os/security/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscafipsecmanual.script
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
     1 //
     2 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
     3 // All rights reserved.
     4 // This component and the accompanying materials are made available
     5 // under the terms of the License "Eclipse Public License v1.0"
     6 // which accompanies this distribution, and is available
     7 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
     8 //
     9 // Initial Contributors:
    10 // Nokia Corporation - initial contribution.
    11 //
    12 // Contributors:
    13 //
    14 // Description:
    15 //
    16 // Streaming CAF Integration Tests
    17 
    18 PRINT Run PREQ782 Streaming CAF Manual IPSec Integration Tests
    19 
    20 // Load Suite
    21 LOAD_SUITE tscaf
    22 
    23 //********************** SEC-SCAF-E004  **********************
    24 
    25 //! @SYMTestCaseID 		SEC-SCAF-E004
    26 //! @SYMTestCaseDesc 		Testing overall IPSec integration - manual
    27 //! 				(basic_ipsec_integration)
    28 //! @SYMPREQ 			PREQ782
    29 //! @SYMREQ 			REQ7779
    30 //! @SYMTestPriority 		Critical
    31 //! @SYMTestStatus   		Implemented
    32 //! @SYMTestActions 		
    33 //!				•	Execute steps in SEC-SCAF-E001.
    34 //!				•	Submit key association with pre-defined attributes using IPSec key stream sink.
    35 //!				•	Wait for a decrypted packet synchronously.
    36 //!				•	Use a Linux machine and set SADB and Policy DB settings there accordingly (see V:\Dev\TS\TS0013 Crypto Services\Technical\Testing)
    37 //!				•	Send a packet from the Linux machine.
    38 //!
    39 //! @SYMTestExpectedResults 	• Packet is decrypted correctly with expected content.
    40 //! @SYMTestType 		CIT
    41 
    42 START_TESTCASE SEC-SCAF-E004
    43 // The time limit is disabled since this test is manual
    44 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini basic_ipsec_integration
    45 END_TESTCASE SEC-SCAF-E004
    46 
    47 
    48 //********************** SEC-SCAF-E005  **********************
    49 
    50 //! @SYMTestCaseID 		SEC-SCAF-E005
    51 //! @SYMTestCaseDesc 		Testing overall IPSec integration: multiple key messages - manual
    52 //! 				(ipsec_integration_multiple_messages)
    53 //! @SYMPREQ 			PREQ782
    54 //! @SYMREQ 			REQ7779
    55 //! @SYMTestPriority 		Critical
    56 //! @SYMTestStatus   		Implemented
    57 //! @SYMTestActions 		
    58 //!				•	Execute steps in SEC-SCAF-E004.
    59 //!				•	Submit another SA through a new key association in key stream sink.
    60 //!				•	Change configuration on the Linux machine to use the new key association. (use rtest2.conf instead of rtest.conf)
    61 //!				•	Send another packet from the Linux machines 
    62 //!
    63 //! @SYMTestExpectedResults 	• Both packets are decrypted correctly with expected content.
    64 //! @SYMTestType 		CIT
    65 
    66 START_TESTCASE SEC-SCAF-E005
    67 // The time limit is disabled since this test is manual
    68 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_multiple_messages
    69 END_TESTCASE SEC-SCAF-E005
    70 
    71 //********************** SEC-SCAF-E006  **********************
    72 
    73 //! @SYMTestCaseID 		SEC-SCAF-E006
    74 //! @SYMTestCaseDesc 		Testing IPSec integration with key stream decoder - manual
    75 //! 				(ipsec_integration_decoder)
    76 //! @SYMPREQ 			PREQ782
    77 //! @SYMREQ 			REQ7779
    78 //! @SYMTestPriority 		Critical
    79 //! @SYMTestStatus   		Implemented
    80 //! @SYMTestActions 		
    81 //!				•	Create manually a test agent key stream decoder using SDP information
    82 //!				•	Take care to supply an IPSec key stream sink as detailed in SEC-SCAF-E001.
    83 //!				•	Send the key association for the test agent. The key association is as defined in step SEC-SCAF-E004.
    84 //!				•	Change configuration on the Linux machine to use the new key association. 
    85 //!				•	Send an encrypted packet
    86 //!
    87 //! @SYMTestExpectedResults 	• The packet decrypts correctly
    88 //! @SYMTestType 		CIT
    89 
    90 START_TESTCASE SEC-SCAF-E006
    91 // The time limit is disabled since this test is manual
    92 RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
    93 RUN_TEST_STEP -1 tscaf SCAFIpSecDecoderIntegration z:\tcaf\tscaf\tscaf.ini ipsec_integration_decoder
    94 END_TESTCASE SEC-SCAF-E006
    95 
    96 //********************** SEC-SCAF-E012  **********************
    97 
    98 //! @SYMTestCaseID 		SEC-SCAF-E012
    99 //! @SYMTestCaseDesc 		Testing overall IPSec integration: no authentication - manual
   100 //! 				(ipsec_integration_no_authentication)
   101 //! @SYMPREQ 			PREQ782
   102 //! @SYMREQ 			REQ7779
   103 //! @SYMTestPriority 		High
   104 //! @SYMTestStatus   		Implemented
   105 //! @SYMTestActions 		
   106 //!				•	Execute steps in SEC-SCAF-E004.
   107 //!				•	Reset the authentication algorithm.
   108 //!				•	Submit a key association.
   109 //!				•	Change configuration on the Linux machine to use the new key association. (use rtest_noAuth.conf instead of rtest.conf)
   110 //!				•	Send an encrypted packet
   111 //!
   112 //! @SYMTestExpectedResults 	• The packet decrypts correctly
   113 //! @SYMTestType 		CIT
   114 
   115 START_TESTCASE SEC-SCAF-E012
   116 // The time limit is disabled since this test is manual
   117 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_no_authentication
   118 END_TESTCASE SEC-SCAF-E012
   119 
   120 //********************** SEC-SCAF-E008  **********************
   121 
   122 //! @SYMTestCaseID 		SEC-SCAF-E008
   123 //! @SYMTestCaseDesc 		Negative testing for IPSec integration - unprotected port
   124 //! 				(ipsec_integration_negative_uprotected_port)
   125 //! @SYMPREQ 			PREQ782
   126 //! @SYMREQ 			REQ7779
   127 //! @SYMTestPriority 		High
   128 //! @SYMTestStatus   		Implemented
   129 //! @SYMTestActions 		
   130 //!				•	Create an IPSec testing environment as detailed in SEC-SCAF-E004.
   131 //!				•	Add a synchronous listening socket on the client side on a port not protected by the security policy on the server. Key stream decoder should add the relevant SA at this point. This checks that it is possible to communicate with the same server while the protected stream is being received.
   132 //!				•	Send a packet from the Linux machine to the same port - use rsend-differentPort.sh
   133 //!				•	Send data on the protected port, but encrypted with a different key than on the client - step B. This checks that SA added by key stream sink take effect. - use rtest-differentKey.conf followed by rsend.sh
   134 //!				•	Send data on the protected port, but encrypted with the same key than on the client - use rtest.conf with rsend.sh
   135 //!				•   Send data from the server using a different local port.
   136 //!
   137 //! @SYMTestExpectedResults 	
   138 //!				•	Data should not be received in step B, and should be received in step A.
   139 //! @SYMTestType 		CIT
   140 
   141 START_TESTCASE SEC-SCAF-E008
   142 // The time limit is disabled since this test is manual
   143 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_negative_uprotected_port
   144 RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini basic_ipsec_integration
   145 END_TESTCASE SEC-SCAF-E008