1# rfkill tests
2# Copyright (c) 2014, Jouni Malinen <j@w1.fi>
3#
4# This software may be distributed under the terms of the BSD license.
5# See README for more details.
6
7import logging
8logger = logging.getLogger()
9import time
10
11import hostapd
12from hostapd import HostapdGlobal
13import hwsim_utils
14from wpasupplicant import WpaSupplicant
15from rfkill import RFKill
16from utils import HwsimSkip
17from hwsim import HWSimRadio
18
19def get_rfkill(dev):
20    phy = dev.get_driver_status_field("phyname")
21    try:
22        for r, s, h in RFKill.list():
23            if r.name == phy:
24                return r
25    except Exception as e:
26        raise HwsimSkip("No rfkill available: " + str(e))
27    raise HwsimSkip("No rfkill match found for the interface")
28
29def test_rfkill_open(dev, apdev):
30    """rfkill block/unblock during open mode connection"""
31    rfk = get_rfkill(dev[0])
32
33    hapd = hostapd.add_ap(apdev[0], {"ssid": "open"})
34    dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
35    try:
36        logger.info("rfkill block")
37        rfk.block()
38        dev[0].wait_disconnected(timeout=10,
39                                 error="Missing disconnection event on rfkill block")
40
41        if "FAIL" not in dev[0].request("REASSOCIATE"):
42            raise Exception("REASSOCIATE accepted while disabled")
43        if "FAIL" not in dev[0].request("REATTACH"):
44            raise Exception("REATTACH accepted while disabled")
45        if "FAIL" not in dev[0].request("RECONNECT"):
46            raise Exception("RECONNECT accepted while disabled")
47
48        logger.info("rfkill unblock")
49        rfk.unblock()
50        dev[0].wait_connected(timeout=10,
51                              error="Missing connection event on rfkill unblock")
52        hwsim_utils.test_connectivity(dev[0], hapd)
53    finally:
54        rfk.unblock()
55
56def test_rfkill_wpa2_psk(dev, apdev):
57    """rfkill block/unblock during WPA2-PSK connection"""
58    rfk = get_rfkill(dev[0])
59
60    ssid = "test-wpa2-psk"
61    passphrase = 'qwertyuiop'
62    params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
63    hapd = hostapd.add_ap(apdev[0], params)
64    dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
65    hapd.wait_sta()
66    try:
67        logger.info("rfkill block")
68        rfk.block()
69        dev[0].wait_disconnected(timeout=10,
70                                 error="Missing disconnection event on rfkill block")
71
72        logger.info("rfkill unblock")
73        rfk.unblock()
74        dev[0].wait_connected(timeout=10,
75                              error="Missing connection event on rfkill unblock")
76        hapd.wait_sta()
77        hwsim_utils.test_connectivity(dev[0], hapd)
78    finally:
79        rfk.unblock()
80
81def test_rfkill_autogo(dev, apdev):
82    """rfkill block/unblock for autonomous P2P GO"""
83    rfk0 = get_rfkill(dev[0])
84    rfk1 = get_rfkill(dev[1])
85
86    dev[0].p2p_start_go()
87    dev[1].request("SET p2p_no_group_iface 0")
88    dev[1].p2p_start_go()
89
90    try:
91        logger.info("rfkill block 0")
92        rfk0.block()
93        ev = dev[0].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
94        if ev is None:
95            raise Exception("Group removal not reported")
96        if "reason=UNAVAILABLE" not in ev:
97            raise Exception("Unexpected group removal reason: " + ev)
98        if "FAIL" not in dev[0].request("P2P_LISTEN 1"):
99            raise Exception("P2P_LISTEN accepted unexpectedly")
100        if "FAIL" not in dev[0].request("P2P_LISTEN"):
101            raise Exception("P2P_LISTEN accepted unexpectedly")
102
103        logger.info("rfkill block 1")
104        rfk1.block()
105        ev = dev[1].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10)
106        if ev is None:
107            raise Exception("Group removal not reported")
108        if "reason=UNAVAILABLE" not in ev:
109            raise Exception("Unexpected group removal reason: " + ev)
110
111        logger.info("rfkill unblock 0")
112        rfk0.unblock()
113        logger.info("rfkill unblock 1")
114        rfk1.unblock()
115        time.sleep(1)
116    finally:
117        rfk0.unblock()
118        rfk1.unblock()
119
120def _test_rfkill_p2p_discovery(dev0, dev1):
121    """rfkill block/unblock P2P Discovery"""
122    rfk0 = get_rfkill(dev0)
123    rfk1 = get_rfkill(dev1)
124
125    try:
126        addr0 = dev0.p2p_dev_addr()
127
128        logger.info("rfkill block 0")
129        rfk0.block()
130        logger.info("rfkill block 1")
131        rfk1.block()
132
133        for i in range(10):
134            time.sleep(0.1)
135            if dev0.get_status_field("wpa_state") == "INTERFACE_DISABLED" and dev1.get_status_field("wpa_state") == "INTERFACE_DISABLED":
136                break
137
138        if "OK" in dev0.p2p_listen():
139            raise Exception("P2P Listen success although in rfkill")
140
141        if "OK" in dev1.p2p_find():
142            raise Exception("P2P Find success although in rfkill")
143
144        dev0.dump_monitor()
145        dev1.dump_monitor()
146
147        logger.info("rfkill unblock 0")
148        rfk0.unblock()
149        logger.info("rfkill unblock 1")
150        rfk1.unblock()
151
152        for i in range(10):
153            time.sleep(0.1)
154            if dev0.get_status_field("wpa_state") != "INTERFACE_DISABLED" and dev1.get_status_field("wpa_state") != "INTERFACE_DISABLED":
155                break
156
157        if "OK" not in dev0.p2p_listen():
158            raise Exception("P2P Listen failed after unblocking rfkill")
159
160        if not dev1.discover_peer(addr0, social=True):
161            raise Exception("Failed to discover peer after unblocking rfkill")
162
163    finally:
164        rfk0.unblock()
165        rfk1.unblock()
166        dev0.p2p_stop_find()
167        dev1.p2p_stop_find()
168        dev0.dump_monitor()
169        dev1.dump_monitor()
170
171def test_rfkill_p2p_discovery(dev, apdev):
172    """rfkill block/unblock P2P Discovery"""
173    _test_rfkill_p2p_discovery(dev[0], dev[1])
174
175def test_rfkill_p2p_discovery_p2p_dev(dev, apdev):
176    """rfkill block/unblock P2P Discovery with P2P Device"""
177    with HWSimRadio(use_p2p_device=True) as (radio, iface):
178        wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
179        wpas.interface_add(iface)
180        _test_rfkill_p2p_discovery(dev[0], wpas)
181        _test_rfkill_p2p_discovery(wpas, dev[1])
182
183def test_rfkill_hostapd(dev, apdev):
184    """rfkill block/unblock during and prior to hostapd operations"""
185    hapd = hostapd.add_ap(apdev[0], {"ssid": "open"})
186
187    rfk = get_rfkill(hapd)
188
189    try:
190        rfk.block()
191        ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
192        if ev is None:
193            raise Exception("INTERFACE-DISABLED event not seen")
194        rfk.unblock()
195        ev = hapd.wait_event(["INTERFACE-ENABLED"], timeout=5)
196        if ev is None:
197            raise Exception("INTERFACE-ENABLED event not seen")
198        # hostapd does not current re-enable beaconing automatically
199        hapd.disable()
200        hapd.enable()
201        dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
202        rfk.block()
203        ev = hapd.wait_event(["INTERFACE-DISABLED"], timeout=5)
204        if ev is None:
205            raise Exception("INTERFACE-DISABLED event not seen")
206        dev[0].wait_disconnected(timeout=10)
207        dev[0].request("DISCONNECT")
208        hapd.disable()
209
210        hglobal = HostapdGlobal(apdev[0])
211        hglobal.flush()
212        hglobal.remove(apdev[0]['ifname'])
213
214        hapd = hostapd.add_ap(apdev[0], {"ssid": "open2"},
215                              no_enable=True)
216        if "FAIL" not in hapd.request("ENABLE"):
217            raise Exception("ENABLE succeeded unexpectedly (rfkill)")
218    finally:
219        rfk.unblock()
220
221def test_rfkill_wpas(dev, apdev):
222    """rfkill block prior to wpa_supplicant start"""
223    wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
224    wpas.interface_add("wlan5")
225    rfk = get_rfkill(wpas)
226    wpas.interface_remove("wlan5")
227    try:
228        rfk.block()
229        wpas.interface_add("wlan5")
230        time.sleep(0.5)
231        state = wpas.get_status_field("wpa_state")
232        if state != "INTERFACE_DISABLED":
233            raise Exception("Unexpected state with rfkill blocked: " + state)
234        rfk.unblock()
235        time.sleep(0.5)
236        state = wpas.get_status_field("wpa_state")
237        if state == "INTERFACE_DISABLED":
238            raise Exception("Unexpected state with rfkill unblocked: " + state)
239    finally:
240        rfk.unblock()
241