Size: 9774
Comment: Fixing Test Numbers
|
Size: 10858
Comment: Testsuite 1 updated
|
Deletions are marked like this. | Additions are marked like this. |
Line 25: | Line 25: |
* GnuPG (latest release) Installed * Kleoptra Installed |
* GnuPG (latest release) installed * Kleoptra installed |
Line 34: | Line 34: |
==== 1.1: Create Certificates # Choose "File" from menu-bar2 # Click "New Secret Key" |
==== 1.1: Create certificate # Choose "File" from menu bar # Click "New Keypair" |
Line 42: | Line 42: |
==== 1.2: Import Certificates # Choose "File" from menu-bar # Click "Import..." |
==== 1.2: Import certificates # Click the "Import" button |
Line 49: | Line 48: |
==== 1.3: Encrypt Files | ==== 1.3: Encrypt file |
Line 51: | Line 50: |
# Choose a file within the dialogue | # Choose a file |
Line 57: | Line 56: |
==== 1.4: Sign Files # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue |
==== 1.4: Sign file # Click the "Sign/Encrypt" button # Choose a file |
Line 65: | Line 64: |
==== 1.5: Sign & Encrypt Files # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue |
==== 1.5: Sign & encrypt file # Click the "Sign/Encrypt" button # Choose a file |
Line 70: | Line 69: |
# A signed and enncrypted File is at the defined Target ==== 1.6: Decrypt Files # Click the "Verify/Decrypt Files" button # Choose a file encrpyted to a OpenPGP certificate within the dialogue |
# A signed and encrypted file is at the defined target ==== 1.6: Decrypt file # Click the "Verify/Decrypt" button # Choose an OpenPGP encrpyted file |
Line 78: | Line 77: |
==== 1.7: Check Signature # Click the "Verify/Decrypt Files" button # Choose a signed file within the dialogue # Enter the passphraseS # A decrypted file is at the defined target ==== 1.8: Create Certificate Server # Select "Settings" in menu-bar # Click the "Kleopatra Settings" # Click on "New" and select OpenPGP in the certificate server dialogue # Enter the details of your server ==== 1.9: Lookup Key on Server |
==== 1.7: Verify file # Click the "Verify/Decrypt" button # Choose an OpenPGP signature file # A result dialog shows the signature details ==== 1.8: Create certificate server # Select "Settings" in menu bar # Click the "Configure Kleopatra..." # Click on "New" and select "OpenPGP" in the certificate server dialogue # Confirm the server details ==== 1.9: Lookup key on server |
Line 97: | Line 95: |
==== 1.10: Export public and private Key | ==== 1.10: Export public and private key # Right click on an OpenPGP key # Click "Export..." # Select a location in the dialogue # Click the "Save" button # The exported public key is at the choosen location ==== 1.11: Export secret key |
Line 99: | Line 104: |
# Click the "Export..." button # Select a location in the dialogue # Click the "Save Button" # The eported key is at the choosen location ==== 1.11: Certify otheres Certificates # Rightclick a previously imported public key # Select the "Certify" option |
# Click "Export Secret Keys..." # Select a location and enter a filename in the dialogue # Click "Ok" # Enter passphrase # The exported secret key is at the choosen location ==== 1.12: Certify a certificate # Select a previously imported public key # Click "Certify" button |
Line 109: | Line 115: |
# Select that you want to approve it just for yourself # klick the "Approve" button |
# Step 2: Select your certificate and keep option "Certify only for myself" # Click "Certify" button |
Line 113: | Line 119: |
# Rightclick on the previously trusted key # Click on details # Check the trust level ==== 1.12: Change Owner Trust # Right click on a imported public key # Select the "Change Ownertrust" option # Select one of the given options ==== 1.13: Check GnuPG-Tar Encryption # Click on "File" in the menu-bar # Select the "Sign/Encrypt Folder" option # Select a folder from the dialgue |
# Open the certificate details of the previously certified key (via double click) # The Trust Level column shows now "full" ==== 1.13: Change owner trust # Right click on an imported public key # Select "Change Owner Trust..." # Select one of the given options and confirm with "OK". ==== 1.14: Sign & encrypt folder # Click on "File" in the menu bar # Select "Sign/Encrypt Folder..." # Select a folder |
Line 128: | Line 133: |
# The encrypted folder is at the selected destination ==== 1.14: Import Revocation Certificates # Click on "File" in the menu-bar # Select the "Import" option # Select a revocation certificate for an imported certificate |
# The encrypted folder is at the selected destination (as tar.gpg archive) ==== 1.15: Create revocation certificate # Open certificate details of your own OpenPGP certificate # Click "Generate revocation certificate" button # Select location and enter filename # Enter passphrase # The revocation certificate is at the selected destination ==== 1.16: Import revocation certificates # Open previously created revocation certificate file in editor and remove manually the comment (until "-----BEGIN PGP PUBLIC KEY BLOCK-----"). # Click on "Import" button # Select the revocation certificate |
Line 135: | Line 147: |
==== 1.15: Check Trust-Chains in WoT |
# Open the certificate details of the previously certified key (via double click) # The Trust Level column shows now "revoked" ==== 1.17: Check trust chains in Web of Trust |
Line 138: | Line 152: |
# Set the owner-trust with your first certificate on the second certificate | # Set the owner trust with your first certificate on the second certificate |
Line 146: | Line 160: |
==== 1.16: Change Validity # Right click one of your own OpenPGP certificates # Click on details |
==== 1.18: Change validity # Open certificate details of your own OpenPGP certificate |
Line 151: | Line 164: |
# Click on "O.K." ==== 1.17: Check Certificate Details # Right click a OpenPGP certificate # Choose "Details" |
# Click "OK" ==== 1.19: Check subkeys # Open certificate details of an OpenPGP certificate |
Line 159: | Line 171: |
==== 1.18: Check TrustLevels in TOFU ==== 1.19: add UID to Key # Right click a certificate # Choose "Details" # Click "Add email adress" # Enter some random Information # Approve the dialogue |
==== 1.20: Add new UID to key # Open certificate details of your own OpenPGP certificate # Click "Add email address" # Enter some random information # Click "OK" |
Line 168: | Line 177: |
==== 1.20: create Certificate using ECC Brainpool # Choose "File" from menu-bar # Select the "OpenPGP" option |
# The new UID is listed in the certificate details table ==== 1.21: Create new OpenPGP certificate using ECC Brainpool # Choose "File" from menu bar # Click "New Keypair" # Choose "OpenPGP Keypair" |
Line 173: | Line 184: |
# Select the "Advanced Options..." button | # Click "Advanced Options..." |
Line 176: | Line 187: |
# Select "OK" # Select "Next" in the initial dialogue |
# Click "OK" # Click "Next" in the initial dialogue |
Line 181: | Line 192: |
==== 1.21: Check Integrity of Downloaded Files with Signatures # Download a file and the signatures of it (e.g. https://www.gnupg.org/download/) |
==== 1.22: Check integrity of downloaded files with signatures # Download a file and the signature of it (e.g. https://www.gnupg.org/download/) |
Line 185: | Line 196: |
# Select the "Check and Decrypt Files" option # Select the downloaded signature ==== 1.22: Decrypt File that was encrypted under Linux # Select the "Check and Decrypt Files" option |
# Click the "Decrypt/Verify" button in toolbar # Select the downloaded signature file # A result dialog shows the signature details ==== 1.23: Decrypt file that was encrypted under Linux # Click the "Decrypt/Verify" button in toolbar |
Line 192: | Line 204: |
==== 1.23: Check Signature on File that was signed under Linux # Select the "Check and Decrypt Files" option # Select the signed file ==== 1.24: Export key with Paperkey ==== 1.25: Import key with Paperkey |
# A decrypted file is at the defined target ==== 1.24: Check signature on file that was signed under Linux # Click the "Decrypt/Verify" button in toolbar # Select the signature file # A result dialog shows the signature details ==== 1.25: Export key with Paperkey ==== 1.26: Import key with Paperkey ==== 1.27: Check trust levels in TOFU |
Line 293: | Line 309: |
=== Testsuite 3: Smartcard OpenPGP (V2.1 - OpenPGP) | === Testsuite 3: Smartcard OpenPGP (v2.1) |
Line 295: | Line 311: |
# Shutdown Kleopatra # Put the smartcard into your reader # Start Kleopatra # Choose "Tools" from the menu-bar # Select "Smartcard" # Press "F5" if no information is shown # Click "Generate New Keys" in the window # Enter some random information # Click "Generate Keys" |
|
Line 299: | Line 325: |
=== Testsuite 4: Smartcard (NetKey - X.509) | === Testsuite 4: Smartcard X.509 (NetKey) |
Kleopatra Test Plan
Status: in progress
Contents
Introduction
The purpose of this test plan is to ensure Kleopatra works well on all supported operating systems.
Test environment
Choose one combination of the following target platforms supported by Kleopatra.
Operating system:
- Windows Vista (32 or 64bit)
- Windows 7 (32 or 64bit)
- Windows 8 (32 or 64bit)
- Windows 10 (32 or 64bit)
It is recommended to use a clean virtual test environment, e.g. with VirtualBox.
Preconditions
- GnuPG (latest release) installed
- Kleoptra installed
- OpenPGP public key (*.asc or *.gpg) and private key (*.asc or *.gpg)
- S/MIME certificate chain (*.pem) and private key (*.p12)
Tests
Testsuite 1: OpenPGP
1.1: Create certificate
- Choose "File" from menu bar
- Click "New Keypair"
- Choose "OpenPGP Keypair"
- Fill in some random information
- Choose a passphrase
- The new certificate will appear in the overview
1.2: Import certificates
- Click the "Import" button
- Navigate to a previously exported certificate
- Click "Open"
- The imported certificate will appear in the overview
1.3: Encrypt file
- Click the "Sign/Encrypt Files" button
- Choose a file
- Deselect the "Sign" option
- Select an OpenPGP certificate as target
- Click the "Sign/Encrypt" button
- An encrypted file is at the defined target
1.4: Sign file
- Click the "Sign/Encrypt" button
- Choose a file
- Deselect the "Encrypt" option
- Select an OpenPGP certificate as signing source
- Click the "Sign/Encrypt" button
- A signed file is at the defined target
1.5: Sign & encrypt file
- Click the "Sign/Encrypt" button
- Choose a file
- Select an OpenPGP certificate as signing source
- Click the Sign/Encrypt button
- A signed and encrypted file is at the defined target
1.6: Decrypt file
- Click the "Verify/Decrypt" button
- Choose an OpenPGP encrpyted file
- Enter the passphrase
- A decrypted file is at the defined target
1.7: Verify file
- Click the "Verify/Decrypt" button
- Choose an OpenPGP signature file
- A result dialog shows the signature details
1.8: Create certificate server
- Select "Settings" in menu bar
- Click the "Configure Kleopatra..."
- Click on "New" and select "OpenPGP" in the certificate server dialogue
- Confirm the server details
1.9: Lookup key on server
- Click on "Lookup on Server"
- Search for a name (i.E. "Einstein")
- Select a key
- Click the "Import" button
- The imported key appears in the "Imported Certificates" tab
1.10: Export public and private key
- Right click on an OpenPGP key
- Click "Export..."
- Select a location in the dialogue
- Click the "Save" button
- The exported public key is at the choosen location
1.11: Export secret key
- Right click on a key you created before
- Click "Export Secret Keys..."
- Select a location and enter a filename in the dialogue
- Click "Ok"
- Enter passphrase
- The exported secret key is at the choosen location
1.12: Certify a certificate
- Select a previously imported public key
- Click "Certify" button
- Select the UIDs you want to certify
- Approve, that fingerprints are checked
- Step 2: Select your certificate and keep option "Certify only for myself"
- Click "Certify" button
- Enter the passphrase of your identity
- Finish the dialogue
- Open the certificate details of the previously certified key (via double click)
- The Trust Level column shows now "full"
1.13: Change owner trust
- Right click on an imported public key
- Select "Change Owner Trust..."
- Select one of the given options and confirm with "OK".
1.14: Sign & encrypt folder
- Click on "File" in the menu bar
- Select "Sign/Encrypt Folder..."
- Select a folder
- Click the "Sign/Encrypt" button
- Enter your passphrase
- The encrypted folder is at the selected destination (as tar.gpg archive)
1.15: Create revocation certificate
- Open certificate details of your own OpenPGP certificate
- Click "Generate revocation certificate" button
- Select location and enter filename
- Enter passphrase
- The revocation certificate is at the selected destination
1.16: Import revocation certificates
- Open previously created revocation certificate file in editor and remove manually the comment (until "-----BEGIN PGP PUBLIC KEY BLOCK-----").
- Click on "Import" button
- Select the revocation certificate
- Click "Import"
- Open the certificate details of the previously certified key (via double click)
- The Trust Level column shows now "revoked"
1.17: Check trust chains in Web of Trust
- Create two additional OpenPGP certificates
- Set the owner trust with your first certificate on the second certificate
- Change the trust with the second certificate on the third
- Sign with the second certificate on the third
- Export the public key of the second and third key
- Delete the second and third key
- Import the public keys of the second and third key
- Check the trust on the third key
1.18: Change validity
- Open certificate details of your own OpenPGP certificate
- Click on "Change" next to the "Expires" option
- Select a date
- Click "OK"
1.19: Check subkeys
- Open certificate details of an OpenPGP certificate
- Choose "More Details"
- Check the existing subkeys
1.20: Add new UID to key
- Open certificate details of your own OpenPGP certificate
- Click "Add email address"
- Enter some random information
- Click "OK"
- Enter your passphrase
- The new UID is listed in the certificate details table
1.21: Create new OpenPGP certificate using ECC Brainpool
- Choose "File" from menu bar
- Click "New Keypair"
- Choose "OpenPGP Keypair"
- Enter some random information
- Click "Advanced Options..."
- Select the "ECDSA" option
- Choose a "brainpool" alogrithm
- Click "OK"
- Click "Next" in the initial dialogue
- Enter a passphrase
- The created key appears in the overview
1.22: Check integrity of downloaded files with signatures
- Download a file and the signature of it (e.g. https://www.gnupg.org/download/)
- Download the signing keys (e.g. https://www.gnupg.org/signature_key.html)
- Import the signing keys
- Click the "Decrypt/Verify" button in toolbar
- Select the downloaded signature file
- A result dialog shows the signature details
1.23: Decrypt file that was encrypted under Linux
- Click the "Decrypt/Verify" button in toolbar
- Select the encrypted file
- Enter your passphrase
- A decrypted file is at the defined target
1.24: Check signature on file that was signed under Linux
- Click the "Decrypt/Verify" button in toolbar
- Select the signature file
- A result dialog shows the signature details
1.25: Export key with Paperkey
1.26: Import key with Paperkey
1.27: Check trust levels in TOFU
Testsuite 2: X.509
2.1: Create Certificate-Request
- Choose "File" from menu-bar
- Click "New Secret Key"
- Choose "X.509 Keypair"
- Fill some random information
- Choose a passphrase
- Save the certificate request to file
2.2: Import Certificates incl. Trustchain
- Choose "File" from menu-bar
- Click "Import..."
- Navigate to a previously exported certificate
- Click "Open"
- The imported certificate will appear in the overview
2.3: Encrypt Files
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Deselect the "Sign" option
- Select an X.509 certificate as target
- Click the "Sign/Encrypt" button
- An encrypted file is at the defined Target
2.4: Sign Files
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Deselect the "Encrypt" option
- Select an X.509 certificate as signing source
- Click the "Sign/Encrypt" button
- An signed file is at the defined Target
2.5: Sign & Encrypt Files
- Click the "Sign/Encrypt Files" button
- Choose a file within the dialogue
- Select an X.509 certificate as signing source
- Click the "Sign/Encrypt" button
- An signed and enncrypted file is at the defined target
2.6: Decrypt Files
- Click the "Verify/Decrypt Files" button
- Choose a file encrpyted to a X.509 certificate within the dialogue
- Enter the passphrase
- A decrypted file is at the defined target
2.7: Lookup Key on Server
If no Server is defined, please execute Testsuite 2.7 first.
- Click on "Lookup on Server"
- Search for a name (i.E. "Einstein")
- Select a key
- Click the "Import" button
- The imported key appears in the "Imported Certificates" tab
2.8: Certificate Revocation List
- Select "Extras" in the menu-bar
- Choose the "Import Revocation List from File" option
- Select the revocation certificate list on the file dialogue
2.9: Check Mixed Encryption with X.509 and OpenPGP
- Select the "File Sing/Encrypt" option
- Select a file from the file dialogue
- Deselect the "Sign" option
- Select two recipients, one OpenPGP and X.509 certificate
- Click the "Sign/Encrypt" button
2.10: Create Certificate Server
- Select "Settings" in menu-bar
- Click the "Kleopatra Settings"
- Click on "New" and select X.509 in the certificate server dialogue
- Enter the details of your server
2.11: Export Trustchain
- Right click on your own X.509 root
- Choose "Export Certificates"
- Select a destination to save to
- Click "Save"
2.12: Check Certificate Details
- Right click a certificate
- Choose "Details"
- Choose "More Details"
- Check the certificate dump
2.13: Decrypt File that was encrypted under Linux
- Select the "Check and Decrypt Files" option
- Select the encrypted file
- Enter your passphrase
2.14: Check Signature on File that was signed under Linux
- Select the "Check and Decrypt Files" option
- Select the signed file
Testsuite 3: Smartcard OpenPGP (v2.1)
3.1: Initialize OpenPGP Smartcard
- Shutdown Kleopatra
- Put the smartcard into your reader
- Start Kleopatra
- Choose "Tools" from the menu-bar
- Select "Smartcard"
- Press "F5" if no information is shown
- Click "Generate New Keys" in the window
- Enter some random information
- Click "Generate Keys"