Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 24.379
Word version: 18.7.0
1…
4…
6…
6.3…
6.3.3…
6.4…
7…
9…
9A…
10…
10.1.2
10.1.3…
10.2…
10.2.3…
11…
11.1.5…
11.2…
11.2.3
12…
13…
15…
A…
F…
G…
I…
J…
6.4
Implicit floor request
6.5
Handling of MIME bodies in a SIP message
6.6
Confidentiality and Integrity Protection
6.6.1
General
6.6.2
Confidentiality Protection
6.6.3
Integrity Protection of XML documents
6.7
Priority sharing
6.8
Procedures at the MCPTT gateway
...
6.4
Implicit floor request
p. 161
6.5
Handling of MIME bodies in a SIP message
p. 163
6.6
Confidentiality and Integrity Protection
p. 163
6.6.1
General
p. 163
6.6.1.1
Applicability and exclusions
p. 163
6.6.1.2
Performing XML content encryption
p. 163
6.6.1.3
Performing integrity protection on an XML body
p. 164
6.6.1.4
Verifying integrity of an XML body and decrypting XML elements
p. 164
6.6.2
Confidentiality Protection
p. 164
6.6.2.1
General
p. 164
6.6.2.2
Keys used in confidentiality protection procedures
p. 164
6.6.2.3
Procedures for sending confidentiality protected content
p. 165
6.6.2.3.1
MCPTT client
p. 165
6.6.2.3.2
MCPTT server
p. 165
6.6.2.3.3
Content Encryption in XML elements
p. 166
6.6.2.3.4
Attribute URI Encryption
p. 166
6.6.2.4
Procedures for receiving confidentiality protected content
p. 166
6.6.2.4.1
Determination of confidentiality protected content
p. 166
6.6.2.4.2
Decrypting confidentiality protected content in XML elements
p. 166
6.6.2.4.3
Decrypting confidentiality protected URIs in XML attributes
p. 167
6.6.2.5
MCPTT server copying received XML content
p. 167
6.6.3
Integrity Protection of XML documents
p. 168
6.6.3.1
General
p. 168
6.6.3.2
Keys used in integrity protection procedures
p. 170
6.6.3.3
Sending integrity protected content
p. 171
6.6.3.3.1
MCPTT client
p. 171
6.6.3.3.2
MCPTT server
p. 171
6.6.3.3.3
Integrity protection procedure
p. 171
6.6.3.4
Receiving integrity protected content
p. 172
6.6.3.4.1
Determination of integrity protected content
p. 172
6.6.3.4.2
Verification of integrity protected content
p. 172
6.7
Priority sharing
p. 172
6.8
Procedures at the MCPTT gateway
p. 172
6.8.1
General
p. 172
6.8.2
MCPTT gateway server acting as an exit point from an MCPTT system
p. 173
6.8.3
MCPTT gateway server acting as an entry point in an MCPTT system
p. 173
6.8.4
Local policies enforcement
p. 174