contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscafipsecmanual.script
branchRCL_3
changeset 43 2f10d260163b
equal deleted inserted replaced
42:eb9b28acd381 43:2f10d260163b
       
     1 //
       
     2 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
       
     3 // All rights reserved.
       
     4 // This component and the accompanying materials are made available
       
     5 // under the terms of the License "Eclipse Public License v1.0"
       
     6 // which accompanies this distribution, and is available
       
     7 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
       
     8 //
       
     9 // Initial Contributors:
       
    10 // Nokia Corporation - initial contribution.
       
    11 //
       
    12 // Contributors:
       
    13 //
       
    14 // Description:
       
    15 //
       
    16 // Streaming CAF Integration Tests
       
    17 
       
    18 PRINT Run PREQ782 Streaming CAF Manual IPSec Integration Tests
       
    19 
       
    20 // Load Suite
       
    21 LOAD_SUITE tscaf
       
    22 
       
    23 //********************** SEC-SCAF-E004  **********************
       
    24 
       
    25 //! @SYMTestCaseID 		SEC-SCAF-E004
       
    26 //! @SYMTestCaseDesc 		Testing overall IPSec integration - manual
       
    27 //! 				(basic_ipsec_integration)
       
    28 //! @SYMPREQ 			PREQ782
       
    29 //! @SYMREQ 			REQ7779
       
    30 //! @SYMTestPriority 		Critical
       
    31 //! @SYMTestStatus   		Implemented
       
    32 //! @SYMTestActions 		
       
    33 //!				•	Execute steps in SEC-SCAF-E001.
       
    34 //!				•	Submit key association with pre-defined attributes using IPSec key stream sink.
       
    35 //!				•	Wait for a decrypted packet synchronously.
       
    36 //!				•	Use a Linux machine and set SADB and Policy DB settings there accordingly (see V:\Dev\TS\TS0013 Crypto Services\Technical\Testing)
       
    37 //!				•	Send a packet from the Linux machine.
       
    38 //!
       
    39 //! @SYMTestExpectedResults 	• Packet is decrypted correctly with expected content.
       
    40 //! @SYMTestType 		CIT
       
    41 
       
    42 START_TESTCASE SEC-SCAF-E004
       
    43 // The time limit is disabled since this test is manual
       
    44 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini basic_ipsec_integration
       
    45 END_TESTCASE SEC-SCAF-E004
       
    46 
       
    47 
       
    48 //********************** SEC-SCAF-E005  **********************
       
    49 
       
    50 //! @SYMTestCaseID 		SEC-SCAF-E005
       
    51 //! @SYMTestCaseDesc 		Testing overall IPSec integration: multiple key messages - manual
       
    52 //! 				(ipsec_integration_multiple_messages)
       
    53 //! @SYMPREQ 			PREQ782
       
    54 //! @SYMREQ 			REQ7779
       
    55 //! @SYMTestPriority 		Critical
       
    56 //! @SYMTestStatus   		Implemented
       
    57 //! @SYMTestActions 		
       
    58 //!				•	Execute steps in SEC-SCAF-E004.
       
    59 //!				•	Submit another SA through a new key association in key stream sink.
       
    60 //!				•	Change configuration on the Linux machine to use the new key association. (use rtest2.conf instead of rtest.conf)
       
    61 //!				•	Send another packet from the Linux machines 
       
    62 //!
       
    63 //! @SYMTestExpectedResults 	• Both packets are decrypted correctly with expected content.
       
    64 //! @SYMTestType 		CIT
       
    65 
       
    66 START_TESTCASE SEC-SCAF-E005
       
    67 // The time limit is disabled since this test is manual
       
    68 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_multiple_messages
       
    69 END_TESTCASE SEC-SCAF-E005
       
    70 
       
    71 //********************** SEC-SCAF-E006  **********************
       
    72 
       
    73 //! @SYMTestCaseID 		SEC-SCAF-E006
       
    74 //! @SYMTestCaseDesc 		Testing IPSec integration with key stream decoder - manual
       
    75 //! 				(ipsec_integration_decoder)
       
    76 //! @SYMPREQ 			PREQ782
       
    77 //! @SYMREQ 			REQ7779
       
    78 //! @SYMTestPriority 		Critical
       
    79 //! @SYMTestStatus   		Implemented
       
    80 //! @SYMTestActions 		
       
    81 //!				•	Create manually a test agent key stream decoder using SDP information
       
    82 //!				•	Take care to supply an IPSec key stream sink as detailed in SEC-SCAF-E001.
       
    83 //!				•	Send the key association for the test agent. The key association is as defined in step SEC-SCAF-E004.
       
    84 //!				•	Change configuration on the Linux machine to use the new key association. 
       
    85 //!				•	Send an encrypted packet
       
    86 //!
       
    87 //! @SYMTestExpectedResults 	• The packet decrypts correctly
       
    88 //! @SYMTestType 		CIT
       
    89 
       
    90 START_TESTCASE SEC-SCAF-E006
       
    91 // The time limit is disabled since this test is manual
       
    92 RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
       
    93 RUN_TEST_STEP -1 tscaf SCAFIpSecDecoderIntegration z:\tcaf\tscaf\tscaf.ini ipsec_integration_decoder
       
    94 END_TESTCASE SEC-SCAF-E006
       
    95 
       
    96 //********************** SEC-SCAF-E012  **********************
       
    97 
       
    98 //! @SYMTestCaseID 		SEC-SCAF-E012
       
    99 //! @SYMTestCaseDesc 		Testing overall IPSec integration: no authentication - manual
       
   100 //! 				(ipsec_integration_no_authentication)
       
   101 //! @SYMPREQ 			PREQ782
       
   102 //! @SYMREQ 			REQ7779
       
   103 //! @SYMTestPriority 		High
       
   104 //! @SYMTestStatus   		Implemented
       
   105 //! @SYMTestActions 		
       
   106 //!				•	Execute steps in SEC-SCAF-E004.
       
   107 //!				•	Reset the authentication algorithm.
       
   108 //!				•	Submit a key association.
       
   109 //!				•	Change configuration on the Linux machine to use the new key association. (use rtest_noAuth.conf instead of rtest.conf)
       
   110 //!				•	Send an encrypted packet
       
   111 //!
       
   112 //! @SYMTestExpectedResults 	• The packet decrypts correctly
       
   113 //! @SYMTestType 		CIT
       
   114 
       
   115 START_TESTCASE SEC-SCAF-E012
       
   116 // The time limit is disabled since this test is manual
       
   117 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_no_authentication
       
   118 END_TESTCASE SEC-SCAF-E012
       
   119 
       
   120 //********************** SEC-SCAF-E008  **********************
       
   121 
       
   122 //! @SYMTestCaseID 		SEC-SCAF-E008
       
   123 //! @SYMTestCaseDesc 		Negative testing for IPSec integration - unprotected port
       
   124 //! 				(ipsec_integration_negative_uprotected_port)
       
   125 //! @SYMPREQ 			PREQ782
       
   126 //! @SYMREQ 			REQ7779
       
   127 //! @SYMTestPriority 		High
       
   128 //! @SYMTestStatus   		Implemented
       
   129 //! @SYMTestActions 		
       
   130 //!				•	Create an IPSec testing environment as detailed in SEC-SCAF-E004.
       
   131 //!				•	Add a synchronous listening socket on the client side on a port not protected by the security policy on the server. Key stream decoder should add the relevant SA at this point. This checks that it is possible to communicate with the same server while the protected stream is being received.
       
   132 //!				•	Send a packet from the Linux machine to the same port - use rsend-differentPort.sh
       
   133 //!				•	Send data on the protected port, but encrypted with a different key than on the client - step B. This checks that SA added by key stream sink take effect. - use rtest-differentKey.conf followed by rsend.sh
       
   134 //!				•	Send data on the protected port, but encrypted with the same key than on the client - use rtest.conf with rsend.sh
       
   135 //!				•   Send data from the server using a different local port.
       
   136 //!
       
   137 //! @SYMTestExpectedResults 	
       
   138 //!				•	Data should not be received in step B, and should be received in step A.
       
   139 //! @SYMTestType 		CIT
       
   140 
       
   141 START_TESTCASE SEC-SCAF-E008
       
   142 // The time limit is disabled since this test is manual
       
   143 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_negative_uprotected_port
       
   144 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini basic_ipsec_integration
       
   145 END_TESTCASE SEC-SCAF-E008