blob: 6a381fce347aeb995aee2de21d96827cae80507f [file] [log] [blame]
# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
AUTHOR = 'wiley, pstew, quiche'
NAME = 'network_WiFi_RoamSuspendTimeout.wpa'
TIME = 'SHORT'
TEST_TYPE = 'Server'
ATTRIBUTES = "suite:wifi_flaky"
DEPENDENCIES = 'wificell'
DOC = """
This tests verifies that we can reconnect to an AP broadcasting a WPA network
using TKIP after deauthentication while the DUT is suspended. TKIP is
deprecated for having some security holes, and WPA is deprecated in favor of
WPA2, but routers of a certain age only support this mode.
"""
from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes
from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types
from autotest_lib.server.cros.network import hostap_config
def run(machine):
wpa_config = xmlrpc_security_types.WPAConfig(
psk='chromeos',
wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA,
wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP])
job.run_test('network_WiFi_RoamSuspendTimeout',
tag=NAME.split('.')[1],
host=hosts.create_host(machine),
raw_cmdline_args=args,
additional_params=hostap_config.HostapConfig(
frequency=2412,
mode=hostap_config.HostapConfig.MODE_11G,
security_config=wpa_config))
parallel_simple(run, machines)