1# Copyright (c) 2013 The Chromium OS Authors. All rights reserved. 2# Use of this source code is governed by a BSD-style license that can be 3# found in the LICENSE file. 4 5AUTHOR = 'wiley, pstew, quiche' 6NAME = 'network_WiFi_RoamSuspendTimeout.wpa' 7TIME = 'SHORT' 8TEST_TYPE = 'Server' 9ATTRIBUTES = "suite:wifi_flaky" 10SUITE = 'wifi_flaky' 11DEPENDENCIES = 'wificell' 12 13DOC = """ 14This tests verifies that we can reconnect to an AP broadcasting a WPA network 15using TKIP after deauthentication while the DUT is suspended. TKIP is 16deprecated for having some security holes, and WPA is deprecated in favor of 17WPA2, but routers of a certain age only support this mode. 18""" 19 20from autotest_lib.client.common_lib.cros.network import xmlrpc_datatypes 21from autotest_lib.client.common_lib.cros.network import xmlrpc_security_types 22from autotest_lib.server.cros.network import hostap_config 23 24 25def run(machine): 26 wpa_config = xmlrpc_security_types.WPAConfig( 27 psk='chromeos', 28 wpa_mode=xmlrpc_security_types.WPAConfig.MODE_PURE_WPA, 29 wpa_ciphers=[xmlrpc_security_types.WPAConfig.CIPHER_TKIP]) 30 job.run_test('network_WiFi_RoamSuspendTimeout', 31 tag=NAME.split('.')[1], 32 host=hosts.create_host(machine), 33 raw_cmdline_args=args, 34 additional_params=hostap_config.HostapConfig( 35 frequency=2412, 36 mode=hostap_config.HostapConfig.MODE_11G, 37 security_config=wpa_config)) 38 39 40parallel_simple(run, machines) 41