6 Diameter application for Cx interface

29.2293GPPCx and Dx interfaces based on the Diameter protocolProtocol detailsRelease 17TS

This clause specifies a Diameter application that allows a Diameter Multimedia server and a Diameter Multimedia client:

– to exchange location information

– to authorize a user to access the IMS

– to exchange authentication information

– to download and handle changes in the user data stored in the server

The Cx interface protocol is defined as an IETF vendor specific Diameter application, where the vendor is 3GPP. The vendor identifier assigned by IANA to 3GPP (http://www.iana.org/assignments/enterprise-numbers) is 10415.

The Diameter application identifier assigned to the Cx/Dx interface application is 16777216 (allocated by IANA).

6.1 Command-Code values

This clause defines Command-Code values for this Diameter application.

Every command is defined by means of the ABNF syntax IETF RFC 2234 [7], according to the Command Code Format (CCF) specification defined in IETF RFC 6733 [28]. Whenever the definition and use of an AVP is not specified in this document, what is stated in IETF RFC 6733 [28] shall apply.

NOTE: As the Diameter commands described in this specification have been defined based on the former specification of the Diameter base protocol, the Vendor-Specific-Application-Id AVP is still listed as a required AVP (an AVP indicated as {AVP}) in the command code format specifications defined in this specification to avoid backward compatibility issues, even if the use of this AVP has been deprecated in the new specification of the Diameter base protocol (IETF RFC 6733 [28]).

The command codes for the Cx/Dx interface application are taken from the range allocated by IANA in IETF RFC 3589 [12] as assigned in this specification. For these commands, the Application-ID field shall be set to 16777216 (application identifier of the Cx/Dx interface application, allocated by IANA).

The following Command Codes are defined in this specification:

Table 6.1.1: Command-Code values

Command-Name

Abbreviation

Code

Clause

User-Authorization-Request

UAR

300

6.1.1

User-Authorization-Answer

UAA

300

6.1.2

Server-Assignment-Request

SAR

301

6.1.3

Server-Assignment-Answer

SAA

301

6.1.4

Location-Info-Request

LIR

302

6.1.5

Location-Info-Answer

LIA

302

6.1.6

Multimedia-Auth-Request

MAR

303

6.1.7

Multimedia-Auth-Answer

MAA

303

6.1.8

Registration-Termination-Request

RTR

304

6.1.9

Registration-Termination-Answer

RTA

304

6.1.10

Push-Profile-Request

PPR

305

6.1.11

Push-Profile-Answer

PPA

305

6.1.12

6.1.1 User-Authorization-Request (UAR) Command

The User-Authorization-Request (UAR) command, indicated by the Command-Code field set to 300 and the ‘R’ bit set in the Command Flags field, is sent by a Diameter Multimedia client to a Diameter Multimedia server in order to request the authorization of the registration of a multimedia user.

Message Format

< User-Authorization-Request> ::= < Diameter Header: 300, REQ, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

[ Destination-Host ]

{ Destination-Realm }

{ User-Name }

[ OC-Supported-Features ]

*[ Supported-Features ]

{ Public-Identity }

{ Visited-Network-Identifier }

[ User-Authorization-Type ]

[ UAR-Flags ]

*[ AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.2 User-Authorization-Answer (UAA) Command

The User-Authorization-Answer (UAA) command, indicated by the Command-Code field set to 300 and the ‘R’ bit cleared in the Command Flags field, is sent by a server in response to the User-Authorization-Request command. The Experimental-Result AVP may contain one of the values defined in clause 6.2.

Message Format

< User-Authorization-Answer> ::= < Diameter Header: 300, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

[ Result-Code ]

[ Experimental-Result ]

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

[ OC-Supported-Features ]

[ OC-OLR ]

*[ Load ]

*[ Supported-Features ]

[ Server-Name ]

[ Server-Capabilities ]

*[ AVP ]

[ Failed-AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.3 Server-Assignment-Request (SAR) Command

The Server-Assignment-Request (SAR) command, indicated by the Command-Code field set to 301 and the ‘R’ bit set in the Command Flags field, is sent by a Diameter Multimedia client to a Diameter Multimedia server in order to request it to store the name of the server that is currently serving the user.

Message Format

<Server-Assignment-Request> ::= < Diameter Header: 301, REQ, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

[ Destination-Host ]

{ Destination-Realm }

[ User-Name ]

[ OC-Supported-Features ]

*[ Supported-Features ]

*[ Public-Identity ]

[ Wildcarded-Public-Identity ]

{ Server-Name }

{ Server-Assignment-Type }

{ User-Data-Already-Available }

[ SCSCF-Restoration-Info ]

[ Multiple-Registration-Indication ]

[ Session-Priority ]

[ SAR-Flags ]

[ Failed-PCSCF ]

*[ AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.4 Server-Assignment-Answer (SAA) Command

The Server-Assignment-Answer (SAA) command, indicated by the Command-Code field set to 301 and the ‘R’ bit cleared in the Command Flags field, is sent by a server in response to the Server-Assignment-Request command. The Experimental-Result AVP may contain one of the values defined in clause 6.2. If Result-Code or Experimental-Result does not inform about an error, the User-Data AVP shall contain the information that the S-CSCF needs to give service to the user.

Message Format

<Server-Assignment-Answer> ::= < Diameter Header: 301, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

[ Result-Code ]

[ Experimental-Result ]

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

[ User-Name ]

[ OC-Supported-Features ]

[ OC-OLR ]

*[ Load ]

*[ Supported-Features ]

[ User-Data ]

[ Charging-Information ]

[ Associated-Identities ]

[ Loose-Route-Indication ]

*[ SCSCF-Restoration-Info ]

[ Associated-Registered-Identities ]

[ Server-Name ]

[ Wildcarded-Public-Identity ]

[ Priviledged-Sender-Indication ]

[ Allowed-WAF-WWSF-Identities ]

*[ AVP ]

[ Failed-AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.5 Location-Info-Request (LIR) Command

The Location-Info-Request (LIR) command, indicated by the Command-Code field set to 302 and the ‘R’ bit set in the Command Flags field, is sent by a Diameter Multimedia client to a Diameter Multimedia server in order to request name of the server that is currently serving the user.

Message Format

<Location-Info-Request> ::= < Diameter Header: 302, REQ, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

[ Destination-Host ]

{ Destination-Realm }

[ Originating-Request ]

[ OC-Supported-Features ]

*[ Supported-Features ]

{ Public-Identity }

[ User-Authorization-Type ]

[ Session-Priority ]

*[ AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.6 Location-Info-Answer (LIA) Command

The Location-Info-Answer (LIA) command, indicated by the Command-Code field set to 302 and the ‘R’ bit cleared in the Command Flags field, is sent by a server in response to the Location-Info-Request command. The Experimental-Result AVP may contain one of the values defined in clause 6.2.

Message Format

<Location-Info-Answer> ::= < Diameter Header: 302, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

[ Result-Code ]

[ Experimental-Result ]

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

[ OC-Supported-Features ]

[ OC-OLR ]

*[ Load ]

*[ Supported-Features ]

[ Server-Name ]

[ Server-Capabilities ]

[ Wildcarded-Public-Identity ]

[ LIA-Flags ]

*[ AVP ]

[ Failed-AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.7 Multimedia-Auth-Request (MAR) Command

The Multimedia-Auth-Request (MAR) command, indicated by the Command-Code field set to 303 and the ‘R’ bit set in the Command Flags field, is sent by a Diameter Multimedia client to a Diameter Multimedia server in order to request security information.

Message Format

< Multimedia-Auth-Request > ::= < Diameter Header: 303, REQ, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

{ Destination-Realm }

[ Destination-Host ]

{ User-Name }

[ OC-Supported-Features ]

*[ Supported-Features ]

{ Public-Identity }

{ SIP-Auth-Data-Item }

{ SIP-Number-Auth-Items }

{ Server-Name }

*[ AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.8 Multimedia-Auth-Answer (MAA) Command

The Multimedia-Auth-Answer (MAA) command, indicated by the Command-Code field set to 303 and the ‘R’ bit cleared in the Command Flags field, is sent by a server in response to the Multimedia-Auth-Request command. The Experimental-Result AVP may contain one of the values defined in clause 6.2.

Message Format

< Multimedia-Auth-Answer > ::= < Diameter Header: 303, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

[ Result-Code ]

[ Experimental-Result ]

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

[ User-Name ]

[ OC-Supported-Features ]

[ OC-OLR ]

*[ Load ]

*[ Supported-Features ]

[ Public-Identity ]

[ SIP-Number-Auth-Items ]

*[SIP-Auth-Data-Item ]

*[ AVP ]

[ Failed-AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.9 Registration-Termination-Request (RTR) Command

The Registration-Termination-Request (RTR) command, indicated by the Command-Code field set to 304 and the ‘R’ bit set in the Command Flags field, is sent by a Diameter Multimedia server to a Diameter Multimedia client in order to request the de-registration of a user.

Message Format

<Registration-Termination-Request> ::= < Diameter Header: 304, REQ, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

{ Destination-Realm }

{ User-Name }

[ Associated-Identities ]

*[ Supported-Features ]

*[ Public-Identity ]

{ Deregistration-Reason }

RTR-Flags ]

*[ AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.10 Registration-Termination-Answer (RTA) Command

The Registration-Termination-Answer (RTA) command, indicated by the Command-Code field set to 304 and the ‘R’ bit cleared in the Command Flags field, is sent by a client in response to the Registration-Termination-Request command. The Experimental-Result AVP may contain one of the values defined in clause 6.2.

Message Format

<Registration-Termination-Answer> ::= < Diameter Header: 304, PXY, 16777216 >

< Session-Id >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

[ Result-Code ]

[ Experimental-Result ]

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

[ Associated-Identities ]

*[ Supported-Features ]

*[ Identity-with-Emergency-Registration ]

*[ AVP ]

[ Failed-AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.11 Push-Profile-Request (PPR) Command

The Push-Profile-Request (PPR) command, indicated by the Command-Code field set to 305 and the ‘R’ bit set in the Command Flags field, is sent by a Diameter Multimedia server to a Diameter Multimedia client in order to update the subscription data and for SIP Digest authentication the authentication data of a multimedia user in the Diameter Multimedia client whenever a modification has occurred in the subscription data or digest password that constitutes the data used by the client.

Message Format

< Push-Profile-Request > ::= < Diameter Header: 305, REQ, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

{ Destination-Host }

{ Destination-Realm }

{ User-Name }

*[ Supported-Features ]

[ User-Data ]

[ Charging-Information ]

[ SIP-Auth-Data-Item ]

[ Allowed-WAF-WWSF-Identities ]

*[ AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.1.12 Push-Profile-Answer (PPA) Command

The Push-Profile-Answer (PPA) command, indicated by the Command-Code field set to 305 and the ‘R’ bit cleared in the Command Flags field, is sent by a client in response to the Push-Profile-Request command. The Experimental-Result AVP may contain one of the values defined in clause 6.2.

Message Format

< Push-Profile-Answer > ::= < Diameter Header: 305, PXY, 16777216 >

< Session-Id >

[ DRMP ]

{ Vendor-Specific-Application-Id }

[Result-Code ]

[ Experimental-Result ]

{ Auth-Session-State }

{ Origin-Host }

{ Origin-Realm }

*[ Supported-Features ]

*[ AVP ]

[ Failed-AVP ]

*[ Proxy-Info ]

*[ Route-Record ]

6.2 Result-Code AVP values

This clause defines new result code values that must be supported by all Diameter implementations that conform to this specification. When one of the result codes defined here is included in a response, it shall be inside an Experimental-Result AVP and Result-Code AVP shall be absent.

6.2.1 Success

Result codes that fall within the Success category are used to inform a peer that a request has been successfully completed.

6.2.1.1 DIAMETER_FIRST_REGISTRATION (2001)

The HSS informs the I-CSCF that:

– The user is authorized to register this public identity;

– A S-CSCF shall be assigned to the user.

6.2.1.2 DIAMETER_SUBSEQUENT_REGISTRATION (2002)

The HSS informs the I-CSCF that:

– The user is authorized to register this public identity;

– A S-CSCF is already assigned and there is no need to select a new one.

6.2.1.3 DIAMETER_UNREGISTERED_SERVICE (2003)

The HSS informs the I-CSCF that:

– The public identity is not registered but has services related to unregistered state;

– A S-CSCF shall be assigned to the user.

6.2.1.4 DIAMETER_SUCCESS_SERVER_NAME_NOT_STORED (2004)

The HSS informs to the S-CSCF that:

– The de-registration is completed;

– The S-CSCF name is not stored in the HSS.

6.2.1.5 Void

6.2.2 Permanent Failures

Errors that fall within the Permanent Failures category are used to inform the peer that the request failed, and should not be attempted again.

6.2.2.1 DIAMETER_ERROR_USER_UNKNOWN (5001)

A message was received for a user or a wildcarded identity that is unknown.

6.2.2.2 DIAMETER_ERROR_IDENTITIES_DONT_MATCH (5002)

A message was received with a public identity and a private identity for a user, and the server determines that the public identity does not correspond to the private identity.

6.2.2.3 DIAMETER_ERROR_IDENTITY_NOT_REGISTERED (5003)

A query for location information is received for a public identity that has not been registered before. The user to which this identity belongs cannot be given service in this situation.

6.2.2.4 DIAMETER_ERROR_ROAMING_NOT_ALLOWED (5004)

The user is not allowed to roam in the visited network.

6.2.2.5 DIAMETER_ERROR_IDENTITY_ALREADY_REGISTERED (5005)

The identity has already a server assigned and the registration status does not allow that it is overwritten.

6.2.2.6 DIAMETER_ERROR_AUTH_SCHEME_NOT_SUPPORTED (5006)

The authentication scheme indicated in an authentication request is not supported.

6.2.2.7 DIAMETER_ERROR_IN_ASSIGNMENT_TYPE (5007)

The identity being registered has already the same server assigned and the registration status does not allow the server assignment type or the Public Identity type received in the request is not allowed for the indicated server-assignment-type.

6.2.2.8 DIAMETER_ERROR_TOO_MUCH_DATA (5008)

The volume of the data pushed to the receiving entity exceeds its capacity.

NOTE: This error code is also used in 3GPP TS 29.329 [11].

6.2.2.9 DIAMETER_ERROR_NOT_SUPPORTED_USER_DATA (5009)

The S-CSCF informs HSS that the received subscription data contained information, which was not recognised or supported.

6.2.2.10 Void

6.2.2.11 DIAMETER_ERROR_FEATURE_UNSUPPORTED (5011)

A request application message was received indicating that the origin host requests that the command pair would be handled using a feature which is not supported by the destination host.

6.2.2.12 DIAMETER_ERROR_SERVING_NODE_FEATURE_UNSUPPORTED (5012)

This error is used when the HSS supports the P-CSCF-Restoration-mechanism feature, but none of the user serving node(s) supports it, as described by 3GPP TS 23.380 [24] clause 5.4.

6.3 AVPs

6.3.0 General

The following table describes the Diameter AVPs defined by 3GPP for the Cx interface protocol, their AVP Code values, types, possible flag values and whether or not the AVP may be encrypted. The Vendor-ID header of all AVPs defined in this specification shall be set to 3GPP (10415) if not otherwise indicated.

Table 6.3.0.1: Diameter Multimedia Application AVPs

AVP Flag rules

Attribute Name

AVP Code

Clause defined

Value Type

Must

May

Should not

Must not

May Encr.

Visited-Network-Identifier

600

6.3.1

OctetString

M, V

No

Public-Identity

601

6.3.2

UTF8String

M, V

No

Server-Name

602

6.3.3

UTF8String

M, V

No

Server-Capabilities

603

6.3.4

Grouped

M, V

No

Mandatory-Capability

604

6.3.5

Unsigned32

M, V

No

Optional-Capability

605

6.3.6

Unsigned32

M, V

No

User-Data

606

6.3.7

OctetString

M, V

No

SIP-Number-Auth-Items

607

6.3.8

Unsigned32

M, V

No

SIP-Authentication-Scheme

608

6.3.9

UTF8String

M, V

No

SIP-Authenticate

609

6.3.10

OctetString

M, V

No

SIP-Authorization

610

6.3.11

OctetString

M, V

No

SIP-Authentication-Context

611

6.3.12

OctetString

M, V

No

SIP-Auth-Data-Item

612

6.3.13

Grouped

M, V

No

SIP-Item-Number

613

6.3.14

Unsigned32

M, V

No

Server-Assignment-Type

614

6.3.15

Enumerated

M, V

No

Deregistration-Reason

615

6.3.16

Grouped

M, V

No

Reason-Code

616

6.3.17

Enumerated

M, V

No

Reason-Info

617

6.3.18

UTF8String

M, V

No

Charging-Information

618

6.3.19

Grouped

M, V

No

Primary-Event-Charging-Function-Name

619

6.3.20

DiameterURI

M, V

No

Secondary-Event-Charging-Function-Name

620

6.3.21

DiameterURI

M, V

No

Primary-Charging-Collection-Function-Name

621

6.3.22

DiameterURI

M, V

No

Secondary-Charging-Collection-Function-Name

622

6.3.23

DiameterURI

M, V

No

User-Authorization-Type

623

6.3.24

Enumerated

M, V

No

User-Data-Already-Available

624

6.3.26

Enumerated

M, V

No

Confidentiality-Key

625

6.3.27

OctetString

M, V

No

Integrity-Key

626

6.3.28

OctetString

M, V

No

Supported-Features

628

6.3.29

Grouped

V

M

No

Feature-List-ID

629

6.3.30

Unsigned32

V

M

No

Feature-List

630

6.3.31

Unsigned32

V

M

No

Supported-Applications

631

6.3.32

Grouped

V

M

No

Associated-Identities

632

6.3.33

Grouped

V

M

No

Originating-Request

633

6.3.34

Enumerated

M,V

No

Wildcarded-Public-Identity

634

6.3.35

UTF8String

V

M

No

SIP-Digest-Authenticate

635

6.3.36

Grouped

V

M

No

Digest-Realm

104

NOTE 3

6.3.37

UTF8String

M

V

No

Digest-Algorithm

111

NOTE 3

6.3.39

UTF8String

M

V

No

Digest-QoP

110

NOTE 3

6.3.40

UTF8String

M

V

No

Digest-HA1

121

NOTE 3

6.3.41

UTF8String

M

V

No

UAR-Flags

637

6.3.44

Unsigned32

V

M

No

Loose-Route-Indication

638

6.3.45

Enumerated

V

M

No

SCSCF-Restoration-Info

639

6.3.46

Grouped

V

M

No

Path

640

6.3.47

OctetString

V

M

No

Contact

641

6.3.48

OctetString

V

M

No

Subscription-Info

642

6.3.49

Grouped

V

M

No

Call-ID-SIP-Header

643

6.3.49.1

OctetString

V

M

No

From-SIP-Header

644

6.3.49.2

OctetString

V

M

No

To-SIP-Header

645

6.3.49.3

OctetString

V

M

No

Record-Route

646

6.3.49.4

OctetString

V

M

No

Associated-Registered-Identities

647

6.3.50

Grouped

V

M

No

Multiple-Registration-Indication

648

6.3.51

Enumerated

V

M

No

Restoration-Info

649

6.3.52

Grouped

V

M

No

Session-Priority

650

6.3.56

Enumerated

V

M

No

Identity-with-Emergency-Registration

651

6.3.57

Grouped

V

M

No

Priviledged-Sender-Indication

652

6.3.58

Enumerated

V

M

No

LIA-Flags

653

6.3.59

Unsigned32

V

M

No

OC-Supported-Features

621

NOTE 4

6.3.60

Grouped

M, V

No

OC-OLR

623

NOTE 4

6.3.61

Grouped

M, V

No

Initial-CSeq-Sequence-Number

654

6.3.62

Unsigned32

V

M

No

SAR-Flags

655

6.3.63

Unsigned32

V

M

No

Allowed-WAF-WWSF-Identities

656

6.3.64

Grouped

V

M

No

WebRTC-Authentication-Function-Name

657

6.3.65

UTF8String

V

M

No

WebRTC-Web-Server-Function-Name

658

6.3.66

UTF8String

V

M

No

DRMP

301

NOTE 5

6.3.67

Enumerated

M, V

No

Load

NOTE 6

6.3.68

Grouped

M, V

No

RTR-Flags

659

6.3.69

Unsigned32

V

M

No

P-CSCF-Subscription-Info

660

6.3.70

Grouped

V

M

No

Registration-Time-Out

661

6.3.71

Time

V

M

No

Alternate-Digest-Algorithm

662

NOTE 7

6.3.72

UTF8String

V

M

No

Alternate-Digest-HA1

663

NOTE 7

6.3.73

UTF8String

V

M

No

Failed-PCSCF

664

6.3.74

Grouped

V

M

No

PCSCF-FQDN

665

6.3.75

DiameterIdentity

V

M

No

PCSCF-IP-Address

666

6.3.76

Address

V

M

No

NOTE 1: The AVP header bit denoted as ‘M’, indicates whether support of the AVP is required. The AVP header bit denoted as ‘V’, indicates whether the optional Vendor-ID field is present in the AVP header. For further details, see IETF RFC 6733 [28].

NOTE 1a: If the M-bit is set for an AVP and the receiver does not understand the AVP, it shall return a rejection. If the M-bit is not set for an AVP, the receiver shall not return a rejection, whether or not it understands the AVP. If the receiver understands the AVP but the M-bit value does not match with the definition in this table, the receiver shall ignore the M-bit.

NOTE 2: Depending on the concrete command.

NOTE 3: The value of these attributes is defined in IETF RFC 4590 [20].

NOTE 4: The value of these attributes is defined in IETF RFC 7683 [23].

NOTE 5: The value of this attribute is defined in IETF RFC 7944 [26].

NOTE 6: The value of this attribute is defined in IEFT RFC 8583 [27].

NOTE 7: The Alternate-Digest-HA1 AVP is defined in the same way as Digest-HA1 AVP in accordance with IETF RFC 7616 [29]. If the Alternate-Digest-HA1 AVP is present, the Digest-HA1 AVP shall also be present and the Digest-HA1 AVP shall contain the MD5 hash. The algorithm of the Alternate-Digest-HA1 AVP shall be determined by the Alternate-Digest-Algorithm AVP.

6.3.1 Visited-Network-Identifier AVP

The Visited-Network-Identifier AVP is of type OctetString. This AVP contains an identifier that helps the HSS to identify the visited network (e.g. the visited network domain name). Coding of octets is H-PLMN operator specific. The I-CSCF maps a received P-Visited-Network-ID onto an Octet String value that is consistently configured in I-CSCF and HSS to uniquely identify the visited network.

6.3.2 Public-Identity AVP

The Public-Identity AVP is of type UTF8String. This AVP contains the public identity of a user in the IMS. The syntax of this AVP corresponds either to a SIP URL (with the format defined in IETF RFC 3261 [3] and IETF RFC 2396 [4]) or a TEL URL (with the format defined in IETF RFC 3966 [8]). Both SIP URL and TEL URL shall be in canonical form, as described in 3GPP TS 23.003 [13].

6.3.3 Server-Name AVP

The Server-Name AVP is of type UTF8String. This AVP contains a SIP-URL (as defined in IETF RFC 3261 [3] and IETF RFC 2396 [4]), used to identify a SIP server (e.g. S-CSCF name).

6.3.4 Server-Capabilities AVP

The Server-Capabilities AVP is of type Grouped. This AVP contains information to assist the I-CSCF in the selection of an S-CSCF.

AVP format

Server-Capabilities ::= <AVP header: 603 10415>

*[Mandatory-Capability]

*[Optional-Capability]

*[Server-Name]

*[AVP]

6.3.5 Mandatory-Capability AVP

The Mandatory-Capability AVP is of type Unsigned32. Each value included in this AVP can be used to represent a single determined mandatory capability or a set of capabilities of an S-CSCF, as described in 3GPP TS 29.228 [1] (clause 6.7).

6.3.6 Optional-Capability AVP

The Optional-Capability AVP is of type Unsigned32. Each value included in this AVP can be used to represent a single determined optional capability or a set of capabilities of an S-CSCF, as described in 3GPP TS 29.228 [1] (clause 6.7).

6.3.7 User-Data AVP

The User-Data AVP is of type OctetString. This AVP contains the user data required to give service to a user. The exact content and format of this AVP is described in 3GPP TS 29.228 [1].

6.3.8 SIP-Number-Auth-Items AVP

The SIP-Number-Auth-Items AVP is of type Unsigned32.

When used in a request, the SIP-Number-Auth-Items indicates the number of authentication vectors the S-CSCF is requesting. This can be used, for instance, when the client is requesting several pre-calculated authentication vectors. In the answer message, the SIP-Number-Auth-Items AVP indicates the actual number of SIP-Auth-Data-Item AVPs provided by the Diameter server.

6.3.9 SIP-Authentication-Scheme AVP

The Authentication-Scheme AVP is of type UTF8String and indicates the authentication scheme used in the authentication of SIP messages. The following values are defined:

– "Digest-AKAv1-MD5": it indicates IMS-AKA authentication scheme.

NOTE 1: The S-CSCF uses the "Digest-AKAv1-MD5" authentication scheme towards the HSS for Digest-AKAv1 and Digest-AKAv2 versions. E.g. digest algorithms "AKAv1-MD5" and "AKAv2-SHA-256" require from the HSS the same procedures i.e. the same authentication information: random number RAND, authentication token AUTN, expected response XRES, cipher key CK and integrity key IK.

NOTE 2: The "AKAv1-MD5" digest AKA algorithm is only supported for backward compatibility.

– "SIP Digest": it indicates SIP Digest authentication scheme.

– "NASS-Bundled": it indicates NASS Bundled authentication scheme.

– "Early‑IMS‑Security": it indicates GPRS-IMS-Bundled authentication scheme.

– "Unknown": it indicates that the authentication scheme to be used is unknown at this point.

6.3.10 SIP-Authenticate AVP

The SIP-Authenticate AVP is of type OctetString and contains specific parts of the data portion of the WWW-Authenticate or Proxy-Authenticate SIP headers that are to be present in a SIP response.

It shall contain, binary encoded, the concatenation of the authentication challenge RAND and the token AUTN. See 3GPP TS 33.203 [3] for further details about RAND and AUTN. The Authentication Information has a fixed length of 32 octets; the 16 most significant octets shall contain the RAND, the 16 least significant octets shall contain the AUTN.

6.3.11 SIP-Authorization AVP

The SIP-Authorization AVP is of type OctetString and contains specific parts of the data portion of the Authorization or Proxy-Authorization SIP headers suitable for inclusion in a SIP request.

When included in an Authentication Request, it shall contain the concatenation of RAND, as sent to the terminal, and AUTS, as received from the terminal. RAND and AUTS shall both be binary encoded. See 3GPP TS 33.203 [3] for further details about RAND and AUTS. The Authorization Information has a fixed length of 30 octets; the 16 most significant octets shall contain the RAND, the 14 least significant octets shall contain the AUTS.

When included in an Authentication Request Response, it shall contain, binary encoded, the expected response XRES. See 3GPP TS 33.203 [3] for further details about XRES.

6.3.12 SIP-Authentication-Context AVP

The SIP-Authentication-Context AVP is of type OctectString.

6.3.13 SIP-Auth-Data-Item AVP

The SIP-Auth-Data-Item is of type Grouped, and contains the authentication and/or authorization information for the Diameter client.

AVP format

SIP-Auth-Data-Item :: = < AVP Header : 612 10415 >

[ SIP-Item-Number ]

[ SIP-Authentication-Scheme ]

[ SIP-Authenticate ]

[ SIP-Authorization ]

[ SIP-Authentication-Context ]

[ Confidentiality-Key ]

[ Integrity-Key ]

[ SIP-Digest-Authenticate ]

[ Framed-IP-Address ]

[ Framed-IPv6-Prefix ]

[ Framed-Interface-Id ]

* [ Line-Identifier ]

* [AVP]

6.3.14 SIP-Item-Number AVP

The SIP-Item-Number AVP is of type Unsigned32.

6.3.15 Server-Assignment-Type AVP

The Server-Assignment-Type AVP is of type Enumerated, and indicates the type of server update, request or notification being performed in a Server-Assignment-Request operation. The following values are defined:

NO_ASSIGNMENT (0)

This value is used to request from HSS the user profile assigned to one or more public identities and to retrieve the S-CSCF restoration information for a registered Public User Identity, without affecting the registration state of those identities.

REGISTRATION (1)

The request is generated as a consequence of a first registration of an identity.

RE_REGISTRATION (2)

The request corresponds to the re-registration of an identity or update of the S-CSCF Restoration Information.

UNREGISTERED_USER (3)

The request is generated in the following cases:

– The S-CSCF received a request for a Public Identity that is not registered, or

– An AS sent an originating request on behalf of a Public Identity that is not registered, or

– The S-CSCF identified a P-CSCF failure for a Public User Identity that is registered with only one Private User Identity and started the P-CSCF Restoration procedure including the P-CSCF Restoration Indication in the request to the HSS.

TIMEOUT_DEREGISTRATION (4)

The SIP registration timer of an identity has expired.

USER_DEREGISTRATION (5)

The S-CSCF has received a user initiated de-registration request.

TIMEOUT_DEREGISTRATION_STORE_SERVER_NAME (6)

The request is generated in the following cases:

The SIP registration timer of an identity has expired. The S-CSCF keeps the user data stored in the S-CSCF and requests HSS to store the S-CSCF name.

The S-CSCF identified a P-CSCF failure for a Public User Identity that is registered with only one Private User Identity and started the PCRF-based P-CSCF Restoration procedure.

USER_DEREGISTRATION_STORE_SERVER_NAME (7)

The S-CSCF has received a user initiated de-registration request. The S-CSCF keeps the user data stored in the S-CSCF and requests HSS to store the S-CSCF name.

ADMINISTRATIVE_DEREGISTRATION (8)

The request is generated in the following cases:

– The S-CSCF, due to administrative reasons or network issues, has performed the de-registration of an identity.

– The S-CSCF identified a P-CSCF failure for a Public User Identity that is registered with more than one Private User Identity and started the P-CSCF Restoration procedure including the P-CSCF Restoration Indication in the request to the HSS.

The S-CSCF identified a P-CSCF failure for a Public User Identity that is registered with more than one Private User Identity and started the PCRF-based P-CSCF Restoration procedure.

AUTHENTICATION_FAILURE (9)

The authentication of a user has failed.

AUTHENTICATION_TIMEOUT (10)

The authentication timeout has occurred.

DEREGISTRATION_TOO_MUCH_DATA (11)

The S-CSCF has requested user profile information from the HSS and has received a volume of data higher than it can accept.

AAA_USER_DATA_REQUEST (12)

Used in the SWx protocol, defined in 3GPP TS 29.273 [18]. This value is not used in the Cx protocol.

PGW_UPDATE (13)

Used in the SWx protocol, defined in 3GPP TS 29.273 [18]. This value is not used in the Cx protocol.

RESTORATION (14)

Used in the SWx protocol, defined in 3GPP TS 29.273 [18]. This value is not used in the Cx protocol.

6.3.16 Deregistration-Reason AVP

The Deregistration-Reason AVP is of type Grouped, and indicates the reason for a de-registration operation.

AVP format

Deregistration-Reason :: = < AVP Header : 615 10415 >

{ Reason-Code }

[ Reason-Info ]

* [AVP]

6.3.17 Reason-Code AVP

The Reason-Code AVP is of type Enumerated, and defines the reason for the network initiated de-registration. The following values are defined:

PERMANENT_TERMINATION (0)

NEW_SERVER_ASSIGNED (1)

SERVER_CHANGE (2)

REMOVE_S-CSCF (3)

The detailed behaviour of the S-CSCF is defined in 3GPP TS 29.228 [1].

6.3.18 Reason-Info AVP

The Reason-Info AVP is of type UTF8String, and contains textual information to inform the user about the reason for a de-registration.

6.3.19 Charging-Information AVP

The Charging-Information is of type Grouped, and contains the addresses of the charging functions.

AVP format

Charging-Information :: = < AVP Header : 618 10415 >

[ Primary-Event-Charging-Function-Name ]

[ Secondary-Event-Charging-Function-Name ]

[ Primary-Charging-Collection-Function-Name ]

[ Secondary-Charging-Collection-Function-Name ]

*[ AVP]

6.3.20 Primary-Event-Charging-Function-Name AVP

The Primary-Event-Charging-Function-Name AVP is of type DiameterURI. This AVP contains the address of the Primary Online Charging Function. The receiving network element shall extract the FQDN of the DiameterURI in this AVP and may use it as content of the Destination-Host AVP for the Diameter accounting requests. The parent domain of the FQDN in the DiameterURI shall be used as Destination-Realm. The number of labels used for the Destination-Realm shall be determined before the Charging Information is provisioned and may be a configuration option.

NOTE: A FQDN is an absolute domain name including a subdomain and its parent domain. The subdomain and the parent domain contain one or more labels separated by dots.

6.3.21 Secondary-Event-Charging-Function-Name AVP

The Secondary-Event-Charging-Function-Name AVP is of type DiameterURI. This AVP contains the address of the Secondary Online Charging Function. The Destination-Host and Destination-Realm values for the Diameter accounting requests should be extracted from the DiameterURI in the way indicated in clause 6.3.20.

6.3.22 Primary-Charging-Collection-Function-Name AVP

The Primary-Charging-Collection-Function-Name AVP is of type DiameterURI. This AVP contains the address of the Primary Charging Data Function. The Destination-Host and Destination-Realm values for the Diameter accounting requests should be extracted from the DiameterURI in the way indicated in clause 6.3.20.

6.3.23 Secondary-Charging-Collection-Function-Name AVP

The Secondary-Charging-Collection-Function-Name AVP is of type DiameterURI. This AVP contains the address of the Secondary Charging Data Function. The Destination-Host and Destination-Realm for the Diameter accounting requests values should be extracted from the DiameterURI in the way indicated in clause 6.3.20.

6.3.24 User-Authorization-Type AVP

The User-Authorization-Type AVP is of type Enumerated, and indicates the type of user authorization being performed in a User Authorization operation, i.e. UAR command. The following values are defined:

REGISTRATION (0)

This value is used in case of the initial registration or re-registration. I-CSCF determines this from the Expires field or expires parameter in Contact field in the SIP REGISTER method if it is not equal to zero.

This is the default value.

DE_REGISTRATION (1)

This value is used in case of the de-registration. I-CSCF determines this from the Expires field or expires parameter in Contact field in the SIP REGISTER method if it is equal to zero.

REGISTRATION_AND_CAPABILITIES (2)

This value is used when the I-CSCF explicitly requests S-CSCF capability information from the HSS. The I-CSCF shall use this value when the user’s current S-CSCF, which is stored in the HSS, cannot be contacted and a new S-CSCF needs to be selected

6.3.25 Void

6.3.26 User-Data-Already-Available AVP

The User-Data-Already-Available AVP is of type Enumerated, and indicates to the HSS whether or not the S-CSCF already has the part of the user profile that it needs to serve the user. The following values are defined:

USER_DATA_NOT_AVAILABLE (0)

The S-CSCF does not have the data that it needs to serve the user.

USER_DATA_ALREADY_AVAILABLE (1)

The S-CSCF already has the data that it needs to serve the user.

6.3.27 Confidentiality-Key AVP

The Confidentiality-Key is of type OctetString, and contains the Confidentiality Key (CK).

6.3.28 Integrity-Key AVP

The Integrity-Key is of type OctetString, and contains the Integrity Key (IK).

6.3.29 Supported-Features AVP

The Supported-Features AVP is of type Grouped. If this AVP is present it may inform the destination host about the features that the origin host supports for the application. The Feature-List AVP contains a list of supported features of the origin host. The Vendor-Id AVP and the Feature-List-ID AVP shall together identify which feature list is carried in the Supported-Features AVP for the Application-ID present in the command header.

Where a Supported-Features AVP is used to identify features that have been defined by 3GPP, the Vendor-Id AVP shall contain the vendor ID of 3GPP. Vendors may define proprietary features, but it is strongly recommended that the possibility is used only as the last resort. Where the Supported-Features AVP is used to identify features that have been defined by a vendor other than 3GPP, it shall contain the vendor ID of the specific vendor in question.

If there are multiple feature lists defined by the same vendor and the same application, the Feature-List-ID AVP shall differentiate those lists from one another. The destination host shall use the value of the Feature-List-ID AVP to identify the feature list.

AVP format

Supported-Features ::= < AVP header: 628 10415 >

{ Vendor-Id }

{ Feature-List-ID }

{ Feature-List }

*[AVP]

6.3.30 Feature-List-ID AVP

The Feature-List-ID AVP is of type Unsigned32 and it contains the identity of a feature list.

6.3.31 Feature-List AVP

The Feature-List AVP is of type Unsigned32 and it contains a bit mask indicating the supported features of an application. When the bit set, indicates the corresponding feature is supported by the application. For the Cx application, the meaning of the bits has been defined in 7.1.1.

6.3.32 Supported-Applications AVP

The Supported-Applications AVP is of type Grouped and it contains the supported application identifiers of a Diameter node.

AVP format

Supported-Applications ::= < AVP header: 631 10415 >

*[ Auth-Application-Id ]

*[ Acct-Application-Id ]

*[ Vendor-Specific-Application-Id ]

*[ AVP ]

6.3.33 Associated-Identities AVP

The Associated-Identities AVP is of type Grouped and it contains the private user identities associated to an IMS subscription.

AVP format

Associated-Identities ::= < AVP header: 632, 10415 >

*[ User-Name ]

*[ AVP ]

6.3.34 Originating-Request AVP

The Originating-Request AVP is of type Enumerated. The following value is defined:

ORIGINATING (0)

This value indicates to the HSS that the request is related to an AS originating SIP request in the Location-Information-Request operation.

6.3.35 Wildcarded-Public-Identity AVP

The Wildcarded-Public-Identity AVP is of type UTF8String. This AVP contains a Wildcarded PSI or Wildcarded Public User Identity stored in the HSS. The syntax of the contents of this AVP is described in 3GPP TS 23.003 [13].

6.3.36 SIP-Digest-Authenticate AVP

The SIP-Digest-Authenticate is of type Grouped and it contains a reconstruction of either the SIP WWW-Authenticate or Proxy-Authentication header fields specified in IETF RFC 7616 [29].

AVP format

SIP-Digest-Authenticate ::= < AVP Header: 635 10415>

{ Digest-Realm }

 [ Digest-Algorithm ]

{ Digest-QoP }

{ Digest-HA1}

[ Alternate-Digest-Algorithm ]

[ Alternate-Digest-HA1 ]

*[ AVP ]

6.3.37 Digest-Realm AVP

The Digest-Realm AVP is defined in IETF RFC 4740 [15].

6.3.38 Void

6.3.39 Digest-Algorithm AVP

The Digest-Algorithm AVP is defined in IETF RFC 4740 [15] and contains values as defined in IETF RFC 7616 [29].

NOTE: The MD5 algorithm is only supported for backward compatibility.

6.3.40 Digest-QoP AVP

The Digest-QoP AVP is defined in IETF RFC 4740 [15].

6.3.41 Digest-HA1 AVP

The Digest-HA1 AVP is defined in IETF RFC 4740 [15].

6.3.42 Line-Identifier AVP

The Line-Identifier AVP is of type OctetString. This AVP has Vendor Id ETSI (13019) and AVP code 500. This AVP contains a fixed broadband access line identifier associated with the user.

6.3.43 Wildcarded-IMPU AVP

The Wildcarded-IMPU AVP is of type UTF8String. This AVP contains a Wildcarded Public User Identity stored in the HSS. The syntax of the contents of this AVP is described in 3GPP TS 23.003 [13].

Note: This AVP is used by Sh interface as specified in the 3GPP TS 29.328 [16] and 3GPP TS 29.329 [11].

6.3.44 UAR-Flags AVP

The UAR-Flags AVP is of type Unsigned32 and it contains a bit mask. The meaning of the bits is defined in the following table:

Table 6.3.44.1: UAR-Flags

Bit

Name

Description

0

IMS Emergency Registration

This bit, when set, indicates that the request corresponds to an IMS Emergency Registration.

Bits not defined in this table shall be cleared by the sending I-CSCF and discarded by the receiving HSS.

6.3.45 Loose-Route-Indication AVP

The Loose-Route-Indication AVP is of type Enumerated and indicates to the S-CSCF whether or not the loose route mechanism is required to serve the registered Public User Identities. The following values are defined:

LOOSE_ROUTE_NOT_REQUIRED (0)

LOOSE_ROUTE_REQUIRED (1)

6.3.46 SCSCF-Restoration-Info AVP

The SCSCF-Restoration-Info AVP is of type Grouped and it contains the information required for an S-CSCF to handle the requests for a user.

AVP format

SCSCF-Restoration-Info ::= < AVP Header: 639, 10415>

{ User-Name }

1*{ Restoration-Info }

[ Registration-Time-Out ]

[ SIP-Authentication-Scheme ]

*[ AVP ]

6.3.47 Path AVP

The Path AVP is of type OctetString and it contains a comma separated list of SIP proxies in the Path header as defined in IETF RFC 3327 [17].

6.3.48 Contact AVP

The Contact AVP is of type OctetString and it contains the Contact Addresses and Parameters in the Contact header as defined in IETF RFC 3261 [11].

6.3.49 Subscription-Info AVP

The Subscription-Info AVP is of type Grouped and it contains the UE’s subscription information. The Contact AVP contains the Contact Address and Parameters in the Contact header of the subscription request.

AVP format

Subscription-Info ::= < AVP Header: 642, 10415>

{ Call-ID-SIP-Header }

{ From-SIP-Header }

{ To-SIP-Header }

{ Record-Route }

{Contact}

*[ AVP ]

6.3.49.1 Call-ID-SIP-Header AVP

The Call-ID-SIP-Header AVP is of type OctetString and it contains the information in the Call-ID header as defined in IETF RFC 3261 [11].

6.3.49.2 From-SIP-Header AVP

The From-SIP-Header AVP is of type OctetString and it contains the information in the From header as defined in IETF RFC 3261 [11].

6.3.49.3 To-SIP-Header AVP

The To-SIP-Header AVP is of type OctetString and it contains the information in the To header as defined in IETF RFC 3261 [11].

6.3.49.4 Record-Route AVP

The Record-Route AVP is of type OctetString and it contains a comma separated list of Record Route header(s) as defined in IETF RFC 3261 [11].

6.3.50 Associated-Registered-Identities AVP

The Associated-Registered-Identities AVP is of type Grouped and it contains the Private User Identities registered with the Public User Identity received in the request command.

AVP format

Associated-Registered-Identities ::= < AVP header: 647, 10415 >

*[ User-Name ]

*[ AVP ]

6.3.51 Multiple-Registration-Indication

The Multiple-Registration-Indication AVP is of type Enumerated and indicates to the HSS whether or not the request is related to a multiple registration. The following values are defined:

NOT_MULTIPLE_REGISTRATION (0)

MULTIPLE_REGISTRATION (1)

6.3.52 Restoration-Info AVP

The Restoration-Info AVP is of type Grouped and it contains the information related to a specific registration required for an S-CSCF to handle the requests for a user. The Contact AVP contains the Contact Address and Parameters in the Contact header of the registration request.

AVP format

Restoration-Info ::= < AVP Header: 649, 10415>

{ Path }

{ Contact }

[ Initial-CSeq-Sequence-Number ]

[ Call-ID-SIP-Header ]

[ Subscription-Info ]

[ P-CSCF-Subscription-Info ]

*[ AVP ]

6.3.53 Framed-IP-Address AVP

The Framed-IP-Address AVP is defined in IETF RFC 4005 [19].

6.3.54 Framed-IPv6-Prefix AVP

The Framed-IPv6-Prefix AVP is defined in IETF RFC 4005 [19], and it shall be encoded as defined in IETF RFC 3162 [22].

6.3.55 Framed-Interface-Id AVP

The Framed-Interface-Id AVP is defined in IETF RFC 4005 [19].

6.3.56 Session-Priority AVP

The Session-Priority AVP is of type Enumerated and indicates to the HSS the session’s priority. The following values are defined:

PRIORITY-0 (0)

PRIORITY-1 (1)

PRIORITY-2 (2)

PRIORITY-3 (3)

PRIORITY-4 (4)

PRIORITY-0 is the highest priority.

The value of the AVP when sent to the HSS is mapped from the value received by the CSCF as described in 3GPP TS 24.229 table A.162. The mapping is operator specific.

This AVP may be placed as close to the Diameter header as possible in order to potentially allow optimized processing at the receiver.

6.3.57 Identity-with-Emergency-Registration AVP

The Identity-with-Emergency-Registration AVP is of type Grouped and it contains a pair of private/public user identities which are emergency registered.

AVP format

Identity-with-Emergency-Registration ::= < AVP header: 651, 10415 >

{ User-Name }

{ Public-Identity }

*[ AVP ]

6.3.58 Priviledged-Sender-Indication AVP

The Priviledged-Sender-Indication AVP is of type Enumerated and indicates to the S-CSCF whether or not the Private User Identity shall be considered as a priviledged sender. The following values are defined:

NOT_PRIVILEDGED_SENDER (0)PRIVILEDGED_SENDER (1)

6.3.59 LIA-Flags

The LIA-Flags AVP is of type Unsigned32 and it shall contain a bit mask. The meaning of the bits shall be as defined in table 6.3.59.1.

Table 6.3.59.1: LIA-Flags

Bit

Name

Description

0

PSI Direct Routing Indication

This bit, when set, indicates the request corresponds to PSI Direct Routing, what implies that HSS returns an AS name in Server-Name AVP.

NOTE: Bits not defined in this table shall be cleared by the sending HSS and discarded by the receiving I-CSCF.

6.3.60 OC-Supported-Features

The OC-Supported-Features AVP is of type Grouped and it is defined in IETF RFC 7683 [23]. This AVP is used to support Diameter overload control mechanism.

6.3.61 OC-OLR

The OC-OLR AVP is of type Grouped and it is defined in IETF RFC 7683 [23]. This AVP is used to support Diameter overload control mechanism.

6.3.62 Initial-CSeq-Sequence-Number AVP

The Initial-CSeq-Sequence-Number AVP is of type Unsigned32, and it contains the sequence number of the CSeq header field contained in the initial successful REGISTER request, as defined in IETF RFC 3261 [11].

6.3.63 SAR-Flags

The SAR-Flags AVP is of type Unsigned32 and it contains a bit mask. The meaning of the bits is defined in the following table:

Table 6.3.63.1: SAR-Flags

Bit

Name

Description

0

P-CSCF Restoration Indication

This bit, when set, indicates that the P-CSCF-Restoration-mechanism feature shall be executed, as described in 3GPP TS 23.380 [24], clause 5.4.

This AVP is optionally present only when Server-Assignment-Type takes the value ADMINISTRATIVE_DEREGISTRATION or UNREGISTERED_USER.

Note: Bits not defined in this table shall be cleared by the sending S-CSCF and discarded by the receiving HSS.

6.3.64 Allowed-WAF-WWSF-Identities AVP

The Allowed-WAF-WWSF-Identities AVP is of type Grouped and contains the addresses of the WAFs and WWSFs allowed for the subscription.

AVP format

Allowed-WAF-WWSF-Identities :: = < AVP Header : 656 10415 >

*[ WebRTC-Authentication-Function-Name ]

*[ WebRTC-Web-Server-Function-Name ]

*[ AVP]

6.3.65 WebRTC-Authentication-Function-Name AVP

The WebRTC-Authentication-Function-Name AVP is of type UTF8String and contains the address of a WAF allowed for the subscription. For the format of the string see IETF draft-holmberg-sipcore-auth-id-01 [25].

6.3.66 WebRTC-Web-Server-Function-Name AVP

The WebRTC-Web-Server-Function-Name AVP is of type UTF8String and contains the address of a WWSF allowed for the subscription. For the format of the string see IETF draft-holmberg-sipcore-auth-id-01 [25].

6.3.67 DRMP AVP

The DRMP AVP is of type Enumerated and it is defined in IETF RFC 7944 [26]. This AVP allows the HSS/SLF and the S-CSCF/I-CSCF to indicate the relative priority of Diameter messages. The DRMP AVP may be used to set the DSCP marking for transport of the associated Diameter message.

6.3.68 Load

The Load AVP is of type Grouped and it is defined in IEFT RFC 8583 [27]. This AVP is used to support the Diameter load control mechanism.

6.3.69 RTR-Flags

The RTR-Flags AVP is of type Unsigned32 and it shall contain a bit mask. The meaning of the bits shall be as defined in table 6.3.69.1.

Table 6.3.69.1: RTR-Flags

Bit

Name

Description

0

Reference Location Information change

This bit, when set, indicates the request is sent due to change of Reference Location Information.

NOTE: Bits not defined in this table shall be cleared by the sending HSS and discarded by the receiving I-CSCF.

6.3.70 P-CSCF-Subscription-Info AVP

The P-CSCF-Subscription-Info AVP is of type Grouped and it contains the P-CSCF”s subscription information. The Contact AVP contains the Contact Address and Parameters in the Contact header of the subscription request.

AVP format

P-CSCF-Subscription-Info ::= < AVP Header: 660, 10415>

{ Call-ID-SIP-Header }

{ From-SIP-Header }

{ To-SIP-Header }

{ Contact }

*[ AVP ]

6.3.71 Registration-Time-Out

The Registration-Time-Out AVP is of type Time (see IETF RFC 6733 [28]), and contains the point of time at which the UE’s registration expires.

6.3.72 Alternate-Digest-Algorithm AVP

The Alternate-Digest-Algorithm AVP contains algorithm values specified in IETF RFC 7616 [29].

NOTE: The MD5 algorithm is only supported for backward compatibility and can only be provided within the Digest-Algorithm AVP.

6.3.73 Alternate-Digest-HA1 AVP

The Alternate-Digest-HA1 AVP contains H(A1) value specified in IETF RFC 7616 [29].

6.3.74 Failed-PCSCF

The Failed-PCSCF AVP is of type Grouped and contains the FQDN and/or IP addresses of the failed P-CSCF.

AVP format

Failed-PCSCF ::= < AVP Header: 664, 10415>

[ PCSCF-FQDN ]

*[ PCSCF-IP-Address ]

*[ AVP ]

6.3.75 PCSCF-FQDN

The PCSCF-FQDN AVP is of type DiameterIdentity and contains the FQDN of the P-CSCF.

6.3.76 PCSCF-IP-Address

The PCSCF-IP-Address AVP is of type Address and contains the IPv4 or IPv6 address of the P-CSCF.

6.4 Use of namespaces

This clause contains the namespaces that have either been created in this specification, or the values assigned to existing namespaces managed by IANA.

6.4.1 AVP codes

This specification assigns the AVP values from the AVP Code namespace managed by 3GPP for its Diameter vendor-specific applications. See clause 6.3 for the assignment of the namespace in this specification.

6.4.2 Experimental-Result-Code AVP values

This specification has assigned Experimental-Result-Code AVP values 2001-2005 and 5001-5011. See clause 6.2.

6.4.3 Command Code values

This specification assigns the values 300-305 from the range allocated by IANA to 3GPP in IETF RFC 3589 [12].

6.4.4 Application-ID value

IANA has allocated the value 16777216 for the 3GPP Cx interface application.