Contents

  1. Introduction

  2. Conducting verification of signatures

1. Introduction

The present document provides details on how to operate for conducting the negative interoperability tests.

2. Conducting verification of signatures

The details on how to conduct verification of signatures are provided in conducting plugtests: conducting positive tests; conducting verification of signatures. The only difference is that the pre-generated signatures for these tests appear within the ETSI sub-folders.

Below follows the groups of negative test cases present within these ETSI sub-folders:

  1. Revoked signing certificate

    1. revocation before signature with embedded tst (and validation data)
    2. revocation before signature without embedded tst
    3. revocation after signature with embedded tst (and validation data)
    4. revocation after signature without embedded tst
  2. Expired signing certificate

    1. expiration before signature with embedded tst (and validation data)
    2. expiration before signature without embedded tst
    3. expiration after signature with embedded tst (and validation data)
    4. expiration after signature without embedded tst
  3. Not qualified signing certificate

  4. Untrusted signing certificate