os/security/crypto/weakcrypto/test/tpbe/scripts/tpbetests_v2.txt
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
sl@0
     2
// Copyright (C) 2005 - 2006 Symbian Ltd. All Rights Reserved
sl@0
     3
sl@0
     4
sl@0
     5
<action>
sl@0
     6
	<actionname>Element test case 1 with explicit kdf, salt len and iterations, ECipherRC2_CBC_128_16</actionname>
sl@0
     7
	<actiontype>Element</actiontype>
sl@0
     8
	<actionbody>
sl@0
     9
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
    10
		<kdf>PKCS#5</kdf>
sl@0
    11
		<salt_len_bytes>16</salt_len_bytes>
sl@0
    12
		<iter_count>1000</iter_count>
sl@0
    13
		<element>
sl@0
    14
			<passwd>password</passwd>
sl@0
    15
			<input>This is what I want to encrypt</input>
sl@0
    16
		</element>
sl@0
    17
	</actionbody>
sl@0
    18
	<actionresult>
sl@0
    19
		<return>KErrNone</return>
sl@0
    20
	</actionresult>
sl@0
    21
</action>
sl@0
    22
sl@0
    23
<action>
sl@0
    24
	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
sl@0
    25
	<actiontype>Element</actiontype>
sl@0
    26
	<actionbody>
sl@0
    27
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
    28
		<element>
sl@0
    29
			<passwd>password</passwd>
sl@0
    30
			<input>This is what I want to encrypt</input>
sl@0
    31
		</element>
sl@0
    32
	</actionbody>
sl@0
    33
	<actionresult>
sl@0
    34
		<return>KErrNone</return>
sl@0
    35
	</actionresult>
sl@0
    36
</action>
sl@0
    37
sl@0
    38
<action>
sl@0
    39
	<actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
sl@0
    40
	<actiontype>Element</actiontype>
sl@0
    41
	<actionbody>
sl@0
    42
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
    43
		<element>
sl@0
    44
			<passwd>password</passwd>
sl@0
    45
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
    46
		</element>
sl@0
    47
	</actionbody>
sl@0
    48
	<actionresult>
sl@0
    49
		<return>KErrNone</return>
sl@0
    50
	</actionresult>
sl@0
    51
</action>
sl@0
    52
sl@0
    53
<action>
sl@0
    54
	<actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
sl@0
    55
	<actiontype>Element</actiontype>
sl@0
    56
	<actionbody>
sl@0
    57
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
    58
		<element>
sl@0
    59
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
    60
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
    61
		</element>
sl@0
    62
	</actionbody>
sl@0
    63
	<actionresult>
sl@0
    64
		<return>KErrNone</return>
sl@0
    65
	</actionresult>
sl@0
    66
</action>
sl@0
    67
sl@0
    68
<action>
sl@0
    69
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
sl@0
    70
	<actiontype>Set</actiontype>
sl@0
    71
	<actionbody>
sl@0
    72
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
    73
		<set>
sl@0
    74
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
    75
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
    76
		</set>
sl@0
    77
	</actionbody>
sl@0
    78
	<actionresult>
sl@0
    79
		<return>KErrNone</return>
sl@0
    80
	</actionresult>
sl@0
    81
</action>
sl@0
    82
sl@0
    83
<action>
sl@0
    84
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
sl@0
    85
	<actiontype>Set</actiontype>
sl@0
    86
	<actionbody>
sl@0
    87
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
    88
		<kdf>PKCS#5</kdf>
sl@0
    89
		<salt_len_bytes>16</salt_len_bytes>
sl@0
    90
		<iter_count>1000</iter_count>
sl@0
    91
		<set>
sl@0
    92
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
    93
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
    94
		</set>
sl@0
    95
	</actionbody>
sl@0
    96
	<actionresult>
sl@0
    97
		<return>KErrNone</return>
sl@0
    98
	</actionresult>
sl@0
    99
</action>
sl@0
   100
sl@0
   101
<action>
sl@0
   102
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
sl@0
   103
	<actiontype>Set</actiontype>
sl@0
   104
	<actionbody>
sl@0
   105
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
   106
		<set>
sl@0
   107
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   108
			<input>B</input>
sl@0
   109
		</set>
sl@0
   110
	</actionbody>
sl@0
   111
	<actionresult>
sl@0
   112
		<return>KErrNone</return>
sl@0
   113
	</actionresult>
sl@0
   114
</action>
sl@0
   115
sl@0
   116
<action>
sl@0
   117
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
sl@0
   118
	<actiontype>Set</actiontype>
sl@0
   119
	<actionbody>
sl@0
   120
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
   121
		<set>
sl@0
   122
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   123
			<input>ZYXWUTSR</input>
sl@0
   124
		</set>
sl@0
   125
	</actionbody>
sl@0
   126
	<actionresult>
sl@0
   127
		<return>KErrNone</return>
sl@0
   128
	</actionresult>
sl@0
   129
</action>
sl@0
   130
sl@0
   131
<action>
sl@0
   132
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
sl@0
   133
	<actiontype>Set</actiontype>
sl@0
   134
	<actionbody>
sl@0
   135
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
   136
		<set>
sl@0
   137
			<passwd>m</passwd>
sl@0
   138
			<input>ZYXWUTSR</input>
sl@0
   139
		</set>
sl@0
   140
	</actionbody>
sl@0
   141
	<actionresult>
sl@0
   142
		<return>KErrNone</return>
sl@0
   143
	</actionresult>
sl@0
   144
</action>
sl@0
   145
sl@0
   146
<action>
sl@0
   147
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
sl@0
   148
	<actiontype>Set</actiontype>
sl@0
   149
	<actionbody>
sl@0
   150
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
   151
		<set>
sl@0
   152
			<passwd></passwd>
sl@0
   153
			<input>ZYXWUTSR</input>
sl@0
   154
		</set>
sl@0
   155
	</actionbody>
sl@0
   156
	<actionresult>
sl@0
   157
		<return>KErrNone</return>
sl@0
   158
	</actionresult>
sl@0
   159
</action>
sl@0
   160
sl@0
   161
<action>
sl@0
   162
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
sl@0
   163
	<actiontype>Set</actiontype>
sl@0
   164
	<actionbody>
sl@0
   165
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
   166
		<set>
sl@0
   167
			<passwd></passwd>
sl@0
   168
			<input></input>
sl@0
   169
		</set>
sl@0
   170
	</actionbody>
sl@0
   171
	<actionresult>
sl@0
   172
		<return>KErrNone</return>
sl@0
   173
	</actionresult>
sl@0
   174
</action>
sl@0
   175
sl@0
   176
///////////////////////////////////////////////////////////////////////////////////
sl@0
   177
///////////////////////////////////////////////////////////////////////////////////
sl@0
   178
///////////////////////////////////////////////////////////////////////////////////
sl@0
   179
sl@0
   180
<action>
sl@0
   181
	<actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
sl@0
   182
	<actiontype>Element</actiontype>
sl@0
   183
	<actionbody>
sl@0
   184
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   185
		<element>
sl@0
   186
			<passwd>password</passwd>
sl@0
   187
			<input>This is what I want to encrypt</input>
sl@0
   188
		</element>
sl@0
   189
	</actionbody>
sl@0
   190
	<actionresult>
sl@0
   191
		<return>KErrNone</return>
sl@0
   192
	</actionresult>
sl@0
   193
</action>
sl@0
   194
sl@0
   195
<action>
sl@0
   196
	<actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
sl@0
   197
	<actiontype>Element</actiontype>
sl@0
   198
	<actionbody>
sl@0
   199
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   200
		<element>
sl@0
   201
			<passwd>password</passwd>
sl@0
   202
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   203
		</element>
sl@0
   204
	</actionbody>
sl@0
   205
	<actionresult>
sl@0
   206
		<return>KErrNone</return>
sl@0
   207
	</actionresult>
sl@0
   208
</action>
sl@0
   209
sl@0
   210
<action>
sl@0
   211
	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
sl@0
   212
	<actiontype>Element</actiontype>
sl@0
   213
	<actionbody>
sl@0
   214
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   215
		<element>
sl@0
   216
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   217
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   218
		</element>
sl@0
   219
	</actionbody>
sl@0
   220
	<actionresult>
sl@0
   221
		<return>KErrNone</return>
sl@0
   222
	</actionresult>
sl@0
   223
</action>
sl@0
   224
sl@0
   225
<action>
sl@0
   226
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
sl@0
   227
	<actiontype>Set</actiontype>
sl@0
   228
	<actionbody>
sl@0
   229
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   230
		<set>
sl@0
   231
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   232
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   233
		</set>
sl@0
   234
	</actionbody>
sl@0
   235
	<actionresult>
sl@0
   236
		<return>KErrNone</return>
sl@0
   237
	</actionresult>
sl@0
   238
</action>
sl@0
   239
sl@0
   240
<action>
sl@0
   241
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
sl@0
   242
	<actiontype>Set</actiontype>
sl@0
   243
	<actionbody>
sl@0
   244
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   245
		<set>
sl@0
   246
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   247
			<input>B</input>
sl@0
   248
		</set>
sl@0
   249
	</actionbody>
sl@0
   250
	<actionresult>
sl@0
   251
		<return>KErrNone</return>
sl@0
   252
	</actionresult>
sl@0
   253
</action>
sl@0
   254
sl@0
   255
<action>
sl@0
   256
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
sl@0
   257
	<actiontype>Set</actiontype>
sl@0
   258
	<actionbody>
sl@0
   259
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   260
		<set>
sl@0
   261
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   262
			<input>ZYXWUTSR</input>
sl@0
   263
		</set>
sl@0
   264
	</actionbody>
sl@0
   265
	<actionresult>
sl@0
   266
		<return>KErrNone</return>
sl@0
   267
	</actionresult>
sl@0
   268
</action>
sl@0
   269
sl@0
   270
<action>
sl@0
   271
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
sl@0
   272
	<actiontype>Set</actiontype>
sl@0
   273
	<actionbody>
sl@0
   274
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   275
		<set>
sl@0
   276
			<passwd>m</passwd>
sl@0
   277
			<input>ZYXWUTSR</input>
sl@0
   278
		</set>
sl@0
   279
	</actionbody>
sl@0
   280
	<actionresult>
sl@0
   281
		<return>KErrNone</return>
sl@0
   282
	</actionresult>
sl@0
   283
</action>
sl@0
   284
sl@0
   285
<action>
sl@0
   286
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
sl@0
   287
	<actiontype>Set</actiontype>
sl@0
   288
	<actionbody>
sl@0
   289
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   290
		<set>
sl@0
   291
			<passwd></passwd>
sl@0
   292
			<input>ZYXWUTSR</input>
sl@0
   293
		</set>
sl@0
   294
	</actionbody>
sl@0
   295
	<actionresult>
sl@0
   296
		<return>KErrNone</return>
sl@0
   297
	</actionresult>
sl@0
   298
</action>
sl@0
   299
sl@0
   300
<action>
sl@0
   301
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
sl@0
   302
	<actiontype>Set</actiontype>
sl@0
   303
	<actionbody>
sl@0
   304
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
   305
		<set>
sl@0
   306
			<passwd></passwd>
sl@0
   307
			<input></input>
sl@0
   308
		</set>
sl@0
   309
	</actionbody>
sl@0
   310
	<actionresult>
sl@0
   311
		<return>KErrNone</return>
sl@0
   312
	</actionresult>
sl@0
   313
</action>
sl@0
   314
sl@0
   315
///////////////////////////////////////////////////////////////////////////////////
sl@0
   316
///////////////////////////////////////////////////////////////////////////////////
sl@0
   317
///////////////////////////////////////////////////////////////////////////////////
sl@0
   318
sl@0
   319
<action>
sl@0
   320
	<actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
sl@0
   321
	<actiontype>Element</actiontype>
sl@0
   322
	<actionbody>
sl@0
   323
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   324
		<element>
sl@0
   325
			<passwd>password</passwd>
sl@0
   326
			<input>This is what I want to encrypt</input>
sl@0
   327
		</element>
sl@0
   328
	</actionbody>
sl@0
   329
	<actionresult>
sl@0
   330
		<return>KErrNone</return>
sl@0
   331
	</actionresult>
sl@0
   332
</action>
sl@0
   333
sl@0
   334
<action>
sl@0
   335
	<actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
sl@0
   336
	<actiontype>Element</actiontype>
sl@0
   337
	<actionbody>
sl@0
   338
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   339
		<element>
sl@0
   340
			<passwd>password</passwd>
sl@0
   341
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   342
		</element>
sl@0
   343
	</actionbody>
sl@0
   344
	<actionresult>
sl@0
   345
		<return>KErrNone</return>
sl@0
   346
	</actionresult>
sl@0
   347
</action>
sl@0
   348
sl@0
   349
<action>
sl@0
   350
	<actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
sl@0
   351
	<actiontype>Element</actiontype>
sl@0
   352
	<actionbody>
sl@0
   353
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   354
		<element>
sl@0
   355
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   356
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   357
		</element>
sl@0
   358
	</actionbody>
sl@0
   359
	<actionresult>
sl@0
   360
		<return>KErrNone</return>
sl@0
   361
	</actionresult>
sl@0
   362
</action>
sl@0
   363
sl@0
   364
<action>
sl@0
   365
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
sl@0
   366
	<actiontype>Set</actiontype>
sl@0
   367
	<actionbody>
sl@0
   368
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   369
		<set>
sl@0
   370
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   371
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   372
		</set>
sl@0
   373
	</actionbody>
sl@0
   374
	<actionresult>
sl@0
   375
		<return>KErrNone</return>
sl@0
   376
	</actionresult>
sl@0
   377
</action>
sl@0
   378
sl@0
   379
<action>
sl@0
   380
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
sl@0
   381
	<actiontype>Set</actiontype>
sl@0
   382
	<actionbody>
sl@0
   383
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   384
		<set>
sl@0
   385
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   386
			<input>B</input>
sl@0
   387
		</set>
sl@0
   388
	</actionbody>
sl@0
   389
	<actionresult>
sl@0
   390
		<return>KErrNone</return>
sl@0
   391
	</actionresult>
sl@0
   392
</action>
sl@0
   393
sl@0
   394
<action>
sl@0
   395
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
sl@0
   396
	<actiontype>Set</actiontype>
sl@0
   397
	<actionbody>
sl@0
   398
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   399
		<set>
sl@0
   400
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   401
			<input>ZYXWUTSR</input>
sl@0
   402
		</set>
sl@0
   403
	</actionbody>
sl@0
   404
	<actionresult>
sl@0
   405
		<return>KErrNone</return>
sl@0
   406
	</actionresult>
sl@0
   407
</action>
sl@0
   408
sl@0
   409
<action>
sl@0
   410
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
sl@0
   411
	<actiontype>Set</actiontype>
sl@0
   412
	<actionbody>
sl@0
   413
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   414
		<set>
sl@0
   415
			<passwd>m</passwd>
sl@0
   416
			<input>ZYXWUTSR</input>
sl@0
   417
		</set>
sl@0
   418
	</actionbody>
sl@0
   419
	<actionresult>
sl@0
   420
		<return>KErrNone</return>
sl@0
   421
	</actionresult>
sl@0
   422
</action>
sl@0
   423
sl@0
   424
<action>
sl@0
   425
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
sl@0
   426
	<actiontype>Set</actiontype>
sl@0
   427
	<actionbody>
sl@0
   428
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   429
		<set>
sl@0
   430
			<passwd></passwd>
sl@0
   431
			<input>ZYXWUTSR</input>
sl@0
   432
		</set>
sl@0
   433
	</actionbody>
sl@0
   434
	<actionresult>
sl@0
   435
		<return>KErrNone</return>
sl@0
   436
	</actionresult>
sl@0
   437
</action>
sl@0
   438
sl@0
   439
<action>
sl@0
   440
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
sl@0
   441
	<actiontype>Set</actiontype>
sl@0
   442
	<actionbody>
sl@0
   443
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
   444
		<set>
sl@0
   445
			<passwd></passwd>
sl@0
   446
			<input></input>
sl@0
   447
		</set>
sl@0
   448
	</actionbody>
sl@0
   449
	<actionresult>
sl@0
   450
		<return>KErrNone</return>
sl@0
   451
	</actionresult>
sl@0
   452
</action>
sl@0
   453
sl@0
   454
///////////////////////////////////////////////////////////////////////////////////
sl@0
   455
///////////////////////////////////////////////////////////////////////////////////
sl@0
   456
///////////////////////////////////////////////////////////////////////////////////
sl@0
   457
sl@0
   458
<action>
sl@0
   459
	<actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
sl@0
   460
	<actiontype>Element</actiontype>
sl@0
   461
	<actionbody>
sl@0
   462
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   463
		<element>
sl@0
   464
			<passwd>password</passwd>
sl@0
   465
			<input>This is what I want to encrypt</input>
sl@0
   466
		</element>
sl@0
   467
	</actionbody>
sl@0
   468
	<actionresult>
sl@0
   469
		<return>KErrNone</return>
sl@0
   470
	</actionresult>
sl@0
   471
</action>
sl@0
   472
sl@0
   473
<action>
sl@0
   474
	<actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
sl@0
   475
	<actiontype>Element</actiontype>
sl@0
   476
	<actionbody>
sl@0
   477
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   478
		<element>
sl@0
   479
			<passwd>password</passwd>
sl@0
   480
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   481
		</element>
sl@0
   482
	</actionbody>
sl@0
   483
	<actionresult>
sl@0
   484
		<return>KErrNone</return>
sl@0
   485
	</actionresult>
sl@0
   486
</action>
sl@0
   487
sl@0
   488
<action>
sl@0
   489
	<actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
sl@0
   490
	<actiontype>Element</actiontype>
sl@0
   491
	<actionbody>
sl@0
   492
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   493
		<element>
sl@0
   494
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   495
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   496
		</element>
sl@0
   497
	</actionbody>
sl@0
   498
	<actionresult>
sl@0
   499
		<return>KErrNone</return>
sl@0
   500
	</actionresult>
sl@0
   501
</action>
sl@0
   502
sl@0
   503
<action>
sl@0
   504
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
sl@0
   505
	<actiontype>Set</actiontype>
sl@0
   506
	<actionbody>
sl@0
   507
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   508
		<set>
sl@0
   509
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   510
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   511
		</set>
sl@0
   512
	</actionbody>
sl@0
   513
	<actionresult>
sl@0
   514
		<return>KErrNone</return>
sl@0
   515
	</actionresult>
sl@0
   516
</action>
sl@0
   517
sl@0
   518
<action>
sl@0
   519
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
sl@0
   520
	<actiontype>Set</actiontype>
sl@0
   521
	<actionbody>
sl@0
   522
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   523
		<set>
sl@0
   524
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   525
			<input>B</input>
sl@0
   526
		</set>
sl@0
   527
	</actionbody>
sl@0
   528
	<actionresult>
sl@0
   529
		<return>KErrNone</return>
sl@0
   530
	</actionresult>
sl@0
   531
</action>
sl@0
   532
sl@0
   533
<action>
sl@0
   534
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
sl@0
   535
	<actiontype>Set</actiontype>
sl@0
   536
	<actionbody>
sl@0
   537
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   538
		<set>
sl@0
   539
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   540
			<input>ZYXWUTSR</input>
sl@0
   541
		</set>
sl@0
   542
	</actionbody>
sl@0
   543
	<actionresult>
sl@0
   544
		<return>KErrNone</return>
sl@0
   545
	</actionresult>
sl@0
   546
</action>
sl@0
   547
sl@0
   548
<action>
sl@0
   549
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
sl@0
   550
	<actiontype>Set</actiontype>
sl@0
   551
	<actionbody>
sl@0
   552
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   553
		<set>
sl@0
   554
			<passwd>m</passwd>
sl@0
   555
			<input>ZYXWUTSR</input>
sl@0
   556
		</set>
sl@0
   557
	</actionbody>
sl@0
   558
	<actionresult>
sl@0
   559
		<return>KErrNone</return>
sl@0
   560
	</actionresult>
sl@0
   561
</action>
sl@0
   562
sl@0
   563
<action>
sl@0
   564
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
sl@0
   565
	<actiontype>Set</actiontype>
sl@0
   566
	<actionbody>
sl@0
   567
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   568
		<set>
sl@0
   569
			<passwd></passwd>
sl@0
   570
			<input>ZYXWUTSR</input>
sl@0
   571
		</set>
sl@0
   572
	</actionbody>
sl@0
   573
	<actionresult>
sl@0
   574
		<return>KErrNone</return>
sl@0
   575
	</actionresult>
sl@0
   576
</action>
sl@0
   577
sl@0
   578
<action>
sl@0
   579
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
sl@0
   580
	<actiontype>Set</actiontype>
sl@0
   581
	<actionbody>
sl@0
   582
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
   583
		<set>
sl@0
   584
			<passwd></passwd>
sl@0
   585
			<input></input>
sl@0
   586
		</set>
sl@0
   587
	</actionbody>
sl@0
   588
	<actionresult>
sl@0
   589
		<return>KErrNone</return>
sl@0
   590
	</actionresult>
sl@0
   591
</action>
sl@0
   592
sl@0
   593
///////////////////////////////////////////////////////////////////////////////////
sl@0
   594
///////////////////////////////////////////////////////////////////////////////////
sl@0
   595
///////////////////////////////////////////////////////////////////////////////////
sl@0
   596
sl@0
   597
<action>
sl@0
   598
	<actionname>Element test case 1, ECipher3DES_CBC</actionname>
sl@0
   599
	<actiontype>Element</actiontype>
sl@0
   600
	<actionbody>
sl@0
   601
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   602
		<element>
sl@0
   603
			<passwd>password</passwd>
sl@0
   604
			<input>This is what I want to encrypt</input>
sl@0
   605
		</element>
sl@0
   606
	</actionbody>
sl@0
   607
	<actionresult>
sl@0
   608
		<return>KErrNone</return>
sl@0
   609
	</actionresult>
sl@0
   610
</action>
sl@0
   611
sl@0
   612
<action>
sl@0
   613
	<actionname>Element test case 2, ECipher3DES_CBC</actionname>
sl@0
   614
	<actiontype>Element</actiontype>
sl@0
   615
	<actionbody>
sl@0
   616
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   617
		<element>
sl@0
   618
			<passwd>password</passwd>
sl@0
   619
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   620
		</element>
sl@0
   621
	</actionbody>
sl@0
   622
	<actionresult>
sl@0
   623
		<return>KErrNone</return>
sl@0
   624
	</actionresult>
sl@0
   625
</action>
sl@0
   626
sl@0
   627
<action>
sl@0
   628
	<actionname>Element test case 3, ECipher3DES_CBC</actionname>
sl@0
   629
	<actiontype>Element</actiontype>
sl@0
   630
	<actionbody>
sl@0
   631
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   632
		<element>
sl@0
   633
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   634
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   635
		</element>
sl@0
   636
	</actionbody>
sl@0
   637
	<actionresult>
sl@0
   638
		<return>KErrNone</return>
sl@0
   639
	</actionresult>
sl@0
   640
</action>
sl@0
   641
sl@0
   642
<action>
sl@0
   643
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
sl@0
   644
	<actiontype>Set</actiontype>
sl@0
   645
	<actionbody>
sl@0
   646
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   647
		<set>
sl@0
   648
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   649
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   650
		</set>
sl@0
   651
	</actionbody>
sl@0
   652
	<actionresult>
sl@0
   653
		<return>KErrNone</return>
sl@0
   654
	</actionresult>
sl@0
   655
</action>
sl@0
   656
sl@0
   657
<action>
sl@0
   658
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
sl@0
   659
	<actiontype>Set</actiontype>
sl@0
   660
	<actionbody>
sl@0
   661
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   662
		<set>
sl@0
   663
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   664
			<input>B</input>
sl@0
   665
		</set>
sl@0
   666
	</actionbody>
sl@0
   667
	<actionresult>
sl@0
   668
		<return>KErrNone</return>
sl@0
   669
	</actionresult>
sl@0
   670
</action>
sl@0
   671
sl@0
   672
<action>
sl@0
   673
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
sl@0
   674
	<actiontype>Set</actiontype>
sl@0
   675
	<actionbody>
sl@0
   676
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   677
		<set>
sl@0
   678
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   679
			<input>ZYXWUTSR</input>
sl@0
   680
		</set>
sl@0
   681
	</actionbody>
sl@0
   682
	<actionresult>
sl@0
   683
		<return>KErrNone</return>
sl@0
   684
	</actionresult>
sl@0
   685
</action>
sl@0
   686
sl@0
   687
<action>
sl@0
   688
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
sl@0
   689
	<actiontype>Set</actiontype>
sl@0
   690
	<actionbody>
sl@0
   691
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   692
		<set>
sl@0
   693
			<passwd>m</passwd>
sl@0
   694
			<input>ZYXWUTSR</input>
sl@0
   695
		</set>
sl@0
   696
	</actionbody>
sl@0
   697
	<actionresult>
sl@0
   698
		<return>KErrNone</return>
sl@0
   699
	</actionresult>
sl@0
   700
</action>
sl@0
   701
sl@0
   702
<action>
sl@0
   703
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
sl@0
   704
	<actiontype>Set</actiontype>
sl@0
   705
	<actionbody>
sl@0
   706
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   707
		<set>
sl@0
   708
			<passwd></passwd>
sl@0
   709
			<input>ZYXWUTSR</input>
sl@0
   710
		</set>
sl@0
   711
	</actionbody>
sl@0
   712
	<actionresult>
sl@0
   713
		<return>KErrNone</return>
sl@0
   714
	</actionresult>
sl@0
   715
</action>
sl@0
   716
sl@0
   717
<action>
sl@0
   718
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
sl@0
   719
	<actiontype>Set</actiontype>
sl@0
   720
	<actionbody>
sl@0
   721
		<cipher>ECipher3DES_CBC</cipher>
sl@0
   722
		<set>
sl@0
   723
			<passwd></passwd>
sl@0
   724
			<input></input>
sl@0
   725
		</set>
sl@0
   726
	</actionbody>
sl@0
   727
	<actionresult>
sl@0
   728
		<return>KErrNone</return>
sl@0
   729
	</actionresult>
sl@0
   730
</action>
sl@0
   731
sl@0
   732
///////////////////////////////////////////////////////////////////////////////////
sl@0
   733
///////////////////////////////////////////////////////////////////////////////////
sl@0
   734
///////////////////////////////////////////////////////////////////////////////////
sl@0
   735
sl@0
   736
<action>
sl@0
   737
	<actionname>Element test case 1, ECipherAES_CBC_256</actionname>
sl@0
   738
	<actiontype>Element</actiontype>
sl@0
   739
	<actionbody>
sl@0
   740
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   741
		<element>
sl@0
   742
			<passwd>password</passwd>
sl@0
   743
			<input>This is what I want to encrypt</input>
sl@0
   744
		</element>
sl@0
   745
	</actionbody>
sl@0
   746
	<actionresult>
sl@0
   747
		<return>KErrNone</return>
sl@0
   748
	</actionresult>
sl@0
   749
</action>
sl@0
   750
sl@0
   751
<action>
sl@0
   752
	<actionname>Element test case 2, ECipherAES_CBC_256</actionname>
sl@0
   753
	<actiontype>Element</actiontype>
sl@0
   754
	<actionbody>
sl@0
   755
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   756
		<element>
sl@0
   757
			<passwd>password</passwd>
sl@0
   758
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   759
		</element>
sl@0
   760
	</actionbody>
sl@0
   761
	<actionresult>
sl@0
   762
		<return>KErrNone</return>
sl@0
   763
	</actionresult>
sl@0
   764
</action>
sl@0
   765
sl@0
   766
<action>
sl@0
   767
	<actionname>Element test case 3, ECipherAES_CBC_256</actionname>
sl@0
   768
	<actiontype>Element</actiontype>
sl@0
   769
	<actionbody>
sl@0
   770
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   771
		<element>
sl@0
   772
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   773
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   774
		</element>
sl@0
   775
	</actionbody>
sl@0
   776
	<actionresult>
sl@0
   777
		<return>KErrNone</return>
sl@0
   778
	</actionresult>
sl@0
   779
</action>
sl@0
   780
sl@0
   781
<action>
sl@0
   782
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
sl@0
   783
	<actiontype>Set</actiontype>
sl@0
   784
	<actionbody>
sl@0
   785
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   786
		<set>
sl@0
   787
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   788
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   789
		</set>
sl@0
   790
	</actionbody>
sl@0
   791
	<actionresult>
sl@0
   792
		<return>KErrNone</return>
sl@0
   793
	</actionresult>
sl@0
   794
</action>
sl@0
   795
sl@0
   796
<action>
sl@0
   797
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
sl@0
   798
	<actiontype>Set</actiontype>
sl@0
   799
	<actionbody>
sl@0
   800
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   801
		<set>
sl@0
   802
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   803
			<input>B</input>
sl@0
   804
		</set>
sl@0
   805
	</actionbody>
sl@0
   806
	<actionresult>
sl@0
   807
		<return>KErrNone</return>
sl@0
   808
	</actionresult>
sl@0
   809
</action>
sl@0
   810
sl@0
   811
<action>
sl@0
   812
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
sl@0
   813
	<actiontype>Set</actiontype>
sl@0
   814
	<actionbody>
sl@0
   815
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   816
		<set>
sl@0
   817
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   818
			<input>ZYXWUTSR</input>
sl@0
   819
		</set>
sl@0
   820
	</actionbody>
sl@0
   821
	<actionresult>
sl@0
   822
		<return>KErrNone</return>
sl@0
   823
	</actionresult>
sl@0
   824
</action>
sl@0
   825
sl@0
   826
<action>
sl@0
   827
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
sl@0
   828
	<actiontype>Set</actiontype>
sl@0
   829
	<actionbody>
sl@0
   830
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   831
		<set>
sl@0
   832
			<passwd>m</passwd>
sl@0
   833
			<input>ZYXWUTSR</input>
sl@0
   834
		</set>
sl@0
   835
	</actionbody>
sl@0
   836
	<actionresult>
sl@0
   837
		<return>KErrNone</return>
sl@0
   838
	</actionresult>
sl@0
   839
</action>
sl@0
   840
sl@0
   841
<action>
sl@0
   842
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
sl@0
   843
	<actiontype>Set</actiontype>
sl@0
   844
	<actionbody>
sl@0
   845
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   846
		<set>
sl@0
   847
			<passwd></passwd>
sl@0
   848
			<input>ZYXWUTSR</input>
sl@0
   849
		</set>
sl@0
   850
	</actionbody>
sl@0
   851
	<actionresult>
sl@0
   852
		<return>KErrNone</return>
sl@0
   853
	</actionresult>
sl@0
   854
</action>
sl@0
   855
sl@0
   856
<action>
sl@0
   857
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
sl@0
   858
	<actiontype>Set</actiontype>
sl@0
   859
	<actionbody>
sl@0
   860
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
   861
		<set>
sl@0
   862
			<passwd></passwd>
sl@0
   863
			<input></input>
sl@0
   864
		</set>
sl@0
   865
	</actionbody>
sl@0
   866
	<actionresult>
sl@0
   867
		<return>KErrNone</return>
sl@0
   868
	</actionresult>
sl@0
   869
</action>
sl@0
   870
sl@0
   871
///////////////////////////////////////////////////////////////////////////////////
sl@0
   872
///////////////////////////////////////////////////////////////////////////////////
sl@0
   873
///////////////////////////////////////////////////////////////////////////////////
sl@0
   874
sl@0
   875
<action>
sl@0
   876
	<actionname>Element test case 1, ECipherAES_CBC_192</actionname>
sl@0
   877
	<actiontype>Element</actiontype>
sl@0
   878
	<actionbody>
sl@0
   879
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
   880
		<element>
sl@0
   881
			<passwd>password</passwd>
sl@0
   882
			<input>This is what I want to encrypt</input>
sl@0
   883
		</element>
sl@0
   884
	</actionbody>
sl@0
   885
	<actionresult>
sl@0
   886
		<return>KErrNone</return>
sl@0
   887
	</actionresult>
sl@0
   888
</action>
sl@0
   889
sl@0
   890
<action>
sl@0
   891
	<actionname>Element test case 2, ECipherAES_CBC_192</actionname>
sl@0
   892
	<actiontype>Element</actiontype>
sl@0
   893
	<actionbody>
sl@0
   894
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
   895
		<element>
sl@0
   896
			<passwd>password</passwd>
sl@0
   897
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   898
		</element>
sl@0
   899
	</actionbody>
sl@0
   900
	<actionresult>
sl@0
   901
		<return>KErrNone</return>
sl@0
   902
	</actionresult>
sl@0
   903
</action>
sl@0
   904
sl@0
   905
<action>
sl@0
   906
	<actionname>Element test case 3, ECipherAES_CBC_192</actionname>
sl@0
   907
	<actiontype>Element</actiontype>
sl@0
   908
	<actionbody>
sl@0
   909
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
   910
		<element>
sl@0
   911
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   912
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   913
		</element>
sl@0
   914
	</actionbody>
sl@0
   915
	<actionresult>
sl@0
   916
		<return>KErrNone</return>
sl@0
   917
	</actionresult>
sl@0
   918
</action>
sl@0
   919
sl@0
   920
<action>
sl@0
   921
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
sl@0
   922
	<actiontype>Set</actiontype>
sl@0
   923
	<actionbody>
sl@0
   924
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
   925
		<set>
sl@0
   926
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   927
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
   928
		</set>
sl@0
   929
	</actionbody>
sl@0
   930
	<actionresult>
sl@0
   931
		<return>KErrNone</return>
sl@0
   932
	</actionresult>
sl@0
   933
</action>
sl@0
   934
sl@0
   935
<action>
sl@0
   936
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
sl@0
   937
	<actiontype>Set</actiontype>
sl@0
   938
	<actionbody>
sl@0
   939
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
   940
		<set>
sl@0
   941
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   942
			<input>B</input>
sl@0
   943
		</set>
sl@0
   944
	</actionbody>
sl@0
   945
	<actionresult>
sl@0
   946
		<return>KErrNone</return>
sl@0
   947
	</actionresult>
sl@0
   948
</action>
sl@0
   949
sl@0
   950
<action>
sl@0
   951
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
sl@0
   952
	<actiontype>Set</actiontype>
sl@0
   953
	<actionbody>
sl@0
   954
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
   955
		<set>
sl@0
   956
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
   957
			<input>ZYXWUTSR</input>
sl@0
   958
		</set>
sl@0
   959
	</actionbody>
sl@0
   960
	<actionresult>
sl@0
   961
		<return>KErrNone</return>
sl@0
   962
	</actionresult>
sl@0
   963
</action>
sl@0
   964
sl@0
   965
<action>
sl@0
   966
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
sl@0
   967
	<actiontype>Set</actiontype>
sl@0
   968
	<actionbody>
sl@0
   969
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
   970
		<set>
sl@0
   971
			<passwd>m</passwd>
sl@0
   972
			<input>ZYXWUTSR</input>
sl@0
   973
		</set>
sl@0
   974
	</actionbody>
sl@0
   975
	<actionresult>
sl@0
   976
		<return>KErrNone</return>
sl@0
   977
	</actionresult>
sl@0
   978
</action>
sl@0
   979
sl@0
   980
<action>
sl@0
   981
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
sl@0
   982
	<actiontype>Set</actiontype>
sl@0
   983
	<actionbody>
sl@0
   984
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
   985
		<set>
sl@0
   986
			<passwd></passwd>
sl@0
   987
			<input>ZYXWUTSR</input>
sl@0
   988
		</set>
sl@0
   989
	</actionbody>
sl@0
   990
	<actionresult>
sl@0
   991
		<return>KErrNone</return>
sl@0
   992
	</actionresult>
sl@0
   993
</action>
sl@0
   994
sl@0
   995
<action>
sl@0
   996
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
sl@0
   997
	<actiontype>Set</actiontype>
sl@0
   998
	<actionbody>
sl@0
   999
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  1000
		<set>
sl@0
  1001
			<passwd></passwd>
sl@0
  1002
			<input></input>
sl@0
  1003
		</set>
sl@0
  1004
	</actionbody>
sl@0
  1005
	<actionresult>
sl@0
  1006
		<return>KErrNone</return>
sl@0
  1007
	</actionresult>
sl@0
  1008
</action>
sl@0
  1009
sl@0
  1010
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1011
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1012
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1013
sl@0
  1014
sl@0
  1015
<action>
sl@0
  1016
	<actionname>Element test case 1, ECipherAES_CBC_128</actionname>
sl@0
  1017
	<actiontype>Element</actiontype>
sl@0
  1018
	<actionbody>
sl@0
  1019
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1020
		<element>
sl@0
  1021
			<passwd>password</passwd>
sl@0
  1022
			<input>This is what I want to encrypt</input>
sl@0
  1023
		</element>
sl@0
  1024
	</actionbody>
sl@0
  1025
	<actionresult>
sl@0
  1026
		<return>KErrNone</return>
sl@0
  1027
	</actionresult>
sl@0
  1028
</action>
sl@0
  1029
sl@0
  1030
<action>
sl@0
  1031
	<actionname>Element test case 2, ECipherAES_CBC_128</actionname>
sl@0
  1032
	<actiontype>Element</actiontype>
sl@0
  1033
	<actionbody>
sl@0
  1034
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1035
		<element>
sl@0
  1036
			<passwd>password</passwd>
sl@0
  1037
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1038
		</element>
sl@0
  1039
	</actionbody>
sl@0
  1040
	<actionresult>
sl@0
  1041
		<return>KErrNone</return>
sl@0
  1042
	</actionresult>
sl@0
  1043
</action>
sl@0
  1044
sl@0
  1045
<action>
sl@0
  1046
	<actionname>Element test case 3, ECipherAES_CBC_128</actionname>
sl@0
  1047
	<actiontype>Element</actiontype>
sl@0
  1048
	<actionbody>
sl@0
  1049
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1050
		<element>
sl@0
  1051
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1052
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1053
		</element>
sl@0
  1054
	</actionbody>
sl@0
  1055
	<actionresult>
sl@0
  1056
		<return>KErrNone</return>
sl@0
  1057
	</actionresult>
sl@0
  1058
</action>
sl@0
  1059
sl@0
  1060
<action>
sl@0
  1061
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
sl@0
  1062
	<actiontype>Set</actiontype>
sl@0
  1063
	<actionbody>
sl@0
  1064
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1065
		<set>
sl@0
  1066
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1067
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1068
		</set>
sl@0
  1069
	</actionbody>
sl@0
  1070
	<actionresult>
sl@0
  1071
		<return>KErrNone</return>
sl@0
  1072
	</actionresult>
sl@0
  1073
</action>
sl@0
  1074
sl@0
  1075
<action>
sl@0
  1076
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
sl@0
  1077
	<actiontype>Set</actiontype>
sl@0
  1078
	<actionbody>
sl@0
  1079
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1080
		<set>
sl@0
  1081
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1082
			<input>B</input>
sl@0
  1083
		</set>
sl@0
  1084
	</actionbody>
sl@0
  1085
	<actionresult>
sl@0
  1086
		<return>KErrNone</return>
sl@0
  1087
	</actionresult>
sl@0
  1088
</action>
sl@0
  1089
sl@0
  1090
<action>
sl@0
  1091
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
sl@0
  1092
	<actiontype>Set</actiontype>
sl@0
  1093
	<actionbody>
sl@0
  1094
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1095
		<set>
sl@0
  1096
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1097
			<input>ZYXWUTSR</input>
sl@0
  1098
		</set>
sl@0
  1099
	</actionbody>
sl@0
  1100
	<actionresult>
sl@0
  1101
		<return>KErrNone</return>
sl@0
  1102
	</actionresult>
sl@0
  1103
</action>
sl@0
  1104
sl@0
  1105
<action>
sl@0
  1106
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
sl@0
  1107
	<actiontype>Set</actiontype>
sl@0
  1108
	<actionbody>
sl@0
  1109
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1110
		<set>
sl@0
  1111
			<passwd>m</passwd>
sl@0
  1112
			<input>ZYXWUTSR</input>
sl@0
  1113
		</set>
sl@0
  1114
	</actionbody>
sl@0
  1115
	<actionresult>
sl@0
  1116
		<return>KErrNone</return>
sl@0
  1117
	</actionresult>
sl@0
  1118
</action>
sl@0
  1119
sl@0
  1120
<action>
sl@0
  1121
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
sl@0
  1122
	<actiontype>Set</actiontype>
sl@0
  1123
	<actionbody>
sl@0
  1124
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1125
		<set>
sl@0
  1126
			<passwd></passwd>
sl@0
  1127
			<input>ZYXWUTSR</input>
sl@0
  1128
		</set>
sl@0
  1129
	</actionbody>
sl@0
  1130
	<actionresult>
sl@0
  1131
		<return>KErrNone</return>
sl@0
  1132
	</actionresult>
sl@0
  1133
</action>
sl@0
  1134
sl@0
  1135
<action>
sl@0
  1136
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
sl@0
  1137
	<actiontype>Set</actiontype>
sl@0
  1138
	<actionbody>
sl@0
  1139
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  1140
		<set>
sl@0
  1141
			<passwd></passwd>
sl@0
  1142
			<input></input>
sl@0
  1143
		</set>
sl@0
  1144
	</actionbody>
sl@0
  1145
	<actionresult>
sl@0
  1146
		<return>KErrNone</return>
sl@0
  1147
	</actionresult>
sl@0
  1148
</action>
sl@0
  1149
sl@0
  1150
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1151
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1152
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1153
sl@0
  1154
sl@0
  1155
// Start of Permanent File Store PBE testing between weak and strong crypto
sl@0
  1156
<action>
sl@0
  1157
	<actionname>Write encrypted data to a PFS named according to crypto strength</actionname>
sl@0
  1158
	<actiontype>WritePFS</actiontype>
sl@0
  1159
	<actionbody>
sl@0
  1160
		<writepfs>
sl@0
  1161
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1162
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1163
		</writepfs>
sl@0
  1164
	</actionbody>
sl@0
  1165
	<actionresult>
sl@0
  1166
		<return>KErrNone</return>
sl@0
  1167
	</actionresult>
sl@0
  1168
</action>
sl@0
  1169
<action>
sl@0
  1170
	<actionname>Decrypting weak crypto file</actionname>
sl@0
  1171
	<actiontype>ReadPFS</actiontype>
sl@0
  1172
	<actionbody>
sl@0
  1173
		<readpfs>
sl@0
  1174
			<strength>weak</strength>
sl@0
  1175
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1176
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1177
		</readpfs>
sl@0
  1178
	</actionbody>
sl@0
  1179
	<actionresult>
sl@0
  1180
		<return>KErrNone</return>
sl@0
  1181
	</actionresult>
sl@0
  1182
</action>
sl@0
  1183
<action>
sl@0
  1184
	<actionname>Decrypting strong crypto file</actionname>
sl@0
  1185
	<actiontype>ReadPFS</actiontype>
sl@0
  1186
	<actionbody>
sl@0
  1187
		<readpfs>
sl@0
  1188
			<strength>strong</strength>
sl@0
  1189
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1190
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1191
		</readpfs>
sl@0
  1192
	</actionbody>
sl@0
  1193
	<actionresult>
sl@0
  1194
		<return>KErrNone</return>
sl@0
  1195
	</actionresult>
sl@0
  1196
</action>
sl@0
  1197
sl@0
  1198
//Start of OOM testing
sl@0
  1199
<action>
sl@0
  1200
    <actionname>OOM start</actionname>
sl@0
  1201
    <actiontype>startmemfailure</actiontype>
sl@0
  1202
    <actionbody></actionbody>
sl@0
  1203
    <actionresult>
sl@0
  1204
        <return>KErrNone</return>
sl@0
  1205
    </actionresult>
sl@0
  1206
</action>
sl@0
  1207
<action>
sl@0
  1208
	<actionname>Element test case 2</actionname>
sl@0
  1209
	<actiontype>Element</actiontype>
sl@0
  1210
	<actionbody>
sl@0
  1211
		<element>
sl@0
  1212
			<passwd>password</passwd>
sl@0
  1213
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1214
		</element>
sl@0
  1215
	</actionbody>
sl@0
  1216
	<actionresult>
sl@0
  1217
		<return>KErrNone</return>
sl@0
  1218
	</actionresult>
sl@0
  1219
</action>
sl@0
  1220
<action>
sl@0
  1221
	<actionname>Test of Set encryption, password changing, exporting importing Test 1</actionname>
sl@0
  1222
	<actiontype>Set</actiontype>
sl@0
  1223
	<actionbody>
sl@0
  1224
		<set>
sl@0
  1225
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1226
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1227
		</set>
sl@0
  1228
	</actionbody>
sl@0
  1229
	<actionresult>
sl@0
  1230
		<return>KErrNone</return>
sl@0
  1231
	</actionresult>
sl@0
  1232
</action>
sl@0
  1233
<action>
sl@0
  1234
    <actionname>OOM end</actionname>
sl@0
  1235
    <actiontype>stopmemfailure</actiontype>
sl@0
  1236
    <actionbody></actionbody>
sl@0
  1237
    <actionresult>
sl@0
  1238
        <return>KErrNone</return>
sl@0
  1239
    </actionresult>
sl@0
  1240
</action>
sl@0
  1241
sl@0
  1242
sl@0
  1243
// =======================================================================
sl@0
  1244
// PKCS#12 tests
sl@0
  1245
sl@0
  1246
sl@0
  1247
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1248
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1249
//! @SYMREQ CIT_PREQ1054
sl@0
  1250
//! @SYMTestPriority medium
sl@0
  1251
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1252
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1253
<action>
sl@0
  1254
	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
sl@0
  1255
	<actiontype>Element</actiontype>
sl@0
  1256
	<actionbody>
sl@0
  1257
		<kdf>PKCS#12</kdf>
sl@0
  1258
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1259
		<iter_count>1024</iter_count>
sl@0
  1260
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1261
		<element>
sl@0
  1262
			<passwd>password</passwd>
sl@0
  1263
			<input>This is what I want to encrypt</input>
sl@0
  1264
		</element>
sl@0
  1265
	</actionbody>
sl@0
  1266
	<actionresult>
sl@0
  1267
		<return>KErrNone</return>
sl@0
  1268
	</actionresult>
sl@0
  1269
</action>
sl@0
  1270
sl@0
  1271
sl@0
  1272
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1273
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1274
//! @SYMREQ CIT_PREQ1054
sl@0
  1275
//! @SYMTestPriority medium
sl@0
  1276
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1277
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1278
<action>
sl@0
  1279
	<actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
sl@0
  1280
	<actiontype>Element</actiontype>
sl@0
  1281
	<actionbody>
sl@0
  1282
		<kdf>PKCS#12</kdf>
sl@0
  1283
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1284
		<iter_count>1024</iter_count>
sl@0
  1285
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1286
		<element>
sl@0
  1287
			<passwd>password</passwd>
sl@0
  1288
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1289
		</element>
sl@0
  1290
	</actionbody>
sl@0
  1291
	<actionresult>
sl@0
  1292
		<return>KErrNone</return>
sl@0
  1293
	</actionresult>
sl@0
  1294
</action>
sl@0
  1295
sl@0
  1296
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1297
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1298
//! @SYMREQ CIT_PREQ1054
sl@0
  1299
//! @SYMTestPriority medium
sl@0
  1300
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1301
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1302
<action>
sl@0
  1303
	<actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
sl@0
  1304
	<actiontype>Element</actiontype>
sl@0
  1305
	<actionbody>
sl@0
  1306
		<kdf>PKCS#12</kdf>
sl@0
  1307
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1308
		<iter_count>1024</iter_count>
sl@0
  1309
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1310
		<element>
sl@0
  1311
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1312
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1313
		</element>
sl@0
  1314
	</actionbody>
sl@0
  1315
	<actionresult>
sl@0
  1316
		<return>KErrNone</return>
sl@0
  1317
	</actionresult>
sl@0
  1318
</action>
sl@0
  1319
sl@0
  1320
sl@0
  1321
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1322
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1323
//! @SYMREQ CIT_PREQ1054
sl@0
  1324
//! @SYMTestPriority medium
sl@0
  1325
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1326
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1327
<action>
sl@0
  1328
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
sl@0
  1329
	<actiontype>Set</actiontype>
sl@0
  1330
	<actionbody>
sl@0
  1331
		<kdf>PKCS#12</kdf>
sl@0
  1332
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1333
		<iter_count>1024</iter_count>
sl@0
  1334
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1335
		<set>
sl@0
  1336
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1337
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1338
		</set>
sl@0
  1339
	</actionbody>
sl@0
  1340
	<actionresult>
sl@0
  1341
		<return>KErrNone</return>
sl@0
  1342
	</actionresult>
sl@0
  1343
</action>
sl@0
  1344
sl@0
  1345
sl@0
  1346
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1347
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#5 KDF.
sl@0
  1348
//! @SYMREQ CIT_PREQ1054
sl@0
  1349
//! @SYMTestPriority medium
sl@0
  1350
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1351
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1352
<action>
sl@0
  1353
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
sl@0
  1354
	<actiontype>Set</actiontype>
sl@0
  1355
	<actionbody>
sl@0
  1356
		<kdf>PKCS#12</kdf>
sl@0
  1357
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1358
		<iter_count>1024</iter_count>
sl@0
  1359
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1360
		<kdf>PKCS#5</kdf>
sl@0
  1361
		<salt_len_bytes>16</salt_len_bytes>
sl@0
  1362
		<iter_count>1000</iter_count>
sl@0
  1363
		<set>
sl@0
  1364
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1365
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1366
		</set>
sl@0
  1367
	</actionbody>
sl@0
  1368
	<actionresult>
sl@0
  1369
		<return>KErrNone</return>
sl@0
  1370
	</actionresult>
sl@0
  1371
</action>
sl@0
  1372
sl@0
  1373
sl@0
  1374
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1375
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1376
//! @SYMREQ CIT_PREQ1054
sl@0
  1377
//! @SYMTestPriority medium
sl@0
  1378
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1379
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1380
<action>
sl@0
  1381
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
sl@0
  1382
	<actiontype>Set</actiontype>
sl@0
  1383
	<actionbody>
sl@0
  1384
		<kdf>PKCS#12</kdf>
sl@0
  1385
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1386
		<iter_count>1024</iter_count>
sl@0
  1387
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1388
		<set>
sl@0
  1389
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1390
			<input>B</input>
sl@0
  1391
		</set>
sl@0
  1392
	</actionbody>
sl@0
  1393
	<actionresult>
sl@0
  1394
		<return>KErrNone</return>
sl@0
  1395
	</actionresult>
sl@0
  1396
</action>
sl@0
  1397
sl@0
  1398
sl@0
  1399
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1400
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1401
//! @SYMREQ CIT_PREQ1054
sl@0
  1402
//! @SYMTestPriority medium
sl@0
  1403
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1404
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1405
<action>
sl@0
  1406
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
sl@0
  1407
	<actiontype>Set</actiontype>
sl@0
  1408
	<actionbody>
sl@0
  1409
		<kdf>PKCS#12</kdf>
sl@0
  1410
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1411
		<iter_count>1024</iter_count>
sl@0
  1412
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1413
		<set>
sl@0
  1414
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1415
			<input>ZYXWUTSR</input>
sl@0
  1416
		</set>
sl@0
  1417
	</actionbody>
sl@0
  1418
	<actionresult>
sl@0
  1419
		<return>KErrNone</return>
sl@0
  1420
	</actionresult>
sl@0
  1421
</action>
sl@0
  1422
sl@0
  1423
sl@0
  1424
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1425
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1426
//! @SYMREQ CIT_PREQ1054
sl@0
  1427
//! @SYMTestPriority medium
sl@0
  1428
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1429
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1430
<action>
sl@0
  1431
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
sl@0
  1432
	<actiontype>Set</actiontype>
sl@0
  1433
	<actionbody>
sl@0
  1434
		<kdf>PKCS#12</kdf>
sl@0
  1435
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1436
		<iter_count>1024</iter_count>
sl@0
  1437
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1438
		<set>
sl@0
  1439
			<passwd>m</passwd>
sl@0
  1440
			<input>ZYXWUTSR</input>
sl@0
  1441
		</set>
sl@0
  1442
	</actionbody>
sl@0
  1443
	<actionresult>
sl@0
  1444
		<return>KErrNone</return>
sl@0
  1445
	</actionresult>
sl@0
  1446
</action>
sl@0
  1447
sl@0
  1448
sl@0
  1449
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1450
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1451
//! @SYMREQ CIT_PREQ1054
sl@0
  1452
//! @SYMTestPriority medium
sl@0
  1453
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1454
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1455
<action>
sl@0
  1456
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
sl@0
  1457
	<actiontype>Set</actiontype>
sl@0
  1458
	<actionbody>
sl@0
  1459
		<kdf>PKCS#12</kdf>
sl@0
  1460
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1461
		<iter_count>1024</iter_count>
sl@0
  1462
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1463
		<set>
sl@0
  1464
			<passwd></passwd>
sl@0
  1465
			<input>ZYXWUTSR</input>
sl@0
  1466
		</set>
sl@0
  1467
	</actionbody>
sl@0
  1468
	<actionresult>
sl@0
  1469
		<return>KErrNone</return>
sl@0
  1470
	</actionresult>
sl@0
  1471
</action>
sl@0
  1472
sl@0
  1473
sl@0
  1474
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1475
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1476
//! @SYMREQ CIT_PREQ1054
sl@0
  1477
//! @SYMTestPriority medium
sl@0
  1478
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1479
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1480
<action>
sl@0
  1481
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
sl@0
  1482
	<actiontype>Set</actiontype>
sl@0
  1483
	<actionbody>
sl@0
  1484
		<kdf>PKCS#12</kdf>
sl@0
  1485
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1486
		<iter_count>1024</iter_count>
sl@0
  1487
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  1488
		<set>
sl@0
  1489
			<passwd></passwd>
sl@0
  1490
			<input></input>
sl@0
  1491
		</set>
sl@0
  1492
	</actionbody>
sl@0
  1493
	<actionresult>
sl@0
  1494
		<return>KErrNone</return>
sl@0
  1495
	</actionresult>
sl@0
  1496
</action>
sl@0
  1497
sl@0
  1498
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1499
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1500
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1501
sl@0
  1502
sl@0
  1503
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1504
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1505
//! @SYMREQ CIT_PREQ1054
sl@0
  1506
//! @SYMTestPriority medium
sl@0
  1507
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1508
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1509
<action>
sl@0
  1510
	<actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
sl@0
  1511
	<actiontype>Element</actiontype>
sl@0
  1512
	<actionbody>
sl@0
  1513
		<kdf>PKCS#12</kdf>
sl@0
  1514
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1515
		<iter_count>1024</iter_count>
sl@0
  1516
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1517
		<element>
sl@0
  1518
			<passwd>password</passwd>
sl@0
  1519
			<input>This is what I want to encrypt</input>
sl@0
  1520
		</element>
sl@0
  1521
	</actionbody>
sl@0
  1522
	<actionresult>
sl@0
  1523
		<return>KErrNone</return>
sl@0
  1524
	</actionresult>
sl@0
  1525
</action>
sl@0
  1526
sl@0
  1527
sl@0
  1528
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1529
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1530
//! @SYMREQ CIT_PREQ1054
sl@0
  1531
//! @SYMTestPriority medium
sl@0
  1532
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1533
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1534
<action>
sl@0
  1535
	<actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
sl@0
  1536
	<actiontype>Element</actiontype>
sl@0
  1537
	<actionbody>
sl@0
  1538
		<kdf>PKCS#12</kdf>
sl@0
  1539
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1540
		<iter_count>1024</iter_count>
sl@0
  1541
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1542
		<element>
sl@0
  1543
			<passwd>password</passwd>
sl@0
  1544
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1545
		</element>
sl@0
  1546
	</actionbody>
sl@0
  1547
	<actionresult>
sl@0
  1548
		<return>KErrNone</return>
sl@0
  1549
	</actionresult>
sl@0
  1550
</action>
sl@0
  1551
sl@0
  1552
sl@0
  1553
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1554
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1555
//! @SYMREQ CIT_PREQ1054
sl@0
  1556
//! @SYMTestPriority medium
sl@0
  1557
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1558
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1559
<action>
sl@0
  1560
	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
sl@0
  1561
	<actiontype>Element</actiontype>
sl@0
  1562
	<actionbody>
sl@0
  1563
		<kdf>PKCS#12</kdf>
sl@0
  1564
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1565
		<iter_count>1024</iter_count>
sl@0
  1566
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1567
		<element>
sl@0
  1568
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1569
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1570
		</element>
sl@0
  1571
	</actionbody>
sl@0
  1572
	<actionresult>
sl@0
  1573
		<return>KErrNone</return>
sl@0
  1574
	</actionresult>
sl@0
  1575
</action>
sl@0
  1576
sl@0
  1577
sl@0
  1578
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1579
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1580
//! @SYMREQ CIT_PREQ1054
sl@0
  1581
//! @SYMTestPriority medium
sl@0
  1582
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1583
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1584
<action>
sl@0
  1585
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
sl@0
  1586
	<actiontype>Set</actiontype>
sl@0
  1587
	<actionbody>
sl@0
  1588
		<kdf>PKCS#12</kdf>
sl@0
  1589
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1590
		<iter_count>1024</iter_count>
sl@0
  1591
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1592
		<set>
sl@0
  1593
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1594
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1595
		</set>
sl@0
  1596
	</actionbody>
sl@0
  1597
	<actionresult>
sl@0
  1598
		<return>KErrNone</return>
sl@0
  1599
	</actionresult>
sl@0
  1600
</action>
sl@0
  1601
sl@0
  1602
sl@0
  1603
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1604
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1605
//! @SYMREQ CIT_PREQ1054
sl@0
  1606
//! @SYMTestPriority medium
sl@0
  1607
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1608
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1609
<action>
sl@0
  1610
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
sl@0
  1611
	<actiontype>Set</actiontype>
sl@0
  1612
	<actionbody>
sl@0
  1613
		<kdf>PKCS#12</kdf>
sl@0
  1614
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1615
		<iter_count>1024</iter_count>
sl@0
  1616
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1617
		<set>
sl@0
  1618
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1619
			<input>B</input>
sl@0
  1620
		</set>
sl@0
  1621
	</actionbody>
sl@0
  1622
	<actionresult>
sl@0
  1623
		<return>KErrNone</return>
sl@0
  1624
	</actionresult>
sl@0
  1625
</action>
sl@0
  1626
sl@0
  1627
sl@0
  1628
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1629
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1630
//! @SYMREQ CIT_PREQ1054
sl@0
  1631
//! @SYMTestPriority medium
sl@0
  1632
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1633
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1634
<action>
sl@0
  1635
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
sl@0
  1636
	<actiontype>Set</actiontype>
sl@0
  1637
	<actionbody>
sl@0
  1638
		<kdf>PKCS#12</kdf>
sl@0
  1639
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1640
		<iter_count>1024</iter_count>
sl@0
  1641
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1642
		<set>
sl@0
  1643
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1644
			<input>ZYXWUTSR</input>
sl@0
  1645
		</set>
sl@0
  1646
	</actionbody>
sl@0
  1647
	<actionresult>
sl@0
  1648
		<return>KErrNone</return>
sl@0
  1649
	</actionresult>
sl@0
  1650
</action>
sl@0
  1651
sl@0
  1652
sl@0
  1653
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1654
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1655
//! @SYMREQ CIT_PREQ1054
sl@0
  1656
//! @SYMTestPriority medium
sl@0
  1657
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1658
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1659
<action>
sl@0
  1660
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
sl@0
  1661
	<actiontype>Set</actiontype>
sl@0
  1662
	<actionbody>
sl@0
  1663
		<kdf>PKCS#12</kdf>
sl@0
  1664
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1665
		<iter_count>1024</iter_count>
sl@0
  1666
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1667
		<set>
sl@0
  1668
			<passwd>m</passwd>
sl@0
  1669
			<input>ZYXWUTSR</input>
sl@0
  1670
		</set>
sl@0
  1671
	</actionbody>
sl@0
  1672
	<actionresult>
sl@0
  1673
		<return>KErrNone</return>
sl@0
  1674
	</actionresult>
sl@0
  1675
</action>
sl@0
  1676
sl@0
  1677
sl@0
  1678
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1679
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1680
//! @SYMREQ CIT_PREQ1054
sl@0
  1681
//! @SYMTestPriority medium
sl@0
  1682
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1683
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1684
<action>
sl@0
  1685
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
sl@0
  1686
	<actiontype>Set</actiontype>
sl@0
  1687
	<actionbody>
sl@0
  1688
		<kdf>PKCS#12</kdf>
sl@0
  1689
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1690
		<iter_count>1024</iter_count>
sl@0
  1691
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1692
		<set>
sl@0
  1693
			<passwd></passwd>
sl@0
  1694
			<input>ZYXWUTSR</input>
sl@0
  1695
		</set>
sl@0
  1696
	</actionbody>
sl@0
  1697
	<actionresult>
sl@0
  1698
		<return>KErrNone</return>
sl@0
  1699
	</actionresult>
sl@0
  1700
</action>
sl@0
  1701
sl@0
  1702
sl@0
  1703
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1704
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1705
//! @SYMREQ CIT_PREQ1054
sl@0
  1706
//! @SYMTestPriority medium
sl@0
  1707
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1708
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1709
<action>
sl@0
  1710
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
sl@0
  1711
	<actiontype>Set</actiontype>
sl@0
  1712
	<actionbody>
sl@0
  1713
		<kdf>PKCS#12</kdf>
sl@0
  1714
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1715
		<iter_count>1024</iter_count>
sl@0
  1716
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  1717
		<set>
sl@0
  1718
			<passwd></passwd>
sl@0
  1719
			<input></input>
sl@0
  1720
		</set>
sl@0
  1721
	</actionbody>
sl@0
  1722
	<actionresult>
sl@0
  1723
		<return>KErrNone</return>
sl@0
  1724
	</actionresult>
sl@0
  1725
</action>
sl@0
  1726
sl@0
  1727
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1728
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1729
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1730
sl@0
  1731
sl@0
  1732
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1733
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1734
//! @SYMREQ CIT_PREQ1054
sl@0
  1735
//! @SYMTestPriority medium
sl@0
  1736
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1737
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1738
<action>
sl@0
  1739
	<actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
sl@0
  1740
	<actiontype>Element</actiontype>
sl@0
  1741
	<actionbody>
sl@0
  1742
		<kdf>PKCS#12</kdf>
sl@0
  1743
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1744
		<iter_count>1024</iter_count>
sl@0
  1745
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1746
		<element>
sl@0
  1747
			<passwd>password</passwd>
sl@0
  1748
			<input>This is what I want to encrypt</input>
sl@0
  1749
		</element>
sl@0
  1750
	</actionbody>
sl@0
  1751
	<actionresult>
sl@0
  1752
		<return>KErrNone</return>
sl@0
  1753
	</actionresult>
sl@0
  1754
</action>
sl@0
  1755
sl@0
  1756
sl@0
  1757
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1758
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1759
//! @SYMREQ CIT_PREQ1054
sl@0
  1760
//! @SYMTestPriority medium
sl@0
  1761
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1762
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1763
<action>
sl@0
  1764
	<actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
sl@0
  1765
	<actiontype>Element</actiontype>
sl@0
  1766
	<actionbody>
sl@0
  1767
		<kdf>PKCS#12</kdf>
sl@0
  1768
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1769
		<iter_count>1024</iter_count>
sl@0
  1770
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1771
		<element>
sl@0
  1772
			<passwd>password</passwd>
sl@0
  1773
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1774
		</element>
sl@0
  1775
	</actionbody>
sl@0
  1776
	<actionresult>
sl@0
  1777
		<return>KErrNone</return>
sl@0
  1778
	</actionresult>
sl@0
  1779
</action>
sl@0
  1780
sl@0
  1781
sl@0
  1782
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1783
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1784
//! @SYMREQ CIT_PREQ1054
sl@0
  1785
//! @SYMTestPriority medium
sl@0
  1786
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1787
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1788
<action>
sl@0
  1789
	<actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
sl@0
  1790
	<actiontype>Element</actiontype>
sl@0
  1791
	<actionbody>
sl@0
  1792
		<kdf>PKCS#12</kdf>
sl@0
  1793
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1794
		<iter_count>1024</iter_count>
sl@0
  1795
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1796
		<element>
sl@0
  1797
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1798
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1799
		</element>
sl@0
  1800
	</actionbody>
sl@0
  1801
	<actionresult>
sl@0
  1802
		<return>KErrNone</return>
sl@0
  1803
	</actionresult>
sl@0
  1804
</action>
sl@0
  1805
sl@0
  1806
sl@0
  1807
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1808
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1809
//! @SYMREQ CIT_PREQ1054
sl@0
  1810
//! @SYMTestPriority medium
sl@0
  1811
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1812
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1813
<action>
sl@0
  1814
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
sl@0
  1815
	<actiontype>Set</actiontype>
sl@0
  1816
	<actionbody>
sl@0
  1817
		<kdf>PKCS#12</kdf>
sl@0
  1818
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1819
		<iter_count>1024</iter_count>
sl@0
  1820
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1821
		<set>
sl@0
  1822
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1823
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  1824
		</set>
sl@0
  1825
	</actionbody>
sl@0
  1826
	<actionresult>
sl@0
  1827
		<return>KErrNone</return>
sl@0
  1828
	</actionresult>
sl@0
  1829
</action>
sl@0
  1830
sl@0
  1831
sl@0
  1832
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1833
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1834
//! @SYMREQ CIT_PREQ1054
sl@0
  1835
//! @SYMTestPriority medium
sl@0
  1836
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1837
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1838
<action>
sl@0
  1839
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
sl@0
  1840
	<actiontype>Set</actiontype>
sl@0
  1841
	<actionbody>
sl@0
  1842
		<kdf>PKCS#12</kdf>
sl@0
  1843
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1844
		<iter_count>1024</iter_count>
sl@0
  1845
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1846
		<set>
sl@0
  1847
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1848
			<input>B</input>
sl@0
  1849
		</set>
sl@0
  1850
	</actionbody>
sl@0
  1851
	<actionresult>
sl@0
  1852
		<return>KErrNone</return>
sl@0
  1853
	</actionresult>
sl@0
  1854
</action>
sl@0
  1855
sl@0
  1856
sl@0
  1857
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1858
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1859
//! @SYMREQ CIT_PREQ1054
sl@0
  1860
//! @SYMTestPriority medium
sl@0
  1861
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1862
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1863
<action>
sl@0
  1864
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
sl@0
  1865
	<actiontype>Set</actiontype>
sl@0
  1866
	<actionbody>
sl@0
  1867
		<kdf>PKCS#12</kdf>
sl@0
  1868
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1869
		<iter_count>1024</iter_count>
sl@0
  1870
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1871
		<set>
sl@0
  1872
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  1873
			<input>ZYXWUTSR</input>
sl@0
  1874
		</set>
sl@0
  1875
	</actionbody>
sl@0
  1876
	<actionresult>
sl@0
  1877
		<return>KErrNone</return>
sl@0
  1878
	</actionresult>
sl@0
  1879
</action>
sl@0
  1880
sl@0
  1881
sl@0
  1882
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1883
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1884
//! @SYMREQ CIT_PREQ1054
sl@0
  1885
//! @SYMTestPriority medium
sl@0
  1886
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1887
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1888
<action>
sl@0
  1889
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
sl@0
  1890
	<actiontype>Set</actiontype>
sl@0
  1891
	<actionbody>
sl@0
  1892
		<kdf>PKCS#12</kdf>
sl@0
  1893
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1894
		<iter_count>1024</iter_count>
sl@0
  1895
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1896
		<set>
sl@0
  1897
			<passwd>m</passwd>
sl@0
  1898
			<input>ZYXWUTSR</input>
sl@0
  1899
		</set>
sl@0
  1900
	</actionbody>
sl@0
  1901
	<actionresult>
sl@0
  1902
		<return>KErrNone</return>
sl@0
  1903
	</actionresult>
sl@0
  1904
</action>
sl@0
  1905
sl@0
  1906
sl@0
  1907
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1908
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1909
//! @SYMREQ CIT_PREQ1054
sl@0
  1910
//! @SYMTestPriority medium
sl@0
  1911
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1912
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1913
<action>
sl@0
  1914
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
sl@0
  1915
	<actiontype>Set</actiontype>
sl@0
  1916
	<actionbody>
sl@0
  1917
		<kdf>PKCS#12</kdf>
sl@0
  1918
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1919
		<iter_count>1024</iter_count>
sl@0
  1920
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1921
		<set>
sl@0
  1922
			<passwd></passwd>
sl@0
  1923
			<input>ZYXWUTSR</input>
sl@0
  1924
		</set>
sl@0
  1925
	</actionbody>
sl@0
  1926
	<actionresult>
sl@0
  1927
		<return>KErrNone</return>
sl@0
  1928
	</actionresult>
sl@0
  1929
</action>
sl@0
  1930
sl@0
  1931
sl@0
  1932
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1933
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1934
//! @SYMREQ CIT_PREQ1054
sl@0
  1935
//! @SYMTestPriority medium
sl@0
  1936
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1937
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1938
<action>
sl@0
  1939
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
sl@0
  1940
	<actiontype>Set</actiontype>
sl@0
  1941
	<actionbody>
sl@0
  1942
		<kdf>PKCS#12</kdf>
sl@0
  1943
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1944
		<iter_count>1024</iter_count>
sl@0
  1945
		<cipher>ECipherRC2_CBC_128</cipher>
sl@0
  1946
		<set>
sl@0
  1947
			<passwd></passwd>
sl@0
  1948
			<input></input>
sl@0
  1949
		</set>
sl@0
  1950
	</actionbody>
sl@0
  1951
	<actionresult>
sl@0
  1952
		<return>KErrNone</return>
sl@0
  1953
	</actionresult>
sl@0
  1954
</action>
sl@0
  1955
sl@0
  1956
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1957
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1958
///////////////////////////////////////////////////////////////////////////////////
sl@0
  1959
sl@0
  1960
sl@0
  1961
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1962
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1963
//! @SYMREQ CIT_PREQ1054
sl@0
  1964
//! @SYMTestPriority medium
sl@0
  1965
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1966
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1967
<action>
sl@0
  1968
	<actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
sl@0
  1969
	<actiontype>Element</actiontype>
sl@0
  1970
	<actionbody>
sl@0
  1971
		<kdf>PKCS#12</kdf>
sl@0
  1972
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1973
		<iter_count>1024</iter_count>
sl@0
  1974
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  1975
		<element>
sl@0
  1976
			<passwd>password</passwd>
sl@0
  1977
			<input>This is what I want to encrypt</input>
sl@0
  1978
		</element>
sl@0
  1979
	</actionbody>
sl@0
  1980
	<actionresult>
sl@0
  1981
		<return>KErrNone</return>
sl@0
  1982
	</actionresult>
sl@0
  1983
</action>
sl@0
  1984
sl@0
  1985
sl@0
  1986
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  1987
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  1988
//! @SYMREQ CIT_PREQ1054
sl@0
  1989
//! @SYMTestPriority medium
sl@0
  1990
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  1991
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  1992
<action>
sl@0
  1993
	<actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
sl@0
  1994
	<actiontype>Element</actiontype>
sl@0
  1995
	<actionbody>
sl@0
  1996
		<kdf>PKCS#12</kdf>
sl@0
  1997
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  1998
		<iter_count>1024</iter_count>
sl@0
  1999
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  2000
		<element>
sl@0
  2001
			<passwd>password</passwd>
sl@0
  2002
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2003
		</element>
sl@0
  2004
	</actionbody>
sl@0
  2005
	<actionresult>
sl@0
  2006
		<return>KErrNone</return>
sl@0
  2007
	</actionresult>
sl@0
  2008
</action>
sl@0
  2009
sl@0
  2010
sl@0
  2011
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2012
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2013
//! @SYMREQ CIT_PREQ1054
sl@0
  2014
//! @SYMTestPriority medium
sl@0
  2015
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2016
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2017
<action>
sl@0
  2018
	<actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
sl@0
  2019
	<actiontype>Element</actiontype>
sl@0
  2020
	<actionbody>
sl@0
  2021
		<kdf>PKCS#12</kdf>
sl@0
  2022
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2023
		<iter_count>1024</iter_count>
sl@0
  2024
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  2025
		<element>
sl@0
  2026
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2027
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2028
		</element>
sl@0
  2029
	</actionbody>
sl@0
  2030
	<actionresult>
sl@0
  2031
		<return>KErrNone</return>
sl@0
  2032
	</actionresult>
sl@0
  2033
</action>
sl@0
  2034
sl@0
  2035
sl@0
  2036
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2037
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2038
//! @SYMREQ CIT_PREQ1054
sl@0
  2039
//! @SYMTestPriority medium
sl@0
  2040
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2041
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2042
<action>
sl@0
  2043
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
sl@0
  2044
	<actiontype>Set</actiontype>
sl@0
  2045
	<actionbody>
sl@0
  2046
		<kdf>PKCS#12</kdf>
sl@0
  2047
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2048
		<iter_count>1024</iter_count>
sl@0
  2049
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  2050
		<set>
sl@0
  2051
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2052
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2053
		</set>
sl@0
  2054
	</actionbody>
sl@0
  2055
	<actionresult>
sl@0
  2056
		<return>KErrNone</return>
sl@0
  2057
	</actionresult>
sl@0
  2058
</action>
sl@0
  2059
sl@0
  2060
sl@0
  2061
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2062
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2063
//! @SYMREQ CIT_PREQ1054
sl@0
  2064
//! @SYMTestPriority medium
sl@0
  2065
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2066
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2067
<action>
sl@0
  2068
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
sl@0
  2069
	<actiontype>Set</actiontype>
sl@0
  2070
	<actionbody>
sl@0
  2071
		<kdf>PKCS#12</kdf>
sl@0
  2072
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2073
		<iter_count>1024</iter_count>
sl@0
  2074
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  2075
		<set>
sl@0
  2076
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2077
			<input>B</input>
sl@0
  2078
		</set>
sl@0
  2079
	</actionbody>
sl@0
  2080
	<actionresult>
sl@0
  2081
		<return>KErrNone</return>
sl@0
  2082
	</actionresult>
sl@0
  2083
</action>
sl@0
  2084
sl@0
  2085
sl@0
  2086
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2087
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2088
//! @SYMREQ CIT_PREQ1054
sl@0
  2089
//! @SYMTestPriority medium
sl@0
  2090
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2091
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2092
<action>
sl@0
  2093
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
sl@0
  2094
	<actiontype>Set</actiontype>
sl@0
  2095
	<actionbody>
sl@0
  2096
		<kdf>PKCS#12</kdf>
sl@0
  2097
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2098
		<iter_count>1024</iter_count>
sl@0
  2099
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  2100
		<set>
sl@0
  2101
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2102
			<input>ZYXWUTSR</input>
sl@0
  2103
		</set>
sl@0
  2104
	</actionbody>
sl@0
  2105
	<actionresult>
sl@0
  2106
		<return>KErrNone</return>
sl@0
  2107
	</actionresult>
sl@0
  2108
</action>
sl@0
  2109
sl@0
  2110
sl@0
  2111
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2112
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2113
//! @SYMREQ CIT_PREQ1054
sl@0
  2114
//! @SYMTestPriority medium
sl@0
  2115
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2116
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2117
<action>
sl@0
  2118
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
sl@0
  2119
	<actiontype>Set</actiontype>
sl@0
  2120
	<actionbody>
sl@0
  2121
		<kdf>PKCS#12</kdf>
sl@0
  2122
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2123
		<iter_count>1024</iter_count>
sl@0
  2124
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  2125
		<set>
sl@0
  2126
			<passwd>m</passwd>
sl@0
  2127
			<input>ZYXWUTSR</input>
sl@0
  2128
		</set>
sl@0
  2129
	</actionbody>
sl@0
  2130
	<actionresult>
sl@0
  2131
		<return>KErrNone</return>
sl@0
  2132
	</actionresult>
sl@0
  2133
</action>
sl@0
  2134
sl@0
  2135
sl@0
  2136
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2137
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2138
//! @SYMREQ CIT_PREQ1054
sl@0
  2139
//! @SYMTestPriority medium
sl@0
  2140
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2141
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2142
<action>
sl@0
  2143
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
sl@0
  2144
	<actiontype>Set</actiontype>
sl@0
  2145
	<actionbody>
sl@0
  2146
		<kdf>PKCS#12</kdf>
sl@0
  2147
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2148
		<iter_count>1024</iter_count>
sl@0
  2149
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  2150
		<set>
sl@0
  2151
			<passwd></passwd>
sl@0
  2152
			<input>ZYXWUTSR</input>
sl@0
  2153
		</set>
sl@0
  2154
	</actionbody>
sl@0
  2155
	<actionresult>
sl@0
  2156
		<return>KErrNone</return>
sl@0
  2157
	</actionresult>
sl@0
  2158
</action>
sl@0
  2159
sl@0
  2160
sl@0
  2161
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2162
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2163
//! @SYMREQ CIT_PREQ1054
sl@0
  2164
//! @SYMTestPriority medium
sl@0
  2165
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2166
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2167
<action>
sl@0
  2168
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
sl@0
  2169
	<actiontype>Set</actiontype>
sl@0
  2170
	<actionbody>
sl@0
  2171
		<kdf>PKCS#12</kdf>
sl@0
  2172
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2173
		<iter_count>1024</iter_count>
sl@0
  2174
		<cipher>ECipherRC2_CBC_40</cipher>
sl@0
  2175
		<set>
sl@0
  2176
			<passwd></passwd>
sl@0
  2177
			<input></input>
sl@0
  2178
		</set>
sl@0
  2179
	</actionbody>
sl@0
  2180
	<actionresult>
sl@0
  2181
		<return>KErrNone</return>
sl@0
  2182
	</actionresult>
sl@0
  2183
</action>
sl@0
  2184
sl@0
  2185
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2186
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2187
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2188
sl@0
  2189
sl@0
  2190
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2191
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2192
//! @SYMREQ CIT_PREQ1054
sl@0
  2193
//! @SYMTestPriority medium
sl@0
  2194
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2195
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2196
<action>
sl@0
  2197
	<actionname>Element test case 1, ECipher3DES_CBC</actionname>
sl@0
  2198
	<actiontype>Element</actiontype>
sl@0
  2199
	<actionbody>
sl@0
  2200
		<kdf>PKCS#12</kdf>
sl@0
  2201
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2202
		<iter_count>1024</iter_count>
sl@0
  2203
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2204
		<element>
sl@0
  2205
			<passwd>password</passwd>
sl@0
  2206
			<input>This is what I want to encrypt</input>
sl@0
  2207
		</element>
sl@0
  2208
	</actionbody>
sl@0
  2209
	<actionresult>
sl@0
  2210
		<return>KErrNone</return>
sl@0
  2211
	</actionresult>
sl@0
  2212
</action>
sl@0
  2213
sl@0
  2214
sl@0
  2215
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2216
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2217
//! @SYMREQ CIT_PREQ1054
sl@0
  2218
//! @SYMTestPriority medium
sl@0
  2219
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2220
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2221
<action>
sl@0
  2222
	<actionname>Element test case 2, ECipher3DES_CBC</actionname>
sl@0
  2223
	<actiontype>Element</actiontype>
sl@0
  2224
	<actionbody>
sl@0
  2225
		<kdf>PKCS#12</kdf>
sl@0
  2226
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2227
		<iter_count>1024</iter_count>
sl@0
  2228
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2229
		<element>
sl@0
  2230
			<passwd>password</passwd>
sl@0
  2231
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2232
		</element>
sl@0
  2233
	</actionbody>
sl@0
  2234
	<actionresult>
sl@0
  2235
		<return>KErrNone</return>
sl@0
  2236
	</actionresult>
sl@0
  2237
</action>
sl@0
  2238
sl@0
  2239
sl@0
  2240
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2241
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2242
//! @SYMREQ CIT_PREQ1054
sl@0
  2243
//! @SYMTestPriority medium
sl@0
  2244
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2245
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2246
<action>
sl@0
  2247
	<actionname>Element test case 3, ECipher3DES_CBC</actionname>
sl@0
  2248
	<actiontype>Element</actiontype>
sl@0
  2249
	<actionbody>
sl@0
  2250
		<kdf>PKCS#12</kdf>
sl@0
  2251
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2252
		<iter_count>1024</iter_count>
sl@0
  2253
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2254
		<element>
sl@0
  2255
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2256
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2257
		</element>
sl@0
  2258
	</actionbody>
sl@0
  2259
	<actionresult>
sl@0
  2260
		<return>KErrNone</return>
sl@0
  2261
	</actionresult>
sl@0
  2262
</action>
sl@0
  2263
sl@0
  2264
sl@0
  2265
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2266
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2267
//! @SYMREQ CIT_PREQ1054
sl@0
  2268
//! @SYMTestPriority medium
sl@0
  2269
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2270
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2271
<action>
sl@0
  2272
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
sl@0
  2273
	<actiontype>Set</actiontype>
sl@0
  2274
	<actionbody>
sl@0
  2275
		<kdf>PKCS#12</kdf>
sl@0
  2276
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2277
		<iter_count>1024</iter_count>
sl@0
  2278
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2279
		<set>
sl@0
  2280
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2281
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2282
		</set>
sl@0
  2283
	</actionbody>
sl@0
  2284
	<actionresult>
sl@0
  2285
		<return>KErrNone</return>
sl@0
  2286
	</actionresult>
sl@0
  2287
</action>
sl@0
  2288
sl@0
  2289
sl@0
  2290
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2291
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2292
//! @SYMREQ CIT_PREQ1054
sl@0
  2293
//! @SYMTestPriority medium
sl@0
  2294
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2295
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2296
<action>
sl@0
  2297
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
sl@0
  2298
	<actiontype>Set</actiontype>
sl@0
  2299
	<actionbody>
sl@0
  2300
		<kdf>PKCS#12</kdf>
sl@0
  2301
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2302
		<iter_count>1024</iter_count>
sl@0
  2303
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2304
		<set>
sl@0
  2305
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2306
			<input>B</input>
sl@0
  2307
		</set>
sl@0
  2308
	</actionbody>
sl@0
  2309
	<actionresult>
sl@0
  2310
		<return>KErrNone</return>
sl@0
  2311
	</actionresult>
sl@0
  2312
</action>
sl@0
  2313
sl@0
  2314
sl@0
  2315
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2316
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2317
//! @SYMREQ CIT_PREQ1054
sl@0
  2318
//! @SYMTestPriority medium
sl@0
  2319
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2320
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2321
<action>
sl@0
  2322
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
sl@0
  2323
	<actiontype>Set</actiontype>
sl@0
  2324
	<actionbody>
sl@0
  2325
		<kdf>PKCS#12</kdf>
sl@0
  2326
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2327
		<iter_count>1024</iter_count>
sl@0
  2328
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2329
		<set>
sl@0
  2330
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2331
			<input>ZYXWUTSR</input>
sl@0
  2332
		</set>
sl@0
  2333
	</actionbody>
sl@0
  2334
	<actionresult>
sl@0
  2335
		<return>KErrNone</return>
sl@0
  2336
	</actionresult>
sl@0
  2337
</action>
sl@0
  2338
sl@0
  2339
sl@0
  2340
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2341
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2342
//! @SYMREQ CIT_PREQ1054
sl@0
  2343
//! @SYMTestPriority medium
sl@0
  2344
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2345
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2346
<action>
sl@0
  2347
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
sl@0
  2348
	<actiontype>Set</actiontype>
sl@0
  2349
	<actionbody>
sl@0
  2350
		<kdf>PKCS#12</kdf>
sl@0
  2351
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2352
		<iter_count>1024</iter_count>
sl@0
  2353
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2354
		<set>
sl@0
  2355
			<passwd>m</passwd>
sl@0
  2356
			<input>ZYXWUTSR</input>
sl@0
  2357
		</set>
sl@0
  2358
	</actionbody>
sl@0
  2359
	<actionresult>
sl@0
  2360
		<return>KErrNone</return>
sl@0
  2361
	</actionresult>
sl@0
  2362
</action>
sl@0
  2363
sl@0
  2364
sl@0
  2365
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2366
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2367
//! @SYMREQ CIT_PREQ1054
sl@0
  2368
//! @SYMTestPriority medium
sl@0
  2369
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2370
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2371
<action>
sl@0
  2372
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
sl@0
  2373
	<actiontype>Set</actiontype>
sl@0
  2374
	<actionbody>
sl@0
  2375
		<kdf>PKCS#12</kdf>
sl@0
  2376
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2377
		<iter_count>1024</iter_count>
sl@0
  2378
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2379
		<set>
sl@0
  2380
			<passwd></passwd>
sl@0
  2381
			<input>ZYXWUTSR</input>
sl@0
  2382
		</set>
sl@0
  2383
	</actionbody>
sl@0
  2384
	<actionresult>
sl@0
  2385
		<return>KErrNone</return>
sl@0
  2386
	</actionresult>
sl@0
  2387
</action>
sl@0
  2388
sl@0
  2389
sl@0
  2390
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2391
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2392
//! @SYMREQ CIT_PREQ1054
sl@0
  2393
//! @SYMTestPriority medium
sl@0
  2394
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2395
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2396
<action>
sl@0
  2397
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
sl@0
  2398
	<actiontype>Set</actiontype>
sl@0
  2399
	<actionbody>
sl@0
  2400
		<kdf>PKCS#12</kdf>
sl@0
  2401
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2402
		<iter_count>1024</iter_count>
sl@0
  2403
		<cipher>ECipher3DES_CBC</cipher>
sl@0
  2404
		<set>
sl@0
  2405
			<passwd></passwd>
sl@0
  2406
			<input></input>
sl@0
  2407
		</set>
sl@0
  2408
	</actionbody>
sl@0
  2409
	<actionresult>
sl@0
  2410
		<return>KErrNone</return>
sl@0
  2411
	</actionresult>
sl@0
  2412
</action>
sl@0
  2413
sl@0
  2414
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2415
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2416
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2417
sl@0
  2418
sl@0
  2419
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2420
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2421
//! @SYMREQ CIT_PREQ1054
sl@0
  2422
//! @SYMTestPriority medium
sl@0
  2423
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2424
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2425
<action>
sl@0
  2426
	<actionname>Element test case 1, ECipherAES_CBC_256</actionname>
sl@0
  2427
	<actiontype>Element</actiontype>
sl@0
  2428
	<actionbody>
sl@0
  2429
		<kdf>PKCS#12</kdf>
sl@0
  2430
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2431
		<iter_count>1024</iter_count>
sl@0
  2432
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2433
		<element>
sl@0
  2434
			<passwd>password</passwd>
sl@0
  2435
			<input>This is what I want to encrypt</input>
sl@0
  2436
		</element>
sl@0
  2437
	</actionbody>
sl@0
  2438
	<actionresult>
sl@0
  2439
		<return>KErrNone</return>
sl@0
  2440
	</actionresult>
sl@0
  2441
</action>
sl@0
  2442
sl@0
  2443
sl@0
  2444
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2445
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2446
//! @SYMREQ CIT_PREQ1054
sl@0
  2447
//! @SYMTestPriority medium
sl@0
  2448
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2449
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2450
<action>
sl@0
  2451
	<actionname>Element test case 2, ECipherAES_CBC_256</actionname>
sl@0
  2452
	<actiontype>Element</actiontype>
sl@0
  2453
	<actionbody>
sl@0
  2454
		<kdf>PKCS#12</kdf>
sl@0
  2455
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2456
		<iter_count>1024</iter_count>
sl@0
  2457
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2458
		<element>
sl@0
  2459
			<passwd>password</passwd>
sl@0
  2460
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2461
		</element>
sl@0
  2462
	</actionbody>
sl@0
  2463
	<actionresult>
sl@0
  2464
		<return>KErrNone</return>
sl@0
  2465
	</actionresult>
sl@0
  2466
</action>
sl@0
  2467
sl@0
  2468
sl@0
  2469
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2470
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2471
//! @SYMREQ CIT_PREQ1054
sl@0
  2472
//! @SYMTestPriority medium
sl@0
  2473
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2474
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2475
<action>
sl@0
  2476
	<actionname>Element test case 3, ECipherAES_CBC_256</actionname>
sl@0
  2477
	<actiontype>Element</actiontype>
sl@0
  2478
	<actionbody>
sl@0
  2479
		<kdf>PKCS#12</kdf>
sl@0
  2480
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2481
		<iter_count>1024</iter_count>
sl@0
  2482
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2483
		<element>
sl@0
  2484
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2485
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2486
		</element>
sl@0
  2487
	</actionbody>
sl@0
  2488
	<actionresult>
sl@0
  2489
		<return>KErrNone</return>
sl@0
  2490
	</actionresult>
sl@0
  2491
</action>
sl@0
  2492
sl@0
  2493
sl@0
  2494
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2495
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2496
//! @SYMREQ CIT_PREQ1054
sl@0
  2497
//! @SYMTestPriority medium
sl@0
  2498
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2499
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2500
<action>
sl@0
  2501
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
sl@0
  2502
	<actiontype>Set</actiontype>
sl@0
  2503
	<actionbody>
sl@0
  2504
		<kdf>PKCS#12</kdf>
sl@0
  2505
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2506
		<iter_count>1024</iter_count>
sl@0
  2507
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2508
		<set>
sl@0
  2509
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2510
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2511
		</set>
sl@0
  2512
	</actionbody>
sl@0
  2513
	<actionresult>
sl@0
  2514
		<return>KErrNone</return>
sl@0
  2515
	</actionresult>
sl@0
  2516
</action>
sl@0
  2517
sl@0
  2518
sl@0
  2519
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2520
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2521
//! @SYMREQ CIT_PREQ1054
sl@0
  2522
//! @SYMTestPriority medium
sl@0
  2523
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2524
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2525
<action>
sl@0
  2526
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
sl@0
  2527
	<actiontype>Set</actiontype>
sl@0
  2528
	<actionbody>
sl@0
  2529
		<kdf>PKCS#12</kdf>
sl@0
  2530
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2531
		<iter_count>1024</iter_count>
sl@0
  2532
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2533
		<set>
sl@0
  2534
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2535
			<input>B</input>
sl@0
  2536
		</set>
sl@0
  2537
	</actionbody>
sl@0
  2538
	<actionresult>
sl@0
  2539
		<return>KErrNone</return>
sl@0
  2540
	</actionresult>
sl@0
  2541
</action>
sl@0
  2542
sl@0
  2543
sl@0
  2544
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2545
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2546
//! @SYMREQ CIT_PREQ1054
sl@0
  2547
//! @SYMTestPriority medium
sl@0
  2548
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2549
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2550
<action>
sl@0
  2551
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
sl@0
  2552
	<actiontype>Set</actiontype>
sl@0
  2553
	<actionbody>
sl@0
  2554
		<kdf>PKCS#12</kdf>
sl@0
  2555
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2556
		<iter_count>1024</iter_count>
sl@0
  2557
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2558
		<set>
sl@0
  2559
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2560
			<input>ZYXWUTSR</input>
sl@0
  2561
		</set>
sl@0
  2562
	</actionbody>
sl@0
  2563
	<actionresult>
sl@0
  2564
		<return>KErrNone</return>
sl@0
  2565
	</actionresult>
sl@0
  2566
</action>
sl@0
  2567
sl@0
  2568
sl@0
  2569
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2570
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2571
//! @SYMREQ CIT_PREQ1054
sl@0
  2572
//! @SYMTestPriority medium
sl@0
  2573
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2574
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2575
<action>
sl@0
  2576
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
sl@0
  2577
	<actiontype>Set</actiontype>
sl@0
  2578
	<actionbody>
sl@0
  2579
		<kdf>PKCS#12</kdf>
sl@0
  2580
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2581
		<iter_count>1024</iter_count>
sl@0
  2582
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2583
		<set>
sl@0
  2584
			<passwd>m</passwd>
sl@0
  2585
			<input>ZYXWUTSR</input>
sl@0
  2586
		</set>
sl@0
  2587
	</actionbody>
sl@0
  2588
	<actionresult>
sl@0
  2589
		<return>KErrNone</return>
sl@0
  2590
	</actionresult>
sl@0
  2591
</action>
sl@0
  2592
sl@0
  2593
sl@0
  2594
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2595
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2596
//! @SYMREQ CIT_PREQ1054
sl@0
  2597
//! @SYMTestPriority medium
sl@0
  2598
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2599
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2600
<action>
sl@0
  2601
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
sl@0
  2602
	<actiontype>Set</actiontype>
sl@0
  2603
	<actionbody>
sl@0
  2604
		<kdf>PKCS#12</kdf>
sl@0
  2605
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2606
		<iter_count>1024</iter_count>
sl@0
  2607
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2608
		<set>
sl@0
  2609
			<passwd></passwd>
sl@0
  2610
			<input>ZYXWUTSR</input>
sl@0
  2611
		</set>
sl@0
  2612
	</actionbody>
sl@0
  2613
	<actionresult>
sl@0
  2614
		<return>KErrNone</return>
sl@0
  2615
	</actionresult>
sl@0
  2616
</action>
sl@0
  2617
sl@0
  2618
sl@0
  2619
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2620
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2621
//! @SYMREQ CIT_PREQ1054
sl@0
  2622
//! @SYMTestPriority medium
sl@0
  2623
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2624
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2625
<action>
sl@0
  2626
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
sl@0
  2627
	<actiontype>Set</actiontype>
sl@0
  2628
	<actionbody>
sl@0
  2629
		<kdf>PKCS#12</kdf>
sl@0
  2630
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2631
		<iter_count>1024</iter_count>
sl@0
  2632
		<cipher>ECipherAES_CBC_256</cipher>
sl@0
  2633
		<set>
sl@0
  2634
			<passwd></passwd>
sl@0
  2635
			<input></input>
sl@0
  2636
		</set>
sl@0
  2637
	</actionbody>
sl@0
  2638
	<actionresult>
sl@0
  2639
		<return>KErrNone</return>
sl@0
  2640
	</actionresult>
sl@0
  2641
</action>
sl@0
  2642
sl@0
  2643
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2644
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2645
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2646
sl@0
  2647
sl@0
  2648
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2649
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2650
//! @SYMREQ CIT_PREQ1054
sl@0
  2651
//! @SYMTestPriority medium
sl@0
  2652
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2653
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2654
<action>
sl@0
  2655
	<actionname>Element test case 1, ECipherAES_CBC_192</actionname>
sl@0
  2656
	<actiontype>Element</actiontype>
sl@0
  2657
	<actionbody>
sl@0
  2658
		<kdf>PKCS#12</kdf>
sl@0
  2659
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2660
		<iter_count>1024</iter_count>
sl@0
  2661
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2662
		<element>
sl@0
  2663
			<passwd>password</passwd>
sl@0
  2664
			<input>This is what I want to encrypt</input>
sl@0
  2665
		</element>
sl@0
  2666
	</actionbody>
sl@0
  2667
	<actionresult>
sl@0
  2668
		<return>KErrNone</return>
sl@0
  2669
	</actionresult>
sl@0
  2670
</action>
sl@0
  2671
sl@0
  2672
sl@0
  2673
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2674
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2675
//! @SYMREQ CIT_PREQ1054
sl@0
  2676
//! @SYMTestPriority medium
sl@0
  2677
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2678
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2679
<action>
sl@0
  2680
	<actionname>Element test case 2, ECipherAES_CBC_192</actionname>
sl@0
  2681
	<actiontype>Element</actiontype>
sl@0
  2682
	<actionbody>
sl@0
  2683
		<kdf>PKCS#12</kdf>
sl@0
  2684
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2685
		<iter_count>1024</iter_count>
sl@0
  2686
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2687
		<element>
sl@0
  2688
			<passwd>password</passwd>
sl@0
  2689
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2690
		</element>
sl@0
  2691
	</actionbody>
sl@0
  2692
	<actionresult>
sl@0
  2693
		<return>KErrNone</return>
sl@0
  2694
	</actionresult>
sl@0
  2695
</action>
sl@0
  2696
sl@0
  2697
sl@0
  2698
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2699
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2700
//! @SYMREQ CIT_PREQ1054
sl@0
  2701
//! @SYMTestPriority medium
sl@0
  2702
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2703
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2704
<action>
sl@0
  2705
	<actionname>Element test case 3, ECipherAES_CBC_192</actionname>
sl@0
  2706
	<actiontype>Element</actiontype>
sl@0
  2707
	<actionbody>
sl@0
  2708
		<kdf>PKCS#12</kdf>
sl@0
  2709
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2710
		<iter_count>1024</iter_count>
sl@0
  2711
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2712
		<element>
sl@0
  2713
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2714
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2715
		</element>
sl@0
  2716
	</actionbody>
sl@0
  2717
	<actionresult>
sl@0
  2718
		<return>KErrNone</return>
sl@0
  2719
	</actionresult>
sl@0
  2720
</action>
sl@0
  2721
sl@0
  2722
sl@0
  2723
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2724
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2725
//! @SYMREQ CIT_PREQ1054
sl@0
  2726
//! @SYMTestPriority medium
sl@0
  2727
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2728
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2729
<action>
sl@0
  2730
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
sl@0
  2731
	<actiontype>Set</actiontype>
sl@0
  2732
	<actionbody>
sl@0
  2733
		<kdf>PKCS#12</kdf>
sl@0
  2734
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2735
		<iter_count>1024</iter_count>
sl@0
  2736
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2737
		<set>
sl@0
  2738
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2739
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2740
		</set>
sl@0
  2741
	</actionbody>
sl@0
  2742
	<actionresult>
sl@0
  2743
		<return>KErrNone</return>
sl@0
  2744
	</actionresult>
sl@0
  2745
</action>
sl@0
  2746
sl@0
  2747
sl@0
  2748
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2749
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2750
//! @SYMREQ CIT_PREQ1054
sl@0
  2751
//! @SYMTestPriority medium
sl@0
  2752
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2753
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2754
<action>
sl@0
  2755
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
sl@0
  2756
	<actiontype>Set</actiontype>
sl@0
  2757
	<actionbody>
sl@0
  2758
		<kdf>PKCS#12</kdf>
sl@0
  2759
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2760
		<iter_count>1024</iter_count>
sl@0
  2761
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2762
		<set>
sl@0
  2763
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2764
			<input>B</input>
sl@0
  2765
		</set>
sl@0
  2766
	</actionbody>
sl@0
  2767
	<actionresult>
sl@0
  2768
		<return>KErrNone</return>
sl@0
  2769
	</actionresult>
sl@0
  2770
</action>
sl@0
  2771
sl@0
  2772
sl@0
  2773
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2774
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2775
//! @SYMREQ CIT_PREQ1054
sl@0
  2776
//! @SYMTestPriority medium
sl@0
  2777
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2778
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2779
<action>
sl@0
  2780
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
sl@0
  2781
	<actiontype>Set</actiontype>
sl@0
  2782
	<actionbody>
sl@0
  2783
		<kdf>PKCS#12</kdf>
sl@0
  2784
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2785
		<iter_count>1024</iter_count>
sl@0
  2786
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2787
		<set>
sl@0
  2788
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2789
			<input>ZYXWUTSR</input>
sl@0
  2790
		</set>
sl@0
  2791
	</actionbody>
sl@0
  2792
	<actionresult>
sl@0
  2793
		<return>KErrNone</return>
sl@0
  2794
	</actionresult>
sl@0
  2795
</action>
sl@0
  2796
sl@0
  2797
sl@0
  2798
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2799
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2800
//! @SYMREQ CIT_PREQ1054
sl@0
  2801
//! @SYMTestPriority medium
sl@0
  2802
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2803
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2804
<action>
sl@0
  2805
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
sl@0
  2806
	<actiontype>Set</actiontype>
sl@0
  2807
	<actionbody>
sl@0
  2808
		<kdf>PKCS#12</kdf>
sl@0
  2809
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2810
		<iter_count>1024</iter_count>
sl@0
  2811
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2812
		<set>
sl@0
  2813
			<passwd>m</passwd>
sl@0
  2814
			<input>ZYXWUTSR</input>
sl@0
  2815
		</set>
sl@0
  2816
	</actionbody>
sl@0
  2817
	<actionresult>
sl@0
  2818
		<return>KErrNone</return>
sl@0
  2819
	</actionresult>
sl@0
  2820
</action>
sl@0
  2821
sl@0
  2822
sl@0
  2823
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2824
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2825
//! @SYMREQ CIT_PREQ1054
sl@0
  2826
//! @SYMTestPriority medium
sl@0
  2827
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2828
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2829
<action>
sl@0
  2830
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
sl@0
  2831
	<actiontype>Set</actiontype>
sl@0
  2832
	<actionbody>
sl@0
  2833
		<kdf>PKCS#12</kdf>
sl@0
  2834
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2835
		<iter_count>1024</iter_count>
sl@0
  2836
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2837
		<set>
sl@0
  2838
			<passwd></passwd>
sl@0
  2839
			<input>ZYXWUTSR</input>
sl@0
  2840
		</set>
sl@0
  2841
	</actionbody>
sl@0
  2842
	<actionresult>
sl@0
  2843
		<return>KErrNone</return>
sl@0
  2844
	</actionresult>
sl@0
  2845
</action>
sl@0
  2846
sl@0
  2847
sl@0
  2848
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2849
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2850
//! @SYMREQ CIT_PREQ1054
sl@0
  2851
//! @SYMTestPriority medium
sl@0
  2852
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2853
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2854
<action>
sl@0
  2855
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
sl@0
  2856
	<actiontype>Set</actiontype>
sl@0
  2857
	<actionbody>
sl@0
  2858
		<kdf>PKCS#12</kdf>
sl@0
  2859
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2860
		<iter_count>1024</iter_count>
sl@0
  2861
		<cipher>ECipherAES_CBC_192</cipher>
sl@0
  2862
		<set>
sl@0
  2863
			<passwd></passwd>
sl@0
  2864
			<input></input>
sl@0
  2865
		</set>
sl@0
  2866
	</actionbody>
sl@0
  2867
	<actionresult>
sl@0
  2868
		<return>KErrNone</return>
sl@0
  2869
	</actionresult>
sl@0
  2870
</action>
sl@0
  2871
sl@0
  2872
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2873
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2874
///////////////////////////////////////////////////////////////////////////////////
sl@0
  2875
sl@0
  2876
sl@0
  2877
sl@0
  2878
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2879
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2880
//! @SYMREQ CIT_PREQ1054
sl@0
  2881
//! @SYMTestPriority medium
sl@0
  2882
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2883
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2884
<action>
sl@0
  2885
	<actionname>Element test case 1, ECipherAES_CBC_128</actionname>
sl@0
  2886
	<actiontype>Element</actiontype>
sl@0
  2887
	<actionbody>
sl@0
  2888
		<kdf>PKCS#12</kdf>
sl@0
  2889
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2890
		<iter_count>1024</iter_count>
sl@0
  2891
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  2892
		<element>
sl@0
  2893
			<passwd>password</passwd>
sl@0
  2894
			<input>This is what I want to encrypt</input>
sl@0
  2895
		</element>
sl@0
  2896
	</actionbody>
sl@0
  2897
	<actionresult>
sl@0
  2898
		<return>KErrNone</return>
sl@0
  2899
	</actionresult>
sl@0
  2900
</action>
sl@0
  2901
sl@0
  2902
sl@0
  2903
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2904
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2905
//! @SYMREQ CIT_PREQ1054
sl@0
  2906
//! @SYMTestPriority medium
sl@0
  2907
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2908
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2909
<action>
sl@0
  2910
	<actionname>Element test case 2, ECipherAES_CBC_128</actionname>
sl@0
  2911
	<actiontype>Element</actiontype>
sl@0
  2912
	<actionbody>
sl@0
  2913
		<kdf>PKCS#12</kdf>
sl@0
  2914
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2915
		<iter_count>1024</iter_count>
sl@0
  2916
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  2917
		<element>
sl@0
  2918
			<passwd>password</passwd>
sl@0
  2919
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2920
		</element>
sl@0
  2921
	</actionbody>
sl@0
  2922
	<actionresult>
sl@0
  2923
		<return>KErrNone</return>
sl@0
  2924
	</actionresult>
sl@0
  2925
</action>
sl@0
  2926
sl@0
  2927
sl@0
  2928
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2929
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2930
//! @SYMREQ CIT_PREQ1054
sl@0
  2931
//! @SYMTestPriority medium
sl@0
  2932
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2933
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2934
<action>
sl@0
  2935
	<actionname>Element test case 3, ECipherAES_CBC_128</actionname>
sl@0
  2936
	<actiontype>Element</actiontype>
sl@0
  2937
	<actionbody>
sl@0
  2938
		<kdf>PKCS#12</kdf>
sl@0
  2939
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2940
		<iter_count>1024</iter_count>
sl@0
  2941
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  2942
		<element>
sl@0
  2943
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2944
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2945
		</element>
sl@0
  2946
	</actionbody>
sl@0
  2947
	<actionresult>
sl@0
  2948
		<return>KErrNone</return>
sl@0
  2949
	</actionresult>
sl@0
  2950
</action>
sl@0
  2951
sl@0
  2952
sl@0
  2953
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2954
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2955
//! @SYMREQ CIT_PREQ1054
sl@0
  2956
//! @SYMTestPriority medium
sl@0
  2957
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2958
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2959
<action>
sl@0
  2960
	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
sl@0
  2961
	<actiontype>Set</actiontype>
sl@0
  2962
	<actionbody>
sl@0
  2963
		<kdf>PKCS#12</kdf>
sl@0
  2964
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2965
		<iter_count>1024</iter_count>
sl@0
  2966
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  2967
		<set>
sl@0
  2968
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2969
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  2970
		</set>
sl@0
  2971
	</actionbody>
sl@0
  2972
	<actionresult>
sl@0
  2973
		<return>KErrNone</return>
sl@0
  2974
	</actionresult>
sl@0
  2975
</action>
sl@0
  2976
sl@0
  2977
sl@0
  2978
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  2979
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  2980
//! @SYMREQ CIT_PREQ1054
sl@0
  2981
//! @SYMTestPriority medium
sl@0
  2982
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  2983
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  2984
<action>
sl@0
  2985
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
sl@0
  2986
	<actiontype>Set</actiontype>
sl@0
  2987
	<actionbody>
sl@0
  2988
		<kdf>PKCS#12</kdf>
sl@0
  2989
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  2990
		<iter_count>1024</iter_count>
sl@0
  2991
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  2992
		<set>
sl@0
  2993
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  2994
			<input>B</input>
sl@0
  2995
		</set>
sl@0
  2996
	</actionbody>
sl@0
  2997
	<actionresult>
sl@0
  2998
		<return>KErrNone</return>
sl@0
  2999
	</actionresult>
sl@0
  3000
</action>
sl@0
  3001
sl@0
  3002
sl@0
  3003
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3004
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3005
//! @SYMREQ CIT_PREQ1054
sl@0
  3006
//! @SYMTestPriority medium
sl@0
  3007
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3008
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3009
<action>
sl@0
  3010
	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
sl@0
  3011
	<actiontype>Set</actiontype>
sl@0
  3012
	<actionbody>
sl@0
  3013
		<kdf>PKCS#12</kdf>
sl@0
  3014
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3015
		<iter_count>1024</iter_count>
sl@0
  3016
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  3017
		<set>
sl@0
  3018
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3019
			<input>ZYXWUTSR</input>
sl@0
  3020
		</set>
sl@0
  3021
	</actionbody>
sl@0
  3022
	<actionresult>
sl@0
  3023
		<return>KErrNone</return>
sl@0
  3024
	</actionresult>
sl@0
  3025
</action>
sl@0
  3026
sl@0
  3027
sl@0
  3028
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3029
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3030
//! @SYMREQ CIT_PREQ1054
sl@0
  3031
//! @SYMTestPriority medium
sl@0
  3032
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3033
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3034
<action>
sl@0
  3035
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
sl@0
  3036
	<actiontype>Set</actiontype>
sl@0
  3037
	<actionbody>
sl@0
  3038
		<kdf>PKCS#12</kdf>
sl@0
  3039
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3040
		<iter_count>1024</iter_count>
sl@0
  3041
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  3042
		<set>
sl@0
  3043
			<passwd>m</passwd>
sl@0
  3044
			<input>ZYXWUTSR</input>
sl@0
  3045
		</set>
sl@0
  3046
	</actionbody>
sl@0
  3047
	<actionresult>
sl@0
  3048
		<return>KErrNone</return>
sl@0
  3049
	</actionresult>
sl@0
  3050
</action>
sl@0
  3051
sl@0
  3052
sl@0
  3053
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3054
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3055
//! @SYMREQ CIT_PREQ1054
sl@0
  3056
//! @SYMTestPriority medium
sl@0
  3057
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3058
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3059
<action>
sl@0
  3060
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
sl@0
  3061
	<actiontype>Set</actiontype>
sl@0
  3062
	<actionbody>
sl@0
  3063
		<kdf>PKCS#12</kdf>
sl@0
  3064
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3065
		<iter_count>1024</iter_count>
sl@0
  3066
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  3067
		<set>
sl@0
  3068
			<passwd></passwd>
sl@0
  3069
			<input>ZYXWUTSR</input>
sl@0
  3070
		</set>
sl@0
  3071
	</actionbody>
sl@0
  3072
	<actionresult>
sl@0
  3073
		<return>KErrNone</return>
sl@0
  3074
	</actionresult>
sl@0
  3075
</action>
sl@0
  3076
sl@0
  3077
sl@0
  3078
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3079
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3080
//! @SYMREQ CIT_PREQ1054
sl@0
  3081
//! @SYMTestPriority medium
sl@0
  3082
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3083
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3084
<action>
sl@0
  3085
	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
sl@0
  3086
	<actiontype>Set</actiontype>
sl@0
  3087
	<actionbody>
sl@0
  3088
		<kdf>PKCS#12</kdf>
sl@0
  3089
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3090
		<iter_count>1024</iter_count>
sl@0
  3091
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  3092
		<set>
sl@0
  3093
			<passwd></passwd>
sl@0
  3094
			<input></input>
sl@0
  3095
		</set>
sl@0
  3096
	</actionbody>
sl@0
  3097
	<actionresult>
sl@0
  3098
		<return>KErrNone</return>
sl@0
  3099
	</actionresult>
sl@0
  3100
</action>
sl@0
  3101
////////////////////////////////////////////////////////////////////
sl@0
  3102
// PKCS12 tests using PKCS#12 PBE algorithm with PKCS#12 KDF function. 
sl@0
  3103
//  ECipherRC2_CBC_128_16, ECipher3DES_CBC tests defined above.
sl@0
  3104
//  "Set" tests are not supported for stream cipher ECipherARC4_40,ECipherARC4_128
sl@0
  3105
<action>
sl@0
  3106
	<actionname>Element test case 1, ECipherRC2_CBC_40_5</actionname>
sl@0
  3107
	<actiontype>Element</actiontype>
sl@0
  3108
	<actionbody>
sl@0
  3109
		<kdf>PKCS#12</kdf>
sl@0
  3110
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3111
		<iter_count>1024</iter_count>
sl@0
  3112
		<cipher>ECipherRC2_CBC_40_5</cipher>
sl@0
  3113
		<element>
sl@0
  3114
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3115
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  3116
		</element>
sl@0
  3117
	</actionbody>
sl@0
  3118
	<actionresult>
sl@0
  3119
		<return>KErrNone</return>
sl@0
  3120
	</actionresult>
sl@0
  3121
</action>
sl@0
  3122
sl@0
  3123
<action>
sl@0
  3124
	<actionname>Element test case 2, ECipherARC4_128</actionname>
sl@0
  3125
	<actiontype>Element</actiontype>
sl@0
  3126
	<actionbody>
sl@0
  3127
		<kdf>PKCS#12</kdf>
sl@0
  3128
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3129
		<iter_count>1024</iter_count>
sl@0
  3130
		<cipher>ECipherARC4_128</cipher>
sl@0
  3131
		<element>
sl@0
  3132
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3133
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  3134
		</element>
sl@0
  3135
	</actionbody>
sl@0
  3136
	<actionresult>
sl@0
  3137
		<return>KErrNone</return>
sl@0
  3138
	</actionresult>
sl@0
  3139
</action>
sl@0
  3140
sl@0
  3141
<action>
sl@0
  3142
	<actionname>Element test case 3, ECipherARC4_40</actionname>
sl@0
  3143
	<actiontype>Element</actiontype>
sl@0
  3144
	<actionbody>
sl@0
  3145
		<kdf>PKCS#12</kdf>
sl@0
  3146
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3147
		<iter_count>1024</iter_count>
sl@0
  3148
		<cipher>ECipherARC4_40</cipher>
sl@0
  3149
		<element>
sl@0
  3150
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3151
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  3152
		</element>
sl@0
  3153
	</actionbody>
sl@0
  3154
	<actionresult>
sl@0
  3155
		<return>KErrNone</return>
sl@0
  3156
	</actionresult>
sl@0
  3157
</action>
sl@0
  3158
sl@0
  3159
<action>
sl@0
  3160
	<actionname>Element test case 4, ECipher2Key3DES_CBC</actionname>
sl@0
  3161
	<actiontype>Element</actiontype>
sl@0
  3162
	<actionbody>
sl@0
  3163
		<kdf>PKCS#12</kdf>
sl@0
  3164
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3165
		<iter_count>1024</iter_count>
sl@0
  3166
		<cipher>ECipher2Key3DES_CBC</cipher>
sl@0
  3167
		<element>
sl@0
  3168
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3169
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  3170
		</element>
sl@0
  3171
	</actionbody>
sl@0
  3172
	<actionresult>
sl@0
  3173
		<return>KErrNone</return>
sl@0
  3174
	</actionresult>
sl@0
  3175
</action>
sl@0
  3176
sl@0
  3177
<action>
sl@0
  3178
	<actionname>Test of Set encryption, password changing, exporting importing Test 5, ECipherRC2_CBC_40_5</actionname>
sl@0
  3179
	<actiontype>Set</actiontype>
sl@0
  3180
	<actionbody>
sl@0
  3181
		<kdf>PKCS#12</kdf>
sl@0
  3182
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3183
		<iter_count>1024</iter_count>
sl@0
  3184
		<cipher>ECipherRC2_CBC_40_5</cipher>
sl@0
  3185
		<set>
sl@0
  3186
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3187
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  3188
		</set>
sl@0
  3189
	</actionbody>
sl@0
  3190
	<actionresult>
sl@0
  3191
		<return>KErrNone</return>
sl@0
  3192
	</actionresult>
sl@0
  3193
</action>
sl@0
  3194
<action>
sl@0
  3195
	<actionname>Test of Set encryption, password changing, exporting importing Test 9, ECipher2Key3DES_CBC</actionname>
sl@0
  3196
	<actiontype>Set</actiontype>
sl@0
  3197
	<actionbody>
sl@0
  3198
		<kdf>PKCS#12</kdf>
sl@0
  3199
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3200
		<iter_count>1024</iter_count>
sl@0
  3201
		<cipher>ECipher2Key3DES_CBC</cipher>
sl@0
  3202
		<set>
sl@0
  3203
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3204
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  3205
		</set>
sl@0
  3206
	</actionbody>
sl@0
  3207
	<actionresult>
sl@0
  3208
		<return>KErrNone</return>
sl@0
  3209
	</actionresult>
sl@0
  3210
</action>
sl@0
  3211
/////////////////////////////////////////
sl@0
  3212
sl@0
  3213
// Run selected PKCS#12 tests in OOM
sl@0
  3214
sl@0
  3215
sl@0
  3216
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3217
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3218
//! @SYMREQ CIT_PREQ1054
sl@0
  3219
//! @SYMTestPriority medium
sl@0
  3220
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3221
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3222
<action>
sl@0
  3223
    <actionname>OOM start</actionname>
sl@0
  3224
    <actiontype>startmemfailure</actiontype>
sl@0
  3225
    <actionbody></actionbody>
sl@0
  3226
    <actionresult>
sl@0
  3227
        <return>KErrNone</return>
sl@0
  3228
    </actionresult>
sl@0
  3229
</action>
sl@0
  3230
sl@0
  3231
sl@0
  3232
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3233
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3234
//! @SYMREQ CIT_PREQ1054
sl@0
  3235
//! @SYMTestPriority medium
sl@0
  3236
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3237
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3238
<action>
sl@0
  3239
	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
sl@0
  3240
	<actiontype>Element</actiontype>
sl@0
  3241
	<actionbody>
sl@0
  3242
		<kdf>PKCS#12</kdf>
sl@0
  3243
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3244
		<iter_count>1024</iter_count>
sl@0
  3245
		<cipher>ECipherRC2_CBC_128_16</cipher>
sl@0
  3246
		<element>
sl@0
  3247
			<passwd>password</passwd>
sl@0
  3248
			<input>This is what I want to encrypt</input>
sl@0
  3249
		</element>
sl@0
  3250
	</actionbody>
sl@0
  3251
	<actionresult>
sl@0
  3252
		<return>KErrNone</return>
sl@0
  3253
	</actionresult>
sl@0
  3254
</action>
sl@0
  3255
sl@0
  3256
sl@0
  3257
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3258
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3259
//! @SYMREQ CIT_PREQ1054
sl@0
  3260
//! @SYMTestPriority medium
sl@0
  3261
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3262
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3263
<action>
sl@0
  3264
	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
sl@0
  3265
	<actiontype>Element</actiontype>
sl@0
  3266
	<actionbody>
sl@0
  3267
		<kdf>PKCS#12</kdf>
sl@0
  3268
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3269
		<iter_count>1024</iter_count>
sl@0
  3270
		<cipher>ECipherRC2_CBC_40_16</cipher>
sl@0
  3271
		<element>
sl@0
  3272
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3273
			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
sl@0
  3274
		</element>
sl@0
  3275
	</actionbody>
sl@0
  3276
	<actionresult>
sl@0
  3277
		<return>KErrNone</return>
sl@0
  3278
	</actionresult>
sl@0
  3279
</action>
sl@0
  3280
sl@0
  3281
sl@0
  3282
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3283
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3284
//! @SYMREQ CIT_PREQ1054
sl@0
  3285
//! @SYMTestPriority medium
sl@0
  3286
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3287
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3288
<action>
sl@0
  3289
	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
sl@0
  3290
	<actiontype>Set</actiontype>
sl@0
  3291
	<actionbody>
sl@0
  3292
		<kdf>PKCS#12</kdf>
sl@0
  3293
		<salt_len_bytes>20</salt_len_bytes>
sl@0
  3294
		<iter_count>1024</iter_count>
sl@0
  3295
		<cipher>ECipherAES_CBC_128</cipher>
sl@0
  3296
		<set>
sl@0
  3297
			<passwd>a90lkjasjk3lk32kdf89</passwd>
sl@0
  3298
			<input>B</input>
sl@0
  3299
		</set>
sl@0
  3300
	</actionbody>
sl@0
  3301
	<actionresult>
sl@0
  3302
		<return>KErrNone</return>
sl@0
  3303
	</actionresult>
sl@0
  3304
</action>
sl@0
  3305
sl@0
  3306
sl@0
  3307
//! @SYMTestCaseID CIT_PREQ1054_02
sl@0
  3308
//! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0
  3309
//! @SYMREQ CIT_PREQ1054
sl@0
  3310
//! @SYMTestPriority medium
sl@0
  3311
//! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0
  3312
//! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0
  3313
<action>
sl@0
  3314
	<actionname>OOM end</actionname>
sl@0
  3315
	<actiontype>stopmemfailure</actiontype>
sl@0
  3316
	<actionbody></actionbody>
sl@0
  3317
	<actionresult>
sl@0
  3318
		<return>KErrNone</return>
sl@0
  3319
	</actionresult>
sl@0
  3320
</action>
sl@0
  3321
sl@0
  3322
sl@0
  3323
<action>
sl@0
  3324
	<actionname>Compatibility old PKCS#5</actionname>
sl@0
  3325
	<actiontype>ExternPbeParams</actiontype>
sl@0
  3326
	<actionbody>
sl@0
  3327
		<orig-filename>c:\tpbe\pkcs5-orig.dat</orig-filename>
sl@0
  3328
		<expected-cipher>2</expected-cipher>
sl@0
  3329
		<expected-salt>53414c5434353637</expected-salt>
sl@0
  3330
		<expected-iv>49563233343536373839616263646566</expected-iv>
sl@0
  3331
		<expected-iter-count>1234</expected-iter-count>
sl@0
  3332
		<expected-kdf>0</expected-kdf>
sl@0
  3333
	</actionbody>
sl@0
  3334
	<actionresult>
sl@0
  3335
		<return>KErrNone</return>
sl@0
  3336
	</actionresult>
sl@0
  3337
</action>
sl@0
  3338
sl@0
  3339
<action>
sl@0
  3340
	<actionname>Data compatibility orig PKCS#12</actionname>
sl@0
  3341
	<actiontype>ExternPbeParams</actiontype>
sl@0
  3342
	<actionbody>
sl@0
  3343
		<orig-filename>c:\tpbe\pkcs12-first.dat</orig-filename>
sl@0
  3344
		<expected-cipher>2</expected-cipher>
sl@0
  3345
		<expected-salt>53414c5434353637</expected-salt>
sl@0
  3346
		<expected-iv>49563233343536373839616263646566</expected-iv>
sl@0
  3347
		<expected-iter-count>1234</expected-iter-count>
sl@0
  3348
		<expected-kdf>1</expected-kdf>
sl@0
  3349
	</actionbody>
sl@0
  3350
	<actionresult>
sl@0
  3351
		<return>KErrNone</return>
sl@0
  3352
	</actionresult>
sl@0
  3353
</action>
sl@0
  3354