Tech-
invite
3GPP
space
IETF
RFCs
SIP
index
N
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.220
Word version: 17.4.0
1…
4…
4.4…
4.5…
5…
B…
D…
I…
J…
M…
N…
M
GBA_Digest
M.1
General
M.2
Reference model
M.3
Network elements
M.4
Bootstrapping architecture and reference points
M.5
Requirements and principles for bootstrapping
M.6
Procedures
M.7
TLS Profile
M
(Normative) GBA_Digest
|R11|
p. 77
M.1
General
p. 77
M.2
Reference model
p. 77
M.3
Network elements
p. 78
M.3.1
Bootstrapping server function (BSF)
p. 78
M.3.2
Network application function (NAF)
p. 78
M.3.3
Zn-Proxy
p. 79
M.3.4
HSS
p. 79
M.3.5
UE
p. 80
M.3.6
SLF
p. 80
M.4
Bootstrapping architecture and reference points
p. 80
M.4.1
Reference point Ub
p. 80
M.4.2
Reference point Ua
p. 80
M.4.3
Reference point Zh
p. 80
M.4.4
Reference point Zn
p. 80
M.4.5
Reference point Dz
p. 80
M.5
Requirements and principles for bootstrapping
p. 81
M.5.1
General Requirements
p. 81
M.5.2
Access independence
p. 81
M.5.3
Authentication methods
p. 81
M.5.4
Roaming
p. 81
M.5.5
Requirements on reference point Ub
p. 82
M.5.6
Requirements on reference point Zh
p. 82
M.5.7
Requirements on reference point Zn
p. 82
M.5.8
Requirements on Bootstrapping Transaction Identifier
p. 84
M.5.9
Requirements on reference point Ua
p. 84
M.5.10
Requirements on reference point Dz
p. 84
M.5.11
Requirements on GBA keys and parameters handling
p. 84
M.6
Procedures
p. 84
M.6.1
General
p. 84
M.6.2
Initiation of bootstrapping
p. 84
M.6.3
Bootstrapping procedures
p. 85
M.6.4
Procedures using bootstrapped Security Association
p. 88
M.6.5
Procedure related to service discovery
p. 91
M.7
TLS Profile
p. 91
M.7.1
General
p. 91
M.7.2
Authentication of the BSF
p. 92
M.7.3
Authentication of the UE
p. 92
M.7.4
Set-up of Security parameters
p. 92