1 # Copyright (c) 2013 The Chromium OS Authors. All rights reserved. 2 # Use of this source code is governed by a BSD-style license that can be 3 # found in the LICENSE file. 4 5 AUTHOR = 'wiley, pstew, quiche' 6 NAME = 'network_WiFi_RoamSuspendTimeout.wpa' 7 TIME = 'SHORT' 8 TEST_TYPE = 'Server' 9 ATTRIBUTES = "suite:wifi_flaky" 10 DEPENDENCIES = 'wificell' 11 12 DOC = """ 13 This tests verifies that we can reconnect to an AP broadcasting a WPA network 14 using TKIP after deauthentication while the DUT is suspended. TKIP is 15 deprecated for having some security holes, and WPA is deprecated in favor of 16 WPA2, but routers of a certain age only support this mode. 17 """ 18 19 from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes 20 from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types 21 from autotest_lib.server.cros.network import hostap_config 22 23 24 def run(machine): 25 wpa_config = xmlrpc_security_types.WPAConfig( 26 psk='chromeos', 27 wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA, 28 wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP]) 29 job.run_test('network_WiFi_RoamSuspendTimeout', 30 tag=NAME.split('.')[1], 31 host=hosts.create_host(machine), 32 raw_cmdline_args=args, 33 additional_params=hostap_config.HostapConfig( 34 frequency=2412, 35 mode=hostap_config.HostapConfig.MODE_11G, 36 security_config=wpa_config)) 37 38 39 parallel_simple(run, machines) 40