= Kleopatra Test Plan **Status: in progress** <> == Introduction The purpose of this test plan is to ensure Kleopatra works well on all supported operating systems. == Test environment Choose one combination of the following target platforms supported by Kleopatra. Operating system: * Windows Vista (32 or 64bit) * Windows 7 (32 or 64bit) * Windows 8 (32 or 64bit) * Windows 10 (32 or 64bit) It is recommended to use a clean virtual test environment, e.g. with [[https://www.virtualbox.org/|VirtualBox]]. == Preconditions * GnuPG (latest release) Installed * Kleoptra Installed * ~OpenPGP public key (*.asc or *.gpg) and private key (*.asc or *.gpg) * S/~M~I~M~E certificate chain (*.pem) and private key (*.p12) == Tests === Testsuite 1: OpenPGP ==== 1.1: Create Certificates # Choose "File" from menu-bar # Click "New Secret Key" # Choose "OpenPGP Keypair" # Fill in some random information # Choose a passphrase # The new certificate will appear in the overview ==== 1.2: Import Certificates # Choose "File" from menu-bar # Click "Import..." # Navigate to a previously exported certificate # Click "Open" # The imported certificate will appear in the overview ==== 1.3: Encrypt Files # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Deselect the "Sign" option # Select an OpenPGP certificate as target # Click the "Sign/Encrypt" button # An encrypted file is at the defined target ==== 1.4: Sign Files # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Deselect the "Encrypt" option # Select an OpenPGP certificate as signing source # Click the "Sign/Encrypt" button # A signed file is at the defined target ==== 1.5: Sign & Encrypt Files # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Select an OpenPGP certificate as signing source # Click the Sign/Encrypt button # A signed and enncrypted File is at the defined Target ==== 1.6: Decrypt Files # Click the "Verify/Decrypt Files" button # Choose a file encrpyted to a OpenPGP certificate within the dialogue # Enter the passphrase # A decrypted file is at the defined target ==== 1.7: Check Signature # Click the "Verify/Decrypt Files" button # Choose a signed file within the dialogue # Enter the passphraseS # A decrypted file is at the defined target ==== 1.8: Create Certificate Server # Select "Settings" in menu-bar # Click the "Kleopatra Settings" # Click on "New" and select OpenPGP in the certificate server dialogue # Enter the details of your server ==== 1.9: Lookup Key on Server # Click on "Lookup on Server" # Search for a name (i.E. "Einstein") # Select a key # Click the "Import" button # The imported key appears in the "Imported Certificates" tab ==== 1.10: Export public and private Key # Right click on a key you created before # Click the "Export..." button # Select a location in the dialogue # Click the "Save Button" # The eported key is at the choosen location ==== 1.11: Certify otheres Certificates # Rightclick a previously imported public key # Select the "Certify" option # Select the UIDs you want to certify # Approve, that fingerprints are checked # Select that you want to approve it just for yourself # klick the "Approve" button # Enter the passphrase of your identity # Finish the dialogue # Rightclick on the previously trusted key # Click on details # Check the trust level ==== 1.12: Change Owner Trust # Right click on a imported public key # Select the "Change Ownertrust" option # Select one of the given options ==== 1.13: Check GnuPG-Tar Encryption # Click on "File" in the menu-bar # Select the "Sign/Encrypt Folder" option # Select a folder from the dialgue # Click the "Sign/Encrypt" button # Enter your passphrase # The encrypted folder is at the selected destination ==== 1.14: Import Revocation Certificates # Click on "File" in the menu-bar # Select the "Import" option # Select a revocation certificate for an imported certificate # Click "Import" ==== 1.15: Check Trust-Chains in WoT # Create two additional OpenPGP certificates # Set the owner-trust with your first certificate on the second certificate # Change the trust with the second certificate on the third # Sign with the second certificate on the third # Export the public key of the second and third key # Delete the second and third key # Import the public keys of the second and third key # Check the trust on the third key ==== 1.16: Change Validity # Right click one of your own OpenPGP certificates # Click on details # Click on "Change" next to the "Expires" option # Select a date # Click on "O.K." ==== 1.17: Check Certificate Details # Right click a OpenPGP certificate # Choose "Details" # Choose "More Details" # Check the existing subkeys ==== 1.18: Check TrustLevels in TOFU ==== 1.19: add UID to Key # Right click a certificate # Choose "Details" # Click "Add email adress" # Enter some random Information # Approve the dialogue # Enter your passphrase ==== 1.20: create Certificate using ECC Brainpool # Choose "File" from menu-bar # Select the "OpenPGP" option # Enter some random information # Select the "Advanced Options..." button # Select the "ECDSA" option # Choose a "brainpool" alogrithm # Select "OK" # Select "Next" in the initial dialogue # Enter a passphrase # The created key appears in the overview ==== 1.21: Check Integrity of Downloaded Files with Signatures # Download a file and the signatures of it (e.g. https://www.gnupg.org/download/) # Download the signing keys (e.g. https://www.gnupg.org/signature_key.html) # Import the signing keys # Select the "Check and Decrypt Files" option # Select the downloaded signature ==== 1.22: Decrypt File that was encrypted under Linux # Select the "Check and Decrypt Files" option # Select the encrypted file # Enter your passphrase ==== 1.23: Check Signature on File that was signed under Linux # Select the "Check and Decrypt Files" option # Select the signed file ==== 1.24: Initialize OpenPGP Smartcard ==== 1.25: Use OpenPGP Smartcard for Encryption ==== 1.26: Use OpenPGP Smartcard for Signing === Testsuite 2: X.509 ==== 2.1: Create Certificate-Request # Choose "File" from menu-bar # Click "New Secret Key" # Choose "X.509 Keypair" # Fill some random information # Choose a passphrase # Save the certificate request to file ==== 2.2: Import Certificates incl. Trustchain # Choose "File" from menu-bar # Click "Import..." # Navigate to a previously exported certificate # Click "Open" # The imported certificate will appear in the overview ==== 2.3: Encrypt Files # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Deselect the "Sign" option # Select an X.509 certificate as target # Click the "Sign/Encrypt" button # An encrypted file is at the defined Target ==== 2.4: Sign Files # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Deselect the "Encrypt" option # Select an X.509 certificate as signing source # Click the "Sign/Encrypt" button # An signed file is at the defined Target ==== 2.5: Sign & Encrypt Files # Click the "Sign/Encrypt Files" button # Choose a file within the dialogue # Select an X.509 certificate as signing source # Click the "Sign/Encrypt" button # An signed and enncrypted file is at the defined target ==== 2.6: Decrypt Files # Click the "Verify/Decrypt Files" button # Choose a file encrpyted to a X.509 certificate within the dialogue # Enter the passphrase # A decrypted file is at the defined target ==== 2.7: Lookup Key on Server If no Server is defined, please execute Testsuite 2.7 first. # Click on "Lookup on Server" # Search for a name (i.E. "Einstein") # Select a key # Click the "Import" button # The imported key appears in the "Imported Certificates" tab ==== 2.8: Certificate Revocation List # Select "Extras" in the menu-bar # Choose the "Import Revocation List from File" option # Select the revocation certificate list on the file dialogue ==== 2.9: Check Mixed Encryption with X.509 and OpenPGP # Select the "File Sing/Encrypt" option # Select a file from the file dialogue # Deselect the "Sign" option # Select two recipients, one OpenPGP and X.509 certificate # Click the "Sign/Encrypt" button ==== 2.10: Create Certificate Server # Select "Settings" in menu-bar # Click the "Kleopatra Settings" # Click on "New" and select X.509 in the certificate server dialogue # Enter the details of your server ==== 2.11: Export Trustchain # Right click on your own X.509 root # Choose "Export Certificates" # Select a destination to save to # Click "Save" ==== 2.12: Check Certificate Details # Right click a certificate # Choose "Details" # Choose "More Details" # Check the certificate dump ==== 2.13: Decrypt File that was encrypted under Linux # Select the "Check and Decrypt Files" option # Select the encrypted file # Enter your passphrase ==== 2.14: Check Signature on File that was signed under Linux # Select the "Check and Decrypt Files" option # Select the signed file ==== 2.15: Use X.509 Smartcard for Encryption ==== 2.16: Use X.509 Smartcard for Signing ==== 2.17: Use X.509 Smartcard for Trusted Signing