https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13010

            Bug ID: 13010
           Summary: Diameter: Update AVPs 1003, 1094 and 1099
           Product: Wireshark
           Version: 2.3.x (Experimental)
          Hardware: x86
                OS: Linux (other)
            Status: UNCONFIRMED
          Severity: Major
          Priority: Low
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: jan.spe...@nokia.com

Build Information:
Version 2.3.0 (v2.3.0rc0-1003-gc06189f from master)

Copyright 1998-2016 Gerald Combs <ger...@wireshark.org> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 3.12.2, with Cairo 1.14.0, with Pango 1.36.8, with
libpcap, without POSIX capabilities, without libnl, with GLib 2.44.1, with zlib
1.2.3, without SMI, without c-ares, with Lua 5.1.4, without GnuTLS, without
Gcrypt, with MIT Kerberos, without GeoIP, without PortAudio, without AirPcap.

Running on Linux 2.6.32-220.7.1.el6.x86_64, with Intel(R) Xeon(R) CPU          
X3440  @ 2.53GHz (with SSE4.2), with 15943 MB of physical memory, with locale
en_US.UTF-8, with libpcap version 1.7.2, with zlib 1.2.3.

Built using gcc 4.4.7 20120313 (Red Hat 4.4.7-11).

--
Release 13 of 3GPP defines these AVPs as:


The Charging-Rule-Definition AVP (AVP code 1003) is of type Grouped, and it
defines the PCC rule sent by the PCRF to the PCEF.

AVP Format:

Charging-Rule-Definition ::= < AVP Header: 1003 >
             { Charging-Rule-Name }
             [ Service-Identifier ]
             [ Rating-Group ]
            *[ Flow-Information ]
             [ TDF-Application-Identifier ]
             [ Flow-Status ]
                 [ QoS-Information ]
             [ PS-to-CS-Session-Continuity ]
             [ Reporting-Level ]
             [ Online ]
             [ Offline ]
             [ Metering-Method ]
             [ Precedence ]
             [ AF-Charging-Identifier ]
            *[ Flows ]
             [ Monitoring-Key]
             [ Redirect-Information ]
             [ Mute-Notification ]
             [ AF-Signalling-Protocol ]
             [ Sponsor-Identity ]
             [ Application-Service-Provider-Identity ]
            *[ Required-Access-Info ] 
             [ Sharing-Key-DL ]
             [ Sharing-Key-UL ] 
             [ Traffic-Steering-Policy-Identifier-DL ]
             [ Traffic-Steering-Policy-Identifier-UL ]
            *[ AVP ]

-----
The ADC-Rule-Definition AVP (AVP code 1094) is of type Grouped, and it defines
the ADC rule sent by the PCRF.

AVP Format:

ADC-Rule-Definition ::= < AVP Header: 1094 >
             { ADC-Rule-Name }
             [ TDF-Application-Identifier ]
            *[ Flow-Information ]
             [ Service-Identifier ]
                  [ Rating-Group ]
             [ Reporting-Level ]
             [ Online ]
             [ Offline ]
             [ Metering-Method ]
             [ Precedence ]
             [ Flow-Status ]
             [ QoS-Information ]
             [ Monitoring-Key ]
             [ Redirect-Information ]
             [ Mute-Notification ] 
             [ Traffic-Steering-Policy-Identifier-DL ]
             [ Traffic-Steering-Policy-Identifier-UL ]
             [ ToS-Traffic-Class ]
            *[ AVP ]

-----
The PS-to-CS-Session-Continuity AVP (AVP code 1099) is of type Enumerated, and
indicates whether the service data flow is a candidate for PS to CS session
continuity as specified in 3GPP TS 23.216 [40].

The following values are defined:
        VIDEO_PS2CS_CONT_CANDIDATE (0)

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to