Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.220
Word version: 17.2.0
1…
4…
4.4…
4.5…
5…
B…
D…
I…
J…
M…
N…
M
GBA_Digest
M.1
General
M.2
Reference model
M.3
Network elements
M.4
Bootstrapping architecture and reference points
M.5
Requirements and principles for bootstrapping
M.6
Procedures
M.7
TLS Profile
M
(Normative) GBA_Digest
|R11|
Word‑p. 77
M.1
General
Word‑p. 77
M.2
Reference model
Word‑p. 77
M.3
Network elements
Word‑p. 78
M.3.1
Bootstrapping server function (BSF)
Word‑p. 78
M.3.2
Network application function (NAF)
Word‑p. 78
M.3.3
Zn-Proxy
Word‑p. 79
M.3.4
HSS
Word‑p. 79
M.3.5
UE
Word‑p. 80
M.3.6
SLF
Word‑p. 80
M.4
Bootstrapping architecture and reference points
Word‑p. 80
M.4.1
Reference point Ub
Word‑p. 80
M.4.2
Reference point Ua
Word‑p. 80
M.4.3
Reference point Zh
Word‑p. 80
M.4.4
Reference point Zn
Word‑p. 80
M.4.5
Reference point Dz
Word‑p. 80
M.5
Requirements and principles for bootstrapping
Word‑p. 81
M.5.1
General Requirements
Word‑p. 81
M.5.2
Access independence
Word‑p. 81
M.5.3
Authentication methods
Word‑p. 81
M.5.4
Roaming
Word‑p. 81
M.5.5
Requirements on reference point Ub
Word‑p. 82
M.5.6
Requirements on reference point Zh
Word‑p. 82
M.5.7
Requirements on reference point Zn
Word‑p. 82
M.5.8
Requirements on Bootstrapping Transaction Identifier
Word‑p. 84
M.5.9
Requirements on reference point Ua
Word‑p. 84
M.5.10
Requirements on reference point Dz
Word‑p. 84
M.5.11
Requirements on GBA keys and parameters handling
Word‑p. 84
M.6
Procedures
Word‑p. 84
M.6.1
General
Word‑p. 84
M.6.2
Initiation of bootstrapping
Word‑p. 84
M.6.3
Bootstrapping procedures
Word‑p. 85
M.6.4
Procedures using bootstrapped Security Association
Word‑p. 88
M.6.5
Procedure related to service discovery
Word‑p. 91
M.7
TLS Profile
Word‑p. 91
M.7.1
General
Word‑p. 91
M.7.2
Authentication of the BSF
Word‑p. 92
M.7.3
Authentication of the UE
Word‑p. 92
M.7.4
Set-up of Security parameters
Word‑p. 92