= Kleopatra Test Plan **Status: in progress** <> == Introduction The purpose of this test plan is to ensure Kleopatra works well on all supported operating systems. == Test environment Choose one combination of the following target platforms supported by Kleopatra. Operating system: * Windows Vista (32 or 64bit) * Windows 7 (32 or 64bit) * Windows 8 (32 or 64bit) * Windows 10 (32 or 64bit) It is recommended to use a clean virtual test environment, e.g. with [[https://www.virtualbox.org/|VirtualBox]]. == Preconditions * GnuPG (latest release) Installed * Kleoptra Installed * ~OpenPGP public key (*.asc or *.gpg) and private key (*.asc or *.gpg) * S/~M~I~M~E certificate chain (*.pem) and private key (*.p12) == Tests === Testsuite 1: Basic Functions ==== Testsuite 1.1: Create Certificates (OpenPGP) # Choose "File" from MenuBar # Click "New Secret Key" # Choose "OpenPGP Keypair" # Fill in some random information # Choose a Passphrase # The new Certificate will appear in the overview ==== Testsuite 1.2: Create Certificate-Request (X.509) # Choose "File" from MenuBar # Click "New Secret Key" # Choose "X.509 Keypair" # Fill some random information # Choose a Passphrase # Save the Certificate Request to file ==== Testsuite 1.3: Import Certificates (OpenPGP) # Choose "File" from MenuBar # Click "Import..." # Navigate to a previously exported Certificate # Click "Open" # The imported certificate will appear in the overview ==== Testsuite 1.4: Import Certificates incl. Trustchain (X.509) # Choose "File" from MenuBar # Click "Import..." # Navigate to a previously exported Certificate # Click "Open" # The imported certificate will appear in the overview ==== Testsuite 1.5: Encrypt Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Sign Option # Select an OpenPGP Certificate as Target # Click the Sign/Encrypt button # An Encrypted File is at the defined Target ==== Testsuite 1.6: Encrypt Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Sign Option # Select an X.509 Certificate as Target # Click the Sign/Encrypt button # An Encrypted File is at the defined Target ==== Testsuite 1.7: Sign Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Encrypt Option # Select an OpenPGP Certificate as Signing Source # Click the Sign/Encrypt button # A signed File is at the defined Target ==== Testsuite 1.8: Sign Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Encrypt Option # Select an X.509 Certificate as Signing Source # Click the Sign/Encrypt button # An signed File is at the defined Target ==== Testsuite 1.9: Sign & Encrypt Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Select an OpenPGP Certificate as Signing Source # Click the Sign/Encrypt button # A signed and enncrypted File is at the defined Target ==== Testsuite 1.10: Sign & Encrypt Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Select an X.509 Certificate as Signing Source # Click the Sign/Encrypt button # An signed and enncrypted File is at the defined Target ==== Testsuite 1.11: Decrypt Files (OpenPGP) # Click the Verify/Decrypt Files Button # Choose a file encrpyted to a OpenPGP certificate within the dialogue # Enter the Passphrase # A decrypted File is at the defined Target ==== Testsuite 1.12: Decrypt Files (X.509) # Click the Verify/Decrypt Files Button # Choose a file encrpyted to a X.509 certificate within the dialogue # Enter the Passphrase # A decrypted File is at the defined Target ==== Testsuite 1.13: Check Signature ==== Testsuite 1.14: Lookup Key on Server ==== Testsuite 1.15: Export public and private Key ==== Testsuite 1.16: Certify otheres Certificates ==== Testsuite 1.17: Folder Encrypt ==== Testsuite 1.18: Change Owner Trust === Testsuite 2: Advanced Functions ==== Testsuite 2.1: Revocation Certificates ==== Testsuite 2.2: Certificate Revocation List ==== Testsuite 2.3: Check Trust-Chains in WoT ==== Testsuite 2.4: Check TrustLevels in TOFU ==== Testsuite 2.5: Check Mixed Encryption with X.509 and OpenPGP ==== Testsuite 2.6: Check GnuPG-Tar Encryption ==== Testsuite 2.7: Change Certificate Server for X.509 ==== Testsuite 2.8: Change Validity ==== Testsuite 2.9: Export Trustchain ==== Testsuite 2.10: Check Certificate Details ==== Testsuite 2.11: add UID to Key ==== Testsuite 2.12: create Certificate using Brainpool === Testsuite 3: Interoperability ==== Testsuite 3.1: Check Integrity of Downloaded Files with Signatures ==== Testsuite 3.2: Decrypt File that was encrypted under Linux (OpenPGP) ==== Testsuite 3.3: Decrypt File that was encrypted under Linux (X.509) ==== Testsuite 3.4: Check Signature on File that was signed under linux (OpenPGP) ==== Testsuite 3.5: Check Signature on File that was signed under linux (X.509) ==== Testsuite 3.6: Verify Checksums === Testsuite 4: Kleoptra Smartcard Support ==== Testsuite 4.1: Initialize OpenPGP Smartcard ==== Testsuite 4.2: Use OpenPGP Smartcard for Encryption (OpenPGP 2.1) ==== Testsuite 4.3: Use OpenPGP Smartcard for Signing ==== Testsuite 4.4: Use X.509 Smartcard for Encryption (NetKey Card) ==== Testsuite 4.5: Use X.509 Smartcard for Signing (NetKey Card) ==== Testsuite 4.6: Use X.509 Smartcard for Trusted Signing (NetKey Card)