Size: 3183
Comment: Adding more Testsuites
|
Size: 6302
Comment: Testsuite 1.13 - 1.14 & 2.13
|
Deletions are marked like this. | Additions are marked like this. |
Line 34: | Line 34: |
==== Testsuite 1.1: Create Certificate-Request (X.509) ==== Testsuite 1.2: Import Certificates (OpenPGP) ==== Testsuite 1.3: Import Certificates incl. Trustchain (X.509) ==== Testsuite 1.4: Encrypt Files (OpenPGP) ==== Testsuite 1.5: Encrypt Files (X.509) ==== Testsuite 1.6: Sign Files (OpenPGP) ==== Testsuite 1.7: Sign Files (X.509) ==== Testsuite 1.8: Sign & Encrypt Files (OpenPGP) ==== Testsuite 1.9: Sign & Encrypt Files (X.509) ==== Testsuite 1.10: Decrypt Files (OpenPGP) ==== Testsuite 1.11: Decrypt Files (X.509) ==== Testsuite 1.12: Check Signature ==== Testsuite 1.13: Lookup Key on Server ==== Testsuite 1.14: Export public and private Key ==== Testsuite 1.15: Certify otheres Certificates ==== Testsuite 1.16: Folder Encrypt ==== Testsuite 1.17: Change Owner Trust |
# Choose "File" from MenuBar # Click "New Secret Key" # Choose "OpenPGP Keypair" # Fill in some random information # Choose a Passphrase # The new Certificate will appear in the overview ==== Testsuite 1.2: Create Certificate-Request (X.509) # Choose "File" from MenuBar # Click "New Secret Key" # Choose "X.509 Keypair" # Fill some random information # Choose a Passphrase # Save the Certificate Request to file ==== Testsuite 1.3: Import Certificates (OpenPGP) # Choose "File" from MenuBar # Click "Import..." # Navigate to a previously exported Certificate # Click "Open" # The imported certificate will appear in the overview ==== Testsuite 1.4: Import Certificates incl. Trustchain (X.509) # Choose "File" from MenuBar # Click "Import..." # Navigate to a previously exported Certificate # Click "Open" # The imported certificate will appear in the overview ==== Testsuite 1.5: Encrypt Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Sign Option # Select an OpenPGP Certificate as Target # Click the Sign/Encrypt button # An Encrypted File is at the defined Target ==== Testsuite 1.6: Encrypt Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Sign Option # Select an X.509 Certificate as Target # Click the Sign/Encrypt button # An Encrypted File is at the defined Target ==== Testsuite 1.7: Sign Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Encrypt Option # Select an OpenPGP Certificate as Signing Source # Click the Sign/Encrypt button # A signed File is at the defined Target ==== Testsuite 1.8: Sign Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Deselect the Encrypt Option # Select an X.509 Certificate as Signing Source # Click the Sign/Encrypt button # An signed File is at the defined Target ==== Testsuite 1.9: Sign & Encrypt Files (OpenPGP) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Select an OpenPGP Certificate as Signing Source # Click the Sign/Encrypt button # A signed and enncrypted File is at the defined Target ==== Testsuite 1.10: Sign & Encrypt Files (X.509) # Click the Sign/Encrypt Files Button # Choose a file within the dialogue # Select an X.509 Certificate as Signing Source # Click the Sign/Encrypt button # An signed and enncrypted File is at the defined Target ==== Testsuite 1.11: Decrypt Files (OpenPGP) # Click the Verify/Decrypt Files Button # Choose a file encrpyted to a OpenPGP certificate within the dialogue # Enter the Passphrase # A decrypted File is at the defined Target ==== Testsuite 1.12: Decrypt Files (X.509) # Click the Verify/Decrypt Files Button # Choose a file encrpyted to a X.509 certificate within the dialogue # Enter the Passphrase # A decrypted File is at the defined Target ==== Testsuite 1.13: Check Signature # Click the Verify/Decrypt Files Button # Choose a signed File within the dialogue # Enter the Passphrase # A decrypted File is at the defined Target ==== Testsuite 1.14: Lookup Key on Server If no Server is defined, please execute Testsuite 2.13 first. # Click on "Lookup on Server" # Search for a Name (i.E. "Einstein") # Select a Key # Click the "Import" button # The imported key appears in the "Imported Certificates" Tab ==== Testsuite 1.15: Export public and private Key ==== Testsuite 1.16: Certify otheres Certificates ==== Testsuite 1.17: Folder Encrypt ==== Testsuite 1.18: Change Owner Trust |
Line 65: | Line 154: |
==== Testsuite 2.13: add Catalogue Service # Select Preference in MenuBar # Click the Kleopatra preferences # Click on "New" in the Certificate Server dialogue # Approve the added Server |
Kleopatra Test Plan
Status: in progress
Contents
Introduction
The purpose of this test plan is to ensure Kleopatra works well on all supported operating systems.
Test environment
Choose one combination of the following target platforms supported by Kleopatra.
Operating system:
- Windows Vista (32 or 64bit)
- Windows 7 (32 or 64bit)
- Windows 8 (32 or 64bit)
- Windows 10 (32 or 64bit)
It is recommended to use a clean virtual test environment, e.g. with VirtualBox.
Preconditions
- GnuPG (latest release) Installed
- Kleoptra Installed
- OpenPGP public key (*.asc or *.gpg) and private key (*.asc or *.gpg)
- S/MIME certificate chain (*.pem) and private key (*.p12)
Tests
Testsuite 1: Basic Functions
Testsuite 1.1: Create Certificates (OpenPGP)
- Choose "File" from MenuBar
- Click "New Secret Key"
- Choose "OpenPGP Keypair"
- Fill in some random information
- Choose a Passphrase
- The new Certificate will appear in the overview
Testsuite 1.2: Create Certificate-Request (X.509)
- Choose "File" from MenuBar
- Click "New Secret Key"
- Choose "X.509 Keypair"
- Fill some random information
- Choose a Passphrase
- Save the Certificate Request to file
Testsuite 1.3: Import Certificates (OpenPGP)
- Choose "File" from MenuBar
- Click "Import..."
- Navigate to a previously exported Certificate
- Click "Open"
- The imported certificate will appear in the overview
Testsuite 1.4: Import Certificates incl. Trustchain (X.509)
- Choose "File" from MenuBar
- Click "Import..."
- Navigate to a previously exported Certificate
- Click "Open"
- The imported certificate will appear in the overview
Testsuite 1.5: Encrypt Files (OpenPGP)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Deselect the Sign Option
- Select an OpenPGP Certificate as Target
- Click the Sign/Encrypt button
- An Encrypted File is at the defined Target
Testsuite 1.6: Encrypt Files (X.509)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Deselect the Sign Option
- Select an X.509 Certificate as Target
- Click the Sign/Encrypt button
- An Encrypted File is at the defined Target
Testsuite 1.7: Sign Files (OpenPGP)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Deselect the Encrypt Option
- Select an OpenPGP Certificate as Signing Source
- Click the Sign/Encrypt button
- A signed File is at the defined Target
Testsuite 1.8: Sign Files (X.509)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Deselect the Encrypt Option
- Select an X.509 Certificate as Signing Source
- Click the Sign/Encrypt button
- An signed File is at the defined Target
Testsuite 1.9: Sign & Encrypt Files (OpenPGP)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Select an OpenPGP Certificate as Signing Source
- Click the Sign/Encrypt button
- A signed and enncrypted File is at the defined Target
Testsuite 1.10: Sign & Encrypt Files (X.509)
- Click the Sign/Encrypt Files Button
- Choose a file within the dialogue
- Select an X.509 Certificate as Signing Source
- Click the Sign/Encrypt button
- An signed and enncrypted File is at the defined Target
Testsuite 1.11: Decrypt Files (OpenPGP)
- Click the Verify/Decrypt Files Button
- Choose a file encrpyted to a OpenPGP certificate within the dialogue
- Enter the Passphrase
- A decrypted File is at the defined Target
Testsuite 1.12: Decrypt Files (X.509)
- Click the Verify/Decrypt Files Button
- Choose a file encrpyted to a X.509 certificate within the dialogue
- Enter the Passphrase
- A decrypted File is at the defined Target
Testsuite 1.13: Check Signature
- Click the Verify/Decrypt Files Button
- Choose a signed File within the dialogue
- Enter the Passphrase
- A decrypted File is at the defined Target
Testsuite 1.14: Lookup Key on Server
If no Server is defined, please execute Testsuite 2.13 first.
- Click on "Lookup on Server"
- Search for a Name (i.E. "Einstein")
- Select a Key
- Click the "Import" button
- The imported key appears in the "Imported Certificates" Tab
Testsuite 1.15: Export public and private Key
Testsuite 1.16: Certify otheres Certificates
Testsuite 1.17: Folder Encrypt
Testsuite 1.18: Change Owner Trust
Testsuite 2: Advanced Functions
Testsuite 2.1: Revocation Certificates
Testsuite 2.2: Certificate Revocation List
Testsuite 2.3: Check Trust-Chains in WoT
Testsuite 2.4: Check TrustLevels in TOFU
Testsuite 2.5: Check Mixed Encryption with X.509 and OpenPGP
Testsuite 2.6: Check GnuPG-Tar Encryption
Testsuite 2.7: Change Certificate Server for X.509
Testsuite 2.8: Change Validity
Testsuite 2.9: Export Trustchain
Testsuite 2.10: Check Certificate Details
Testsuite 2.11: add UID to Key
Testsuite 2.12: create Certificate using Brainpool
Testsuite 2.13: add Catalogue Service
- Select Preference in MenuBar
- Click the Kleopatra preferences
- Click on "New" in the Certificate Server dialogue
- Approve the added Server