Index: server/site_tests/network_WiFiSecMat/015CheckWPA_PTK_Rekey |
diff --git a/server/site_tests/network_WiFiSecMat/015CheckWPA_PTK_Rekey b/server/site_tests/network_WiFiSecMat/015CheckWPA_PTK_Rekey |
new file mode 100644 |
index 0000000000000000000000000000000000000000..1e4d23655ceac57efee13196a84b7856b14176af |
--- /dev/null |
+++ b/server/site_tests/network_WiFiSecMat/015CheckWPA_PTK_Rekey |
@@ -0,0 +1,21 @@ |
+# Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
+# Use of this source code is governed by a BSD-style license that can be |
+# found in the LICENSE file. |
+ |
+{ "name":"CheckWPA_PTK_Rekey", |
+ "steps":[ # Channel [any] |
+ [ "create", { "type":"hostap" } ], |
+ [ "config", { "channel":"2412", "mode":"11g", |
+ "wpa":"3", "wpa_key_mgmt":"WPA-PSK", |
+ "wpa_pairwise":"TKIP CCMP", |
+ "rsn_pairwise":"CCMP", |
+ "wpa_ptk_rekey":"10", # rekey every 10 secs |
+ "wpa_passphrase":"chromeos" } ], |
+ [ "connect", { "security":"rsn", "psk":"chromeos" } ], |
+ # NB: 200 packets @ 1/5 sec intervals should take >>10 secs so |
+ # there should be several rekeys; check the tx/rx counts to verify |
+ # nothing was lost |
+ [ "client_ping", { "count":"200", "interval":".2" } ], |
+ [ "destroy" ], |
+ ], |
+} |