<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-privacypass-protocol-15" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.10 -->
  <front>
    <title abbrev="Privacy Pass Issuance">Privacy Pass Issuance Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-protocol-15"/>
    <author initials="S." surname="Celi" fullname="Sofía Celi">
      <organization>Brave Software</organization>
      <address>
        <postal>
          <city>Lisbon</city>
          <country>Portugal</country>
        </postal>
        <email>cherenkov@riseup.net</email>
      </address>
    </author>
    <author initials="A." surname="Davidson" fullname="Alex Davidson">
      <organization>Brave Software</organization>
      <address>
        <postal>
          <city>Lisbon</city>
          <country>Portugal</country>
        </postal>
        <email>alex.davidson92@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Valdez" fullname="Steven Valdez">
      <organization>Google LLC</organization>
      <address>
        <email>svaldez@chromium.org</email>
      </address>
    </author>
    <author initials="C. A." surname="Wood" fullname="Christopher A. Wood">
      <organization>Cloudflare</organization>
      <address>
        <postal>
          <street>101 Townsend St</street>
          <city>San Francisco</city>
          <country>United States of America</country>
        </postal>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2023" month="September" day="25"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies two variants of the two-message issuance protocol
for Privacy Pass tokens: one that produces tokens that are privately
verifiable using the issuance private key, and another that produces tokens
that are publicly verifiable using the issuance public key.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Privacy Pass protocol provides a privacy-preserving authorization
mechanism. In essence, the protocol allows clients to provide cryptographic
tokens that prove nothing other than that they have been created by a given
server in the past <xref target="ARCHITECTURE"/>.</t>
      <t>This document describes the issuance protocol for Privacy Pass built on
<xref target="HTTP"/>. It specifies two variants: one that is privately verifiable
using the issuance private key based on the oblivious pseudorandom function from
<xref target="OPRF"/>, and one that is publicly verifiable using the
issuance public key based on the blind RSA signature scheme
<xref target="BLINDRSA"/>.</t>
      <t>This document does not cover the Privacy Pass architecture, including
choices that are necessary for deployment and application specific choices
for protecting client privacy. This information is covered in <xref target="ARCHITECTURE"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>This document uses the terms Origin, Client, Issuer, and Token as defined in
<xref section="2" sectionFormat="of" target="ARCHITECTURE"/>. Moreover, the following additional terms are
used throughout this document.</t>
      <ul spacing="normal">
        <li>Issuer Public Key: The public key (from a private-public key pair) used by
the Issuer for issuing and verifying Tokens.</li>
        <li>Issuer Private Key: The private key (from a private-public key pair) used by
the Issuer for issuing and verifying Tokens.</li>
      </ul>
      <t>Unless otherwise specified, this document encodes protocol messages in TLS
notation from <xref section="3" sectionFormat="of" target="TLS13"/>. Moreover, all constants are in
network byte order.</t>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>The issuance protocols defined in this document embody the core of Privacy Pass.
Clients receive TokenChallenge inputs from the redemption protocol
(<xref section="2.1" sectionFormat="comma" target="AUTHSCHEME"/>) and use the issuance protocols to produce
corresponding Token values (<xref section="2.2" sectionFormat="comma" target="AUTHSCHEME"/>). The issuance protocol
describes how Clients and Issuers interact to compute a token using a one-round
protocol consisting of a TokenRequest from the Client and TokenResponse from
the Issuer. This interaction is shown below.</t>
      <figure anchor="fig-issuance">
        <name>Issuance Overview</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="520" viewBox="0 0 520 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 40,64 L 40,208" fill="none" stroke="black"/>
              <path d="M 80,32 L 80,64" fill="none" stroke="black"/>
              <path d="M 184,32 L 184,64" fill="none" stroke="black"/>
              <path d="M 216,64 L 216,208" fill="none" stroke="black"/>
              <path d="M 256,32 L 256,64" fill="none" stroke="black"/>
              <path d="M 336,32 L 336,64" fill="none" stroke="black"/>
              <path d="M 376,64 L 376,144" fill="none" stroke="black"/>
              <path d="M 376,192 L 376,208" fill="none" stroke="black"/>
              <path d="M 424,32 L 424,64" fill="none" stroke="black"/>
              <path d="M 440,32 L 440,64" fill="none" stroke="black"/>
              <path d="M 472,64 L 472,208" fill="none" stroke="black"/>
              <path d="M 512,32 L 512,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 80,32" fill="none" stroke="black"/>
              <path d="M 184,32 L 256,32" fill="none" stroke="black"/>
              <path d="M 336,32 L 424,32" fill="none" stroke="black"/>
              <path d="M 440,32 L 512,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 80,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 256,64" fill="none" stroke="black"/>
              <path d="M 336,64 L 424,64" fill="none" stroke="black"/>
              <path d="M 440,64 L 512,64" fill="none" stroke="black"/>
              <path d="M 48,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 168,96 L 216,96" fill="none" stroke="black"/>
              <path d="M 40,112 L 56,112" fill="none" stroke="black"/>
              <path d="M 192,112 L 208,112" fill="none" stroke="black"/>
              <path d="M 224,126 L 240,126" fill="none" stroke="black"/>
              <path d="M 224,130 L 240,130" fill="none" stroke="black"/>
              <path d="M 352,126 L 368,126" fill="none" stroke="black"/>
              <path d="M 352,130 L 368,130" fill="none" stroke="black"/>
              <path d="M 216,160 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,160 L 464,160" fill="none" stroke="black"/>
              <path d="M 224,176 L 288,176" fill="none" stroke="black"/>
              <path d="M 416,176 L 472,176" fill="none" stroke="black"/>
              <path d="M 48,192 L 64,192" fill="none" stroke="black"/>
              <path d="M 192,192 L 216,192" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="472,160 460,154.4 460,165.6" fill="black" transform="rotate(0,464,160)"/>
              <polygon class="arrowhead" points="376,128 364,122.4 364,133.6" fill="black" transform="rotate(0,368,128)"/>
              <polygon class="arrowhead" points="232,176 220,170.4 220,181.6" fill="black" transform="rotate(180,224,176)"/>
              <polygon class="arrowhead" points="232,128 220,122.4 220,133.6" fill="black" transform="rotate(180,224,128)"/>
              <polygon class="arrowhead" points="216,112 204,106.4 204,117.6" fill="black" transform="rotate(0,208,112)"/>
              <polygon class="arrowhead" points="56,192 44,186.4 44,197.6" fill="black" transform="rotate(180,48,192)"/>
              <polygon class="arrowhead" points="56,96 44,90.4 44,101.6" fill="black" transform="rotate(180,48,96)"/>
              <g class="text">
                <text x="44" y="52">Origin</text>
                <text x="220" y="52">Client</text>
                <text x="380" y="52">Attester</text>
                <text x="476" y="52">Issuer</text>
                <text x="128" y="100">Request</text>
                <text x="124" y="116">TokenChallenge</text>
                <text x="296" y="132">Attestation</text>
                <text x="348" y="164">TokenRequest</text>
                <text x="352" y="180">TokenResponse</text>
                <text x="128" y="196">Request+Token</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+--------+            +--------+         +----------+ +--------+
| Origin |            | Client |         | Attester | | Issuer |
+---+----+            +---+----+         +----+-----+ +---+----+
    |                     |                   |           |
    |<----- Request ------+                   |           |
    +-- TokenChallenge -->|                   |           |
    |                     |<== Attestation ==>|           |
    |                     |                   |           |
    |                     +--------- TokenRequest ------->|
    |                     |<-------- TokenResponse -------+
    |<-- Request+Token ---+                   |           |
    |                     |                   |           |
]]></artwork>
        </artset>
      </figure>
      <t>The TokenChallenge inputs to the issuance protocols described in this
document can be interactive or non-interactive, and per-origin or cross-origin.</t>
      <t>The issuance protocols defined in this document are compatible with any
deployment model defined in <xref section="4" sectionFormat="of" target="ARCHITECTURE"/>. The details of
attestation are outside the scope of the issuance protocol; see
<xref section="4" sectionFormat="of" target="ARCHITECTURE"/> for information about how attestation can
be implemented in each of the relevant deployment models.</t>
      <t>This document describes two variants of the issuance protocol: one that is
privately verifiable (<xref target="private-flow"/>) using the issuance private key based on
the oblivious pseudorandom function from <xref target="OPRF"/>, and one
that is publicly verifiable (<xref target="public-flow"/>) using the issuance public key
based on the blind RSA signature scheme
<xref target="BLINDRSA"/>.</t>
    </section>
    <section anchor="setup">
      <name>Configuration</name>
      <t>Issuers MUST provide two parameters for configuration:</t>
      <ol spacing="normal" type="1"><li>Issuer Request URL: A token request URL for generating access tokens.
For example, an Issuer URL might be
https://issuer.example.net/request.</li>
        <li>Issuer Public Key values: A list of Issuer Public Keys for the issuance
protocol.</li>
      </ol>
      <t>The Issuer parameters can be obtained from an Issuer via a directory object,
which is a JSON object (<xref section="4" sectionFormat="comma" target="RFC8259"/>) whose values are other JSON
values (<xref section="3" sectionFormat="comma" target="RFC8259"/>) for the parameters. The contents of this JSON
object are defined in <xref target="directory-values"/>.</t>
      <table anchor="directory-values">
        <name>Issuer directory object description</name>
        <thead>
          <tr>
            <th align="left">Field Name</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">issuer-request-uri</td>
            <td align="left">Issuer Request URL value (as an absolute URL, or a URL relative to the directory object) as a percent-encoded URL string, represented as a JSON string (<xref section="7" sectionFormat="comma" target="RFC8259"/>)</td>
          </tr>
          <tr>
            <td align="left">token-keys</td>
            <td align="left">List of Issuer Public Key values, each represented as JSON objects (<xref section="4" sectionFormat="comma" target="RFC8259"/>)</td>
          </tr>
        </tbody>
      </table>
      <t>Each "token-keys" JSON object contains the fields and corresponding raw values
defined in <xref target="tokenkeys-values"/>.</t>
      <table anchor="tokenkeys-values">
        <name>Issuer 'token-keys' object description'</name>
        <thead>
          <tr>
            <th align="left">Field Name</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">token-type</td>
            <td align="left">Integer value of the Token Type, as defined in <xref target="token-type"/>, represented as a JSON number (<xref section="6" sectionFormat="comma" target="RFC8259"/>)</td>
          </tr>
          <tr>
            <td align="left">token-key</td>
            <td align="left">The base64url-encoded <xref target="RFC4648"/> Public Key for use with the issuance protocol as determined by the token-type field, including padding, represented as a JSON string (<xref section="7" sectionFormat="comma" target="RFC8259"/>)</td>
          </tr>
        </tbody>
      </table>
      <t>Each "token-keys" JSON object may also contain the optional field "not-before".
The value of this field is the UNIX timestamp (number of seconds since
January 1, 1970, UTC -- see <xref section="4.2.1" sectionFormat="of" target="TIMESTAMP"/>) at which
the key can be used. If this field is present, Clients SHOULD NOT use a token
key before this timestamp, as doing so can lead to issuance failures. The
purpose of this field is to assist in scheduled key rotations.</t>
      <t>Beyond staging keys with the "not-before" value, Issuers MAY advertise multiple
"token-keys" for the same token-type to facilitate key rotation. In this case,
Issuers indicate preference for which token key to use based on the order of
keys in the list, with preference given to keys earlier in the list. Clients
SHOULD use the first key in the "token-keys" list that either does not have a
"not-before" value or has a "not-before" value in the past, since the first such key is the
most likely to be valid in the given time window. Origins can attempt
to use any key in the "token-keys" list to verify tokens, starting with the most
preferred key in the list. Trial verification like this can help deal with Client
clock skew.</t>
      <t>Altogether, the Issuer's directory could look like the following (with the
"token-key" fields abbreviated):</t>
      <artwork><![CDATA[
 {
    "issuer-request-uri": "https://issuer.example.net/request",
    "token-keys": [
      {
        "token-type": 2,
        "token-key": "MI...AB",
        "not-before": 1686913811,
      },
      {
        "token-type": 2,
        "token-key": "MI...AQ",
      }
    ]
 }
]]></artwork>
      <t>Clients that use this directory resource before 1686913811 in UNIX time would use the
second key in the "token-keys" list, whereas Clients that use this directory after
1686913811 in UNIX time would use the first key in the "token-keys" list.</t>
      <t>A complete "token-key" value, encoded as it would be in the Issuer directory,
would look like the following (line breaks are inserted to fit within the per-line
character limits):</t>
      <artwork><![CDATA[
$ echo MIIBUjA9BgkqhkiG9w0BAQowMKANMAsGCWCGSAFlAwQCAqEaMBgGCSqGSIb3DQEBCDAL \
 BglghkgBZQMEAgKiAwIBMAOCAQ8AMIIBCgKCAQEAmKHGAMyeoJt1pj3n7xTtqAPr_DhZAPhJM7 \
 Pc8ENR2BzdZwPTTF7KFKms5wt-mL01at0SC-cdBuIj6WYK8Ovz0AyaBuvTvW6SKCh7ZPXEqCGR \
 sq5I0nthREtrYkGo113oMVPVp3sy4VHPgzd8KdzTLGzOrjiUOsSFWbjf21iaVjXJ2VdwdS-8O- \
 430wkucYjGeOJwi8rWx_ZkcHtav0S67Q_SlExJel6nyRzpuuID9OQm1nxfs1Z4PhWBzt93T2oz \
 Tnda3OklF5n0pIXD6bttmTekIw_8Xx2LMis0jfJ1QL99aA-muXRFN4ZUwORrF7cAcCUD_-56_6 \
 fh9s34FmqBGwIDAQAB \
 | sed s/-/+/g | sed s/_/\\//g | openssl base64 -d \
 | openssl asn1parse -dump -inform DER
    0:d=0  hl=4 l= 338 cons: SEQUENCE
    4:d=1  hl=2 l=  61 cons: SEQUENCE
    6:d=2  hl=2 l=   9 prim: OBJECT            :rsassaPss
   17:d=2  hl=2 l=  48 cons: SEQUENCE
   19:d=3  hl=2 l=  13 cons: cont [ 0 ]
   21:d=4  hl=2 l=  11 cons: SEQUENCE
   23:d=5  hl=2 l=   9 prim: OBJECT            :sha384
   34:d=3  hl=2 l=  26 cons: cont [ 1 ]
   36:d=4  hl=2 l=  24 cons: SEQUENCE
   38:d=5  hl=2 l=   9 prim: OBJECT            :mgf1
   49:d=5  hl=2 l=  11 cons: SEQUENCE
   51:d=6  hl=2 l=   9 prim: OBJECT            :sha384
   62:d=3  hl=2 l=   3 cons: cont [ 2 ]
   64:d=4  hl=2 l=   1 prim: INTEGER           :30
   67:d=1  hl=4 l= 271 prim: BIT STRING
   ... truncated public key bytes ...
]]></artwork>
      <t>Issuer directory resources have the media type
"application/private-token-issuer-directory" and are located at the well-known location
/.well-known/private-token-issuer-directory; see <xref target="wkuri-reg"/> for the registration
information for this well-known URI. The reason that this resource is located
at a well-known URI is that Issuers are defined by an origin name in TokenChallenge
structures; see <xref section="2.1" sectionFormat="of" target="AUTHSCHEME"/>.</t>
      <t>The Issuer directory and Issuer resources SHOULD be available on the same origin. If
an Issuer wants to service multiple different Issuer directories they MUST create
unique subdomains for each so the TokenChallenge defined in
<xref section="2.1" sectionFormat="of" target="AUTHSCHEME"/> can be
differentiated correctly.</t>
      <t>Issuers SHOULD use HTTP cache directives to permit caching of this resource
<xref target="RFC5861"/>. The cache lifetime depends on the Issuer's key rotation schedule.
Regular rotation of token keys is recommended to minimize the risk of key
compromise and any harmful effects that happen due to key compromise.</t>
      <t>Issuers can control cache lifetime with the Cache-Control header, as follows:</t>
      <artwork><![CDATA[
  Cache-Control: max-age=86400
]]></artwork>
      <t>Consumers of the Issuer directory resource SHOULD follow the usual HTTP caching
<xref target="RFC9111"/> semantics when processing this resource. Long cache lifetimes may
result in use of stale Issuer configuration information, whereas short
lifetimes may result in decreased performance. When use of an Issuer
configuration results in token issuance failures, e.g., because the
Issuer has invalidated its directory resource before its expiration
time and issuance requests using this configuration are unsuccessful,
the directory SHOULD be fetched and revalidated. Issuance will continue
to fail until the Issuer configuration is updated.</t>
    </section>
    <section anchor="private-flow">
      <name>Issuance Protocol for Privately Verifiable Tokens</name>
      <t>The privately verifiable issuance protocol allows Clients to produce Token
values that verify using the Issuer Private Key. This protocol is based
on the oblivious pseudorandom function from <xref target="OPRF"/>.</t>
      <t>Issuers provide a Issuer Private and Public Key, denoted <tt>skI</tt> and <tt>pkI</tt> respectively,
used to produce tokens as input to the protocol. See <xref target="issuer-configuration"/>
for how these keys are generated.</t>
      <t>Clients provide the following as input to the issuance protocol:</t>
      <ul spacing="normal">
        <li>Issuer Request URL: A URL identifying the location to which issuance requests
are sent. This can be a URL derived from the "issuer-request-uri" value in the
Issuer's directory resource, or it can be another Client-configured URL. The value
of this parameter depends on the Client configuration and deployment model.
For example, in the 'Joint Origin and Issuer' deployment model, the Issuer
Request URL might correspond to the Client's configured Attester, and the
Attester is configured to relay requests to the Issuer.</li>
        <li>Issuer name: An identifier for the Issuer. This is typically a host name that
can be used to construct HTTP requests to the Issuer.</li>
        <li>Issuer Public Key: <tt>pkI</tt>, with a key identifier <tt>token_key_id</tt> computed as
described in <xref target="issuer-configuration"/>.</li>
        <li>Challenge value: <tt>challenge</tt>, an opaque byte string. For example, this might
be provided by the redemption protocol in <xref target="AUTHSCHEME"/>.</li>
      </ul>
      <t>Given this configuration and these inputs, the two messages exchanged in
this protocol are described below. This section uses notation described in
<xref section="4" sectionFormat="comma" target="OPRF"/>, including SerializeElement and DeserializeElement,
SerializeScalar and DeserializeScalar, and DeriveKeyPair.</t>
      <t>The constants <tt>Ne</tt> and <tt>Ns</tt> are as defined in <xref section="4" sectionFormat="comma" target="OPRF"/> for
OPRF(P-384, SHA-384). The constant <tt>Nk</tt>, which is also equal to <tt>Nh</tt> as defined
in <xref section="4" sectionFormat="comma" target="OPRF"/>, is defined by <xref target="private-token-type"/>.</t>
      <section anchor="private-request">
        <name>Client-to-Issuer Request</name>
        <t>The Client first creates a context as follows:</t>
        <artwork><![CDATA[
client_context = SetupVOPRFClient("P384-SHA384", pkI)
]]></artwork>
        <t>Here, "P384-SHA384" is the identifier corresponding to the
OPRF(P-384, SHA-384) ciphersuite in <xref target="OPRF"/>. SetupVOPRFClient
is defined in <xref section="3.2" sectionFormat="comma" target="OPRF"/>.</t>
        <t>The Client then creates an issuance request message for a random 32-byte value <tt>nonce</tt>
with the input challenge and Issuer key identifier as described below:</t>
        <artwork><![CDATA[
nonce = random(32)
challenge_digest = SHA256(challenge)
token_input = concat(0x0001, // Token type field is 2 bytes long
                     nonce,
                     challenge_digest,
                     token_key_id)
blind, blinded_element = client_context.Blind(token_input)
]]></artwork>
        <t>The Blind function is defined in <xref section="3.3.2" sectionFormat="comma" target="OPRF"/>.
If the Blind function fails, the Client aborts the protocol.
The Client stores the <tt>nonce</tt> and <tt>challenge_digest</tt> values locally
for use when finalizing the issuance protocol to produce a token
(as described in <xref target="private-finalize"/>).</t>
        <t>The Client then creates a TokenRequest structured as follows:</t>
        <artwork><![CDATA[
struct {
  uint16_t token_type = 0x0001; /* Type VOPRF(P-384, SHA-384) */
  uint8_t truncated_token_key_id;
  uint8_t blinded_msg[Ne];
} TokenRequest;
]]></artwork>
        <t>The structure fields are defined as follows:</t>
        <ul spacing="normal">
          <li>"token_type" is a 2-octet integer, which matches the type in the challenge.</li>
          <li>"truncated_token_key_id" is the least significant byte of the <tt>token_key_id</tt>
(<xref target="issuer-configuration"/>) in network byte order (in other words, the last 8
bits of <tt>token_key_id</tt>). This value is truncated so that Issuers cannot use
<tt>token_key_id</tt> as a way of uniquely identifying Clients; see <xref target="security"/>
and referenced information for more details.</li>
          <li>"blinded_msg" is the Ne-octet blinded message defined above, computed as
<tt>SerializeElement(blinded_element)</tt>.</li>
        </ul>
        <t>The values <tt>token_input</tt> and <tt>blinded_element</tt> are stored locally and used
later as described in <xref target="private-finalize"/>. The Client then generates an HTTP
POST request to send to the Issuer Request URL, with the TokenRequest as the
content. The media type for this request is
"application/private-token-request". An example request for the Issuer Request URL
"https://issuer.example.net/request" is shown below.</t>
        <artwork><![CDATA[
POST /request HTTP/1.1
Host: issuer.example.net
Accept: application/private-token-response
Content-Type: application/private-token-request
Content-Length: <Length of TokenRequest>

<Bytes containing the TokenRequest>
]]></artwork>
      </section>
      <section anchor="private-response">
        <name>Issuer-to-Client Response</name>
        <t>Upon receipt of the request, the Issuer validates the following conditions:</t>
        <ul spacing="normal">
          <li>The TokenRequest contains a supported token_type.</li>
          <li>The TokenRequest.truncated_token_key_id corresponds to the truncated key ID
of a Public Key owned by the Issuer.</li>
          <li>The TokenRequest.blinded_msg is of the correct size.</li>
        </ul>
        <t>If any of these conditions is not met, the Issuer MUST return an HTTP 422
(Unprocessable Content) error to the client.</t>
        <t>If these conditions are met, the Issuer then tries to deserialize
TokenRequest.blinded_msg using DeserializeElement from
<xref section="2.1" sectionFormat="of" target="OPRF"/>, yielding <tt>blinded_element</tt>. If this fails, the
Issuer MUST return an HTTP 422 (Unprocessable Content) error to the
client. Otherwise, if the Issuer is willing to produce a token to the Client,
the Issuer completes the issuance flow by computing a blinded response as
follows:</t>
        <artwork><![CDATA[
server_context = SetupVOPRFServer("P384-SHA384", skI)
evaluate_element, proof =
  server_context.BlindEvaluate(skI, pkI, blinded_element)
]]></artwork>
        <t>SetupVOPRFServer is defined in <xref section="3.2" sectionFormat="comma" target="OPRF"/> and BlindEvaluate is
defined in <xref section="3.3.2" sectionFormat="comma" target="OPRF"/>. The Issuer then creates a TokenResponse
structured as follows:</t>
        <artwork><![CDATA[
struct {
   uint8_t evaluate_msg[Ne];
   uint8_t evaluate_proof[Ns+Ns];
} TokenResponse;
]]></artwork>
        <t>The structure fields are defined as follows:</t>
        <ul spacing="normal">
          <li>"evaluate_msg" is the Ne-octet evaluated message, computed as
<tt>SerializeElement(evaluate_element)</tt>.</li>
          <li>"evaluate_proof" is the (Ns+Ns)-octet serialized proof, which is a pair of
Scalar values, computed as
<tt>concat(SerializeScalar(proof[0]), SerializeScalar(proof[1]))</tt>.</li>
        </ul>
        <t>The Issuer generates an HTTP response with status code 200 whose content
consists of TokenResponse, with the content type set as
"application/private-token-response".</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/private-token-response
Content-Length: <Length of TokenResponse>

<Bytes containing the TokenResponse>
]]></artwork>
      </section>
      <section anchor="private-finalize">
        <name>Finalization</name>
        <t>Upon receipt, the Client handles the response and, if successful, deserializes
the content values TokenResponse.evaluate_msg and TokenResponse.evaluate_proof,
yielding <tt>evaluated_element</tt> and <tt>proof</tt>. If deserialization of either value
fails, the Client aborts the protocol. Otherwise, the Client processes the
response as follows:</t>
        <artwork><![CDATA[
authenticator = client_context.Finalize(token_input, blind,
                                        evaluated_element,
                                        blinded_element,
                                        proof)
]]></artwork>
        <t>The Finalize function is defined in <xref section="3.3.2" sectionFormat="comma" target="OPRF"/>. If this
succeeds, the Client then constructs a Token as follows:</t>
        <artwork><![CDATA[
struct {
  uint16_t token_type = 0x0001; /* Type VOPRF(P-384, SHA-384) */
  uint8_t nonce[32];
  uint8_t challenge_digest[32];
  uint8_t token_key_id[32];
  uint8_t authenticator[Nk];
} Token;
]]></artwork>
        <t>The Token.nonce value is that which was created in <xref target="private-request"/>.
If the Finalize function fails, the Client aborts the protocol.</t>
      </section>
      <section anchor="token-verification">
        <name>Token Verification</name>
        <t>Verifying a Token requires creating a VOPRF context using the Issuer Private
Key and Public Key, evaluating the token contents, and comparing the result
against the token authenticator value:</t>
        <artwork><![CDATA[
server_context = SetupVOPRFServer("P384-SHA384", skI)
token_authenticator_input =
  concat(Token.token_type,
         Token.nonce,
         Token.challenge_digest,
         Token.token_key_id)
token_authenticator =
  server_context.Evaluate(token_authenticator_input)
valid = (token_authenticator == Token.authenticator)
]]></artwork>
      </section>
      <section anchor="issuer-configuration">
        <name>Issuer Configuration</name>
        <t>Issuers are configured with Issuer Private and Public Keys, each denoted <tt>skI</tt>
and <tt>pkI</tt>, respectively, used to produce tokens. These keys MUST NOT be reused
in other protocols. A RECOMMENDED method for generating keys is as
follows:</t>
        <artwork><![CDATA[
seed = random(Ns)
(skI, pkI) = DeriveKeyPair(seed, "PrivacyPass")
]]></artwork>
        <t>The DeriveKeyPair function is defined in <xref section="3.3.1" sectionFormat="comma" target="OPRF"/>.
The key identifier for a public key <tt>pkI</tt>, denoted <tt>token_key_id</tt>, is computed
as follows:</t>
        <artwork><![CDATA[
token_key_id = SHA256(SerializeElement(pkI))
]]></artwork>
        <t>Since Clients truncate <tt>token_key_id</tt> in each <tt>TokenRequest</tt>, Issuers SHOULD
ensure that the truncated form of new key IDs do not collide with other
truncated key IDs in rotation. Collisions can cause the Issuer to use
the wrong Issuer Private Key for issuance, which will in turn cause the
resulting tokens to be invalid. There is no known security consequence of
using the the wrong Issuer Private Key.</t>
      </section>
    </section>
    <section anchor="public-flow">
      <name>Issuance Protocol for Publicly Verifiable Tokens</name>
      <t>This section describes a variant of the issuance protocol in <xref target="private-flow"/>
for producing publicly verifiable tokens using the protocol in <xref target="BLINDRSA"/>.
In particular, this variant of the issuance protocol works for the
RSABSSA-SHA384-PSS-Deterministic and RSABSSA-SHA384-PSSZERO-Deterministic
blind RSA protocol variants described in <xref section="5" sectionFormat="of" target="BLINDRSA"/>.</t>
      <t>The publicly verifiable issuance protocol differs from the protocol in
<xref target="private-flow"/> in that the output tokens are publicly verifiable by anyone
with the Issuer Public Key. This means any Origin can select a given Issuer to
produce tokens, as long as the Origin has the Issuer public key, without
explicit coordination or permission from the Issuer. This is because the Issuer
does not learn the Origin that requested the token during the issuance protocol.</t>
      <t>Beyond this difference, the publicly verifiable issuance protocol variant is
nearly identical to the privately verifiable issuance protocol variant. In
particular, Issuers provide an Issuer Private and Public Key, denoted skI and pkI,
respectively, used to produce tokens as input to the protocol. See
<xref target="public-issuer-configuration"/> for how these keys are generated.</t>
      <t>Clients provide the following as input to the issuance protocol:</t>
      <ul spacing="normal">
        <li>Issuer Request URL: A URL identifying the location to which issuance requests
are sent. This can be a URL derived from the "issuer-request-uri" value in the
Issuer's directory resource, or it can be another Client-configured URL. The value
of this parameter depends on the Client configuration and deployment model.
For example, in the 'Split Origin, Attester, Issuer' deployment model, the
Issuer Request URL might correspond to the Client's configured Attester,
and the Attester is configured to relay requests to the Issuer.</li>
        <li>Issuer name: An identifier for the Issuer. This is typically a host name that
can be used to construct HTTP requests to the Issuer.</li>
        <li>Issuer Public Key: <tt>pkI</tt>, with a key identifier <tt>token_key_id</tt> computed as
described in <xref target="public-issuer-configuration"/>.</li>
        <li>Challenge value: <tt>challenge</tt>, an opaque byte string. For example, this might
be provided by the redemption protocol in <xref target="AUTHSCHEME"/>.</li>
      </ul>
      <t>Given this configuration and these inputs, the two messages exchanged in
this protocol are described below. The constant <tt>Nk</tt> is defined by
<xref target="public-token-type"/>.</t>
      <section anchor="public-request">
        <name>Client-to-Issuer Request</name>
        <t>The Client first creates an issuance request message for a random 32-byte value
<tt>nonce</tt> using the input challenge and Issuer key identifier as follows:</t>
        <artwork><![CDATA[
nonce = random(32)
challenge_digest = SHA256(challenge)
token_input = concat(0x0002, // Token type field is 2 bytes long
                     nonce,
                     challenge_digest,
                     token_key_id)
blinded_msg, blind_inv =
  Blind(pkI, PrepareIdentity(token_input))
]]></artwork>
        <t>The PrepareIdentity and Blind functions are defined in
<xref section="4.1" sectionFormat="of" target="BLINDRSA"/> and <xref section="4.2" sectionFormat="of" target="BLINDRSA"/>, respectively.
The Client stores the nonce and challenge_digest values locally for use
when finalizing the issuance protocol to produce a token (as described
in <xref target="public-finalize"/>).</t>
        <t>The Client then creates a TokenRequest structured as follows:</t>
        <artwork><![CDATA[
struct {
  uint16_t token_type = 0x0002; /* Type Blind RSA (2048-bit) */
  uint8_t truncated_token_key_id;
  uint8_t blinded_msg[Nk];
} TokenRequest;
]]></artwork>
        <t>The structure fields are defined as follows:</t>
        <ul spacing="normal">
          <li>"token_type" is a 2-octet integer, which matches the type in the challenge.</li>
          <li>"truncated_token_key_id" is the least significant byte of the <tt>token_key_id</tt>
(<xref target="public-issuer-configuration"/>) in network byte order (in other words, the
last 8 bits of <tt>token_key_id</tt>). This value is truncated so that Issuers cannot use
<tt>token_key_id</tt> as a way of uniquely identifying Clients; see <xref target="security"/>
and referenced information for more details.</li>
          <li>"blinded_msg" is the Nk-octet request defined above.</li>
        </ul>
        <t>The Client then generates an HTTP POST request to send to the Issuer Request
URL, with the TokenRequest as the content. The media type for this request
is "application/private-token-request". An example request for the Issuer
Request URL "https://issuer.example.net/request" is shown below.</t>
        <artwork><![CDATA[
POST /request HTTP/1.1
Host: issuer.example.net
Accept: application/private-token-response
Content-Type: application/private-token-request
Content-Length: <Length of TokenRequest>

<Bytes containing the TokenRequest>
]]></artwork>
      </section>
      <section anchor="public-response">
        <name>Issuer-to-Client Response</name>
        <t>Upon receipt of the request, the Issuer validates the following conditions:</t>
        <ul spacing="normal">
          <li>The TokenRequest contains a supported token_type.</li>
          <li>The TokenRequest.truncated_token_key_id corresponds to the truncated key
ID of an Issuer Public Key.</li>
          <li>The TokenRequest.blinded_msg is of the correct size.</li>
        </ul>
        <t>If any of these conditions is not met, the Issuer MUST return an HTTP 422
(Unprocessable Content) error to the Client. Otherwise, if the
Issuer is willing to produce a token to the Client, the Issuer
completes the issuance flow by computing a blinded response as follows:</t>
        <artwork><![CDATA[
blind_sig = BlindSign(skI, TokenRequest.blinded_msg)
]]></artwork>
        <t>The BlindSign function is defined in <xref section="4.3" sectionFormat="of" target="BLINDRSA"/>.
The result is encoded and transmitted to the client in the following
TokenResponse structure:</t>
        <artwork><![CDATA[
struct {
  uint8_t blind_sig[Nk];
} TokenResponse;
]]></artwork>
        <t>The Issuer generates an HTTP response with status code 200 whose content
consists of TokenResponse, with the content type set as
"application/private-token-response".</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/private-token-response
Content-Length: <Length of TokenResponse>

<Bytes containing the TokenResponse>
]]></artwork>
      </section>
      <section anchor="public-finalize">
        <name>Finalization</name>
        <t>Upon receipt, the Client handles the response and, if successful, processes the
content as follows:</t>
        <artwork><![CDATA[
authenticator =
  Finalize(pkI, nonce, blind_sig, blind_inv)
]]></artwork>
        <t>The Finalize function is defined in <xref section="4.4" sectionFormat="of" target="BLINDRSA"/>. If this
succeeds, the Client then constructs a Token as described in <xref target="AUTHSCHEME"/> as
follows:</t>
        <artwork><![CDATA[
struct {
  uint16_t token_type = 0x0002; /* Type Blind RSA (2048-bit) */
  uint8_t nonce[32];
  uint8_t challenge_digest[32];
  uint8_t token_key_id[32];
  uint8_t authenticator[Nk];
} Token;
]]></artwork>
        <t>The Token.nonce value is that which was sampled in <xref target="private-request"/>.
If the Finalize function fails, the Client aborts the protocol.</t>
      </section>
      <section anchor="token-verification-1">
        <name>Token Verification</name>
        <t>Verifying a Token requires checking that Token.authenticator is a valid
signature over the remainder of the token input using the Issuer Public Key.
The function <tt>RSASSA-PSS-VERIFY</tt> is defined in <xref section="8.1.2" sectionFormat="of" target="RFC8017"/>,
using SHA-384 as the Hash function, MGF1 with SHA-384 as the PSS mask
generation function (MGF), and a 48-byte salt length (sLen).</t>
        <artwork><![CDATA[
token_authenticator_input =
  concat(Token.token_type,
         Token.nonce,
         Token.challenge_digest,
         Token.token_key_id)
valid = RSASSA-PSS-VERIFY(pkI,
                          token_authenticator_input,
                          Token.authenticator)
]]></artwork>
      </section>
      <section anchor="public-issuer-configuration">
        <name>Issuer Configuration</name>
        <t>Issuers are configured with Issuer Private and Public Keys, each denoted skI and
pkI, respectively, used to produce tokens. Each key SHALL be generated
securely, for example as specified in FIPS 186-5 <xref target="DSS"/>.
These keys MUST NOT be reused in other protocols.</t>
        <t>The key identifier for an Issuer Private and Public Key (skI, pkI), denoted <tt>token_key_id</tt>,
is computed as SHA256(encoded_key), where encoded_key is a DER-encoded
SubjectPublicKeyInfo <xref target="RFC5280"/> (SPKI) object carrying pkI as a DER-encoded
RSAPublicKey value in the the subjectPublicKey field. Additionally, the SPKI object
MUST use the id-RSASSA-PSS object identifier in the algorithm field within the
SPKI object, the parameters field MUST contain a RSASSA-PSS-params value,
and MUST include the hashAlgorithm, maskGenAlgorithm, and saltLength values.
The saltLength MUST match the output size of the hash function associated with
the public key and token type.</t>
        <t>An example sequence of the SPKI object (in ASN.1 format, with the actual public key
bytes truncated) for a 2048-bit key is below:</t>
        <artwork><![CDATA[
$ cat spki.bin | xxd -r -p | openssl asn1parse -dump -inform DER
    0:d=0  hl=4 l= 338 cons: SEQUENCE
    4:d=1  hl=2 l=  61 cons: SEQUENCE
    6:d=2  hl=2 l=   9 prim: OBJECT            :rsassaPss
   17:d=2  hl=2 l=  48 cons: SEQUENCE
   19:d=3  hl=2 l=  13 cons: cont [ 0 ]
   21:d=4  hl=2 l=  11 cons: SEQUENCE
   23:d=5  hl=2 l=   9 prim: OBJECT            :sha384
   34:d=3  hl=2 l=  26 cons: cont [ 1 ]
   36:d=4  hl=2 l=  24 cons: SEQUENCE
   38:d=5  hl=2 l=   9 prim: OBJECT            :mgf1
   49:d=5  hl=2 l=  11 cons: SEQUENCE
   51:d=6  hl=2 l=   9 prim: OBJECT            :sha384
   62:d=3  hl=2 l=   3 cons: cont [ 2 ]
   64:d=4  hl=2 l=   1 prim: INTEGER           :30
   67:d=1  hl=4 l= 271 prim: BIT STRING
   ... truncated public key bytes ...
]]></artwork>
        <t>Since Clients truncate <tt>token_key_id</tt> in each <tt>TokenRequest</tt>, Issuers SHOULD
ensure that the truncated form of new key IDs do not collide with other
truncated key IDs in rotation. Collisions can cause the Issuer to use
the wrong Issuer Private Key for issuance, which will in turn cause the
resulting tokens to be invalid. There is no known security consequence of
using the the wrong Issuer Private Key.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security considerations</name>
      <t>This document outlines how to instantiate the Issuance protocol
based on the VOPRF defined in <xref target="OPRF"/> and blind RSA protocol defined in
<xref target="BLINDRSA"/>. All security considerations described in the VOPRF and blind RSA
documents also apply in the Privacy Pass use-case. Considerations related to
broader privacy and security concerns in a multi-Client and multi-Issuer
setting are deferred to the architecture document <xref target="ARCHITECTURE"/>. In
particular, Section <xref target="ARCHITECTURE" section="4" sectionFormat="bare"/> and Section <xref target="ARCHITECTURE" section="5" sectionFormat="bare"/> of <xref target="ARCHITECTURE"/> discuss
relevant privacy considerations influenced by the Privacy Pass deployment
model, and <xref section="6" sectionFormat="of" target="ARCHITECTURE"/> discusses privacy considerations that
apply regardless of deployment model. Notable considerations include those pertaining to
Issuer Public Key rotation and consistency, where consistency is as described
in <xref target="CONSISTENCY"/>, and Issuer selection.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA considerations</name>
      <t>This section contains considerations for IANA.</t>
      <section anchor="wkuri-reg">
        <name>Well-Known 'private-token-issuer-directory' URI</name>
        <t>This document updates the "Well-Known URIs" Registry <xref target="WellKnownURIs"/> with the
following values.</t>
        <table anchor="wellknownuri-values">
          <name>'private-token-issuer-directory' Well-Known URI</name>
          <thead>
            <tr>
              <th align="left">URI Suffix</th>
              <th align="left">Change Controller</th>
              <th align="left">Reference</th>
              <th align="left">Status</th>
              <th align="left">Related information</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">private-token-issuer-directory</td>
              <td align="left">IETF</td>
              <td align="left">[this document]</td>
              <td align="left">permanent</td>
              <td align="left">None</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="token-type">
        <name>Token Type Registry Updates</name>
        <t>This document updates the "Privacy Pass Token Type" Registry with the
following entries.</t>
        <section anchor="private-token-type">
          <name>Token Type VOPRF (P-384, SHA-384)</name>
          <ul spacing="normal">
            <li>Value: 0x0001</li>
            <li>Name: VOPRF (P-384, SHA-384)</li>
            <li>Token Structure: As defined in <xref section="2.2" sectionFormat="of" target="AUTHSCHEME"/></li>
            <li>Token Key Encoding: Serialized using SerializeElement from <xref section="2.1" sectionFormat="of" target="OPRF"/></li>
            <li>TokenChallenge Structure: As defined in <xref section="2.1" sectionFormat="of" target="AUTHSCHEME"/></li>
            <li>Public Verifiability: N</li>
            <li>Public Metadata: N</li>
            <li>Private Metadata: N</li>
            <li>Nk: 48</li>
            <li>Nid: 32</li>
            <li>Reference: <xref target="private-flow"/></li>
            <li>Notes: None</li>
          </ul>
        </section>
        <section anchor="public-token-type">
          <name>Token Type Blind RSA (2048-bit)</name>
          <ul spacing="normal">
            <li>Value: 0x0002</li>
            <li>Name: Blind RSA (2048-bit)</li>
            <li>Token Structure: As defined in <xref section="2.2" sectionFormat="of" target="AUTHSCHEME"/></li>
            <li>Token Key Encoding: Serialized as a DER-encoded SubjectPublicKeyInfo (SPKI) object using the RSASSA-PSS OID <xref target="RFC5756"/></li>
            <li>TokenChallenge Structure: As defined in <xref section="2.1" sectionFormat="of" target="AUTHSCHEME"/></li>
            <li>Public Verifiability: Y</li>
            <li>Public Metadata: N</li>
            <li>Private Metadata: N</li>
            <li>Nk: 256</li>
            <li>Nid: 32</li>
            <li>Reference: <xref target="public-flow"/></li>
            <li>Notes: The RSABSSA-SHA384-PSS-Deterministic and
RSABSSA-SHA384-PSSZERO-Deterministic variants are supported</li>
          </ul>
        </section>
      </section>
      <section anchor="media-types">
        <name>Media Types</name>
        <t>The following entries should be added to the IANA "media types"
registry:</t>
        <ul spacing="normal">
          <li>"application/private-token-issuer-directory"</li>
          <li>"application/private-token-request"</li>
          <li>"application/private-token-response"</li>
        </ul>
        <t>The templates for these entries are listed below and the
reference should be this RFC.</t>
        <section anchor="applicationprivate-token-issuer-directory-media-type">
          <name>"application/private-token-issuer-directory" media type</name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>private-token-issuer-directory</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>"binary"</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t>see <xref target="setup"/></t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>this specification</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Services that implement the Privacy Pass issuer role, and client
applications that interact with the issuer for the purposes of
issuing or redeeming tokens.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Additional information:</dt>
            <dd>
              <dl spacing="compact">
                <dt>Magic number(s):</dt>
                <dd>N/A</dd>
                <dt>Deprecated alias names for this type:</dt>
                <dd>N/A</dd>
                <dt>File extension(s):</dt>
                <dd>N/A</dd>
                <dt>Macintosh file type code(s):</dt>
                <dd>N/A</dd>
              </dl>
            </dd>
            <dt>Person and email address to contact for further information:</dt>
            <dd>
              <t>see Authors' Addresses section</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Author:</dt>
            <dd>
              <t>see Authors' Addresses section</t>
            </dd>
            <dt>Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationprivate-token-request-media-type">
          <name>"application/private-token-request" media type</name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>private-token-request</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>"binary"</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t>see <xref target="security"/></t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>this specification</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Applications that want to issue or facilitate issuance of Privacy Pass tokens,
including Privacy Pass issuer applications themselves.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Additional information:</dt>
            <dd>
              <dl spacing="compact">
                <dt>Magic number(s):</dt>
                <dd>N/A</dd>
                <dt>Deprecated alias names for this type:</dt>
                <dd>N/A</dd>
                <dt>File extension(s):</dt>
                <dd>N/A</dd>
                <dt>Macintosh file type code(s):</dt>
                <dd>N/A</dd>
              </dl>
            </dd>
            <dt>Person and email address to contact for further information:</dt>
            <dd>
              <t>see Authors' Addresses section</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Author:</dt>
            <dd>
              <t>see Authors' Addresses section</t>
            </dd>
            <dt>Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
          </dl>
        </section>
        <section anchor="applicationprivate-token-response-media-type">
          <name>"application/private-token-response" media type</name>
          <dl spacing="compact">
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>private-token-response</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>"binary"</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t>see <xref target="security"/></t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>this specification</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Applications that want to issue or facilitate issuance of Privacy Pass tokens,
including Privacy Pass issuer applications themselves.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Additional information:</dt>
            <dd>
              <dl spacing="compact">
                <dt>Magic number(s):</dt>
                <dd>N/A</dd>
                <dt>Deprecated alias names for this type:</dt>
                <dd>N/A</dd>
                <dt>File extension(s):</dt>
                <dd>N/A</dd>
                <dt>Macintosh file type code(s):</dt>
                <dd>N/A</dd>
              </dl>
            </dd>
            <dt>Person and email address to contact for further information:</dt>
            <dd>
              <t>see Authors' Addresses section</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Author:</dt>
            <dd>
              <t>see Authors' Addresses section</t>
            </dd>
            <dt>Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="WellKnownURIs" target="https://www.iana.org/assignments/well-known-uris/well-known-uris.xhtml">
          <front>
            <title>Well-Known URIs</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ARCHITECTURE">
          <front>
            <title>The Privacy Pass Architecture</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>LIP</organization>
            </author>
            <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="12" month="September" year="2023"/>
            <abstract>
              <t>   This document specifies the Privacy Pass architecture and
   requirements for its constituent protocols used for authorization
   based on privacy-preserving authentication mechanisms.  It describes
   the conceptual model of Privacy Pass and its protocols, its security
   and privacy goals, practical deployment models, and recommendations
   for each deployment model that helps ensure the desired security and
   privacy goals are fulfilled.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-architecture-15"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="OPRF">
          <front>
            <title>Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Armando Faz-Hernandez" initials="A." surname="Faz-Hernandez">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="21" month="February" year="2023"/>
            <abstract>
              <t>   An Oblivious Pseudorandom Function (OPRF) is a two-party protocol
   between client and server for computing the output of a Pseudorandom
   Function (PRF).  The server provides the PRF private key, and the
   client provides the PRF input.  At the end of the protocol, the
   client learns the PRF output without learning anything about the PRF
   private key, and the server learns neither the PRF input nor output.
   An OPRF can also satisfy a notion of 'verifiability', called a VOPRF.
   A VOPRF ensures clients can verify that the server used a specific
   private key during the execution of the protocol.  A VOPRF can also
   be partially-oblivious, called a POPRF.  A POPRF allows clients and
   servers to provide public input to the PRF computation.  This
   document specifies an OPRF, VOPRF, and POPRF instantiated within
   standard prime-order groups, including elliptic curves.  This
   document is a product of the Crypto Forum Research Group (CFRG) in
   the IRTF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-voprf-21"/>
        </reference>
        <reference anchor="BLINDRSA">
          <front>
            <title>RSA Blind Signatures</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Frederic Jacobs" initials="F." surname="Jacobs">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document specifies an RSA-based blind signature protocol.  RSA
   blind signatures were first introduced by Chaum for untraceable
   payments.  A signature that is output from this protocol can be
   verified as an RSA-PSS signature.

   This document is a product of the Crypto Forum Research Group (CFRG)
   in the IRTF.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/chris-wood/draft-wood-cfrg-blind-signatures.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-rsa-blind-signatures-14"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="TIMESTAMP">
          <front>
            <title>Guidelines for Defining Packet Timestamps</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="J. Fabini" initials="J." surname="Fabini"/>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>Various network protocols make use of binary-encoded timestamps that are incorporated in the protocol packet format, referred to as "packet timestamps" for short. This document specifies guidelines for defining packet timestamp formats in networking protocols at various layers. It also presents three recommended timestamp formats. The target audience of this document includes network protocol designers. It is expected that a new network protocol that requires a packet timestamp will, in most cases, use one of the recommended timestamp formats. If none of the recommended formats fits the protocol requirements, the new protocol specification should specify the format of the packet timestamp according to the guidelines in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8877"/>
          <seriesInfo name="DOI" value="10.17487/RFC8877"/>
        </reference>
        <reference anchor="AUTHSCHEME">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="12" month="September" year="2023"/>
            <abstract>
              <t>   This document defines an HTTP authentication scheme for Privacy Pass,
   a privacy-preserving authentication mechanism used for authorization.
   The authentication scheme in this document can be used by clients to
   redeem Privacy Pass tokens with an origin.  It can also be used by
   origins to challenge clients to present Privacy Pass tokens.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-auth-scheme-13"/>
        </reference>
        <reference anchor="RFC5861">
          <front>
            <title>HTTP Cache-Control Extensions for Stale Content</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document defines two independent HTTP Cache-Control extensions that allow control over the use of stale responses by caches. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5861"/>
          <seriesInfo name="DOI" value="10.17487/RFC5861"/>
        </reference>
        <reference anchor="RFC9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC5756">
          <front>
            <title>Updates for RSAES-OAEP and RSASSA-PSS Algorithm Parameters</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <author fullname="K. Yiu" initials="K." surname="Yiu"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Polk" initials="T." surname="Polk"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document updates RFC 4055. It updates the conventions for using the RSA Encryption Scheme - Optimal Asymmetric Encryption Padding (RSAES-OAEP) key transport algorithm in the Internet X.509 Public Key Infrastructure (PKI). Specifically, it updates the conventions for algorithm parameters in an X.509 certificate's subjectPublicKeyInfo field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5756"/>
          <seriesInfo name="DOI" value="10.17487/RFC5756"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="DSS" target="https://doi.org/10.6028/nist.fips.186-5">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author fullname="Dustin Moody" surname="Moody">
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2023"/>
            <abstract>
              <t>&lt;jats:p /&gt;</t>
            </abstract>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.186-5"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document describes the consistency requirements of protocols
   such as Privacy Pass, Oblivious DoH, and Oblivious HTTP for user
   privacy.  It presents definitions for consistency and then surveys
   mechanisms for providing consistency in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-01"/>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors of this document would like to acknowledge the helpful
feedback and discussions from Benjamin Schwartz, Joseph Salowey,
and Tara Whalen.</t>
    </section>
    <section anchor="test-vectors">
      <name>Test Vectors</name>
      <t>This section includes test vectors for the two basic issuance protocols
specified in this document. <xref target="test-vectors-poprf"/> contains test vectors
for token issuance protocol 1 (0x0001), and <xref target="test-vectors-rsa"/> contains
test vectors for token issuance protocol 2 (0x0002).</t>
      <section anchor="test-vectors-poprf">
        <name>Issuance Protocol 1 - VOPRF(P-384, SHA-384)</name>
        <t>The test vector below lists the following values:</t>
        <ul spacing="normal">
          <li>skS: The Issuer Private Key, serialized using SerializeScalar from
<xref section="2.1" sectionFormat="of" target="OPRF"/> and represented as a hexadecimal string.</li>
          <li>pkS: The Issuer Public Key, serialized according to the encoding in <xref target="private-token-type"/>.</li>
          <li>token_challenge: A randomly generated TokenChallenge structure, represented
as a hexadecimal string.</li>
          <li>nonce: The 32-byte client nonce generated according to <xref target="private-request"/>,
represented as a hexadecimal string.</li>
          <li>blind: The blind used when computing the OPRF blinded message, serialized
using SerializeScalar from <xref section="2.1" sectionFormat="of" target="OPRF"/> and represented as a
hexadecimal string.</li>
          <li>token_request: The TokenRequest message constructed according to
<xref target="private-request"/>, represented as a hexadecimal string.</li>
          <li>token_response: The TokenResponse message constructed according to
<xref target="private-response"/>, represented as a hexadecimal string.</li>
          <li>token: The output Token from the protocol, represented as a hexadecimal
string.</li>
        </ul>
        <artwork><![CDATA[
// Test vector 1
skS: 39b0d04d3732459288fc5edb89bb02c2aa42e06709f201d6c518871d5181
14910bee3c919bed1bbffe3fc1b87d53240a
pkS: 02d45bf522425cdd2227d3f27d245d9d563008829252172d34e48469290c
21da1a46d42ca38f7beabdf05c074aee1455bf
token_challenge: 0001000e6973737565722e6578616d706c65205de58a52fc
daef25ca3f65448d04e040fb1924e8264acfccfc6c5ad451d582b3000e6f72696
7696e2e6578616d706c65
nonce:
6aa422c41b59d3e44a136dd439df2454e3587ee5f3697798cdc05fafe73073b8
blind: 8e7fd80970b8a00b0931b801a2e22d9903d83bd5597c6a4dc1496ed2b1
7ef820445ef3bd223f3ab2c4f54c5d1c956909
token_request: 0001f4030ab3e23181d1e213f24315f5775983c678ce22eff9
427610832ab3900f2cd12d6829a07ec8a6813cf0b5b886f4cc4979
token_response: 036bb3c5c397d88c3527cf9f08f1fe63687b867e85c930c49
ee2c222408d4903722a19ff272ac97e3725b947c972784ebfe86eb9ea54336e43
34ea9660212c0c85fbadfbf491a1ce2446fc3379337fccd45c1059b2bc760110e
e1ec227d8e01c9f482c00c47ffa0dbe2fb58c32dde2b1dbe69fff920a528e68dd
9b3c2483848e57c30542b8984fa6bfecd6d71d54d53eda
token: 00016aa422c41b59d3e44a136dd439df2454e3587ee5f3697798cdc05f
afe73073b8501370b494089dc462802af545e63809581ee6ef57890a12105c283
68169514bf260d0792bf7f46c9866a6d37c3032d8714415f87f5f6903d7fb071e
253be2f4e0a835d76528b8444f73789ee7dc90715b01c17902fd87375c00a7a9d
3d92540437f470773be20f71e721da3af40edeb

// Test vector 2
skS: 39efed331527cc4ddff9722ab5cd35aeafe7c27520b0cfa2eedbdc298dc3
b12bc8298afcc46558af1e2eeacc5307d865
pkS: 038017e005904c6146b37109d6c2a72b95a183aaa9ed951b8d8fb1ed9033
f68033284d175e7df89849475cd67a86bfbf4e
token_challenge: 0001000e6973737565722e6578616d706c6500000e6f7269
67696e2e6578616d706c65
nonce:
7617bc802cfdb5d74722ef7418bdbb4f2c88403820e55fe7ec07d3190c29d665
blind: 6492ee50072fa18d035d69c4246362dffe2621afb95a10c033bb0109e0
f705b0437c425553272e0aa5266ec379e7015e
token_request: 000133033a5fe04a39da1bbfb68ccdeecd1917474dd525462e
5a90a6ba53b42aaa1486fe443a2e1c7f3fd5ff028a1c7cf1aeac5d
token_response: 023bf8cd624880d669c5cc6c88b056355c6e8e1bcbf3746cf
b9ab9248a4c056f23a4876ef998a8b6b281d50f852c6fa868fc4fa135c79ccb5f
bdf8bf3c926e10c7c12f934a887d86da4a4e5be70f5a169aa75720887bb690536
92a8f11f9cda7a72f281e4e3568e848225367946c70db09e718e3cba16193987b
c10bede3ef54c4d036c17cd4015bb113be60d7aa927e0d
token: 00017617bc802cfdb5d74722ef7418bdbb4f2c88403820e55fe7ec07d3
190c29d665c994f7d5cdc2fb970b13d4e8eb6e6d8f9dcdaa65851fb091025dfe1
34bd5a62a116477bc9e1a205cca95d0c92335ca7a3e71063b2ac020bdd231c660
97f12333ef438d00801bca5ace0fab8eb483dc04cd62578b95b5652921cd2698c
45ea74f6c8827b4e19f01140fa5bd039866f562

// Test vector 3
skS: 2b7709595b62b784f14946ae828f65e6caeba6eefe732c86e9ae50e818c0
55b3d7ca3a5f2beecaa859a62ff7199d35cc
pkS: 03a0de1bf3fd0a73384283b648884ba9fa5dee190f9d7ad4292c2fd49d8b
4d64db674059df67f5bd7e626475c78934ae8d
token_challenge: 0001000e6973737565722e6578616d706c65000017666f6f
2e6578616d706c652c6261722e6578616d706c65
nonce:
87499b5930918d2d83ecebf92d25ca0722aa11b80dbbfd950537c28aa7d3a9df
blind: 1f659584626ba15f44f3d887b2e5fe4c27315b185dfbfaea4253ebba30
610c4d9b73c78714c142360e85a00942c0fcff
token_request: 0001c8024610a9f3aac21090f3079d6809437a2b94b4403c7e
645f849bc6c505dade154c258c8ecd4d2bdcf574daca65db671908
token_response: 03c2ab925d03e7793b4a4df6eb505210139f620359e142449
1b8143c06a3e5298b25b662c33256411be7277233e1a34570f7a4d142d931e4b5
ff8829e27aaf7eb2cc7f9ab655477d71c01d5da5aef44dd076b5820b4710ef025
a9e6c6b50a95af6105c5987c1b834d615008cf6370556ed00c6671e69776c09a9
2b5ac84804750dd867c78817bdf69f1443002b18ae7a52
token: 000187499b5930918d2d83ecebf92d25ca0722aa11b80dbbfd950537c2
8aa7d3a9df1949fd455872478ba87e2e6c513c3261cddbe57220581245e4c9c91
1dd1c0bb865785bff8f3cfe08cccbb3a7b8e41d23a172871be4828cc54582d87b
c7cfc5c8bcedc1868ebc845b000c317ed75312274a42b10be6db23bd8a168fd2f
021c23925d72c4d14cd7588c03845da0d41a326

// Test vector 4
skS: 22e237b7b983d77474e4495aff2fc1e10422b1d955192e0fbf2b7b618fba
625fcb94b599da9113da49c495a48fbf7f7f
pkS: 028cd68715caa20d19b2b20d017d6a0a42b9f2b0a47db65e5e763e23744f
e14d74e374bbc93a2ec3970eb53c8aa765ee21
token_challenge: 0001000e6973737565722e6578616d706c65000000
nonce:
02f0a206752d555a24924f2da5942a1bb4cb2d83ff473aa8b2bc3a89e820cd43
blind: af91d1dbcf6b46baecde70eb305b8fe75629199cca19c7f9344b8607b9
0def27bc53e0345ade32c9fd0a1efda056d1c0
token_request: 0001a503632ebb003ed15b6de4557c047c7f81a58688143331
2ad3ad7f9416f2dfc940d3f439ad1e8cd677d94ae7c05bc958d134
token_response: 032018bc3f180d9650e27f72de76a90b47e336ae9cb058548
d851c7046fa0875d96346c15cb39d8083cc6fb57216544c6a815c37d792769e12
9c0513ce2034c3286cb212548f4aed1b0f71b28e219a71874a93e53ab2f473282
71d1e9cbefc197a4f599a6825051fa1c6e55450042f04182b86c9cf12477a9f16
849396c051fa27012e81a86e6c4a9204a063f1e1722dd7
token: 000102f0a206752d555a24924f2da5942a1bb4cb2d83ff473aa8b2bc3a
89e820cd43085cb06952044c7655b412ab7d484c97b97c48c79c568140b8d49a0
2ca47a9cfb0a5cfb861290c4dbd8fd9b60ee9b1a1a54cf47c98531fe253f1ed6d
875de5a58f42db12b540b0d11bc5d6b42e6d17c2b73e98631e54d40fd2901ebec
4268668535b03cbf76f7f15a29d623a64cab0c4

// Test vector 5
skS: 46f3d4f562002b85ffcfdb4d06835fb9b2e24372861ecaa11357fd1f29f9
ed26e44715549ccedeb39257f095110f0159
pkS: 02fbe9da0b7cabe3ec51c36c8487b10909142b59af030c728a5e87bb3b30
f54c06415d22e03d9212bd3d9a17d5520d4d0f
token_challenge: 0001000e6973737565722e6578616d706c65205de58a52fc
daef25ca3f65448d04e040fb1924e8264acfccfc6c5ad451d582b30000
nonce:
9ee54942d8a1604452a76856b1bfaf1cd608e1e3fa38acfd9f13e84483c90e89
blind: 76e0938e824b6cda6c163ff55d0298d539e222ed3984f4e31bbb654a8c
59671d4e0a7e264ca758cd0f4b533e0f60c5aa
token_request: 0001e10202bc92ac516c867f39399d71976018db52fcab5403
f8534a65677ba9e1e7d9b1d01767d137884c86cf5fe698c2f5d8e9
token_response: 0322ea3856a71533796393229b33d33c02cd714e40d5aa4e0
71f056276f32f89c09947eca8ff119d940d9d57c2fcbd83d2da494ddeb37dc1f6
78e5661a8e7bcc96b3477eb89d708b0ce10e0ea1b5ce0001f9332f743c0cc3d47
48233fea6d3152fae7844821268eb96ba491f60b1a3a848849310a39e9ef59121
669aa5d5dbb4b4deb532d2f907a01c5b39efaf23985080
token: 00019ee54942d8a1604452a76856b1bfaf1cd608e1e3fa38acfd9f13e8
4483c90e89d4380df12a1727f4e2ca1ee0d7abea0d0fb1e9506507a4dd618f9b8
7e79f9f3521a7c9134d6722925bf622a994041cdb1b082cdf1309af32f0ce00ca
1dab63e1b603747a8a5c3b46c7c2853de5ec7af8cac7cf3e089cecdc9ed3ff05c
d24504fe4f6c52d24ac901471267d8b63b61e6b
]]></artwork>
      </section>
      <section anchor="test-vectors-rsa">
        <name>Issuance Protocol 2 - Blind RSA, 2048</name>
        <t>The test vector below lists the following values:</t>
        <ul spacing="normal">
          <li>skS: The PEM-encoded PKCS#8 RSA Issuer Private Key used for signing tokens,
represented as a hexadecimal string.</li>
          <li>pkS: The Issuer Public Key, serialized according to the encoding in <xref target="public-token-type"/>.</li>
          <li>token_challenge: A randomly generated TokenChallenge structure, represented
as a hexadecimal string.</li>
          <li>nonce: The 32-byte client nonce generated according to <xref target="public-request"/>,
represented as a hexadecimal string.</li>
          <li>blind: The blind used when computing the blind RSA blinded message,
represented as a hexadecimal string.</li>
          <li>salt: The randomly generated 48-byte salt used when encoding the blinded
token request message, represented as a hexadecimal string.</li>
          <li>token_request: The TokenRequest message constructed according to
<xref target="public-request"/>, represented as a hexadecimal string.</li>
          <li>token_request: The TokenResponse message constructed according to
<xref target="public-response"/>, represented as a hexadecimal string.</li>
          <li>token: The output Token from the protocol, represented as a hexadecimal
string.</li>
        </ul>
        <artwork><![CDATA[
// Test vector 1
skS: 2d2d2d2d2d424547494e2050524956415445204b45592d2d2d2d2d0a4d49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pkS: 30820152303d06092a864886f70d01010a3030a00d300b06096086480165
03040202a11a301806092a864886f70d010108300b0609608648016503040202a
2030201300382010f003082010a0282010100cb1aed6b6a95f5b1ce013a4cfcab
25b94b2e64a23034e4250a7eab43c0df3a8c12993af12b111908d4b471bec31d4
b6c9ad9cdda90612a2ee903523e6de5a224d6b02f09e5c374d0cfe01d8f529c50
0a78a2f67908fa682b5a2b430c81eaf1af72d7b5e794fc98a3139276879757ce4
53b526ef9bf6ceb99979b8423b90f4461a22af37aab0cf5733f7597abe44d31c7
32db68a181c6cbbe607d8c0e52e0655fd9996dc584eca0be87afbcd78a337d17b
1dba9e828bbd81e291317144e7ff89f55619709b096cbb9ea474cead264c2073f
e49740c01f00e109106066983d21e5f83f086e2e823c879cd43cef700d2a352a9
babd612d03cad02db134b7e225a5f0203010001
token_challenge: 0002000e6973737565722e6578616d706c65208e7acc900e
393381e8810b7c9e4a68b5163f1f880ab6688a6ffe780923609e88000e6f72696
7696e2e6578616d706c65
nonce:
aa72019d1f951df197021ce63876fe8b0a02dc1c31a12b0a2dd1508d07827f05
blind: 425421de54c7381864ce36473abfb988c454fe6c27de863de702a6a2ad
ca153fa2de47bd8fcd62734caa8ce1f920b77d980ab58c32d16dde54873f28ca9
68e8c125b8363514be68972f553655bcc7f80a284cc327e47e804a47333c5b3cd
f773312cc7ad9fda748aed0baa7e19c5a2d1dafda718f086d7fc0a4bc02d488e0
f20812daee335af7177b7a8369bd617066aed7a58f659f295c36b418827f67972
5b81ca14ea16fb82df21ad76da1ac38dcf24bf6252f8510e2308608ac9197f6cb
54fdcb19db17837302a2b87d659c5605f35f3709a130f0c3d50e172f0cae36cbc
9467f9914895a215a9e32443bcafff795273ccf8965a7eaa8c0b2184763e3e5c
salt: 3d980852fa570c064204feb8d107098db976ef8c2137e8641d234bbd88a
986fdb306a7af220cfadede08f51e1ef61766
token_request: 0002086a95be84b63cfed0993bb579194a72a95057e1548ac4
63a9a5b33b011f2b2011d59487f01862f1d8e4d5ea42e73a660fbc3d010b944a5
4da3a4e0942f8894c0884589b438cb902e9a34278970f33c16f351f7dae58d273
c3ab66ef368da36f785e89e24d1d983d5c34311cd21f290f9e89e8646ab0d0a48
988fcd46230de5e7603cd12cc95c7ec5002e5e26737aa7eb69c626476e6c8d465
10ee404a3d7daf3a23b7c66735d363ca13676925c6ed0117f60d165ce1f8ba616
d041b6384baf6da3e2f757cb18e879a4f8595c2dc895ddf1f4279c75768d108b5
c47f95f94e81e2d8b9c8b74476924ab3b7c45243fc99ac5466e8a3680ad37fa15
c96010b274094
token_response: 675d84b751d9e593330ec4b6d7ab69c9a61517e98971f4b73
6150508174b4335761464f237be2d72bbae4b94dffc6143413f6351f1aa4efde6
c32d4d6d9392a008290d56d1222f9b77a1336213e01934f7d972f3bf9ea5a5786
c321352f103b3667e605379a55f0fb925fbb09b8a9f85e7dd4b388a3b49d06fd7
0ba28f6a780e3bc8f6421554fd6c38b63ef19f84ccfcf14709dd0b4d72213c1f0
60893854eba0ea1a147e275da320db5e9849882d5f9179efa8a2d8d3b803f9d14
45ef5c1f660be08883ce9b29a0a992fc035d2938cbb61c440044438dbb8b3ce71
58a8f9827d230482f622d291406ab236b32b122627ae0fd36bd0d6b7607b8044a
ce404d44
token: 0002aa72019d1f951df197021ce63876fe8b0a02dc1c31a12b0a2dd150
8d07827f055969f643b4cfda5196d4aa86aeb5368834f4f06de46950ed435b3b8
1bd036d44ca572f8982a9ca248a3056186322d93ca147266121ddeb5632c07f1f
71cd2708bc6a21b533d07294b5e900faf5537dd3eb33cee4e08c9670d1e5358fd
184b0e00c637174f5206b14c7bb0e724ebf6b56271e5aa2ed94c051c4a433d302
b23bc52460810d489fb050f9de5c868c6c1b06e3849fd087629f704cc724bc0d0
984d5c339686fcdd75f9a9cdd25f37f855f6f4c584d84f716864f546b696d620c
5bd41a811498de84ff9740ba3003ba2422d26b91eb745c084758974642a420782
01543246ddb58030ea8e722376aa82484dca9610a8fb7e018e396165462e17a03
e40ea7e128c090a911ecc708066cb201833010c1ebd4e910fc8e27a1be467f786
71836a508257123a45e4e0ae2180a434bd1037713466347a8ebe46439d3da1970

// Test vector 2
skS: 2d2d2d2d2d424547494e2050524956415445204b45592d2d2d2d2d0a4d49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pkS: 30820152303d06092a864886f70d01010a3030a00d300b06096086480165
03040202a11a301806092a864886f70d010108300b0609608648016503040202a
2030201300382010f003082010a0282010100cb1aed6b6a95f5b1ce013a4cfcab
25b94b2e64a23034e4250a7eab43c0df3a8c12993af12b111908d4b471bec31d4
b6c9ad9cdda90612a2ee903523e6de5a224d6b02f09e5c374d0cfe01d8f529c50
0a78a2f67908fa682b5a2b430c81eaf1af72d7b5e794fc98a3139276879757ce4
53b526ef9bf6ceb99979b8423b90f4461a22af37aab0cf5733f7597abe44d31c7
32db68a181c6cbbe607d8c0e52e0655fd9996dc584eca0be87afbcd78a337d17b
1dba9e828bbd81e291317144e7ff89f55619709b096cbb9ea474cead264c2073f
e49740c01f00e109106066983d21e5f83f086e2e823c879cd43cef700d2a352a9
babd612d03cad02db134b7e225a5f0203010001
token_challenge: 0002000e6973737565722e6578616d706c6500000e6f7269
67696e2e6578616d706c65
nonce:
98c1345ff38a554b429b428b0f206cfe4f3892f8041995f2c24873d90e84488d
blind: 7bb85f89c9b83a0e2b02938b3396f06f8f3df0018a91f1a2cc5416aaa5
52994d063f634d50bea13bffe8d5e01431e646e2e384549cefd695ac3affff665
a1ebf0113df2520006bd66e468d37a58266daa8a3a75692535e1fc46d0c1d6fb6
f37c949808172e20c0b77a48570a1fcb474325bdd23cdbce52b5d6a9e39f7aec7
3b09004eae8c8bfff2b4b533ea63bcf467a4cd95ccfb0cb4e43bc4992c1fd0be7
a77a4475dbf8094cf25125ece901abbcea607a9050ad9f8ec3d0d66341f6eab40
ee9c9c22c0b560b8377f8543d8878c7458885fd285c7556cc88fc6021617075b4
2c83a86005169a6f13352e789b28fdbbe3d0288e1dd7c801497573893146aea3
salt: b6b4378421ab0ea677ce3f4036fd0489dee458ad81ea519c3e8bde3fcd5
ec1505d28e110d7b44dcac5e04ecedd54d11a
token_request: 00020892d26a271c0104657ba10c0b5cb2827bb209d86e8002
7f96bfb861e0f40cb897f0fc426498433141ce9bc8b4a95914fefe4e40bdd3802
a121cb0b59a4ae7e03255275c4abf071d991c82ead402606c0ef912178b0a0f68
d303e06a966079230592827b84979dbcb5f21ab8904e9908638ddf705c4f8af8a
053c19a66090726b60c6b4063976e4c66eab33522dd3f9d64828441db4aa82d55
adcc3d3920592884cd1e5a3f490d5c81f1306705dcc5c61d82373f1dbd7d2ae4b
2fea0f7339f5d868415f59312766e3074ee4a7305f5f053da82673ee6747a727a
26d8d10ea1b1a3491d26b0c38b962c02a774ac78932153aae9dcc98a9b1db1f53
89644682f7727
token_response: 113a5124c1aef6fc230d9fc42b789226f45ca941aad4da3f4
8cf37c7744a8d7fd1dcfd71cd39d09e9324760180ea0bade3360efaf7322a1fa1
5f41247be3857fde8c5c92ec6d67a7ee33be8fdadf8b27bb0db706117448e55bc
e9927cb6bfb1f87f9edb054181a4558af0c0d3973d7033b9599e674c20cf08a7b
bcf0da815a2edaab7c4fb80dee4ea2cc53576a9691e857da931c6c592d2c69dd2
1afda8ea653dd90157adfe80e2375c08e75beb497df8b7b73192fbbd4e80359d9
bbaecea14e0acebdda92596f71ec1d57e26b6497b3152976bc07a4409148cb843
89eb207fb8e841106012408c6e19b4f964008b6a909aaab767a661a061c97da16
43040455
token: 000298c1345ff38a554b429b428b0f206cfe4f3892f8041995f2c24873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// Test vector 3
skS: 2d2d2d2d2d424547494e2050524956415445204b45592d2d2d2d2d0a4d49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pkS: 30820152303d06092a864886f70d01010a3030a00d300b06096086480165
03040202a11a301806092a864886f70d010108300b0609608648016503040202a
2030201300382010f003082010a0282010100cb1aed6b6a95f5b1ce013a4cfcab
25b94b2e64a23034e4250a7eab43c0df3a8c12993af12b111908d4b471bec31d4
b6c9ad9cdda90612a2ee903523e6de5a224d6b02f09e5c374d0cfe01d8f529c50
0a78a2f67908fa682b5a2b430c81eaf1af72d7b5e794fc98a3139276879757ce4
53b526ef9bf6ceb99979b8423b90f4461a22af37aab0cf5733f7597abe44d31c7
32db68a181c6cbbe607d8c0e52e0655fd9996dc584eca0be87afbcd78a337d17b
1dba9e828bbd81e291317144e7ff89f55619709b096cbb9ea474cead264c2073f
e49740c01f00e109106066983d21e5f83f086e2e823c879cd43cef700d2a352a9
babd612d03cad02db134b7e225a5f0203010001
token_challenge: 0002000e6973737565722e6578616d706c65000017666f6f
2e6578616d706c652c6261722e6578616d706c65
nonce:
9e7a22bdc5d715682434cebc07eb5fa53f622f776a17a6d91757af1592df0e71
blind: c52cabc5e4e131e0f5860cc4c486c5ee8a5fa8ae59484446121f87b0d8
ccd037f161a99ebcc57f79d05a2ffc852656ad2d0894fab8d1b0f998e6e678254
ed5778da98b137371320314d06c24276e35435bccffa49d257687f270f9ce1792
6a074737546d5415a4bb9e624a6302562b395856632efb6992f6593a4f95fb342
002efebc3046ca96bbc26edb2f1a1454a24ce7b9a7ec8e44fb9e99c8144d409d8
cd8a5903c0a3c0acbd9f82573ed1fc4a296e3eaf4867ade30110794678f422d36
bd103ea4617d2472cf58da3381e52e5be60f4acbf685e280648cef21211a796ec
d005ecbdaa1046c40950afca4c4e7dd4b8c19e504088489a15667b45895b6e92
salt: c847b5d0fa9101a1e09954ac9f3eed6600af58936295ad2e54274e13e64
0d59f732d07530c94c19c20668f03470c77ac
token_request: 0002080f6bd84fba1822c577c8cd670f1136cca107f84ddd9d
405d5ed22ad15da975538f031433bad4a2688999732927efe2928d4c132389a12
2f40b639b083d6fcbbed7a55fb18db536d2dcbaefe6dc0a70730e6565b08a7dfd
783913a59f37d798de0cfc262c9e90a7ee884a3ec355eacbd44e5f6779fea6a78
5b05ac352fdd51a116cf2be1d8e38b0bfacd6a3d53a88c99f747cce908f86b335
62691f540e3e88562092cd17cc2f78ce0fb53312a5f2dc918bdb1dc90d9d65091
c7ba9080ccc1755cb5437989364dc92f0e8fea18f66d631451feb02a3d68af41d
e1a3f9be925dda5c4ca0706fc4ca28b3317e939f6573442c6d03be17cd141fa82
60d382d134c6b
token_response: 2dd08ce89cf4f62bc236ab7b75266e13c57c750345e328e0b
ea107537c4cbeea5bfc990716950440628ea2e37dbc5c9c6d84f9a965cbf0cbff
fb89516b1fd19a90d69cc52a28890bbdcf782f56aefadad85b6e861a74170ce91
0891c89e4293f37978dbd41cc8b5c68802de3d86d9f0326b9c22b809512245896
6a6ddd1aeb3828d239c3b359efc9b375390eb19050d5656c2b084304d9bd8a816
14f631bf82a7e4588413b44a0cb6d94e942fa134790b396cb71e3ed33b557b5bd
0734e726fa79abdca8694703b81d0e289b749801d4383e0d4f825dcde0dd98c43
d3ba81c028dd8833a4fc24961f60e118d4421dce5b611d53e9ca96156a52509bf
a9afeb7e
token: 00029e7a22bdc5d715682434cebc07eb5fa53f622f776a17a6d91757af
1592df0e710042eee45ac4dd5acb8f6e65c4d8dd47504f73f7463507ef96a4d72
27d2774f3ca572f8982a9ca248a3056186322d93ca147266121ddeb5632c07f1f
71cd270815b010bbc0d5f55e9c856d2e9ffaefba007d33c2d5452fbeb0b15919b
973e0dc9180aaeb18242043758d9fb0ac9ac5e04da9ff74ec93644ae6cdb7068e
a76ce2295b9b95e383ed3a9856e9f618dafdf4cec5d2b53ea4297c2f3990babca
71e3ccd6c07a437daae7ed27b6b81178fb7ce5fa5dd63781cc64ac1e410f441c0
34b0a5cc873a2ce875e8b38c92bab563635c4f8f4fa35d1f582ef19edf7da75aa
11a503a82e32a12bd4da41e0ca7ec7f451caf586f5b910003fcbbb9ff5ffa2408
c28d6807737d03da651ea9bfafcc2747a6830e19a1d160fcd5c25d2f79dad86a8
b3de8e926e08ca1addced72977f7b56398ef59c26e725df0a976a08f2a936ca42

// Test vector 4
skS: 2d2d2d2d2d424547494e2050524956415445204b45592d2d2d2d2d0a4d49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pkS: 30820152303d06092a864886f70d01010a3030a00d300b06096086480165
03040202a11a301806092a864886f70d010108300b0609608648016503040202a
2030201300382010f003082010a0282010100cb1aed6b6a95f5b1ce013a4cfcab
25b94b2e64a23034e4250a7eab43c0df3a8c12993af12b111908d4b471bec31d4
b6c9ad9cdda90612a2ee903523e6de5a224d6b02f09e5c374d0cfe01d8f529c50
0a78a2f67908fa682b5a2b430c81eaf1af72d7b5e794fc98a3139276879757ce4
53b526ef9bf6ceb99979b8423b90f4461a22af37aab0cf5733f7597abe44d31c7
32db68a181c6cbbe607d8c0e52e0655fd9996dc584eca0be87afbcd78a337d17b
1dba9e828bbd81e291317144e7ff89f55619709b096cbb9ea474cead264c2073f
e49740c01f00e109106066983d21e5f83f086e2e823c879cd43cef700d2a352a9
babd612d03cad02db134b7e225a5f0203010001
token_challenge: 0002000e6973737565722e6578616d706c65000000
nonce:
494dae41fc7e300c2d09990afcd5d5e1fc95305337dc12f78942c45340bfe8e6
blind: 097cb17bcedecfe058dff5c4e517d1e36d7ab8f46252b1ac1933ba378c
32625c0dbc69f5655c2003bf39e75810796cd63675b223cf3162c57108d56e058
4cfce6cad829e74369ada38a095eb3012c912b31ccde7425f93464e353fb17552
be3a8df2913daca61543a33ae45058f218c471dfbc12fb304158e29b6ed35bc07
9e23f1e6173c5dec4545840bbe58e5ad37cbea0a10dca5d9df2781589d27c3410
8477b52c0d32a1370c17f703941fbb1a007a6794e7de2758709c9bbf80f21eec7
922b9bb491eb6aac8c1a14764e648e6be4fff0ae913797067aa0826f366c3103e
103b05653c73b52d7f825a185dccfb806da700db9f53abb848554b7d4f7c28f3
salt: 49912979f1bf528e5b8228ab1328df74319dce7bdaf45821ceb1100dcf0
42a2dfe852fc9db59b64a5f6493c282504240
token_request: 000208244840027ca8c620f8b14caded9a198ba388ccd8541e
962f68a0071535d958d18494afd0bc11da4da8c8b33864f5a8f623b697cd56348
594e11a75479048a72c0ed179b070506c09a7eb6ed3582f572df38cf60fcde11a
52c5ce6d7b23435b60200ad9f66d21f40f323c9aa54307d0b966d4457c37542b6
6bb183ddeafca914fc74831698b5d52f498ee3d165685f49a8d86e39fe6c4b7ec
678f5250908d25e5b873c69b422368121aa4210cadd6fc640907d3cb9a7a3e827
a0e742470f00c2f49dc6c0e8cc9470dbfd73df0ccbb96c10b02af0dd7dee719ec
a11ff8e1b4929e59f3cf319de9bda29a6d968b43083b5d4242f3448d76ada08b8
014f70b97e719
token_response: c2746ff644cffb28a2c19395fa19dfb61fd135daa837844fb
f9fbe06c253e64e69f53aefddc0fb4833b1b5e58f571134a34f245499c3e73419
549c2c9111cf94f2f68fea3996d47f71e8d8d6fc5b1c074bf74fa59de4cbf32f5
f08d45ea45492f0279c3b1a8d852698edbe1651eb8e09eb223a27386c0feb2f6a
8260235edb36cf433da518100829b63166284b325d87fc941ea3bafe7b6761b70
82e09397837f74b4f0fc838bce8af7242089dd5561f57735926bcbad219fc9fee
85ae49a8e8951f63ca194b7ff018c06ee02267e7267bb996432dc76973819da80
e3e86947b0a4b36d3a972dafaaa3db0e1044b325f02c679996d9bcd3ce51390d5
4bc10b8c
token: 0002494dae41fc7e300c2d09990afcd5d5e1fc95305337dc12f78942c4
5340bfe8e6b741ec1b6fd05f1e95f8982906aec1612896d9ca97d53eef94ad3c9
fe023f7a4ca572f8982a9ca248a3056186322d93ca147266121ddeb5632c07f1f
71cd2708a55c83dc04292b5d92add1a87b37e54f22f61c58840586f390c50b231
824423378ddcf50e69dc817d45bfad06c7f2a0ac35d2acd7f26b0bc9954c192b0
a0ef28a2a5650e390098dd3cb1166a7cb1716d3dd2d19dc5ca3b1ea6206359de0
002d82bc4fa7e69fb07214b06addcbd2203d1e17f57fc580bcc5a13e0ac15cf94
2182cc2b5d6eaa737a712704114e357e2ec2f10047463ded02a1a0766dc346dd7
212b9711e03ac95eb258ac1164104dc9a0d3e738ae742ab5ed8c5139fc07145a7
88b9f891741ee68f0a66782b7b84a9bb4cb4b3d1b26b67106f397b35b641d882d
7b0185168946de898ef72349a44a47dbdd6d46e9ba9ba543d5701b65c63d645c2

// Test vector 5
skS: 2d2d2d2d2d424547494e2050524956415445204b45592d2d2d2d2d0a4d49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pkS: 30820152303d06092a864886f70d01010a3030a00d300b06096086480165
03040202a11a301806092a864886f70d010108300b0609608648016503040202a
2030201300382010f003082010a0282010100cb1aed6b6a95f5b1ce013a4cfcab
25b94b2e64a23034e4250a7eab43c0df3a8c12993af12b111908d4b471bec31d4
b6c9ad9cdda90612a2ee903523e6de5a224d6b02f09e5c374d0cfe01d8f529c50
0a78a2f67908fa682b5a2b430c81eaf1af72d7b5e794fc98a3139276879757ce4
53b526ef9bf6ceb99979b8423b90f4461a22af37aab0cf5733f7597abe44d31c7
32db68a181c6cbbe607d8c0e52e0655fd9996dc584eca0be87afbcd78a337d17b
1dba9e828bbd81e291317144e7ff89f55619709b096cbb9ea474cead264c2073f
e49740c01f00e109106066983d21e5f83f086e2e823c879cd43cef700d2a352a9
babd612d03cad02db134b7e225a5f0203010001
token_challenge: 0002000e6973737565722e6578616d706c65208e7acc900e
393381e8810b7c9e4a68b5163f1f880ab6688a6ffe780923609e880000
nonce:
a1aa8b371c37c9a8ddbd7342ab4f9dd5227d5b1600dca6517b60f63143cd43a3
blind: ad7a32e1ac31b91daefd7042cc23d5621ab3e870d87297bbfe1ee8a518
ffc5b84770d3b77775c485b2d219954834868842d2f11877ac4bceb5da88944cc
a043a9afa52f9c9998a5dea7ab7c1f82662d0d327e29705a269ad221ae74a7c11
72ff89c48997a9fda08886d3998bb538868396c0ace71d260cc71f768001939b2
4d80d88979f0244a3dbc004eadfac81e138d430b9fa51c1aad21b957ff96b3123
c91c2fff362a386f0f99a3f9fc906ca626fd9107648f87532b44c4fe3856ecae1
f46d8ebf5d2f46e52034478e5e883015666574dd80bd5c036c4b55ebcc8b66068
8d23944cc1932d075b559dcdc269fae3511761f71c113634e60d67accc8875fb
salt: 35c04710ce866d879447b6230ce098a49e81be5c067881cce7bd5f92c1e
5bd9b3c7d4d795cfad134fdfe916d735a624a
token_request: 0002083d6495c72529bbc4f5c0b49e94e4561baec1ca638a93
b2940ea9e37b838db7b1a91ec1f257d49b45c4f75119c2ab9eb5578541ad2b9ba
c1bd627abc709097f503f83d98fed6dbeb615c3be9bf09cbf8ea25ea8026c1b8b
a1c704ff516ed87c3d7d85342fd00111d8a80492d4b8fdbb092a282f74f13901e
5edc1b3b02cfe24c950affe6130fbb57c1482d674db3c6944812ba081c2235a16
d01eeec0932a8619d85732fc3e36179f0b50377bf9cb7a50ce3abeb3f31ed5f0f
3deec7aae7290f5397cec61318357d652b029a0fda0f100a78e36c4ef56ba3779
963e8745fdf4e347763c63d825836878e249833a0f4bd315392cc06ccca2c955e
921efbc4f941d
token_response: 8db727000018a98a2fe9fda8bbde5b8e9cedc31efbcaed695
0eb1e0f8d9af9db632def52f74f07cdab304bbde40519080dd0388fb2b8900528
b4791d2bca40aa2c2a6d1b92f010c1849bfb781cc813cc204855dd05e8a2dd31e
a5220981b8ab6b008e153083dc8f594206440d66286fea9c21b56807be8655506
ab7818bb9c8c69489dda56fe6390a5397268c8b5711f9d2df6f2584740cccf034
5fd67f93f345426f33c078a0aceb90845df9eef74f6248d06c36d19e191da325b
721ddc12ea78ed37b0c3b6170590536e3aee7eb0efc7d11a2c9d072a394f12ffa
67ecf316c49efd8f31723b11fe46740636bd89ad4f7ef96bc38b2cb4916d9dc04
ba1b2fc6
token: 0002a1aa8b371c37c9a8ddbd7342ab4f9dd5227d5b1600dca6517b60f6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]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
