Home | History | Annotate | Download | only in network_WiFi_RoamSuspendTimeout
      1 # Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
      2 # Use of this source code is governed by a BSD-style license that can be
      3 # found in the LICENSE file.
      4 
      5 AUTHOR = 'wiley, pstew, quiche'
      6 NAME = 'network_WiFi_RoamSuspendTimeout.wpa'
      7 TIME = 'SHORT'
      8 TEST_TYPE = 'Server'
      9 ATTRIBUTES = "suite:wifi_flaky"
     10 DEPENDENCIES = 'wificell'
     11 
     12 DOC = """
     13 This tests verifies that we can reconnect to an AP broadcasting a WPA network
     14 using TKIP after deauthentication while the DUT is suspended.  TKIP is
     15 deprecated for having some security holes, and WPA is deprecated in favor of
     16 WPA2, but routers of a certain age only support this mode.
     17 """
     18 
     19 from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes
     20 from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types
     21 from autotest_lib.server.cros.network import hostap_config
     22 
     23 
     24 def run(machine):
     25     wpa_config = xmlrpc_security_types.WPAConfig(
     26             psk='chromeos',
     27             wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA,
     28             wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP])
     29     job.run_test('network_WiFi_RoamSuspendTimeout',
     30                  tag=NAME.split('.')[1],
     31                  host=hosts.create_host(machine),
     32                  raw_cmdline_args=args,
     33                  additional_params=hostap_config.HostapConfig(
     34                          frequency=2412,
     35                          mode=hostap_config.HostapConfig.MODE_11G,
     36                          security_config=wpa_config))
     37 
     38 
     39 parallel_simple(run, machines)
     40