checks if CRED is fine to use in the context of the ongoing EDHOC session, also depending on the specific identity of the other peer (see Sections <xref target="RFC9528" section="3.5" sectionFormat="bare"/> and <xref target="RFC9528" section="D.2" sectionFormat="bare"/> of <xref target="RFC9528"/>).  </t>
          <t>
If this is the case, the SPO moves to Step 10. Otherwise, the SPO moves to Step 11.</t>
        </li>
        <li>
          <t>(10) P uses CRED as authentication credential associated with the other peer in the ongoing EDHOC session. Then, the SPO moves to Step 12.</t>
        </li>
        <li>
          <t>(11) The SPO has not found a valid and (provisionally) trusted authentication credential associated with the other peer that can be used in the ongoing EDHOC session. Therefore, the EDHOC session with the other peer is aborted.</t>
        </li>
        <li>
          <t>(12) The SPO processes any EAD item included in message_1 that has not already been processed.  </t>
          <t>
Once all such EAD items have been processed, the SPO transfers control back to EDHOC. When doing so, the SPO also provides EDHOC with any produced EAD items to include in the EAD field of the next outgoing EDHOC message.</t>
        </li>
      </ul>
      <t>The flowchart in <xref target="fig-flowchart-spo-low-level-m1-advanced"/> shows the different steps taken for the advanced processing of an incoming EDHOC message_1 defined above.</t>
      <figure anchor="fig-flowchart-spo-low-level-m1-advanced">
        <name>Processing Steps for EDHOC message_1.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1936" width="576" viewBox="0 0 576 1936" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,400 L 8,1696" fill="none" stroke="black"/>
              <path d="M 16,128 L 16,160" fill="none" stroke="black"/>
              <path d="M 16,224 L 16,272" fill="none" stroke="black"/>
              <path d="M 16,1872 L 16,1920" fill="none" stroke="black"/>
              <path d="M 24,448 L 24,496" fill="none" stroke="black"/>
              <path d="M 24,560 L 24,608" fill="none" stroke="black"/>
              <path d="M 24,1584 L 24,1664" fill="none" stroke="black"/>
              <path d="M 32,616 L 32,1576" fill="none" stroke="black"/>
              <path d="M 56,864 L 56,928" fill="none" stroke="black"/>
              <path d="M 56,1024 L 56,1120" fill="none" stroke="black"/>
              <path d="M 56,1392 L 56,1520" fill="none" stroke="black"/>
              <path d="M 64,672 L 64,752" fill="none" stroke="black"/>
              <path d="M 88,1128 L 88,1384" fill="none" stroke="black"/>
              <path d="M 88,1528 L 88,1576" fill="none" stroke="black"/>
              <path d="M 88,1672 L 88,1744" fill="none" stroke="black"/>
              <path d="M 88,1824 L 88,1864" fill="none" stroke="black"/>
              <path d="M 96,80 L 96,120" fill="none" stroke="black"/>
              <path d="M 96,168 L 96,216" fill="none" stroke="black"/>
              <path d="M 96,280 L 96,304" fill="none" stroke="black"/>
              <path d="M 96,384 L 96,440" fill="none" stroke="black"/>
              <path d="M 96,504 L 96,552" fill="none" stroke="black"/>
              <path d="M 96,616 L 96,664" fill="none" stroke="black"/>
              <path d="M 96,760 L 96,856" fill="none" stroke="black"/>
              <path d="M 96,936 L 96,1016" fill="none" stroke="black"/>
              <path d="M 152,1872 L 152,1920" fill="none" stroke="black"/>
              <path d="M 176,128 L 176,160" fill="none" stroke="black"/>
              <path d="M 176,224 L 176,272" fill="none" stroke="black"/>
              <path d="M 192,560 L 192,608" fill="none" stroke="black"/>
              <path d="M 200,672 L 200,752" fill="none" stroke="black"/>
              <path d="M 200,864 L 200,928" fill="none" stroke="black"/>
              <path d="M 200,1024 L 200,1120" fill="none" stroke="black"/>
              <path d="M 208,1392 L 208,1520" fill="none" stroke="black"/>
              <path d="M 224,128 L 224,272" fill="none" stroke="black"/>
              <path d="M 224,448 L 224,496" fill="none" stroke="black"/>
              <path d="M 248,672 L 248,736" fill="none" stroke="black"/>
              <path d="M 248,864 L 248,1056" fill="none" stroke="black"/>
              <path d="M 248,1088 L 248,1424" fill="none" stroke="black"/>
              <path d="M 296,800 L 296,856" fill="none" stroke="black"/>
              <path d="M 296,1280 L 296,1328" fill="none" stroke="black"/>
              <path d="M 296,1392 L 296,1520" fill="none" stroke="black"/>
              <path d="M 320,1064 L 320,1272" fill="none" stroke="black"/>
              <path d="M 320,1336 L 320,1384" fill="none" stroke="black"/>
              <path d="M 344,864 L 344,1056" fill="none" stroke="black"/>
              <path d="M 360,672 L 360,736" fill="none" stroke="black"/>
              <path d="M 408,864 L 408,976" fill="none" stroke="black"/>
              <path d="M 416,672 L 416,752" fill="none" stroke="black"/>
              <path d="M 424,1152 L 424,1216" fill="none" stroke="black"/>
              <path d="M 432,760 L 432,800" fill="none" stroke="black"/>
              <path d="M 512,760 L 512,856" fill="none" stroke="black"/>
              <path d="M 512,984 L 512,1144" fill="none" stroke="black"/>
              <path d="M 512,1224 L 512,1272" fill="none" stroke="black"/>
              <path d="M 520,1584 L 520,1664" fill="none" stroke="black"/>
              <path d="M 528,672 L 528,752" fill="none" stroke="black"/>
              <path d="M 552,864 L 552,976" fill="none" stroke="black"/>
              <path d="M 552,1152 L 552,1216" fill="none" stroke="black"/>
              <path d="M 552,1280 L 552,1328" fill="none" stroke="black"/>
              <path d="M 552,1392 L 552,1520" fill="none" stroke="black"/>
              <path d="M 568,400 L 568,1696" fill="none" stroke="black"/>
              <path d="M 16,128 L 176,128" fill="none" stroke="black"/>
              <path d="M 200,128 L 224,128" fill="none" stroke="black"/>
              <path d="M 16,160 L 176,160" fill="none" stroke="black"/>
              <path d="M 224,192 L 248,192" fill="none" stroke="black"/>
              <path d="M 16,224 L 176,224" fill="none" stroke="black"/>
              <path d="M 16,272 L 176,272" fill="none" stroke="black"/>
              <path d="M 200,272 L 224,272" fill="none" stroke="black"/>
              <path d="M 8,400 L 88,400" fill="none" stroke="black"/>
              <path d="M 104,400 L 568,400" fill="none" stroke="black"/>
              <path d="M 24,448 L 224,448" fill="none" stroke="black"/>
              <path d="M 24,496 L 224,496" fill="none" stroke="black"/>
              <path d="M 24,560 L 192,560" fill="none" stroke="black"/>
              <path d="M 24,608 L 192,608" fill="none" stroke="black"/>
              <path d="M 64,672 L 200,672" fill="none" stroke="black"/>
              <path d="M 248,672 L 360,672" fill="none" stroke="black"/>
              <path d="M 416,672 L 528,672" fill="none" stroke="black"/>
              <path d="M 208,704 L 240,704" fill="none" stroke="black"/>
              <path d="M 368,704 L 408,704" fill="none" stroke="black"/>
              <path d="M 248,736 L 360,736" fill="none" stroke="black"/>
              <path d="M 64,752 L 200,752" fill="none" stroke="black"/>
              <path d="M 416,752 L 528,752" fill="none" stroke="black"/>
              <path d="M 296,800 L 432,800" fill="none" stroke="black"/>
              <path d="M 56,864 L 200,864" fill="none" stroke="black"/>
              <path d="M 248,864 L 344,864" fill="none" stroke="black"/>
              <path d="M 408,864 L 552,864" fill="none" stroke="black"/>
              <path d="M 208,880 L 240,880" fill="none" stroke="black"/>
              <path d="M 352,880 L 400,880" fill="none" stroke="black"/>
              <path d="M 56,928 L 200,928" fill="none" stroke="black"/>
              <path d="M 408,976 L 552,976" fill="none" stroke="black"/>
              <path d="M 56,1024 L 200,1024" fill="none" stroke="black"/>
              <path d="M 208,1040 L 240,1040" fill="none" stroke="black"/>
              <path d="M 248,1056 L 344,1056" fill="none" stroke="black"/>
              <path d="M 208,1088 L 248,1088" fill="none" stroke="black"/>
              <path d="M 56,1120 L 200,1120" fill="none" stroke="black"/>
              <path d="M 424,1152 L 552,1152" fill="none" stroke="black"/>
              <path d="M 424,1216 L 552,1216" fill="none" stroke="black"/>
              <path d="M 296,1280 L 552,1280" fill="none" stroke="black"/>
              <path d="M 296,1328 L 552,1328" fill="none" stroke="black"/>
              <path d="M 56,1392 L 208,1392" fill="none" stroke="black"/>
              <path d="M 296,1392 L 552,1392" fill="none" stroke="black"/>
              <path d="M 248,1424 L 288,1424" fill="none" stroke="black"/>
              <path d="M 56,1520 L 208,1520" fill="none" stroke="black"/>
              <path d="M 296,1520 L 552,1520" fill="none" stroke="black"/>
              <path d="M 24,1584 L 520,1584" fill="none" stroke="black"/>
              <path d="M 24,1664 L 520,1664" fill="none" stroke="black"/>
              <path d="M 8,1696 L 80,1696" fill="none" stroke="black"/>
              <path d="M 96,1696 L 568,1696" fill="none" stroke="black"/>
              <path d="M 16,1872 L 152,1872" fill="none" stroke="black"/>
              <path d="M 16,1920 L 152,1920" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="520,1272 508,1266.4 508,1277.6" fill="black" transform="rotate(90,512,1272)"/>
              <polygon class="arrowhead" points="520,1144 508,1138.4 508,1149.6" fill="black" transform="rotate(90,512,1144)"/>
              <polygon class="arrowhead" points="520,856 508,850.4 508,861.6" fill="black" transform="rotate(90,512,856)"/>
              <polygon class="arrowhead" points="416,704 404,698.4 404,709.6" fill="black" transform="rotate(0,408,704)"/>
              <polygon class="arrowhead" points="360,880 348,874.4 348,885.6" fill="black" transform="rotate(180,352,880)"/>
              <polygon class="arrowhead" points="328,1384 316,1378.4 316,1389.6" fill="black" transform="rotate(90,320,1384)"/>
              <polygon class="arrowhead" points="328,1064 316,1058.4 316,1069.6" fill="black" transform="rotate(270,320,1064)"/>
              <polygon class="arrowhead" points="304,856 292,850.4 292,861.6" fill="black" transform="rotate(90,296,856)"/>
              <polygon class="arrowhead" points="248,1040 236,1034.4 236,1045.6" fill="black" transform="rotate(0,240,1040)"/>
              <polygon class="arrowhead" points="248,880 236,874.4 236,885.6" fill="black" transform="rotate(0,240,880)"/>
              <polygon class="arrowhead" points="248,704 236,698.4 236,709.6" fill="black" transform="rotate(0,240,704)"/>
              <polygon class="arrowhead" points="216,1088 204,1082.4 204,1093.6" fill="black" transform="rotate(180,208,1088)"/>
              <polygon class="arrowhead" points="104,1016 92,1010.4 92,1021.6" fill="black" transform="rotate(90,96,1016)"/>
              <polygon class="arrowhead" points="104,856 92,850.4 92,861.6" fill="black" transform="rotate(90,96,856)"/>
              <polygon class="arrowhead" points="104,664 92,658.4 92,669.6" fill="black" transform="rotate(90,96,664)"/>
              <polygon class="arrowhead" points="104,552 92,546.4 92,557.6" fill="black" transform="rotate(90,96,552)"/>
              <polygon class="arrowhead" points="104,216 92,210.4 92,221.6" fill="black" transform="rotate(90,96,216)"/>
              <polygon class="arrowhead" points="104,120 92,114.4 92,125.6" fill="black" transform="rotate(90,96,120)"/>
              <polygon class="arrowhead" points="96,1864 84,1858.4 84,1869.6" fill="black" transform="rotate(90,88,1864)"/>
              <polygon class="arrowhead" points="96,1744 84,1738.4 84,1749.6" fill="black" transform="rotate(90,88,1744)"/>
              <polygon class="arrowhead" points="96,1576 84,1570.4 84,1581.6" fill="black" transform="rotate(90,88,1576)"/>
              <polygon class="arrowhead" points="96,1384 84,1378.4 84,1389.6" fill="black" transform="rotate(90,88,1384)"/>
              <polygon class="arrowhead" points="40,1576 28,1570.4 28,1581.6" fill="black" transform="rotate(90,32,1576)"/>
              <g class="text">
                <text x="52" y="36">Incoming</text>
                <text x="40" y="52">EDHOC</text>
                <text x="104" y="52">message_1</text>
                <text x="52" y="148">Decode</text>
                <text x="120" y="148">message_1</text>
                <text x="280" y="196">(Core</text>
                <text x="328" y="196">EDHOC</text>
                <text x="400" y="196">Processing)</text>
                <text x="60" y="244">Accepted</text>
                <text x="132" y="244">selected</text>
                <text x="52" y="260">cipher</text>
                <text x="104" y="260">suite</text>
                <text x="40" y="340">Control</text>
                <text x="120" y="340">transferred</text>
                <text x="180" y="340">to</text>
                <text x="24" y="356">the</text>
                <text x="100" y="356">side-processor</text>
                <text x="188" y="356">object</text>
                <text x="420" y="420">Side</text>
                <text x="484" y="420">processing</text>
                <text x="56" y="468">Check</text>
                <text x="112" y="468">whether</text>
                <text x="180" y="468">expected</text>
                <text x="48" y="484">EAD</text>
                <text x="88" y="484">items</text>
                <text x="128" y="484">are</text>
                <text x="172" y="484">absent</text>
                <text x="44" y="580">0.</text>
                <text x="76" y="580">Does</text>
                <text x="108" y="580">an</text>
                <text x="136" y="580">EAD</text>
                <text x="52" y="596">item</text>
                <text x="104" y="596">specify</text>
                <text x="160" y="596">CRED?</text>
                <text x="52" y="644">NO</text>
                <text x="120" y="644">YES</text>
                <text x="84" y="692">1.</text>
                <text x="116" y="692">Does</text>
                <text x="148" y="692">an</text>
                <text x="176" y="692">EAD</text>
                <text x="220" y="692">NO</text>
                <text x="268" y="692">3.</text>
                <text x="316" y="692">Retrieve</text>
                <text x="436" y="692">4.</text>
                <text x="460" y="692">Is</text>
                <text x="488" y="692">the</text>
                <text x="92" y="708">item</text>
                <text x="136" y="708">point</text>
                <text x="172" y="708">to</text>
                <text x="276" y="708">CRED</text>
                <text x="312" y="708">via</text>
                <text x="464" y="708">retrieval</text>
                <text x="84" y="724">an</text>
                <text x="128" y="724">already</text>
                <text x="268" y="724">an</text>
                <text x="296" y="724">EAD</text>
                <text x="332" y="724">item</text>
                <text x="436" y="724">of</text>
                <text x="468" y="724">CRED</text>
                <text x="100" y="740">stored</text>
                <text x="152" y="740">CRED?</text>
                <text x="472" y="740">successful?</text>
                <text x="452" y="788">NO</text>
                <text x="536" y="788">YES</text>
                <text x="120" y="836">YES</text>
                <text x="220" y="868">NO</text>
                <text x="384" y="868">YES</text>
                <text x="76" y="884">2.</text>
                <text x="100" y="884">Is</text>
                <text x="132" y="884">this</text>
                <text x="172" y="884">CRED</text>
                <text x="272" y="884">11.</text>
                <text x="312" y="884">Abort</text>
                <text x="428" y="884">5.</text>
                <text x="452" y="884">Is</text>
                <text x="480" y="884">the</text>
                <text x="520" y="884">trust</text>
                <text x="88" y="900">still</text>
                <text x="136" y="900">valid</text>
                <text x="176" y="900">and</text>
                <text x="272" y="900">the</text>
                <text x="312" y="900">EDHOC</text>
                <text x="444" y="900">policy</text>
                <text x="492" y="900">used</text>
                <text x="100" y="916">trusted?</text>
                <text x="288" y="916">session</text>
                <text x="476" y="916">"NO-LEARNING",</text>
                <text x="448" y="932">without</text>
                <text x="496" y="932">any</text>
                <text x="460" y="948">acceptable</text>
                <text x="464" y="964">exceptions?</text>
                <text x="120" y="996">YES</text>
                <text x="404" y="1012">Here</text>
                <text x="440" y="1012">the</text>
                <text x="480" y="1012">trust</text>
                <text x="532" y="1012">NO</text>
                <text x="220" y="1028">NO</text>
                <text x="412" y="1028">policy</text>
                <text x="460" y="1028">used</text>
                <text x="492" y="1028">is</text>
                <text x="76" y="1044">9.</text>
                <text x="100" y="1044">Is</text>
                <text x="132" y="1044">this</text>
                <text x="172" y="1044">CRED</text>
                <text x="432" y="1044">"LEARNING",</text>
                <text x="492" y="1044">or</text>
                <text x="84" y="1060">good</text>
                <text x="116" y="1060">to</text>
                <text x="144" y="1060">use</text>
                <text x="172" y="1060">in</text>
                <text x="440" y="1060">"NO-LEARNING"</text>
                <text x="80" y="1076">the</text>
                <text x="128" y="1076">context</text>
                <text x="172" y="1076">of</text>
                <text x="420" y="1076">together</text>
                <text x="476" y="1076">with</text>
                <text x="84" y="1092">this</text>
                <text x="128" y="1092">EDHOC</text>
                <text x="396" y="1092">an</text>
                <text x="452" y="1092">overriding</text>
                <text x="100" y="1108">session?</text>
                <text x="424" y="1108">exception</text>
                <text x="444" y="1172">6.</text>
                <text x="484" y="1172">Assess</text>
                <text x="524" y="1172">if</text>
                <text x="452" y="1188">CRED</text>
                <text x="484" y="1188">is</text>
                <text x="520" y="1188">valid</text>
                <text x="448" y="1204">and</text>
                <text x="496" y="1204">trusted</text>
                <text x="112" y="1252">YES</text>
                <text x="340" y="1252">NO</text>
                <text x="316" y="1300">7.</text>
                <text x="340" y="1300">Is</text>
                <text x="372" y="1300">CRED</text>
                <text x="416" y="1300">valid</text>
                <text x="456" y="1300">and</text>
                <text x="368" y="1316">(provisionally)</text>
                <text x="468" y="1316">trusted?</text>
                <text x="344" y="1364">YES</text>
                <text x="80" y="1412">10.</text>
                <text x="132" y="1412">Continue</text>
                <text x="180" y="1412">by</text>
                <text x="316" y="1412">8.</text>
                <text x="352" y="1412">Store</text>
                <text x="396" y="1412">CRED</text>
                <text x="428" y="1412">as</text>
                <text x="464" y="1412">valid</text>
                <text x="504" y="1412">and</text>
                <text x="112" y="1428">considering</text>
                <text x="180" y="1428">this</text>
                <text x="368" y="1428">(provisionally)</text>
                <text x="468" y="1428">trusted.</text>
                <text x="84" y="1444">CRED</text>
                <text x="116" y="1444">as</text>
                <text x="144" y="1444">the</text>
                <text x="124" y="1460">authentication</text>
                <text x="324" y="1460">Pair</text>
                <text x="364" y="1460">CRED</text>
                <text x="404" y="1460">with</text>
                <text x="468" y="1460">consistent</text>
                <text x="108" y="1476">credential</text>
                <text x="348" y="1476">credential</text>
                <text x="444" y="1476">identifiers,</text>
                <text x="512" y="1476">for</text>
                <text x="108" y="1492">associated</text>
                <text x="172" y="1492">with</text>
                <text x="324" y="1492">each</text>
                <text x="384" y="1492">supported</text>
                <text x="444" y="1492">type</text>
                <text x="476" y="1492">of</text>
                <text x="80" y="1508">the</text>
                <text x="120" y="1508">other</text>
                <text x="164" y="1508">peer</text>
                <text x="348" y="1508">credential</text>
                <text x="440" y="1508">identifier.</text>
                <text x="48" y="1604">12.</text>
                <text x="96" y="1604">Process</text>
                <text x="144" y="1604">the</text>
                <text x="176" y="1604">EAD</text>
                <text x="216" y="1604">items</text>
                <text x="260" y="1604">that</text>
                <text x="300" y="1604">have</text>
                <text x="336" y="1604">not</text>
                <text x="372" y="1604">been</text>
                <text x="432" y="1604">processed</text>
                <text x="492" y="1604">yet.</text>
                <text x="52" y="1636">Make</text>
                <text x="88" y="1636">all</text>
                <text x="120" y="1636">the</text>
                <text x="168" y="1636">results</text>
                <text x="212" y="1636">of</text>
                <text x="240" y="1636">the</text>
                <text x="272" y="1636">EAD</text>
                <text x="332" y="1636">processing</text>
                <text x="416" y="1636">available</text>
                <text x="468" y="1636">to</text>
                <text x="56" y="1652">build</text>
                <text x="96" y="1652">the</text>
                <text x="132" y="1652">next</text>
                <text x="176" y="1652">EDHOC</text>
                <text x="236" y="1652">message.</text>
                <text x="40" y="1780">Control</text>
                <text x="120" y="1780">transferred</text>
                <text x="188" y="1780">back</text>
                <text x="20" y="1796">to</text>
                <text x="48" y="1796">the</text>
                <text x="84" y="1796">core</text>
                <text x="128" y="1796">EDHOC</text>
                <text x="196" y="1796">processing</text>
                <text x="56" y="1892">Advance</text>
                <text x="104" y="1892">the</text>
                <text x="184" y="1892">(Core</text>
                <text x="232" y="1892">EDHOC</text>
                <text x="304" y="1892">processing)</text>
                <text x="60" y="1908">protocol</text>
                <text x="120" y="1908">state</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
  Incoming
  EDHOC message_1

           |
           |
           v
 +-------------------+  ---+
 | Decode message_1  |     |
 +-------------------+     |
           |               |
           |               +--- (Core EDHOC Processing)
           v               |
 +-------------------+     |
 | Accepted selected |     |
 | cipher suite      |     |
 +-------------------+  ---+
           |
           |

 Control transferred to
 the side-processor object

           |
+----------|----------------------------------------------------------+
|          |                                      Side processing     |
|          |                                                          |
| +------------------------+                                          |
| | Check whether expected |                                          |
| | EAD items are absent   |                                          |
| +------------------------+                                          |
|          |                                                          |
|          |                                                          |
|          v                                                          |
| +--------------------+                                              |
| | 0. Does an EAD     |                                              |
| | item specify CRED? |                                              |
| +--------------------+                                              |
|  |       |                                                          |
|  | NO    | YES                                                      |
|  |       v                                                          |
|  |   +----------------+     +-------------+      +-------------+    |
|  |   | 1. Does an EAD | NO  | 3. Retrieve |      | 4. Is the   |    |
|  |   | item point to  |---->| CRED via    |----->| retrieval   |    |
|  |   | an already     |     | an EAD item |      | of CRED     |    |
|  |   | stored CRED?   |     +-------------+      | successful? |    |
|  |   +----------------+                          +-------------+    |
|  |       |                                         |         |      |
|  |       |                                         | NO      | YES  |
|  |       |                        +----------------+         |      |
|  |       |                        |                          |      |
|  |       | YES                    |                          |      |
|  |       v                        v                          v      |
|  |  +-----------------+ NO  +-----------+   YES +-----------------+ |
|  |  | 2. Is this CRED |---->| 11. Abort |<------| 5. Is the trust | |
|  |  | still valid and |     | the EDHOC |       | policy used     | |
|  |  | trusted?        |     | session   |       | "NO-LEARNING",  | |
|  |  +-----------------+     |           |       | without any     | |
|  |       |                  |           |       | acceptable      | |
|  |       |                  |           |       | exceptions?     | |
|  |       |                  |           |       +-----------------+ |
|  |       | YES              |           |                    |      |
|  |       v                  |           |     Here the trust | NO   |
|  |  +-----------------+ NO  |           |     policy used is |      |
|  |  | 9. Is this CRED |---->|           |     "LEARNING", or |      |
|  |  | good to use in  |     +-----------+     "NO-LEARNING"  |      |
|  |  | the context of  |              ^        together with  |      |
|  |  | this EDHOC      |<----+        |        an overriding  |      |
|  |  | session?        |     |        |        exception      |      |
|  |  +-----------------+     |        |                       |      |
|  |      |                   |        |                       v      |
|  |      |                   |        |            +---------------+ |
|  |      |                   |        |            | 6. Assess if  | |
|  |      |                   |        |            | CRED is valid | |
|  |      |                   |        |            | and trusted   | |
|  |      |                   |        |            +---------------+ |
|  |      |                   |        |                       |      |
|  |      | YES               |        | NO                    |      |
|  |      |                   |        |                       v      |
|  |      |                   |     +-------------------------------+ |
|  |      |                   |     | 7. Is CRED valid and          | |
|  |      |                   |     | (provisionally) trusted?      | |
|  |      |                   |     +-------------------------------+ |
|  |      |                   |        |                              |
|  |      |                   |        | YES                          |
|  |      v                   |        v                              |
|  |  +------------------+    |     +-------------------------------+ |
|  |  | 10. Continue by  |    |     | 8. Store CRED as valid and    | |
|  |  | considering this |    +-----| (provisionally) trusted.      | |
|  |  | CRED as the      |          |                               | |
|  |  | authentication   |          | Pair CRED with consistent     | |
|  |  | credential       |          | credential identifiers, for   | |
|  |  | associated with  |          | each supported type of        | |
|  |  | the other peer   |          | credential identifier.        | |
|  |  +------------------+          +-------------------------------+ |
|  |      |                                                           |
|  |      |                                                           |
|  v      v                                                           |
| +-------------------------------------------------------------+     |
| | 12. Process the EAD items that have not been processed yet. |     |
| |                                                             |     |
| | Make all the results of the EAD processing available to     |     |
| | build the next EDHOC message.                               |     |
| +-------------------------------------------------------------+     |
|         |                                                           |
+---------|-----------------------------------------------------------+
          |
          |
          v

 Control transferred back
 to the core EDHOC processing

          |
          |
          v
 +----------------+
 | Advance the    | (Core EDHOC processing)
 | protocol state |
 +----------------+
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-05-06">
        <name>Version -05 to -06</name>
        <ul spacing="normal">
          <li>
            <t>Generalized trust assessment of authentication credentials.</t>
          </li>
          <li>
            <t>Revised discussion on the ELA procedure, based on upcoming updates expected in version -07 of draft-ietf-lake-authz.</t>
          </li>
          <li>
            <t>Added side-processing check about the absence of expected EAD items in incoming EDHOC messages.</t>
          </li>
          <li>
            <t>Added "Operational Considerations" section.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-04-05">
        <name>Version -04 to -05</name>
        <ul spacing="normal">
          <li>
            <t>Minor clarifications.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-03-04">
        <name>Version -03 to -04</name>
        <ul spacing="normal">
          <li>
            <t>Clarified and re-positioned exceptions to NO-LEARNING policy.</t>
          </li>
          <li>
            <t>Added security considerations.</t>
          </li>
          <li>
            <t>Appendix on foreseen advanced processing of incoming EDHOC message_1.</t>
          </li>
          <li>
            <t>Clarifications and editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>
            <t>Consistent use of "trust policy" instead of "trust model".</t>
          </li>
          <li>
            <t>More modular presentation of trust policies and their enforcement.</t>
          </li>
          <li>
            <t>Alignment with use of EDHOC in the EDHOC and OSCORE profile of ACE.</t>
          </li>
          <li>
            <t>Note on follow-up actions for the application after EDHOC completion.</t>
          </li>
          <li>
            <t>Removed moot section on special handling when using the EDHOC and OSCORE profile of ACE.</t>
          </li>
          <li>
            <t>Consistency checks of authentication credentials from ID_CRED and EAD items.</t>
          </li>
          <li>
            <t>Updated reference.</t>
          </li>
          <li>
            <t>Clarifications and editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Improved content on the EDHOC and OSCORE profile of ACE.</t>
          </li>
          <li>
            <t>Admit situation-specific exceptions to the "NO-LEARNING" policy.</t>
          </li>
          <li>
            <t>Using the EDHOC and OSCORE profile of ACE with the "NO-LEARNING" policy.</t>
          </li>
          <li>
            <t>Revised guidelines on using EDHOC with CoAP and Block-wise.</t>
          </li>
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Added considerations on trust policies when using the EDHOC and OSCORE profile of the ACE framework.</t>
          </li>
          <li>
            <t>Placeholder section on special processing when using the EDHOC and OSCORE profile of the ACE framework.</t>
          </li>
          <li>
            <t>Added considerations on using EDHOC with CoAP and Block-wise.</t>
          </li>
          <li>
            <t>Editorial improvements.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author sincerely thanks <contact fullname="Christian Amsüss"/>, <contact fullname="Geovane Fedrecheski"/>, <contact fullname="Rikard Höglund"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Göran Selander"/>, and <contact fullname="Mališa Vučinić"/> for their comments and feedback.</t>
      <t>The work on this document has been partly supported by the Sweden's Innovation Agency VINNOVA and the Celtic-Next project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1923bcVpbYO78Ci3oYss0qi6QkW+xbKIqymbYkLlKy3clk
tMAqFIlRVaEaQJGmTeU1T/mGrPzEPOWtJ/+VfT03HKBAUlI73VNrdZuqAs5l
n332/TIYDNYu95LdtbU6r6fZXnI0W0yzWTav0zov5slBMa/ycVbSv6pkUpTJ
4eICHijTafI8n0zybPBtNp3O0nny+jIrk4PXp4fJxuHzb18fbK6lZ2dldtlr
UHxhbVyM5ukMVjEu00k9yLN6Mpim77NBNr4oRoMchhmM4BX4ss6qem2U1ntJ
Pp8Ua9XybJZXFYxXXy9wG4dvXqyt5YtyL6nLZVXvPHz49OHOWlpm6V5ymo2W
ZV5fr12d7yXf7f/pMPmhKN/n8/Pkm7JYLtbeX8EA8zor51k9eI5LWVsbFWN4
YC9ZwpK+XltLl/VFUe6tJYMk4SW/TMtRkbzJp8UoXUvgU5Tw+MkRgGP/GX1R
1WWWwYKPqnTyr0U5rs7TGsC2s0O/jmBBe8mf8qrm12FCGPX0cLD95NGjh8lp
XYzeXxTTmfy4nNclPH96lY2zOX2XzdJ8upfMcB3Dmtbxn8p8WGVra/OinAGw
LzNYcHLy4uCrncc7+ufTx0/lz6+fbO/Kn08f73ytfz55An+uIZT9QXaefv1E
/oSnH8qfT54+0T+fAtDxz6PB8yEdZTrSkyyqUVFmg0VZTPJp5j1EP8jv77Pr
wXIxhsPufGSaz/K6Ch6pssHorCgH2RwhOR6MsrL2HiHEwnP8ubHIK0CHybS4
GqTz8WCRlumMRickHbxY/vxzhkcPH4MG9BnIfxPAyQrOcpicpufFPK3M94wq
fwIUhpOv83lRBY8EQ7wZJm+uF+l0XIRjvLlI4a288n+XS7zurTTZn/PSk+Oy
ADQqpoBNANOEf19n5MzKPKvwlOH1o9PTN/vJzsOd3T18Z5RliPxVUkyS+iJL
dnfm42T/4GVyevTN6esXb+Sy0HUGsnB6PVsUVb6cJXDXT4tJfQXXLnkDFxav
WIrvwmPXsHiems6XZhs8/Gqwvcs7SctzvCwXdb2o9r78cjwdpqPZEC7Vl+Mi
/3L74XB7+9HjL3cfP/3q6c6T4e6Th4+ewk1aAyKDFwnGOD387gXs5b8CJg5+
hM9/W19bGwwGSXoGFzEdwZ1+cwHwA5qzRNKUADJeAlWqklGTPJ0vc4QA7T73
iZnABDEB5waSlI0TwMok+2kEZ3Se4cAM9f6Uc8hLneXj8RTu7wOEcFmMlyOa
8kHyy4Mcv/iwttZ/zOSXX+Rmf/iQwMbTZJqfX9RXGf5/n/VvJVm1yEZ5Op1e
A3rW2RzuFYFnWQFY5gQ4AG0+h6+rUTZPy7yoYCvPgdoK8MbZZTYtFgRwgByt
bAuWMl/OzmC98BWCPqmLRT6qkqsMEAcGrGBAxJtxXo2WFfwLXqkS3Pc5Djwp
i1kCjCbPrgyOGqAzq4CJq/x8TqPQ48EpAj7kl3kNVwBu3EVW+UuAJQFoALpj
nBf2WMzPAQYLICmwW9pb0YIbfPEAly5gezUAVB81CwTAAfXKppNh8i0Qq2wL
f75O8M7Mi9ruGR90jnArubrIRxdJiccHi5kAHleAvTAtndLkWmEOe1sCfuiE
cCD7Nf1QASUBkjGDKc3Cs5JACOtMF4spogNuZFnpYLwfs/iilKeZ5ABKnZVp
eb2ewOmfTfEl2Bvhxyid43YqnAnQ5xx4EqxgCTsQSOPRXOXTaXKRXmYEJSDQ
OOcMka2AbRDXg2+ASZ9fFEvaRF6GQEfiDXs8AvCXYwR6AcsFtINXZ8tpncPD
sF/A3QUiMHwLXASBXFwSCaR1pADwqsIxBaEKgxGEeldwyfC/MPYkHeXTnOgp
vomUooEHFrvwcF2iAzCcZiOYJYSEHnvFEJBNh7QpPRMwtGHeMIGzTpMLQJLB
FO8eYZdOBBj1lyXSZVwjHccMxIf8Z0C2M7imV8D3f5N8C8uhk4QxRwVOgxSC
jxuhRAu5AuLBeHuWwUNIDi7Tac7XFjHEQSYgLgABAPZlJpcxnfvj6XAIdX88
vJ15xetHIhbcjiobDWSMwYWs+8OHIW7jEAWYUaaUZwzUEq424hPKh8migPXR
AV3lNdwqInU1HvA0S0u64/PsyiWTuM5RmRFpSKewFKZysJfsJxAwg2NYuWxa
xmAGssq0kiU/K9P56AJkl2IidHGBzLiq5DRyEG1m+DcDbwa/pOdmCyC3wDqX
07SE3dBeR3jwIDBvJpOsHl0oNybAGrRp3+Fv6ekcXveXcfgTcf9psk/SUP4z
v/kcpFvgPfvPN4EGZLNKCRbsuF6Wc2BuyHcW0xRoXVIWU2IhiJx3WlwPCAt8
BgjJgd2C4gfgA17TDKgTkzuGKpIFWtaBw932HXQ2QtXGQbF/LGwWJWxks8gU
Z2f5XEgTnsszkMzfD65ypChwwNUESS5yUXxd3gahHCk8iFFVfgYLqgsQhpCD
0Ai4mmIBhJtuKi/T4pwKr3DFJrRYwzdAkofNrgbUmVkhwebBAxDeSkC0Ylqc
XycPUPyo7RcfUJACNp2lSG1hxOwnvDowIFyeMzjOdAYEMtW1w4tM4YCUjbIF
kL4ym6byeITDeCyvCeItGqs3THE7HkU7EjrFs54qPSMp1TnkPyHNwo1HKYyI
klXG8pkSaaLdyayokM7PZsiZc2DFtVC4EvjQOSAc0N5kxKIEiBRZuQU8HM8c
WbezhBQJPfwfPgI8skouc0AO5D3XCk8QTKa4qbOiviDa/cbA01Bqdxi60fpc
g0Qj/OjRtlUgGx1Nl0Yyfj8vrqbZGERGWANsUGQeYArE0s8y2Gon3YcBh9lw
Kzm7BmIGx6jCHD307vCnRVHWiGMopgDfhTVParmdwD/xPk+WU2VSSjJi9DjZ
qLIM8OJUTuzRcAd/M5iGAvizZT6lrRVMloDXXrJwBpCZwgXD3wDXAYQVPwPq
PSJzdpkiZ08r1iXgaOcKoQsH88JzQbEjOIItJYksvvBhzK+tSMLMsTLcERCx
UEUGEA9YOi6gBI5Ngkmq4qWzAx9ZcdWMm8m6s5qKlrOeoNo6VszI8EscYgbX
twQiTHsgdTmrecCUMH+BS02N2QUpaZ39VJthKv3BXPrXZ/+K3Ne8wVfZ0t+T
w9M3eNSH88schHEW1DZenx68PjkU8oDWDCQPjFEkULBcDFua0vWiVYVIj2JQ
t2wSoM7+cLuBOq/gvErY2RRe2bKidii8lWb+M+R+ihI5CcxED3klSUE3qYkd
2fBc96ZvoOZmZZsGZCvWQRhSKL3XFl9CgkP0mkbIkA0vMzlRXDfInXOaLwQP
84uAmj5jGU5p7YOQkAr6CicJyE3KFO8Y0EwICUlkuF1aTZtQmpwSlWQmJDMg
nxkmPyDAThHOIO2+Z6VOHtiKkd3jZLEsQbCCd0g0z3A24HPpCOFTR+XbDT4b
HE2AHaL/Jq//CiY/z+aIFYpyp0MCxLy5mHKJeEOSqEfUInzTSgqEPAjDYfJ2
gUzIkEq4BkosPfXOjC3awlVB76vUznIg2rBQC6LVtIGB9kMqj+jhIbLggaO0
MroAcZVFkEl+PjBfNXDkQ1JdFFdVg5w27ilBFzEg0CDW1v67/SRpWl2erylm
0uc5na8DDh2RPicZHII+qNBY4weTZDAY/IHAE54cQYN+5UfpT4UhQHDNm8Sj
QHmdtH7CKdy9rf2ylzzoBCbbC3+//m0MjqcuHL9Nw1s8XAdCUKOwOYB/ns9/
vz4i88E63OL98CzM1fXPYosIe/ZTOiOlHH5M0VSAxoc2QT85ODl8/u5HOlhg
vnmJxiAYRN8l0wrTC3xESQWTctb10DpVLEvUhnBrzoAkoZTZZfE+U00zc9QC
S0QqeWtLzxo0LOS2oIgU3mPIrRuqLTwok+LlJ8oN/23fclpVxSgn+kC3OsvN
lVYBwTAnZnfHYlJKhMNaGrA5hANka0NK3L6F4gnpTMfjnM26sH8mfLp2Elhg
e1Vd0CGMihK15mJOQpOzfGM9K5k5NOTqNvaACH1P3tBGl+BkyRqVTsjUxFh3
jRKTsAeBEL6Pkr0rOVj+GZL0Jizj6xKqaFiDWM0YFeDIVPDQn9PrTERxtIlV
pNrryaNmsZzrfEBPRmj92k9gZSICgBx1+CYKhQqIgiJVOrdIgsY6varAcSyQ
ggs7XmaqtVmBEhTBCpg+6R84MWJSibwS0RxNcYNxxuojfEFXmFeEhsjfui/R
bQSegYbE6oLFGzwoXAKSiBmZA5H75TO5y3SswBun6YKtxCPAyrEYaDO2APli
ttp9fgtwp8lxzxmb0kj/4NWo+kInlM3JFofT8iVZANdFYWBUXi9AVS/TxQUo
1+yW4oUBz1pOx4RzII0sUjZis4zgLVJMw2haRmOk8HYjx6XT8wL+uJgFOInr
AsztsPt0oi1hu6yXJGDfKLDC80Zq9Q9ssoMTuAB4ZPMqSlgc8rxgx1KFtI+x
B3FmG+jTpKmiMBWqSLNNLoopC2rz5n0DHY3O5LTOFsnOMHmNSI2GgS3ko/7P
u7Bs4KG/Sb6DO7KsxGCCUl4V4f50KdmEFTAZ5dZ0zZjgZtMxSjvwzT8hEwB5
C6hkGzUilwPIWlVOR8WX2lFhT2PCXAfdLrNRZsUH/zUi254EiGZvdm3USKVg
1QUAQYxlJE+yNUeoxHUrTfWEllPcFN3ILVkVoHSVE/c9DXWox8OYAk5H88aC
ulou0ACAAjBqOewYdrxTyEMBClPxRbITAWZFxzWZE5tyM59wVFRmJQFONK9W
UvzIcnS1aEq/dhGGSWvyp7fPX592XS0ej67WzrBhoKGzJm2gbX4kYPAknyuh
+3YcjXLHUSKDwLZvB4DG0nCXKCe3rY63HwM8nbuQgNibzDpIuHLRmNfBDzcN
KUTURNoWX+K8SCbLkhXrkVXIkcHOPbIR3V+TkOxGD8mld4yJVUDcZPI9wfej
2uiXeArNbzsJEx6Xp1BuGXHCUq5b0aZAPz0TORfIgHM4xYikjbFqvXH7Hch6
b/l5a8DzbNRKDr71SAH5GOmcnBlnWX1RjKtNB0D/gLqxJyC3KsatC2jTkFFD
sFIEMU4QWJazrHLFYjastFMGowZHb3FhiGCnQt7Qb+G4b+R/l2tNffjV67X9
knmo+QxI13a0endQ+wAp9msNIPGHiYhsKGIVkAA2w+P+GFmb8/mXxh/Oh/bX
/u5N44/Gu38+PL3DuwjPyz7zdu8tOsfzxuVYO6qECyR4bH0GIQdsiBCGz/6R
ztH/fNFzzXbebtgHz7XC2XuuA6bec30+N2snwFUN3D7CeLfZb7/nPu5+0fKk
+22gifMcUe5sHMcDixCGgODhEREBWsPU2hEgGmRghV3NJcRRoxpQR6LBDdvH
HaxrMRMK8MhnZJLfJ/6VnKBzfYVlpS5A1AnsK1G/kGFxtFi1su0fHAILS2cZ
rpKVct+CRQYiLyQgiBHLXO8N+3l3Hj4ERkY6iu+sUaqLPwnDkehRAiusxRMl
VsacWp11XOB2q2KL9B4RGOyeU4zOgfPBKcpMDIdVVmJYwMbJ6SZooxzYaDUl
fYwVO0/5cgYbTXO0z+CGyozCcFh/4QOkwzGGIHzeB6WuYP9005g+8rmaONmn
jnLlRb6w4s7JqQip7hwCaDRW8tcl4w6d6EjjPCK7U/n25NQLiUKJd3kG6Nlh
0RQoMwi2KKQVTnn/7Ztv35F18QBNWOLbTeGBA7iY0yId8/De8sVmcnLqi51o
xt5/TpEn4qVm1DDmbVVwxzY4MYykIC2VAqE2h8m+1StV29g/JT2Hl9axMvQO
n2UXKdpj/Y2zWsyvOnrrKRx0nTwHSaLMz3gtBxcYHrBx+vxgsyXCY1UEM2E8
hd6DgAKIZ7BixcUK5VxU68RR6WiO3nU1onC7bEgnmZdqgmx1o61ytib7tTn/
xgnklXVU+kECVrpvuA1T+7xrfGzZSYCoRt9DtQ61O++uj5z7fZFF7xRSE9bZ
Q7uNGRC32rAZ+ndX7/RYrcQuWJgGeHZjVAHqq0wMag7xK91VhmpdP/B8h9EB
SRHxZqZ1nOS2mfN7zpkcvPmxw8CvZtdPbYQnKIsxnN+bYUArLq5lZWyA0GgB
AE00OitQ+sj7r8yazVytTo+5aPLTrWQxXTISOqEljftjLg8uOog1UV0/r11f
HAIurxvOtM2PZCAefmYD8Z5jhQwpC3B94HjAHvLs0gS7mSBVMX0KLPDAFULX
mVWNZaeCrOkVIwC+24ThRzZW45H6xmr4xjUItd3o/zBWx4zVOwYtQ2t1twm0
hwVYMFnsva2W06glF87ULMyzivEwvYypbWSWJM7eJlXXrhtZybjI+BKYJfkH
j3TFg695QQAt44AYJbGyLQTg05hvjR1yEpVC2O/XpBSWJ7k7E0uv6qRhoGAQ
DdCYLxDG247PuwEUy2TCCnUu3hXo3UWdiYDTDKRzeU8vcTJUcvLmnpBZFnK5
O6Pv5Cr2UPc2dTP+NU2JXHhimrlvxRnG5FaWMuEzIPSzWdfdg4ltr0QbsOHM
UREOBzo51RW9yCm+oper4dEKTGO0gtVMs87TtzKSc08CBETiIUuMyrjH/ZwS
OFVfp0Q/HnRvpwTTitWOhdufzaOh67L81fok2gC70ieBuNBb42oZxog/sBLY
Uj81op8zxLdpdcQKequWLLZVjpJI/JrE3vahfQ2bWbfjw1nfmpPQ59hIttaQ
Kd7BUfLqNRrfrY+k6SCx5Bh/eU10kLZlHCUJGVM9KPInEtYuH7GTpN6DbLv1
RWn8hNfN+mIc2huYgB3G+kf50mNyzNzk466ZPv+iw/SzdLd9bn69w6x2V/QY
po91v8cw9/mYYUKJzXHY3WYYTbX1RLLbD9N/5hXD/Lrw5td04A3fbodLqGOY
WGB2h4/YOH89p+KN4+315wlIaMxd7CzqnrBxhuk+8E6fsz9MF6HodCG7w3Tj
Te9huj89h3F9zTGc6TlMp6/Zczd3DBMLW2idsfctXuFs703+7ThRb3tvcnAL
tO7r077tqP1hd7tHPwUEXC93J1Hr6+j+xL5uT85uSSMRV/QbT8Re4QcHtL2F
Izx5Q87OY4nhJpfld5qu/wrwd9/3QB446frqCvfy7jFwXlU3lEYpsbMj5z+0
W1jdrfLNcW55FZFDWUMjBQLk6bnNOFdNcMZaj/gFbFLfVSrJucc08ugvy7zs
kTTTNLLMXVXzhRvYT89LpCoSvWnOBo3jpFjWg2IyOEPicnbtpNRIFiEGcAau
Um8w45iSqFjHPNLhiaX1HktKDsWWor+4CHy573YQzfQfu6idIaCllgOSxKPn
rDudEHHUfx0lsKLpmAYWVYsXDWukxEcyWCApzUh/eXtyZG0HmVY/sMH2NsVH
t11mdcm6DSkigRFrd/h4uNuwKO9jLlE7TMiOtrr0Au+May2IH9zzjXN2ggkB
8LaNmzS7EuDnNk/YONLEjaBjVsYvfbY6cqOhFfcM3ghjFGtMMxdokwePVoW1
AJBjIww3Ui8fYjO0AoT1KSxQXHjA384ofWIdYvZasf20OYrVW8YGSBu7Htxo
zxQnCVuaeoYeJLGLoSWNK/GwbcopqQEYvaicMPmEq+JoyrvaeRMsqoenRegh
9rRUt47WM6xfQBbhOuNIHiwJ9+GD592IVWQDVOfiBc6d3iD5uS88Nx0aVF/k
JWWgY6aMgavGxGAxlQLpE1nV5Epa4NLetM6OuOedKiep9VT5ASRUUsr4A/ww
g6B8SePQKHdObh0VfcgnEm2bUe0fXlPBeYWA2RtEZStJyNvUjW+JwRcdmLhT
covg0DKyujiHlJqZ/YR1N8gOR5Td5vOj4XA590uBYSqSxAiMs2pU5mdhuPbz
4WOPeG0JAWyPRcKgmTlWiyC5AFY7uM7qgZ4iIOCiyOfkYHJtg2hKLJvpi7RF
tHyra9BlUZQESC+iV/6cKXkjVRgx2LVcwgOctAh41DWa3lMHU1rR5GVIalcy
bA9T8IJIApsXNOEVL0q+O9w/eXX06htCylevB+bfXkAIxxHQS9cDLW8kYXfe
b/PC+dkXaEwOny30UchqcO1YgKt0GK9WyRsXC7qodtnXW+yFWWoeW/M6YJUa
mzIoVWVwagmfMEEYbMOWuYr5eWGFKlNhhK4SkzmnuIehdPbcJ6F84nPtCtk2
gex5wx3MzpncpJlajnmMZUTUKxwkBkeTYWAkj0wY5xSVSlPfmwp4xoQ1NjRx
CduZUjImPWNKCgXhHMrMNY8614CFys2uPk7OySNmK720RStoPiULFDLXvJgP
DMny5wPJsszP2dmi9G9s6N9ZlniUzxI+3OpUIoySSZpPGUMKNVnbakQTHBwh
NsmpkKl4YnAggPMxU04nxVmT76sES6lO6RDwIucTf1OqBBElM/tT0qDMt0n6
OSNUvVhJN9OzOdQb1WaQao3xOXT8GCxBVB+VB+J8gehBN9OX9HU3VBAyztC3
LD3EBRg5QKQtdq5UFya20b5JxNqEHDX3LKX2eI12iUTg/D0601MGMrqrVSjp
AzXGUzeHcC5BZahQFLMFvItFWCyYqILgZFlj9RMjdFedSYNReEvFv5Til5hz
OW+YyEmrcRjx0lwRrDwwpu1JPcX4FuHAjX7zpdVthDp2aUqY5l/yjdMUZEJS
Oj8Uhv1NkN6pKk3XXZHiYVZJv7YcSvXvkA3JvWFepxKVeUtZhnOR6MIJ08Bg
NkRpG1I1xbpk1941pOgC4crIrBcm/ZwUbokDWrKQiLwcX3zpzdkSDELiNMeo
HRsAKd1OK1/7tWoEqxWsYshpmeP70qqsrMoBAr5kdZQeFMXED3jGZzgmCQSH
i2z0vjJc2lx2AcxZxgvHGg5sMVSWy065BkNpCmD+Eag0j9w4ny/dOirmGnlR
dy3ROMApa9gLFohz1RomYRL84EjXIoKZuE8jgt+a5/prk60Z2mpOs882m+jv
ymTBDXCFreglcN9dcQ9UeDp2j7rfHQDMn08JknOpYcbSvCldNzCyklEkKtIk
uAwdF9CagpqAJB7d+1p2wQ2n73vRFLxVM25MyjPKTinu07+NTlQoBoSSDHSs
dTGm18F5ft7baSrv6X10b5sp4iIecasHSv0IJ9hWA2y9K7q2dmiPBmOp7fGc
ZVbYNifjH/WWU8q0YXSyUVG2NExiisNruSBhFHlttYJmKKd7pbeYdNcXpH0r
UEIKjuJsgC2w11MkRg4uglwgoWlqUXCslGQboDVeFvCeKL+yBA5onht5fWWh
VnMX0CL1QsPEWHuFY8aK1KYgNSH0ltXazGrYOGdrjIBAWUwvbez+WTp6f16i
brqVVEViQrVpAyQSOODnisAKQLgCl9m1iCOx7BejrDYMjSbgTgqZqSmNr4eD
z83cmGPZ0hiQdFRLsXAsuW7prQ+BCSGyscf02JypnUJxaQA7rjwjm3kpqD6R
CohIQlrMqKxiuQGBY6qCwhzOM5YgcQuuDqE4/dZHl0e1za0nRSFJersbGR2u
jpysK+Vf76XKS/UGm9p2LASmlacyR0PbUxuvzPvzXCkC6FdcDnw1sPhTZSSn
Wiw+6pWxlyzMUayWZ5Vq43JTgdRfWTSnMzVndRuDSW6jXL1a9g8ePCChOGbW
PvYTEqN7QZM2WrHR1dSe3hGEsW2RZc5uqbKWbkXr0Ib++ZMpjyS7g4XCILHH
WbtJ9zs+PDx5x8lM3SmWKHKS72XLkdXsiP6AB/54TpalF867MqmykYrZJx1S
tsR29n0uFynfSQmSqFWU6ra6FZ55iw7pi4RaWkviRpuDYrOfh8KJKWyosAxT
UZ/5bzhjtqyJ+a3NhWmAYcLHvZmuOObP1L+TqnaitQpTBsEqn2ubCM9q59QX
dgJeNTmZlwHgu0rLseF2lDSp0pXZjH3+aA4STQqCxqamxkj7BqznWmW9xzlh
w0VWbm453kfA0EY6YzOR5AcNxt7HCqWVir6TvEQhyssv9e3J3ikiLa9skw42
obmh6ebysbJna3ZHE8Hisxi0M8YUxXXhCL6sHYavJmfL2nhVCRvEapfzfSV2
hv8IZL5wdexxvjB+m9VpubpMLy9XDrItJff5wZ3zbuNx0lZMjZwLwtZcPXZJ
pTDtWJwyKnttrb58mPGL6eV4DFtmePEWMoj9+6/pDa3kItQOPGWaF809RjhB
a0IpgZW5SkLfjZNW+sz48pn2MvCD5Y0oYvtWiGUKM+jJWK0brIs9p+tDl0Cl
lmoQA31923/eEQ7Wt/y6mOqXAYhgt4CSewVZyZHOCG2o0X4N6pavPCWRJfe4
3zpphogzqQhCMvY5w8Ro2haTXA8luc1GfjMjzy3uXGoqVG1UOhdvNkA8nJD/
jBa36St0OSoD46Y+5w0RueY+oKz7XKDky2PfOe2M/HgIt5/DxuF3+5vc1WqM
tt2olAa8GXsrwRkX5T8RLcv2GCco8U0kHa33D8fDTVyI6sgZL7XUVaOZHfUc
czKG3H4JmBmbkvkAOQ4OPnj4FR8LHKK2jXHZRMQmks3OMimVAJtlMZ32Gqdb
dlFKqhzh+a1qVVVDeXy3k2wYE/KmmImsQWTDWEk2Y7EU3f6OaMBSYG3/HsDw
gvMNOYeuod1WlNpcwCZid0yPwHHJilGgjF6nbF6C5jHjoqokKP4gARXmJZIa
QZ4v2RSCM9PB/UAEV4VNGOt74nCUOD0fF6X6uiTPxWge/nbYX6E7cS+CQy5q
Z0EsMFWuuPSWJv7+FoLS2/vLSG/bxKMgjIdI9g+xlJrYArd8EJC8Ywt9+Kj6
iB4us7NrAbgxhJoi7J75z6KxGGGwhVReLKvwChCFPaVc6FxSYscZF7Z1BKq3
Nl3Vp3+0hIDwBTMg+KhwBJr+qjrmCJW4nIAEi2xg7Sq55Hc1t9AC9diZ3gbq
u91Qz1uAbnxWVAfBG5L1TFEVtHx1T64mt0LQUVkZtgSbsaW6A5Y+O3vbws1i
p9lkY042l73zXECc/LFvWy0WDTEkl5oit5FGyFGvzb1uednsKMi31Hx8FcbA
NBiFsS6hqMb9/CQ2kFQUPSVnIS7fcrLz34pOU0njCoyE1kYVrBqmHBTBNW4C
dFQKymI0g/cqry7ciIEIC/iBLvm+dr7h2CT1lvTgY3nFbopoCEME1QyzYyKS
KjMRTtyE76PIhTEBL5Y1qOAY2aGocMtKAyT4IKQ8vjE3BXeFXA23ph13RKLd
diQKj9m2JWqEujI0qi5YbN0REA+AD4wzFi1N2OCRL/O/VL1Gxc62pmRBSykN
vWMJQ+uN07pCsyBy9i6OEkSmU7e1L40tuCvYnYPj1Orbs+3bkAydqFJbu8fT
oIyTJ3VqQrTpx5pa5wPsAZXFvJqR6mhR28Qes1XB2Ds1cHEibTopIJyDlLXN
JNUyhenZxULjrqfnZZa54WHLkn4Vt6JX3hSTyuWwmaBZfwXXeeeIQqfAiZNw
sT40fQ34SL0YS0/LSPMZUb2LbLrw+3XO08v8XGOIYkt1akFzE6s8EptnhU4T
x23cR7EYkioWg+2s32IplUsKeni6ZnyiqJVpWNbR/6+b2K7QF2xGhydoNFhV
UbrPnETFGn6mzcUr7hc6PipDUK2Q8YK8BQYkdRNoFAxQemp7G9lCZmQkJGb1
vYBNzWXtlfhKibbDR1VJYBqrDEqceSYy3FL62N7DMHq7TtOByayT6jbDTBKU
KBpOhek/DhIyyRWyg15v5KWe4y9eIqgBM20Gxu+ulBdP8/N5ivFf74ry3cv9
A3HxN1HGOz0C/wvJF+GGay4TEkesyNDAq0zcQMjEGOx4hVkuOXBC7HFpuPET
LhyZbBycnkjfM2zLjg5A6SWsfkyrKUbBWWg6A6BoviCXiekzmNY11+uEd9QS
EVwtPECOWEdLH8Z1L8r8Elf6PrsOmvESUZnnbBdmFyiv0nK/ZrUNXDWoYAt1
oowvEbQAlXWXceKtpM5x68nG6fHrTcVFpkAjfFnDehduD93LrjKQvPyQznk9
RJRTBZGBsASbg5GWdVtMhczNa9UxMEkvmwHTS8ucxAxua2naPIqXGOeQ8yi5
oaovnrqsXpM8+JzJYDpOAsFDbnPcVBkaXEJAyF1HzC+Xo9ouEP323Ey4uGIZ
go+S2iMpZnILZMCuPQ0o1t5tXvlOGMoN7Jal/dYRDt3mzrYduLNB8SAaEuPO
EN+59pdV6wtnPdkrLiYCtPgrCVmgVuaKJs20r68jvQOZB07zihukm5dN672g
vSrMSmYux2G91baJ1igPbQrb4NThPk22m+1I43aJZGOKOPZQUzvnCj2e/BBE
ljBQotbITbFfuw2/Q/VGcex9hqlMEpio4DOwsnBcLgZ1MRhTdPJH3LQN38Hi
KCu2zqs2HZpAw1s6rX40UcEv4xWcZDCpOFH8QJ6w3A5AkFJreaa8dG6FbQof
oSLumD0pBYbguOXTtkzJWAxXqyxlmI8t+cydACErHebzhRAPEqpe4g3vFp9o
VWOHm1tfMV3hy0J+MrUocR6h1CgQma6yuhtPPBCjZvi8yCKe+BEXIew1R4lF
qw65ikPQElkxJXZnSY7PyaLgmYarbMqoD/wc914t8zozqJDBdzMMy0+e5xNY
1OBbQLUZMlmTAlAl30iXt2/e/dlyfetrJ+yziBdDdLPRDrXSjOznxEXSF5zs
ahp4XxLZRVSmNVgYmiZeQfLtS7OoOAN4yVWuBk7YgqAby8EFC6gLVCewUmF5
TY5hlIxfKlIQmuuVATwP+LDTcBUvAUlgnBin8WWmjbBZoxy3cXSGvDds1qeT
BDJJlo7fTdOzbGpdqz6LcU4CZMEC5MyfsxjrirVrgg+1ICMq7AXuXab5FC2u
SgconS0tUZDHeDOfHlovL7Ujful6bxx5wTjQKPYXtE5Er6lUoqzt6oMOTGap
RxOsWElrtTBADjvhWEu70jLDEHWaPeTqPZi6R8rjO5irRVs3MaeISLOBDVtt
FRHGjcABCkMYR52hr9LrTYMo1XJaV1ZdYYRwkNLBuwAHlIM7KzAhHoKAgqo+
C/GvTRCdaTUOD+ssB+f7Za7APGMC6KQ01b4kcHVRTCN58SaM11w48p8LMZ1x
BmBobuQcsoDJaihwlPyy4QYX3pINUqfV+0qiQ9u4pDF64DhBqsZL6zSKZe5z
cQMW/7DoQGo9ycCcUlbtRNZnbkJS0Qx0OdHn6g7BinIsGsoj+U0qrZHJi6Yk
iJm2GORLremabtiuboscn6oGOAb8pnTBlDhsRjSJrwijdTTYoPLBgmX0KQ5Z
lR6n5KVuISRGTXmN3FjpZcF3aFHUzMCoJmOFozs6pdP9WbiPEKaPZ86yQgRu
gWxmRCDHXwLpsA1oe7gnuudxcCkWgWQyHgovNcJNh9hAabpLYvO3onTC93BH
jJH77izeECJCMPiZDJoofLqqfl47HsyMtABCeH3FMC1TY9+yW+v3UCRCfdVa
4iiEHNmv59EYGzW+Mno8RvfjBBLjWFsoRG0K8P14OfI0GtK4mT7EQINfzCkv
Oqo4S71SGlbxMuCJmugJqsF5Vjq5u9dufXR0uy1nxmLZKVzxG17oihoNrErl
QrZZJdw5DPJxjTIu++PBRaDVsHd3GQBeaiyzQ8u3JDi7xVszmG1/+IDzrXhq
ZzDbhQfVRp7MWFZEcgmoxtsSCFhEFeGFGTbLu6YUUIexAiO3eDnGHzq6HjCL
If16gHSgcpZTmerdolJ4NVNbpiLhhq16OonyMedQOsT/3CXvNsusMo01VlW8
1YtEFmu+XWjX0nsVXtyY08KVo9EczXfPJYeXqCtNAw26UaZINEPHruzWxi8p
Px2UQZAIay/c29i/jQ9GaZC57g4WRNm2swi+nE5vZp+rGqzfjPQu8VolkDym
YpgaD/lODJYLRdWtZjWFbjAFGei++EdKpdWt0PQ5ybnCvF3aAJSjbJqM0dXI
VAOgyqiYCujIAmf37ahRR6JWMJ3Tg4oWUm6HBhUTAMGYSWWwECdfIbeTLed3
n240zdI5whytDbOMU+ka85JbiuJUMFCNb8CVS0nHWOdB0juNBUYiWCzBYalP
6JCTRIWXDMWpPreME4A8nr9t2491kNG1tee3Nja9224zLxnfxpZj1DHhZ9bF
4TmQxhnVJ/IMQJz8hXEL8kPUvGKTydC3s60OIxVHa4+9R4Ucw4hI4MwRkK/J
0YF2Ip8rW+Of0azs+CvkjEZ+mMWGqojKHqT7fnTZg3SouZ4e3tyZ+JAsPSPQ
s7+nEtleWyzXac0+CanSAOyHq07b9OBylfXWM9UqfOT6GV03JKEBYms0Gzfx
4bWSuuzpjxibpfboYp41OFEz/DsWU7cta9OyEXcU8E0YZ0f2EBsuSrSQsvPF
b3CvZiZJhFrPYMlTEKvXmyUCbnWZuScYys8zkL/RIoKZybzwtO5+OahrIcaZ
HkIZb5b9RyoGgdoM+qBa8VdJgAM9eMqGa5C/Rz3I36O7kb9HtyJ/9uRbyZ9Y
Ux0C6FO2R79eyqYu37vSksa57bB6aFBq9SkSQoWpqnSriF6u61g/rkvL+l64
vKXxV/q+55RYVzdRGMgQeiDe/Yi4bJYw7EI4+1gbgqEzAD1EHLxzwgY8wjTz
qq0MZRHLyc7GQ/DWTJ7yCmVEW1LP89o4qOba3VRgCYrUUXp0mQ1oDrqZK9cZ
jSb5uAsqqtpZEWGK1tetHFqDmGQr71bSz4JGv4A9iBis2fU5pbPZNn6YoWtt
v54VQr0SgY/RKpZSGDLVzFc/MNMgrItHmIlzDJD+3j3NMCLS1DwxR8LbN/82
aBAYTySMCoWMK4zZo4w25HCLCyzUYHOAv90/PQQe4lB+M/aAnh1sa9FJfnan
69kd9m08oM3h4/+Mcmy4CTOwuU2yDEewEu+qH15zbAvbaSESViHvYxnUbM/K
2sqitfCiqjAZEynXNLBGR1zpFMFxptEH9iat5rrMbxkT5z2qKalhL4CWNU1q
tN6PYopsa//qImyCoQVoQ8cKKdG6v6FEtOVGFt+7DLBpiRbWZDJd1RzluKNt
YfyZXS4AFYGcFHKQgiqmVIgRUjXuz9irnUJkhO7Xfkx02OBQM5u4WE3YwPCY
D1vC9i40ENvVelXsNlymEJTU0OPVpxsUuav1BPw3GwxXQ8Qx8Luy5XWEteI6
pTSkhIbGc4a2lJ5aUwT2ET04PTY7oFC9J0+fPCQGkCTGKqHH0Sh4KScRP+yn
PRBie9u2uWOKZEuB+MXcLvPUv1CBZkIlJzMqh8ojq70xPrG0xRL50fpDtI6g
kUCxqH3bII/77vCx7XeoqQVeBg1ys878Zqpn4uXZMLNwUriwRAxpxG7VIY3P
YjOB+g00G2dSlHEKGSu1utmxw9VgeAJQeGJrkCIZdctzpkDYx16RrZZaec5p
KZ1I0S8urIxyTSTIsLYpS+LJxifaKtgUsZ89gHM5YzJG2JxsvxqPhfLtQMvX
zfbB1t5uTSLZpIwfnxo6cdr09ucggESIuLZmlbmUiCB56a8IS+W3lwYNy0I1
y8bjqgxhlP5xJHjHaoHppI3Kx7ZWQqPibTMVR6XaIUabYhaSuG8VBG5Vu2Mn
oMbmgMUrm4nGokYzw76ZjcXfidf/d7DV6UUdPVTRljdNAaklR1mTu52Crl1U
NTUa3a7G3St0E9BNId22OFEPk/wbeGy8QO7pRFPeGHKRamqYdv/BFEW6awY7
4SsxU/QtUSCjFCSPQ8CEQnthQn49a9gZVq6V+nvulTOk0MvS9jsq8IYj5QRM
VjEGDpNZ7W9STMBcysDX5khmprygYJ1W9bLXtcmIvoKhvxoaCdcxBBjZxpYX
bS1tHx/7677ywNfDMCxAcTNdPfuddbDQw+dXM+5TsbhyOZnXpObDZre89RR2
/XQYRhU5VOJXXTvd9okOu420HPLDvpiATx47FealIsOdVOxOvZoDDPmI1B5B
Ocum7fsqa4dZvXGg9LdVbDv6sgoenF/8KRFeVCenAUu36eGNTXlvcJk4xCuO
zuJUW8ces9Nqj9kJ7TE7MTO1F5EZFaZsZkrfMrNvHNM3HcI7OIV3TtFl17at
3FZQpRGe3EzZEklkYVXpmOnXtXV8SlO7SPxO4cjomSecsOuU8/XNzRbcdPxU
59yjmjG7t9od0aDaz/BoTa++6dt833In7406zR1zbLlFE2LaV2leS3Kzx4ud
4IEWQCDOoAQXzBKcuFd5zAkSmaQjKXCQEn0SqYj4vM3FguklHENzOBuxHA0T
p7xNqMZqjJMj0cwlJDVbEgoFaCaVsNn5gB6wuolnkPl4BlWtEeNILl5OzApy
HiPawsZtSD9BmryPCuIeeaqf+o7/fQUKIKl4YR0txpMX+ll6dBsHHBxYH4zf
afyjuGY4MMxGxrk14Ho7DVtajPOba/6bP65t/Jj8PqEBdjc1SeLG/PcLaip5
091zcuXnizXutNm/OfFBFFY3Ms59uhPzvm6SL8IWrl80Vu2+Ev0Vx7lJnlPo
EI0L3//hJjlRwyqea7Drm2Rf0pj5R/qVx7H844Z/8FE5HCfy68fcVwxsnUCN
dBi+0ziRX1vG6dlsODLOFxGINCAhv3SNQ4eP/m1nypuEZJLrcDHd4xwcHX97
ePLm8Mc39vwjbvwV43ysfXkLN59/iX5/+3Hif0fHaSz+ZuXfEWL1RbMrb4/1
3OmlZBh+nGGe58DKa338m6yWV93v5ds9h43iZ691NcS6G6uRb/dMmz9itB3D
dG5qL0hhuuswAWjuNsxHQ4qPhaSNL13CdBP9vmWc6F3V9dJTXU+4TCndTA7Q
BtR05Ssr9ktWNQHB48An6vtPzDhNJcq+YMc521S2KElRASja9lUE+0IoNtpr
vvvxt/25Co8z2pTeBI5lkz+FTp2cYkjiWPirricYB19wFhGdsfvD44w32w7E
jNOgLPRprqehmQTj7FGkukm74US9veY4PgFqrmfPl/T1y8Y4bfu24yznxp5C
GmpknEGyccYBPBsAKidtwB1HM3+U5kXXgy4fjCuSJBSMuZgG6yFaGVC85noA
hZxaqzKfO07suCLrcT2iZEQLxlnx6Uc3+o3T94OGlsGxqb/zmurvcPmdGH2+
0+eLFS3pfWXMtKPHb76jb44cPeyZo4c5usVxRA9r3xqXCOmMFO3qXN9LvcQ0
m6Z2eesYve5FxhTExFQthD9DJTFJYmoiY03878u1KFICMtLRWrXJaj3KUVrf
DKdrYnDPHxuKw6o5GzqdmQFfSzaiKLW51tTSkl/3LlWbCVTRjjcHvnTto8Ma
hlxw4Sonfagu1ti4GSvi5eOWnfQ+JghX0vMhdrzSiCf2+U1eT6cg2PvTSbH7
kutEOUinmHeLcTrFvM++L/N3/9c+yzj3MT21wycq28e+/ELHucEAvOdoNbdB
e7jLV6/x/3eHlmAZQR3D8SrXJsXjBKF+/DDO9YcbGxnofmmD+bxxOOiC7ZTq
89KpvcBC/VJDARN/HCdE9Y8GcvL/3kL1S2sp/6Md52PB2V9Bv2MO/7rzOHiY
/NefD0/7jtNh77vVejpWGh2HlnjvcdrvV8fNu7TjNM/9CwPG0DSKK449z3i4
I9cll8gBw4HgCqC7fZ/Khtz8jr+8wWDVI7d4+43BZ7+lrgsz6wW/Md+FmoCO
I8764E7wX+ptTZxxgqrxMk5sv80R3XHQJ4EaIvp47Hpi73SP44SO3WscG377
x3uM03bu9rkmPreZh8IvV+Fzc5xvszLzUIdQtpWOCUo3x3FxJ6/c9dxguLiH
z4lQdMTncJx1B3EMxZZxzotiHAQS3TRhyljlB/j643jRR3kVA6oxOPtxVf44
XryBoMTvfMw24/rtEdxx2qzk3uvmDxuS7H7fGw/bSOLHGsehh7ceJwTEF3cc
5yZ5AjTSBKvib3ccRyPYmITefRynWXJy9/V8LPhEHuhNf6xk0GOcO6znVviz
ytoT0tW2cW6Sr4hCscxp2KXzVN9xWsLc/ni7cT7Wvlp+dJ/rP06bkNUYp5Pv
rFBiWuhhQE77weeGYjUPJAQMA3RCsNxgWO+pbaWTVv7p31h+QWHmJhnXjCNB
Cm3nPtTZRF+WSZoG2+g/I1AUD4sfWBQZ5zjNJShewoFNixpvXzYiqWU98VBh
tkY66wnCmZrjYBYQaEsLSd2orxeZ42kwcqYfBtV3PUN/nC784c/971ffz8ez
I7ljforxW/bb10y1synr6aNP9YFbt2ehezP+OMbfaMLAnNKj5MgxuVI25PU6
q11ACJ5rUdK2CNlo/eZwnI+1r+h53RrOnxo/7d+XLUZZjBdYM6WnY9FXd7f6
k7lfgmJcy/JGNMprs22MO+/t0xqc227tccMvHolko2V3oIb3uT3eftH38nGg
r9mEWPTMzdrAyM9Nv3qGf79u7rG8GPRWAuJeL306kNtIhZfpe47MrS8aFUnx
CFxsMC955UfPlvl0bIN3fIe0eelOy7sD9O50NdwB4n9/foJE5KgRhdlKjJqR
ltExVzurjWtXfdWO9/mU3Lr3ci8/eGATnEfX7BYihNv3BdUDJ+mdUlCPnv/z
O030Jsw8IuJgah51lxJdW3ujmQVOM14SHW0+JAZmO/Jpe0x+e10yrmuVtxQc
DqGG/RXR9Y9u8crpPZs0ILwbPGtb3XJJWM0fZVSUkpkl1w8J8or93Zs4+RVZ
CBhTn3vFSxo1WqL9nLR4Sd8CbZ013/z2XfbgutfePiJWGQ3Scb1uwIhqr08P
Xp8c4lonmPgvpHH/4BDQMp1l1F/ByfdNR9kgG18Uo0FRIT0YyIuY/cvwr6n+
A283cdrFa4/mSOt0oS846WiK+SvxMnb2d2kNQCXWvCNxGrwS0NzJFExkTM25
TKjU1jaBHbGBUtsWwehZWu/USQyQ2p12QtpE0C83WNL9jziaPyNANFlW5krY
dFLvkhxrZcNaUwNNw9Puda0oYu5OsZOEjZ6xmhRJQJS3d/Tm8OW7/b0IYQmb
9mKKKg5HmdqVW07RUhjJ2edBFelt70HTIP1kkycZmiU82/Mx2C7ZJw/aTi7e
+Ry2d7wj/TcxzsjvhaUVELadavG04fbkfzyipZaGchIiZYd4k3n5XnVKyo5v
PT7T1ZVGbinAb4sYNAtNU1XlSvLfmr/mbnlD4RwTrL+p4GjN5KzM0mgGRifM
MmZUmazaO9KZVqS1dIBwpC8Y6Z2hzI+bSGcFrLztzVwaxq5cRvL9/ndvD6Xu
ir07OEP/kSwlOjl8IRuDv4jmiiHPPoICDk2qu5E93HG6u+7eH+SZXTUMCCuk
L1F0p/A7UyjJKZBgYMdVnton4xofybQYcdtNbCpTcxku6k0ZJBnbPckaqA5t
FxTfmNoV235Jteal4J6HSAuLYi6FT6k8QxwNjSrCZG/bkD1D67YSrYFbS75+
o8MK/tASlLgbjmvI6f3G9ZLhHmkqKAk4WBdGKQDyAKfni/Qakr0HBBcr4cMa
TfIi9X1+W9m50akI0vf+MfOhZ3De7wc/ANUw6YZn9BUSEpCYbeeg/aAUgoPE
0i7F9IAMZ6IaPl/tPN7Bxp+h0BL0tNmQYvPX1K8QuyQSHzQcBJBlLiuyksYm
oZ9b7Eek70V6PS1SkrtpJSU3JOVSB1pjCAnpCOQ0N2eXJ4t1mtfyUO1txIeJ
14XSBeH2ChCi04A7qIvIeapFoQ/EB02w/PrJNjZqMGV5gvIOz1AbNxUwUBGg
t54+eYKTavlg7urAmLvkGvBOniyBy8q+DUE/r30qVizqfKZNtk1v5YkHrCg4
pabd7IzqWtmHbeKsbbpH2dnV8kzqayqQ6OA5fFr7YMKaRhdc0ujsmnpgV0IB
13n4L/RlQYl10303wdsyzTyE8avnaJN2IkehjtZVosSEbvPcA6v8uLX1sWy+
qyhMsRReKZ0f5HkDkzY8YUwyDUnSWHsop3u3UQHPl/CfKZ0F3xE4GqzoL+XI
8UAJMPAV98VWNw1u9pkhHU7itnmFycDTx08BCXFs0wUd9UDzFMvl3rAWKcJT
8wsuGRznCiOC1NFFiUUedpyX3PhNKl2FWreYHk2HKziN8twVk+EFp7JiUcaf
dwnyG0+qcxokqt8Q5REPyDwm6vHa5oIExfUcaGG57uyQ28ujf2K9WNb+b14D
KL8r3KPh9nB3+EiIE1MXSv8n3rZluTQXVvTXZuoObghl2YSTnVIFwiae6z2a
5u8zTgPAigXZOMc+hVJtjMrZ/3S9aToa2ktN7JCNOMxtI/jI/b8FT3ptlCxS
r4qagMPnU2aVjffRS2KLZPuC+VxeJcH79Oi/HL579vr5n/fEkv8zafhn16jA
CHGgxhhsyCaUnOW1udS4Gylr4JxdXlGo1JbTWINKMxi/gfqJ18+K8fW6lsMA
0Q3zxbR5ALF2OE9yr1LjUWo/3VgINqebCwW0JQ6keyJpfiaqCHAKi9IJ6wyJ
oVdc2geaKSnWQC/cAV1QeOc8m1Mb0LOsoURuJXcRFQBRuH1GSk2MvNaIux53
5h1fWAsEEyrbXj5OkuLbyZsdMR0kCOg6D7iVbHAPPWZ7dHYwzqa8Qyq0H20W
Qj/1Fev4eocGaen3dy93WxA3GH2LC/XyveQOd72mC6thrZ5nMV1WNJuWsGl5
MXXw4GNhgIDm5Zu3DJVZ+lM+W85Qr11K+269N+QL4cWIe1c6S0oEor3Nhp4x
vzHlaZ48Sv6UP8N16TSII3BJZrxZUi0Y/94+PyZms73z9UOZVAiAvkpvTDhk
/uj48kkCe7Abev1tB3ky7aTgvxdoAJQ6POoiQpFgOVc8nqbXSBWXqGdNrVXR
7WnV0siaLco6I82Uo3vFayllba+2kedvku+OXh69SX6fbOjxJAPd2KbWLkSJ
EBmFBxGzV75F7j29blxROUcGuXN+ls5/9/rgTy2QJOYsJJfeGGX5dENWh3/j
oJPlfGQ7Eh37hY2qQH42d+lEpJ+myjaQ2kiguj3jxVdSDc+QxSbBSl3JS+sh
qaQR2KDIqzJ0u6hao4w7CtVDY+egciE+limVMA3poEAaI7cbB65VPalSnDtW
i0zowcyhhmO/vQdZdfiQfEaL8zCzvSAjhuHoye9+z4i31dguWQe53q7tJCrX
pasWG3akPXj96vn2nk+DzVT2kZ09wXZayhf+85vOC60bW5rSSh9z6burl/7I
LB3vS9faQ29APpHaz0p53PpawZqaW6suTFlUvAadbMn0RAsH4Q6yNiqwAl4L
uqVb34u8LLbpA1Lm/BxbsKlGXZTvSdkNxNH94U7YjTmQut2FiPpLadwhcnsS
kN3mgWWAR5YBHrw76c8EbR8Enjmqvnq6cqHe6lCRz50WpNLLZjLhrpcAv7cO
lUWDFCGD6ZFMnW2N7ULJgJgb6gSAC18LK7rS1a6geyGAhfJxukB4fSbJO6BO
71ab5UkLQKx/vOeQjj/Y24m/Pem+zH9w7oNrdRk5dcFZ5uOybREG8EGKodlr
R7kWtlaeX/ovsh9mz/6evup9k217+gbB4QZhlGzkC0YqaJRZWlFvGuNzJDMG
ah2ZaREuDFc7/gLe08wNBdvmps+XszM2q5ZUcLQucwllcIoZmhKaIfaq7Yav
YeMKwOIu0jmqJSQJsSxRmZazBhL6XKxRG4U1BCZio15Lt4Z8HpNHgOK/w5W/
U+1DUZIQkQYmtHMIZdM84vRkDxTcKOAwgbfMs7kjrDnHrByWxDufHDqmPSWM
wp16EMitjqM8efPu9cnRN1Ro+i/Y/h1waRuQlCQvn0l96dyMTe8RupHez95W
2M5pVIz+ezFklUxUq/Zx8Prls459RBd5VMuZidFKh/mdAsatNtljI+n0Kr2u
kmu0W1XkG0IiG10yRaA4DJRMpHNCDmouapTmHtOeoc0RkF6DIkiOzD0E7y5v
i5j+9V5EbtMfn/akvoYVw/JbBMHwLsI2nErspna7o7r1uhBbtssvHWVcwhIi
SiQaHemNzhd2RrGwjz00hYue11U2nXAfVlCYllIIn1ppV3E6oeDoAUImxm4l
ZaflnIPwKfXHXElOyKy7mpiUy7nJBW2cj0Pk0hVkxNy9XWf21fiL099xWrqu
H+PK/+H3d7zzLnM+41B3+K0iVj7vS8zhwYw6FPk0wjPjct9hiXeISSp55Ygo
XWDwyOSOu98WZROr2AaWUVrIjqezawewpeuVaiibOBYdAGOttLSU3ukN75F6
KPVWTlNj2RO5Eq2FcK6mNQj1S86bgV6lUho6JC4sW+McFvilh10o4qSlDSQz
x2hJDmvyfPZMuXSdrvimchB9V2XlJQvorr3AcX+LRLfKakqjRjw1JRt8HCKS
T6yIFsg5Xxs55+mnVAhlkE6dcOUl+UfS85LX6nnCcDixuLEnSo6WGACgMXa+
ctxUGB6RzmHn6Vk+Re+mZxwLbYXYlsw2DTn8CW7/nP0y/o/W2Tny1kKaQI7r
JspQVr4lW2OrtyxvWUhTIMF5Dr2mwEleGfn3bNtnurbFhEDiOmzdNahJT7tB
D/w1fhC/7e32ouCMbYd9pab5dDAMnmM+VQer4s7TJuZ4v3/libpEgK95HsKL
nOLZG4bOcLmmZdk0r+pwCV8HS0BVlechpkhkGXv/ZmyFVO3L3zucJLM5OiS8
JuKCdDkY4qTbRR2becJXswyQQIPw8AtMUmQ/RGvrtk2bErai7bcuLN7+G9A9
AwlibHRhw1jkjPNSOJ0aP0wmDXfeioJaPO7Mahy0xTWb5bqr1IL6U1pfGwrh
623H7h3bgweShW+5TlnCcc8xGhT2deQvGm5CUUwrCnGWYJfJ8uef4eCq2rZv
FBI6eAE/Ef1z/wmIg9a9i2y60G5Vxspo5+11jWib8Mtd2rnD3k9J0qH90Gom
uVqvgHTPxJTlLyQB7giSmRtAoEfR8FCza5yUo1fFHGkK9ZeiNqDq07W5I+ru
pFnkRiznuHS6I+PsMjfbCbt8OBko2aIy8fralAtWUkvAYVUsS9YODagul1N0
9xKxp2QMP6lBpqJlY+DHCLUFeI6k82Pq9M0DAufFCKRFiRHXnAvDeMhpMXRb
crMD8poVFPVy7h+uYWkaHiJDGcoEJ8I+aDVbUfYDilwpx4VpPAjztzoMdI4C
3DTLSt0C+ywvozncOz/uSASktfI26m5R5BUE/4xPUMI7L9EdkDtGVqBUS+Hp
M/i9xLCcogYwithHZRCZtf9EqM0tvytETI0D9pF0iwVoGlhRpMwrTvc5W55r
lFFAQgJEII55tP9qPyI9uMyQ+wmZ1tbIVPAteH0wGHCeFgz0ghnDXDOrxkE9
26NotKbbWbm1t/r2QDo8jD9QXDuuCpaizKv7XTTZTpY195GjyHqVc5xUlHxu
oLWC1GivxmYCSKOz7HYSdIUj4+XtMxqcNIOODB7sf1hi8zdOF+iZFDT0/QGg
jY6nWTP/JegR31podDtJo73Pu46HG9gJFeRuIrZlH5c7FRJl5fPT49dK3qlB
qLwdpsVXWMC5wpuUw2Vn6idgTevunfgtNXp0t+aGIuRrCrO3eHq0ABVsEspD
EbClYznhZmvfr19t7+7fJBsPN8NWdIxGlpu4V+fz3ROi60dI7/2GOSzaLuet
rQe3+7Tf5jZeG9ubq3uXu9u3jUK1ufJD5T/xlL/P3a/8U7YrB3jtROH1N+1Y
/jkalm8zbD9PD3AA8+5mzzbg9+/8DbM92vxczb9hssebv/r+39ufvv83AOLJ
5j9mC/DV0KXL9ivpAP6JGoAzQfl76rR9r0bb2//AjbY/VWdnIDFfbf6NmzvD
Gr7e/Efs7wwbf9qQq/9/avH8STo8o8AN6sZnafLceUTbO7IaR/7/e+3FjNt0
xPZbdMcVq4gCJt4dmbDl77616S26wXhGsH6dYUiLVltcfwOO5v5RtvhtO8Vs
uzWZvEJM/j9u3R1m21QL7ds3pVHaqvPH7jYuzsKbg65oqbJPjJzMsFOvARv+
6HrA3IX17rcSwvieBfC8Ml/3qUXoNdfrWWTsNLDe8XpuP07s8x8tV1aPY//R
/73PMs49apiuKu1+m3FukofSckV0CfrhLuO4dZ6k0ckdxvlY+zJz3/e8tCz5
ijLVvddzz3OncVq6oUS6vbS3gKFKi6bfjhx+rNWO1l+Pt9qRcejwTbOcaKsd
05ch2mpHxnHa7CT6c+K3yDHribbakXGCfjux4t6mD0K01U4XnKOfLjjbrfQ6
5vCvO48Ta7WzcpyerXZWjtOx0Pg4LffrluO03q9+rXZwnLZ2O7dptUO1Y+Pt
dm7VaofHibfbuU2rHR4n3m7nNq122uATnpQdp6XVTgf+xMdpabVz63FaWu3c
cpyuc5cHG/gcGyf2wCp8bo7T3mqnC5+b47S32mH8CdvtKD6H47S32uFxgnY7
Efq8qtWO4LNvDQqh2qPVjo6Tq37Mv/zOI3xm2PZWO3JP3YY95sWbxjgdrXb6
3K82khjBn9ijK8cJ6OHtxmn2krnbOM1eO3cdJ+y1c9dxwl47f1v4NB/wx7ln
q53Phj89W2asHKdnq50e4/RqtfPZ9tXyo/tc/3FWt9qRh+/baidOx0Qupqf6
w6et3Y6eV59WOzxOvN3ObVrt8Dhd7XZWHJY3Tle7nX6tdmRfHe12+rXakfV0
tNvp12rH8uW2djv9Wu104U9yS/zpcyqdJ/Yxx5G78zdrYeOAUVpZgZJytzY2
Q72BNM59Pu44t2gx4TWWCMfpajQxbF1JuJ6PBWd/5DtC6e+6pc7fvIOF6466
RTeL7c7+FclzjTh/u+DK5BoZrqHogyX/8AHWx6H2+bycjLj5xfdAqJEzDB4+
RqAPHj6xLSwePoZ/fkC35Tdc+o7SdWMBEO0RYuT1PMmA62G2Rl6NlmwIEG/5
4Xf7DPXxEn2qJtBzuRBHm6zdugtAm7s0a6bkrnGZTuoBdTuYwtWmNhs/07z7
Y41vdoJybV3nJYdmkQeBw2sj0b95m9evcqZYb88qXNeSjfT44TjHeDGscZ3/
JPkR+QzFAs5CGgaH8ogP5bFzKI/gn3QoL/M5lgvBGG1N2KjuNMkuT/LImWQX
/kmTHPDwEpuF/SMKzuXgMiMmpK9IHE1a1Hz3DOIJWfzEgkIofqKsKc2HaPHB
tjlgh85aR06yV2ZA0QWAHQbArgOAHfgnA8AKRVJ9YN0NxVu3nSnMLxScsk5L
ekmt1Yoxpc1wILdkTFG5PjNOrrkylC8n4YEzrTWwj7ee7hoJTV6FZPWjdzQI
2T/gyvFUBoeAjLHnQBa87BS6Ck56Oret0uKFHBIlWHzCCTuwMUpe5izIQiKt
AdaUEIGnFJSa6LNItxvPyHTj6QhBlW48fjMezi/E8ZgqOoXg74cq24wqOw6q
bMM/CVWO+D1OxybK2P9s9ilQFq7WkpY0MGFE/iXD4XyblXPV3vYFtI1UaR1L
SbZTg7nQo4yV5g4qEh72AuZDBua2A8yH8M8Plm4E+ZsIUP/S3ALD8HevTw7n
6k3TUYYZ+hhR0ERlh/zce6q2LX0EqCb7o/fz4mqajc85UQsBmvrfIf+Xch/Z
+Pfr82L9AwfU4OUCAkCVVChHC+trwL375ZdfDi5KuIx5Ok/2Z9Vf/09VfcAM
Gvjhm6wAAp0lL7JxmcE9rd7n+tNJ/h4rq3/71387ny7nY/36PxcXc8yMXP71
f4EIXtegCc7NaH/9NxABk9NsmmLBKvqas3h+eQlix//932ny/fLf/2c+z//9
f3zAuvFMr3IK1pT0XXh8kmVjlB8lUIh6IdEdDBPzWNUAoQpr5Rl9U9OkrpC4
/BO2VpjDJrn40zkRpO+PXr16/f2+rTuRTYEmDV6h/A8HgoEhycGfj08OT0+H
a/8P9HNWxTFUAQA=

-->

</rfc>
