1# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5AUTHOR = 'wiley, pstew, quiche'
6NAME = 'network_WiFi_RoamSuspendTimeout.wpa'
7TIME = 'SHORT'
8TEST_TYPE = 'Server'
9ATTRIBUTES = "suite:wifi_flaky"
10SUITE = 'wifi_flaky'
11DEPENDENCIES = 'wificell'
12
13DOC = """
14This tests verifies that we can reconnect to an AP broadcasting a WPA network
15using TKIP after deauthentication while the DUT is suspended.  TKIP is
16deprecated for having some security holes, and WPA is deprecated in favor of
17WPA2, but routers of a certain age only support this mode.
18"""
19
20from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes
21from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types
22from autotest_lib.server.cros.network import hostap_config
23
24
25def run(machine):
26    wpa_config = xmlrpc_security_types.WPAConfig(
27            psk='chromeos',
28            wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA,
29            wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP])
30    job.run_test('network_WiFi_RoamSuspendTimeout',
31                 tag=NAME.split('.')[1],
32                 host=hosts.create_host(machine),
33                 raw_cmdline_args=args,
34                 additional_params=hostap_config.HostapConfig(
35                         frequency=2412,
36                         mode=hostap_config.HostapConfig.MODE_11G,
37                         security_config=wpa_config))
38
39
40parallel_simple(run, machines)
41