• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5AUTHOR = 'wiley, pstew, quiche'
6NAME = 'network_WiFi_RoamSuspendTimeout.wpa'
7TIME = 'SHORT'
8TEST_TYPE = 'Server'
9ATTRIBUTES = "suite:wifi_flaky"
10DEPENDENCIES = 'wificell'
11
12DOC = """
13This tests verifies that we can reconnect to an AP broadcasting a WPA network
14using TKIP after deauthentication while the DUT is suspended.  TKIP is
15deprecated for having some security holes, and WPA is deprecated in favor of
16WPA2, but routers of a certain age only support this mode.
17"""
18
19from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes
20from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types
21from autotest_lib.server.cros.network import hostap_config
22
23
24def run(machine):
25    wpa_config = xmlrpc_security_types.WPAConfig(
26            psk='chromeos',
27            wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA,
28            wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP])
29    job.run_test('network_WiFi_RoamSuspendTimeout',
30                 tag=NAME.split('.')[1],
31                 host=hosts.create_host(machine),
32                 raw_cmdline_args=args,
33                 additional_params=hostap_config.HostapConfig(
34                         frequency=2412,
35                         mode=hostap_config.HostapConfig.MODE_11G,
36                         security_config=wpa_config))
37
38
39parallel_simple(run, machines)
40