Size: 9297
Comment: Testsuite 2.7, 2.8, 2.10 - 2.12
|
Size: 10132
Comment: Removing obsolete Cases, add Targets to Headers and fix Uppercases
|
Deletions are marked like this. | Additions are marked like this. |
Line 33: | Line 33: |
==== Testsuite 1.1: Create Certificates (OpenPGP) # Choose "File" from MenuBar |
==== 1.1: Create Certificates (OpenPGP) # Choose "File" from menu-bar |
Line 38: | Line 38: |
# Choose a Passphrase # The new Certificate will appear in the overview ==== Testsuite 1.2: Create Certificate-Request (X.509) # Choose "File" from MenuBar |
# Choose a passphrase # The new certificate will appear in the overview ==== 1.2: Create Certificate-Request (X.509) # Choose "File" from menu-bar |
Line 46: | Line 46: |
# Choose a Passphrase # Save the Certificate Request to file ==== Testsuite 1.3: Import Certificates (OpenPGP) # Choose "File" from MenuBar |
# Choose a passphrase # Save the certificate request to file ==== 1.3: Import Certificates (OpenPGP) # Choose "File" from menu-bar |
Line 52: | Line 52: |
# Navigate to a previously exported Certificate | # Navigate to a previously exported certificate |
Line 56: | Line 56: |
==== Testsuite 1.4: Import Certificates incl. Trustchain (X.509) # Choose "File" from MenuBar |
==== 1.4: Import Certificates incl. Trustchain (X.509) # Choose "File" from menu-bar |
Line 59: | Line 59: |
# Navigate to a previously exported Certificate | # Navigate to a previously exported certificate |
Line 63: | Line 63: |
==== Testsuite 1.5: Encrypt Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Sign Option # Select an OpenPGP Certificate as Target # Click the Sign/Encrypt button # An Encrypted File is at the defined Target ==== Testsuite 1.6: Encrypt Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Sign Option # Select an X.509 Certificate as Target # Click the Sign/Encrypt button # An Encrypted File is at the defined Target ==== Testsuite 1.7: Sign Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Encrypt Option # Select an OpenPGP Certificate as Signing Source # Click the Sign/Encrypt button # A signed File is at the defined Target ==== Testsuite 1.8: Sign Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Encrypt Option # Select an X.509 Certificate as Signing Source # Click the Sign/Encrypt button # An signed File is at the defined Target ==== Testsuite 1.9: Sign & Encrypt Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Select an OpenPGP Certificate as Signing Source |
==== 1.5: Encrypt Files (OpenPGP) # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Deselect the "Sign" option # Select an OpenPGP certificate as target # Click the "Sign/Encrypt" button # An encrypted file is at the defined target ==== 1.6: Encrypt Files (X.509) # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Deselect the "Sign" option # Select an X.509 certificate as target # Click the "Sign/Encrypt" button # An encrypted file is at the defined Target ==== 1.7: Sign Files (OpenPGP) # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Deselect the "Encrypt" option # Select an OpenPGP certificate as signing source # Click the "Sign/Encrypt" button # A signed file is at the defined target ==== 1.8: Sign Files (X.509) # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Deselect the "Encrypt" option # Select an X.509 certificate as signing source # Click the "Sign/Encrypt" button # An signed file is at the defined Target ==== 1.9: Sign & Encrypt Files (OpenPGP) # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Select an OpenPGP certificate as signing source |
Line 103: | Line 103: |
==== Testsuite 1.10: Sign & Encrypt Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Select an X.509 Certificate as Signing Source # Click the Sign/Encrypt button # An signed and enncrypted File is at the defined Target ==== Testsuite 1.11: Decrypt Files (OpenPGP) # Click the Verify/Decrypt Files Button |
==== 1.10: Sign & Encrypt Files (X.509) # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Select an X.509 certificate as signing source # Click the "Sign/Encrypt" button # An signed and enncrypted file is at the defined target ==== 1.11: Decrypt Files (OpenPGP) # Click the "Verify/Decrypt Files" button |
Line 113: | Line 113: |
# Enter the Passphrase # A decrypted File is at the defined Target ==== Testsuite 1.12: Decrypt Files (X.509) # Click the Verify/Decrypt Files Button |
# Enter the passphrase # A decrypted file is at the defined target ==== 1.12: Decrypt Files (X.509) # Click the "Verify/Decrypt Files" button |
Line 119: | Line 119: |
# Enter the Passphrase # A decrypted File is at the defined Target ==== Testsuite 1.13: Check Signature # Click the Verify/Decrypt Files Button # Choose a signed File within the dialogue # Enter the Passphrase # A decrypted File is at the defined Target ==== Testsuite 1.14: Lookup Key on Server If no Server is defined, please execute Testsuite 2.13 first. |
# Enter the passphrase # A decrypted file is at the defined target ==== 1.13: Check Signature (OpenPGP) # Click the "Verify/Decrypt Files" button # Choose a signed file within the dialogue # Enter the passphraseS # A decrypted file is at the defined target ==== 1.14: Lookup Key on Server (OpenPGP) If no Server is defined, please execute Testsuite 2.8 first. |
Line 131: | Line 131: |
# Search for a Name (i.E. "Einstein") # Select a Key |
# Search for a name (i.E. "Einstein") # Select a key |
Line 134: | Line 134: |
# The imported key appears in the "Imported Certificates" Tab ==== Testsuite 1.15: Export public and private Key # Right Click on a Key you created before # Click the "Export..." Button # Select a Location in the dialogu |
# The imported key appears in the "Imported Certificates" tab ==== 1.14: Lookup Key on Server (X.509) If no Server is defined, please execute Testsuite 2.7 first. # Click on "Lookup on Server" # Search for a name (i.E. "Einstein") # Select a key # Click the "Import" button # The imported key appears in the "Imported Certificates" tab ==== 1.15: Export public and private Key (OpenPGP) # Right click on a key you created before # Click the "Export..." button # Select a location in the dialogue |
Line 141: | Line 149: |
# The eported Key is at the choosen location ==== Testsuite 1.16: Trust otheres Certificates |
# The eported key is at the choosen location ==== 1.16: Certify otheres Certificates (OpenPGP) |
Line 145: | Line 153: |
# Select the "Trust" option # Select the UIDs you want to Trust # Approve, that Fingerprints are checked |
# Select the "Certify" option # Select the UIDs you want to certify # Approve, that fingerprints are checked |
Line 150: | Line 158: |
# Enter the Passphrase of your Identity | # Enter the passphrase of your identity |
Line 153: | Line 161: |
# Click on Details # Check the Trust Level ==== Testsuite 1.17: Folder Encrypt # Click on File in the MenuBar # Select the "Sign/Encrypt Folder" Option # Select a Folder fron the Dialgue # Click the "Sign/Encrypt" Button # Enter your Passphrase # The encrypted Folder is at the selected Destination ==== Testsuite 1.18: Change Owner Trust # Right click on a imported Public key |
# Click on details # Check the trust level ==== 1.17: Change Owner Trust (OpenPGP) # Right click on a imported public key |
Line 170: | Line 170: |
==== Testsuite 2.1: Revocation Certificates # Click on "File" in the MenuBar # Select the Import Option # Select a Revocation Certificate for an imported Certificate ==== Testsuite 2.2: Certificate Revocation List # Select "Extras" in the MenuBar # Choose the "Import Revocation List from File" Option # Select the Revocation Certificate List on the File Dialogue ==== Testsuite 2.3: Check Trust-Chains in WoT # Create Two additional OpenPGP Certificates |
==== 2.1: Import Revocation Certificates (OpenPGP) # Click on "File" in the menu-bar # Select the "Import" option # Select a revocation certificate for an imported certificate # Click "Import" ==== 2.2: Certificate Revocation List (X.509) # Select "Extras" in the menu-bar # Choose the "Import Revocation List from File" option # Select the revocation certificate list on the file dialogue ==== 2.3: Check Trust-Chains in WoT (OpenPGP) # Create two additional OpenPGP certificates |
Line 183: | Line 184: |
# Change the Trust with the Second Certificate on the Third # Sign with the Second Certificate on the Third # Export the Public Key of the second and third key # Delete the Second and third key # Import the Public Keys of the second and third key # Check the Trust on the Third key ==== Testsuite 2.4: Check TrustLevels in TOFU ==== Testsuite 2.5: Check Mixed Encryption with X.509 and OpenPGP # Select the File Sing/Encrypt Option # Select a File from the File Dialogue # Deselect the Sign Option # Select two Recipients, one OpenPGP and X.509 Certificate # Click the Sign/Encrypt Button ==== Testsuite 2.6: Check GnuPG-Tar Encryption # Click on File in the MenuBar # Select the "Sign/Encrypt Folder" Option # Select a Folder fron the Dialgue # Click the "Sign/Encrypt" Button # Enter your Passphrase # The encrypted Folder is at the selected Destination ==== Testsuite 2.7: Change Certificate Server for X.509 # Select Preference in MenuBar # Click the Kleopatra preferences # Click on "New" in the Certificate Server dialogue # Enter the Details of your Server ==== Testsuite 2.8: Change Validity # Right Click one of your own OpenPGP Certificates # Click on Detials # Click on "Change" next to the Expires Option # Select a Date # Click on O.K. ==== Testsuite 2.9: Export Trustchain ==== Testsuite 2.10: Check Certificate Details # Right Click a Certificate |
# Change the trust with the second certificate on the third # Sign with the second certificate on the third # Export the public key of the second and third key # Delete the second and third key # Import the public keys of the second and third key # Check the trust on the third key ==== 2.4: Check TrustLevels in TOFU (OpenPGP) ==== 2.5: Check Mixed Encryption with X.509 and OpenPGP # Select the "File Sing/Encrypt" option # Select a file from the file dialogue # Deselect the "Sign" option # Select two recipients, one OpenPGP and X.509 certificate # Click the "Sign/Encrypt" button ==== 2.6: Check GnuPG-Tar Encryption (OpenPGP) # Click on "File" in the menu-bar # Select the "Sign/Encrypt Folder" option # Select a folder from the dialgue # Click the "Sign/Encrypt" button # Enter your passphrase # The encrypted folder is at the selected destination ==== 2.7: Create Certificate Server (X.509) # Select "Settings" in menu-bar # Click the "Kleopatra Settings" # Click on "New" and select X.509 in the certificate server dialogue # Enter the details of your server ==== 2.7: Create Certificate Server (OpenPGP) # Select "Settings" in menu-bar # Click the "Kleopatra Settings" # Click on "New" and select OpenPGP in the certificate server dialogue # Enter the details of your server ==== 2.8: Change Validity (OpenPGP) # Right click one of your own OpenPGP certificates # Click on details # Click on "Change" next to the "Expires" option # Select a date # Click on "O.K." ==== 2.9: Export Trustchain (X.509) # Right click on your own X.509 root # Choose "Export Certificates" # Select a destination to save to # Click "Save" ==== 2.10: Check Certificate Details (OpenPGP) # Right click a OpenPGP certificate |
Line 226: | Line 237: |
==== Testsuite 2.11: add UID to Key # Right Click a Certificate |
# Check the existing subkeys ==== 2.11: Check Certificate Details (X.509) # Right click a certificate # Choose "Details" # Choose "More Details" # Check the certificate dump ==== 2.12: add UID to Key (OpenPGP) # Right click a certificate |
Line 232: | Line 250: |
# Approve the Dialogue # Enter your Passphrase ==== Testsuite 2.12: create Certificate using Brainpool # Choose "File" from MenuBar # Select teh OpenPGP Option # Enter some Random Information # Select the "Advanced Options..." Button # Select the ECDSA Option # Choose a Brainpool Alogrithm # Select OK # Select Next in the Initial Dialogue # Enter a Passphrase # The created Key appears in the Overview ==== Testsuite 2.13: add Catalogue Service # Select Preference in MenuBar # Click the Kleopatra preferences # Click on "New" in the Certificate Server dialogue # Approve the added Server |
# Approve the dialogue # Enter your passphrase ==== 2.13: create Certificate using ECC Brainpool (OpenPGP) # Choose "File" from menu-bar # Select the "OpenPGP" option # Enter some random information # Select the "Advanced Options..." button # Select the "ECDSA" option # Choose a "brainpool" alogrithm # Select "OK" # Select "Next" in the initial dialogue # Enter a passphrase # The created key appears in the overview |
Line 254: | Line 266: |
==== Testsuite 3.1: Check Integrity of Downloaded Files with Signatures ==== Testsuite 3.2: Decrypt File that was encrypted under Linux (OpenPGP) ==== Testsuite 3.3: Decrypt File that was encrypted under Linux (X.509) ==== Testsuite 3.4: Check Signature on File that was signed under linux (OpenPGP) ==== Testsuite 3.5: Check Signature on File that was signed under linux (X.509) ==== Testsuite 3.6: Verify Checksums |
==== 3.1: Check Integrity of Downloaded Files with Signatures # Download a file and the signatures of it (e.g. https://www.gnupg.org/download/) # Download the signing keys (e.g. https://www.gnupg.org/signature_key.html) # Import the signing keys # Select the "Check and Decrypt Files" option # Select the downloaded signature ==== 3.2: Decrypt File that was encrypted under Linux (OpenPGP) # Select the "Check and Decrypt Files" option # Select the encrypted file # Enter your passphrase ==== 3.3: Decrypt File that was encrypted under Linux (X.509) # Select the "Check and Decrypt Files" option # Select the encrypted file # Enter your passphrase ==== 3.4: Check Signature on File that was signed under linux (OpenPGP) # Select the "Check and Decrypt Files" option # Select the signed file ==== 3.5: Check Signature on File that was signed under linux (X.509) # Select the "Check and Decrypt Files" option # Select the signed file |
Line 262: | Line 292: |
==== Testsuite 4.1: Initialize OpenPGP Smartcard ==== Testsuite 4.2: Use OpenPGP Smartcard for Encryption (OpenPGP 2.1) ==== Testsuite 4.3: Use OpenPGP Smartcard for Signing ==== Testsuite 4.4: Use X.509 Smartcard for Encryption (NetKey Card) ==== Testsuite 4.5: Use X.509 Smartcard for Signing (NetKey Card) ==== Testsuite 4.6: Use X.509 Smartcard for Trusted Signing (NetKey Card) |
==== 4.1: Initialize OpenPGP Smartcard ==== 4.2: Use OpenPGP Smartcard for Encryption (OpenPGP 2.1) ==== 4.3: Use OpenPGP Smartcard for Signing ==== 4.4: Use X.509 Smartcard for Encryption (NetKey Card) ==== 4.5: Use X.509 Smartcard for Signing (NetKey Card) ==== 4.6: Use X.509 Smartcard for Trusted Signing (NetKey Card) |
Kleopatra Test Plan
Status: in progress
Contents
Introduction
The purpose of this test plan is to ensure Kleopatra works well on all supported operating systems.
Test environment
Choose one combination of the following target platforms supported by Kleopatra.
Operating system:
- Windows Vista (32 or 64bit)
- Windows 7 (32 or 64bit)
- Windows 8 (32 or 64bit)
- Windows 10 (32 or 64bit)
It is recommended to use a clean virtual test environment, e.g. with VirtualBox.
Preconditions
- GnuPG (latest release) Installed
- Kleoptra Installed
- OpenPGP public key (*.asc or *.gpg) and private key (*.asc or *.gpg)
- S/MIME certificate chain (*.pem) and private key (*.p12)
Tests
Testsuite 1: Basic Functions
1.1: Create Certificates (OpenPGP)
- Choose "File" from menu-bar
- Click "New Secret Key"
- Choose "OpenPGP Keypair"
- Fill in some random information
- Choose a passphrase
- The new certificate will appear in the overview
1.2: Create Certificate-Request (X.509)
- Choose "File" from menu-bar
- Click "New Secret Key"
- Choose "X.509 Keypair"
- Fill some random information
- Choose a passphrase
- Save the certificate request to file
1.3: Import Certificates (OpenPGP)
- Choose "File" from menu-bar
- Click "Import..."
- Navigate to a previously exported certificate
- Click "Open"
- The imported certificate will appear in the overview
1.4: Import Certificates incl. Trustchain (X.509)
- Choose "File" from menu-bar
- Click "Import..."
- Navigate to a previously exported certificate
- Click "Open"
- The imported certificate will appear in the overview
1.5: Encrypt Files (OpenPGP)
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Deselect the "Sign" option
- Select an OpenPGP certificate as target
- Click the "Sign/Encrypt" button
- An encrypted file is at the defined target
1.6: Encrypt Files (X.509)
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Deselect the "Sign" option
- Select an X.509 certificate as target
- Click the "Sign/Encrypt" button
- An encrypted file is at the defined Target
1.7: Sign Files (OpenPGP)
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Deselect the "Encrypt" option
- Select an OpenPGP certificate as signing source
- Click the "Sign/Encrypt" button
- A signed file is at the defined target
1.8: Sign Files (X.509)
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Deselect the "Encrypt" option
- Select an X.509 certificate as signing source
- Click the "Sign/Encrypt" button
- An signed file is at the defined Target
1.9: Sign & Encrypt Files (OpenPGP)
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Select an OpenPGP certificate as signing source
- Click the Sign/Encrypt button
- A signed and enncrypted File is at the defined Target
1.10: Sign & Encrypt Files (X.509)
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Select an X.509 certificate as signing source
- Click the "Sign/Encrypt" button
- An signed and enncrypted file is at the defined target
1.11: Decrypt Files (OpenPGP)
- Click the "Verify/Decrypt Files" button
- Choose a file encrpyted to a OpenPGP certificate within the dialogue
- Enter the passphrase
- A decrypted file is at the defined target
1.12: Decrypt Files (X.509)
- Click the "Verify/Decrypt Files" button
- Choose a file encrpyted to a X.509 certificate within the dialogue
- Enter the passphrase
- A decrypted file is at the defined target
1.13: Check Signature (OpenPGP)
- Click the "Verify/Decrypt Files" button
- Choose a signed file within the dialogue
- Enter the passphraseS
- A decrypted file is at the defined target
1.14: Lookup Key on Server (OpenPGP)
If no Server is defined, please execute Testsuite 2.8 first.
- Click on "Lookup on Server"
- Search for a name (i.E. "Einstein")
- Select a key
- Click the "Import" button
- The imported key appears in the "Imported Certificates" tab
1.14: Lookup Key on Server (X.509)
If no Server is defined, please execute Testsuite 2.7 first.
- Click on "Lookup on Server"
- Search for a name (i.E. "Einstein")
- Select a key
- Click the "Import" button
- The imported key appears in the "Imported Certificates" tab
1.15: Export public and private Key (OpenPGP)
- Right click on a key you created before
- Click the "Export..." button
- Select a location in the dialogue
- Click the "Save Button"
- The eported key is at the choosen location
1.16: Certify otheres Certificates (OpenPGP)
- Rightclick a previously imported public key
- Select the "Certify" option
- Select the UIDs you want to certify
- Approve, that fingerprints are checked
- Select that you want to approve it just for yourself
- klick the "Approve" button
- Enter the passphrase of your identity
- Finish the dialogue
- Rightclick on the previously trusted key
- Click on details
- Check the trust level
1.17: Change Owner Trust (OpenPGP)
- Right click on a imported public key
- Select the "Change Ownertrust" option
- Select one of the given options
Testsuite 2: Advanced Functions
2.1: Import Revocation Certificates (OpenPGP)
- Click on "File" in the menu-bar
- Select the "Import" option
- Select a revocation certificate for an imported certificate
- Click "Import"
2.2: Certificate Revocation List (X.509)
- Select "Extras" in the menu-bar
- Choose the "Import Revocation List from File" option
- Select the revocation certificate list on the file dialogue
2.3: Check Trust-Chains in WoT (OpenPGP)
- Create two additional OpenPGP certificates
- Set the owner-trust with your first certificate on the second certificate
- Change the trust with the second certificate on the third
- Sign with the second certificate on the third
- Export the public key of the second and third key
- Delete the second and third key
- Import the public keys of the second and third key
- Check the trust on the third key
2.4: Check TrustLevels in TOFU (OpenPGP)
2.5: Check Mixed Encryption with X.509 and OpenPGP
- Select the "File Sing/Encrypt" option
- Select a file from the file dialogue
- Deselect the "Sign" option
- Select two recipients, one OpenPGP and X.509 certificate
- Click the "Sign/Encrypt" button
2.6: Check GnuPG-Tar Encryption (OpenPGP)
- Click on "File" in the menu-bar
- Select the "Sign/Encrypt Folder" option
- Select a folder from the dialgue
- Click the "Sign/Encrypt" button
- Enter your passphrase
- The encrypted folder is at the selected destination
2.7: Create Certificate Server (X.509)
- Select "Settings" in menu-bar
- Click the "Kleopatra Settings"
- Click on "New" and select X.509 in the certificate server dialogue
- Enter the details of your server
2.7: Create Certificate Server (OpenPGP)
- Select "Settings" in menu-bar
- Click the "Kleopatra Settings"
- Click on "New" and select OpenPGP in the certificate server dialogue
- Enter the details of your server
2.8: Change Validity (OpenPGP)
- Right click one of your own OpenPGP certificates
- Click on details
- Click on "Change" next to the "Expires" option
- Select a date
- Click on "O.K."
2.9: Export Trustchain (X.509)
- Right click on your own X.509 root
- Choose "Export Certificates"
- Select a destination to save to
- Click "Save"
2.10: Check Certificate Details (OpenPGP)
- Right click a OpenPGP certificate
- Choose "Details"
- Choose "More Details"
- Check the existing subkeys
2.11: Check Certificate Details (X.509)
- Right click a certificate
- Choose "Details"
- Choose "More Details"
- Check the certificate dump
2.12: add UID to Key (OpenPGP)
- Right click a certificate
- Choose "Details"
- Click "Add email adress"
- Enter some random Information
- Approve the dialogue
- Enter your passphrase
2.13: create Certificate using ECC Brainpool (OpenPGP)
- Choose "File" from menu-bar
- Select the "OpenPGP" option
- Enter some random information
- Select the "Advanced Options..." button
- Select the "ECDSA" option
- Choose a "brainpool" alogrithm
- Select "OK"
- Select "Next" in the initial dialogue
- Enter a passphrase
- The created key appears in the overview
Testsuite 3: Interoperability
3.1: Check Integrity of Downloaded Files with Signatures
- Download a file and the signatures of it (e.g. https://www.gnupg.org/download/)
- Download the signing keys (e.g. https://www.gnupg.org/signature_key.html)
- Import the signing keys
- Select the "Check and Decrypt Files" option
- Select the downloaded signature
3.2: Decrypt File that was encrypted under Linux (OpenPGP)
- Select the "Check and Decrypt Files" option
- Select the encrypted file
- Enter your passphrase
3.3: Decrypt File that was encrypted under Linux (X.509)
- Select the "Check and Decrypt Files" option
- Select the encrypted file
- Enter your passphrase
3.4: Check Signature on File that was signed under linux (OpenPGP)
- Select the "Check and Decrypt Files" option
- Select the signed file
3.5: Check Signature on File that was signed under linux (X.509)
- Select the "Check and Decrypt Files" option
- Select the signed file