# Copyright (c) 2013 The Chromium OS Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. AUTHOR = 'pstew, wiley, quiche' NAME = 'network_VPNConnect.l2tpipsec_psk' ATTRIBUTES = "suite:bvt-perbuild, suite:network_nightly, suite:toolchain-tests" TIME = 'SHORT' TEST_TYPE = 'client' DOC = """ Tests that we can complete L2TP/IPSec PSK VPN authentication. This is a client-only test which verifies function of the L2TP/IPSec client. Since the server it is testing against is itself, this test is best suited for verifying that the connection manager and VPN manager are correctly passing parameters to the underlying VPN client to have it properly connect. This test fails if the DUT cannot authenticate to a locally running L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet interface. The -evil variant simulates connecting to a VPN gateway that specifies its public IP as the point-to-point (remote) PPP address. This configuration has caused routing loops in the past, so we test it explicitly in order to catch regressions. """ job.run_test('network_VPNConnect', vpn_types=[ 'l2tpipsec-psk', 'l2tpipsec-psk-evil' ], tag=NAME.split('.')[1])