Size: 1394
Comment: Restructuring of tests
|
Size: 5324
Comment: Testsuite 1.9 - 1.10
|
Deletions are marked like this. | Additions are marked like this. |
Line 33: | Line 33: |
==== Testsuite 1.1: Create Certificates ==== Testsuite 1.2: Import Certificates ==== Testsuite 1.3: Encrypt Files ==== Testsuite 1.4: Sign Files ==== Testsuite 1.5: Sign & Encrypt Files ==== Testsuite 1.6: Decrypt Files ==== Testsuite 1.7: Check Signature |
==== Testsuite 1.1: Create Certificates (OpenPGP) # Choose "File" from MenuBar # Click "New Secret Key" # Choose "OpenPGP Keypair" # Fill in some random information # Choose a Passphrase # The new Certificate will appear in the overview ==== Testsuite 1.2: Create Certificate-Request (X.509) # Choose "File" from MenuBar # Click "New Secret Key" # Choose "X.509 Keypair" # Fill some random information # Choose a Passphrase # Save the Certificate Request to file ==== Testsuite 1.3: Import Certificates (OpenPGP) # Choose "File" from MenuBar # Click "Import..." # Navigate to a previously exported Certificate # Click "Open" # The imported certificate will appear in the overview ==== Testsuite 1.4: Import Certificates incl. Trustchain (X.509) # Choose "File" from MenuBar # Click "Import..." # Navigate to a previously exported Certificate # Click "Open" # The imported certificate will appear in the overview ==== Testsuite 1.5: Encrypt Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Sign Option # Select an OpenPGP Certificate as Target # Click the Sign/Encrypt button # An Encrypted File is at the defined Target ==== Testsuite 1.6: Encrypt Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Sign Option # Select an X.509 Certificate as Target # Click the Sign/Encrypt button # An Encrypted File is at the defined Target ==== Testsuite 1.7: Sign Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Encrypt Option # Select an OpenPGP Certificate as Signing Source # Click the Sign/Encrypt button # A signed File is at the defined Target ==== Testsuite 1.8: Sign Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Encrypt Option # Select an X.509 Certificate as Signing Source # Click the Sign/Encrypt button # An signed File is at the defined Target ==== Testsuite 1.9: Sign & Encrypt Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Select an OpenPGP Certificate as Signing Source # Click the Sign/Encrypt button # A signed and enncrypted File is at the defined Target ==== Testsuite 1.10: Sign & Encrypt Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Select an X.509 Certificate as Signing Source # Click the Sign/Encrypt button # An signed and enncrypted File is at the defined Target ==== Testsuite 1.11: Decrypt Files (OpenPGP) ==== Testsuite 1.12: Decrypt Files (X.509) ==== Testsuite 1.13: Check Signature ==== Testsuite 1.14: Lookup Key on Server ==== Testsuite 1.15: Export public and private Key ==== Testsuite 1.16: Certify otheres Certificates ==== Testsuite 1.17: Folder Encrypt ==== Testsuite 1.18: Change Owner Trust |
Line 42: | Line 120: |
==== Testsuite 1.1: Revocation Certificates ==== Testsuite 1.2: Certificate Revocation List ==== Testsuite 1.3: Check Trust-Chains in WoT ==== Testsuite 1.4: Check TrustLevels in TOFU |
==== Testsuite 2.1: Revocation Certificates ==== Testsuite 2.2: Certificate Revocation List ==== Testsuite 2.3: Check Trust-Chains in WoT ==== Testsuite 2.4: Check TrustLevels in TOFU ==== Testsuite 2.5: Check Mixed Encryption with X.509 and OpenPGP ==== Testsuite 2.6: Check GnuPG-Tar Encryption ==== Testsuite 2.7: Change Certificate Server for X.509 ==== Testsuite 2.8: Change Validity ==== Testsuite 2.9: Export Trustchain ==== Testsuite 2.10: Check Certificate Details ==== Testsuite 2.11: add UID to Key ==== Testsuite 2.12: create Certificate using Brainpool |
Line 48: | Line 134: |
==== Testsuite 3.1: Check Integrity of Downloaded Files with Signatures ==== Testsuite 3.2: Decrypt File that was encrypted under Linux (OpenPGP) ==== Testsuite 3.3: Decrypt File that was encrypted under Linux (X.509) ==== Testsuite 3.4: Check Signature on File that was signed under linux (OpenPGP) ==== Testsuite 3.5: Check Signature on File that was signed under linux (X.509) ==== Testsuite 3.6: Verify Checksums |
|
Line 50: | Line 142: |
==== Testsuite 4.1: Initialize OpenPGP Smartcard ==== Testsuite 4.2: Use OpenPGP Smartcard for Encryption (OpenPGP 2.1) ==== Testsuite 4.3: Use OpenPGP Smartcard for Signing ==== Testsuite 4.4: Use X.509 Smartcard for Encryption (NetKey Card) ==== Testsuite 4.5: Use X.509 Smartcard for Signing (NetKey Card) ==== Testsuite 4.6: Use X.509 Smartcard for Trusted Signing (NetKey Card) |
Kleopatra Test Plan
Status: in progress
Contents
Introduction
The purpose of this test plan is to ensure Kleopatra works well on all supported operating systems.
Test environment
Choose one combination of the following target platforms supported by Kleopatra.
Operating system:
- Windows Vista (32 or 64bit)
- Windows 7 (32 or 64bit)
- Windows 8 (32 or 64bit)
- Windows 10 (32 or 64bit)
It is recommended to use a clean virtual test environment, e.g. with VirtualBox.
Preconditions
- GnuPG (latest release) Installed
- Kleoptra Installed
- OpenPGP public key (*.asc or *.gpg) and private key (*.asc or *.gpg)
- S/MIME certificate chain (*.pem) and private key (*.p12)
Tests
Testsuite 1: Basic Functions
Testsuite 1.1: Create Certificates (OpenPGP)
- Choose "File" from MenuBar
- Click "New Secret Key"
- Choose "OpenPGP Keypair"
- Fill in some random information
- Choose a Passphrase
- The new Certificate will appear in the overview
Testsuite 1.2: Create Certificate-Request (X.509)
- Choose "File" from MenuBar
- Click "New Secret Key"
- Choose "X.509 Keypair"
- Fill some random information
- Choose a Passphrase
- Save the Certificate Request to file
Testsuite 1.3: Import Certificates (OpenPGP)
- Choose "File" from MenuBar
- Click "Import..."
- Navigate to a previously exported Certificate
- Click "Open"
- The imported certificate will appear in the overview
Testsuite 1.4: Import Certificates incl. Trustchain (X.509)
- Choose "File" from MenuBar
- Click "Import..."
- Navigate to a previously exported Certificate
- Click "Open"
- The imported certificate will appear in the overview
Testsuite 1.5: Encrypt Files (OpenPGP)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Deselect the Sign Option
- Select an OpenPGP Certificate as Target
- Click the Sign/Encrypt button
- An Encrypted File is at the defined Target
Testsuite 1.6: Encrypt Files (X.509)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Deselect the Sign Option
- Select an X.509 Certificate as Target
- Click the Sign/Encrypt button
- An Encrypted File is at the defined Target
Testsuite 1.7: Sign Files (OpenPGP)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Deselect the Encrypt Option
- Select an OpenPGP Certificate as Signing Source
- Click the Sign/Encrypt button
- A signed File is at the defined Target
Testsuite 1.8: Sign Files (X.509)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Deselect the Encrypt Option
- Select an X.509 Certificate as Signing Source
- Click the Sign/Encrypt button
- An signed File is at the defined Target
Testsuite 1.9: Sign & Encrypt Files (OpenPGP)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Select an OpenPGP Certificate as Signing Source
- Click the Sign/Encrypt button
- A signed and enncrypted File is at the defined Target
Testsuite 1.10: Sign & Encrypt Files (X.509)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Select an X.509 Certificate as Signing Source
- Click the Sign/Encrypt button
- An signed and enncrypted File is at the defined Target