Updated to hostap_2_6
[mech_eap.git] / libeap / tests / hwsim / test_rfkill.py
1 # rfkill tests
2 # Copyright (c) 2014, Jouni Malinen <j@w1.fi>
3 #
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
6
7 import logging
8 logger = logging.getLogger()
9 import time
10
11 import hostapd
12 from hostapd import HostapdGlobal
13 import hwsim_utils
14 from wpasupplicant import WpaSupplicant
15 from rfkill import RFKill
16 from utils import HwsimSkip
17 from hwsim import HWSimRadio
18
19 def get_rfkill(dev):
20     phy = dev.get_driver_status_field("phyname")
21     try:
22         for r, s, h in RFKill.list():
23             if r.name == phy:
24                 return r
25     except Exception, e:
26         raise HwsimSkip("No rfkill available: " + str(e))
27     raise HwsimSkip("No rfkill match found for the interface")
28
29 def test_rfkill_open(dev, apdev):
30     """rfkill block/unblock during open mode connection"""
31     rfk = get_rfkill(dev[0])
32
33     hapd = hostapd.add_ap(apdev[0], { "ssid": "open" })
34     dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
35     try:
36         logger.info("rfkill block")
37         rfk.block()
38         dev[0].wait_disconnected(timeout=10,
39                                  error="Missing disconnection event on rfkill block")
40
41         if "FAIL" not in dev[0].request("REASSOCIATE"):
42             raise Exception("REASSOCIATE accepted while disabled")
43         if "FAIL" not in dev[0].request("REATTACH"):
44             raise Exception("REATTACH accepted while disabled")
45         if "FAIL" not in dev[0].request("RECONNECT"):
46             raise Exception("RECONNECT accepted while disabled")
47         if "FAIL" not in dev[0].request("FETCH_OSU"):
48             raise Exception("FETCH_OSU accepted while disabled")
49
50         logger.info("rfkill unblock")
51         rfk.unblock()
52         dev[0].wait_connected(timeout=10,
53                               error="Missing connection event on rfkill unblock")
54         hwsim_utils.test_connectivity(dev[0], hapd)
55     finally:
56         rfk.unblock()
57
58 def test_rfkill_wpa2_psk(dev, apdev):
59     """rfkill block/unblock during WPA2-PSK connection"""
60     rfk = get_rfkill(dev[0])
61
62     ssid = "test-wpa2-psk"
63     passphrase = 'qwertyuiop'
64     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
65     hapd = hostapd.add_ap(apdev[0], params)
66     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
67     try:
68         logger.info("rfkill block")
69         rfk.block()
70         dev[0].wait_disconnected(timeout=10,
71                                  error="Missing disconnection event on rfkill block")
72
73         logger.info("rfkill unblock")
74         rfk.unblock()
75         dev[0].wait_connected(timeout=10,
76                               error="Missing connection event on rfkill unblock")
77         hwsim_utils.test_connectivity(dev[0], hapd)
78     finally:
79         rfk.unblock()
80
81 def test_rfkill_autogo(dev, apdev):
82     """rfkill block/unblock for autonomous P2P GO"""
83     rfk0 = get_rfkill(dev[0])
84     rfk1 = get_rfkill(dev[1])
85
86     dev[0].p2p_start_go()
87     dev[1].request("SET p2p_no_group_iface 0")
88     dev[1].p2p_start_go()
89
90     try:
91         logger.info("rfkill block 0")
92         rfk0.block()
93         ev = dev[0].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
94         if ev is None:
95             raise Exception("Group removal not reported")
96         if "reason=UNAVAILABLE" not in ev:
97             raise Exception("Unexpected group removal reason: " + ev)
98         if "FAIL" not in dev[0].request("P2P_LISTEN 1"):
99             raise Exception("P2P_LISTEN accepted unexpectedly")
100         if "FAIL" not in dev[0].request("P2P_LISTEN"):
101             raise Exception("P2P_LISTEN accepted unexpectedly")
102
103         logger.info("rfkill block 1")
104         rfk1.block()
105         ev = dev[1].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
106         if ev is None:
107             raise Exception("Group removal not reported")
108         if "reason=UNAVAILABLE" not in ev:
109             raise Exception("Unexpected group removal reason: " + ev)
110
111         logger.info("rfkill unblock 0")
112         rfk0.unblock()
113         logger.info("rfkill unblock 1")
114         rfk1.unblock()
115         time.sleep(1)
116     finally:
117         rfk0.unblock()
118         rfk1.unblock()
119
120 def _test_rfkill_p2p_discovery(dev0, dev1):
121     """rfkill block/unblock P2P Discovery"""
122     rfk0 = get_rfkill(dev0)
123     rfk1 = get_rfkill(dev1)
124
125     try:
126         addr0 = dev0.p2p_dev_addr()
127
128         logger.info("rfkill block 0")
129         rfk0.block()
130         logger.info("rfkill block 1")
131         rfk1.block()
132
133         for i in range(10):
134             time.sleep(0.1)
135             if dev0.get_status_field("wpa_state") == "INTERFACE_DISABLED" and dev1.get_status_field("wpa_state") == "INTERFACE_DISABLED":
136                 break
137
138         if "OK" in dev0.p2p_listen():
139             raise Exception("P2P Listen success although in rfkill")
140
141         if "OK" in dev1.p2p_find():
142             raise Exception("P2P Find success although in rfkill")
143
144         dev0.dump_monitor()
145         dev1.dump_monitor()
146
147         logger.info("rfkill unblock 0")
148         rfk0.unblock()
149         logger.info("rfkill unblock 1")
150         rfk1.unblock()
151
152         for i in range(10):
153             time.sleep(0.1)
154             if dev0.get_status_field("wpa_state") != "INTERFACE_DISABLED" and dev1.get_status_field("wpa_state") != "INTERFACE_DISABLED":
155                 break
156
157         if not "OK" in dev0.p2p_listen():
158             raise Exception("P2P Listen failed after unblocking rfkill")
159
160         if not dev1.discover_peer(addr0, social=True):
161             raise Exception("Failed to discover peer after unblocking rfkill")
162
163     finally:
164         rfk0.unblock()
165         rfk1.unblock()
166         dev0.p2p_stop_find()
167         dev1.p2p_stop_find()
168         dev0.dump_monitor()
169         dev1.dump_monitor()
170
171 def test_rfkill_p2p_discovery(dev, apdev):
172     """rfkill block/unblock P2P Discovery"""
173     _test_rfkill_p2p_discovery(dev[0], dev[1])
174
175 def test_rfkill_p2p_discovery_p2p_dev(dev, apdev):
176     """rfkill block/unblock P2P Discovery with P2P Device"""
177     with HWSimRadio(use_p2p_device=True) as (radio, iface):
178         wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
179         wpas.interface_add(iface)
180         _test_rfkill_p2p_discovery(dev[0], wpas)
181         _test_rfkill_p2p_discovery(wpas, dev[1])
182
183 def test_rfkill_hostapd(dev, apdev):
184     """rfkill block/unblock during and prior to hostapd operations"""
185     hapd = hostapd.add_ap(apdev[0], { "ssid": "open" })
186
187     rfk = get_rfkill(hapd)
188
189     try:
190         rfk.block()
191         ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
192         if ev is None:
193             raise Exception("INTERFACE-DISABLED event not seen")
194         rfk.unblock()
195         ev = hapd.wait_event(["INTERFACE-ENABLED"], timeout=5)
196         if ev is None:
197             raise Exception("INTERFACE-ENABLED event not seen")
198         # hostapd does not current re-enable beaconing automatically
199         hapd.disable()
200         hapd.enable()
201         dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
202         rfk.block()
203         ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
204         if ev is None:
205             raise Exception("INTERFACE-DISABLED event not seen")
206         dev[0].wait_disconnected(timeout=10)
207         dev[0].request("DISCONNECT")
208         hapd.disable()
209
210         hglobal = HostapdGlobal(apdev[0])
211         hglobal.flush()
212         hglobal.remove(apdev[0]['ifname'])
213
214         hapd = hostapd.add_ap(apdev[0], { "ssid": "open2" },
215                               no_enable=True)
216         if "FAIL" not in hapd.request("ENABLE"):
217             raise Exception("ENABLE succeeded unexpectedly (rfkill)")
218     finally:
219         rfk.unblock()
220
221 def test_rfkill_wpas(dev, apdev):
222     """rfkill block prior to wpa_supplicant start"""
223     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
224     wpas.interface_add("wlan5")
225     rfk = get_rfkill(wpas)
226     wpas.interface_remove("wlan5")
227     try:
228         rfk.block()
229         wpas.interface_add("wlan5")
230         time.sleep(0.5)
231         state = wpas.get_status_field("wpa_state")
232         if state != "INTERFACE_DISABLED":
233             raise Exception("Unexpected state with rfkill blocked: " + state)
234         rfk.unblock()
235         time.sleep(0.5)
236         state = wpas.get_status_field("wpa_state")
237         if state == "INTERFACE_DISABLED":
238             raise Exception("Unexpected state with rfkill unblocked: " + state)
239     finally:
240         rfk.unblock()