1 # Copyright 2015 The Chromium OS Authors. All rights reserved. 2 # Use of this source code is governed by a BSD-style license that can be 3 # found in the LICENSE file. 4 5 from autotest_lib.server import utils 6 7 AUTHOR = 'samueltan, ejcaruso' 8 NAME = 'network_WiFi_DarkResumeActiveScans' 9 TIME = 'MEDIUM' 10 TEST_TYPE = 'Server' 11 DEPENDENCIES = 'wificell, servo, lucidsleep' 12 ATTRIBUTES = 'suite:wifi_correctness_cros_core, suite:wifi_lucidsleep' 13 14 DOC = """ 15 When wake on WiFi is supported and enabled, our system could wake up from 16 suspend in dark resume for several reasons. Due to privacy concerns, we do not 17 want active scans to be launched on certain types of dark resume wakes where the 18 user does not expect information that can uniquely identify their system 19 (e.g. MAC addresses) to be broadcasted. 20 21 We permit active scans to be launched when the system wakes up due to a SSID 22 match or disconnect, since we might try to connect or reconnect to known 23 networks during these periods, and the connection/authentication process 24 inevitably broadcasts MAC addresses. 25 26 However, when the system wakes up due to a RTC timer (e.g. the periodic scan 27 timer or DHCP lease renewal timer) or a packet pattern match, we expect the 28 system to carry out its tasks and re-suspend without active scanning and 29 broadcasting MAC addresses. 30 31 This test attempts to verify that no active scans are started in dark resumes 32 that are triggered by RTC timers or packet pattern matches. Verify this by 33 triggering these wake events and analyzing packet captures to ensure that the 34 DUT does not launch any probe requests during these dark resumes. 35 """ 36 37 args_dict = utils.args_to_dict(args) 38 servo_args = hosts.CrosHost.get_servo_arguments(args_dict) 39 40 def run(machine): 41 host = hosts.create_host(machine, servo_args=servo_args) 42 job.run_test('network_WiFi_DarkResumeActiveScans', 43 host=host, 44 raw_cmdline_args=args) 45 46 parallel_simple(run, machines) 47