test_rfkill.py 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188
  1. # rfkill tests
  2. # Copyright (c) 2014, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import logging
  7. logger = logging.getLogger()
  8. import time
  9. import hostapd
  10. from hostapd import HostapdGlobal
  11. import hwsim_utils
  12. from wpasupplicant import WpaSupplicant
  13. from rfkill import RFKill
  14. def get_rfkill(dev):
  15. phy = dev.get_driver_status_field("phyname")
  16. try:
  17. for r, s, h in RFKill.list():
  18. if r.name == phy:
  19. return r
  20. except Exception, e:
  21. logger.info("No rfkill available: " + str(e))
  22. return None
  23. def test_rfkill_open(dev, apdev):
  24. """rfkill block/unblock during open mode connection"""
  25. rfk = get_rfkill(dev[0])
  26. if rfk is None:
  27. return "skip"
  28. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  29. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  30. try:
  31. logger.info("rfkill block")
  32. rfk.block()
  33. dev[0].wait_disconnected(timeout=10,
  34. error="Missing disconnection event on rfkill block")
  35. if "FAIL" not in dev[0].request("REASSOCIATE"):
  36. raise Exception("REASSOCIATE accepted while disabled")
  37. if "FAIL" not in dev[0].request("REATTACH"):
  38. raise Exception("REATTACH accepted while disabled")
  39. if "FAIL" not in dev[0].request("RECONNECT"):
  40. raise Exception("RECONNECT accepted while disabled")
  41. if "FAIL" not in dev[0].request("FETCH_OSU"):
  42. raise Exception("FETCH_OSU accepted while disabled")
  43. logger.info("rfkill unblock")
  44. rfk.unblock()
  45. dev[0].wait_connected(timeout=10,
  46. error="Missing connection event on rfkill unblock")
  47. hwsim_utils.test_connectivity(dev[0], hapd)
  48. finally:
  49. rfk.unblock()
  50. def test_rfkill_wpa2_psk(dev, apdev):
  51. """rfkill block/unblock during WPA2-PSK connection"""
  52. rfk = get_rfkill(dev[0])
  53. if rfk is None:
  54. return "skip"
  55. ssid = "test-wpa2-psk"
  56. passphrase = 'qwertyuiop'
  57. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  58. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  59. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  60. try:
  61. logger.info("rfkill block")
  62. rfk.block()
  63. dev[0].wait_disconnected(timeout=10,
  64. error="Missing disconnection event on rfkill block")
  65. logger.info("rfkill unblock")
  66. rfk.unblock()
  67. dev[0].wait_connected(timeout=10,
  68. error="Missing connection event on rfkill unblock")
  69. hwsim_utils.test_connectivity(dev[0], hapd)
  70. finally:
  71. rfk.unblock()
  72. def test_rfkill_autogo(dev, apdev):
  73. """rfkill block/unblock for autonomous P2P GO"""
  74. rfk0 = get_rfkill(dev[0])
  75. if rfk0 is None:
  76. return "skip"
  77. rfk1 = get_rfkill(dev[1])
  78. if rfk1 is None:
  79. return "skip"
  80. dev[0].p2p_start_go()
  81. dev[1].request("SET p2p_no_group_iface 0")
  82. dev[1].p2p_start_go()
  83. try:
  84. logger.info("rfkill block 0")
  85. rfk0.block()
  86. ev = dev[0].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
  87. if ev is None:
  88. raise Exception("Group removal not reported")
  89. if "reason=UNAVAILABLE" not in ev:
  90. raise Exception("Unexpected group removal reason: " + ev)
  91. if "FAIL" not in dev[0].request("P2P_LISTEN 1"):
  92. raise Exception("P2P_LISTEN accepted unexpectedly")
  93. if "FAIL" not in dev[0].request("P2P_LISTEN"):
  94. raise Exception("P2P_LISTEN accepted unexpectedly")
  95. logger.info("rfkill block 1")
  96. rfk1.block()
  97. ev = dev[1].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
  98. if ev is None:
  99. raise Exception("Group removal not reported")
  100. if "reason=UNAVAILABLE" not in ev:
  101. raise Exception("Unexpected group removal reason: " + ev)
  102. logger.info("rfkill unblock 0")
  103. rfk0.unblock()
  104. logger.info("rfkill unblock 1")
  105. rfk1.unblock()
  106. time.sleep(1)
  107. finally:
  108. rfk0.unblock()
  109. rfk1.unblock()
  110. def test_rfkill_hostapd(dev, apdev):
  111. """rfkill block/unblock during and prior to hostapd operations"""
  112. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
  113. rfk = get_rfkill(hapd)
  114. if rfk is None:
  115. return "skip"
  116. try:
  117. rfk.block()
  118. ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
  119. if ev is None:
  120. raise Exception("INTERFACE-DISABLED event not seen")
  121. rfk.unblock()
  122. ev = hapd.wait_event(["INTERFACE-ENABLED"], timeout=5)
  123. if ev is None:
  124. raise Exception("INTERFACE-ENABLED event not seen")
  125. # hostapd does not current re-enable beaconing automatically
  126. hapd.disable()
  127. hapd.enable()
  128. dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
  129. rfk.block()
  130. ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
  131. if ev is None:
  132. raise Exception("INTERFACE-DISABLED event not seen")
  133. dev[0].wait_disconnected(timeout=10)
  134. dev[0].request("DISCONNECT")
  135. hapd.disable()
  136. hglobal = HostapdGlobal()
  137. hglobal.flush()
  138. hglobal.remove(apdev[0]['ifname'])
  139. hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open2" },
  140. no_enable=True)
  141. if "FAIL" not in hapd.request("ENABLE"):
  142. raise Exception("ENABLE succeeded unexpectedly (rfkill)")
  143. finally:
  144. rfk.unblock()
  145. def test_rfkill_wpas(dev, apdev):
  146. """rfkill block prior to wpa_supplicant start"""
  147. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  148. wpas.interface_add("wlan5")
  149. rfk = get_rfkill(wpas)
  150. if rfk is None:
  151. return "skip"
  152. wpas.interface_remove("wlan5")
  153. try:
  154. rfk.block()
  155. wpas.interface_add("wlan5")
  156. time.sleep(0.5)
  157. state = wpas.get_status_field("wpa_state")
  158. if state != "INTERFACE_DISABLED":
  159. raise Exception("Unexpected state with rfkill blocked: " + state)
  160. rfk.unblock()
  161. time.sleep(0.5)
  162. state = wpas.get_status_field("wpa_state")
  163. if state == "INTERFACE_DISABLED":
  164. raise Exception("Unexpected state with rfkill unblocked: " + state)
  165. finally:
  166. rfk.unblock()