blob: d296d22cde9fce4a95a81a557887ccce99832657 [file] [log] [blame]
# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
AUTHOR = "pstew@chromium.org"
NAME = "network_VPNConnect.l2tpipsec_psk"
PURPOSE = "Verify shill correctly authenticates to an L2TP/IPSec PSK VPN"
SUITE = "network_nightly"
CRITERIA = """
This test fails if the DUT cannot authenticate to a locally running
L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
interface.
"""
TIME = "SHORT"
TEST_CATEGORY = "Functional"
TEST_CLASS = "network"
TEST_TYPE = "client"
DOC = """
Tests that we can complete L2TP/IPSec PSK VPN authentication.
This is a client-only test which verifies function of the L2TP/IPSec
client. Since the server it is testing against is itself, this test
is best suited for verifying that the connection manager and VPN
manager are correctly passing parameters to the underlying VPN client
to have it properly connect.
"""
job.run_test('network_VPNConnect',
vpn_type='l2tpipsec-psk',
tag=NAME.split('.')[1])