Home | History | Annotate | Download | only in network_WiFi_RoamSuspendTimeout
      1 # Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
      2 # Use of this source code is governed by a BSD-style license that can be
      3 # found in the LICENSE file.
      4 
      5 AUTHOR = 'wiley, pstew, quiche'
      6 NAME = 'network_WiFi_RoamSuspendTimeout.wpa'
      7 TIME = 'SHORT'
      8 TEST_TYPE = 'Server'
      9 ATTRIBUTES = "suite:wifi_flaky"
     10 SUITE = 'wifi_flaky'
     11 DEPENDENCIES = 'wificell'
     12 
     13 DOC = """
     14 This tests verifies that we can reconnect to an AP broadcasting a WPA network
     15 using TKIP after deauthentication while the DUT is suspended.  TKIP is
     16 deprecated for having some security holes, and WPA is deprecated in favor of
     17 WPA2, but routers of a certain age only support this mode.
     18 """
     19 
     20 from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes
     21 from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types
     22 from autotest_lib.server.cros.network import hostap_config
     23 
     24 
     25 def run(machine):
     26     wpa_config = xmlrpc_security_types.WPAConfig(
     27             psk='chromeos',
     28             wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA,
     29             wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP])
     30     job.run_test('network_WiFi_RoamSuspendTimeout',
     31                  tag=NAME.split('.')[1],
     32                  host=hosts.create_host(machine),
     33                  raw_cmdline_args=args,
     34                  additional_params=hostap_config.HostapConfig(
     35                          frequency=2412,
     36                          mode=hostap_config.HostapConfig.MODE_11G,
     37                          security_config=wpa_config))
     38 
     39 
     40 parallel_simple(run, machines)
     41