// Passkey entry initiator, negative reply on responding side: // - Test case not present in LMP.TS, but other permutations are described in SP/BV-14-C, SP/BV-15-C // - IUT is DisplayOnly, initiator // - Lower Tester is KeyboardOnly, responder // - Lower Tester fails passkey entry with User_Passkey_Request_NegativeReply, responds Not Accepted to the SimplePairingConfirm sequence! { procedure, context, // ACL Connection Established Upper Tester -> IUT: AuthenticationRequested { connection_handle: context.peer_handle() } IUT -> Upper Tester: AuthenticationRequestedStatus { num_hci_command_packets: 1, status: ErrorCode::Success, } IUT -> Upper Tester: LinkKeyRequest { bd_addr: context.peer_address(), } Upper Tester -> IUT: LinkKeyRequestNegativeReply { bd_addr: context.peer_address(), } IUT -> Upper Tester: LinkKeyRequestNegativeReplyComplete { num_hci_command_packets: 1, status: ErrorCode::Success, bd_addr: context.peer_address(), } IUT -> Upper Tester: IoCapabilityRequest { bd_addr: context.peer_address(), } Upper Tester -> IUT: IoCapabilityRequestReply { bd_addr: context.peer_address(), io_capability: IoCapability::DisplayOnly, oob_present: OobDataPresent::NotPresent, authentication_requirements: AuthenticationRequirements::NoBondingMitmProtection, } IUT -> Upper Tester: IoCapabilityRequestReplyComplete { num_hci_command_packets: 1, status: ErrorCode::Success, bd_addr: context.peer_address(), } IUT -> Lower Tester: IoCapabilityReq { transaction_id: 0, io_capabilities: 0x00, oob_authentication_data: 0x00, authentication_requirement: 0x01, } Lower Tester -> IUT: IoCapabilityRes { transaction_id: 0, io_capabilities: 0x02, oob_authentication_data: 0x00, authentication_requirement: 0x01, } IUT -> Upper Tester: IoCapabilityResponse { bd_addr: context.peer_address(), io_capability: IoCapability::KeyboardOnly, oob_data_present: OobDataPresent::NotPresent, authentication_requirements: AuthenticationRequirements::NoBondingMitmProtection, } // Public Key Exchange IUT -> Lower Tester: EncapsulatedHeader { transaction_id: 0, major_type: 1, minor_type: 1, payload_length: 48, } Lower Tester -> IUT: Accepted { transaction_id: 0, accepted_opcode: Opcode::EncapsulatedHeader, } repeat 3 times with (part in local_p192_public_key(&context)) { IUT -> Lower Tester: EncapsulatedPayload { transaction_id: 0, data: part, } Lower Tester -> IUT: Accepted { transaction_id: 0, accepted_opcode: Opcode::EncapsulatedPayload, } } Lower Tester -> IUT: EncapsulatedHeader { transaction_id: 0, major_type: 1, minor_type: 1, payload_length: 48, } IUT -> Lower Tester: Accepted { transaction_id: 0, accepted_opcode: Opcode::EncapsulatedHeader, } repeat 3 times with (part in peer_p192_public_key()) { Lower Tester -> IUT: EncapsulatedPayload { transaction_id: 0, data: part, } IUT -> Lower Tester: Accepted { transaction_id: 0, accepted_opcode: Opcode::EncapsulatedPayload, } } // Authentication Stage 1: Passkey Entry Protocol IUT -> Upper Tester: UserPasskeyNotification { bd_addr: context.peer_address(), passkey: 0 } IUT -> Lower Tester: SimplePairingConfirm { transaction_id: 0, commitment_value: [0; 16], } Lower Tester -> IUT: NotAccepted { transaction_id: 0, not_accepted_opcode: Opcode::SimplePairingConfirm, error_code: ErrorCode::AuthenticationFailure.into(), } IUT -> Upper Tester: SimplePairingComplete { status: ErrorCode::AuthenticationFailure, bd_addr: context.peer_address(), } IUT -> Upper Tester: AuthenticationComplete { status: ErrorCode::AuthenticationFailure, connection_handle: context.peer_handle(), } }