# Copyright (c) 2013 The Chromium OS Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. AUTHOR = 'wiley, pstew, quiche' NAME = 'network_WiFi_RoamSuspendTimeout.wpa' TIME = 'SHORT' TEST_TYPE = 'Server' ATTRIBUTES = "suite:wifi_flaky" SUITE = 'wifi_flaky' DEPENDENCIES = 'wificell' DOC = """ This tests verifies that we can reconnect to an AP broadcasting a WPA network using TKIP after deauthentication while the DUT is suspended. TKIP is deprecated for having some security holes, and WPA is deprecated in favor of WPA2, but routers of a certain age only support this mode. """ from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types from autotest_lib.server.cros.network import hostap_config def run(machine): wpa_config = xmlrpc_security_types.WPAConfig( psk='chromeos', wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA, wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP]) job.run_test('network_WiFi_RoamSuspendTimeout', tag=NAME.split('.')[1], host=hosts.create_host(machine), raw_cmdline_args=args, additional_params=hostap_config.HostapConfig( frequency=2412, mode=hostap_config.HostapConfig.MODE_11G, security_config=wpa_config)) parallel_simple(run, machines)