1# Copyright (c) 2013 The Chromium OS Authors. All rights reserved. 2# Use of this source code is governed by a BSD-style license that can be 3# found in the LICENSE file. 4 5AUTHOR = 'wiley, pstew, quiche' 6NAME = 'network_WiFi_RoamSuspendTimeout.wpa' 7TIME = 'SHORT' 8TEST_TYPE = 'Server' 9ATTRIBUTES = "suite:wifi_flaky" 10DEPENDENCIES = 'wificell' 11 12DOC = """ 13This tests verifies that we can reconnect to an AP broadcasting a WPA network 14using TKIP after deauthentication while the DUT is suspended. TKIP is 15deprecated for having some security holes, and WPA is deprecated in favor of 16WPA2, but routers of a certain age only support this mode. 17""" 18 19from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes 20from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types 21from autotest_lib.server.cros.network import hostap_config 22 23 24def run(machine): 25 wpa_config = xmlrpc_security_types.WPAConfig( 26 psk='chromeos', 27 wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA, 28 wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP]) 29 job.run_test('network_WiFi_RoamSuspendTimeout', 30 tag=NAME.split('.')[1], 31 host=hosts.create_host(machine), 32 raw_cmdline_args=args, 33 additional_params=hostap_config.HostapConfig( 34 frequency=2412, 35 mode=hostap_config.HostapConfig.MODE_11G, 36 security_config=wpa_config)) 37 38 39parallel_simple(run, machines) 40