2.2.3.1 Security Profile Data Structures

The upper-layer application is responsible for completing the data structures in this section.