os/security/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscafipsecmanual.script
Update contrib.
2 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
3 // All rights reserved.
4 // This component and the accompanying materials are made available
5 // under the terms of the License "Eclipse Public License v1.0"
6 // which accompanies this distribution, and is available
7 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
9 // Initial Contributors:
10 // Nokia Corporation - initial contribution.
16 // Streaming CAF Integration Tests
18 PRINT Run PREQ782 Streaming CAF Manual IPSec Integration Tests
23 //********************** SEC-SCAF-E004 **********************
25 //! @SYMTestCaseID SEC-SCAF-E004
26 //! @SYMTestCaseDesc Testing overall IPSec integration - manual
27 //! (basic_ipsec_integration)
30 //! @SYMTestPriority Critical
31 //! @SYMTestStatus Implemented
33 //! • Execute steps in SEC-SCAF-E001.
34 //! • Submit key association with pre-defined attributes using IPSec key stream sink.
35 //! • Wait for a decrypted packet synchronously.
36 //! • Use a Linux machine and set SADB and Policy DB settings there accordingly (see V:\Dev\TS\TS0013 Crypto Services\Technical\Testing)
37 //! • Send a packet from the Linux machine.
39 //! @SYMTestExpectedResults • Packet is decrypted correctly with expected content.
42 START_TESTCASE SEC-SCAF-E004
43 // The time limit is disabled since this test is manual
44 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini basic_ipsec_integration
45 END_TESTCASE SEC-SCAF-E004
48 //********************** SEC-SCAF-E005 **********************
50 //! @SYMTestCaseID SEC-SCAF-E005
51 //! @SYMTestCaseDesc Testing overall IPSec integration: multiple key messages - manual
52 //! (ipsec_integration_multiple_messages)
55 //! @SYMTestPriority Critical
56 //! @SYMTestStatus Implemented
58 //! • Execute steps in SEC-SCAF-E004.
59 //! • Submit another SA through a new key association in key stream sink.
60 //! • Change configuration on the Linux machine to use the new key association. (use rtest2.conf instead of rtest.conf)
61 //! • Send another packet from the Linux machines
63 //! @SYMTestExpectedResults • Both packets are decrypted correctly with expected content.
66 START_TESTCASE SEC-SCAF-E005
67 // The time limit is disabled since this test is manual
68 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_multiple_messages
69 END_TESTCASE SEC-SCAF-E005
71 //********************** SEC-SCAF-E006 **********************
73 //! @SYMTestCaseID SEC-SCAF-E006
74 //! @SYMTestCaseDesc Testing IPSec integration with key stream decoder - manual
75 //! (ipsec_integration_decoder)
78 //! @SYMTestPriority Critical
79 //! @SYMTestStatus Implemented
81 //! • Create manually a test agent key stream decoder using SDP information
82 //! • Take care to supply an IPSec key stream sink as detailed in SEC-SCAF-E001.
83 //! • Send the key association for the test agent. The key association is as defined in step SEC-SCAF-E004.
84 //! • Change configuration on the Linux machine to use the new key association.
85 //! • Send an encrypted packet
87 //! @SYMTestExpectedResults • The packet decrypts correctly
90 START_TESTCASE SEC-SCAF-E006
91 // The time limit is disabled since this test is manual
92 RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
93 RUN_TEST_STEP -1 tscaf SCAFIpSecDecoderIntegration z:\tcaf\tscaf\tscaf.ini ipsec_integration_decoder
94 END_TESTCASE SEC-SCAF-E006
96 //********************** SEC-SCAF-E012 **********************
98 //! @SYMTestCaseID SEC-SCAF-E012
99 //! @SYMTestCaseDesc Testing overall IPSec integration: no authentication - manual
100 //! (ipsec_integration_no_authentication)
103 //! @SYMTestPriority High
104 //! @SYMTestStatus Implemented
106 //! • Execute steps in SEC-SCAF-E004.
107 //! • Reset the authentication algorithm.
108 //! • Submit a key association.
109 //! • Change configuration on the Linux machine to use the new key association. (use rtest_noAuth.conf instead of rtest.conf)
110 //! • Send an encrypted packet
112 //! @SYMTestExpectedResults • The packet decrypts correctly
115 START_TESTCASE SEC-SCAF-E012
116 // The time limit is disabled since this test is manual
117 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_no_authentication
118 END_TESTCASE SEC-SCAF-E012
120 //********************** SEC-SCAF-E008 **********************
122 //! @SYMTestCaseID SEC-SCAF-E008
123 //! @SYMTestCaseDesc Negative testing for IPSec integration - unprotected port
124 //! (ipsec_integration_negative_uprotected_port)
127 //! @SYMTestPriority High
128 //! @SYMTestStatus Implemented
130 //! • Create an IPSec testing environment as detailed in SEC-SCAF-E004.
131 //! • Add a synchronous listening socket on the client side on a port not protected by the security policy on the server. Key stream decoder should add the relevant SA at this point. This checks that it is possible to communicate with the same server while the protected stream is being received.
132 //! • Send a packet from the Linux machine to the same port - use rsend-differentPort.sh
133 //! • Send data on the protected port, but encrypted with a different key than on the client - step B. This checks that SA added by key stream sink take effect. - use rtest-differentKey.conf followed by rsend.sh
134 //! • Send data on the protected port, but encrypted with the same key than on the client - use rtest.conf with rsend.sh
135 //! • Send data from the server using a different local port.
137 //! @SYMTestExpectedResults
138 //! • Data should not be received in step B, and should be received in step A.
141 START_TESTCASE SEC-SCAF-E008
142 // The time limit is disabled since this test is manual
143 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_negative_uprotected_port
144 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini basic_ipsec_integration
145 END_TESTCASE SEC-SCAF-E008