test_rfkill.py 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. # rfkill tests
  2. # Copyright (c) 2014, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import logging
  7. logger = logging.getLogger()
  8. import subprocess
  9. import time
  10. import hostapd
  11. from hostapd import HostapdGlobal
  12. import hwsim_utils
  13. def get_rfkill_id(dev):
  14. try:
  15. cmd = subprocess.Popen(["rfkill", "list"], stdout=subprocess.PIPE)
  16. except Exception, e:
  17. logger.info("No rfkill available: " + str(e))
  18. return None
  19. res = cmd.stdout.read()
  20. cmd.stdout.close()
  21. phy = dev.get_driver_status_field("phyname")
  22. matches = [ line for line in res.splitlines() if phy + ':' in line ]
  23. if len(matches) != 1:
  24. return None
  25. return matches[0].split(':')[0]
  26. def test_rfkill_open(dev, apdev):
  27. """rfkill block/unblock during open mode connection"""
  28. id = get_rfkill_id(dev[0])
  29. if id is None:
  30. return "skip"
  31. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  32. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  33. try:
  34. logger.info("rfkill block")
  35. subprocess.call(['sudo', 'rfkill', 'block', id])
  36. dev[0].wait_disconnected(timeout=10,
  37. error="Missing disconnection event on rfkill block")
  38. if "FAIL" not in dev[0].request("REASSOCIATE"):
  39. raise Exception("REASSOCIATE accepted while disabled")
  40. if "FAIL" not in dev[0].request("REATTACH"):
  41. raise Exception("REATTACH accepted while disabled")
  42. if "FAIL" not in dev[0].request("RECONNECT"):
  43. raise Exception("RECONNECT accepted while disabled")
  44. if "FAIL" not in dev[0].request("FETCH_OSU"):
  45. raise Exception("FETCH_OSU accepted while disabled")
  46. logger.info("rfkill unblock")
  47. subprocess.call(['sudo', 'rfkill', 'unblock', id])
  48. dev[0].wait_connected(timeout=10,
  49. error="Missing connection event on rfkill unblock")
  50. hwsim_utils.test_connectivity(dev[0], hapd)
  51. finally:
  52. subprocess.call(['sudo', 'rfkill', 'unblock', id])
  53. def test_rfkill_wpa2_psk(dev, apdev):
  54. """rfkill block/unblock during WPA2-PSK connection"""
  55. id = get_rfkill_id(dev[0])
  56. if id is None:
  57. return "skip"
  58. ssid = "test-wpa2-psk"
  59. passphrase = 'qwertyuiop'
  60. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  61. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  62. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  63. try:
  64. logger.info("rfkill block")
  65. subprocess.call(['sudo', 'rfkill', 'block', id])
  66. dev[0].wait_disconnected(timeout=10,
  67. error="Missing disconnection event on rfkill block")
  68. logger.info("rfkill unblock")
  69. subprocess.call(['sudo', 'rfkill', 'unblock', id])
  70. dev[0].wait_connected(timeout=10,
  71. error="Missing connection event on rfkill unblock")
  72. hwsim_utils.test_connectivity(dev[0], hapd)
  73. finally:
  74. subprocess.call(['sudo', 'rfkill', 'unblock', id])
  75. def test_rfkill_autogo(dev, apdev):
  76. """rfkill block/unblock for autonomous P2P GO"""
  77. id0 = get_rfkill_id(dev[0])
  78. if id0 is None:
  79. return "skip"
  80. id1 = get_rfkill_id(dev[1])
  81. if id1 is None:
  82. return "skip"
  83. dev[0].p2p_start_go()
  84. dev[1].request("SET p2p_no_group_iface 0")
  85. dev[1].p2p_start_go()
  86. try:
  87. logger.info("rfkill block 0")
  88. subprocess.call(['sudo', 'rfkill', 'block', id0])
  89. ev = dev[0].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
  90. if ev is None:
  91. raise Exception("Group removal not reported")
  92. if "reason=UNAVAILABLE" not in ev:
  93. raise Exception("Unexpected group removal reason: " + ev)
  94. if "FAIL" not in dev[0].request("P2P_LISTEN 1"):
  95. raise Exception("P2P_LISTEN accepted unexpectedly")
  96. if "FAIL" not in dev[0].request("P2P_LISTEN"):
  97. raise Exception("P2P_LISTEN accepted unexpectedly")
  98. logger.info("rfkill block 1")
  99. subprocess.call(['sudo', 'rfkill', 'block', id1])
  100. ev = dev[1].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
  101. if ev is None:
  102. raise Exception("Group removal not reported")
  103. if "reason=UNAVAILABLE" not in ev:
  104. raise Exception("Unexpected group removal reason: " + ev)
  105. logger.info("rfkill unblock 0")
  106. subprocess.call(['sudo', 'rfkill', 'unblock', id0])
  107. logger.info("rfkill unblock 1")
  108. subprocess.call(['sudo', 'rfkill', 'unblock', id1])
  109. time.sleep(1)
  110. finally:
  111. subprocess.call(['sudo', 'rfkill', 'unblock', id0])
  112. subprocess.call(['sudo', 'rfkill', 'unblock', id1])
  113. def test_rfkill_hostapd(dev, apdev):
  114. """rfkill block/unblock during and prior to hostapd operations"""
  115. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  116. id = get_rfkill_id(hapd)
  117. if id is None:
  118. return "skip"
  119. try:
  120. subprocess.call(['rfkill', 'block', id])
  121. ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
  122. if ev is None:
  123. raise Exception("INTERFACE-DISABLED event not seen")
  124. subprocess.call(['rfkill', 'unblock', id])
  125. ev = hapd.wait_event(["INTERFACE-ENABLED"], timeout=5)
  126. if ev is None:
  127. raise Exception("INTERFACE-ENABLED event not seen")
  128. # hostapd does not current re-enable beaconing automatically
  129. hapd.disable()
  130. hapd.enable()
  131. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  132. subprocess.call(['rfkill', 'block', id])
  133. ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
  134. if ev is None:
  135. raise Exception("INTERFACE-DISABLED event not seen")
  136. dev[0].wait_disconnected(timeout=10)
  137. dev[0].request("DISCONNECT")
  138. hapd.disable()
  139. hglobal = HostapdGlobal()
  140. hglobal.flush()
  141. hglobal.remove(apdev[0]['ifname'])
  142. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open2" },
  143. no_enable=True)
  144. if "FAIL" not in hapd.request("ENABLE"):
  145. raise Exception("ENABLE succeeded unexpectedly (rfkill)")
  146. finally:
  147. subprocess.call(['rfkill', 'unblock', id])