Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 31.127
Word version: 17.0.0
0…
2…
5…
6…
7…
8…
9…
10…
11…
12…
13…
14…
15…
16…
15
Authentication procedure and NAS security context handling for 5G
15.1
Authentication procedure for EAP-AKA'
15.2
Authentication procedure for 5G AKA
15
Authentication procedure and NAS security context handling for 5G
p. 333
15.1
Authentication procedure for EAP-AKA'
p. 333
15.1.1
Authentication procedure for EAP-AKA' - Authentication is successful
p. 333
15.1.1.1
Definition and applicability
p. 333
15.1.1.2
Conformance requirement
p. 333
15.1.1.3
Test purpose
p. 334
15.1.1.4
Method of test
p. 334
15.1.1.4.1
Initial conditions
p. 334
15.1.1.4.2
Procedure
p. 335
15.1.1.5
Acceptance criteria
p. 335
15.1.1A
Authentication procedure for EAP-AKA' - Authentication is successful
p. 337
15.1A.1.1
Definition and applicability
p. 337
15.1A.1.2
Conformance requirement
p. 337
15.1A.1.3
Test purpose
p. 337
15.1A.1.4
Method of test
p. 338
15.1A.1.4.1
Initial conditions
p. 338
15.1A.1.4.2
Procedure
p. 338
15.1A.1.5
Acceptance criteria
p. 339
15.1.2
Authentication procedure for EAP-AKA' - Authentication is successful - GSM UICC
p. 340
15.1.2.1
Definition and applicability
p. 340
15.1.2.2
Conformance requirement
p. 340
15.1.2.3
Test purpose
p. 340
15.1.2.4
Method of test
p. 341
15.1.2.4.1
Initial conditions
p. 341
15.1.2.4.2
Procedure
p. 341
15.1.2.5
Acceptance criteria
p. 342
15.1.3
Authentication procedure for EAP-AKA' - AUTN fails on the USIM
p. 342
15.1.3.1
Definition and applicability
p. 342
15.1.3.2
Conformance requirement
p. 342
15.1.3.3
Test purpose
p. 343
15.1.3.4
Method of test
p. 343
15.1.3.4.1
Initial conditions
p. 343
15.1.3.4.2
Procedure
p. 343
15.1.3.5
Acceptance criteria
p. 344
15.1.4
Authentication procedure for EAP-AKA' - after SUPI is changed
p. 344
15.1.4.1
Definition and applicability
p. 344
15.1.4.2
Conformance requirement
p. 344
15.1.4.3
Test purpose
p. 345
15.1.4.4
Method of test
p. 345
15.1.4.4.2
Procedure
p. 345
15.1.4.5
Acceptance criteria
p. 347
15.2
Authentication procedure for 5G AKA
p. 347
15.2.1
Authentication procedure for 5G AKA - Authentication is successful
p. 347
15.2.1.4
Method of test
p. 348
15.2.1.4.1
Initial conditions
p. 348
15.2.1.5
Acceptance criteria
p. 349
15.2A.1
Authentication procedure for 5G AKA - Authentication is successful
p. 350
15.2A.1.4
Method of test
p. 351
15.2A.1.4.1
Initial conditions
p. 351
15.2A.1.5
Acceptance criteria
p. 352
15.2.2
Authentication procedure for 5G AKA - Authentication is successful - GSM UICC
p. 353
15.2.2.1
Definition and applicability
p. 353
15.2.2.2
Conformance requirement
p. 353
15.2.2.3
Test purpose
p. 353
15.2.2.4
Method of test
p. 353
15.2.2.4.1
Initial conditions
p. 353
15.2.2.4.2
Procedure
p. 354
15.2.2.5
Acceptance criteria
p. 355
15.2A.2
Authentication procedure for 5G AKA - Authentication is successful
p. 355
15.2A.2.1
Definition and applicability
p. 355
15.2A.2.2
Conformance requirement
p. 355
15.2A.2.3
Test purpose
p. 355
15.2A.2.4
Method of test
p. 356
15.2A.2.4.1
Initial conditions
p. 356
15.2A.2.4.2
Procedure
p. 356
15.2A.2.5
Acceptance criteria
p. 357
15.2.3
Authentication procedure 5G AKA - AUTN fails on the USIM
p. 357
15.2.3.1
Definition and applicability
p. 357
15.2.3.2
Conformance requirement
p. 357
15.2.3.3
Test purpose
p. 358
15.2.3.4
Method of test
p. 358
15.2.3.4.1
Initial conditions
p. 358
15.2.3.4.2
Procedure
p. 358
15.2.3.5
Acceptance criteria
p. 359
15.2.4
Authentication procedure for 5G AKA - after SUPI is changed
p. 359
15.2.4.1
Definition and applicability
p. 359
15.2.4.2
Conformance requirement
p. 359
15.2.4.3
Test purpose
p. 360
15.2.4.4
Method of test
p. 360
15.2.4.4.1
Initial conditions
p. 360
15.2.4.4.2
Procedure
p. 360
15.2.4.5
Acceptance criteria
p. 361