Updated through tag hostap_2_5 from git://w1.fi/hostap.git
[mech_eap.git] / libeap / tests / hwsim / test_rfkill.py
1 # rfkill tests
2 # Copyright (c) 2014, Jouni Malinen <j@w1.fi>
3 #
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
6
7 import logging
8 logger = logging.getLogger()
9 import time
10
11 import hostapd
12 from hostapd import HostapdGlobal
13 import hwsim_utils
14 from wpasupplicant import WpaSupplicant
15 from rfkill import RFKill
16 from utils import HwsimSkip
17
18 def get_rfkill(dev):
19     phy = dev.get_driver_status_field("phyname")
20     try:
21         for r, s, h in RFKill.list():
22             if r.name == phy:
23                 return r
24     except Exception, e:
25         raise HwsimSkip("No rfkill available: " + str(e))
26     raise HwsimSkip("No rfkill match found for the interface")
27
28 def test_rfkill_open(dev, apdev):
29     """rfkill block/unblock during open mode connection"""
30     rfk = get_rfkill(dev[0])
31
32     hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
33     dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
34     try:
35         logger.info("rfkill block")
36         rfk.block()
37         dev[0].wait_disconnected(timeout=10,
38                                  error="Missing disconnection event on rfkill block")
39
40         if "FAIL" not in dev[0].request("REASSOCIATE"):
41             raise Exception("REASSOCIATE accepted while disabled")
42         if "FAIL" not in dev[0].request("REATTACH"):
43             raise Exception("REATTACH accepted while disabled")
44         if "FAIL" not in dev[0].request("RECONNECT"):
45             raise Exception("RECONNECT accepted while disabled")
46         if "FAIL" not in dev[0].request("FETCH_OSU"):
47             raise Exception("FETCH_OSU accepted while disabled")
48
49         logger.info("rfkill unblock")
50         rfk.unblock()
51         dev[0].wait_connected(timeout=10,
52                               error="Missing connection event on rfkill unblock")
53         hwsim_utils.test_connectivity(dev[0], hapd)
54     finally:
55         rfk.unblock()
56
57 def test_rfkill_wpa2_psk(dev, apdev):
58     """rfkill block/unblock during WPA2-PSK connection"""
59     rfk = get_rfkill(dev[0])
60
61     ssid = "test-wpa2-psk"
62     passphrase = 'qwertyuiop'
63     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
64     hapd = hostapd.add_ap(apdev[0]['ifname'], params)
65     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
66     try:
67         logger.info("rfkill block")
68         rfk.block()
69         dev[0].wait_disconnected(timeout=10,
70                                  error="Missing disconnection event on rfkill block")
71
72         logger.info("rfkill unblock")
73         rfk.unblock()
74         dev[0].wait_connected(timeout=10,
75                               error="Missing connection event on rfkill unblock")
76         hwsim_utils.test_connectivity(dev[0], hapd)
77     finally:
78         rfk.unblock()
79
80 def test_rfkill_autogo(dev, apdev):
81     """rfkill block/unblock for autonomous P2P GO"""
82     rfk0 = get_rfkill(dev[0])
83     rfk1 = get_rfkill(dev[1])
84
85     dev[0].p2p_start_go()
86     dev[1].request("SET p2p_no_group_iface 0")
87     dev[1].p2p_start_go()
88
89     try:
90         logger.info("rfkill block 0")
91         rfk0.block()
92         ev = dev[0].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
93         if ev is None:
94             raise Exception("Group removal not reported")
95         if "reason=UNAVAILABLE" not in ev:
96             raise Exception("Unexpected group removal reason: " + ev)
97         if "FAIL" not in dev[0].request("P2P_LISTEN 1"):
98             raise Exception("P2P_LISTEN accepted unexpectedly")
99         if "FAIL" not in dev[0].request("P2P_LISTEN"):
100             raise Exception("P2P_LISTEN accepted unexpectedly")
101
102         logger.info("rfkill block 1")
103         rfk1.block()
104         ev = dev[1].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
105         if ev is None:
106             raise Exception("Group removal not reported")
107         if "reason=UNAVAILABLE" not in ev:
108             raise Exception("Unexpected group removal reason: " + ev)
109
110         logger.info("rfkill unblock 0")
111         rfk0.unblock()
112         logger.info("rfkill unblock 1")
113         rfk1.unblock()
114         time.sleep(1)
115     finally:
116         rfk0.unblock()
117         rfk1.unblock()
118
119 def test_rfkill_hostapd(dev, apdev):
120     """rfkill block/unblock during and prior to hostapd operations"""
121     hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open" })
122
123     rfk = get_rfkill(hapd)
124
125     try:
126         rfk.block()
127         ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
128         if ev is None:
129             raise Exception("INTERFACE-DISABLED event not seen")
130         rfk.unblock()
131         ev = hapd.wait_event(["INTERFACE-ENABLED"], timeout=5)
132         if ev is None:
133             raise Exception("INTERFACE-ENABLED event not seen")
134         # hostapd does not current re-enable beaconing automatically
135         hapd.disable()
136         hapd.enable()
137         dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
138         rfk.block()
139         ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
140         if ev is None:
141             raise Exception("INTERFACE-DISABLED event not seen")
142         dev[0].wait_disconnected(timeout=10)
143         dev[0].request("DISCONNECT")
144         hapd.disable()
145
146         hglobal = HostapdGlobal()
147         hglobal.flush()
148         hglobal.remove(apdev[0]['ifname'])
149
150         hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "open2" },
151                               no_enable=True)
152         if "FAIL" not in hapd.request("ENABLE"):
153             raise Exception("ENABLE succeeded unexpectedly (rfkill)")
154     finally:
155         rfk.unblock()
156
157 def test_rfkill_wpas(dev, apdev):
158     """rfkill block prior to wpa_supplicant start"""
159     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
160     wpas.interface_add("wlan5")
161     rfk = get_rfkill(wpas)
162     wpas.interface_remove("wlan5")
163     try:
164         rfk.block()
165         wpas.interface_add("wlan5")
166         time.sleep(0.5)
167         state = wpas.get_status_field("wpa_state")
168         if state != "INTERFACE_DISABLED":
169             raise Exception("Unexpected state with rfkill blocked: " + state)
170         rfk.unblock()
171         time.sleep(0.5)
172         state = wpas.get_status_field("wpa_state")
173         if state == "INTERFACE_DISABLED":
174             raise Exception("Unexpected state with rfkill unblocked: " + state)
175     finally:
176         rfk.unblock()