Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 31.127
Word version: 17.2.0
0…
3…
5…
6…
7…
8…
9…
10…
11…
12…
13…
14…
15…
16…
15
Authentication procedure and NAS security context handling for 5G
15.1
Authentication procedure for EAP-AKA'
15.2
Authentication procedure for 5G AKA
15
Authentication procedure and NAS security context handling for 5G
p. 334
15.1
Authentication procedure for EAP-AKA'
p. 334
15.1.1
Authentication procedure for EAP-AKA' - Authentication is successful
p. 334
15.1.1.1
Definition and applicability
p. 334
15.1.1.2
Conformance requirement
p. 335
15.1.1.3
Test purpose
p. 335
15.1.1.4
Method of test
p. 336
15.1.1.4.1
Initial conditions
p. 336
15.1.1.4.2
Procedure
p. 336
15.1.1.5
Acceptance criteria
p. 337
15.1.1A
Authentication procedure for EAP-AKA' - Authentication is successful
p. 338
15.1A.1.1
Definition and applicability
p. 338
15.1A.1.2
Conformance requirement
p. 338
15.1A.1.3
Test purpose
p. 339
15.1A.1.4
Method of test
p. 339
15.1A.1.4.1
Initial conditions
p. 339
15.1A.1.4.2
Procedure
p. 339
15.1A.1.5
Acceptance criteria
p. 340
15.1.2
Authentication procedure for EAP-AKA' - Authentication is successful - GSM UICC
p. 341
15.1.2.1
Definition and applicability
p. 341
15.1.2.2
Conformance requirement
p. 341
15.1.2.3
Test purpose
p. 342
15.1.2.4
Method of test
p. 342
15.1.2.4.1
Initial conditions
p. 342
15.1.2.4.2
Procedure
p. 342
15.1.2.5
Acceptance criteria
p. 343
15.1.3
Authentication procedure for EAP-AKA' - AUTN fails on the USIM
p. 343
15.1.3.1
Definition and applicability
p. 343
15.1.3.2
Conformance requirement
p. 344
15.1.3.3
Test purpose
p. 344
15.1.3.4
Method of test
p. 344
15.1.3.4.1
Initial conditions
p. 344
15.1.3.4.2
Procedure
p. 344
15.1.3.5
Acceptance criteria
p. 345
15.1.4
Authentication procedure for EAP-AKA' - after SUPI is changed
p. 345
15.1.4.1
Definition and applicability
p. 345
15.1.4.2
Conformance requirement
p. 346
15.1.4.3
Test purpose
p. 346
15.1.4.4
Method of test
p. 346
15.1.4.4.2
Procedure
p. 346
15.1.4.5
Acceptance criteria
p. 348
15.2
Authentication procedure for 5G AKA
p. 348
15.2.1
Authentication procedure for 5G AKA - Authentication is successful
p. 348
15.2.1.4
Method of test
p. 349
15.2.1.4.1
Initial conditions
p. 349
15.2.1.5
Acceptance criteria
p. 350
15.2A.1
Authentication procedure for 5G AKA - Authentication is successful
p. 351
15.2A.1.4
Method of test
p. 352
15.2A.1.4.1
Initial conditions
p. 352
15.2A.1.5
Acceptance criteria
p. 353
15.2.2
Authentication procedure for 5G AKA - Authentication is successful - GSM UICC
p. 354
15.2.2.1
Definition and applicability
p. 354
15.2.2.2
Conformance requirement
p. 354
15.2.2.3
Test purpose
p. 355
15.2.2.4
Method of test
p. 355
15.2.2.4.1
Initial conditions
p. 355
15.2.2.4.2
Procedure
p. 355
15.2.2.5
Acceptance criteria
p. 356
15.2A.2
Authentication procedure for 5G AKA - Authentication is successful
p. 356
15.2A.2.1
Definition and applicability
p. 356
15.2A.2.2
Conformance requirement
p. 357
15.2A.2.3
Test purpose
p. 357
15.2A.2.4
Method of test
p. 357
15.2A.2.4.1
Initial conditions
p. 357
15.2A.2.4.2
Procedure
p. 357
15.2A.2.5
Acceptance criteria
p. 358
15.2.3
Authentication procedure 5G AKA - AUTN fails on the USIM
p. 358
15.2.3.1
Definition and applicability
p. 358
15.2.3.2
Conformance requirement
p. 359
15.2.3.3
Test purpose
p. 359
15.2.3.4
Method of test
p. 359
15.2.3.4.1
Initial conditions
p. 359
15.2.3.4.2
Procedure
p. 359
15.2.3.5
Acceptance criteria
p. 360
15.2.4
Authentication procedure for 5G AKA - after SUPI is changed
p. 361
15.2.4.1
Definition and applicability
p. 361
15.2.4.2
Conformance requirement
p. 361
15.2.4.3
Test purpose
p. 361
15.2.4.4
Method of test
p. 361
15.2.4.4.1
Initial conditions
p. 361
15.2.4.4.2
Procedure
p. 362
15.2.4.5
Acceptance criteria
p. 363
15.2.5.2
Conformance requirement
p. 364
15.2.5.4
Method of test
p. 365
15.2.5.4.1
Initial conditions
p. 365
15.2.5.4.2
Procedure
p. 365
15.2.5.5
Acceptance criteria
p. 366