1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/security/crypto/weakcrypto/test/tpkcs5kdf/scripts/tpkcs12kdftests.txt Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,10094 @@
1.4 +// Copyright (c) Symbian Software Ltd 2006 - 2007. All rights reserved.
1.5 +
1.6 +<action>
1.7 + <actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
1.8 + <actiontype>DeriveKey</actiontype>
1.9 + <actionbody>
1.10 + <derivekey>
1.11 + <passwd>password</passwd>
1.12 + <salt>1234567878563412</salt>
1.13 + <iterations>5</iterations>
1.14 + <key>D1DAA78615F287E6</key>
1.15 + </derivekey>
1.16 + </actionbody>
1.17 + <actionresult>
1.18 + <return>KErrNone</return>
1.19 + </actionresult>
1.20 +</action>
1.21 +<action>
1.22 + <actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
1.23 + <actiontype>DeriveKey</actiontype>
1.24 + <actionbody>
1.25 + <derivekey>
1.26 + <passwd>password</passwd>
1.27 + <salt>1234567878563412</salt>
1.28 + <iterations>100</iterations>
1.29 + <key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
1.30 + </derivekey>
1.31 + </actionbody>
1.32 + <actionresult>
1.33 + <return>KErrNone</return>
1.34 + </actionresult>
1.35 +</action>
1.36 +<action>
1.37 + <actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
1.38 + <actiontype>DeriveKey</actiontype>
1.39 + <actionbody>
1.40 + <derivekey>
1.41 + <passwd>password</passwd>
1.42 + <salt>1234567878563412</salt>
1.43 + <iterations>1000</iterations>
1.44 + <key>142F8FAFCE633CCD9265D90FC8FE4252</key>
1.45 + </derivekey>
1.46 + </actionbody>
1.47 + <actionresult>
1.48 + <return>KErrNone</return>
1.49 + </actionresult>
1.50 +</action>
1.51 +<action>
1.52 + <actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
1.53 + <actiontype>DeriveKey</actiontype>
1.54 + <actionbody>
1.55 + <derivekey>
1.56 + <passwd>password</passwd>
1.57 + <salt>1234567878563412</salt>
1.58 + <iterations>10000</iterations>
1.59 + <key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
1.60 + </derivekey>
1.61 + </actionbody>
1.62 + <actionresult>
1.63 + <return>KErrNone</return>
1.64 + </actionresult>
1.65 +</action>
1.66 +<action>
1.67 + <actionname>PKCS5 Key Derivation Test 5 -- 16 byte key, really long password vector generated from openssl</actionname>
1.68 + <actiontype>DeriveKey</actiontype>
1.69 + <actionbody>
1.70 + <derivekey>
1.71 + <passwd>This is an example of a really long really long password, I'm attempting to see how long we can make it and still see if our code will work. This really shouldn't be a problem</passwd>
1.72 + <salt>1234567878563412</salt>
1.73 + <iterations>1000</iterations>
1.74 + <key>A39EDFA35086746DE5B4792035D9A070</key>
1.75 + </derivekey>
1.76 + </actionbody>
1.77 + <actionresult>
1.78 + <return>KErrNone</return>
1.79 + </actionresult>
1.80 +</action>
1.81 +<action>
1.82 + <actionname>PKCS5 Key Derivation Test 6 -- 16 byte key, medium size password vector generated from openssl</actionname>
1.83 + <actiontype>DeriveKey</actiontype>
1.84 + <actionbody>
1.85 + <derivekey>
1.86 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.87 + <salt>1234567878563412</salt>
1.88 + <iterations>1000</iterations>
1.89 + <key>5F9219EED8BD0BCF5B3440B062305E05</key>
1.90 + </derivekey>
1.91 + </actionbody>
1.92 + <actionresult>
1.93 + <return>KErrNone</return>
1.94 + </actionresult>
1.95 +</action>
1.96 +<action>
1.97 + <actionname>PKCS5 Key Derivation Test 7 -- 32 byte key, long salt, short password vector generated from openssl</actionname>
1.98 + <actiontype>DeriveKey</actiontype>
1.99 + <actionbody>
1.100 + <derivekey>
1.101 + <passwd>password</passwd>
1.102 + <salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
1.103 + <iterations>1000</iterations>
1.104 + <key>5648F3832B18C6A85165B093627F2268CCE1E79DC2F85D3909C36356789B349D</key>
1.105 + </derivekey>
1.106 + </actionbody>
1.107 + <actionresult>
1.108 + <return>KErrNone</return>
1.109 + </actionresult>
1.110 +</action>
1.111 +<action>
1.112 + <actionname>PKCS5 Key Derivation Test 8 -- 32 byte key, long salt, long password vector generated from openssl</actionname>
1.113 + <actiontype>DeriveKey</actiontype>
1.114 + <actionbody>
1.115 + <derivekey>
1.116 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.117 + <salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
1.118 + <iterations>1000</iterations>
1.119 + <key>9F14D62760272D4388FA70E31C2B7940A083F0190C244F25F293D98D58766016</key>
1.120 + </derivekey>
1.121 + </actionbody>
1.122 + <actionresult>
1.123 + <return>KErrNone</return>
1.124 + </actionresult>
1.125 +</action>
1.126 +<action>
1.127 + <actionname>PKCS5 Key Derivation Test 9 -- 16 byte key, really long password vector generated from openssl</actionname>
1.128 + <actiontype>DeriveKey</actiontype>
1.129 + <actionbody>
1.130 + <derivekey>
1.131 + <passwd>Thisisanexampleofareallylongreallylongpassword,I'mattemptingtoseehowlongwecanmakeitandstillseeifourcodewillwork.Thisreallyshouldn'tbeaproblem</passwd>
1.132 + <salt>1234567878563412</salt>
1.133 + <iterations>1000</iterations>
1.134 + <key>529C96D62F54418DD6AD33724F3014D6</key>
1.135 + </derivekey>
1.136 + </actionbody>
1.137 + <actionresult>
1.138 + <return>KErrNone</return>
1.139 + </actionresult>
1.140 +</action>
1.141 +<action>
1.142 + <actionname>PKCS5 Key Derivation Test 10 -- 16 byte key, really long password vector generated from openssl</actionname>
1.143 + <actiontype>DeriveKey</actiontype>
1.144 + <actionbody>
1.145 + <derivekey>
1.146 + <passwd>ThisisanexampleofareallylongreallylongpasswordImattemptingtoseehowlongwecanmakeitandstillseeifourcodewillworkThisreallyshouldntbeaproblem</passwd>
1.147 + <salt>1234567878563412</salt>
1.148 + <iterations>1000</iterations>
1.149 + <key>E493D7C57BD77047C9D709DF99CBD3C7</key>
1.150 + </derivekey>
1.151 + </actionbody>
1.152 + <actionresult>
1.153 + <return>KErrNone</return>
1.154 + </actionresult>
1.155 +</action>
1.156 +<action>
1.157 + <actionname>PKCS5 Key Derivation Test 11 -- 16 byte key, really long password vector generated from openssl</actionname>
1.158 + <actiontype>DeriveKey</actiontype>
1.159 + <actionbody>
1.160 + <derivekey>
1.161 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.162 + <salt>1234567878563412</salt>
1.163 + <iterations>1000</iterations>
1.164 + <key>EBD56BEE980D41A38AFA53642AAE4B25</key>
1.165 + </derivekey>
1.166 + </actionbody>
1.167 + <actionresult>
1.168 + <return>KErrNone</return>
1.169 + </actionresult>
1.170 +</action>
1.171 +<action>
1.172 + <actionname>PKCS5 Key Derivation Test 12 -- 32 byte key, really long password vector generated from openssl</actionname>
1.173 + <actiontype>DeriveKey</actiontype>
1.174 + <actionbody>
1.175 + <derivekey>
1.176 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.177 + <salt>1234567878563412</salt>
1.178 + <iterations>1000</iterations>
1.179 + <key>EBD56BEE980D41A38AFA53642AAE4B251FF9C2A1503B2EF65F28E59DEF906A60</key>
1.180 + </derivekey>
1.181 + </actionbody>
1.182 + <actionresult>
1.183 + <return>KErrNone</return>
1.184 + </actionresult>
1.185 +</action>
1.186 +<action>
1.187 + <actionname>PKCS5 Key Derivation Test 13 -- 32 byte key, long password vector generated from openssl</actionname>
1.188 + <actiontype>DeriveKey</actiontype>
1.189 + <actionbody>
1.190 + <derivekey>
1.191 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.192 + <salt>1234567878563412</salt>
1.193 + <iterations>1000</iterations>
1.194 + <key>1FFB655FEEC4202B0466BF24AA9800D0A96BFA7F904D655253CE2E32B0B7B795</key>
1.195 + </derivekey>
1.196 + </actionbody>
1.197 + <actionresult>
1.198 + <return>KErrNone</return>
1.199 + </actionresult>
1.200 +</action>
1.201 +<action>
1.202 + <actionname>PKCS5 Key Derivation Test 14 -- 32 byte key, long password vector generated from openssl</actionname>
1.203 + <actiontype>DeriveKey</actiontype>
1.204 + <actionbody>
1.205 + <derivekey>
1.206 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.207 + <salt>1234567878563412</salt>
1.208 + <iterations>1000</iterations>
1.209 + <key>A544F0E2F88507E44F92CA2DCAC8B67C0E0D780182CF7DDC18AB1CA9BB3C2904</key>
1.210 + </derivekey>
1.211 + </actionbody>
1.212 + <actionresult>
1.213 + <return>KErrNone</return>
1.214 + </actionresult>
1.215 +</action>
1.216 +<action>
1.217 + <actionname>PKCS5 Key Derivation Test 15 -- 32 byte key, medium length password vector generated from openssl</actionname>
1.218 + <actiontype>DeriveKey</actiontype>
1.219 + <actionbody>
1.220 + <derivekey>
1.221 + <passwd>passwordpasswordpasswordpasswordpasswordpassword</passwd>
1.222 + <salt>1234567878563412</salt>
1.223 + <iterations>1000</iterations>
1.224 + <key>F1DC1A4224F0C9A4655FFDB7D5BE75060BFFD0B682293A5D2E61BD5A773B81BC</key>
1.225 + </derivekey>
1.226 + </actionbody>
1.227 + <actionresult>
1.228 + <return>KErrNone</return>
1.229 + </actionresult>
1.230 +</action>
1.231 +<action>
1.232 + <actionname>PKCS5 Key Derivation Test 16 -- 32 byte key, long password vector generated from openssl</actionname>
1.233 + <actiontype>DeriveKey</actiontype>
1.234 + <actionbody>
1.235 + <derivekey>
1.236 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.237 + <salt>1234567878563412</salt>
1.238 + <iterations>1000</iterations>
1.239 + <key>798B6F4DA56ECDA25C82A63F3577C3FF97A3A2A92BE3DD810C47704916890615</key>
1.240 + </derivekey>
1.241 + </actionbody>
1.242 + <actionresult>
1.243 + <return>KErrNone</return>
1.244 + </actionresult>
1.245 +</action>
1.246 +<action>
1.247 + <actionname>PKCS5 Key Derivation Test 17 -- 32 byte key, long password vector generated from openssl</actionname>
1.248 + <actiontype>DeriveKey</actiontype>
1.249 + <actionbody>
1.250 + <derivekey>
1.251 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.252 + <salt>1234567878563412</salt>
1.253 + <iterations>1000</iterations>
1.254 + <key>5F9219EED8BD0BCF5B3440B062305E052CE70AEBC9A43CE9F4F39E3D0E56603D</key>
1.255 + </derivekey>
1.256 + </actionbody>
1.257 + <actionresult>
1.258 + <return>KErrNone</return>
1.259 + </actionresult>
1.260 +</action>
1.261 +<action>
1.262 + <actionname>PKCS5 Key Derivation Test 18 -- 32 byte key, long password vector generated from openssl</actionname>
1.263 + <actiontype>DeriveKey</actiontype>
1.264 + <actionbody>
1.265 + <derivekey>
1.266 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
1.267 + <salt>1234567878563412</salt>
1.268 + <iterations>1000</iterations>
1.269 + <key>421B82FF5825F9BE0E580C4D07BFF0CF54FFFD1BAD7763BF483A8291359F60E6</key>
1.270 + </derivekey>
1.271 + </actionbody>
1.272 + <actionresult>
1.273 + <return>KErrNone</return>
1.274 + </actionresult>
1.275 +</action>
1.276 +<action>
1.277 + <actionname>PKCS5 Key Derivation Test 19 -- 32 byte key, 65 byte password to test the fix in the CHMAC::Init code vector generated from openssl</actionname>
1.278 + <actiontype>DeriveKey</actiontype>
1.279 + <actionbody>
1.280 + <derivekey>
1.281 + <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordp</passwd>
1.282 + <salt>1234567878563412</salt>
1.283 + <iterations>1000</iterations>
1.284 + <key>5D0AAB5A6A7BCD6F5376DF142E7FEAC98728F4F1322091138300A95DB5EBDE72</key>
1.285 + </derivekey>
1.286 + </actionbody>
1.287 + <actionresult>
1.288 + <return>KErrNone</return>
1.289 + </actionresult>
1.290 +</action>
1.291 +<action>
1.292 + <actionname>PKCS5 Key Derivation Test 20 -- 32 byte key, password with spaces vector generated from openssl</actionname>
1.293 + <actiontype>DeriveKey</actiontype>
1.294 + <actionbody>
1.295 + <derivekey>
1.296 + <passwd>password password password password password password password passwordp</passwd>
1.297 + <salt>1234567878563412</salt>
1.298 + <iterations>1000</iterations>
1.299 + <key>EE99202289798A02DC6EAEB81A501C43AE3F8513B8F9ECC62FFBF3D0F70EF444</key>
1.300 + </derivekey>
1.301 + </actionbody>
1.302 + <actionresult>
1.303 + <return>KErrNone</return>
1.304 + </actionresult>
1.305 +</action>
1.306 +<action>
1.307 + <actionname>PKCS5 Key Derivation Test 21 -- 1 byte key vector generated from openssl</actionname>
1.308 + <actiontype>DeriveKey</actiontype>
1.309 + <actionbody>
1.310 + <derivekey>
1.311 + <passwd>password</passwd>
1.312 + <salt>1234567878563412</salt>
1.313 + <iterations>10000</iterations>
1.314 + <key>66</key>
1.315 + </derivekey>
1.316 + </actionbody>
1.317 + <actionresult>
1.318 + <return>KErrNone</return>
1.319 + </actionresult>
1.320 +</action>
1.321 +<action>
1.322 + <actionname>PKCS5 Key Derivation Test 22 -- 128 byte key vector generated from openssl</actionname>
1.323 + <actiontype>DeriveKey</actiontype>
1.324 + <actionbody>
1.325 + <derivekey>
1.326 + <passwd>password</passwd>
1.327 + <salt>1234567878563412</salt>
1.328 + <iterations>10000</iterations>
1.329 + <key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584E6FCB5C7636C3A04DA7F38778BE00C842A5A202578408C27FA08A3A7AACDF7A7B3F9763A33DDDCD09B3E07FA95106B07892F6981AA450447E106BCA8252B1532</key>
1.330 + </derivekey>
1.331 + </actionbody>
1.332 + <actionresult>
1.333 + <return>KErrNone</return>
1.334 + </actionresult>
1.335 +</action>
1.336 +<action>
1.337 + <actionname>PKCS5 Key Derivation Test 23 -- 160 (multiple of hash size) byte key vector generated from openssl</actionname>
1.338 + <actiontype>DeriveKey</actiontype>
1.339 + <actionbody>
1.340 + <derivekey>
1.341 + <passwd>alkiasdk29s.382{</passwd>
1.342 + <salt>1234567878563412</salt>
1.343 + <iterations>30000</iterations>
1.344 + <key>62E18995350965CF1E02F111ADBEE270FBBAE6A2D8C6B94D24F1E4E41B04FE40C1C7CE7E768092362A75F220601AAF3FBBE339F33D97CA0443D8DD795B88BF97F9A41561A80D20659486459995CA559D5C37792C608CF279E880142319D333D17C62C35C65E9D2A50E0F4010E2D475ECB179A41366D62617BB48B13FA3A98E3FA0F76236442E324B39EDD1B9AB253A1D6A6A6462E3330B548BC4DAE4CD060FC6</key>
1.345 + </derivekey>
1.346 + </actionbody>
1.347 + <actionresult>
1.348 + <return>KErrNone</return>
1.349 + </actionresult>
1.350 +</action>
1.351 +<action>
1.352 + <actionname>PKCS5 Key Derivation Test 24 -- 8 byte key vector generated from openssl</actionname>
1.353 + <actiontype>DeriveKey</actiontype>
1.354 + <actionbody>
1.355 + <derivekey>
1.356 + <passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
1.357 + <salt>1234567878563412</salt>
1.358 + <iterations>1000</iterations>
1.359 + <key>F104F4B53A4A160F</key>
1.360 + </derivekey>
1.361 + </actionbody>
1.362 + <actionresult>
1.363 + <return>KErrNone</return>
1.364 + </actionresult>
1.365 +</action>
1.366 +<action>
1.367 + <actionname>PKCS5 Key Derivation Test 25 -- 256 byte key vector generated from openssl</actionname>
1.368 + <actiontype>DeriveKey</actiontype>
1.369 + <actionbody>
1.370 + <derivekey>
1.371 + <passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
1.372 + <salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
1.373 + <iterations>10000</iterations>
1.374 + <key>24360C775D9B1E95D0280884846FA049E39B60E2D301219C87B2FA3F8EF13F93C977E2A7A2750B3F6518CBC1539BA9CA2628BDC454657D7D7BF964DCFE6EF489A16A7DA4B6FA3DCA2C6E4457D5822D3CDD712633EE990F3254E1931FD4645EF25F036D76EE2A79394AA82CFF3B3AF9D9C1A84860D1753E5FF7DF45D76B115F159F655EFFE309B6472EB77FC8D149C5EAD72084D37ADBE144356D63350911FD192B1E16B8F37B1BC624A8BC0C29D4B190F16A9A9CC373BE74B9935EFD52FA6828107E21D180BB1079EF8300BF17D5163CA06E27A0B322E5E44CC2A34A0927654B24D4EBF59BF0790A108114B91118548AFEFBF96C5C66D99AFCEA4E32D4EAF9A9</key>
1.375 + </derivekey>
1.376 + </actionbody>
1.377 + <actionresult>
1.378 + <return>KErrNone</return>
1.379 + </actionresult>
1.380 +</action>
1.381 +// Out of Memory tests follow
1.382 +<action>
1.383 + <actionname>OOM Start</actionname>
1.384 + <actiontype>startmemfailure</actiontype>
1.385 + <actionbody></actionbody>
1.386 + <actionresult>
1.387 + <return>KErrNone</return>
1.388 + </actionresult>
1.389 +</action>
1.390 +<action>
1.391 + <actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
1.392 + <actiontype>DeriveKey</actiontype>
1.393 + <actionbody>
1.394 + <derivekey>
1.395 + <passwd>password</passwd>
1.396 + <salt>1234567878563412</salt>
1.397 + <iterations>5</iterations>
1.398 + <key>D1DAA78615F287E6</key>
1.399 + </derivekey>
1.400 + </actionbody>
1.401 + <actionresult>
1.402 + <return>KErrNone</return>
1.403 + </actionresult>
1.404 +</action>
1.405 +<action>
1.406 + <actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
1.407 + <actiontype>DeriveKey</actiontype>
1.408 + <actionbody>
1.409 + <derivekey>
1.410 + <passwd>password</passwd>
1.411 + <salt>1234567878563412</salt>
1.412 + <iterations>100</iterations>
1.413 + <key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
1.414 + </derivekey>
1.415 + </actionbody>
1.416 + <actionresult>
1.417 + <return>KErrNone</return>
1.418 + </actionresult>
1.419 +</action>
1.420 +<action>
1.421 + <actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
1.422 + <actiontype>DeriveKey</actiontype>
1.423 + <actionbody>
1.424 + <derivekey>
1.425 + <passwd>password</passwd>
1.426 + <salt>1234567878563412</salt>
1.427 + <iterations>1000</iterations>
1.428 + <key>142F8FAFCE633CCD9265D90FC8FE4252</key>
1.429 + </derivekey>
1.430 + </actionbody>
1.431 + <actionresult>
1.432 + <return>KErrNone</return>
1.433 + </actionresult>
1.434 +</action>
1.435 +<action>
1.436 + <actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
1.437 + <actiontype>DeriveKey</actiontype>
1.438 + <actionbody>
1.439 + <derivekey>
1.440 + <passwd>password</passwd>
1.441 + <salt>1234567878563412</salt>
1.442 + <iterations>10000</iterations>
1.443 + <key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
1.444 + </derivekey>
1.445 + </actionbody>
1.446 + <actionresult>
1.447 + <return>KErrNone</return>
1.448 + </actionresult>
1.449 +</action>
1.450 +<action>
1.451 + <actionname>PKCS5 Key Derivation Test 5 -- leave from performAction other than KErrNoMemory</actionname>
1.452 + <actiontype>DeriveKey</actiontype>
1.453 + <actionbody>
1.454 + <derivekey>
1.455 + <passwd>password</passwd>
1.456 + <salt>1234567878563412</salt>
1.457 + <iterations>10000</iterations>
1.458 + <key>66</key>
1.459 + <leaveinperformaction>1</leaveinperformaction>
1.460 + </derivekey>
1.461 + <knowndefect>ETrue</knowndefect>
1.462 + </actionbody>
1.463 + <actionresult>
1.464 + <return>KErrNone</return>
1.465 + </actionresult>
1.466 +</action>
1.467 +<action>
1.468 + <actionname>OOM End</actionname>
1.469 + <actiontype>stopmemfailure</actiontype>
1.470 + <actionbody></actionbody>
1.471 + <actionresult>
1.472 + <return>KErrNone</return>
1.473 + </actionresult>
1.474 +</action>
1.475 +//End of out of memory tests
1.476 +
1.477 +// =====================================================================
1.478 +// PKCS#12 tests
1.479 +
1.480 +<action>
1.481 + <actionname>OOM Start</actionname>
1.482 + <actiontype>startmemfailure</actiontype>
1.483 + <actionbody></actionbody>
1.484 + <actionresult>
1.485 + <return>KErrNone</return>
1.486 + </actionresult>
1.487 +</action>
1.488 +
1.489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.491 +//! @SYMREQ CIT_PREQ1054
1.492 +//! @SYMTestPriority medium
1.493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.495 +<action>
1.496 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.497 + <actiontype>DeriveKey</actiontype>
1.498 + <actionbody>
1.499 + <derivekey>
1.500 + <kdf>pkcs#12</kdf>
1.501 + <passwd>0000</passwd>
1.502 + <salt>53414C54</salt>
1.503 + <iterations>1</iterations>
1.504 + <key>3037AFC8EA</key>
1.505 + </derivekey>
1.506 + </actionbody>
1.507 +</action>
1.508 +
1.509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.511 +//! @SYMREQ CIT_PREQ1054
1.512 +//! @SYMTestPriority medium
1.513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.515 +<action>
1.516 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.517 + <actiontype>DeriveKey</actiontype>
1.518 + <actionbody>
1.519 + <derivekey>
1.520 + <kdf>pkcs#12</kdf>
1.521 + <passwd>0001</passwd>
1.522 + <salt>53414C54</salt>
1.523 + <iterations>1</iterations>
1.524 + <key>37F44080CB</key>
1.525 + </derivekey>
1.526 + </actionbody>
1.527 +</action>
1.528 +
1.529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.531 +//! @SYMREQ CIT_PREQ1054
1.532 +//! @SYMTestPriority medium
1.533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.535 +<action>
1.536 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.537 + <actiontype>DeriveKey</actiontype>
1.538 + <actionbody>
1.539 + <derivekey>
1.540 + <kdf>pkcs#12</kdf>
1.541 + <passwd>PSWD</passwd>
1.542 + <salt>53414C54</salt>
1.543 + <iterations>1</iterations>
1.544 + <key>8A18939ACF</key>
1.545 + </derivekey>
1.546 + </actionbody>
1.547 +</action>
1.548 +
1.549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.551 +//! @SYMREQ CIT_PREQ1054
1.552 +//! @SYMTestPriority medium
1.553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.555 +<action>
1.556 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.557 + <actiontype>DeriveKey</actiontype>
1.558 + <actionbody>
1.559 + <derivekey>
1.560 + <kdf>pkcs#12</kdf>
1.561 + <passwd>password</passwd>
1.562 + <salt>53414C54</salt>
1.563 + <iterations>1</iterations>
1.564 + <key>AFF6C5EDE0</key>
1.565 + </derivekey>
1.566 + </actionbody>
1.567 +</action>
1.568 +
1.569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.571 +//! @SYMREQ CIT_PREQ1054
1.572 +//! @SYMTestPriority medium
1.573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.575 +<action>
1.576 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.577 + <actiontype>DeriveKey</actiontype>
1.578 + <actionbody>
1.579 + <derivekey>
1.580 + <kdf>pkcs#12</kdf>
1.581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.582 + <salt>53414C54</salt>
1.583 + <iterations>1</iterations>
1.584 + <key>2ED53BB2CE</key>
1.585 + </derivekey>
1.586 + </actionbody>
1.587 +</action>
1.588 +
1.589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.591 +//! @SYMREQ CIT_PREQ1054
1.592 +//! @SYMTestPriority medium
1.593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.595 +<action>
1.596 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.597 + <actiontype>DeriveKey</actiontype>
1.598 + <actionbody>
1.599 + <derivekey>
1.600 + <kdf>pkcs#12</kdf>
1.601 + <passwd>0000</passwd>
1.602 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.603 + <iterations>1</iterations>
1.604 + <key>49CABE7B67</key>
1.605 + </derivekey>
1.606 + </actionbody>
1.607 +</action>
1.608 +
1.609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.611 +//! @SYMREQ CIT_PREQ1054
1.612 +//! @SYMTestPriority medium
1.613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.615 +<action>
1.616 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.617 + <actiontype>DeriveKey</actiontype>
1.618 + <actionbody>
1.619 + <derivekey>
1.620 + <kdf>pkcs#12</kdf>
1.621 + <passwd>0001</passwd>
1.622 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.623 + <iterations>1</iterations>
1.624 + <key>F994B990D3</key>
1.625 + </derivekey>
1.626 + </actionbody>
1.627 +</action>
1.628 +
1.629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.631 +//! @SYMREQ CIT_PREQ1054
1.632 +//! @SYMTestPriority medium
1.633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.635 +<action>
1.636 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.637 + <actiontype>DeriveKey</actiontype>
1.638 + <actionbody>
1.639 + <derivekey>
1.640 + <kdf>pkcs#12</kdf>
1.641 + <passwd>PSWD</passwd>
1.642 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.643 + <iterations>1</iterations>
1.644 + <key>1AFAAD7E51</key>
1.645 + </derivekey>
1.646 + </actionbody>
1.647 +</action>
1.648 +
1.649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.651 +//! @SYMREQ CIT_PREQ1054
1.652 +//! @SYMTestPriority medium
1.653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.655 +<action>
1.656 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.657 + <actiontype>DeriveKey</actiontype>
1.658 + <actionbody>
1.659 + <derivekey>
1.660 + <kdf>pkcs#12</kdf>
1.661 + <passwd>password</passwd>
1.662 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.663 + <iterations>1</iterations>
1.664 + <key>878C91098D</key>
1.665 + </derivekey>
1.666 + </actionbody>
1.667 +</action>
1.668 +
1.669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.671 +//! @SYMREQ CIT_PREQ1054
1.672 +//! @SYMTestPriority medium
1.673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.675 +<action>
1.676 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.677 + <actiontype>DeriveKey</actiontype>
1.678 + <actionbody>
1.679 + <derivekey>
1.680 + <kdf>pkcs#12</kdf>
1.681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.682 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.683 + <iterations>1</iterations>
1.684 + <key>0DE3F08CAF</key>
1.685 + </derivekey>
1.686 + </actionbody>
1.687 +</action>
1.688 +
1.689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.691 +//! @SYMREQ CIT_PREQ1054
1.692 +//! @SYMTestPriority medium
1.693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.695 +<action>
1.696 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.697 + <actiontype>DeriveKey</actiontype>
1.698 + <actionbody>
1.699 + <derivekey>
1.700 + <kdf>pkcs#12</kdf>
1.701 + <passwd>0000</passwd>
1.702 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.703 + <iterations>1</iterations>
1.704 + <key>90253A49C0</key>
1.705 + </derivekey>
1.706 + </actionbody>
1.707 +</action>
1.708 +
1.709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.711 +//! @SYMREQ CIT_PREQ1054
1.712 +//! @SYMTestPriority medium
1.713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.715 +<action>
1.716 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.717 + <actiontype>DeriveKey</actiontype>
1.718 + <actionbody>
1.719 + <derivekey>
1.720 + <kdf>pkcs#12</kdf>
1.721 + <passwd>0001</passwd>
1.722 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.723 + <iterations>1</iterations>
1.724 + <key>40BE97AB93</key>
1.725 + </derivekey>
1.726 + </actionbody>
1.727 +</action>
1.728 +
1.729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.731 +//! @SYMREQ CIT_PREQ1054
1.732 +//! @SYMTestPriority medium
1.733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.735 +<action>
1.736 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.737 + <actiontype>DeriveKey</actiontype>
1.738 + <actionbody>
1.739 + <derivekey>
1.740 + <kdf>pkcs#12</kdf>
1.741 + <passwd>PSWD</passwd>
1.742 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.743 + <iterations>1</iterations>
1.744 + <key>A64B43E14E</key>
1.745 + </derivekey>
1.746 + </actionbody>
1.747 +</action>
1.748 +
1.749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.751 +//! @SYMREQ CIT_PREQ1054
1.752 +//! @SYMTestPriority medium
1.753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.755 +<action>
1.756 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.757 + <actiontype>DeriveKey</actiontype>
1.758 + <actionbody>
1.759 + <derivekey>
1.760 + <kdf>pkcs#12</kdf>
1.761 + <passwd>password</passwd>
1.762 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.763 + <iterations>1</iterations>
1.764 + <key>E323D5F588</key>
1.765 + </derivekey>
1.766 + </actionbody>
1.767 +</action>
1.768 +
1.769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.771 +//! @SYMREQ CIT_PREQ1054
1.772 +//! @SYMTestPriority medium
1.773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.775 +<action>
1.776 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.777 + <actiontype>DeriveKey</actiontype>
1.778 + <actionbody>
1.779 + <derivekey>
1.780 + <kdf>pkcs#12</kdf>
1.781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.782 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.783 + <iterations>1</iterations>
1.784 + <key>27476572AF</key>
1.785 + </derivekey>
1.786 + </actionbody>
1.787 +</action>
1.788 +
1.789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.791 +//! @SYMREQ CIT_PREQ1054
1.792 +//! @SYMTestPriority medium
1.793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.795 +<action>
1.796 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.797 + <actiontype>DeriveKey</actiontype>
1.798 + <actionbody>
1.799 + <derivekey>
1.800 + <kdf>pkcs#12</kdf>
1.801 + <passwd>0000</passwd>
1.802 + <salt>53414C54</salt>
1.803 + <iterations>2</iterations>
1.804 + <key>A1D9010A67</key>
1.805 + </derivekey>
1.806 + </actionbody>
1.807 +</action>
1.808 +
1.809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.811 +//! @SYMREQ CIT_PREQ1054
1.812 +//! @SYMTestPriority medium
1.813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.815 +<action>
1.816 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.817 + <actiontype>DeriveKey</actiontype>
1.818 + <actionbody>
1.819 + <derivekey>
1.820 + <kdf>pkcs#12</kdf>
1.821 + <passwd>0001</passwd>
1.822 + <salt>53414C54</salt>
1.823 + <iterations>2</iterations>
1.824 + <key>17E4E1F15B</key>
1.825 + </derivekey>
1.826 + </actionbody>
1.827 +</action>
1.828 +
1.829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.831 +//! @SYMREQ CIT_PREQ1054
1.832 +//! @SYMTestPriority medium
1.833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.835 +<action>
1.836 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.837 + <actiontype>DeriveKey</actiontype>
1.838 + <actionbody>
1.839 + <derivekey>
1.840 + <kdf>pkcs#12</kdf>
1.841 + <passwd>PSWD</passwd>
1.842 + <salt>53414C54</salt>
1.843 + <iterations>2</iterations>
1.844 + <key>D1B71808FC</key>
1.845 + </derivekey>
1.846 + </actionbody>
1.847 +</action>
1.848 +
1.849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.851 +//! @SYMREQ CIT_PREQ1054
1.852 +//! @SYMTestPriority medium
1.853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.855 +<action>
1.856 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.857 + <actiontype>DeriveKey</actiontype>
1.858 + <actionbody>
1.859 + <derivekey>
1.860 + <kdf>pkcs#12</kdf>
1.861 + <passwd>password</passwd>
1.862 + <salt>53414C54</salt>
1.863 + <iterations>2</iterations>
1.864 + <key>EE7E4073F2</key>
1.865 + </derivekey>
1.866 + </actionbody>
1.867 +</action>
1.868 +
1.869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.871 +//! @SYMREQ CIT_PREQ1054
1.872 +//! @SYMTestPriority medium
1.873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.875 +<action>
1.876 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.877 + <actiontype>DeriveKey</actiontype>
1.878 + <actionbody>
1.879 + <derivekey>
1.880 + <kdf>pkcs#12</kdf>
1.881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.882 + <salt>53414C54</salt>
1.883 + <iterations>2</iterations>
1.884 + <key>5BF185C726</key>
1.885 + </derivekey>
1.886 + </actionbody>
1.887 +</action>
1.888 +
1.889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.891 +//! @SYMREQ CIT_PREQ1054
1.892 +//! @SYMTestPriority medium
1.893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.895 +<action>
1.896 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.897 + <actiontype>DeriveKey</actiontype>
1.898 + <actionbody>
1.899 + <derivekey>
1.900 + <kdf>pkcs#12</kdf>
1.901 + <passwd>0000</passwd>
1.902 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.903 + <iterations>2</iterations>
1.904 + <key>72ADF5E041</key>
1.905 + </derivekey>
1.906 + </actionbody>
1.907 +</action>
1.908 +
1.909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.911 +//! @SYMREQ CIT_PREQ1054
1.912 +//! @SYMTestPriority medium
1.913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.915 +<action>
1.916 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.917 + <actiontype>DeriveKey</actiontype>
1.918 + <actionbody>
1.919 + <derivekey>
1.920 + <kdf>pkcs#12</kdf>
1.921 + <passwd>0001</passwd>
1.922 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.923 + <iterations>2</iterations>
1.924 + <key>63E6DF459C</key>
1.925 + </derivekey>
1.926 + </actionbody>
1.927 +</action>
1.928 +
1.929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.931 +//! @SYMREQ CIT_PREQ1054
1.932 +//! @SYMTestPriority medium
1.933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.935 +<action>
1.936 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.937 + <actiontype>DeriveKey</actiontype>
1.938 + <actionbody>
1.939 + <derivekey>
1.940 + <kdf>pkcs#12</kdf>
1.941 + <passwd>PSWD</passwd>
1.942 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.943 + <iterations>2</iterations>
1.944 + <key>C2099204AB</key>
1.945 + </derivekey>
1.946 + </actionbody>
1.947 +</action>
1.948 +
1.949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.951 +//! @SYMREQ CIT_PREQ1054
1.952 +//! @SYMTestPriority medium
1.953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.955 +<action>
1.956 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.957 + <actiontype>DeriveKey</actiontype>
1.958 + <actionbody>
1.959 + <derivekey>
1.960 + <kdf>pkcs#12</kdf>
1.961 + <passwd>password</passwd>
1.962 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.963 + <iterations>2</iterations>
1.964 + <key>3204D28A32</key>
1.965 + </derivekey>
1.966 + </actionbody>
1.967 +</action>
1.968 +
1.969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.971 +//! @SYMREQ CIT_PREQ1054
1.972 +//! @SYMTestPriority medium
1.973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.975 +<action>
1.976 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.977 + <actiontype>DeriveKey</actiontype>
1.978 + <actionbody>
1.979 + <derivekey>
1.980 + <kdf>pkcs#12</kdf>
1.981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.982 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.983 + <iterations>2</iterations>
1.984 + <key>FB845F70A4</key>
1.985 + </derivekey>
1.986 + </actionbody>
1.987 +</action>
1.988 +
1.989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.991 +//! @SYMREQ CIT_PREQ1054
1.992 +//! @SYMTestPriority medium
1.993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.995 +<action>
1.996 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.997 + <actiontype>DeriveKey</actiontype>
1.998 + <actionbody>
1.999 + <derivekey>
1.1000 + <kdf>pkcs#12</kdf>
1.1001 + <passwd>0000</passwd>
1.1002 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1003 + <iterations>2</iterations>
1.1004 + <key>B9230EEC1D</key>
1.1005 + </derivekey>
1.1006 + </actionbody>
1.1007 +</action>
1.1008 +
1.1009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1011 +//! @SYMREQ CIT_PREQ1054
1.1012 +//! @SYMTestPriority medium
1.1013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1015 +<action>
1.1016 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1017 + <actiontype>DeriveKey</actiontype>
1.1018 + <actionbody>
1.1019 + <derivekey>
1.1020 + <kdf>pkcs#12</kdf>
1.1021 + <passwd>0001</passwd>
1.1022 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1023 + <iterations>2</iterations>
1.1024 + <key>462B0F2D1B</key>
1.1025 + </derivekey>
1.1026 + </actionbody>
1.1027 +</action>
1.1028 +
1.1029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1031 +//! @SYMREQ CIT_PREQ1054
1.1032 +//! @SYMTestPriority medium
1.1033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1035 +<action>
1.1036 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1037 + <actiontype>DeriveKey</actiontype>
1.1038 + <actionbody>
1.1039 + <derivekey>
1.1040 + <kdf>pkcs#12</kdf>
1.1041 + <passwd>PSWD</passwd>
1.1042 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1043 + <iterations>2</iterations>
1.1044 + <key>05B66EF1BB</key>
1.1045 + </derivekey>
1.1046 + </actionbody>
1.1047 +</action>
1.1048 +
1.1049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1051 +//! @SYMREQ CIT_PREQ1054
1.1052 +//! @SYMTestPriority medium
1.1053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1055 +<action>
1.1056 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1057 + <actiontype>DeriveKey</actiontype>
1.1058 + <actionbody>
1.1059 + <derivekey>
1.1060 + <kdf>pkcs#12</kdf>
1.1061 + <passwd>password</passwd>
1.1062 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1063 + <iterations>2</iterations>
1.1064 + <key>C1B7E77C96</key>
1.1065 + </derivekey>
1.1066 + </actionbody>
1.1067 +</action>
1.1068 +
1.1069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1071 +//! @SYMREQ CIT_PREQ1054
1.1072 +//! @SYMTestPriority medium
1.1073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1075 +<action>
1.1076 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1077 + <actiontype>DeriveKey</actiontype>
1.1078 + <actionbody>
1.1079 + <derivekey>
1.1080 + <kdf>pkcs#12</kdf>
1.1081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1082 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1083 + <iterations>2</iterations>
1.1084 + <key>3DE08CDACF</key>
1.1085 + </derivekey>
1.1086 + </actionbody>
1.1087 +</action>
1.1088 +
1.1089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1091 +//! @SYMREQ CIT_PREQ1054
1.1092 +//! @SYMTestPriority medium
1.1093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1095 +<action>
1.1096 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1097 + <actiontype>DeriveKey</actiontype>
1.1098 + <actionbody>
1.1099 + <derivekey>
1.1100 + <kdf>pkcs#12</kdf>
1.1101 + <passwd>0000</passwd>
1.1102 + <salt>53414C54</salt>
1.1103 + <iterations>4</iterations>
1.1104 + <key>D0158BFC57</key>
1.1105 + </derivekey>
1.1106 + </actionbody>
1.1107 +</action>
1.1108 +
1.1109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1111 +//! @SYMREQ CIT_PREQ1054
1.1112 +//! @SYMTestPriority medium
1.1113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1115 +<action>
1.1116 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1117 + <actiontype>DeriveKey</actiontype>
1.1118 + <actionbody>
1.1119 + <derivekey>
1.1120 + <kdf>pkcs#12</kdf>
1.1121 + <passwd>0001</passwd>
1.1122 + <salt>53414C54</salt>
1.1123 + <iterations>4</iterations>
1.1124 + <key>AEB6CD53F0</key>
1.1125 + </derivekey>
1.1126 + </actionbody>
1.1127 +</action>
1.1128 +
1.1129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1131 +//! @SYMREQ CIT_PREQ1054
1.1132 +//! @SYMTestPriority medium
1.1133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1135 +<action>
1.1136 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1137 + <actiontype>DeriveKey</actiontype>
1.1138 + <actionbody>
1.1139 + <derivekey>
1.1140 + <kdf>pkcs#12</kdf>
1.1141 + <passwd>PSWD</passwd>
1.1142 + <salt>53414C54</salt>
1.1143 + <iterations>4</iterations>
1.1144 + <key>80010C12B6</key>
1.1145 + </derivekey>
1.1146 + </actionbody>
1.1147 +</action>
1.1148 +
1.1149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1151 +//! @SYMREQ CIT_PREQ1054
1.1152 +//! @SYMTestPriority medium
1.1153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1155 +<action>
1.1156 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1157 + <actiontype>DeriveKey</actiontype>
1.1158 + <actionbody>
1.1159 + <derivekey>
1.1160 + <kdf>pkcs#12</kdf>
1.1161 + <passwd>password</passwd>
1.1162 + <salt>53414C54</salt>
1.1163 + <iterations>4</iterations>
1.1164 + <key>497DE34C4C</key>
1.1165 + </derivekey>
1.1166 + </actionbody>
1.1167 +</action>
1.1168 +
1.1169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1171 +//! @SYMREQ CIT_PREQ1054
1.1172 +//! @SYMTestPriority medium
1.1173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1175 +<action>
1.1176 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1177 + <actiontype>DeriveKey</actiontype>
1.1178 + <actionbody>
1.1179 + <derivekey>
1.1180 + <kdf>pkcs#12</kdf>
1.1181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1182 + <salt>53414C54</salt>
1.1183 + <iterations>4</iterations>
1.1184 + <key>146C6A5B58</key>
1.1185 + </derivekey>
1.1186 + </actionbody>
1.1187 +</action>
1.1188 +
1.1189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1191 +//! @SYMREQ CIT_PREQ1054
1.1192 +//! @SYMTestPriority medium
1.1193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1195 +<action>
1.1196 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1197 + <actiontype>DeriveKey</actiontype>
1.1198 + <actionbody>
1.1199 + <derivekey>
1.1200 + <kdf>pkcs#12</kdf>
1.1201 + <passwd>0000</passwd>
1.1202 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1203 + <iterations>4</iterations>
1.1204 + <key>E89772E7A5</key>
1.1205 + </derivekey>
1.1206 + </actionbody>
1.1207 +</action>
1.1208 +
1.1209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1211 +//! @SYMREQ CIT_PREQ1054
1.1212 +//! @SYMTestPriority medium
1.1213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1215 +<action>
1.1216 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1217 + <actiontype>DeriveKey</actiontype>
1.1218 + <actionbody>
1.1219 + <derivekey>
1.1220 + <kdf>pkcs#12</kdf>
1.1221 + <passwd>0001</passwd>
1.1222 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1223 + <iterations>4</iterations>
1.1224 + <key>2393071377</key>
1.1225 + </derivekey>
1.1226 + </actionbody>
1.1227 +</action>
1.1228 +
1.1229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1231 +//! @SYMREQ CIT_PREQ1054
1.1232 +//! @SYMTestPriority medium
1.1233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1235 +<action>
1.1236 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1237 + <actiontype>DeriveKey</actiontype>
1.1238 + <actionbody>
1.1239 + <derivekey>
1.1240 + <kdf>pkcs#12</kdf>
1.1241 + <passwd>PSWD</passwd>
1.1242 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1243 + <iterations>4</iterations>
1.1244 + <key>DF2D961FE3</key>
1.1245 + </derivekey>
1.1246 + </actionbody>
1.1247 +</action>
1.1248 +
1.1249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1251 +//! @SYMREQ CIT_PREQ1054
1.1252 +//! @SYMTestPriority medium
1.1253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1255 +<action>
1.1256 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1257 + <actiontype>DeriveKey</actiontype>
1.1258 + <actionbody>
1.1259 + <derivekey>
1.1260 + <kdf>pkcs#12</kdf>
1.1261 + <passwd>password</passwd>
1.1262 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1263 + <iterations>4</iterations>
1.1264 + <key>363619530B</key>
1.1265 + </derivekey>
1.1266 + </actionbody>
1.1267 +</action>
1.1268 +
1.1269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1271 +//! @SYMREQ CIT_PREQ1054
1.1272 +//! @SYMTestPriority medium
1.1273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1275 +<action>
1.1276 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1277 + <actiontype>DeriveKey</actiontype>
1.1278 + <actionbody>
1.1279 + <derivekey>
1.1280 + <kdf>pkcs#12</kdf>
1.1281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1282 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1283 + <iterations>4</iterations>
1.1284 + <key>B43FA2D22B</key>
1.1285 + </derivekey>
1.1286 + </actionbody>
1.1287 +</action>
1.1288 +
1.1289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1291 +//! @SYMREQ CIT_PREQ1054
1.1292 +//! @SYMTestPriority medium
1.1293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1295 +<action>
1.1296 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1297 + <actiontype>DeriveKey</actiontype>
1.1298 + <actionbody>
1.1299 + <derivekey>
1.1300 + <kdf>pkcs#12</kdf>
1.1301 + <passwd>0000</passwd>
1.1302 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1303 + <iterations>4</iterations>
1.1304 + <key>EF50923D65</key>
1.1305 + </derivekey>
1.1306 + </actionbody>
1.1307 +</action>
1.1308 +
1.1309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1311 +//! @SYMREQ CIT_PREQ1054
1.1312 +//! @SYMTestPriority medium
1.1313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1315 +<action>
1.1316 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1317 + <actiontype>DeriveKey</actiontype>
1.1318 + <actionbody>
1.1319 + <derivekey>
1.1320 + <kdf>pkcs#12</kdf>
1.1321 + <passwd>0001</passwd>
1.1322 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1323 + <iterations>4</iterations>
1.1324 + <key>9A618595C7</key>
1.1325 + </derivekey>
1.1326 + </actionbody>
1.1327 +</action>
1.1328 +
1.1329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1331 +//! @SYMREQ CIT_PREQ1054
1.1332 +//! @SYMTestPriority medium
1.1333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1335 +<action>
1.1336 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1337 + <actiontype>DeriveKey</actiontype>
1.1338 + <actionbody>
1.1339 + <derivekey>
1.1340 + <kdf>pkcs#12</kdf>
1.1341 + <passwd>PSWD</passwd>
1.1342 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1343 + <iterations>4</iterations>
1.1344 + <key>B3B33AA8A6</key>
1.1345 + </derivekey>
1.1346 + </actionbody>
1.1347 +</action>
1.1348 +
1.1349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1351 +//! @SYMREQ CIT_PREQ1054
1.1352 +//! @SYMTestPriority medium
1.1353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1355 +<action>
1.1356 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1357 + <actiontype>DeriveKey</actiontype>
1.1358 + <actionbody>
1.1359 + <derivekey>
1.1360 + <kdf>pkcs#12</kdf>
1.1361 + <passwd>password</passwd>
1.1362 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1363 + <iterations>4</iterations>
1.1364 + <key>C007DC1ADA</key>
1.1365 + </derivekey>
1.1366 + </actionbody>
1.1367 +</action>
1.1368 +
1.1369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1371 +//! @SYMREQ CIT_PREQ1054
1.1372 +//! @SYMTestPriority medium
1.1373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1375 +<action>
1.1376 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1377 + <actiontype>DeriveKey</actiontype>
1.1378 + <actionbody>
1.1379 + <derivekey>
1.1380 + <kdf>pkcs#12</kdf>
1.1381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1382 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1383 + <iterations>4</iterations>
1.1384 + <key>91DF366136</key>
1.1385 + </derivekey>
1.1386 + </actionbody>
1.1387 +</action>
1.1388 +
1.1389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1391 +//! @SYMREQ CIT_PREQ1054
1.1392 +//! @SYMTestPriority medium
1.1393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1395 +<action>
1.1396 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1397 + <actiontype>DeriveKey</actiontype>
1.1398 + <actionbody>
1.1399 + <derivekey>
1.1400 + <kdf>pkcs#12</kdf>
1.1401 + <passwd>0000</passwd>
1.1402 + <salt>53414C54</salt>
1.1403 + <iterations>8</iterations>
1.1404 + <key>9A08D3C4F5</key>
1.1405 + </derivekey>
1.1406 + </actionbody>
1.1407 +</action>
1.1408 +
1.1409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1411 +//! @SYMREQ CIT_PREQ1054
1.1412 +//! @SYMTestPriority medium
1.1413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1415 +<action>
1.1416 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1417 + <actiontype>DeriveKey</actiontype>
1.1418 + <actionbody>
1.1419 + <derivekey>
1.1420 + <kdf>pkcs#12</kdf>
1.1421 + <passwd>0001</passwd>
1.1422 + <salt>53414C54</salt>
1.1423 + <iterations>8</iterations>
1.1424 + <key>33002FA0B6</key>
1.1425 + </derivekey>
1.1426 + </actionbody>
1.1427 +</action>
1.1428 +
1.1429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1431 +//! @SYMREQ CIT_PREQ1054
1.1432 +//! @SYMTestPriority medium
1.1433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1435 +<action>
1.1436 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1437 + <actiontype>DeriveKey</actiontype>
1.1438 + <actionbody>
1.1439 + <derivekey>
1.1440 + <kdf>pkcs#12</kdf>
1.1441 + <passwd>PSWD</passwd>
1.1442 + <salt>53414C54</salt>
1.1443 + <iterations>8</iterations>
1.1444 + <key>22001FA269</key>
1.1445 + </derivekey>
1.1446 + </actionbody>
1.1447 +</action>
1.1448 +
1.1449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1451 +//! @SYMREQ CIT_PREQ1054
1.1452 +//! @SYMTestPriority medium
1.1453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1455 +<action>
1.1456 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1457 + <actiontype>DeriveKey</actiontype>
1.1458 + <actionbody>
1.1459 + <derivekey>
1.1460 + <kdf>pkcs#12</kdf>
1.1461 + <passwd>password</passwd>
1.1462 + <salt>53414C54</salt>
1.1463 + <iterations>8</iterations>
1.1464 + <key>B0935F1122</key>
1.1465 + </derivekey>
1.1466 + </actionbody>
1.1467 +</action>
1.1468 +
1.1469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1471 +//! @SYMREQ CIT_PREQ1054
1.1472 +//! @SYMTestPriority medium
1.1473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1475 +<action>
1.1476 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1477 + <actiontype>DeriveKey</actiontype>
1.1478 + <actionbody>
1.1479 + <derivekey>
1.1480 + <kdf>pkcs#12</kdf>
1.1481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1482 + <salt>53414C54</salt>
1.1483 + <iterations>8</iterations>
1.1484 + <key>6602B1B4BB</key>
1.1485 + </derivekey>
1.1486 + </actionbody>
1.1487 +</action>
1.1488 +
1.1489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1491 +//! @SYMREQ CIT_PREQ1054
1.1492 +//! @SYMTestPriority medium
1.1493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1495 +<action>
1.1496 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1497 + <actiontype>DeriveKey</actiontype>
1.1498 + <actionbody>
1.1499 + <derivekey>
1.1500 + <kdf>pkcs#12</kdf>
1.1501 + <passwd>0000</passwd>
1.1502 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1503 + <iterations>8</iterations>
1.1504 + <key>3A478368DD</key>
1.1505 + </derivekey>
1.1506 + </actionbody>
1.1507 +</action>
1.1508 +
1.1509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1511 +//! @SYMREQ CIT_PREQ1054
1.1512 +//! @SYMTestPriority medium
1.1513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1515 +<action>
1.1516 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1517 + <actiontype>DeriveKey</actiontype>
1.1518 + <actionbody>
1.1519 + <derivekey>
1.1520 + <kdf>pkcs#12</kdf>
1.1521 + <passwd>0001</passwd>
1.1522 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1523 + <iterations>8</iterations>
1.1524 + <key>6473EB1244</key>
1.1525 + </derivekey>
1.1526 + </actionbody>
1.1527 +</action>
1.1528 +
1.1529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1531 +//! @SYMREQ CIT_PREQ1054
1.1532 +//! @SYMTestPriority medium
1.1533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1535 +<action>
1.1536 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1537 + <actiontype>DeriveKey</actiontype>
1.1538 + <actionbody>
1.1539 + <derivekey>
1.1540 + <kdf>pkcs#12</kdf>
1.1541 + <passwd>PSWD</passwd>
1.1542 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1543 + <iterations>8</iterations>
1.1544 + <key>AA762B8736</key>
1.1545 + </derivekey>
1.1546 + </actionbody>
1.1547 +</action>
1.1548 +
1.1549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1551 +//! @SYMREQ CIT_PREQ1054
1.1552 +//! @SYMTestPriority medium
1.1553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1555 +<action>
1.1556 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1557 + <actiontype>DeriveKey</actiontype>
1.1558 + <actionbody>
1.1559 + <derivekey>
1.1560 + <kdf>pkcs#12</kdf>
1.1561 + <passwd>password</passwd>
1.1562 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1563 + <iterations>8</iterations>
1.1564 + <key>F00C5240B0</key>
1.1565 + </derivekey>
1.1566 + </actionbody>
1.1567 +</action>
1.1568 +
1.1569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1571 +//! @SYMREQ CIT_PREQ1054
1.1572 +//! @SYMTestPriority medium
1.1573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1575 +<action>
1.1576 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1577 + <actiontype>DeriveKey</actiontype>
1.1578 + <actionbody>
1.1579 + <derivekey>
1.1580 + <kdf>pkcs#12</kdf>
1.1581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1582 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1583 + <iterations>8</iterations>
1.1584 + <key>935593CA37</key>
1.1585 + </derivekey>
1.1586 + </actionbody>
1.1587 +</action>
1.1588 +
1.1589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1591 +//! @SYMREQ CIT_PREQ1054
1.1592 +//! @SYMTestPriority medium
1.1593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1595 +<action>
1.1596 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1597 + <actiontype>DeriveKey</actiontype>
1.1598 + <actionbody>
1.1599 + <derivekey>
1.1600 + <kdf>pkcs#12</kdf>
1.1601 + <passwd>0000</passwd>
1.1602 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1603 + <iterations>8</iterations>
1.1604 + <key>FCE1F429AE</key>
1.1605 + </derivekey>
1.1606 + </actionbody>
1.1607 +</action>
1.1608 +
1.1609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1611 +//! @SYMREQ CIT_PREQ1054
1.1612 +//! @SYMTestPriority medium
1.1613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1615 +<action>
1.1616 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1617 + <actiontype>DeriveKey</actiontype>
1.1618 + <actionbody>
1.1619 + <derivekey>
1.1620 + <kdf>pkcs#12</kdf>
1.1621 + <passwd>0001</passwd>
1.1622 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1623 + <iterations>8</iterations>
1.1624 + <key>82B4A13659</key>
1.1625 + </derivekey>
1.1626 + </actionbody>
1.1627 +</action>
1.1628 +
1.1629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1631 +//! @SYMREQ CIT_PREQ1054
1.1632 +//! @SYMTestPriority medium
1.1633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1635 +<action>
1.1636 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1637 + <actiontype>DeriveKey</actiontype>
1.1638 + <actionbody>
1.1639 + <derivekey>
1.1640 + <kdf>pkcs#12</kdf>
1.1641 + <passwd>PSWD</passwd>
1.1642 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1643 + <iterations>8</iterations>
1.1644 + <key>45FE091D4D</key>
1.1645 + </derivekey>
1.1646 + </actionbody>
1.1647 +</action>
1.1648 +
1.1649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1651 +//! @SYMREQ CIT_PREQ1054
1.1652 +//! @SYMTestPriority medium
1.1653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1655 +<action>
1.1656 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1657 + <actiontype>DeriveKey</actiontype>
1.1658 + <actionbody>
1.1659 + <derivekey>
1.1660 + <kdf>pkcs#12</kdf>
1.1661 + <passwd>password</passwd>
1.1662 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1663 + <iterations>8</iterations>
1.1664 + <key>5670457314</key>
1.1665 + </derivekey>
1.1666 + </actionbody>
1.1667 +</action>
1.1668 +
1.1669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1671 +//! @SYMREQ CIT_PREQ1054
1.1672 +//! @SYMTestPriority medium
1.1673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1675 +<action>
1.1676 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1677 + <actiontype>DeriveKey</actiontype>
1.1678 + <actionbody>
1.1679 + <derivekey>
1.1680 + <kdf>pkcs#12</kdf>
1.1681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1682 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1683 + <iterations>8</iterations>
1.1684 + <key>1C4CAE2514</key>
1.1685 + </derivekey>
1.1686 + </actionbody>
1.1687 +</action>
1.1688 +
1.1689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1691 +//! @SYMREQ CIT_PREQ1054
1.1692 +//! @SYMTestPriority medium
1.1693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1695 +<action>
1.1696 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1697 + <actiontype>DeriveKey</actiontype>
1.1698 + <actionbody>
1.1699 + <derivekey>
1.1700 + <kdf>pkcs#12</kdf>
1.1701 + <passwd>0000</passwd>
1.1702 + <salt>53414C54</salt>
1.1703 + <iterations>128</iterations>
1.1704 + <key>8B4B3CBFB0</key>
1.1705 + </derivekey>
1.1706 + </actionbody>
1.1707 +</action>
1.1708 +
1.1709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1711 +//! @SYMREQ CIT_PREQ1054
1.1712 +//! @SYMTestPriority medium
1.1713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1715 +<action>
1.1716 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1717 + <actiontype>DeriveKey</actiontype>
1.1718 + <actionbody>
1.1719 + <derivekey>
1.1720 + <kdf>pkcs#12</kdf>
1.1721 + <passwd>0001</passwd>
1.1722 + <salt>53414C54</salt>
1.1723 + <iterations>128</iterations>
1.1724 + <key>C89C3A2C9C</key>
1.1725 + </derivekey>
1.1726 + </actionbody>
1.1727 +</action>
1.1728 +
1.1729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1731 +//! @SYMREQ CIT_PREQ1054
1.1732 +//! @SYMTestPriority medium
1.1733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1735 +<action>
1.1736 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1737 + <actiontype>DeriveKey</actiontype>
1.1738 + <actionbody>
1.1739 + <derivekey>
1.1740 + <kdf>pkcs#12</kdf>
1.1741 + <passwd>PSWD</passwd>
1.1742 + <salt>53414C54</salt>
1.1743 + <iterations>128</iterations>
1.1744 + <key>8109F97073</key>
1.1745 + </derivekey>
1.1746 + </actionbody>
1.1747 +</action>
1.1748 +
1.1749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1751 +//! @SYMREQ CIT_PREQ1054
1.1752 +//! @SYMTestPriority medium
1.1753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1755 +<action>
1.1756 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1757 + <actiontype>DeriveKey</actiontype>
1.1758 + <actionbody>
1.1759 + <derivekey>
1.1760 + <kdf>pkcs#12</kdf>
1.1761 + <passwd>password</passwd>
1.1762 + <salt>53414C54</salt>
1.1763 + <iterations>128</iterations>
1.1764 + <key>55E985CC15</key>
1.1765 + </derivekey>
1.1766 + </actionbody>
1.1767 +</action>
1.1768 +
1.1769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1771 +//! @SYMREQ CIT_PREQ1054
1.1772 +//! @SYMTestPriority medium
1.1773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1775 +<action>
1.1776 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1777 + <actiontype>DeriveKey</actiontype>
1.1778 + <actionbody>
1.1779 + <derivekey>
1.1780 + <kdf>pkcs#12</kdf>
1.1781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1782 + <salt>53414C54</salt>
1.1783 + <iterations>128</iterations>
1.1784 + <key>2802AA97D4</key>
1.1785 + </derivekey>
1.1786 + </actionbody>
1.1787 +</action>
1.1788 +
1.1789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1791 +//! @SYMREQ CIT_PREQ1054
1.1792 +//! @SYMTestPriority medium
1.1793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1795 +<action>
1.1796 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1797 + <actiontype>DeriveKey</actiontype>
1.1798 + <actionbody>
1.1799 + <derivekey>
1.1800 + <kdf>pkcs#12</kdf>
1.1801 + <passwd>0000</passwd>
1.1802 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1803 + <iterations>128</iterations>
1.1804 + <key>881509A34D</key>
1.1805 + </derivekey>
1.1806 + </actionbody>
1.1807 +</action>
1.1808 +
1.1809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1811 +//! @SYMREQ CIT_PREQ1054
1.1812 +//! @SYMTestPriority medium
1.1813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1815 +<action>
1.1816 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1817 + <actiontype>DeriveKey</actiontype>
1.1818 + <actionbody>
1.1819 + <derivekey>
1.1820 + <kdf>pkcs#12</kdf>
1.1821 + <passwd>0001</passwd>
1.1822 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1823 + <iterations>128</iterations>
1.1824 + <key>B2918BC593</key>
1.1825 + </derivekey>
1.1826 + </actionbody>
1.1827 +</action>
1.1828 +
1.1829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1831 +//! @SYMREQ CIT_PREQ1054
1.1832 +//! @SYMTestPriority medium
1.1833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1835 +<action>
1.1836 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1837 + <actiontype>DeriveKey</actiontype>
1.1838 + <actionbody>
1.1839 + <derivekey>
1.1840 + <kdf>pkcs#12</kdf>
1.1841 + <passwd>PSWD</passwd>
1.1842 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1843 + <iterations>128</iterations>
1.1844 + <key>0FE0529B45</key>
1.1845 + </derivekey>
1.1846 + </actionbody>
1.1847 +</action>
1.1848 +
1.1849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1851 +//! @SYMREQ CIT_PREQ1054
1.1852 +//! @SYMTestPriority medium
1.1853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1855 +<action>
1.1856 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1857 + <actiontype>DeriveKey</actiontype>
1.1858 + <actionbody>
1.1859 + <derivekey>
1.1860 + <kdf>pkcs#12</kdf>
1.1861 + <passwd>password</passwd>
1.1862 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1863 + <iterations>128</iterations>
1.1864 + <key>1FF923C4B1</key>
1.1865 + </derivekey>
1.1866 + </actionbody>
1.1867 +</action>
1.1868 +
1.1869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1871 +//! @SYMREQ CIT_PREQ1054
1.1872 +//! @SYMTestPriority medium
1.1873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1875 +<action>
1.1876 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.1877 + <actiontype>DeriveKey</actiontype>
1.1878 + <actionbody>
1.1879 + <derivekey>
1.1880 + <kdf>pkcs#12</kdf>
1.1881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1882 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.1883 + <iterations>128</iterations>
1.1884 + <key>05D1E56D04</key>
1.1885 + </derivekey>
1.1886 + </actionbody>
1.1887 +</action>
1.1888 +
1.1889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1891 +//! @SYMREQ CIT_PREQ1054
1.1892 +//! @SYMTestPriority medium
1.1893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1895 +<action>
1.1896 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1897 + <actiontype>DeriveKey</actiontype>
1.1898 + <actionbody>
1.1899 + <derivekey>
1.1900 + <kdf>pkcs#12</kdf>
1.1901 + <passwd>0000</passwd>
1.1902 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1903 + <iterations>128</iterations>
1.1904 + <key>99FE149183</key>
1.1905 + </derivekey>
1.1906 + </actionbody>
1.1907 +</action>
1.1908 +
1.1909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1911 +//! @SYMREQ CIT_PREQ1054
1.1912 +//! @SYMTestPriority medium
1.1913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1915 +<action>
1.1916 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1917 + <actiontype>DeriveKey</actiontype>
1.1918 + <actionbody>
1.1919 + <derivekey>
1.1920 + <kdf>pkcs#12</kdf>
1.1921 + <passwd>0001</passwd>
1.1922 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1923 + <iterations>128</iterations>
1.1924 + <key>79E29F3FCB</key>
1.1925 + </derivekey>
1.1926 + </actionbody>
1.1927 +</action>
1.1928 +
1.1929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1931 +//! @SYMREQ CIT_PREQ1054
1.1932 +//! @SYMTestPriority medium
1.1933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1935 +<action>
1.1936 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1937 + <actiontype>DeriveKey</actiontype>
1.1938 + <actionbody>
1.1939 + <derivekey>
1.1940 + <kdf>pkcs#12</kdf>
1.1941 + <passwd>PSWD</passwd>
1.1942 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1943 + <iterations>128</iterations>
1.1944 + <key>22A70A8657</key>
1.1945 + </derivekey>
1.1946 + </actionbody>
1.1947 +</action>
1.1948 +
1.1949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1951 +//! @SYMREQ CIT_PREQ1054
1.1952 +//! @SYMTestPriority medium
1.1953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1955 +<action>
1.1956 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1957 + <actiontype>DeriveKey</actiontype>
1.1958 + <actionbody>
1.1959 + <derivekey>
1.1960 + <kdf>pkcs#12</kdf>
1.1961 + <passwd>password</passwd>
1.1962 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1963 + <iterations>128</iterations>
1.1964 + <key>9CBA922190</key>
1.1965 + </derivekey>
1.1966 + </actionbody>
1.1967 +</action>
1.1968 +
1.1969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1971 +//! @SYMREQ CIT_PREQ1054
1.1972 +//! @SYMTestPriority medium
1.1973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1975 +<action>
1.1976 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.1977 + <actiontype>DeriveKey</actiontype>
1.1978 + <actionbody>
1.1979 + <derivekey>
1.1980 + <kdf>pkcs#12</kdf>
1.1981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.1982 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.1983 + <iterations>128</iterations>
1.1984 + <key>A037A8B1C2</key>
1.1985 + </derivekey>
1.1986 + </actionbody>
1.1987 +</action>
1.1988 +
1.1989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.1990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.1991 +//! @SYMREQ CIT_PREQ1054
1.1992 +//! @SYMTestPriority medium
1.1993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.1994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.1995 +<action>
1.1996 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.1997 + <actiontype>DeriveKey</actiontype>
1.1998 + <actionbody>
1.1999 + <derivekey>
1.2000 + <kdf>pkcs#12</kdf>
1.2001 + <passwd>0000</passwd>
1.2002 + <salt>53414C54</salt>
1.2003 + <iterations>1024</iterations>
1.2004 + <key>82824BE51C</key>
1.2005 + </derivekey>
1.2006 + </actionbody>
1.2007 +</action>
1.2008 +
1.2009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2011 +//! @SYMREQ CIT_PREQ1054
1.2012 +//! @SYMTestPriority medium
1.2013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2015 +<action>
1.2016 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2017 + <actiontype>DeriveKey</actiontype>
1.2018 + <actionbody>
1.2019 + <derivekey>
1.2020 + <kdf>pkcs#12</kdf>
1.2021 + <passwd>0001</passwd>
1.2022 + <salt>53414C54</salt>
1.2023 + <iterations>1024</iterations>
1.2024 + <key>E166049AC4</key>
1.2025 + </derivekey>
1.2026 + </actionbody>
1.2027 +</action>
1.2028 +
1.2029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2031 +//! @SYMREQ CIT_PREQ1054
1.2032 +//! @SYMTestPriority medium
1.2033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2035 +<action>
1.2036 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2037 + <actiontype>DeriveKey</actiontype>
1.2038 + <actionbody>
1.2039 + <derivekey>
1.2040 + <kdf>pkcs#12</kdf>
1.2041 + <passwd>PSWD</passwd>
1.2042 + <salt>53414C54</salt>
1.2043 + <iterations>1024</iterations>
1.2044 + <key>90E975CC54</key>
1.2045 + </derivekey>
1.2046 + </actionbody>
1.2047 +</action>
1.2048 +
1.2049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2051 +//! @SYMREQ CIT_PREQ1054
1.2052 +//! @SYMTestPriority medium
1.2053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2055 +<action>
1.2056 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2057 + <actiontype>DeriveKey</actiontype>
1.2058 + <actionbody>
1.2059 + <derivekey>
1.2060 + <kdf>pkcs#12</kdf>
1.2061 + <passwd>password</passwd>
1.2062 + <salt>53414C54</salt>
1.2063 + <iterations>1024</iterations>
1.2064 + <key>1FFD40D7BB</key>
1.2065 + </derivekey>
1.2066 + </actionbody>
1.2067 +</action>
1.2068 +
1.2069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2071 +//! @SYMREQ CIT_PREQ1054
1.2072 +//! @SYMTestPriority medium
1.2073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2075 +<action>
1.2076 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2077 + <actiontype>DeriveKey</actiontype>
1.2078 + <actionbody>
1.2079 + <derivekey>
1.2080 + <kdf>pkcs#12</kdf>
1.2081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2082 + <salt>53414C54</salt>
1.2083 + <iterations>1024</iterations>
1.2084 + <key>406C92305A</key>
1.2085 + </derivekey>
1.2086 + </actionbody>
1.2087 +</action>
1.2088 +
1.2089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2091 +//! @SYMREQ CIT_PREQ1054
1.2092 +//! @SYMTestPriority medium
1.2093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2095 +<action>
1.2096 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2097 + <actiontype>DeriveKey</actiontype>
1.2098 + <actionbody>
1.2099 + <derivekey>
1.2100 + <kdf>pkcs#12</kdf>
1.2101 + <passwd>0000</passwd>
1.2102 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2103 + <iterations>1024</iterations>
1.2104 + <key>E82BD75AA9</key>
1.2105 + </derivekey>
1.2106 + </actionbody>
1.2107 +</action>
1.2108 +
1.2109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2111 +//! @SYMREQ CIT_PREQ1054
1.2112 +//! @SYMTestPriority medium
1.2113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2115 +<action>
1.2116 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2117 + <actiontype>DeriveKey</actiontype>
1.2118 + <actionbody>
1.2119 + <derivekey>
1.2120 + <kdf>pkcs#12</kdf>
1.2121 + <passwd>0001</passwd>
1.2122 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2123 + <iterations>1024</iterations>
1.2124 + <key>0182E41FCA</key>
1.2125 + </derivekey>
1.2126 + </actionbody>
1.2127 +</action>
1.2128 +
1.2129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2131 +//! @SYMREQ CIT_PREQ1054
1.2132 +//! @SYMTestPriority medium
1.2133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2135 +<action>
1.2136 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2137 + <actiontype>DeriveKey</actiontype>
1.2138 + <actionbody>
1.2139 + <derivekey>
1.2140 + <kdf>pkcs#12</kdf>
1.2141 + <passwd>PSWD</passwd>
1.2142 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2143 + <iterations>1024</iterations>
1.2144 + <key>101FB77598</key>
1.2145 + </derivekey>
1.2146 + </actionbody>
1.2147 +</action>
1.2148 +
1.2149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2151 +//! @SYMREQ CIT_PREQ1054
1.2152 +//! @SYMTestPriority medium
1.2153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2155 +<action>
1.2156 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2157 + <actiontype>DeriveKey</actiontype>
1.2158 + <actionbody>
1.2159 + <derivekey>
1.2160 + <kdf>pkcs#12</kdf>
1.2161 + <passwd>password</passwd>
1.2162 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2163 + <iterations>1024</iterations>
1.2164 + <key>D7499C6A12</key>
1.2165 + </derivekey>
1.2166 + </actionbody>
1.2167 +</action>
1.2168 +
1.2169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2171 +//! @SYMREQ CIT_PREQ1054
1.2172 +//! @SYMTestPriority medium
1.2173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2175 +<action>
1.2176 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2177 + <actiontype>DeriveKey</actiontype>
1.2178 + <actionbody>
1.2179 + <derivekey>
1.2180 + <kdf>pkcs#12</kdf>
1.2181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2182 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2183 + <iterations>1024</iterations>
1.2184 + <key>2C6222B8E2</key>
1.2185 + </derivekey>
1.2186 + </actionbody>
1.2187 +</action>
1.2188 +
1.2189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2191 +//! @SYMREQ CIT_PREQ1054
1.2192 +//! @SYMTestPriority medium
1.2193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2195 +<action>
1.2196 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2197 + <actiontype>DeriveKey</actiontype>
1.2198 + <actionbody>
1.2199 + <derivekey>
1.2200 + <kdf>pkcs#12</kdf>
1.2201 + <passwd>0000</passwd>
1.2202 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2203 + <iterations>1024</iterations>
1.2204 + <key>6789F0680A</key>
1.2205 + </derivekey>
1.2206 + </actionbody>
1.2207 +</action>
1.2208 +
1.2209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2211 +//! @SYMREQ CIT_PREQ1054
1.2212 +//! @SYMTestPriority medium
1.2213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2215 +<action>
1.2216 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2217 + <actiontype>DeriveKey</actiontype>
1.2218 + <actionbody>
1.2219 + <derivekey>
1.2220 + <kdf>pkcs#12</kdf>
1.2221 + <passwd>0001</passwd>
1.2222 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2223 + <iterations>1024</iterations>
1.2224 + <key>43E6637258</key>
1.2225 + </derivekey>
1.2226 + </actionbody>
1.2227 +</action>
1.2228 +
1.2229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2231 +//! @SYMREQ CIT_PREQ1054
1.2232 +//! @SYMTestPriority medium
1.2233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2235 +<action>
1.2236 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2237 + <actiontype>DeriveKey</actiontype>
1.2238 + <actionbody>
1.2239 + <derivekey>
1.2240 + <kdf>pkcs#12</kdf>
1.2241 + <passwd>PSWD</passwd>
1.2242 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2243 + <iterations>1024</iterations>
1.2244 + <key>8B3308BDD5</key>
1.2245 + </derivekey>
1.2246 + </actionbody>
1.2247 +</action>
1.2248 +
1.2249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2251 +//! @SYMREQ CIT_PREQ1054
1.2252 +//! @SYMTestPriority medium
1.2253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2255 +<action>
1.2256 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2257 + <actiontype>DeriveKey</actiontype>
1.2258 + <actionbody>
1.2259 + <derivekey>
1.2260 + <kdf>pkcs#12</kdf>
1.2261 + <passwd>password</passwd>
1.2262 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2263 + <iterations>1024</iterations>
1.2264 + <key>CA202602C9</key>
1.2265 + </derivekey>
1.2266 + </actionbody>
1.2267 +</action>
1.2268 +
1.2269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2271 +//! @SYMREQ CIT_PREQ1054
1.2272 +//! @SYMTestPriority medium
1.2273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2275 +<action>
1.2276 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2277 + <actiontype>DeriveKey</actiontype>
1.2278 + <actionbody>
1.2279 + <derivekey>
1.2280 + <kdf>pkcs#12</kdf>
1.2281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2282 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2283 + <iterations>1024</iterations>
1.2284 + <key>F6A33ADA6A</key>
1.2285 + </derivekey>
1.2286 + </actionbody>
1.2287 +</action>
1.2288 +
1.2289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2291 +//! @SYMREQ CIT_PREQ1054
1.2292 +//! @SYMTestPriority medium
1.2293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2295 +<action>
1.2296 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2297 + <actiontype>DeriveKey</actiontype>
1.2298 + <actionbody>
1.2299 + <derivekey>
1.2300 + <kdf>pkcs#12</kdf>
1.2301 + <passwd>0000</passwd>
1.2302 + <salt>53414C54</salt>
1.2303 + <iterations>1536</iterations>
1.2304 + <key>79A4E1398F</key>
1.2305 + </derivekey>
1.2306 + </actionbody>
1.2307 +</action>
1.2308 +
1.2309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2311 +//! @SYMREQ CIT_PREQ1054
1.2312 +//! @SYMTestPriority medium
1.2313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2315 +<action>
1.2316 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2317 + <actiontype>DeriveKey</actiontype>
1.2318 + <actionbody>
1.2319 + <derivekey>
1.2320 + <kdf>pkcs#12</kdf>
1.2321 + <passwd>0001</passwd>
1.2322 + <salt>53414C54</salt>
1.2323 + <iterations>1536</iterations>
1.2324 + <key>6F2402CCE4</key>
1.2325 + </derivekey>
1.2326 + </actionbody>
1.2327 +</action>
1.2328 +
1.2329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2331 +//! @SYMREQ CIT_PREQ1054
1.2332 +//! @SYMTestPriority medium
1.2333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2335 +<action>
1.2336 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2337 + <actiontype>DeriveKey</actiontype>
1.2338 + <actionbody>
1.2339 + <derivekey>
1.2340 + <kdf>pkcs#12</kdf>
1.2341 + <passwd>PSWD</passwd>
1.2342 + <salt>53414C54</salt>
1.2343 + <iterations>1536</iterations>
1.2344 + <key>B9ED7B3135</key>
1.2345 + </derivekey>
1.2346 + </actionbody>
1.2347 +</action>
1.2348 +
1.2349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2351 +//! @SYMREQ CIT_PREQ1054
1.2352 +//! @SYMTestPriority medium
1.2353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2355 +<action>
1.2356 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2357 + <actiontype>DeriveKey</actiontype>
1.2358 + <actionbody>
1.2359 + <derivekey>
1.2360 + <kdf>pkcs#12</kdf>
1.2361 + <passwd>password</passwd>
1.2362 + <salt>53414C54</salt>
1.2363 + <iterations>1536</iterations>
1.2364 + <key>65B27A78C7</key>
1.2365 + </derivekey>
1.2366 + </actionbody>
1.2367 +</action>
1.2368 +
1.2369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2371 +//! @SYMREQ CIT_PREQ1054
1.2372 +//! @SYMTestPriority medium
1.2373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2375 +<action>
1.2376 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2377 + <actiontype>DeriveKey</actiontype>
1.2378 + <actionbody>
1.2379 + <derivekey>
1.2380 + <kdf>pkcs#12</kdf>
1.2381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2382 + <salt>53414C54</salt>
1.2383 + <iterations>1536</iterations>
1.2384 + <key>8F8FC96A3D</key>
1.2385 + </derivekey>
1.2386 + </actionbody>
1.2387 +</action>
1.2388 +
1.2389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2391 +//! @SYMREQ CIT_PREQ1054
1.2392 +//! @SYMTestPriority medium
1.2393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2395 +<action>
1.2396 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2397 + <actiontype>DeriveKey</actiontype>
1.2398 + <actionbody>
1.2399 + <derivekey>
1.2400 + <kdf>pkcs#12</kdf>
1.2401 + <passwd>0000</passwd>
1.2402 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2403 + <iterations>1536</iterations>
1.2404 + <key>642DDC3F4E</key>
1.2405 + </derivekey>
1.2406 + </actionbody>
1.2407 +</action>
1.2408 +
1.2409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2411 +//! @SYMREQ CIT_PREQ1054
1.2412 +//! @SYMTestPriority medium
1.2413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2415 +<action>
1.2416 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2417 + <actiontype>DeriveKey</actiontype>
1.2418 + <actionbody>
1.2419 + <derivekey>
1.2420 + <kdf>pkcs#12</kdf>
1.2421 + <passwd>0001</passwd>
1.2422 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2423 + <iterations>1536</iterations>
1.2424 + <key>0FE4BDC100</key>
1.2425 + </derivekey>
1.2426 + </actionbody>
1.2427 +</action>
1.2428 +
1.2429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2431 +//! @SYMREQ CIT_PREQ1054
1.2432 +//! @SYMTestPriority medium
1.2433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2435 +<action>
1.2436 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2437 + <actiontype>DeriveKey</actiontype>
1.2438 + <actionbody>
1.2439 + <derivekey>
1.2440 + <kdf>pkcs#12</kdf>
1.2441 + <passwd>PSWD</passwd>
1.2442 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2443 + <iterations>1536</iterations>
1.2444 + <key>32D7F10C5E</key>
1.2445 + </derivekey>
1.2446 + </actionbody>
1.2447 +</action>
1.2448 +
1.2449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2451 +//! @SYMREQ CIT_PREQ1054
1.2452 +//! @SYMTestPriority medium
1.2453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2455 +<action>
1.2456 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2457 + <actiontype>DeriveKey</actiontype>
1.2458 + <actionbody>
1.2459 + <derivekey>
1.2460 + <kdf>pkcs#12</kdf>
1.2461 + <passwd>password</passwd>
1.2462 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2463 + <iterations>1536</iterations>
1.2464 + <key>C05FE26245</key>
1.2465 + </derivekey>
1.2466 + </actionbody>
1.2467 +</action>
1.2468 +
1.2469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2471 +//! @SYMREQ CIT_PREQ1054
1.2472 +//! @SYMTestPriority medium
1.2473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2475 +<action>
1.2476 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2477 + <actiontype>DeriveKey</actiontype>
1.2478 + <actionbody>
1.2479 + <derivekey>
1.2480 + <kdf>pkcs#12</kdf>
1.2481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2482 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2483 + <iterations>1536</iterations>
1.2484 + <key>818C967A8F</key>
1.2485 + </derivekey>
1.2486 + </actionbody>
1.2487 +</action>
1.2488 +
1.2489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2491 +//! @SYMREQ CIT_PREQ1054
1.2492 +//! @SYMTestPriority medium
1.2493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2495 +<action>
1.2496 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2497 + <actiontype>DeriveKey</actiontype>
1.2498 + <actionbody>
1.2499 + <derivekey>
1.2500 + <kdf>pkcs#12</kdf>
1.2501 + <passwd>0000</passwd>
1.2502 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2503 + <iterations>1536</iterations>
1.2504 + <key>5301B5B2A1</key>
1.2505 + </derivekey>
1.2506 + </actionbody>
1.2507 +</action>
1.2508 +
1.2509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2511 +//! @SYMREQ CIT_PREQ1054
1.2512 +//! @SYMTestPriority medium
1.2513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2515 +<action>
1.2516 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2517 + <actiontype>DeriveKey</actiontype>
1.2518 + <actionbody>
1.2519 + <derivekey>
1.2520 + <kdf>pkcs#12</kdf>
1.2521 + <passwd>0001</passwd>
1.2522 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2523 + <iterations>1536</iterations>
1.2524 + <key>9CB5BD2394</key>
1.2525 + </derivekey>
1.2526 + </actionbody>
1.2527 +</action>
1.2528 +
1.2529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2531 +//! @SYMREQ CIT_PREQ1054
1.2532 +//! @SYMTestPriority medium
1.2533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2535 +<action>
1.2536 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2537 + <actiontype>DeriveKey</actiontype>
1.2538 + <actionbody>
1.2539 + <derivekey>
1.2540 + <kdf>pkcs#12</kdf>
1.2541 + <passwd>PSWD</passwd>
1.2542 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2543 + <iterations>1536</iterations>
1.2544 + <key>EB90D956B3</key>
1.2545 + </derivekey>
1.2546 + </actionbody>
1.2547 +</action>
1.2548 +
1.2549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2551 +//! @SYMREQ CIT_PREQ1054
1.2552 +//! @SYMTestPriority medium
1.2553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2555 +<action>
1.2556 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2557 + <actiontype>DeriveKey</actiontype>
1.2558 + <actionbody>
1.2559 + <derivekey>
1.2560 + <kdf>pkcs#12</kdf>
1.2561 + <passwd>password</passwd>
1.2562 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2563 + <iterations>1536</iterations>
1.2564 + <key>ACAFB5EB24</key>
1.2565 + </derivekey>
1.2566 + </actionbody>
1.2567 +</action>
1.2568 +
1.2569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2571 +//! @SYMREQ CIT_PREQ1054
1.2572 +//! @SYMTestPriority medium
1.2573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2575 +<action>
1.2576 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2577 + <actiontype>DeriveKey</actiontype>
1.2578 + <actionbody>
1.2579 + <derivekey>
1.2580 + <kdf>pkcs#12</kdf>
1.2581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2582 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2583 + <iterations>1536</iterations>
1.2584 + <key>A7B0859D9D</key>
1.2585 + </derivekey>
1.2586 + </actionbody>
1.2587 +</action>
1.2588 +
1.2589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2591 +//! @SYMREQ CIT_PREQ1054
1.2592 +//! @SYMTestPriority medium
1.2593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2595 +<action>
1.2596 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2597 + <actiontype>DeriveKey</actiontype>
1.2598 + <actionbody>
1.2599 + <derivekey>
1.2600 + <kdf>pkcs#12</kdf>
1.2601 + <passwd>0000</passwd>
1.2602 + <salt>53414C54</salt>
1.2603 + <iterations>2048</iterations>
1.2604 + <key>B0F0F2EB44</key>
1.2605 + </derivekey>
1.2606 + </actionbody>
1.2607 +</action>
1.2608 +
1.2609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2611 +//! @SYMREQ CIT_PREQ1054
1.2612 +//! @SYMTestPriority medium
1.2613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2615 +<action>
1.2616 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2617 + <actiontype>DeriveKey</actiontype>
1.2618 + <actionbody>
1.2619 + <derivekey>
1.2620 + <kdf>pkcs#12</kdf>
1.2621 + <passwd>0001</passwd>
1.2622 + <salt>53414C54</salt>
1.2623 + <iterations>2048</iterations>
1.2624 + <key>C11C0499CC</key>
1.2625 + </derivekey>
1.2626 + </actionbody>
1.2627 +</action>
1.2628 +
1.2629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2631 +//! @SYMREQ CIT_PREQ1054
1.2632 +//! @SYMTestPriority medium
1.2633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2635 +<action>
1.2636 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2637 + <actiontype>DeriveKey</actiontype>
1.2638 + <actionbody>
1.2639 + <derivekey>
1.2640 + <kdf>pkcs#12</kdf>
1.2641 + <passwd>PSWD</passwd>
1.2642 + <salt>53414C54</salt>
1.2643 + <iterations>2048</iterations>
1.2644 + <key>3F63500AC4</key>
1.2645 + </derivekey>
1.2646 + </actionbody>
1.2647 +</action>
1.2648 +
1.2649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2651 +//! @SYMREQ CIT_PREQ1054
1.2652 +//! @SYMTestPriority medium
1.2653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2655 +<action>
1.2656 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2657 + <actiontype>DeriveKey</actiontype>
1.2658 + <actionbody>
1.2659 + <derivekey>
1.2660 + <kdf>pkcs#12</kdf>
1.2661 + <passwd>password</passwd>
1.2662 + <salt>53414C54</salt>
1.2663 + <iterations>2048</iterations>
1.2664 + <key>B47F802F12</key>
1.2665 + </derivekey>
1.2666 + </actionbody>
1.2667 +</action>
1.2668 +
1.2669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2671 +//! @SYMREQ CIT_PREQ1054
1.2672 +//! @SYMTestPriority medium
1.2673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2675 +<action>
1.2676 + <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
1.2677 + <actiontype>DeriveKey</actiontype>
1.2678 + <actionbody>
1.2679 + <derivekey>
1.2680 + <kdf>pkcs#12</kdf>
1.2681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2682 + <salt>53414C54</salt>
1.2683 + <iterations>2048</iterations>
1.2684 + <key>3099237692</key>
1.2685 + </derivekey>
1.2686 + </actionbody>
1.2687 +</action>
1.2688 +
1.2689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2691 +//! @SYMREQ CIT_PREQ1054
1.2692 +//! @SYMTestPriority medium
1.2693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2695 +<action>
1.2696 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2697 + <actiontype>DeriveKey</actiontype>
1.2698 + <actionbody>
1.2699 + <derivekey>
1.2700 + <kdf>pkcs#12</kdf>
1.2701 + <passwd>0000</passwd>
1.2702 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2703 + <iterations>2048</iterations>
1.2704 + <key>CD04522946</key>
1.2705 + </derivekey>
1.2706 + </actionbody>
1.2707 +</action>
1.2708 +
1.2709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2711 +//! @SYMREQ CIT_PREQ1054
1.2712 +//! @SYMTestPriority medium
1.2713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2715 +<action>
1.2716 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2717 + <actiontype>DeriveKey</actiontype>
1.2718 + <actionbody>
1.2719 + <derivekey>
1.2720 + <kdf>pkcs#12</kdf>
1.2721 + <passwd>0001</passwd>
1.2722 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2723 + <iterations>2048</iterations>
1.2724 + <key>D85432F8AC</key>
1.2725 + </derivekey>
1.2726 + </actionbody>
1.2727 +</action>
1.2728 +
1.2729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2731 +//! @SYMREQ CIT_PREQ1054
1.2732 +//! @SYMTestPriority medium
1.2733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2735 +<action>
1.2736 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2737 + <actiontype>DeriveKey</actiontype>
1.2738 + <actionbody>
1.2739 + <derivekey>
1.2740 + <kdf>pkcs#12</kdf>
1.2741 + <passwd>PSWD</passwd>
1.2742 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2743 + <iterations>2048</iterations>
1.2744 + <key>C77FDE2E52</key>
1.2745 + </derivekey>
1.2746 + </actionbody>
1.2747 +</action>
1.2748 +
1.2749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2751 +//! @SYMREQ CIT_PREQ1054
1.2752 +//! @SYMTestPriority medium
1.2753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2755 +<action>
1.2756 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2757 + <actiontype>DeriveKey</actiontype>
1.2758 + <actionbody>
1.2759 + <derivekey>
1.2760 + <kdf>pkcs#12</kdf>
1.2761 + <passwd>password</passwd>
1.2762 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2763 + <iterations>2048</iterations>
1.2764 + <key>62E06B8A26</key>
1.2765 + </derivekey>
1.2766 + </actionbody>
1.2767 +</action>
1.2768 +
1.2769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2771 +//! @SYMREQ CIT_PREQ1054
1.2772 +//! @SYMTestPriority medium
1.2773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2775 +<action>
1.2776 + <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
1.2777 + <actiontype>DeriveKey</actiontype>
1.2778 + <actionbody>
1.2779 + <derivekey>
1.2780 + <kdf>pkcs#12</kdf>
1.2781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2782 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.2783 + <iterations>2048</iterations>
1.2784 + <key>A5B348EB49</key>
1.2785 + </derivekey>
1.2786 + </actionbody>
1.2787 +</action>
1.2788 +
1.2789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2791 +//! @SYMREQ CIT_PREQ1054
1.2792 +//! @SYMTestPriority medium
1.2793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2795 +<action>
1.2796 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2797 + <actiontype>DeriveKey</actiontype>
1.2798 + <actionbody>
1.2799 + <derivekey>
1.2800 + <kdf>pkcs#12</kdf>
1.2801 + <passwd>0000</passwd>
1.2802 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2803 + <iterations>2048</iterations>
1.2804 + <key>2A824C1B6B</key>
1.2805 + </derivekey>
1.2806 + </actionbody>
1.2807 +</action>
1.2808 +
1.2809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2811 +//! @SYMREQ CIT_PREQ1054
1.2812 +//! @SYMTestPriority medium
1.2813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2815 +<action>
1.2816 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2817 + <actiontype>DeriveKey</actiontype>
1.2818 + <actionbody>
1.2819 + <derivekey>
1.2820 + <kdf>pkcs#12</kdf>
1.2821 + <passwd>0001</passwd>
1.2822 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2823 + <iterations>2048</iterations>
1.2824 + <key>4B8D18B96E</key>
1.2825 + </derivekey>
1.2826 + </actionbody>
1.2827 +</action>
1.2828 +
1.2829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2831 +//! @SYMREQ CIT_PREQ1054
1.2832 +//! @SYMTestPriority medium
1.2833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2835 +<action>
1.2836 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2837 + <actiontype>DeriveKey</actiontype>
1.2838 + <actionbody>
1.2839 + <derivekey>
1.2840 + <kdf>pkcs#12</kdf>
1.2841 + <passwd>PSWD</passwd>
1.2842 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2843 + <iterations>2048</iterations>
1.2844 + <key>9DABF586AD</key>
1.2845 + </derivekey>
1.2846 + </actionbody>
1.2847 +</action>
1.2848 +
1.2849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2851 +//! @SYMREQ CIT_PREQ1054
1.2852 +//! @SYMTestPriority medium
1.2853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2855 +<action>
1.2856 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2857 + <actiontype>DeriveKey</actiontype>
1.2858 + <actionbody>
1.2859 + <derivekey>
1.2860 + <kdf>pkcs#12</kdf>
1.2861 + <passwd>password</passwd>
1.2862 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2863 + <iterations>2048</iterations>
1.2864 + <key>F734BE1BF9</key>
1.2865 + </derivekey>
1.2866 + </actionbody>
1.2867 +</action>
1.2868 +
1.2869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2871 +//! @SYMREQ CIT_PREQ1054
1.2872 +//! @SYMTestPriority medium
1.2873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2875 +<action>
1.2876 + <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
1.2877 + <actiontype>DeriveKey</actiontype>
1.2878 + <actionbody>
1.2879 + <derivekey>
1.2880 + <kdf>pkcs#12</kdf>
1.2881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2882 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.2883 + <iterations>2048</iterations>
1.2884 + <key>47C18634A0</key>
1.2885 + </derivekey>
1.2886 + </actionbody>
1.2887 +</action>
1.2888 +
1.2889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2891 +//! @SYMREQ CIT_PREQ1054
1.2892 +//! @SYMTestPriority medium
1.2893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2895 +<action>
1.2896 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.2897 + <actiontype>DeriveKey</actiontype>
1.2898 + <actionbody>
1.2899 + <derivekey>
1.2900 + <kdf>pkcs#12</kdf>
1.2901 + <passwd>0000</passwd>
1.2902 + <salt>53414C54</salt>
1.2903 + <iterations>1</iterations>
1.2904 + <key>3037AFC8EACD4E2AEAB3C1E343B81DE8</key>
1.2905 + </derivekey>
1.2906 + </actionbody>
1.2907 +</action>
1.2908 +
1.2909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2911 +//! @SYMREQ CIT_PREQ1054
1.2912 +//! @SYMTestPriority medium
1.2913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2915 +<action>
1.2916 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.2917 + <actiontype>DeriveKey</actiontype>
1.2918 + <actionbody>
1.2919 + <derivekey>
1.2920 + <kdf>pkcs#12</kdf>
1.2921 + <passwd>0001</passwd>
1.2922 + <salt>53414C54</salt>
1.2923 + <iterations>1</iterations>
1.2924 + <key>37F44080CB10A6F7E2719CC979FE0F2E</key>
1.2925 + </derivekey>
1.2926 + </actionbody>
1.2927 +</action>
1.2928 +
1.2929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2931 +//! @SYMREQ CIT_PREQ1054
1.2932 +//! @SYMTestPriority medium
1.2933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2935 +<action>
1.2936 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.2937 + <actiontype>DeriveKey</actiontype>
1.2938 + <actionbody>
1.2939 + <derivekey>
1.2940 + <kdf>pkcs#12</kdf>
1.2941 + <passwd>PSWD</passwd>
1.2942 + <salt>53414C54</salt>
1.2943 + <iterations>1</iterations>
1.2944 + <key>8A18939ACF4A00A900FE2351DCBAFD0C</key>
1.2945 + </derivekey>
1.2946 + </actionbody>
1.2947 +</action>
1.2948 +
1.2949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2951 +//! @SYMREQ CIT_PREQ1054
1.2952 +//! @SYMTestPriority medium
1.2953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2955 +<action>
1.2956 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.2957 + <actiontype>DeriveKey</actiontype>
1.2958 + <actionbody>
1.2959 + <derivekey>
1.2960 + <kdf>pkcs#12</kdf>
1.2961 + <passwd>password</passwd>
1.2962 + <salt>53414C54</salt>
1.2963 + <iterations>1</iterations>
1.2964 + <key>AFF6C5EDE0A50855FE56FDEDB6031BD0</key>
1.2965 + </derivekey>
1.2966 + </actionbody>
1.2967 +</action>
1.2968 +
1.2969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2971 +//! @SYMREQ CIT_PREQ1054
1.2972 +//! @SYMTestPriority medium
1.2973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2975 +<action>
1.2976 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.2977 + <actiontype>DeriveKey</actiontype>
1.2978 + <actionbody>
1.2979 + <derivekey>
1.2980 + <kdf>pkcs#12</kdf>
1.2981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.2982 + <salt>53414C54</salt>
1.2983 + <iterations>1</iterations>
1.2984 + <key>2ED53BB2CE3C39A2F4039B734F9D94C5</key>
1.2985 + </derivekey>
1.2986 + </actionbody>
1.2987 +</action>
1.2988 +
1.2989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.2990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.2991 +//! @SYMREQ CIT_PREQ1054
1.2992 +//! @SYMTestPriority medium
1.2993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.2994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.2995 +<action>
1.2996 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.2997 + <actiontype>DeriveKey</actiontype>
1.2998 + <actionbody>
1.2999 + <derivekey>
1.3000 + <kdf>pkcs#12</kdf>
1.3001 + <passwd>0000</passwd>
1.3002 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3003 + <iterations>1</iterations>
1.3004 + <key>49CABE7B67736931126499722509C03D</key>
1.3005 + </derivekey>
1.3006 + </actionbody>
1.3007 +</action>
1.3008 +
1.3009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3011 +//! @SYMREQ CIT_PREQ1054
1.3012 +//! @SYMTestPriority medium
1.3013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3015 +<action>
1.3016 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3017 + <actiontype>DeriveKey</actiontype>
1.3018 + <actionbody>
1.3019 + <derivekey>
1.3020 + <kdf>pkcs#12</kdf>
1.3021 + <passwd>0001</passwd>
1.3022 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3023 + <iterations>1</iterations>
1.3024 + <key>F994B990D3554AFB778C729E9BAA0CC6</key>
1.3025 + </derivekey>
1.3026 + </actionbody>
1.3027 +</action>
1.3028 +
1.3029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3031 +//! @SYMREQ CIT_PREQ1054
1.3032 +//! @SYMTestPriority medium
1.3033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3035 +<action>
1.3036 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3037 + <actiontype>DeriveKey</actiontype>
1.3038 + <actionbody>
1.3039 + <derivekey>
1.3040 + <kdf>pkcs#12</kdf>
1.3041 + <passwd>PSWD</passwd>
1.3042 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3043 + <iterations>1</iterations>
1.3044 + <key>1AFAAD7E51964CCD2760CCE134E1F2B8</key>
1.3045 + </derivekey>
1.3046 + </actionbody>
1.3047 +</action>
1.3048 +
1.3049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3051 +//! @SYMREQ CIT_PREQ1054
1.3052 +//! @SYMTestPriority medium
1.3053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3055 +<action>
1.3056 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3057 + <actiontype>DeriveKey</actiontype>
1.3058 + <actionbody>
1.3059 + <derivekey>
1.3060 + <kdf>pkcs#12</kdf>
1.3061 + <passwd>password</passwd>
1.3062 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3063 + <iterations>1</iterations>
1.3064 + <key>878C91098D1F4FD0DD8CBC3A8149DF5F</key>
1.3065 + </derivekey>
1.3066 + </actionbody>
1.3067 +</action>
1.3068 +
1.3069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3071 +//! @SYMREQ CIT_PREQ1054
1.3072 +//! @SYMTestPriority medium
1.3073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3075 +<action>
1.3076 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3077 + <actiontype>DeriveKey</actiontype>
1.3078 + <actionbody>
1.3079 + <derivekey>
1.3080 + <kdf>pkcs#12</kdf>
1.3081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3082 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3083 + <iterations>1</iterations>
1.3084 + <key>0DE3F08CAF4FF556C956527AD47C3497</key>
1.3085 + </derivekey>
1.3086 + </actionbody>
1.3087 +</action>
1.3088 +
1.3089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3091 +//! @SYMREQ CIT_PREQ1054
1.3092 +//! @SYMTestPriority medium
1.3093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3095 +<action>
1.3096 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3097 + <actiontype>DeriveKey</actiontype>
1.3098 + <actionbody>
1.3099 + <derivekey>
1.3100 + <kdf>pkcs#12</kdf>
1.3101 + <passwd>0000</passwd>
1.3102 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3103 + <iterations>1</iterations>
1.3104 + <key>90253A49C069E7FF35281461A4DDBE0B</key>
1.3105 + </derivekey>
1.3106 + </actionbody>
1.3107 +</action>
1.3108 +
1.3109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3111 +//! @SYMREQ CIT_PREQ1054
1.3112 +//! @SYMTestPriority medium
1.3113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3115 +<action>
1.3116 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3117 + <actiontype>DeriveKey</actiontype>
1.3118 + <actionbody>
1.3119 + <derivekey>
1.3120 + <kdf>pkcs#12</kdf>
1.3121 + <passwd>0001</passwd>
1.3122 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3123 + <iterations>1</iterations>
1.3124 + <key>40BE97AB930A7E8B6DB634C93B94E699</key>
1.3125 + </derivekey>
1.3126 + </actionbody>
1.3127 +</action>
1.3128 +
1.3129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3131 +//! @SYMREQ CIT_PREQ1054
1.3132 +//! @SYMTestPriority medium
1.3133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3135 +<action>
1.3136 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3137 + <actiontype>DeriveKey</actiontype>
1.3138 + <actionbody>
1.3139 + <derivekey>
1.3140 + <kdf>pkcs#12</kdf>
1.3141 + <passwd>PSWD</passwd>
1.3142 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3143 + <iterations>1</iterations>
1.3144 + <key>A64B43E14E9F71F9EC9A3E6B73FA35E6</key>
1.3145 + </derivekey>
1.3146 + </actionbody>
1.3147 +</action>
1.3148 +
1.3149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3151 +//! @SYMREQ CIT_PREQ1054
1.3152 +//! @SYMTestPriority medium
1.3153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3155 +<action>
1.3156 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3157 + <actiontype>DeriveKey</actiontype>
1.3158 + <actionbody>
1.3159 + <derivekey>
1.3160 + <kdf>pkcs#12</kdf>
1.3161 + <passwd>password</passwd>
1.3162 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3163 + <iterations>1</iterations>
1.3164 + <key>E323D5F588414AE68EF8FCA46879C1C7</key>
1.3165 + </derivekey>
1.3166 + </actionbody>
1.3167 +</action>
1.3168 +
1.3169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3171 +//! @SYMREQ CIT_PREQ1054
1.3172 +//! @SYMTestPriority medium
1.3173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3175 +<action>
1.3176 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3177 + <actiontype>DeriveKey</actiontype>
1.3178 + <actionbody>
1.3179 + <derivekey>
1.3180 + <kdf>pkcs#12</kdf>
1.3181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3182 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3183 + <iterations>1</iterations>
1.3184 + <key>27476572AF26E99AB85CD350DC802ABA</key>
1.3185 + </derivekey>
1.3186 + </actionbody>
1.3187 +</action>
1.3188 +
1.3189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3191 +//! @SYMREQ CIT_PREQ1054
1.3192 +//! @SYMTestPriority medium
1.3193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3195 +<action>
1.3196 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3197 + <actiontype>DeriveKey</actiontype>
1.3198 + <actionbody>
1.3199 + <derivekey>
1.3200 + <kdf>pkcs#12</kdf>
1.3201 + <passwd>0000</passwd>
1.3202 + <salt>53414C54</salt>
1.3203 + <iterations>2</iterations>
1.3204 + <key>A1D9010A6761CB2675F1C33BB3C52158</key>
1.3205 + </derivekey>
1.3206 + </actionbody>
1.3207 +</action>
1.3208 +
1.3209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3211 +//! @SYMREQ CIT_PREQ1054
1.3212 +//! @SYMTestPriority medium
1.3213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3215 +<action>
1.3216 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3217 + <actiontype>DeriveKey</actiontype>
1.3218 + <actionbody>
1.3219 + <derivekey>
1.3220 + <kdf>pkcs#12</kdf>
1.3221 + <passwd>0001</passwd>
1.3222 + <salt>53414C54</salt>
1.3223 + <iterations>2</iterations>
1.3224 + <key>17E4E1F15BC31052E563BFF7B5D11D15</key>
1.3225 + </derivekey>
1.3226 + </actionbody>
1.3227 +</action>
1.3228 +
1.3229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3231 +//! @SYMREQ CIT_PREQ1054
1.3232 +//! @SYMTestPriority medium
1.3233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3235 +<action>
1.3236 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3237 + <actiontype>DeriveKey</actiontype>
1.3238 + <actionbody>
1.3239 + <derivekey>
1.3240 + <kdf>pkcs#12</kdf>
1.3241 + <passwd>PSWD</passwd>
1.3242 + <salt>53414C54</salt>
1.3243 + <iterations>2</iterations>
1.3244 + <key>D1B71808FCCA5C97E8E52CF5E23C633C</key>
1.3245 + </derivekey>
1.3246 + </actionbody>
1.3247 +</action>
1.3248 +
1.3249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3251 +//! @SYMREQ CIT_PREQ1054
1.3252 +//! @SYMTestPriority medium
1.3253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3255 +<action>
1.3256 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3257 + <actiontype>DeriveKey</actiontype>
1.3258 + <actionbody>
1.3259 + <derivekey>
1.3260 + <kdf>pkcs#12</kdf>
1.3261 + <passwd>password</passwd>
1.3262 + <salt>53414C54</salt>
1.3263 + <iterations>2</iterations>
1.3264 + <key>EE7E4073F2E6008722BB9842540998C2</key>
1.3265 + </derivekey>
1.3266 + </actionbody>
1.3267 +</action>
1.3268 +
1.3269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3271 +//! @SYMREQ CIT_PREQ1054
1.3272 +//! @SYMTestPriority medium
1.3273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3275 +<action>
1.3276 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3277 + <actiontype>DeriveKey</actiontype>
1.3278 + <actionbody>
1.3279 + <derivekey>
1.3280 + <kdf>pkcs#12</kdf>
1.3281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3282 + <salt>53414C54</salt>
1.3283 + <iterations>2</iterations>
1.3284 + <key>5BF185C726EE2182888A834066C30BA9</key>
1.3285 + </derivekey>
1.3286 + </actionbody>
1.3287 +</action>
1.3288 +
1.3289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3291 +//! @SYMREQ CIT_PREQ1054
1.3292 +//! @SYMTestPriority medium
1.3293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3295 +<action>
1.3296 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3297 + <actiontype>DeriveKey</actiontype>
1.3298 + <actionbody>
1.3299 + <derivekey>
1.3300 + <kdf>pkcs#12</kdf>
1.3301 + <passwd>0000</passwd>
1.3302 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3303 + <iterations>2</iterations>
1.3304 + <key>72ADF5E0413FDBF6659A1E7D495BBE32</key>
1.3305 + </derivekey>
1.3306 + </actionbody>
1.3307 +</action>
1.3308 +
1.3309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3311 +//! @SYMREQ CIT_PREQ1054
1.3312 +//! @SYMTestPriority medium
1.3313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3315 +<action>
1.3316 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3317 + <actiontype>DeriveKey</actiontype>
1.3318 + <actionbody>
1.3319 + <derivekey>
1.3320 + <kdf>pkcs#12</kdf>
1.3321 + <passwd>0001</passwd>
1.3322 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3323 + <iterations>2</iterations>
1.3324 + <key>63E6DF459C899D72577C20FFE4F27670</key>
1.3325 + </derivekey>
1.3326 + </actionbody>
1.3327 +</action>
1.3328 +
1.3329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3331 +//! @SYMREQ CIT_PREQ1054
1.3332 +//! @SYMTestPriority medium
1.3333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3335 +<action>
1.3336 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3337 + <actiontype>DeriveKey</actiontype>
1.3338 + <actionbody>
1.3339 + <derivekey>
1.3340 + <kdf>pkcs#12</kdf>
1.3341 + <passwd>PSWD</passwd>
1.3342 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3343 + <iterations>2</iterations>
1.3344 + <key>C2099204ABFBB841875BD7595A89D31A</key>
1.3345 + </derivekey>
1.3346 + </actionbody>
1.3347 +</action>
1.3348 +
1.3349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3351 +//! @SYMREQ CIT_PREQ1054
1.3352 +//! @SYMTestPriority medium
1.3353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3355 +<action>
1.3356 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3357 + <actiontype>DeriveKey</actiontype>
1.3358 + <actionbody>
1.3359 + <derivekey>
1.3360 + <kdf>pkcs#12</kdf>
1.3361 + <passwd>password</passwd>
1.3362 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3363 + <iterations>2</iterations>
1.3364 + <key>3204D28A32DF299B612958906C79154A</key>
1.3365 + </derivekey>
1.3366 + </actionbody>
1.3367 +</action>
1.3368 +
1.3369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3371 +//! @SYMREQ CIT_PREQ1054
1.3372 +//! @SYMTestPriority medium
1.3373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3375 +<action>
1.3376 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3377 + <actiontype>DeriveKey</actiontype>
1.3378 + <actionbody>
1.3379 + <derivekey>
1.3380 + <kdf>pkcs#12</kdf>
1.3381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3382 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3383 + <iterations>2</iterations>
1.3384 + <key>FB845F70A40E96C536641C3F797AAE39</key>
1.3385 + </derivekey>
1.3386 + </actionbody>
1.3387 +</action>
1.3388 +
1.3389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3391 +//! @SYMREQ CIT_PREQ1054
1.3392 +//! @SYMTestPriority medium
1.3393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3395 +<action>
1.3396 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3397 + <actiontype>DeriveKey</actiontype>
1.3398 + <actionbody>
1.3399 + <derivekey>
1.3400 + <kdf>pkcs#12</kdf>
1.3401 + <passwd>0000</passwd>
1.3402 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3403 + <iterations>2</iterations>
1.3404 + <key>B9230EEC1D615A6DFEF5A8793CB06783</key>
1.3405 + </derivekey>
1.3406 + </actionbody>
1.3407 +</action>
1.3408 +
1.3409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3411 +//! @SYMREQ CIT_PREQ1054
1.3412 +//! @SYMTestPriority medium
1.3413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3415 +<action>
1.3416 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3417 + <actiontype>DeriveKey</actiontype>
1.3418 + <actionbody>
1.3419 + <derivekey>
1.3420 + <kdf>pkcs#12</kdf>
1.3421 + <passwd>0001</passwd>
1.3422 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3423 + <iterations>2</iterations>
1.3424 + <key>462B0F2D1B18297A3F2C5E4058A0083E</key>
1.3425 + </derivekey>
1.3426 + </actionbody>
1.3427 +</action>
1.3428 +
1.3429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3431 +//! @SYMREQ CIT_PREQ1054
1.3432 +//! @SYMTestPriority medium
1.3433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3435 +<action>
1.3436 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3437 + <actiontype>DeriveKey</actiontype>
1.3438 + <actionbody>
1.3439 + <derivekey>
1.3440 + <kdf>pkcs#12</kdf>
1.3441 + <passwd>PSWD</passwd>
1.3442 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3443 + <iterations>2</iterations>
1.3444 + <key>05B66EF1BB844470CBBB46D5F4C7DB29</key>
1.3445 + </derivekey>
1.3446 + </actionbody>
1.3447 +</action>
1.3448 +
1.3449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3451 +//! @SYMREQ CIT_PREQ1054
1.3452 +//! @SYMTestPriority medium
1.3453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3455 +<action>
1.3456 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3457 + <actiontype>DeriveKey</actiontype>
1.3458 + <actionbody>
1.3459 + <derivekey>
1.3460 + <kdf>pkcs#12</kdf>
1.3461 + <passwd>password</passwd>
1.3462 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3463 + <iterations>2</iterations>
1.3464 + <key>C1B7E77C96BB5EE1386E8461A58F0D0C</key>
1.3465 + </derivekey>
1.3466 + </actionbody>
1.3467 +</action>
1.3468 +
1.3469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3471 +//! @SYMREQ CIT_PREQ1054
1.3472 +//! @SYMTestPriority medium
1.3473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3475 +<action>
1.3476 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3477 + <actiontype>DeriveKey</actiontype>
1.3478 + <actionbody>
1.3479 + <derivekey>
1.3480 + <kdf>pkcs#12</kdf>
1.3481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3482 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3483 + <iterations>2</iterations>
1.3484 + <key>3DE08CDACF489F30BBD75C0FF401EC02</key>
1.3485 + </derivekey>
1.3486 + </actionbody>
1.3487 +</action>
1.3488 +
1.3489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3491 +//! @SYMREQ CIT_PREQ1054
1.3492 +//! @SYMTestPriority medium
1.3493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3495 +<action>
1.3496 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3497 + <actiontype>DeriveKey</actiontype>
1.3498 + <actionbody>
1.3499 + <derivekey>
1.3500 + <kdf>pkcs#12</kdf>
1.3501 + <passwd>0000</passwd>
1.3502 + <salt>53414C54</salt>
1.3503 + <iterations>4</iterations>
1.3504 + <key>D0158BFC57E643965DC161741725CE94</key>
1.3505 + </derivekey>
1.3506 + </actionbody>
1.3507 +</action>
1.3508 +
1.3509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3511 +//! @SYMREQ CIT_PREQ1054
1.3512 +//! @SYMTestPriority medium
1.3513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3515 +<action>
1.3516 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3517 + <actiontype>DeriveKey</actiontype>
1.3518 + <actionbody>
1.3519 + <derivekey>
1.3520 + <kdf>pkcs#12</kdf>
1.3521 + <passwd>0001</passwd>
1.3522 + <salt>53414C54</salt>
1.3523 + <iterations>4</iterations>
1.3524 + <key>AEB6CD53F0D6830161100C4BFD439B34</key>
1.3525 + </derivekey>
1.3526 + </actionbody>
1.3527 +</action>
1.3528 +
1.3529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3531 +//! @SYMREQ CIT_PREQ1054
1.3532 +//! @SYMTestPriority medium
1.3533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3535 +<action>
1.3536 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3537 + <actiontype>DeriveKey</actiontype>
1.3538 + <actionbody>
1.3539 + <derivekey>
1.3540 + <kdf>pkcs#12</kdf>
1.3541 + <passwd>PSWD</passwd>
1.3542 + <salt>53414C54</salt>
1.3543 + <iterations>4</iterations>
1.3544 + <key>80010C12B66CC739F4ACF8BB15419770</key>
1.3545 + </derivekey>
1.3546 + </actionbody>
1.3547 +</action>
1.3548 +
1.3549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3551 +//! @SYMREQ CIT_PREQ1054
1.3552 +//! @SYMTestPriority medium
1.3553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3555 +<action>
1.3556 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3557 + <actiontype>DeriveKey</actiontype>
1.3558 + <actionbody>
1.3559 + <derivekey>
1.3560 + <kdf>pkcs#12</kdf>
1.3561 + <passwd>password</passwd>
1.3562 + <salt>53414C54</salt>
1.3563 + <iterations>4</iterations>
1.3564 + <key>497DE34C4C64E56AD53E5F8F6E16D1A3</key>
1.3565 + </derivekey>
1.3566 + </actionbody>
1.3567 +</action>
1.3568 +
1.3569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3571 +//! @SYMREQ CIT_PREQ1054
1.3572 +//! @SYMTestPriority medium
1.3573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3575 +<action>
1.3576 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3577 + <actiontype>DeriveKey</actiontype>
1.3578 + <actionbody>
1.3579 + <derivekey>
1.3580 + <kdf>pkcs#12</kdf>
1.3581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3582 + <salt>53414C54</salt>
1.3583 + <iterations>4</iterations>
1.3584 + <key>146C6A5B58AF8561220DE4C13A133248</key>
1.3585 + </derivekey>
1.3586 + </actionbody>
1.3587 +</action>
1.3588 +
1.3589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3591 +//! @SYMREQ CIT_PREQ1054
1.3592 +//! @SYMTestPriority medium
1.3593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3595 +<action>
1.3596 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3597 + <actiontype>DeriveKey</actiontype>
1.3598 + <actionbody>
1.3599 + <derivekey>
1.3600 + <kdf>pkcs#12</kdf>
1.3601 + <passwd>0000</passwd>
1.3602 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3603 + <iterations>4</iterations>
1.3604 + <key>E89772E7A52D6D8C65AAE01D0380ED59</key>
1.3605 + </derivekey>
1.3606 + </actionbody>
1.3607 +</action>
1.3608 +
1.3609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3611 +//! @SYMREQ CIT_PREQ1054
1.3612 +//! @SYMTestPriority medium
1.3613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3615 +<action>
1.3616 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3617 + <actiontype>DeriveKey</actiontype>
1.3618 + <actionbody>
1.3619 + <derivekey>
1.3620 + <kdf>pkcs#12</kdf>
1.3621 + <passwd>0001</passwd>
1.3622 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3623 + <iterations>4</iterations>
1.3624 + <key>23930713772E26DBBABB53F3C5C77501</key>
1.3625 + </derivekey>
1.3626 + </actionbody>
1.3627 +</action>
1.3628 +
1.3629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3631 +//! @SYMREQ CIT_PREQ1054
1.3632 +//! @SYMTestPriority medium
1.3633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3635 +<action>
1.3636 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3637 + <actiontype>DeriveKey</actiontype>
1.3638 + <actionbody>
1.3639 + <derivekey>
1.3640 + <kdf>pkcs#12</kdf>
1.3641 + <passwd>PSWD</passwd>
1.3642 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3643 + <iterations>4</iterations>
1.3644 + <key>DF2D961FE3929BBA41493EB5421FEF7C</key>
1.3645 + </derivekey>
1.3646 + </actionbody>
1.3647 +</action>
1.3648 +
1.3649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3651 +//! @SYMREQ CIT_PREQ1054
1.3652 +//! @SYMTestPriority medium
1.3653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3655 +<action>
1.3656 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3657 + <actiontype>DeriveKey</actiontype>
1.3658 + <actionbody>
1.3659 + <derivekey>
1.3660 + <kdf>pkcs#12</kdf>
1.3661 + <passwd>password</passwd>
1.3662 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3663 + <iterations>4</iterations>
1.3664 + <key>363619530B170B7BAE1C046B29351C23</key>
1.3665 + </derivekey>
1.3666 + </actionbody>
1.3667 +</action>
1.3668 +
1.3669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3671 +//! @SYMREQ CIT_PREQ1054
1.3672 +//! @SYMTestPriority medium
1.3673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3675 +<action>
1.3676 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3677 + <actiontype>DeriveKey</actiontype>
1.3678 + <actionbody>
1.3679 + <derivekey>
1.3680 + <kdf>pkcs#12</kdf>
1.3681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3682 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3683 + <iterations>4</iterations>
1.3684 + <key>B43FA2D22B6912F6FEDF1CF3FAD123AF</key>
1.3685 + </derivekey>
1.3686 + </actionbody>
1.3687 +</action>
1.3688 +
1.3689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3691 +//! @SYMREQ CIT_PREQ1054
1.3692 +//! @SYMTestPriority medium
1.3693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3695 +<action>
1.3696 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3697 + <actiontype>DeriveKey</actiontype>
1.3698 + <actionbody>
1.3699 + <derivekey>
1.3700 + <kdf>pkcs#12</kdf>
1.3701 + <passwd>0000</passwd>
1.3702 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3703 + <iterations>4</iterations>
1.3704 + <key>EF50923D65A0610BDC51AD5DB1B4F4F9</key>
1.3705 + </derivekey>
1.3706 + </actionbody>
1.3707 +</action>
1.3708 +
1.3709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3711 +//! @SYMREQ CIT_PREQ1054
1.3712 +//! @SYMTestPriority medium
1.3713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3715 +<action>
1.3716 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3717 + <actiontype>DeriveKey</actiontype>
1.3718 + <actionbody>
1.3719 + <derivekey>
1.3720 + <kdf>pkcs#12</kdf>
1.3721 + <passwd>0001</passwd>
1.3722 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3723 + <iterations>4</iterations>
1.3724 + <key>9A618595C714486B7D7E3120005C8BC1</key>
1.3725 + </derivekey>
1.3726 + </actionbody>
1.3727 +</action>
1.3728 +
1.3729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3731 +//! @SYMREQ CIT_PREQ1054
1.3732 +//! @SYMTestPriority medium
1.3733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3735 +<action>
1.3736 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3737 + <actiontype>DeriveKey</actiontype>
1.3738 + <actionbody>
1.3739 + <derivekey>
1.3740 + <kdf>pkcs#12</kdf>
1.3741 + <passwd>PSWD</passwd>
1.3742 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3743 + <iterations>4</iterations>
1.3744 + <key>B3B33AA8A6777605E3029C0F8DC45290</key>
1.3745 + </derivekey>
1.3746 + </actionbody>
1.3747 +</action>
1.3748 +
1.3749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3751 +//! @SYMREQ CIT_PREQ1054
1.3752 +//! @SYMTestPriority medium
1.3753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3755 +<action>
1.3756 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3757 + <actiontype>DeriveKey</actiontype>
1.3758 + <actionbody>
1.3759 + <derivekey>
1.3760 + <kdf>pkcs#12</kdf>
1.3761 + <passwd>password</passwd>
1.3762 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3763 + <iterations>4</iterations>
1.3764 + <key>C007DC1ADA9475C5DB2F9B5D18A2DEFD</key>
1.3765 + </derivekey>
1.3766 + </actionbody>
1.3767 +</action>
1.3768 +
1.3769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3771 +//! @SYMREQ CIT_PREQ1054
1.3772 +//! @SYMTestPriority medium
1.3773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3775 +<action>
1.3776 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3777 + <actiontype>DeriveKey</actiontype>
1.3778 + <actionbody>
1.3779 + <derivekey>
1.3780 + <kdf>pkcs#12</kdf>
1.3781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3782 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.3783 + <iterations>4</iterations>
1.3784 + <key>91DF3661364A0DAD28180A41ADCB5567</key>
1.3785 + </derivekey>
1.3786 + </actionbody>
1.3787 +</action>
1.3788 +
1.3789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3791 +//! @SYMREQ CIT_PREQ1054
1.3792 +//! @SYMTestPriority medium
1.3793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3795 +<action>
1.3796 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3797 + <actiontype>DeriveKey</actiontype>
1.3798 + <actionbody>
1.3799 + <derivekey>
1.3800 + <kdf>pkcs#12</kdf>
1.3801 + <passwd>0000</passwd>
1.3802 + <salt>53414C54</salt>
1.3803 + <iterations>8</iterations>
1.3804 + <key>9A08D3C4F584ECD1E538B7A46DCFDEA1</key>
1.3805 + </derivekey>
1.3806 + </actionbody>
1.3807 +</action>
1.3808 +
1.3809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3811 +//! @SYMREQ CIT_PREQ1054
1.3812 +//! @SYMTestPriority medium
1.3813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3815 +<action>
1.3816 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3817 + <actiontype>DeriveKey</actiontype>
1.3818 + <actionbody>
1.3819 + <derivekey>
1.3820 + <kdf>pkcs#12</kdf>
1.3821 + <passwd>0001</passwd>
1.3822 + <salt>53414C54</salt>
1.3823 + <iterations>8</iterations>
1.3824 + <key>33002FA0B6A5A27991A062FF6173E357</key>
1.3825 + </derivekey>
1.3826 + </actionbody>
1.3827 +</action>
1.3828 +
1.3829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3831 +//! @SYMREQ CIT_PREQ1054
1.3832 +//! @SYMTestPriority medium
1.3833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3835 +<action>
1.3836 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3837 + <actiontype>DeriveKey</actiontype>
1.3838 + <actionbody>
1.3839 + <derivekey>
1.3840 + <kdf>pkcs#12</kdf>
1.3841 + <passwd>PSWD</passwd>
1.3842 + <salt>53414C54</salt>
1.3843 + <iterations>8</iterations>
1.3844 + <key>22001FA26964DCD0BE3C58AB6E43557C</key>
1.3845 + </derivekey>
1.3846 + </actionbody>
1.3847 +</action>
1.3848 +
1.3849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3851 +//! @SYMREQ CIT_PREQ1054
1.3852 +//! @SYMTestPriority medium
1.3853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3855 +<action>
1.3856 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3857 + <actiontype>DeriveKey</actiontype>
1.3858 + <actionbody>
1.3859 + <derivekey>
1.3860 + <kdf>pkcs#12</kdf>
1.3861 + <passwd>password</passwd>
1.3862 + <salt>53414C54</salt>
1.3863 + <iterations>8</iterations>
1.3864 + <key>B0935F11227F5A473073DCD188886687</key>
1.3865 + </derivekey>
1.3866 + </actionbody>
1.3867 +</action>
1.3868 +
1.3869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3871 +//! @SYMREQ CIT_PREQ1054
1.3872 +//! @SYMTestPriority medium
1.3873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3875 +<action>
1.3876 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.3877 + <actiontype>DeriveKey</actiontype>
1.3878 + <actionbody>
1.3879 + <derivekey>
1.3880 + <kdf>pkcs#12</kdf>
1.3881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3882 + <salt>53414C54</salt>
1.3883 + <iterations>8</iterations>
1.3884 + <key>6602B1B4BBB670208041ECD8E1634845</key>
1.3885 + </derivekey>
1.3886 + </actionbody>
1.3887 +</action>
1.3888 +
1.3889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3891 +//! @SYMREQ CIT_PREQ1054
1.3892 +//! @SYMTestPriority medium
1.3893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3895 +<action>
1.3896 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3897 + <actiontype>DeriveKey</actiontype>
1.3898 + <actionbody>
1.3899 + <derivekey>
1.3900 + <kdf>pkcs#12</kdf>
1.3901 + <passwd>0000</passwd>
1.3902 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3903 + <iterations>8</iterations>
1.3904 + <key>3A478368DD5DC61BAA09325959A3F46C</key>
1.3905 + </derivekey>
1.3906 + </actionbody>
1.3907 +</action>
1.3908 +
1.3909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3911 +//! @SYMREQ CIT_PREQ1054
1.3912 +//! @SYMTestPriority medium
1.3913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3915 +<action>
1.3916 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3917 + <actiontype>DeriveKey</actiontype>
1.3918 + <actionbody>
1.3919 + <derivekey>
1.3920 + <kdf>pkcs#12</kdf>
1.3921 + <passwd>0001</passwd>
1.3922 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3923 + <iterations>8</iterations>
1.3924 + <key>6473EB1244E055149E0858C49FAE7B8D</key>
1.3925 + </derivekey>
1.3926 + </actionbody>
1.3927 +</action>
1.3928 +
1.3929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3931 +//! @SYMREQ CIT_PREQ1054
1.3932 +//! @SYMTestPriority medium
1.3933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3935 +<action>
1.3936 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3937 + <actiontype>DeriveKey</actiontype>
1.3938 + <actionbody>
1.3939 + <derivekey>
1.3940 + <kdf>pkcs#12</kdf>
1.3941 + <passwd>PSWD</passwd>
1.3942 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3943 + <iterations>8</iterations>
1.3944 + <key>AA762B8736D4C37BAD263103CA283E09</key>
1.3945 + </derivekey>
1.3946 + </actionbody>
1.3947 +</action>
1.3948 +
1.3949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3951 +//! @SYMREQ CIT_PREQ1054
1.3952 +//! @SYMTestPriority medium
1.3953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3955 +<action>
1.3956 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3957 + <actiontype>DeriveKey</actiontype>
1.3958 + <actionbody>
1.3959 + <derivekey>
1.3960 + <kdf>pkcs#12</kdf>
1.3961 + <passwd>password</passwd>
1.3962 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3963 + <iterations>8</iterations>
1.3964 + <key>F00C5240B03C9A2324BD5FE0AEEE1B62</key>
1.3965 + </derivekey>
1.3966 + </actionbody>
1.3967 +</action>
1.3968 +
1.3969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3971 +//! @SYMREQ CIT_PREQ1054
1.3972 +//! @SYMTestPriority medium
1.3973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3975 +<action>
1.3976 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.3977 + <actiontype>DeriveKey</actiontype>
1.3978 + <actionbody>
1.3979 + <derivekey>
1.3980 + <kdf>pkcs#12</kdf>
1.3981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.3982 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.3983 + <iterations>8</iterations>
1.3984 + <key>935593CA370BB6988F2F41D2F4ABF56E</key>
1.3985 + </derivekey>
1.3986 + </actionbody>
1.3987 +</action>
1.3988 +
1.3989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.3990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.3991 +//! @SYMREQ CIT_PREQ1054
1.3992 +//! @SYMTestPriority medium
1.3993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.3994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.3995 +<action>
1.3996 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.3997 + <actiontype>DeriveKey</actiontype>
1.3998 + <actionbody>
1.3999 + <derivekey>
1.4000 + <kdf>pkcs#12</kdf>
1.4001 + <passwd>0000</passwd>
1.4002 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4003 + <iterations>8</iterations>
1.4004 + <key>FCE1F429AEB3B9818D96B88DD25CDED9</key>
1.4005 + </derivekey>
1.4006 + </actionbody>
1.4007 +</action>
1.4008 +
1.4009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4011 +//! @SYMREQ CIT_PREQ1054
1.4012 +//! @SYMTestPriority medium
1.4013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4015 +<action>
1.4016 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4017 + <actiontype>DeriveKey</actiontype>
1.4018 + <actionbody>
1.4019 + <derivekey>
1.4020 + <kdf>pkcs#12</kdf>
1.4021 + <passwd>0001</passwd>
1.4022 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4023 + <iterations>8</iterations>
1.4024 + <key>82B4A13659033EA4025DB51A6CB573F9</key>
1.4025 + </derivekey>
1.4026 + </actionbody>
1.4027 +</action>
1.4028 +
1.4029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4031 +//! @SYMREQ CIT_PREQ1054
1.4032 +//! @SYMTestPriority medium
1.4033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4035 +<action>
1.4036 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4037 + <actiontype>DeriveKey</actiontype>
1.4038 + <actionbody>
1.4039 + <derivekey>
1.4040 + <kdf>pkcs#12</kdf>
1.4041 + <passwd>PSWD</passwd>
1.4042 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4043 + <iterations>8</iterations>
1.4044 + <key>45FE091D4DD2D50FA7D3340B1DB838F2</key>
1.4045 + </derivekey>
1.4046 + </actionbody>
1.4047 +</action>
1.4048 +
1.4049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4051 +//! @SYMREQ CIT_PREQ1054
1.4052 +//! @SYMTestPriority medium
1.4053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4055 +<action>
1.4056 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4057 + <actiontype>DeriveKey</actiontype>
1.4058 + <actionbody>
1.4059 + <derivekey>
1.4060 + <kdf>pkcs#12</kdf>
1.4061 + <passwd>password</passwd>
1.4062 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4063 + <iterations>8</iterations>
1.4064 + <key>5670457314E405B0ED1583FC4B82FEAD</key>
1.4065 + </derivekey>
1.4066 + </actionbody>
1.4067 +</action>
1.4068 +
1.4069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4071 +//! @SYMREQ CIT_PREQ1054
1.4072 +//! @SYMTestPriority medium
1.4073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4075 +<action>
1.4076 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4077 + <actiontype>DeriveKey</actiontype>
1.4078 + <actionbody>
1.4079 + <derivekey>
1.4080 + <kdf>pkcs#12</kdf>
1.4081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4082 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4083 + <iterations>8</iterations>
1.4084 + <key>1C4CAE25146D74F3762B5C3FD3A91752</key>
1.4085 + </derivekey>
1.4086 + </actionbody>
1.4087 +</action>
1.4088 +
1.4089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4091 +//! @SYMREQ CIT_PREQ1054
1.4092 +//! @SYMTestPriority medium
1.4093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4095 +<action>
1.4096 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4097 + <actiontype>DeriveKey</actiontype>
1.4098 + <actionbody>
1.4099 + <derivekey>
1.4100 + <kdf>pkcs#12</kdf>
1.4101 + <passwd>0000</passwd>
1.4102 + <salt>53414C54</salt>
1.4103 + <iterations>128</iterations>
1.4104 + <key>8B4B3CBFB00466F63B30FEAD111E163D</key>
1.4105 + </derivekey>
1.4106 + </actionbody>
1.4107 +</action>
1.4108 +
1.4109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4111 +//! @SYMREQ CIT_PREQ1054
1.4112 +//! @SYMTestPriority medium
1.4113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4115 +<action>
1.4116 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4117 + <actiontype>DeriveKey</actiontype>
1.4118 + <actionbody>
1.4119 + <derivekey>
1.4120 + <kdf>pkcs#12</kdf>
1.4121 + <passwd>0001</passwd>
1.4122 + <salt>53414C54</salt>
1.4123 + <iterations>128</iterations>
1.4124 + <key>C89C3A2C9C06626EB831F4BB5262809B</key>
1.4125 + </derivekey>
1.4126 + </actionbody>
1.4127 +</action>
1.4128 +
1.4129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4131 +//! @SYMREQ CIT_PREQ1054
1.4132 +//! @SYMTestPriority medium
1.4133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4135 +<action>
1.4136 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4137 + <actiontype>DeriveKey</actiontype>
1.4138 + <actionbody>
1.4139 + <derivekey>
1.4140 + <kdf>pkcs#12</kdf>
1.4141 + <passwd>PSWD</passwd>
1.4142 + <salt>53414C54</salt>
1.4143 + <iterations>128</iterations>
1.4144 + <key>8109F97073FF3D286B21095E7AFBBAFA</key>
1.4145 + </derivekey>
1.4146 + </actionbody>
1.4147 +</action>
1.4148 +
1.4149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4151 +//! @SYMREQ CIT_PREQ1054
1.4152 +//! @SYMTestPriority medium
1.4153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4155 +<action>
1.4156 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4157 + <actiontype>DeriveKey</actiontype>
1.4158 + <actionbody>
1.4159 + <derivekey>
1.4160 + <kdf>pkcs#12</kdf>
1.4161 + <passwd>password</passwd>
1.4162 + <salt>53414C54</salt>
1.4163 + <iterations>128</iterations>
1.4164 + <key>55E985CC1581F3D0052F53DB469F6DC9</key>
1.4165 + </derivekey>
1.4166 + </actionbody>
1.4167 +</action>
1.4168 +
1.4169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4171 +//! @SYMREQ CIT_PREQ1054
1.4172 +//! @SYMTestPriority medium
1.4173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4175 +<action>
1.4176 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4177 + <actiontype>DeriveKey</actiontype>
1.4178 + <actionbody>
1.4179 + <derivekey>
1.4180 + <kdf>pkcs#12</kdf>
1.4181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4182 + <salt>53414C54</salt>
1.4183 + <iterations>128</iterations>
1.4184 + <key>2802AA97D4C79B1813AB23F2DD710722</key>
1.4185 + </derivekey>
1.4186 + </actionbody>
1.4187 +</action>
1.4188 +
1.4189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4191 +//! @SYMREQ CIT_PREQ1054
1.4192 +//! @SYMTestPriority medium
1.4193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4195 +<action>
1.4196 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4197 + <actiontype>DeriveKey</actiontype>
1.4198 + <actionbody>
1.4199 + <derivekey>
1.4200 + <kdf>pkcs#12</kdf>
1.4201 + <passwd>0000</passwd>
1.4202 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4203 + <iterations>128</iterations>
1.4204 + <key>881509A34D80B5AB5CEC65B859DF2D99</key>
1.4205 + </derivekey>
1.4206 + </actionbody>
1.4207 +</action>
1.4208 +
1.4209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4211 +//! @SYMREQ CIT_PREQ1054
1.4212 +//! @SYMTestPriority medium
1.4213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4215 +<action>
1.4216 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4217 + <actiontype>DeriveKey</actiontype>
1.4218 + <actionbody>
1.4219 + <derivekey>
1.4220 + <kdf>pkcs#12</kdf>
1.4221 + <passwd>0001</passwd>
1.4222 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4223 + <iterations>128</iterations>
1.4224 + <key>B2918BC593DEC4559C279CFA050CB0F9</key>
1.4225 + </derivekey>
1.4226 + </actionbody>
1.4227 +</action>
1.4228 +
1.4229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4231 +//! @SYMREQ CIT_PREQ1054
1.4232 +//! @SYMTestPriority medium
1.4233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4235 +<action>
1.4236 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4237 + <actiontype>DeriveKey</actiontype>
1.4238 + <actionbody>
1.4239 + <derivekey>
1.4240 + <kdf>pkcs#12</kdf>
1.4241 + <passwd>PSWD</passwd>
1.4242 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4243 + <iterations>128</iterations>
1.4244 + <key>0FE0529B45AFC9BB66323C2182DE414A</key>
1.4245 + </derivekey>
1.4246 + </actionbody>
1.4247 +</action>
1.4248 +
1.4249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4251 +//! @SYMREQ CIT_PREQ1054
1.4252 +//! @SYMTestPriority medium
1.4253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4255 +<action>
1.4256 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4257 + <actiontype>DeriveKey</actiontype>
1.4258 + <actionbody>
1.4259 + <derivekey>
1.4260 + <kdf>pkcs#12</kdf>
1.4261 + <passwd>password</passwd>
1.4262 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4263 + <iterations>128</iterations>
1.4264 + <key>1FF923C4B1E1007EF168E4185280F818</key>
1.4265 + </derivekey>
1.4266 + </actionbody>
1.4267 +</action>
1.4268 +
1.4269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4271 +//! @SYMREQ CIT_PREQ1054
1.4272 +//! @SYMTestPriority medium
1.4273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4275 +<action>
1.4276 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4277 + <actiontype>DeriveKey</actiontype>
1.4278 + <actionbody>
1.4279 + <derivekey>
1.4280 + <kdf>pkcs#12</kdf>
1.4281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4282 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4283 + <iterations>128</iterations>
1.4284 + <key>05D1E56D04BC435A60BDE06C5AFAC9E3</key>
1.4285 + </derivekey>
1.4286 + </actionbody>
1.4287 +</action>
1.4288 +
1.4289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4291 +//! @SYMREQ CIT_PREQ1054
1.4292 +//! @SYMTestPriority medium
1.4293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4295 +<action>
1.4296 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4297 + <actiontype>DeriveKey</actiontype>
1.4298 + <actionbody>
1.4299 + <derivekey>
1.4300 + <kdf>pkcs#12</kdf>
1.4301 + <passwd>0000</passwd>
1.4302 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4303 + <iterations>128</iterations>
1.4304 + <key>99FE149183022F9EB2EB815BCC9504E5</key>
1.4305 + </derivekey>
1.4306 + </actionbody>
1.4307 +</action>
1.4308 +
1.4309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4311 +//! @SYMREQ CIT_PREQ1054
1.4312 +//! @SYMTestPriority medium
1.4313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4315 +<action>
1.4316 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4317 + <actiontype>DeriveKey</actiontype>
1.4318 + <actionbody>
1.4319 + <derivekey>
1.4320 + <kdf>pkcs#12</kdf>
1.4321 + <passwd>0001</passwd>
1.4322 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4323 + <iterations>128</iterations>
1.4324 + <key>79E29F3FCB3777460EC0F43D3D7048A7</key>
1.4325 + </derivekey>
1.4326 + </actionbody>
1.4327 +</action>
1.4328 +
1.4329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4331 +//! @SYMREQ CIT_PREQ1054
1.4332 +//! @SYMTestPriority medium
1.4333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4335 +<action>
1.4336 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4337 + <actiontype>DeriveKey</actiontype>
1.4338 + <actionbody>
1.4339 + <derivekey>
1.4340 + <kdf>pkcs#12</kdf>
1.4341 + <passwd>PSWD</passwd>
1.4342 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4343 + <iterations>128</iterations>
1.4344 + <key>22A70A865774E55CF08A704356112522</key>
1.4345 + </derivekey>
1.4346 + </actionbody>
1.4347 +</action>
1.4348 +
1.4349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4351 +//! @SYMREQ CIT_PREQ1054
1.4352 +//! @SYMTestPriority medium
1.4353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4355 +<action>
1.4356 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4357 + <actiontype>DeriveKey</actiontype>
1.4358 + <actionbody>
1.4359 + <derivekey>
1.4360 + <kdf>pkcs#12</kdf>
1.4361 + <passwd>password</passwd>
1.4362 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4363 + <iterations>128</iterations>
1.4364 + <key>9CBA922190F1659F6AA3B2B98347EEC2</key>
1.4365 + </derivekey>
1.4366 + </actionbody>
1.4367 +</action>
1.4368 +
1.4369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4371 +//! @SYMREQ CIT_PREQ1054
1.4372 +//! @SYMTestPriority medium
1.4373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4375 +<action>
1.4376 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4377 + <actiontype>DeriveKey</actiontype>
1.4378 + <actionbody>
1.4379 + <derivekey>
1.4380 + <kdf>pkcs#12</kdf>
1.4381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4382 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4383 + <iterations>128</iterations>
1.4384 + <key>A037A8B1C20DC883FAABF82D8A591B9E</key>
1.4385 + </derivekey>
1.4386 + </actionbody>
1.4387 +</action>
1.4388 +
1.4389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4391 +//! @SYMREQ CIT_PREQ1054
1.4392 +//! @SYMTestPriority medium
1.4393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4395 +<action>
1.4396 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4397 + <actiontype>DeriveKey</actiontype>
1.4398 + <actionbody>
1.4399 + <derivekey>
1.4400 + <kdf>pkcs#12</kdf>
1.4401 + <passwd>0000</passwd>
1.4402 + <salt>53414C54</salt>
1.4403 + <iterations>1024</iterations>
1.4404 + <key>82824BE51C81A5FF4C4268E256F6621B</key>
1.4405 + </derivekey>
1.4406 + </actionbody>
1.4407 +</action>
1.4408 +
1.4409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4411 +//! @SYMREQ CIT_PREQ1054
1.4412 +//! @SYMTestPriority medium
1.4413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4415 +<action>
1.4416 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4417 + <actiontype>DeriveKey</actiontype>
1.4418 + <actionbody>
1.4419 + <derivekey>
1.4420 + <kdf>pkcs#12</kdf>
1.4421 + <passwd>0001</passwd>
1.4422 + <salt>53414C54</salt>
1.4423 + <iterations>1024</iterations>
1.4424 + <key>E166049AC4E765E513AFA8A35DDBE756</key>
1.4425 + </derivekey>
1.4426 + </actionbody>
1.4427 +</action>
1.4428 +
1.4429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4431 +//! @SYMREQ CIT_PREQ1054
1.4432 +//! @SYMTestPriority medium
1.4433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4435 +<action>
1.4436 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4437 + <actiontype>DeriveKey</actiontype>
1.4438 + <actionbody>
1.4439 + <derivekey>
1.4440 + <kdf>pkcs#12</kdf>
1.4441 + <passwd>PSWD</passwd>
1.4442 + <salt>53414C54</salt>
1.4443 + <iterations>1024</iterations>
1.4444 + <key>90E975CC54F8BDA5A6CED39088716B27</key>
1.4445 + </derivekey>
1.4446 + </actionbody>
1.4447 +</action>
1.4448 +
1.4449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4451 +//! @SYMREQ CIT_PREQ1054
1.4452 +//! @SYMTestPriority medium
1.4453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4455 +<action>
1.4456 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4457 + <actiontype>DeriveKey</actiontype>
1.4458 + <actionbody>
1.4459 + <derivekey>
1.4460 + <kdf>pkcs#12</kdf>
1.4461 + <passwd>password</passwd>
1.4462 + <salt>53414C54</salt>
1.4463 + <iterations>1024</iterations>
1.4464 + <key>1FFD40D7BBA891A7E6C4DED39FB0740B</key>
1.4465 + </derivekey>
1.4466 + </actionbody>
1.4467 +</action>
1.4468 +
1.4469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4471 +//! @SYMREQ CIT_PREQ1054
1.4472 +//! @SYMTestPriority medium
1.4473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4475 +<action>
1.4476 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4477 + <actiontype>DeriveKey</actiontype>
1.4478 + <actionbody>
1.4479 + <derivekey>
1.4480 + <kdf>pkcs#12</kdf>
1.4481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4482 + <salt>53414C54</salt>
1.4483 + <iterations>1024</iterations>
1.4484 + <key>406C92305ACD663AB0B9EB66DED79295</key>
1.4485 + </derivekey>
1.4486 + </actionbody>
1.4487 +</action>
1.4488 +
1.4489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4491 +//! @SYMREQ CIT_PREQ1054
1.4492 +//! @SYMTestPriority medium
1.4493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4495 +<action>
1.4496 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4497 + <actiontype>DeriveKey</actiontype>
1.4498 + <actionbody>
1.4499 + <derivekey>
1.4500 + <kdf>pkcs#12</kdf>
1.4501 + <passwd>0000</passwd>
1.4502 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4503 + <iterations>1024</iterations>
1.4504 + <key>E82BD75AA9467E0B8D92362A56CB5D73</key>
1.4505 + </derivekey>
1.4506 + </actionbody>
1.4507 +</action>
1.4508 +
1.4509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4511 +//! @SYMREQ CIT_PREQ1054
1.4512 +//! @SYMTestPriority medium
1.4513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4515 +<action>
1.4516 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4517 + <actiontype>DeriveKey</actiontype>
1.4518 + <actionbody>
1.4519 + <derivekey>
1.4520 + <kdf>pkcs#12</kdf>
1.4521 + <passwd>0001</passwd>
1.4522 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4523 + <iterations>1024</iterations>
1.4524 + <key>0182E41FCA166CEAED10972BDF5F57A8</key>
1.4525 + </derivekey>
1.4526 + </actionbody>
1.4527 +</action>
1.4528 +
1.4529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4531 +//! @SYMREQ CIT_PREQ1054
1.4532 +//! @SYMTestPriority medium
1.4533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4535 +<action>
1.4536 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4537 + <actiontype>DeriveKey</actiontype>
1.4538 + <actionbody>
1.4539 + <derivekey>
1.4540 + <kdf>pkcs#12</kdf>
1.4541 + <passwd>PSWD</passwd>
1.4542 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4543 + <iterations>1024</iterations>
1.4544 + <key>101FB775982CA15E37A065F7CDC5593D</key>
1.4545 + </derivekey>
1.4546 + </actionbody>
1.4547 +</action>
1.4548 +
1.4549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4551 +//! @SYMREQ CIT_PREQ1054
1.4552 +//! @SYMTestPriority medium
1.4553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4555 +<action>
1.4556 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4557 + <actiontype>DeriveKey</actiontype>
1.4558 + <actionbody>
1.4559 + <derivekey>
1.4560 + <kdf>pkcs#12</kdf>
1.4561 + <passwd>password</passwd>
1.4562 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4563 + <iterations>1024</iterations>
1.4564 + <key>D7499C6A1218C419A1F81AA5E3F41E88</key>
1.4565 + </derivekey>
1.4566 + </actionbody>
1.4567 +</action>
1.4568 +
1.4569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4571 +//! @SYMREQ CIT_PREQ1054
1.4572 +//! @SYMTestPriority medium
1.4573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4575 +<action>
1.4576 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4577 + <actiontype>DeriveKey</actiontype>
1.4578 + <actionbody>
1.4579 + <derivekey>
1.4580 + <kdf>pkcs#12</kdf>
1.4581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4582 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4583 + <iterations>1024</iterations>
1.4584 + <key>2C6222B8E2E97F63FFE9E2FC32D673FA</key>
1.4585 + </derivekey>
1.4586 + </actionbody>
1.4587 +</action>
1.4588 +
1.4589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4591 +//! @SYMREQ CIT_PREQ1054
1.4592 +//! @SYMTestPriority medium
1.4593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4595 +<action>
1.4596 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4597 + <actiontype>DeriveKey</actiontype>
1.4598 + <actionbody>
1.4599 + <derivekey>
1.4600 + <kdf>pkcs#12</kdf>
1.4601 + <passwd>0000</passwd>
1.4602 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4603 + <iterations>1024</iterations>
1.4604 + <key>6789F0680A5C5840B8ED34B061494171</key>
1.4605 + </derivekey>
1.4606 + </actionbody>
1.4607 +</action>
1.4608 +
1.4609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4611 +//! @SYMREQ CIT_PREQ1054
1.4612 +//! @SYMTestPriority medium
1.4613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4615 +<action>
1.4616 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4617 + <actiontype>DeriveKey</actiontype>
1.4618 + <actionbody>
1.4619 + <derivekey>
1.4620 + <kdf>pkcs#12</kdf>
1.4621 + <passwd>0001</passwd>
1.4622 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4623 + <iterations>1024</iterations>
1.4624 + <key>43E663725870C4801A917C41C9B58C41</key>
1.4625 + </derivekey>
1.4626 + </actionbody>
1.4627 +</action>
1.4628 +
1.4629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4631 +//! @SYMREQ CIT_PREQ1054
1.4632 +//! @SYMTestPriority medium
1.4633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4635 +<action>
1.4636 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4637 + <actiontype>DeriveKey</actiontype>
1.4638 + <actionbody>
1.4639 + <derivekey>
1.4640 + <kdf>pkcs#12</kdf>
1.4641 + <passwd>PSWD</passwd>
1.4642 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4643 + <iterations>1024</iterations>
1.4644 + <key>8B3308BDD5A8AE507200EAA16FE19D42</key>
1.4645 + </derivekey>
1.4646 + </actionbody>
1.4647 +</action>
1.4648 +
1.4649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4651 +//! @SYMREQ CIT_PREQ1054
1.4652 +//! @SYMTestPriority medium
1.4653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4655 +<action>
1.4656 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4657 + <actiontype>DeriveKey</actiontype>
1.4658 + <actionbody>
1.4659 + <derivekey>
1.4660 + <kdf>pkcs#12</kdf>
1.4661 + <passwd>password</passwd>
1.4662 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4663 + <iterations>1024</iterations>
1.4664 + <key>CA202602C9A265559B6B96729B574DAA</key>
1.4665 + </derivekey>
1.4666 + </actionbody>
1.4667 +</action>
1.4668 +
1.4669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4671 +//! @SYMREQ CIT_PREQ1054
1.4672 +//! @SYMTestPriority medium
1.4673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4675 +<action>
1.4676 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4677 + <actiontype>DeriveKey</actiontype>
1.4678 + <actionbody>
1.4679 + <derivekey>
1.4680 + <kdf>pkcs#12</kdf>
1.4681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4682 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4683 + <iterations>1024</iterations>
1.4684 + <key>F6A33ADA6A0F5990E9DA747550DE0941</key>
1.4685 + </derivekey>
1.4686 + </actionbody>
1.4687 +</action>
1.4688 +
1.4689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4691 +//! @SYMREQ CIT_PREQ1054
1.4692 +//! @SYMTestPriority medium
1.4693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4695 +<action>
1.4696 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4697 + <actiontype>DeriveKey</actiontype>
1.4698 + <actionbody>
1.4699 + <derivekey>
1.4700 + <kdf>pkcs#12</kdf>
1.4701 + <passwd>0000</passwd>
1.4702 + <salt>53414C54</salt>
1.4703 + <iterations>1536</iterations>
1.4704 + <key>79A4E1398F511B262E60DCFE9E838C93</key>
1.4705 + </derivekey>
1.4706 + </actionbody>
1.4707 +</action>
1.4708 +
1.4709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4711 +//! @SYMREQ CIT_PREQ1054
1.4712 +//! @SYMTestPriority medium
1.4713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4715 +<action>
1.4716 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4717 + <actiontype>DeriveKey</actiontype>
1.4718 + <actionbody>
1.4719 + <derivekey>
1.4720 + <kdf>pkcs#12</kdf>
1.4721 + <passwd>0001</passwd>
1.4722 + <salt>53414C54</salt>
1.4723 + <iterations>1536</iterations>
1.4724 + <key>6F2402CCE4A91C1B848CCABD915657A2</key>
1.4725 + </derivekey>
1.4726 + </actionbody>
1.4727 +</action>
1.4728 +
1.4729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4731 +//! @SYMREQ CIT_PREQ1054
1.4732 +//! @SYMTestPriority medium
1.4733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4735 +<action>
1.4736 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4737 + <actiontype>DeriveKey</actiontype>
1.4738 + <actionbody>
1.4739 + <derivekey>
1.4740 + <kdf>pkcs#12</kdf>
1.4741 + <passwd>PSWD</passwd>
1.4742 + <salt>53414C54</salt>
1.4743 + <iterations>1536</iterations>
1.4744 + <key>B9ED7B3135488439E78DF480AD845E7E</key>
1.4745 + </derivekey>
1.4746 + </actionbody>
1.4747 +</action>
1.4748 +
1.4749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4751 +//! @SYMREQ CIT_PREQ1054
1.4752 +//! @SYMTestPriority medium
1.4753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4755 +<action>
1.4756 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4757 + <actiontype>DeriveKey</actiontype>
1.4758 + <actionbody>
1.4759 + <derivekey>
1.4760 + <kdf>pkcs#12</kdf>
1.4761 + <passwd>password</passwd>
1.4762 + <salt>53414C54</salt>
1.4763 + <iterations>1536</iterations>
1.4764 + <key>65B27A78C72DFEEA6C92846330CE98C6</key>
1.4765 + </derivekey>
1.4766 + </actionbody>
1.4767 +</action>
1.4768 +
1.4769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4771 +//! @SYMREQ CIT_PREQ1054
1.4772 +//! @SYMTestPriority medium
1.4773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4775 +<action>
1.4776 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4777 + <actiontype>DeriveKey</actiontype>
1.4778 + <actionbody>
1.4779 + <derivekey>
1.4780 + <kdf>pkcs#12</kdf>
1.4781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4782 + <salt>53414C54</salt>
1.4783 + <iterations>1536</iterations>
1.4784 + <key>8F8FC96A3D958731780B50E843D6BB65</key>
1.4785 + </derivekey>
1.4786 + </actionbody>
1.4787 +</action>
1.4788 +
1.4789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4791 +//! @SYMREQ CIT_PREQ1054
1.4792 +//! @SYMTestPriority medium
1.4793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4795 +<action>
1.4796 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4797 + <actiontype>DeriveKey</actiontype>
1.4798 + <actionbody>
1.4799 + <derivekey>
1.4800 + <kdf>pkcs#12</kdf>
1.4801 + <passwd>0000</passwd>
1.4802 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4803 + <iterations>1536</iterations>
1.4804 + <key>642DDC3F4E11C3051D6CDED8DD898C4C</key>
1.4805 + </derivekey>
1.4806 + </actionbody>
1.4807 +</action>
1.4808 +
1.4809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4811 +//! @SYMREQ CIT_PREQ1054
1.4812 +//! @SYMTestPriority medium
1.4813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4815 +<action>
1.4816 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4817 + <actiontype>DeriveKey</actiontype>
1.4818 + <actionbody>
1.4819 + <derivekey>
1.4820 + <kdf>pkcs#12</kdf>
1.4821 + <passwd>0001</passwd>
1.4822 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4823 + <iterations>1536</iterations>
1.4824 + <key>0FE4BDC1000D1AC2F5E83A938A2BE2F1</key>
1.4825 + </derivekey>
1.4826 + </actionbody>
1.4827 +</action>
1.4828 +
1.4829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4831 +//! @SYMREQ CIT_PREQ1054
1.4832 +//! @SYMTestPriority medium
1.4833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4835 +<action>
1.4836 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4837 + <actiontype>DeriveKey</actiontype>
1.4838 + <actionbody>
1.4839 + <derivekey>
1.4840 + <kdf>pkcs#12</kdf>
1.4841 + <passwd>PSWD</passwd>
1.4842 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4843 + <iterations>1536</iterations>
1.4844 + <key>32D7F10C5EAA9961B590E8FE4561B9D5</key>
1.4845 + </derivekey>
1.4846 + </actionbody>
1.4847 +</action>
1.4848 +
1.4849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4851 +//! @SYMREQ CIT_PREQ1054
1.4852 +//! @SYMTestPriority medium
1.4853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4855 +<action>
1.4856 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4857 + <actiontype>DeriveKey</actiontype>
1.4858 + <actionbody>
1.4859 + <derivekey>
1.4860 + <kdf>pkcs#12</kdf>
1.4861 + <passwd>password</passwd>
1.4862 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4863 + <iterations>1536</iterations>
1.4864 + <key>C05FE26245C742CC01B23C655E5D934D</key>
1.4865 + </derivekey>
1.4866 + </actionbody>
1.4867 +</action>
1.4868 +
1.4869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4871 +//! @SYMREQ CIT_PREQ1054
1.4872 +//! @SYMTestPriority medium
1.4873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4875 +<action>
1.4876 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.4877 + <actiontype>DeriveKey</actiontype>
1.4878 + <actionbody>
1.4879 + <derivekey>
1.4880 + <kdf>pkcs#12</kdf>
1.4881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4882 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.4883 + <iterations>1536</iterations>
1.4884 + <key>818C967A8F742565CCA37CEA8C683FCC</key>
1.4885 + </derivekey>
1.4886 + </actionbody>
1.4887 +</action>
1.4888 +
1.4889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4891 +//! @SYMREQ CIT_PREQ1054
1.4892 +//! @SYMTestPriority medium
1.4893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4895 +<action>
1.4896 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4897 + <actiontype>DeriveKey</actiontype>
1.4898 + <actionbody>
1.4899 + <derivekey>
1.4900 + <kdf>pkcs#12</kdf>
1.4901 + <passwd>0000</passwd>
1.4902 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4903 + <iterations>1536</iterations>
1.4904 + <key>5301B5B2A1A6EB6832DC47F3A0850B56</key>
1.4905 + </derivekey>
1.4906 + </actionbody>
1.4907 +</action>
1.4908 +
1.4909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4911 +//! @SYMREQ CIT_PREQ1054
1.4912 +//! @SYMTestPriority medium
1.4913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4915 +<action>
1.4916 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4917 + <actiontype>DeriveKey</actiontype>
1.4918 + <actionbody>
1.4919 + <derivekey>
1.4920 + <kdf>pkcs#12</kdf>
1.4921 + <passwd>0001</passwd>
1.4922 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4923 + <iterations>1536</iterations>
1.4924 + <key>9CB5BD2394B268E13DCA91EE2BB0A39C</key>
1.4925 + </derivekey>
1.4926 + </actionbody>
1.4927 +</action>
1.4928 +
1.4929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4931 +//! @SYMREQ CIT_PREQ1054
1.4932 +//! @SYMTestPriority medium
1.4933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4935 +<action>
1.4936 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4937 + <actiontype>DeriveKey</actiontype>
1.4938 + <actionbody>
1.4939 + <derivekey>
1.4940 + <kdf>pkcs#12</kdf>
1.4941 + <passwd>PSWD</passwd>
1.4942 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4943 + <iterations>1536</iterations>
1.4944 + <key>EB90D956B358B7C5E9FC4A4EFA02589B</key>
1.4945 + </derivekey>
1.4946 + </actionbody>
1.4947 +</action>
1.4948 +
1.4949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4951 +//! @SYMREQ CIT_PREQ1054
1.4952 +//! @SYMTestPriority medium
1.4953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4955 +<action>
1.4956 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4957 + <actiontype>DeriveKey</actiontype>
1.4958 + <actionbody>
1.4959 + <derivekey>
1.4960 + <kdf>pkcs#12</kdf>
1.4961 + <passwd>password</passwd>
1.4962 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4963 + <iterations>1536</iterations>
1.4964 + <key>ACAFB5EB24FFB3B418587B832F52C226</key>
1.4965 + </derivekey>
1.4966 + </actionbody>
1.4967 +</action>
1.4968 +
1.4969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4971 +//! @SYMREQ CIT_PREQ1054
1.4972 +//! @SYMTestPriority medium
1.4973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4975 +<action>
1.4976 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.4977 + <actiontype>DeriveKey</actiontype>
1.4978 + <actionbody>
1.4979 + <derivekey>
1.4980 + <kdf>pkcs#12</kdf>
1.4981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.4982 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.4983 + <iterations>1536</iterations>
1.4984 + <key>A7B0859D9D1BF5E59047192BF2B8C7AC</key>
1.4985 + </derivekey>
1.4986 + </actionbody>
1.4987 +</action>
1.4988 +
1.4989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.4990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.4991 +//! @SYMREQ CIT_PREQ1054
1.4992 +//! @SYMTestPriority medium
1.4993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.4994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.4995 +<action>
1.4996 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.4997 + <actiontype>DeriveKey</actiontype>
1.4998 + <actionbody>
1.4999 + <derivekey>
1.5000 + <kdf>pkcs#12</kdf>
1.5001 + <passwd>0000</passwd>
1.5002 + <salt>53414C54</salt>
1.5003 + <iterations>2048</iterations>
1.5004 + <key>B0F0F2EB445AB4DBE901D3C248482259</key>
1.5005 + </derivekey>
1.5006 + </actionbody>
1.5007 +</action>
1.5008 +
1.5009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5011 +//! @SYMREQ CIT_PREQ1054
1.5012 +//! @SYMTestPriority medium
1.5013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5015 +<action>
1.5016 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.5017 + <actiontype>DeriveKey</actiontype>
1.5018 + <actionbody>
1.5019 + <derivekey>
1.5020 + <kdf>pkcs#12</kdf>
1.5021 + <passwd>0001</passwd>
1.5022 + <salt>53414C54</salt>
1.5023 + <iterations>2048</iterations>
1.5024 + <key>C11C0499CC9EC9FBB6ACA7BF4C0B5389</key>
1.5025 + </derivekey>
1.5026 + </actionbody>
1.5027 +</action>
1.5028 +
1.5029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5031 +//! @SYMREQ CIT_PREQ1054
1.5032 +//! @SYMTestPriority medium
1.5033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5035 +<action>
1.5036 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.5037 + <actiontype>DeriveKey</actiontype>
1.5038 + <actionbody>
1.5039 + <derivekey>
1.5040 + <kdf>pkcs#12</kdf>
1.5041 + <passwd>PSWD</passwd>
1.5042 + <salt>53414C54</salt>
1.5043 + <iterations>2048</iterations>
1.5044 + <key>3F63500AC41074B4D2C1A991CBBBB013</key>
1.5045 + </derivekey>
1.5046 + </actionbody>
1.5047 +</action>
1.5048 +
1.5049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5051 +//! @SYMREQ CIT_PREQ1054
1.5052 +//! @SYMTestPriority medium
1.5053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5055 +<action>
1.5056 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.5057 + <actiontype>DeriveKey</actiontype>
1.5058 + <actionbody>
1.5059 + <derivekey>
1.5060 + <kdf>pkcs#12</kdf>
1.5061 + <passwd>password</passwd>
1.5062 + <salt>53414C54</salt>
1.5063 + <iterations>2048</iterations>
1.5064 + <key>B47F802F1238A73054DEFD7D3AABFC81</key>
1.5065 + </derivekey>
1.5066 + </actionbody>
1.5067 +</action>
1.5068 +
1.5069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5071 +//! @SYMREQ CIT_PREQ1054
1.5072 +//! @SYMTestPriority medium
1.5073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5075 +<action>
1.5076 + <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
1.5077 + <actiontype>DeriveKey</actiontype>
1.5078 + <actionbody>
1.5079 + <derivekey>
1.5080 + <kdf>pkcs#12</kdf>
1.5081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5082 + <salt>53414C54</salt>
1.5083 + <iterations>2048</iterations>
1.5084 + <key>3099237692953AB2017A1BF0B12DAFC8</key>
1.5085 + </derivekey>
1.5086 + </actionbody>
1.5087 +</action>
1.5088 +
1.5089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5091 +//! @SYMREQ CIT_PREQ1054
1.5092 +//! @SYMTestPriority medium
1.5093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5095 +<action>
1.5096 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.5097 + <actiontype>DeriveKey</actiontype>
1.5098 + <actionbody>
1.5099 + <derivekey>
1.5100 + <kdf>pkcs#12</kdf>
1.5101 + <passwd>0000</passwd>
1.5102 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5103 + <iterations>2048</iterations>
1.5104 + <key>CD045229461658BC6C47C259F2D20433</key>
1.5105 + </derivekey>
1.5106 + </actionbody>
1.5107 +</action>
1.5108 +
1.5109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5111 +//! @SYMREQ CIT_PREQ1054
1.5112 +//! @SYMTestPriority medium
1.5113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5115 +<action>
1.5116 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.5117 + <actiontype>DeriveKey</actiontype>
1.5118 + <actionbody>
1.5119 + <derivekey>
1.5120 + <kdf>pkcs#12</kdf>
1.5121 + <passwd>0001</passwd>
1.5122 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5123 + <iterations>2048</iterations>
1.5124 + <key>D85432F8ACAE9653D34A68D9329F347A</key>
1.5125 + </derivekey>
1.5126 + </actionbody>
1.5127 +</action>
1.5128 +
1.5129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5131 +//! @SYMREQ CIT_PREQ1054
1.5132 +//! @SYMTestPriority medium
1.5133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5135 +<action>
1.5136 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.5137 + <actiontype>DeriveKey</actiontype>
1.5138 + <actionbody>
1.5139 + <derivekey>
1.5140 + <kdf>pkcs#12</kdf>
1.5141 + <passwd>PSWD</passwd>
1.5142 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5143 + <iterations>2048</iterations>
1.5144 + <key>C77FDE2E52892DF5613E6A3B8F1C80B9</key>
1.5145 + </derivekey>
1.5146 + </actionbody>
1.5147 +</action>
1.5148 +
1.5149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5151 +//! @SYMREQ CIT_PREQ1054
1.5152 +//! @SYMTestPriority medium
1.5153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5155 +<action>
1.5156 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.5157 + <actiontype>DeriveKey</actiontype>
1.5158 + <actionbody>
1.5159 + <derivekey>
1.5160 + <kdf>pkcs#12</kdf>
1.5161 + <passwd>password</passwd>
1.5162 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5163 + <iterations>2048</iterations>
1.5164 + <key>62E06B8A2650199AE6E73AB3F503BF02</key>
1.5165 + </derivekey>
1.5166 + </actionbody>
1.5167 +</action>
1.5168 +
1.5169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5171 +//! @SYMREQ CIT_PREQ1054
1.5172 +//! @SYMTestPriority medium
1.5173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5175 +<action>
1.5176 + <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
1.5177 + <actiontype>DeriveKey</actiontype>
1.5178 + <actionbody>
1.5179 + <derivekey>
1.5180 + <kdf>pkcs#12</kdf>
1.5181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5182 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5183 + <iterations>2048</iterations>
1.5184 + <key>A5B348EB4926290B223724CC8E4ED67F</key>
1.5185 + </derivekey>
1.5186 + </actionbody>
1.5187 +</action>
1.5188 +
1.5189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5191 +//! @SYMREQ CIT_PREQ1054
1.5192 +//! @SYMTestPriority medium
1.5193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5195 +<action>
1.5196 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.5197 + <actiontype>DeriveKey</actiontype>
1.5198 + <actionbody>
1.5199 + <derivekey>
1.5200 + <kdf>pkcs#12</kdf>
1.5201 + <passwd>0000</passwd>
1.5202 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5203 + <iterations>2048</iterations>
1.5204 + <key>2A824C1B6B36AD48D0A5AE94E27988D4</key>
1.5205 + </derivekey>
1.5206 + </actionbody>
1.5207 +</action>
1.5208 +
1.5209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5211 +//! @SYMREQ CIT_PREQ1054
1.5212 +//! @SYMTestPriority medium
1.5213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5215 +<action>
1.5216 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.5217 + <actiontype>DeriveKey</actiontype>
1.5218 + <actionbody>
1.5219 + <derivekey>
1.5220 + <kdf>pkcs#12</kdf>
1.5221 + <passwd>0001</passwd>
1.5222 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5223 + <iterations>2048</iterations>
1.5224 + <key>4B8D18B96EB898D1BAA8BDD82BC443F0</key>
1.5225 + </derivekey>
1.5226 + </actionbody>
1.5227 +</action>
1.5228 +
1.5229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5231 +//! @SYMREQ CIT_PREQ1054
1.5232 +//! @SYMTestPriority medium
1.5233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5235 +<action>
1.5236 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.5237 + <actiontype>DeriveKey</actiontype>
1.5238 + <actionbody>
1.5239 + <derivekey>
1.5240 + <kdf>pkcs#12</kdf>
1.5241 + <passwd>PSWD</passwd>
1.5242 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5243 + <iterations>2048</iterations>
1.5244 + <key>9DABF586AD2BCD603DC38C3987C98D73</key>
1.5245 + </derivekey>
1.5246 + </actionbody>
1.5247 +</action>
1.5248 +
1.5249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5251 +//! @SYMREQ CIT_PREQ1054
1.5252 +//! @SYMTestPriority medium
1.5253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5255 +<action>
1.5256 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.5257 + <actiontype>DeriveKey</actiontype>
1.5258 + <actionbody>
1.5259 + <derivekey>
1.5260 + <kdf>pkcs#12</kdf>
1.5261 + <passwd>password</passwd>
1.5262 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5263 + <iterations>2048</iterations>
1.5264 + <key>F734BE1BF990A3A59CEA6C821492F0B6</key>
1.5265 + </derivekey>
1.5266 + </actionbody>
1.5267 +</action>
1.5268 +
1.5269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5271 +//! @SYMREQ CIT_PREQ1054
1.5272 +//! @SYMTestPriority medium
1.5273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5275 +<action>
1.5276 + <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
1.5277 + <actiontype>DeriveKey</actiontype>
1.5278 + <actionbody>
1.5279 + <derivekey>
1.5280 + <kdf>pkcs#12</kdf>
1.5281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5282 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5283 + <iterations>2048</iterations>
1.5284 + <key>47C18634A09AB37AB6EECBCD5C7E7F23</key>
1.5285 + </derivekey>
1.5286 + </actionbody>
1.5287 +</action>
1.5288 +
1.5289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5291 +//! @SYMREQ CIT_PREQ1054
1.5292 +//! @SYMTestPriority medium
1.5293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5295 +<action>
1.5296 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5297 + <actiontype>DeriveKey</actiontype>
1.5298 + <actionbody>
1.5299 + <derivekey>
1.5300 + <kdf>pkcs#12</kdf>
1.5301 + <passwd>0000</passwd>
1.5302 + <salt>53414C54</salt>
1.5303 + <iterations>1</iterations>
1.5304 + <key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7</key>
1.5305 + </derivekey>
1.5306 + </actionbody>
1.5307 +</action>
1.5308 +
1.5309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5311 +//! @SYMREQ CIT_PREQ1054
1.5312 +//! @SYMTestPriority medium
1.5313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5315 +<action>
1.5316 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5317 + <actiontype>DeriveKey</actiontype>
1.5318 + <actionbody>
1.5319 + <derivekey>
1.5320 + <kdf>pkcs#12</kdf>
1.5321 + <passwd>0001</passwd>
1.5322 + <salt>53414C54</salt>
1.5323 + <iterations>1</iterations>
1.5324 + <key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B</key>
1.5325 + </derivekey>
1.5326 + </actionbody>
1.5327 +</action>
1.5328 +
1.5329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5331 +//! @SYMREQ CIT_PREQ1054
1.5332 +//! @SYMTestPriority medium
1.5333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5335 +<action>
1.5336 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5337 + <actiontype>DeriveKey</actiontype>
1.5338 + <actionbody>
1.5339 + <derivekey>
1.5340 + <kdf>pkcs#12</kdf>
1.5341 + <passwd>PSWD</passwd>
1.5342 + <salt>53414C54</salt>
1.5343 + <iterations>1</iterations>
1.5344 + <key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB09599</key>
1.5345 + </derivekey>
1.5346 + </actionbody>
1.5347 +</action>
1.5348 +
1.5349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5351 +//! @SYMREQ CIT_PREQ1054
1.5352 +//! @SYMTestPriority medium
1.5353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5355 +<action>
1.5356 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5357 + <actiontype>DeriveKey</actiontype>
1.5358 + <actionbody>
1.5359 + <derivekey>
1.5360 + <kdf>pkcs#12</kdf>
1.5361 + <passwd>password</passwd>
1.5362 + <salt>53414C54</salt>
1.5363 + <iterations>1</iterations>
1.5364 + <key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C5</key>
1.5365 + </derivekey>
1.5366 + </actionbody>
1.5367 +</action>
1.5368 +
1.5369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5371 +//! @SYMREQ CIT_PREQ1054
1.5372 +//! @SYMTestPriority medium
1.5373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5375 +<action>
1.5376 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5377 + <actiontype>DeriveKey</actiontype>
1.5378 + <actionbody>
1.5379 + <derivekey>
1.5380 + <kdf>pkcs#12</kdf>
1.5381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5382 + <salt>53414C54</salt>
1.5383 + <iterations>1</iterations>
1.5384 + <key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A</key>
1.5385 + </derivekey>
1.5386 + </actionbody>
1.5387 +</action>
1.5388 +
1.5389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5391 +//! @SYMREQ CIT_PREQ1054
1.5392 +//! @SYMTestPriority medium
1.5393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5395 +<action>
1.5396 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5397 + <actiontype>DeriveKey</actiontype>
1.5398 + <actionbody>
1.5399 + <derivekey>
1.5400 + <kdf>pkcs#12</kdf>
1.5401 + <passwd>0000</passwd>
1.5402 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5403 + <iterations>1</iterations>
1.5404 + <key>49CABE7B67736931126499722509C03D4BBEF714A8</key>
1.5405 + </derivekey>
1.5406 + </actionbody>
1.5407 +</action>
1.5408 +
1.5409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5411 +//! @SYMREQ CIT_PREQ1054
1.5412 +//! @SYMTestPriority medium
1.5413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5415 +<action>
1.5416 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5417 + <actiontype>DeriveKey</actiontype>
1.5418 + <actionbody>
1.5419 + <derivekey>
1.5420 + <kdf>pkcs#12</kdf>
1.5421 + <passwd>0001</passwd>
1.5422 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5423 + <iterations>1</iterations>
1.5424 + <key>F994B990D3554AFB778C729E9BAA0CC6EB5BA76534</key>
1.5425 + </derivekey>
1.5426 + </actionbody>
1.5427 +</action>
1.5428 +
1.5429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5431 +//! @SYMREQ CIT_PREQ1054
1.5432 +//! @SYMTestPriority medium
1.5433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5435 +<action>
1.5436 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5437 + <actiontype>DeriveKey</actiontype>
1.5438 + <actionbody>
1.5439 + <derivekey>
1.5440 + <kdf>pkcs#12</kdf>
1.5441 + <passwd>PSWD</passwd>
1.5442 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5443 + <iterations>1</iterations>
1.5444 + <key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC024</key>
1.5445 + </derivekey>
1.5446 + </actionbody>
1.5447 +</action>
1.5448 +
1.5449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5451 +//! @SYMREQ CIT_PREQ1054
1.5452 +//! @SYMTestPriority medium
1.5453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5455 +<action>
1.5456 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5457 + <actiontype>DeriveKey</actiontype>
1.5458 + <actionbody>
1.5459 + <derivekey>
1.5460 + <kdf>pkcs#12</kdf>
1.5461 + <passwd>password</passwd>
1.5462 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5463 + <iterations>1</iterations>
1.5464 + <key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888</key>
1.5465 + </derivekey>
1.5466 + </actionbody>
1.5467 +</action>
1.5468 +
1.5469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5471 +//! @SYMREQ CIT_PREQ1054
1.5472 +//! @SYMTestPriority medium
1.5473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5475 +<action>
1.5476 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5477 + <actiontype>DeriveKey</actiontype>
1.5478 + <actionbody>
1.5479 + <derivekey>
1.5480 + <kdf>pkcs#12</kdf>
1.5481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5482 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5483 + <iterations>1</iterations>
1.5484 + <key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B</key>
1.5485 + </derivekey>
1.5486 + </actionbody>
1.5487 +</action>
1.5488 +
1.5489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5491 +//! @SYMREQ CIT_PREQ1054
1.5492 +//! @SYMTestPriority medium
1.5493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5495 +<action>
1.5496 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5497 + <actiontype>DeriveKey</actiontype>
1.5498 + <actionbody>
1.5499 + <derivekey>
1.5500 + <kdf>pkcs#12</kdf>
1.5501 + <passwd>0000</passwd>
1.5502 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5503 + <iterations>1</iterations>
1.5504 + <key>90253A49C069E7FF35281461A4DDBE0BB38F4041A0</key>
1.5505 + </derivekey>
1.5506 + </actionbody>
1.5507 +</action>
1.5508 +
1.5509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5511 +//! @SYMREQ CIT_PREQ1054
1.5512 +//! @SYMTestPriority medium
1.5513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5515 +<action>
1.5516 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5517 + <actiontype>DeriveKey</actiontype>
1.5518 + <actionbody>
1.5519 + <derivekey>
1.5520 + <kdf>pkcs#12</kdf>
1.5521 + <passwd>0001</passwd>
1.5522 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5523 + <iterations>1</iterations>
1.5524 + <key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8</key>
1.5525 + </derivekey>
1.5526 + </actionbody>
1.5527 +</action>
1.5528 +
1.5529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5531 +//! @SYMREQ CIT_PREQ1054
1.5532 +//! @SYMTestPriority medium
1.5533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5535 +<action>
1.5536 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5537 + <actiontype>DeriveKey</actiontype>
1.5538 + <actionbody>
1.5539 + <derivekey>
1.5540 + <kdf>pkcs#12</kdf>
1.5541 + <passwd>PSWD</passwd>
1.5542 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5543 + <iterations>1</iterations>
1.5544 + <key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC8</key>
1.5545 + </derivekey>
1.5546 + </actionbody>
1.5547 +</action>
1.5548 +
1.5549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5551 +//! @SYMREQ CIT_PREQ1054
1.5552 +//! @SYMTestPriority medium
1.5553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5555 +<action>
1.5556 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5557 + <actiontype>DeriveKey</actiontype>
1.5558 + <actionbody>
1.5559 + <derivekey>
1.5560 + <kdf>pkcs#12</kdf>
1.5561 + <passwd>password</passwd>
1.5562 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5563 + <iterations>1</iterations>
1.5564 + <key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C1</key>
1.5565 + </derivekey>
1.5566 + </actionbody>
1.5567 +</action>
1.5568 +
1.5569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5571 +//! @SYMREQ CIT_PREQ1054
1.5572 +//! @SYMTestPriority medium
1.5573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5575 +<action>
1.5576 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5577 + <actiontype>DeriveKey</actiontype>
1.5578 + <actionbody>
1.5579 + <derivekey>
1.5580 + <kdf>pkcs#12</kdf>
1.5581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5582 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5583 + <iterations>1</iterations>
1.5584 + <key>27476572AF26E99AB85CD350DC802ABA3A831332A7</key>
1.5585 + </derivekey>
1.5586 + </actionbody>
1.5587 +</action>
1.5588 +
1.5589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5591 +//! @SYMREQ CIT_PREQ1054
1.5592 +//! @SYMTestPriority medium
1.5593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5595 +<action>
1.5596 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5597 + <actiontype>DeriveKey</actiontype>
1.5598 + <actionbody>
1.5599 + <derivekey>
1.5600 + <kdf>pkcs#12</kdf>
1.5601 + <passwd>0000</passwd>
1.5602 + <salt>53414C54</salt>
1.5603 + <iterations>2</iterations>
1.5604 + <key>A1D9010A6761CB2675F1C33BB3C5215851703D0D26</key>
1.5605 + </derivekey>
1.5606 + </actionbody>
1.5607 +</action>
1.5608 +
1.5609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5611 +//! @SYMREQ CIT_PREQ1054
1.5612 +//! @SYMTestPriority medium
1.5613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5615 +<action>
1.5616 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5617 + <actiontype>DeriveKey</actiontype>
1.5618 + <actionbody>
1.5619 + <derivekey>
1.5620 + <kdf>pkcs#12</kdf>
1.5621 + <passwd>0001</passwd>
1.5622 + <salt>53414C54</salt>
1.5623 + <iterations>2</iterations>
1.5624 + <key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47</key>
1.5625 + </derivekey>
1.5626 + </actionbody>
1.5627 +</action>
1.5628 +
1.5629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5631 +//! @SYMREQ CIT_PREQ1054
1.5632 +//! @SYMTestPriority medium
1.5633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5635 +<action>
1.5636 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5637 + <actiontype>DeriveKey</actiontype>
1.5638 + <actionbody>
1.5639 + <derivekey>
1.5640 + <kdf>pkcs#12</kdf>
1.5641 + <passwd>PSWD</passwd>
1.5642 + <salt>53414C54</salt>
1.5643 + <iterations>2</iterations>
1.5644 + <key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE3</key>
1.5645 + </derivekey>
1.5646 + </actionbody>
1.5647 +</action>
1.5648 +
1.5649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5651 +//! @SYMREQ CIT_PREQ1054
1.5652 +//! @SYMTestPriority medium
1.5653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5655 +<action>
1.5656 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5657 + <actiontype>DeriveKey</actiontype>
1.5658 + <actionbody>
1.5659 + <derivekey>
1.5660 + <kdf>pkcs#12</kdf>
1.5661 + <passwd>password</passwd>
1.5662 + <salt>53414C54</salt>
1.5663 + <iterations>2</iterations>
1.5664 + <key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A</key>
1.5665 + </derivekey>
1.5666 + </actionbody>
1.5667 +</action>
1.5668 +
1.5669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5671 +//! @SYMREQ CIT_PREQ1054
1.5672 +//! @SYMTestPriority medium
1.5673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5675 +<action>
1.5676 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5677 + <actiontype>DeriveKey</actiontype>
1.5678 + <actionbody>
1.5679 + <derivekey>
1.5680 + <kdf>pkcs#12</kdf>
1.5681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5682 + <salt>53414C54</salt>
1.5683 + <iterations>2</iterations>
1.5684 + <key>5BF185C726EE2182888A834066C30BA92C0A6A140F</key>
1.5685 + </derivekey>
1.5686 + </actionbody>
1.5687 +</action>
1.5688 +
1.5689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5691 +//! @SYMREQ CIT_PREQ1054
1.5692 +//! @SYMTestPriority medium
1.5693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5695 +<action>
1.5696 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5697 + <actiontype>DeriveKey</actiontype>
1.5698 + <actionbody>
1.5699 + <derivekey>
1.5700 + <kdf>pkcs#12</kdf>
1.5701 + <passwd>0000</passwd>
1.5702 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5703 + <iterations>2</iterations>
1.5704 + <key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734</key>
1.5705 + </derivekey>
1.5706 + </actionbody>
1.5707 +</action>
1.5708 +
1.5709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5711 +//! @SYMREQ CIT_PREQ1054
1.5712 +//! @SYMTestPriority medium
1.5713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5715 +<action>
1.5716 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5717 + <actiontype>DeriveKey</actiontype>
1.5718 + <actionbody>
1.5719 + <derivekey>
1.5720 + <kdf>pkcs#12</kdf>
1.5721 + <passwd>0001</passwd>
1.5722 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5723 + <iterations>2</iterations>
1.5724 + <key>63E6DF459C899D72577C20FFE4F27670F3A85EA780</key>
1.5725 + </derivekey>
1.5726 + </actionbody>
1.5727 +</action>
1.5728 +
1.5729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5731 +//! @SYMREQ CIT_PREQ1054
1.5732 +//! @SYMTestPriority medium
1.5733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5735 +<action>
1.5736 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5737 + <actiontype>DeriveKey</actiontype>
1.5738 + <actionbody>
1.5739 + <derivekey>
1.5740 + <kdf>pkcs#12</kdf>
1.5741 + <passwd>PSWD</passwd>
1.5742 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5743 + <iterations>2</iterations>
1.5744 + <key>C2099204ABFBB841875BD7595A89D31A9D03A34B94</key>
1.5745 + </derivekey>
1.5746 + </actionbody>
1.5747 +</action>
1.5748 +
1.5749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5751 +//! @SYMREQ CIT_PREQ1054
1.5752 +//! @SYMTestPriority medium
1.5753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5755 +<action>
1.5756 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5757 + <actiontype>DeriveKey</actiontype>
1.5758 + <actionbody>
1.5759 + <derivekey>
1.5760 + <kdf>pkcs#12</kdf>
1.5761 + <passwd>password</passwd>
1.5762 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5763 + <iterations>2</iterations>
1.5764 + <key>3204D28A32DF299B612958906C79154AED69D3F1C0</key>
1.5765 + </derivekey>
1.5766 + </actionbody>
1.5767 +</action>
1.5768 +
1.5769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5771 +//! @SYMREQ CIT_PREQ1054
1.5772 +//! @SYMTestPriority medium
1.5773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5775 +<action>
1.5776 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5777 + <actiontype>DeriveKey</actiontype>
1.5778 + <actionbody>
1.5779 + <derivekey>
1.5780 + <kdf>pkcs#12</kdf>
1.5781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5782 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.5783 + <iterations>2</iterations>
1.5784 + <key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04</key>
1.5785 + </derivekey>
1.5786 + </actionbody>
1.5787 +</action>
1.5788 +
1.5789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5791 +//! @SYMREQ CIT_PREQ1054
1.5792 +//! @SYMTestPriority medium
1.5793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5795 +<action>
1.5796 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5797 + <actiontype>DeriveKey</actiontype>
1.5798 + <actionbody>
1.5799 + <derivekey>
1.5800 + <kdf>pkcs#12</kdf>
1.5801 + <passwd>0000</passwd>
1.5802 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5803 + <iterations>2</iterations>
1.5804 + <key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11</key>
1.5805 + </derivekey>
1.5806 + </actionbody>
1.5807 +</action>
1.5808 +
1.5809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5811 +//! @SYMREQ CIT_PREQ1054
1.5812 +//! @SYMTestPriority medium
1.5813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5815 +<action>
1.5816 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5817 + <actiontype>DeriveKey</actiontype>
1.5818 + <actionbody>
1.5819 + <derivekey>
1.5820 + <kdf>pkcs#12</kdf>
1.5821 + <passwd>0001</passwd>
1.5822 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5823 + <iterations>2</iterations>
1.5824 + <key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC</key>
1.5825 + </derivekey>
1.5826 + </actionbody>
1.5827 +</action>
1.5828 +
1.5829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5831 +//! @SYMREQ CIT_PREQ1054
1.5832 +//! @SYMTestPriority medium
1.5833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5835 +<action>
1.5836 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5837 + <actiontype>DeriveKey</actiontype>
1.5838 + <actionbody>
1.5839 + <derivekey>
1.5840 + <kdf>pkcs#12</kdf>
1.5841 + <passwd>PSWD</passwd>
1.5842 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5843 + <iterations>2</iterations>
1.5844 + <key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F</key>
1.5845 + </derivekey>
1.5846 + </actionbody>
1.5847 +</action>
1.5848 +
1.5849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5851 +//! @SYMREQ CIT_PREQ1054
1.5852 +//! @SYMTestPriority medium
1.5853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5855 +<action>
1.5856 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5857 + <actiontype>DeriveKey</actiontype>
1.5858 + <actionbody>
1.5859 + <derivekey>
1.5860 + <kdf>pkcs#12</kdf>
1.5861 + <passwd>password</passwd>
1.5862 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5863 + <iterations>2</iterations>
1.5864 + <key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDF</key>
1.5865 + </derivekey>
1.5866 + </actionbody>
1.5867 +</action>
1.5868 +
1.5869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5871 +//! @SYMREQ CIT_PREQ1054
1.5872 +//! @SYMTestPriority medium
1.5873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5875 +<action>
1.5876 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.5877 + <actiontype>DeriveKey</actiontype>
1.5878 + <actionbody>
1.5879 + <derivekey>
1.5880 + <kdf>pkcs#12</kdf>
1.5881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5882 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.5883 + <iterations>2</iterations>
1.5884 + <key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647</key>
1.5885 + </derivekey>
1.5886 + </actionbody>
1.5887 +</action>
1.5888 +
1.5889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5891 +//! @SYMREQ CIT_PREQ1054
1.5892 +//! @SYMTestPriority medium
1.5893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5895 +<action>
1.5896 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5897 + <actiontype>DeriveKey</actiontype>
1.5898 + <actionbody>
1.5899 + <derivekey>
1.5900 + <kdf>pkcs#12</kdf>
1.5901 + <passwd>0000</passwd>
1.5902 + <salt>53414C54</salt>
1.5903 + <iterations>4</iterations>
1.5904 + <key>D0158BFC57E643965DC161741725CE9478CDF2A0B5</key>
1.5905 + </derivekey>
1.5906 + </actionbody>
1.5907 +</action>
1.5908 +
1.5909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5911 +//! @SYMREQ CIT_PREQ1054
1.5912 +//! @SYMTestPriority medium
1.5913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5915 +<action>
1.5916 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5917 + <actiontype>DeriveKey</actiontype>
1.5918 + <actionbody>
1.5919 + <derivekey>
1.5920 + <kdf>pkcs#12</kdf>
1.5921 + <passwd>0001</passwd>
1.5922 + <salt>53414C54</salt>
1.5923 + <iterations>4</iterations>
1.5924 + <key>AEB6CD53F0D6830161100C4BFD439B341066339A00</key>
1.5925 + </derivekey>
1.5926 + </actionbody>
1.5927 +</action>
1.5928 +
1.5929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5931 +//! @SYMREQ CIT_PREQ1054
1.5932 +//! @SYMTestPriority medium
1.5933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5935 +<action>
1.5936 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5937 + <actiontype>DeriveKey</actiontype>
1.5938 + <actionbody>
1.5939 + <derivekey>
1.5940 + <kdf>pkcs#12</kdf>
1.5941 + <passwd>PSWD</passwd>
1.5942 + <salt>53414C54</salt>
1.5943 + <iterations>4</iterations>
1.5944 + <key>80010C12B66CC739F4ACF8BB154197709F78AAD39A</key>
1.5945 + </derivekey>
1.5946 + </actionbody>
1.5947 +</action>
1.5948 +
1.5949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5951 +//! @SYMREQ CIT_PREQ1054
1.5952 +//! @SYMTestPriority medium
1.5953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5955 +<action>
1.5956 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5957 + <actiontype>DeriveKey</actiontype>
1.5958 + <actionbody>
1.5959 + <derivekey>
1.5960 + <kdf>pkcs#12</kdf>
1.5961 + <passwd>password</passwd>
1.5962 + <salt>53414C54</salt>
1.5963 + <iterations>4</iterations>
1.5964 + <key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812</key>
1.5965 + </derivekey>
1.5966 + </actionbody>
1.5967 +</action>
1.5968 +
1.5969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5971 +//! @SYMREQ CIT_PREQ1054
1.5972 +//! @SYMTestPriority medium
1.5973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5975 +<action>
1.5976 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.5977 + <actiontype>DeriveKey</actiontype>
1.5978 + <actionbody>
1.5979 + <derivekey>
1.5980 + <kdf>pkcs#12</kdf>
1.5981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.5982 + <salt>53414C54</salt>
1.5983 + <iterations>4</iterations>
1.5984 + <key>146C6A5B58AF8561220DE4C13A133248300D59D39E</key>
1.5985 + </derivekey>
1.5986 + </actionbody>
1.5987 +</action>
1.5988 +
1.5989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.5990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.5991 +//! @SYMREQ CIT_PREQ1054
1.5992 +//! @SYMTestPriority medium
1.5993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.5994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.5995 +<action>
1.5996 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.5997 + <actiontype>DeriveKey</actiontype>
1.5998 + <actionbody>
1.5999 + <derivekey>
1.6000 + <kdf>pkcs#12</kdf>
1.6001 + <passwd>0000</passwd>
1.6002 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6003 + <iterations>4</iterations>
1.6004 + <key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE</key>
1.6005 + </derivekey>
1.6006 + </actionbody>
1.6007 +</action>
1.6008 +
1.6009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6011 +//! @SYMREQ CIT_PREQ1054
1.6012 +//! @SYMTestPriority medium
1.6013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6015 +<action>
1.6016 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6017 + <actiontype>DeriveKey</actiontype>
1.6018 + <actionbody>
1.6019 + <derivekey>
1.6020 + <kdf>pkcs#12</kdf>
1.6021 + <passwd>0001</passwd>
1.6022 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6023 + <iterations>4</iterations>
1.6024 + <key>23930713772E26DBBABB53F3C5C775019B8048482B</key>
1.6025 + </derivekey>
1.6026 + </actionbody>
1.6027 +</action>
1.6028 +
1.6029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6031 +//! @SYMREQ CIT_PREQ1054
1.6032 +//! @SYMTestPriority medium
1.6033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6035 +<action>
1.6036 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6037 + <actiontype>DeriveKey</actiontype>
1.6038 + <actionbody>
1.6039 + <derivekey>
1.6040 + <kdf>pkcs#12</kdf>
1.6041 + <passwd>PSWD</passwd>
1.6042 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6043 + <iterations>4</iterations>
1.6044 + <key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A</key>
1.6045 + </derivekey>
1.6046 + </actionbody>
1.6047 +</action>
1.6048 +
1.6049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6051 +//! @SYMREQ CIT_PREQ1054
1.6052 +//! @SYMTestPriority medium
1.6053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6055 +<action>
1.6056 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6057 + <actiontype>DeriveKey</actiontype>
1.6058 + <actionbody>
1.6059 + <derivekey>
1.6060 + <kdf>pkcs#12</kdf>
1.6061 + <passwd>password</passwd>
1.6062 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6063 + <iterations>4</iterations>
1.6064 + <key>363619530B170B7BAE1C046B29351C235B8EFED588</key>
1.6065 + </derivekey>
1.6066 + </actionbody>
1.6067 +</action>
1.6068 +
1.6069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6071 +//! @SYMREQ CIT_PREQ1054
1.6072 +//! @SYMTestPriority medium
1.6073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6075 +<action>
1.6076 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6077 + <actiontype>DeriveKey</actiontype>
1.6078 + <actionbody>
1.6079 + <derivekey>
1.6080 + <kdf>pkcs#12</kdf>
1.6081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6082 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6083 + <iterations>4</iterations>
1.6084 + <key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4E</key>
1.6085 + </derivekey>
1.6086 + </actionbody>
1.6087 +</action>
1.6088 +
1.6089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6091 +//! @SYMREQ CIT_PREQ1054
1.6092 +//! @SYMTestPriority medium
1.6093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6095 +<action>
1.6096 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6097 + <actiontype>DeriveKey</actiontype>
1.6098 + <actionbody>
1.6099 + <derivekey>
1.6100 + <kdf>pkcs#12</kdf>
1.6101 + <passwd>0000</passwd>
1.6102 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6103 + <iterations>4</iterations>
1.6104 + <key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0E</key>
1.6105 + </derivekey>
1.6106 + </actionbody>
1.6107 +</action>
1.6108 +
1.6109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6111 +//! @SYMREQ CIT_PREQ1054
1.6112 +//! @SYMTestPriority medium
1.6113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6115 +<action>
1.6116 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6117 + <actiontype>DeriveKey</actiontype>
1.6118 + <actionbody>
1.6119 + <derivekey>
1.6120 + <kdf>pkcs#12</kdf>
1.6121 + <passwd>0001</passwd>
1.6122 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6123 + <iterations>4</iterations>
1.6124 + <key>9A618595C714486B7D7E3120005C8BC18D5D95D79B</key>
1.6125 + </derivekey>
1.6126 + </actionbody>
1.6127 +</action>
1.6128 +
1.6129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6131 +//! @SYMREQ CIT_PREQ1054
1.6132 +//! @SYMTestPriority medium
1.6133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6135 +<action>
1.6136 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6137 + <actiontype>DeriveKey</actiontype>
1.6138 + <actionbody>
1.6139 + <derivekey>
1.6140 + <kdf>pkcs#12</kdf>
1.6141 + <passwd>PSWD</passwd>
1.6142 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6143 + <iterations>4</iterations>
1.6144 + <key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208</key>
1.6145 + </derivekey>
1.6146 + </actionbody>
1.6147 +</action>
1.6148 +
1.6149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6151 +//! @SYMREQ CIT_PREQ1054
1.6152 +//! @SYMTestPriority medium
1.6153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6155 +<action>
1.6156 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6157 + <actiontype>DeriveKey</actiontype>
1.6158 + <actionbody>
1.6159 + <derivekey>
1.6160 + <kdf>pkcs#12</kdf>
1.6161 + <passwd>password</passwd>
1.6162 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6163 + <iterations>4</iterations>
1.6164 + <key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2</key>
1.6165 + </derivekey>
1.6166 + </actionbody>
1.6167 +</action>
1.6168 +
1.6169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6171 +//! @SYMREQ CIT_PREQ1054
1.6172 +//! @SYMTestPriority medium
1.6173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6175 +<action>
1.6176 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6177 + <actiontype>DeriveKey</actiontype>
1.6178 + <actionbody>
1.6179 + <derivekey>
1.6180 + <kdf>pkcs#12</kdf>
1.6181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6182 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6183 + <iterations>4</iterations>
1.6184 + <key>91DF3661364A0DAD28180A41ADCB55676E992986EF</key>
1.6185 + </derivekey>
1.6186 + </actionbody>
1.6187 +</action>
1.6188 +
1.6189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6191 +//! @SYMREQ CIT_PREQ1054
1.6192 +//! @SYMTestPriority medium
1.6193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6195 +<action>
1.6196 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6197 + <actiontype>DeriveKey</actiontype>
1.6198 + <actionbody>
1.6199 + <derivekey>
1.6200 + <kdf>pkcs#12</kdf>
1.6201 + <passwd>0000</passwd>
1.6202 + <salt>53414C54</salt>
1.6203 + <iterations>8</iterations>
1.6204 + <key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE461</key>
1.6205 + </derivekey>
1.6206 + </actionbody>
1.6207 +</action>
1.6208 +
1.6209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6211 +//! @SYMREQ CIT_PREQ1054
1.6212 +//! @SYMTestPriority medium
1.6213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6215 +<action>
1.6216 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6217 + <actiontype>DeriveKey</actiontype>
1.6218 + <actionbody>
1.6219 + <derivekey>
1.6220 + <kdf>pkcs#12</kdf>
1.6221 + <passwd>0001</passwd>
1.6222 + <salt>53414C54</salt>
1.6223 + <iterations>8</iterations>
1.6224 + <key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1</key>
1.6225 + </derivekey>
1.6226 + </actionbody>
1.6227 +</action>
1.6228 +
1.6229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6231 +//! @SYMREQ CIT_PREQ1054
1.6232 +//! @SYMTestPriority medium
1.6233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6235 +<action>
1.6236 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6237 + <actiontype>DeriveKey</actiontype>
1.6238 + <actionbody>
1.6239 + <derivekey>
1.6240 + <kdf>pkcs#12</kdf>
1.6241 + <passwd>PSWD</passwd>
1.6242 + <salt>53414C54</salt>
1.6243 + <iterations>8</iterations>
1.6244 + <key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466</key>
1.6245 + </derivekey>
1.6246 + </actionbody>
1.6247 +</action>
1.6248 +
1.6249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6251 +//! @SYMREQ CIT_PREQ1054
1.6252 +//! @SYMTestPriority medium
1.6253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6255 +<action>
1.6256 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6257 + <actiontype>DeriveKey</actiontype>
1.6258 + <actionbody>
1.6259 + <derivekey>
1.6260 + <kdf>pkcs#12</kdf>
1.6261 + <passwd>password</passwd>
1.6262 + <salt>53414C54</salt>
1.6263 + <iterations>8</iterations>
1.6264 + <key>B0935F11227F5A473073DCD188886687D2A1811953</key>
1.6265 + </derivekey>
1.6266 + </actionbody>
1.6267 +</action>
1.6268 +
1.6269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6271 +//! @SYMREQ CIT_PREQ1054
1.6272 +//! @SYMTestPriority medium
1.6273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6275 +<action>
1.6276 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6277 + <actiontype>DeriveKey</actiontype>
1.6278 + <actionbody>
1.6279 + <derivekey>
1.6280 + <kdf>pkcs#12</kdf>
1.6281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6282 + <salt>53414C54</salt>
1.6283 + <iterations>8</iterations>
1.6284 + <key>6602B1B4BBB670208041ECD8E1634845FC0DC28532</key>
1.6285 + </derivekey>
1.6286 + </actionbody>
1.6287 +</action>
1.6288 +
1.6289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6291 +//! @SYMREQ CIT_PREQ1054
1.6292 +//! @SYMTestPriority medium
1.6293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6295 +<action>
1.6296 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6297 + <actiontype>DeriveKey</actiontype>
1.6298 + <actionbody>
1.6299 + <derivekey>
1.6300 + <kdf>pkcs#12</kdf>
1.6301 + <passwd>0000</passwd>
1.6302 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6303 + <iterations>8</iterations>
1.6304 + <key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E44</key>
1.6305 + </derivekey>
1.6306 + </actionbody>
1.6307 +</action>
1.6308 +
1.6309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6311 +//! @SYMREQ CIT_PREQ1054
1.6312 +//! @SYMTestPriority medium
1.6313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6315 +<action>
1.6316 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6317 + <actiontype>DeriveKey</actiontype>
1.6318 + <actionbody>
1.6319 + <derivekey>
1.6320 + <kdf>pkcs#12</kdf>
1.6321 + <passwd>0001</passwd>
1.6322 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6323 + <iterations>8</iterations>
1.6324 + <key>6473EB1244E055149E0858C49FAE7B8DC951E7E32A</key>
1.6325 + </derivekey>
1.6326 + </actionbody>
1.6327 +</action>
1.6328 +
1.6329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6331 +//! @SYMREQ CIT_PREQ1054
1.6332 +//! @SYMTestPriority medium
1.6333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6335 +<action>
1.6336 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6337 + <actiontype>DeriveKey</actiontype>
1.6338 + <actionbody>
1.6339 + <derivekey>
1.6340 + <kdf>pkcs#12</kdf>
1.6341 + <passwd>PSWD</passwd>
1.6342 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6343 + <iterations>8</iterations>
1.6344 + <key>AA762B8736D4C37BAD263103CA283E09010B7EFC53</key>
1.6345 + </derivekey>
1.6346 + </actionbody>
1.6347 +</action>
1.6348 +
1.6349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6351 +//! @SYMREQ CIT_PREQ1054
1.6352 +//! @SYMTestPriority medium
1.6353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6355 +<action>
1.6356 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6357 + <actiontype>DeriveKey</actiontype>
1.6358 + <actionbody>
1.6359 + <derivekey>
1.6360 + <kdf>pkcs#12</kdf>
1.6361 + <passwd>password</passwd>
1.6362 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6363 + <iterations>8</iterations>
1.6364 + <key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D8</key>
1.6365 + </derivekey>
1.6366 + </actionbody>
1.6367 +</action>
1.6368 +
1.6369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6371 +//! @SYMREQ CIT_PREQ1054
1.6372 +//! @SYMTestPriority medium
1.6373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6375 +<action>
1.6376 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6377 + <actiontype>DeriveKey</actiontype>
1.6378 + <actionbody>
1.6379 + <derivekey>
1.6380 + <kdf>pkcs#12</kdf>
1.6381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6382 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6383 + <iterations>8</iterations>
1.6384 + <key>935593CA370BB6988F2F41D2F4ABF56E433064D83E</key>
1.6385 + </derivekey>
1.6386 + </actionbody>
1.6387 +</action>
1.6388 +
1.6389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6391 +//! @SYMREQ CIT_PREQ1054
1.6392 +//! @SYMTestPriority medium
1.6393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6395 +<action>
1.6396 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6397 + <actiontype>DeriveKey</actiontype>
1.6398 + <actionbody>
1.6399 + <derivekey>
1.6400 + <kdf>pkcs#12</kdf>
1.6401 + <passwd>0000</passwd>
1.6402 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6403 + <iterations>8</iterations>
1.6404 + <key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BF</key>
1.6405 + </derivekey>
1.6406 + </actionbody>
1.6407 +</action>
1.6408 +
1.6409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6411 +//! @SYMREQ CIT_PREQ1054
1.6412 +//! @SYMTestPriority medium
1.6413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6415 +<action>
1.6416 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6417 + <actiontype>DeriveKey</actiontype>
1.6418 + <actionbody>
1.6419 + <derivekey>
1.6420 + <kdf>pkcs#12</kdf>
1.6421 + <passwd>0001</passwd>
1.6422 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6423 + <iterations>8</iterations>
1.6424 + <key>82B4A13659033EA4025DB51A6CB573F93B03A69634</key>
1.6425 + </derivekey>
1.6426 + </actionbody>
1.6427 +</action>
1.6428 +
1.6429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6431 +//! @SYMREQ CIT_PREQ1054
1.6432 +//! @SYMTestPriority medium
1.6433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6435 +<action>
1.6436 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6437 + <actiontype>DeriveKey</actiontype>
1.6438 + <actionbody>
1.6439 + <derivekey>
1.6440 + <kdf>pkcs#12</kdf>
1.6441 + <passwd>PSWD</passwd>
1.6442 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6443 + <iterations>8</iterations>
1.6444 + <key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94</key>
1.6445 + </derivekey>
1.6446 + </actionbody>
1.6447 +</action>
1.6448 +
1.6449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6451 +//! @SYMREQ CIT_PREQ1054
1.6452 +//! @SYMTestPriority medium
1.6453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6455 +<action>
1.6456 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6457 + <actiontype>DeriveKey</actiontype>
1.6458 + <actionbody>
1.6459 + <derivekey>
1.6460 + <kdf>pkcs#12</kdf>
1.6461 + <passwd>password</passwd>
1.6462 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6463 + <iterations>8</iterations>
1.6464 + <key>5670457314E405B0ED1583FC4B82FEAD94B434EBED</key>
1.6465 + </derivekey>
1.6466 + </actionbody>
1.6467 +</action>
1.6468 +
1.6469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6471 +//! @SYMREQ CIT_PREQ1054
1.6472 +//! @SYMTestPriority medium
1.6473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6475 +<action>
1.6476 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6477 + <actiontype>DeriveKey</actiontype>
1.6478 + <actionbody>
1.6479 + <derivekey>
1.6480 + <kdf>pkcs#12</kdf>
1.6481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6482 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6483 + <iterations>8</iterations>
1.6484 + <key>1C4CAE25146D74F3762B5C3FD3A917522564855675</key>
1.6485 + </derivekey>
1.6486 + </actionbody>
1.6487 +</action>
1.6488 +
1.6489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6491 +//! @SYMREQ CIT_PREQ1054
1.6492 +//! @SYMTestPriority medium
1.6493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6495 +<action>
1.6496 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6497 + <actiontype>DeriveKey</actiontype>
1.6498 + <actionbody>
1.6499 + <derivekey>
1.6500 + <kdf>pkcs#12</kdf>
1.6501 + <passwd>0000</passwd>
1.6502 + <salt>53414C54</salt>
1.6503 + <iterations>128</iterations>
1.6504 + <key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93</key>
1.6505 + </derivekey>
1.6506 + </actionbody>
1.6507 +</action>
1.6508 +
1.6509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6511 +//! @SYMREQ CIT_PREQ1054
1.6512 +//! @SYMTestPriority medium
1.6513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6515 +<action>
1.6516 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6517 + <actiontype>DeriveKey</actiontype>
1.6518 + <actionbody>
1.6519 + <derivekey>
1.6520 + <kdf>pkcs#12</kdf>
1.6521 + <passwd>0001</passwd>
1.6522 + <salt>53414C54</salt>
1.6523 + <iterations>128</iterations>
1.6524 + <key>C89C3A2C9C06626EB831F4BB5262809B9C138181C4</key>
1.6525 + </derivekey>
1.6526 + </actionbody>
1.6527 +</action>
1.6528 +
1.6529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6531 +//! @SYMREQ CIT_PREQ1054
1.6532 +//! @SYMTestPriority medium
1.6533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6535 +<action>
1.6536 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6537 + <actiontype>DeriveKey</actiontype>
1.6538 + <actionbody>
1.6539 + <derivekey>
1.6540 + <kdf>pkcs#12</kdf>
1.6541 + <passwd>PSWD</passwd>
1.6542 + <salt>53414C54</salt>
1.6543 + <iterations>128</iterations>
1.6544 + <key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EE</key>
1.6545 + </derivekey>
1.6546 + </actionbody>
1.6547 +</action>
1.6548 +
1.6549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6551 +//! @SYMREQ CIT_PREQ1054
1.6552 +//! @SYMTestPriority medium
1.6553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6555 +<action>
1.6556 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6557 + <actiontype>DeriveKey</actiontype>
1.6558 + <actionbody>
1.6559 + <derivekey>
1.6560 + <kdf>pkcs#12</kdf>
1.6561 + <passwd>password</passwd>
1.6562 + <salt>53414C54</salt>
1.6563 + <iterations>128</iterations>
1.6564 + <key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C</key>
1.6565 + </derivekey>
1.6566 + </actionbody>
1.6567 +</action>
1.6568 +
1.6569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6571 +//! @SYMREQ CIT_PREQ1054
1.6572 +//! @SYMTestPriority medium
1.6573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6575 +<action>
1.6576 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6577 + <actiontype>DeriveKey</actiontype>
1.6578 + <actionbody>
1.6579 + <derivekey>
1.6580 + <kdf>pkcs#12</kdf>
1.6581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6582 + <salt>53414C54</salt>
1.6583 + <iterations>128</iterations>
1.6584 + <key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F</key>
1.6585 + </derivekey>
1.6586 + </actionbody>
1.6587 +</action>
1.6588 +
1.6589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6591 +//! @SYMREQ CIT_PREQ1054
1.6592 +//! @SYMTestPriority medium
1.6593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6595 +<action>
1.6596 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6597 + <actiontype>DeriveKey</actiontype>
1.6598 + <actionbody>
1.6599 + <derivekey>
1.6600 + <kdf>pkcs#12</kdf>
1.6601 + <passwd>0000</passwd>
1.6602 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6603 + <iterations>128</iterations>
1.6604 + <key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD</key>
1.6605 + </derivekey>
1.6606 + </actionbody>
1.6607 +</action>
1.6608 +
1.6609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6611 +//! @SYMREQ CIT_PREQ1054
1.6612 +//! @SYMTestPriority medium
1.6613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6615 +<action>
1.6616 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6617 + <actiontype>DeriveKey</actiontype>
1.6618 + <actionbody>
1.6619 + <derivekey>
1.6620 + <kdf>pkcs#12</kdf>
1.6621 + <passwd>0001</passwd>
1.6622 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6623 + <iterations>128</iterations>
1.6624 + <key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3</key>
1.6625 + </derivekey>
1.6626 + </actionbody>
1.6627 +</action>
1.6628 +
1.6629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6631 +//! @SYMREQ CIT_PREQ1054
1.6632 +//! @SYMTestPriority medium
1.6633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6635 +<action>
1.6636 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6637 + <actiontype>DeriveKey</actiontype>
1.6638 + <actionbody>
1.6639 + <derivekey>
1.6640 + <kdf>pkcs#12</kdf>
1.6641 + <passwd>PSWD</passwd>
1.6642 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6643 + <iterations>128</iterations>
1.6644 + <key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF</key>
1.6645 + </derivekey>
1.6646 + </actionbody>
1.6647 +</action>
1.6648 +
1.6649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6651 +//! @SYMREQ CIT_PREQ1054
1.6652 +//! @SYMTestPriority medium
1.6653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6655 +<action>
1.6656 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6657 + <actiontype>DeriveKey</actiontype>
1.6658 + <actionbody>
1.6659 + <derivekey>
1.6660 + <kdf>pkcs#12</kdf>
1.6661 + <passwd>password</passwd>
1.6662 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6663 + <iterations>128</iterations>
1.6664 + <key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3</key>
1.6665 + </derivekey>
1.6666 + </actionbody>
1.6667 +</action>
1.6668 +
1.6669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6671 +//! @SYMREQ CIT_PREQ1054
1.6672 +//! @SYMTestPriority medium
1.6673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6675 +<action>
1.6676 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6677 + <actiontype>DeriveKey</actiontype>
1.6678 + <actionbody>
1.6679 + <derivekey>
1.6680 + <kdf>pkcs#12</kdf>
1.6681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6682 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6683 + <iterations>128</iterations>
1.6684 + <key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16</key>
1.6685 + </derivekey>
1.6686 + </actionbody>
1.6687 +</action>
1.6688 +
1.6689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6691 +//! @SYMREQ CIT_PREQ1054
1.6692 +//! @SYMTestPriority medium
1.6693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6695 +<action>
1.6696 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6697 + <actiontype>DeriveKey</actiontype>
1.6698 + <actionbody>
1.6699 + <derivekey>
1.6700 + <kdf>pkcs#12</kdf>
1.6701 + <passwd>0000</passwd>
1.6702 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6703 + <iterations>128</iterations>
1.6704 + <key>99FE149183022F9EB2EB815BCC9504E59C524A1497</key>
1.6705 + </derivekey>
1.6706 + </actionbody>
1.6707 +</action>
1.6708 +
1.6709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6711 +//! @SYMREQ CIT_PREQ1054
1.6712 +//! @SYMTestPriority medium
1.6713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6715 +<action>
1.6716 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6717 + <actiontype>DeriveKey</actiontype>
1.6718 + <actionbody>
1.6719 + <derivekey>
1.6720 + <kdf>pkcs#12</kdf>
1.6721 + <passwd>0001</passwd>
1.6722 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6723 + <iterations>128</iterations>
1.6724 + <key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FE</key>
1.6725 + </derivekey>
1.6726 + </actionbody>
1.6727 +</action>
1.6728 +
1.6729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6731 +//! @SYMREQ CIT_PREQ1054
1.6732 +//! @SYMTestPriority medium
1.6733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6735 +<action>
1.6736 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6737 + <actiontype>DeriveKey</actiontype>
1.6738 + <actionbody>
1.6739 + <derivekey>
1.6740 + <kdf>pkcs#12</kdf>
1.6741 + <passwd>PSWD</passwd>
1.6742 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6743 + <iterations>128</iterations>
1.6744 + <key>22A70A865774E55CF08A70435611252278DCE76AED</key>
1.6745 + </derivekey>
1.6746 + </actionbody>
1.6747 +</action>
1.6748 +
1.6749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6751 +//! @SYMREQ CIT_PREQ1054
1.6752 +//! @SYMTestPriority medium
1.6753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6755 +<action>
1.6756 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6757 + <actiontype>DeriveKey</actiontype>
1.6758 + <actionbody>
1.6759 + <derivekey>
1.6760 + <kdf>pkcs#12</kdf>
1.6761 + <passwd>password</passwd>
1.6762 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6763 + <iterations>128</iterations>
1.6764 + <key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C67</key>
1.6765 + </derivekey>
1.6766 + </actionbody>
1.6767 +</action>
1.6768 +
1.6769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6771 +//! @SYMREQ CIT_PREQ1054
1.6772 +//! @SYMTestPriority medium
1.6773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6775 +<action>
1.6776 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6777 + <actiontype>DeriveKey</actiontype>
1.6778 + <actionbody>
1.6779 + <derivekey>
1.6780 + <kdf>pkcs#12</kdf>
1.6781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6782 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.6783 + <iterations>128</iterations>
1.6784 + <key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CE</key>
1.6785 + </derivekey>
1.6786 + </actionbody>
1.6787 +</action>
1.6788 +
1.6789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6791 +//! @SYMREQ CIT_PREQ1054
1.6792 +//! @SYMTestPriority medium
1.6793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6795 +<action>
1.6796 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6797 + <actiontype>DeriveKey</actiontype>
1.6798 + <actionbody>
1.6799 + <derivekey>
1.6800 + <kdf>pkcs#12</kdf>
1.6801 + <passwd>0000</passwd>
1.6802 + <salt>53414C54</salt>
1.6803 + <iterations>1024</iterations>
1.6804 + <key>82824BE51C81A5FF4C4268E256F6621B9656325BEF</key>
1.6805 + </derivekey>
1.6806 + </actionbody>
1.6807 +</action>
1.6808 +
1.6809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6811 +//! @SYMREQ CIT_PREQ1054
1.6812 +//! @SYMTestPriority medium
1.6813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6815 +<action>
1.6816 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6817 + <actiontype>DeriveKey</actiontype>
1.6818 + <actionbody>
1.6819 + <derivekey>
1.6820 + <kdf>pkcs#12</kdf>
1.6821 + <passwd>0001</passwd>
1.6822 + <salt>53414C54</salt>
1.6823 + <iterations>1024</iterations>
1.6824 + <key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2</key>
1.6825 + </derivekey>
1.6826 + </actionbody>
1.6827 +</action>
1.6828 +
1.6829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6831 +//! @SYMREQ CIT_PREQ1054
1.6832 +//! @SYMTestPriority medium
1.6833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6835 +<action>
1.6836 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6837 + <actiontype>DeriveKey</actiontype>
1.6838 + <actionbody>
1.6839 + <derivekey>
1.6840 + <kdf>pkcs#12</kdf>
1.6841 + <passwd>PSWD</passwd>
1.6842 + <salt>53414C54</salt>
1.6843 + <iterations>1024</iterations>
1.6844 + <key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE</key>
1.6845 + </derivekey>
1.6846 + </actionbody>
1.6847 +</action>
1.6848 +
1.6849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6851 +//! @SYMREQ CIT_PREQ1054
1.6852 +//! @SYMTestPriority medium
1.6853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6855 +<action>
1.6856 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6857 + <actiontype>DeriveKey</actiontype>
1.6858 + <actionbody>
1.6859 + <derivekey>
1.6860 + <kdf>pkcs#12</kdf>
1.6861 + <passwd>password</passwd>
1.6862 + <salt>53414C54</salt>
1.6863 + <iterations>1024</iterations>
1.6864 + <key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E84</key>
1.6865 + </derivekey>
1.6866 + </actionbody>
1.6867 +</action>
1.6868 +
1.6869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6871 +//! @SYMREQ CIT_PREQ1054
1.6872 +//! @SYMTestPriority medium
1.6873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6875 +<action>
1.6876 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.6877 + <actiontype>DeriveKey</actiontype>
1.6878 + <actionbody>
1.6879 + <derivekey>
1.6880 + <kdf>pkcs#12</kdf>
1.6881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6882 + <salt>53414C54</salt>
1.6883 + <iterations>1024</iterations>
1.6884 + <key>406C92305ACD663AB0B9EB66DED7929547C692FE11</key>
1.6885 + </derivekey>
1.6886 + </actionbody>
1.6887 +</action>
1.6888 +
1.6889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6891 +//! @SYMREQ CIT_PREQ1054
1.6892 +//! @SYMTestPriority medium
1.6893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6895 +<action>
1.6896 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6897 + <actiontype>DeriveKey</actiontype>
1.6898 + <actionbody>
1.6899 + <derivekey>
1.6900 + <kdf>pkcs#12</kdf>
1.6901 + <passwd>0000</passwd>
1.6902 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6903 + <iterations>1024</iterations>
1.6904 + <key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355</key>
1.6905 + </derivekey>
1.6906 + </actionbody>
1.6907 +</action>
1.6908 +
1.6909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6911 +//! @SYMREQ CIT_PREQ1054
1.6912 +//! @SYMTestPriority medium
1.6913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6915 +<action>
1.6916 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6917 + <actiontype>DeriveKey</actiontype>
1.6918 + <actionbody>
1.6919 + <derivekey>
1.6920 + <kdf>pkcs#12</kdf>
1.6921 + <passwd>0001</passwd>
1.6922 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6923 + <iterations>1024</iterations>
1.6924 + <key>0182E41FCA166CEAED10972BDF5F57A8F851200E37</key>
1.6925 + </derivekey>
1.6926 + </actionbody>
1.6927 +</action>
1.6928 +
1.6929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6931 +//! @SYMREQ CIT_PREQ1054
1.6932 +//! @SYMTestPriority medium
1.6933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6935 +<action>
1.6936 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6937 + <actiontype>DeriveKey</actiontype>
1.6938 + <actionbody>
1.6939 + <derivekey>
1.6940 + <kdf>pkcs#12</kdf>
1.6941 + <passwd>PSWD</passwd>
1.6942 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6943 + <iterations>1024</iterations>
1.6944 + <key>101FB775982CA15E37A065F7CDC5593DE385BDF504</key>
1.6945 + </derivekey>
1.6946 + </actionbody>
1.6947 +</action>
1.6948 +
1.6949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6951 +//! @SYMREQ CIT_PREQ1054
1.6952 +//! @SYMTestPriority medium
1.6953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6955 +<action>
1.6956 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6957 + <actiontype>DeriveKey</actiontype>
1.6958 + <actionbody>
1.6959 + <derivekey>
1.6960 + <kdf>pkcs#12</kdf>
1.6961 + <passwd>password</passwd>
1.6962 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6963 + <iterations>1024</iterations>
1.6964 + <key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B614</key>
1.6965 + </derivekey>
1.6966 + </actionbody>
1.6967 +</action>
1.6968 +
1.6969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6971 +//! @SYMREQ CIT_PREQ1054
1.6972 +//! @SYMTestPriority medium
1.6973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6975 +<action>
1.6976 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.6977 + <actiontype>DeriveKey</actiontype>
1.6978 + <actionbody>
1.6979 + <derivekey>
1.6980 + <kdf>pkcs#12</kdf>
1.6981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.6982 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.6983 + <iterations>1024</iterations>
1.6984 + <key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95</key>
1.6985 + </derivekey>
1.6986 + </actionbody>
1.6987 +</action>
1.6988 +
1.6989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.6990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.6991 +//! @SYMREQ CIT_PREQ1054
1.6992 +//! @SYMTestPriority medium
1.6993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.6994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.6995 +<action>
1.6996 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.6997 + <actiontype>DeriveKey</actiontype>
1.6998 + <actionbody>
1.6999 + <derivekey>
1.7000 + <kdf>pkcs#12</kdf>
1.7001 + <passwd>0000</passwd>
1.7002 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7003 + <iterations>1024</iterations>
1.7004 + <key>6789F0680A5C5840B8ED34B061494171E6407643F9</key>
1.7005 + </derivekey>
1.7006 + </actionbody>
1.7007 +</action>
1.7008 +
1.7009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7011 +//! @SYMREQ CIT_PREQ1054
1.7012 +//! @SYMTestPriority medium
1.7013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7015 +<action>
1.7016 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7017 + <actiontype>DeriveKey</actiontype>
1.7018 + <actionbody>
1.7019 + <derivekey>
1.7020 + <kdf>pkcs#12</kdf>
1.7021 + <passwd>0001</passwd>
1.7022 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7023 + <iterations>1024</iterations>
1.7024 + <key>43E663725870C4801A917C41C9B58C419933A93475</key>
1.7025 + </derivekey>
1.7026 + </actionbody>
1.7027 +</action>
1.7028 +
1.7029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7031 +//! @SYMREQ CIT_PREQ1054
1.7032 +//! @SYMTestPriority medium
1.7033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7035 +<action>
1.7036 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7037 + <actiontype>DeriveKey</actiontype>
1.7038 + <actionbody>
1.7039 + <derivekey>
1.7040 + <kdf>pkcs#12</kdf>
1.7041 + <passwd>PSWD</passwd>
1.7042 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7043 + <iterations>1024</iterations>
1.7044 + <key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5</key>
1.7045 + </derivekey>
1.7046 + </actionbody>
1.7047 +</action>
1.7048 +
1.7049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7051 +//! @SYMREQ CIT_PREQ1054
1.7052 +//! @SYMTestPriority medium
1.7053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7055 +<action>
1.7056 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7057 + <actiontype>DeriveKey</actiontype>
1.7058 + <actionbody>
1.7059 + <derivekey>
1.7060 + <kdf>pkcs#12</kdf>
1.7061 + <passwd>password</passwd>
1.7062 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7063 + <iterations>1024</iterations>
1.7064 + <key>CA202602C9A265559B6B96729B574DAA9B6D67036F</key>
1.7065 + </derivekey>
1.7066 + </actionbody>
1.7067 +</action>
1.7068 +
1.7069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7071 +//! @SYMREQ CIT_PREQ1054
1.7072 +//! @SYMTestPriority medium
1.7073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7075 +<action>
1.7076 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7077 + <actiontype>DeriveKey</actiontype>
1.7078 + <actionbody>
1.7079 + <derivekey>
1.7080 + <kdf>pkcs#12</kdf>
1.7081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7082 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7083 + <iterations>1024</iterations>
1.7084 + <key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D468</key>
1.7085 + </derivekey>
1.7086 + </actionbody>
1.7087 +</action>
1.7088 +
1.7089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7091 +//! @SYMREQ CIT_PREQ1054
1.7092 +//! @SYMTestPriority medium
1.7093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7095 +<action>
1.7096 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7097 + <actiontype>DeriveKey</actiontype>
1.7098 + <actionbody>
1.7099 + <derivekey>
1.7100 + <kdf>pkcs#12</kdf>
1.7101 + <passwd>0000</passwd>
1.7102 + <salt>53414C54</salt>
1.7103 + <iterations>1536</iterations>
1.7104 + <key>79A4E1398F511B262E60DCFE9E838C938B806716A9</key>
1.7105 + </derivekey>
1.7106 + </actionbody>
1.7107 +</action>
1.7108 +
1.7109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7111 +//! @SYMREQ CIT_PREQ1054
1.7112 +//! @SYMTestPriority medium
1.7113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7115 +<action>
1.7116 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7117 + <actiontype>DeriveKey</actiontype>
1.7118 + <actionbody>
1.7119 + <derivekey>
1.7120 + <kdf>pkcs#12</kdf>
1.7121 + <passwd>0001</passwd>
1.7122 + <salt>53414C54</salt>
1.7123 + <iterations>1536</iterations>
1.7124 + <key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D2</key>
1.7125 + </derivekey>
1.7126 + </actionbody>
1.7127 +</action>
1.7128 +
1.7129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7131 +//! @SYMREQ CIT_PREQ1054
1.7132 +//! @SYMTestPriority medium
1.7133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7135 +<action>
1.7136 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7137 + <actiontype>DeriveKey</actiontype>
1.7138 + <actionbody>
1.7139 + <derivekey>
1.7140 + <kdf>pkcs#12</kdf>
1.7141 + <passwd>PSWD</passwd>
1.7142 + <salt>53414C54</salt>
1.7143 + <iterations>1536</iterations>
1.7144 + <key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E6</key>
1.7145 + </derivekey>
1.7146 + </actionbody>
1.7147 +</action>
1.7148 +
1.7149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7151 +//! @SYMREQ CIT_PREQ1054
1.7152 +//! @SYMTestPriority medium
1.7153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7155 +<action>
1.7156 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7157 + <actiontype>DeriveKey</actiontype>
1.7158 + <actionbody>
1.7159 + <derivekey>
1.7160 + <kdf>pkcs#12</kdf>
1.7161 + <passwd>password</passwd>
1.7162 + <salt>53414C54</salt>
1.7163 + <iterations>1536</iterations>
1.7164 + <key>65B27A78C72DFEEA6C92846330CE98C6721909E89B</key>
1.7165 + </derivekey>
1.7166 + </actionbody>
1.7167 +</action>
1.7168 +
1.7169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7171 +//! @SYMREQ CIT_PREQ1054
1.7172 +//! @SYMTestPriority medium
1.7173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7175 +<action>
1.7176 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7177 + <actiontype>DeriveKey</actiontype>
1.7178 + <actionbody>
1.7179 + <derivekey>
1.7180 + <kdf>pkcs#12</kdf>
1.7181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7182 + <salt>53414C54</salt>
1.7183 + <iterations>1536</iterations>
1.7184 + <key>8F8FC96A3D958731780B50E843D6BB65137A0728C3</key>
1.7185 + </derivekey>
1.7186 + </actionbody>
1.7187 +</action>
1.7188 +
1.7189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7191 +//! @SYMREQ CIT_PREQ1054
1.7192 +//! @SYMTestPriority medium
1.7193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7195 +<action>
1.7196 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7197 + <actiontype>DeriveKey</actiontype>
1.7198 + <actionbody>
1.7199 + <derivekey>
1.7200 + <kdf>pkcs#12</kdf>
1.7201 + <passwd>0000</passwd>
1.7202 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7203 + <iterations>1536</iterations>
1.7204 + <key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25</key>
1.7205 + </derivekey>
1.7206 + </actionbody>
1.7207 +</action>
1.7208 +
1.7209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7211 +//! @SYMREQ CIT_PREQ1054
1.7212 +//! @SYMTestPriority medium
1.7213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7215 +<action>
1.7216 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7217 + <actiontype>DeriveKey</actiontype>
1.7218 + <actionbody>
1.7219 + <derivekey>
1.7220 + <kdf>pkcs#12</kdf>
1.7221 + <passwd>0001</passwd>
1.7222 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7223 + <iterations>1536</iterations>
1.7224 + <key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB4</key>
1.7225 + </derivekey>
1.7226 + </actionbody>
1.7227 +</action>
1.7228 +
1.7229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7231 +//! @SYMREQ CIT_PREQ1054
1.7232 +//! @SYMTestPriority medium
1.7233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7235 +<action>
1.7236 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7237 + <actiontype>DeriveKey</actiontype>
1.7238 + <actionbody>
1.7239 + <derivekey>
1.7240 + <kdf>pkcs#12</kdf>
1.7241 + <passwd>PSWD</passwd>
1.7242 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7243 + <iterations>1536</iterations>
1.7244 + <key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0C</key>
1.7245 + </derivekey>
1.7246 + </actionbody>
1.7247 +</action>
1.7248 +
1.7249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7251 +//! @SYMREQ CIT_PREQ1054
1.7252 +//! @SYMTestPriority medium
1.7253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7255 +<action>
1.7256 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7257 + <actiontype>DeriveKey</actiontype>
1.7258 + <actionbody>
1.7259 + <derivekey>
1.7260 + <kdf>pkcs#12</kdf>
1.7261 + <passwd>password</passwd>
1.7262 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7263 + <iterations>1536</iterations>
1.7264 + <key>C05FE26245C742CC01B23C655E5D934D734610DE01</key>
1.7265 + </derivekey>
1.7266 + </actionbody>
1.7267 +</action>
1.7268 +
1.7269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7271 +//! @SYMREQ CIT_PREQ1054
1.7272 +//! @SYMTestPriority medium
1.7273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7275 +<action>
1.7276 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7277 + <actiontype>DeriveKey</actiontype>
1.7278 + <actionbody>
1.7279 + <derivekey>
1.7280 + <kdf>pkcs#12</kdf>
1.7281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7282 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7283 + <iterations>1536</iterations>
1.7284 + <key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0</key>
1.7285 + </derivekey>
1.7286 + </actionbody>
1.7287 +</action>
1.7288 +
1.7289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7291 +//! @SYMREQ CIT_PREQ1054
1.7292 +//! @SYMTestPriority medium
1.7293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7295 +<action>
1.7296 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7297 + <actiontype>DeriveKey</actiontype>
1.7298 + <actionbody>
1.7299 + <derivekey>
1.7300 + <kdf>pkcs#12</kdf>
1.7301 + <passwd>0000</passwd>
1.7302 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7303 + <iterations>1536</iterations>
1.7304 + <key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3</key>
1.7305 + </derivekey>
1.7306 + </actionbody>
1.7307 +</action>
1.7308 +
1.7309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7311 +//! @SYMREQ CIT_PREQ1054
1.7312 +//! @SYMTestPriority medium
1.7313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7315 +<action>
1.7316 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7317 + <actiontype>DeriveKey</actiontype>
1.7318 + <actionbody>
1.7319 + <derivekey>
1.7320 + <kdf>pkcs#12</kdf>
1.7321 + <passwd>0001</passwd>
1.7322 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7323 + <iterations>1536</iterations>
1.7324 + <key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA</key>
1.7325 + </derivekey>
1.7326 + </actionbody>
1.7327 +</action>
1.7328 +
1.7329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7331 +//! @SYMREQ CIT_PREQ1054
1.7332 +//! @SYMTestPriority medium
1.7333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7335 +<action>
1.7336 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7337 + <actiontype>DeriveKey</actiontype>
1.7338 + <actionbody>
1.7339 + <derivekey>
1.7340 + <kdf>pkcs#12</kdf>
1.7341 + <passwd>PSWD</passwd>
1.7342 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7343 + <iterations>1536</iterations>
1.7344 + <key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA</key>
1.7345 + </derivekey>
1.7346 + </actionbody>
1.7347 +</action>
1.7348 +
1.7349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7351 +//! @SYMREQ CIT_PREQ1054
1.7352 +//! @SYMTestPriority medium
1.7353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7355 +<action>
1.7356 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7357 + <actiontype>DeriveKey</actiontype>
1.7358 + <actionbody>
1.7359 + <derivekey>
1.7360 + <kdf>pkcs#12</kdf>
1.7361 + <passwd>password</passwd>
1.7362 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7363 + <iterations>1536</iterations>
1.7364 + <key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD4</key>
1.7365 + </derivekey>
1.7366 + </actionbody>
1.7367 +</action>
1.7368 +
1.7369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7371 +//! @SYMREQ CIT_PREQ1054
1.7372 +//! @SYMTestPriority medium
1.7373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7375 +<action>
1.7376 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7377 + <actiontype>DeriveKey</actiontype>
1.7378 + <actionbody>
1.7379 + <derivekey>
1.7380 + <kdf>pkcs#12</kdf>
1.7381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7382 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7383 + <iterations>1536</iterations>
1.7384 + <key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B2</key>
1.7385 + </derivekey>
1.7386 + </actionbody>
1.7387 +</action>
1.7388 +
1.7389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7391 +//! @SYMREQ CIT_PREQ1054
1.7392 +//! @SYMTestPriority medium
1.7393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7395 +<action>
1.7396 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7397 + <actiontype>DeriveKey</actiontype>
1.7398 + <actionbody>
1.7399 + <derivekey>
1.7400 + <kdf>pkcs#12</kdf>
1.7401 + <passwd>0000</passwd>
1.7402 + <salt>53414C54</salt>
1.7403 + <iterations>2048</iterations>
1.7404 + <key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCD</key>
1.7405 + </derivekey>
1.7406 + </actionbody>
1.7407 +</action>
1.7408 +
1.7409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7411 +//! @SYMREQ CIT_PREQ1054
1.7412 +//! @SYMTestPriority medium
1.7413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7415 +<action>
1.7416 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7417 + <actiontype>DeriveKey</actiontype>
1.7418 + <actionbody>
1.7419 + <derivekey>
1.7420 + <kdf>pkcs#12</kdf>
1.7421 + <passwd>0001</passwd>
1.7422 + <salt>53414C54</salt>
1.7423 + <iterations>2048</iterations>
1.7424 + <key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2</key>
1.7425 + </derivekey>
1.7426 + </actionbody>
1.7427 +</action>
1.7428 +
1.7429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7431 +//! @SYMREQ CIT_PREQ1054
1.7432 +//! @SYMTestPriority medium
1.7433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7435 +<action>
1.7436 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7437 + <actiontype>DeriveKey</actiontype>
1.7438 + <actionbody>
1.7439 + <derivekey>
1.7440 + <kdf>pkcs#12</kdf>
1.7441 + <passwd>PSWD</passwd>
1.7442 + <salt>53414C54</salt>
1.7443 + <iterations>2048</iterations>
1.7444 + <key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2</key>
1.7445 + </derivekey>
1.7446 + </actionbody>
1.7447 +</action>
1.7448 +
1.7449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7451 +//! @SYMREQ CIT_PREQ1054
1.7452 +//! @SYMTestPriority medium
1.7453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7455 +<action>
1.7456 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7457 + <actiontype>DeriveKey</actiontype>
1.7458 + <actionbody>
1.7459 + <derivekey>
1.7460 + <kdf>pkcs#12</kdf>
1.7461 + <passwd>password</passwd>
1.7462 + <salt>53414C54</salt>
1.7463 + <iterations>2048</iterations>
1.7464 + <key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D9</key>
1.7465 + </derivekey>
1.7466 + </actionbody>
1.7467 +</action>
1.7468 +
1.7469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7471 +//! @SYMREQ CIT_PREQ1054
1.7472 +//! @SYMTestPriority medium
1.7473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7475 +<action>
1.7476 + <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
1.7477 + <actiontype>DeriveKey</actiontype>
1.7478 + <actionbody>
1.7479 + <derivekey>
1.7480 + <kdf>pkcs#12</kdf>
1.7481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7482 + <salt>53414C54</salt>
1.7483 + <iterations>2048</iterations>
1.7484 + <key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45</key>
1.7485 + </derivekey>
1.7486 + </actionbody>
1.7487 +</action>
1.7488 +
1.7489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7491 +//! @SYMREQ CIT_PREQ1054
1.7492 +//! @SYMTestPriority medium
1.7493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7495 +<action>
1.7496 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7497 + <actiontype>DeriveKey</actiontype>
1.7498 + <actionbody>
1.7499 + <derivekey>
1.7500 + <kdf>pkcs#12</kdf>
1.7501 + <passwd>0000</passwd>
1.7502 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7503 + <iterations>2048</iterations>
1.7504 + <key>CD045229461658BC6C47C259F2D20433173DE4D31E</key>
1.7505 + </derivekey>
1.7506 + </actionbody>
1.7507 +</action>
1.7508 +
1.7509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7511 +//! @SYMREQ CIT_PREQ1054
1.7512 +//! @SYMTestPriority medium
1.7513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7515 +<action>
1.7516 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7517 + <actiontype>DeriveKey</actiontype>
1.7518 + <actionbody>
1.7519 + <derivekey>
1.7520 + <kdf>pkcs#12</kdf>
1.7521 + <passwd>0001</passwd>
1.7522 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7523 + <iterations>2048</iterations>
1.7524 + <key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6D</key>
1.7525 + </derivekey>
1.7526 + </actionbody>
1.7527 +</action>
1.7528 +
1.7529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7531 +//! @SYMREQ CIT_PREQ1054
1.7532 +//! @SYMTestPriority medium
1.7533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7535 +<action>
1.7536 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7537 + <actiontype>DeriveKey</actiontype>
1.7538 + <actionbody>
1.7539 + <derivekey>
1.7540 + <kdf>pkcs#12</kdf>
1.7541 + <passwd>PSWD</passwd>
1.7542 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7543 + <iterations>2048</iterations>
1.7544 + <key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC</key>
1.7545 + </derivekey>
1.7546 + </actionbody>
1.7547 +</action>
1.7548 +
1.7549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7551 +//! @SYMREQ CIT_PREQ1054
1.7552 +//! @SYMTestPriority medium
1.7553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7555 +<action>
1.7556 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7557 + <actiontype>DeriveKey</actiontype>
1.7558 + <actionbody>
1.7559 + <derivekey>
1.7560 + <kdf>pkcs#12</kdf>
1.7561 + <passwd>password</passwd>
1.7562 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7563 + <iterations>2048</iterations>
1.7564 + <key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B</key>
1.7565 + </derivekey>
1.7566 + </actionbody>
1.7567 +</action>
1.7568 +
1.7569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7571 +//! @SYMREQ CIT_PREQ1054
1.7572 +//! @SYMTestPriority medium
1.7573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7575 +<action>
1.7576 + <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
1.7577 + <actiontype>DeriveKey</actiontype>
1.7578 + <actionbody>
1.7579 + <derivekey>
1.7580 + <kdf>pkcs#12</kdf>
1.7581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7582 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7583 + <iterations>2048</iterations>
1.7584 + <key>A5B348EB4926290B223724CC8E4ED67FF458F23622</key>
1.7585 + </derivekey>
1.7586 + </actionbody>
1.7587 +</action>
1.7588 +
1.7589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7591 +//! @SYMREQ CIT_PREQ1054
1.7592 +//! @SYMTestPriority medium
1.7593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7595 +<action>
1.7596 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7597 + <actiontype>DeriveKey</actiontype>
1.7598 + <actionbody>
1.7599 + <derivekey>
1.7600 + <kdf>pkcs#12</kdf>
1.7601 + <passwd>0000</passwd>
1.7602 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7603 + <iterations>2048</iterations>
1.7604 + <key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A25</key>
1.7605 + </derivekey>
1.7606 + </actionbody>
1.7607 +</action>
1.7608 +
1.7609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7611 +//! @SYMREQ CIT_PREQ1054
1.7612 +//! @SYMTestPriority medium
1.7613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7615 +<action>
1.7616 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7617 + <actiontype>DeriveKey</actiontype>
1.7618 + <actionbody>
1.7619 + <derivekey>
1.7620 + <kdf>pkcs#12</kdf>
1.7621 + <passwd>0001</passwd>
1.7622 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7623 + <iterations>2048</iterations>
1.7624 + <key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE1360</key>
1.7625 + </derivekey>
1.7626 + </actionbody>
1.7627 +</action>
1.7628 +
1.7629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7631 +//! @SYMREQ CIT_PREQ1054
1.7632 +//! @SYMTestPriority medium
1.7633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7635 +<action>
1.7636 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7637 + <actiontype>DeriveKey</actiontype>
1.7638 + <actionbody>
1.7639 + <derivekey>
1.7640 + <kdf>pkcs#12</kdf>
1.7641 + <passwd>PSWD</passwd>
1.7642 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7643 + <iterations>2048</iterations>
1.7644 + <key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2</key>
1.7645 + </derivekey>
1.7646 + </actionbody>
1.7647 +</action>
1.7648 +
1.7649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7651 +//! @SYMREQ CIT_PREQ1054
1.7652 +//! @SYMTestPriority medium
1.7653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7655 +<action>
1.7656 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7657 + <actiontype>DeriveKey</actiontype>
1.7658 + <actionbody>
1.7659 + <derivekey>
1.7660 + <kdf>pkcs#12</kdf>
1.7661 + <passwd>password</passwd>
1.7662 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7663 + <iterations>2048</iterations>
1.7664 + <key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF0</key>
1.7665 + </derivekey>
1.7666 + </actionbody>
1.7667 +</action>
1.7668 +
1.7669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7671 +//! @SYMREQ CIT_PREQ1054
1.7672 +//! @SYMTestPriority medium
1.7673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7675 +<action>
1.7676 + <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
1.7677 + <actiontype>DeriveKey</actiontype>
1.7678 + <actionbody>
1.7679 + <derivekey>
1.7680 + <kdf>pkcs#12</kdf>
1.7681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7682 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7683 + <iterations>2048</iterations>
1.7684 + <key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1</key>
1.7685 + </derivekey>
1.7686 + </actionbody>
1.7687 +</action>
1.7688 +
1.7689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7691 +//! @SYMREQ CIT_PREQ1054
1.7692 +//! @SYMTestPriority medium
1.7693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7695 +<action>
1.7696 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.7697 + <actiontype>DeriveKey</actiontype>
1.7698 + <actionbody>
1.7699 + <derivekey>
1.7700 + <kdf>pkcs#12</kdf>
1.7701 + <passwd>0000</passwd>
1.7702 + <salt>53414C54</salt>
1.7703 + <iterations>1</iterations>
1.7704 + <key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7FB67481AA26FAE2392310DEEF5BA9CB27DCE2D3FB11C95109E</key>
1.7705 + </derivekey>
1.7706 + </actionbody>
1.7707 +</action>
1.7708 +
1.7709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7711 +//! @SYMREQ CIT_PREQ1054
1.7712 +//! @SYMTestPriority medium
1.7713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7715 +<action>
1.7716 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.7717 + <actiontype>DeriveKey</actiontype>
1.7718 + <actionbody>
1.7719 + <derivekey>
1.7720 + <kdf>pkcs#12</kdf>
1.7721 + <passwd>0001</passwd>
1.7722 + <salt>53414C54</salt>
1.7723 + <iterations>1</iterations>
1.7724 + <key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B5FC87F188064903840A07BEA1540D4397A8C3BF85454D5EAEF</key>
1.7725 + </derivekey>
1.7726 + </actionbody>
1.7727 +</action>
1.7728 +
1.7729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7731 +//! @SYMREQ CIT_PREQ1054
1.7732 +//! @SYMTestPriority medium
1.7733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7735 +<action>
1.7736 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.7737 + <actiontype>DeriveKey</actiontype>
1.7738 + <actionbody>
1.7739 + <derivekey>
1.7740 + <kdf>pkcs#12</kdf>
1.7741 + <passwd>PSWD</passwd>
1.7742 + <salt>53414C54</salt>
1.7743 + <iterations>1</iterations>
1.7744 + <key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB0959936E4C6D9ED338B321B97C02E22A12E67A249DF5FFBB5F09E01</key>
1.7745 + </derivekey>
1.7746 + </actionbody>
1.7747 +</action>
1.7748 +
1.7749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7751 +//! @SYMREQ CIT_PREQ1054
1.7752 +//! @SYMTestPriority medium
1.7753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7755 +<action>
1.7756 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.7757 + <actiontype>DeriveKey</actiontype>
1.7758 + <actionbody>
1.7759 + <derivekey>
1.7760 + <kdf>pkcs#12</kdf>
1.7761 + <passwd>password</passwd>
1.7762 + <salt>53414C54</salt>
1.7763 + <iterations>1</iterations>
1.7764 + <key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C596AEC2CBF2648BC315B5422D9071708C31F2FCC6D7AC48ED63</key>
1.7765 + </derivekey>
1.7766 + </actionbody>
1.7767 +</action>
1.7768 +
1.7769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7771 +//! @SYMREQ CIT_PREQ1054
1.7772 +//! @SYMTestPriority medium
1.7773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7775 +<action>
1.7776 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.7777 + <actiontype>DeriveKey</actiontype>
1.7778 + <actionbody>
1.7779 + <derivekey>
1.7780 + <kdf>pkcs#12</kdf>
1.7781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7782 + <salt>53414C54</salt>
1.7783 + <iterations>1</iterations>
1.7784 + <key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A655F8AB429B72644AA7EE4C3FA31141DACFEB8D89E1825091F</key>
1.7785 + </derivekey>
1.7786 + </actionbody>
1.7787 +</action>
1.7788 +
1.7789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7791 +//! @SYMREQ CIT_PREQ1054
1.7792 +//! @SYMTestPriority medium
1.7793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7795 +<action>
1.7796 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.7797 + <actiontype>DeriveKey</actiontype>
1.7798 + <actionbody>
1.7799 + <derivekey>
1.7800 + <kdf>pkcs#12</kdf>
1.7801 + <passwd>0000</passwd>
1.7802 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7803 + <iterations>1</iterations>
1.7804 + <key>49CABE7B67736931126499722509C03D4BBEF714A80CCCCF475F4CA3FCBC217CAFA6AFF894CEA28E0DCD7B5A0D0D</key>
1.7805 + </derivekey>
1.7806 + </actionbody>
1.7807 +</action>
1.7808 +
1.7809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7811 +//! @SYMREQ CIT_PREQ1054
1.7812 +//! @SYMTestPriority medium
1.7813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7815 +<action>
1.7816 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.7817 + <actiontype>DeriveKey</actiontype>
1.7818 + <actionbody>
1.7819 + <derivekey>
1.7820 + <kdf>pkcs#12</kdf>
1.7821 + <passwd>0001</passwd>
1.7822 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7823 + <iterations>1</iterations>
1.7824 + <key>F994B990D3554AFB778C729E9BAA0CC6EB5BA765340999DE8474B918B754A380F8141A055CD68B85B4CDCC592ED9</key>
1.7825 + </derivekey>
1.7826 + </actionbody>
1.7827 +</action>
1.7828 +
1.7829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7831 +//! @SYMREQ CIT_PREQ1054
1.7832 +//! @SYMTestPriority medium
1.7833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7835 +<action>
1.7836 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.7837 + <actiontype>DeriveKey</actiontype>
1.7838 + <actionbody>
1.7839 + <derivekey>
1.7840 + <kdf>pkcs#12</kdf>
1.7841 + <passwd>PSWD</passwd>
1.7842 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7843 + <iterations>1</iterations>
1.7844 + <key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC0246300C1BDD916C1EF496E57D589FB2C357D7EF9142AB64B2E02</key>
1.7845 + </derivekey>
1.7846 + </actionbody>
1.7847 +</action>
1.7848 +
1.7849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7851 +//! @SYMREQ CIT_PREQ1054
1.7852 +//! @SYMTestPriority medium
1.7853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7855 +<action>
1.7856 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.7857 + <actiontype>DeriveKey</actiontype>
1.7858 + <actionbody>
1.7859 + <derivekey>
1.7860 + <kdf>pkcs#12</kdf>
1.7861 + <passwd>password</passwd>
1.7862 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7863 + <iterations>1</iterations>
1.7864 + <key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888F04507B6810813D6DDAF8E0257911B49AB5250127C50809B33</key>
1.7865 + </derivekey>
1.7866 + </actionbody>
1.7867 +</action>
1.7868 +
1.7869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7871 +//! @SYMREQ CIT_PREQ1054
1.7872 +//! @SYMTestPriority medium
1.7873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7875 +<action>
1.7876 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.7877 + <actiontype>DeriveKey</actiontype>
1.7878 + <actionbody>
1.7879 + <derivekey>
1.7880 + <kdf>pkcs#12</kdf>
1.7881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7882 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.7883 + <iterations>1</iterations>
1.7884 + <key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B7984CFB3D568FE48E9F78B99EB8561E2F627E46D0EEECF491C</key>
1.7885 + </derivekey>
1.7886 + </actionbody>
1.7887 +</action>
1.7888 +
1.7889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7891 +//! @SYMREQ CIT_PREQ1054
1.7892 +//! @SYMTestPriority medium
1.7893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7895 +<action>
1.7896 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.7897 + <actiontype>DeriveKey</actiontype>
1.7898 + <actionbody>
1.7899 + <derivekey>
1.7900 + <kdf>pkcs#12</kdf>
1.7901 + <passwd>0000</passwd>
1.7902 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7903 + <iterations>1</iterations>
1.7904 + <key>90253A49C069E7FF35281461A4DDBE0BB38F4041A04FF42A617251CC66ED7314BFAF4CB2F47A98E42B8AA3BE142A</key>
1.7905 + </derivekey>
1.7906 + </actionbody>
1.7907 +</action>
1.7908 +
1.7909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7911 +//! @SYMREQ CIT_PREQ1054
1.7912 +//! @SYMTestPriority medium
1.7913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7915 +<action>
1.7916 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.7917 + <actiontype>DeriveKey</actiontype>
1.7918 + <actionbody>
1.7919 + <derivekey>
1.7920 + <kdf>pkcs#12</kdf>
1.7921 + <passwd>0001</passwd>
1.7922 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7923 + <iterations>1</iterations>
1.7924 + <key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8FA3F056762C96D7E119F68827FBFCC07B2A9E98238B52AA02B</key>
1.7925 + </derivekey>
1.7926 + </actionbody>
1.7927 +</action>
1.7928 +
1.7929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7931 +//! @SYMREQ CIT_PREQ1054
1.7932 +//! @SYMTestPriority medium
1.7933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7935 +<action>
1.7936 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.7937 + <actiontype>DeriveKey</actiontype>
1.7938 + <actionbody>
1.7939 + <derivekey>
1.7940 + <kdf>pkcs#12</kdf>
1.7941 + <passwd>PSWD</passwd>
1.7942 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7943 + <iterations>1</iterations>
1.7944 + <key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC812A4EEE1F3DE7E52EA6A981DB02085FC4AB4860E438EA50BC5</key>
1.7945 + </derivekey>
1.7946 + </actionbody>
1.7947 +</action>
1.7948 +
1.7949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7951 +//! @SYMREQ CIT_PREQ1054
1.7952 +//! @SYMTestPriority medium
1.7953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7955 +<action>
1.7956 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.7957 + <actiontype>DeriveKey</actiontype>
1.7958 + <actionbody>
1.7959 + <derivekey>
1.7960 + <kdf>pkcs#12</kdf>
1.7961 + <passwd>password</passwd>
1.7962 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7963 + <iterations>1</iterations>
1.7964 + <key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C19C126E28BC5C05064D38F67EF7A72A28795F0CFBA8574DA174</key>
1.7965 + </derivekey>
1.7966 + </actionbody>
1.7967 +</action>
1.7968 +
1.7969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7971 +//! @SYMREQ CIT_PREQ1054
1.7972 +//! @SYMTestPriority medium
1.7973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7975 +<action>
1.7976 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.7977 + <actiontype>DeriveKey</actiontype>
1.7978 + <actionbody>
1.7979 + <derivekey>
1.7980 + <kdf>pkcs#12</kdf>
1.7981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.7982 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.7983 + <iterations>1</iterations>
1.7984 + <key>27476572AF26E99AB85CD350DC802ABA3A831332A7E037629B764434E2E02B5AB8E8A3DC181BBA3AD9AF9D7E8F08</key>
1.7985 + </derivekey>
1.7986 + </actionbody>
1.7987 +</action>
1.7988 +
1.7989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.7990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.7991 +//! @SYMREQ CIT_PREQ1054
1.7992 +//! @SYMTestPriority medium
1.7993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.7994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.7995 +<action>
1.7996 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.7997 + <actiontype>DeriveKey</actiontype>
1.7998 + <actionbody>
1.7999 + <derivekey>
1.8000 + <kdf>pkcs#12</kdf>
1.8001 + <passwd>0000</passwd>
1.8002 + <salt>53414C54</salt>
1.8003 + <iterations>2</iterations>
1.8004 + <key>A1D9010A6761CB2675F1C33BB3C5215851703D0D2657B057B9372B986ABA327B6C8B8D4372656C74E9756C7C0C2C</key>
1.8005 + </derivekey>
1.8006 + </actionbody>
1.8007 +</action>
1.8008 +
1.8009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8011 +//! @SYMREQ CIT_PREQ1054
1.8012 +//! @SYMTestPriority medium
1.8013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8015 +<action>
1.8016 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8017 + <actiontype>DeriveKey</actiontype>
1.8018 + <actionbody>
1.8019 + <derivekey>
1.8020 + <kdf>pkcs#12</kdf>
1.8021 + <passwd>0001</passwd>
1.8022 + <salt>53414C54</salt>
1.8023 + <iterations>2</iterations>
1.8024 + <key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47AC57D1E3FE07F2C194037B1CE0E18DE0CB8C335975EA51B037</key>
1.8025 + </derivekey>
1.8026 + </actionbody>
1.8027 +</action>
1.8028 +
1.8029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8031 +//! @SYMREQ CIT_PREQ1054
1.8032 +//! @SYMTestPriority medium
1.8033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8035 +<action>
1.8036 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8037 + <actiontype>DeriveKey</actiontype>
1.8038 + <actionbody>
1.8039 + <derivekey>
1.8040 + <kdf>pkcs#12</kdf>
1.8041 + <passwd>PSWD</passwd>
1.8042 + <salt>53414C54</salt>
1.8043 + <iterations>2</iterations>
1.8044 + <key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE332D3AB8A36EE0DC8F1B7E691D2FA8BCCC2C7C371639EBA5CC6</key>
1.8045 + </derivekey>
1.8046 + </actionbody>
1.8047 +</action>
1.8048 +
1.8049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8051 +//! @SYMREQ CIT_PREQ1054
1.8052 +//! @SYMTestPriority medium
1.8053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8055 +<action>
1.8056 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8057 + <actiontype>DeriveKey</actiontype>
1.8058 + <actionbody>
1.8059 + <derivekey>
1.8060 + <kdf>pkcs#12</kdf>
1.8061 + <passwd>password</passwd>
1.8062 + <salt>53414C54</salt>
1.8063 + <iterations>2</iterations>
1.8064 + <key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A0EC11A60E916ADAD62C57711E88134D3451CEE8640938390E9</key>
1.8065 + </derivekey>
1.8066 + </actionbody>
1.8067 +</action>
1.8068 +
1.8069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8071 +//! @SYMREQ CIT_PREQ1054
1.8072 +//! @SYMTestPriority medium
1.8073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8075 +<action>
1.8076 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8077 + <actiontype>DeriveKey</actiontype>
1.8078 + <actionbody>
1.8079 + <derivekey>
1.8080 + <kdf>pkcs#12</kdf>
1.8081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8082 + <salt>53414C54</salt>
1.8083 + <iterations>2</iterations>
1.8084 + <key>5BF185C726EE2182888A834066C30BA92C0A6A140FD09995773E708440FF38F65CBF71E7449EF43ADDDDCCEE7B63</key>
1.8085 + </derivekey>
1.8086 + </actionbody>
1.8087 +</action>
1.8088 +
1.8089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8091 +//! @SYMREQ CIT_PREQ1054
1.8092 +//! @SYMTestPriority medium
1.8093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8095 +<action>
1.8096 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8097 + <actiontype>DeriveKey</actiontype>
1.8098 + <actionbody>
1.8099 + <derivekey>
1.8100 + <kdf>pkcs#12</kdf>
1.8101 + <passwd>0000</passwd>
1.8102 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8103 + <iterations>2</iterations>
1.8104 + <key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734423A7247E5DFD46D2CE07E64F4F881362C98992B188EDE499D</key>
1.8105 + </derivekey>
1.8106 + </actionbody>
1.8107 +</action>
1.8108 +
1.8109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8111 +//! @SYMREQ CIT_PREQ1054
1.8112 +//! @SYMTestPriority medium
1.8113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8115 +<action>
1.8116 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8117 + <actiontype>DeriveKey</actiontype>
1.8118 + <actionbody>
1.8119 + <derivekey>
1.8120 + <kdf>pkcs#12</kdf>
1.8121 + <passwd>0001</passwd>
1.8122 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8123 + <iterations>2</iterations>
1.8124 + <key>63E6DF459C899D72577C20FFE4F27670F3A85EA780B450C711D83FB12C0B0A0539209B1B06AF82EE392AB3FD6A6B</key>
1.8125 + </derivekey>
1.8126 + </actionbody>
1.8127 +</action>
1.8128 +
1.8129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8131 +//! @SYMREQ CIT_PREQ1054
1.8132 +//! @SYMTestPriority medium
1.8133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8135 +<action>
1.8136 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8137 + <actiontype>DeriveKey</actiontype>
1.8138 + <actionbody>
1.8139 + <derivekey>
1.8140 + <kdf>pkcs#12</kdf>
1.8141 + <passwd>PSWD</passwd>
1.8142 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8143 + <iterations>2</iterations>
1.8144 + <key>C2099204ABFBB841875BD7595A89D31A9D03A34B94D3ED582C55B0787E2FB841ADE1E6171D6FE2BDDB19A658F552</key>
1.8145 + </derivekey>
1.8146 + </actionbody>
1.8147 +</action>
1.8148 +
1.8149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8151 +//! @SYMREQ CIT_PREQ1054
1.8152 +//! @SYMTestPriority medium
1.8153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8155 +<action>
1.8156 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8157 + <actiontype>DeriveKey</actiontype>
1.8158 + <actionbody>
1.8159 + <derivekey>
1.8160 + <kdf>pkcs#12</kdf>
1.8161 + <passwd>password</passwd>
1.8162 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8163 + <iterations>2</iterations>
1.8164 + <key>3204D28A32DF299B612958906C79154AED69D3F1C0351B1A4B4E2DCA7E93F3CAD92714CC9E13CCD0E95A305EBB13</key>
1.8165 + </derivekey>
1.8166 + </actionbody>
1.8167 +</action>
1.8168 +
1.8169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8171 +//! @SYMREQ CIT_PREQ1054
1.8172 +//! @SYMTestPriority medium
1.8173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8175 +<action>
1.8176 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8177 + <actiontype>DeriveKey</actiontype>
1.8178 + <actionbody>
1.8179 + <derivekey>
1.8180 + <kdf>pkcs#12</kdf>
1.8181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8182 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8183 + <iterations>2</iterations>
1.8184 + <key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04873EC243829CE9F83DE277AEC92B18D43211D6DAC966AFFFE8</key>
1.8185 + </derivekey>
1.8186 + </actionbody>
1.8187 +</action>
1.8188 +
1.8189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8191 +//! @SYMREQ CIT_PREQ1054
1.8192 +//! @SYMTestPriority medium
1.8193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8195 +<action>
1.8196 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8197 + <actiontype>DeriveKey</actiontype>
1.8198 + <actionbody>
1.8199 + <derivekey>
1.8200 + <kdf>pkcs#12</kdf>
1.8201 + <passwd>0000</passwd>
1.8202 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8203 + <iterations>2</iterations>
1.8204 + <key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11162299D91EC09517DEACB6C8992D8D1952B9410AED287F9387</key>
1.8205 + </derivekey>
1.8206 + </actionbody>
1.8207 +</action>
1.8208 +
1.8209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8211 +//! @SYMREQ CIT_PREQ1054
1.8212 +//! @SYMTestPriority medium
1.8213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8215 +<action>
1.8216 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8217 + <actiontype>DeriveKey</actiontype>
1.8218 + <actionbody>
1.8219 + <derivekey>
1.8220 + <kdf>pkcs#12</kdf>
1.8221 + <passwd>0001</passwd>
1.8222 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8223 + <iterations>2</iterations>
1.8224 + <key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC49A6C7BD0A735DBA22FCBC56A6AACAA2ECE7F146A54C7442A7</key>
1.8225 + </derivekey>
1.8226 + </actionbody>
1.8227 +</action>
1.8228 +
1.8229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8231 +//! @SYMREQ CIT_PREQ1054
1.8232 +//! @SYMTestPriority medium
1.8233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8235 +<action>
1.8236 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8237 + <actiontype>DeriveKey</actiontype>
1.8238 + <actionbody>
1.8239 + <derivekey>
1.8240 + <kdf>pkcs#12</kdf>
1.8241 + <passwd>PSWD</passwd>
1.8242 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8243 + <iterations>2</iterations>
1.8244 + <key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F41D1179DBADD72CF7CC8A3F03118C5EF87C588C6665E942158</key>
1.8245 + </derivekey>
1.8246 + </actionbody>
1.8247 +</action>
1.8248 +
1.8249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8251 +//! @SYMREQ CIT_PREQ1054
1.8252 +//! @SYMTestPriority medium
1.8253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8255 +<action>
1.8256 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8257 + <actiontype>DeriveKey</actiontype>
1.8258 + <actionbody>
1.8259 + <derivekey>
1.8260 + <kdf>pkcs#12</kdf>
1.8261 + <passwd>password</passwd>
1.8262 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8263 + <iterations>2</iterations>
1.8264 + <key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDFE51188263603019F80688985DB1EF389A8F2CADA47463756C7</key>
1.8265 + </derivekey>
1.8266 + </actionbody>
1.8267 +</action>
1.8268 +
1.8269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8271 +//! @SYMREQ CIT_PREQ1054
1.8272 +//! @SYMTestPriority medium
1.8273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8275 +<action>
1.8276 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8277 + <actiontype>DeriveKey</actiontype>
1.8278 + <actionbody>
1.8279 + <derivekey>
1.8280 + <kdf>pkcs#12</kdf>
1.8281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8282 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8283 + <iterations>2</iterations>
1.8284 + <key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647451A53DE6218B8B2F860931DE8975712EAC7CAF34347828525</key>
1.8285 + </derivekey>
1.8286 + </actionbody>
1.8287 +</action>
1.8288 +
1.8289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8291 +//! @SYMREQ CIT_PREQ1054
1.8292 +//! @SYMTestPriority medium
1.8293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8295 +<action>
1.8296 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8297 + <actiontype>DeriveKey</actiontype>
1.8298 + <actionbody>
1.8299 + <derivekey>
1.8300 + <kdf>pkcs#12</kdf>
1.8301 + <passwd>0000</passwd>
1.8302 + <salt>53414C54</salt>
1.8303 + <iterations>4</iterations>
1.8304 + <key>D0158BFC57E643965DC161741725CE9478CDF2A0B52A78253F32B2DFCC2228C929F19663EC3AF4B6B3B4A514D2AE</key>
1.8305 + </derivekey>
1.8306 + </actionbody>
1.8307 +</action>
1.8308 +
1.8309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8311 +//! @SYMREQ CIT_PREQ1054
1.8312 +//! @SYMTestPriority medium
1.8313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8315 +<action>
1.8316 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8317 + <actiontype>DeriveKey</actiontype>
1.8318 + <actionbody>
1.8319 + <derivekey>
1.8320 + <kdf>pkcs#12</kdf>
1.8321 + <passwd>0001</passwd>
1.8322 + <salt>53414C54</salt>
1.8323 + <iterations>4</iterations>
1.8324 + <key>AEB6CD53F0D6830161100C4BFD439B341066339A0025D3CF7DC68CEE4D9AC92B10B29EB19973637D27DC2C9BF911</key>
1.8325 + </derivekey>
1.8326 + </actionbody>
1.8327 +</action>
1.8328 +
1.8329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8331 +//! @SYMREQ CIT_PREQ1054
1.8332 +//! @SYMTestPriority medium
1.8333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8335 +<action>
1.8336 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8337 + <actiontype>DeriveKey</actiontype>
1.8338 + <actionbody>
1.8339 + <derivekey>
1.8340 + <kdf>pkcs#12</kdf>
1.8341 + <passwd>PSWD</passwd>
1.8342 + <salt>53414C54</salt>
1.8343 + <iterations>4</iterations>
1.8344 + <key>80010C12B66CC739F4ACF8BB154197709F78AAD39ABC8EEC11F7C88CD138DE85A21B5D5DCB9C8E50E0AFABE82149</key>
1.8345 + </derivekey>
1.8346 + </actionbody>
1.8347 +</action>
1.8348 +
1.8349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8351 +//! @SYMREQ CIT_PREQ1054
1.8352 +//! @SYMTestPriority medium
1.8353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8355 +<action>
1.8356 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8357 + <actiontype>DeriveKey</actiontype>
1.8358 + <actionbody>
1.8359 + <derivekey>
1.8360 + <kdf>pkcs#12</kdf>
1.8361 + <passwd>password</passwd>
1.8362 + <salt>53414C54</salt>
1.8363 + <iterations>4</iterations>
1.8364 + <key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812046A01A53F6FB1C9051ED917D0B3C08A82CADA712730DD2410</key>
1.8365 + </derivekey>
1.8366 + </actionbody>
1.8367 +</action>
1.8368 +
1.8369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8371 +//! @SYMREQ CIT_PREQ1054
1.8372 +//! @SYMTestPriority medium
1.8373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8375 +<action>
1.8376 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8377 + <actiontype>DeriveKey</actiontype>
1.8378 + <actionbody>
1.8379 + <derivekey>
1.8380 + <kdf>pkcs#12</kdf>
1.8381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8382 + <salt>53414C54</salt>
1.8383 + <iterations>4</iterations>
1.8384 + <key>146C6A5B58AF8561220DE4C13A133248300D59D39E22569CC568CB98585324F9287A672ABFCDF360A26B8B83D1AE</key>
1.8385 + </derivekey>
1.8386 + </actionbody>
1.8387 +</action>
1.8388 +
1.8389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8391 +//! @SYMREQ CIT_PREQ1054
1.8392 +//! @SYMTestPriority medium
1.8393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8395 +<action>
1.8396 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8397 + <actiontype>DeriveKey</actiontype>
1.8398 + <actionbody>
1.8399 + <derivekey>
1.8400 + <kdf>pkcs#12</kdf>
1.8401 + <passwd>0000</passwd>
1.8402 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8403 + <iterations>4</iterations>
1.8404 + <key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE22F0030D6D6FBF85D6A56D7D55A3002233181BCC2A0C4108C8</key>
1.8405 + </derivekey>
1.8406 + </actionbody>
1.8407 +</action>
1.8408 +
1.8409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8411 +//! @SYMREQ CIT_PREQ1054
1.8412 +//! @SYMTestPriority medium
1.8413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8415 +<action>
1.8416 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8417 + <actiontype>DeriveKey</actiontype>
1.8418 + <actionbody>
1.8419 + <derivekey>
1.8420 + <kdf>pkcs#12</kdf>
1.8421 + <passwd>0001</passwd>
1.8422 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8423 + <iterations>4</iterations>
1.8424 + <key>23930713772E26DBBABB53F3C5C775019B8048482B6FECC40729F2D5023D6F3C27092166E11A435738C3E0DBF7B0</key>
1.8425 + </derivekey>
1.8426 + </actionbody>
1.8427 +</action>
1.8428 +
1.8429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8431 +//! @SYMREQ CIT_PREQ1054
1.8432 +//! @SYMTestPriority medium
1.8433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8435 +<action>
1.8436 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8437 + <actiontype>DeriveKey</actiontype>
1.8438 + <actionbody>
1.8439 + <derivekey>
1.8440 + <kdf>pkcs#12</kdf>
1.8441 + <passwd>PSWD</passwd>
1.8442 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8443 + <iterations>4</iterations>
1.8444 + <key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A93D6A3DD0A61826365407B4C1CBB589C0BC10EC8B510A83771</key>
1.8445 + </derivekey>
1.8446 + </actionbody>
1.8447 +</action>
1.8448 +
1.8449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8451 +//! @SYMREQ CIT_PREQ1054
1.8452 +//! @SYMTestPriority medium
1.8453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8455 +<action>
1.8456 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8457 + <actiontype>DeriveKey</actiontype>
1.8458 + <actionbody>
1.8459 + <derivekey>
1.8460 + <kdf>pkcs#12</kdf>
1.8461 + <passwd>password</passwd>
1.8462 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8463 + <iterations>4</iterations>
1.8464 + <key>363619530B170B7BAE1C046B29351C235B8EFED58879EAB2DAF93502D254C5569C2667F16B2AA036619AAF4D8E33</key>
1.8465 + </derivekey>
1.8466 + </actionbody>
1.8467 +</action>
1.8468 +
1.8469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8471 +//! @SYMREQ CIT_PREQ1054
1.8472 +//! @SYMTestPriority medium
1.8473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8475 +<action>
1.8476 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8477 + <actiontype>DeriveKey</actiontype>
1.8478 + <actionbody>
1.8479 + <derivekey>
1.8480 + <kdf>pkcs#12</kdf>
1.8481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8482 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8483 + <iterations>4</iterations>
1.8484 + <key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4EFF6FE83AD6ED83E4F217EF7E0C6727BEF0614398026907E7E6</key>
1.8485 + </derivekey>
1.8486 + </actionbody>
1.8487 +</action>
1.8488 +
1.8489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8491 +//! @SYMREQ CIT_PREQ1054
1.8492 +//! @SYMTestPriority medium
1.8493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8495 +<action>
1.8496 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8497 + <actiontype>DeriveKey</actiontype>
1.8498 + <actionbody>
1.8499 + <derivekey>
1.8500 + <kdf>pkcs#12</kdf>
1.8501 + <passwd>0000</passwd>
1.8502 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8503 + <iterations>4</iterations>
1.8504 + <key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0EA1D3AB1983B1E0496EB6FD7259774354267B1976BE459A1D23</key>
1.8505 + </derivekey>
1.8506 + </actionbody>
1.8507 +</action>
1.8508 +
1.8509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8511 +//! @SYMREQ CIT_PREQ1054
1.8512 +//! @SYMTestPriority medium
1.8513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8515 +<action>
1.8516 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8517 + <actiontype>DeriveKey</actiontype>
1.8518 + <actionbody>
1.8519 + <derivekey>
1.8520 + <kdf>pkcs#12</kdf>
1.8521 + <passwd>0001</passwd>
1.8522 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8523 + <iterations>4</iterations>
1.8524 + <key>9A618595C714486B7D7E3120005C8BC18D5D95D79B54DE1063C64DBE97C41BFC6A4A5239B77F2F603C7AFE06247C</key>
1.8525 + </derivekey>
1.8526 + </actionbody>
1.8527 +</action>
1.8528 +
1.8529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8531 +//! @SYMREQ CIT_PREQ1054
1.8532 +//! @SYMTestPriority medium
1.8533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8535 +<action>
1.8536 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8537 + <actiontype>DeriveKey</actiontype>
1.8538 + <actionbody>
1.8539 + <derivekey>
1.8540 + <kdf>pkcs#12</kdf>
1.8541 + <passwd>PSWD</passwd>
1.8542 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8543 + <iterations>4</iterations>
1.8544 + <key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208FA46F3C504ABA355D99FE3A4291DBAB83CB6980CD28C153D24</key>
1.8545 + </derivekey>
1.8546 + </actionbody>
1.8547 +</action>
1.8548 +
1.8549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8551 +//! @SYMREQ CIT_PREQ1054
1.8552 +//! @SYMTestPriority medium
1.8553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8555 +<action>
1.8556 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8557 + <actiontype>DeriveKey</actiontype>
1.8558 + <actionbody>
1.8559 + <derivekey>
1.8560 + <kdf>pkcs#12</kdf>
1.8561 + <passwd>password</passwd>
1.8562 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8563 + <iterations>4</iterations>
1.8564 + <key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2F2B76DBC180C689C88147F5366D48C10086AD45B445F818F22</key>
1.8565 + </derivekey>
1.8566 + </actionbody>
1.8567 +</action>
1.8568 +
1.8569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8571 +//! @SYMREQ CIT_PREQ1054
1.8572 +//! @SYMTestPriority medium
1.8573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8575 +<action>
1.8576 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8577 + <actiontype>DeriveKey</actiontype>
1.8578 + <actionbody>
1.8579 + <derivekey>
1.8580 + <kdf>pkcs#12</kdf>
1.8581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8582 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8583 + <iterations>4</iterations>
1.8584 + <key>91DF3661364A0DAD28180A41ADCB55676E992986EFCD5481A7EBCCA45806E087BB95BAEFD24685A7D9B08426EFCF</key>
1.8585 + </derivekey>
1.8586 + </actionbody>
1.8587 +</action>
1.8588 +
1.8589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8591 +//! @SYMREQ CIT_PREQ1054
1.8592 +//! @SYMTestPriority medium
1.8593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8595 +<action>
1.8596 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8597 + <actiontype>DeriveKey</actiontype>
1.8598 + <actionbody>
1.8599 + <derivekey>
1.8600 + <kdf>pkcs#12</kdf>
1.8601 + <passwd>0000</passwd>
1.8602 + <salt>53414C54</salt>
1.8603 + <iterations>8</iterations>
1.8604 + <key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE4612564ECF299468389BF3597B38FF0ADB79AE9A718D7FC5E0D7E</key>
1.8605 + </derivekey>
1.8606 + </actionbody>
1.8607 +</action>
1.8608 +
1.8609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8611 +//! @SYMREQ CIT_PREQ1054
1.8612 +//! @SYMTestPriority medium
1.8613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8615 +<action>
1.8616 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8617 + <actiontype>DeriveKey</actiontype>
1.8618 + <actionbody>
1.8619 + <derivekey>
1.8620 + <kdf>pkcs#12</kdf>
1.8621 + <passwd>0001</passwd>
1.8622 + <salt>53414C54</salt>
1.8623 + <iterations>8</iterations>
1.8624 + <key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1CD2460647D83960A81A688C1E7C3CB1745C640F96CA26BAB55</key>
1.8625 + </derivekey>
1.8626 + </actionbody>
1.8627 +</action>
1.8628 +
1.8629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8631 +//! @SYMREQ CIT_PREQ1054
1.8632 +//! @SYMTestPriority medium
1.8633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8635 +<action>
1.8636 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8637 + <actiontype>DeriveKey</actiontype>
1.8638 + <actionbody>
1.8639 + <derivekey>
1.8640 + <kdf>pkcs#12</kdf>
1.8641 + <passwd>PSWD</passwd>
1.8642 + <salt>53414C54</salt>
1.8643 + <iterations>8</iterations>
1.8644 + <key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466B5176BC31A916229C8DC27918BEAC1912CCD1BEDD4D9AC6F7F</key>
1.8645 + </derivekey>
1.8646 + </actionbody>
1.8647 +</action>
1.8648 +
1.8649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8651 +//! @SYMREQ CIT_PREQ1054
1.8652 +//! @SYMTestPriority medium
1.8653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8655 +<action>
1.8656 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8657 + <actiontype>DeriveKey</actiontype>
1.8658 + <actionbody>
1.8659 + <derivekey>
1.8660 + <kdf>pkcs#12</kdf>
1.8661 + <passwd>password</passwd>
1.8662 + <salt>53414C54</salt>
1.8663 + <iterations>8</iterations>
1.8664 + <key>B0935F11227F5A473073DCD188886687D2A18119532A1D5D0A8631441599FF319BD921404D04DA973217A199F621</key>
1.8665 + </derivekey>
1.8666 + </actionbody>
1.8667 +</action>
1.8668 +
1.8669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8671 +//! @SYMREQ CIT_PREQ1054
1.8672 +//! @SYMTestPriority medium
1.8673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8675 +<action>
1.8676 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8677 + <actiontype>DeriveKey</actiontype>
1.8678 + <actionbody>
1.8679 + <derivekey>
1.8680 + <kdf>pkcs#12</kdf>
1.8681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8682 + <salt>53414C54</salt>
1.8683 + <iterations>8</iterations>
1.8684 + <key>6602B1B4BBB670208041ECD8E1634845FC0DC28532AF24AA6CB93368E87126BC821DB7B3F4301455B454E9715981</key>
1.8685 + </derivekey>
1.8686 + </actionbody>
1.8687 +</action>
1.8688 +
1.8689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8691 +//! @SYMREQ CIT_PREQ1054
1.8692 +//! @SYMTestPriority medium
1.8693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8695 +<action>
1.8696 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8697 + <actiontype>DeriveKey</actiontype>
1.8698 + <actionbody>
1.8699 + <derivekey>
1.8700 + <kdf>pkcs#12</kdf>
1.8701 + <passwd>0000</passwd>
1.8702 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8703 + <iterations>8</iterations>
1.8704 + <key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E449B3AFB8236BFFDF548BA07B6269CB5C0D0E0E00AABB5E872F7</key>
1.8705 + </derivekey>
1.8706 + </actionbody>
1.8707 +</action>
1.8708 +
1.8709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8711 +//! @SYMREQ CIT_PREQ1054
1.8712 +//! @SYMTestPriority medium
1.8713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8715 +<action>
1.8716 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8717 + <actiontype>DeriveKey</actiontype>
1.8718 + <actionbody>
1.8719 + <derivekey>
1.8720 + <kdf>pkcs#12</kdf>
1.8721 + <passwd>0001</passwd>
1.8722 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8723 + <iterations>8</iterations>
1.8724 + <key>6473EB1244E055149E0858C49FAE7B8DC951E7E32AC2AA2146482717104D3E93074D41BCA226B3212A41E4EC0F00</key>
1.8725 + </derivekey>
1.8726 + </actionbody>
1.8727 +</action>
1.8728 +
1.8729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8731 +//! @SYMREQ CIT_PREQ1054
1.8732 +//! @SYMTestPriority medium
1.8733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8735 +<action>
1.8736 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8737 + <actiontype>DeriveKey</actiontype>
1.8738 + <actionbody>
1.8739 + <derivekey>
1.8740 + <kdf>pkcs#12</kdf>
1.8741 + <passwd>PSWD</passwd>
1.8742 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8743 + <iterations>8</iterations>
1.8744 + <key>AA762B8736D4C37BAD263103CA283E09010B7EFC538B44C6C3CB724C8CEC28C91F57A2778A8C74CBBF00A63D6875</key>
1.8745 + </derivekey>
1.8746 + </actionbody>
1.8747 +</action>
1.8748 +
1.8749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8751 +//! @SYMREQ CIT_PREQ1054
1.8752 +//! @SYMTestPriority medium
1.8753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8755 +<action>
1.8756 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8757 + <actiontype>DeriveKey</actiontype>
1.8758 + <actionbody>
1.8759 + <derivekey>
1.8760 + <kdf>pkcs#12</kdf>
1.8761 + <passwd>password</passwd>
1.8762 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8763 + <iterations>8</iterations>
1.8764 + <key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D88232044436DA8D74F09E19B578C65F8629D022FD8D529F11E2</key>
1.8765 + </derivekey>
1.8766 + </actionbody>
1.8767 +</action>
1.8768 +
1.8769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8771 +//! @SYMREQ CIT_PREQ1054
1.8772 +//! @SYMTestPriority medium
1.8773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8775 +<action>
1.8776 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8777 + <actiontype>DeriveKey</actiontype>
1.8778 + <actionbody>
1.8779 + <derivekey>
1.8780 + <kdf>pkcs#12</kdf>
1.8781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8782 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.8783 + <iterations>8</iterations>
1.8784 + <key>935593CA370BB6988F2F41D2F4ABF56E433064D83E5C5C9892BDB854C8219FFBC1404D590450B1613EB0D2CC0447</key>
1.8785 + </derivekey>
1.8786 + </actionbody>
1.8787 +</action>
1.8788 +
1.8789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8791 +//! @SYMREQ CIT_PREQ1054
1.8792 +//! @SYMTestPriority medium
1.8793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8795 +<action>
1.8796 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8797 + <actiontype>DeriveKey</actiontype>
1.8798 + <actionbody>
1.8799 + <derivekey>
1.8800 + <kdf>pkcs#12</kdf>
1.8801 + <passwd>0000</passwd>
1.8802 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8803 + <iterations>8</iterations>
1.8804 + <key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BFCE80BAAFDC06F9C1D1A2862C10203D891E0B2C23F5394ED271</key>
1.8805 + </derivekey>
1.8806 + </actionbody>
1.8807 +</action>
1.8808 +
1.8809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8811 +//! @SYMREQ CIT_PREQ1054
1.8812 +//! @SYMTestPriority medium
1.8813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8815 +<action>
1.8816 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8817 + <actiontype>DeriveKey</actiontype>
1.8818 + <actionbody>
1.8819 + <derivekey>
1.8820 + <kdf>pkcs#12</kdf>
1.8821 + <passwd>0001</passwd>
1.8822 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8823 + <iterations>8</iterations>
1.8824 + <key>82B4A13659033EA4025DB51A6CB573F93B03A69634D71DFB7E270A406AF705382CCA3BB17F29C88ED81EA583AFF5</key>
1.8825 + </derivekey>
1.8826 + </actionbody>
1.8827 +</action>
1.8828 +
1.8829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8831 +//! @SYMREQ CIT_PREQ1054
1.8832 +//! @SYMTestPriority medium
1.8833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8835 +<action>
1.8836 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8837 + <actiontype>DeriveKey</actiontype>
1.8838 + <actionbody>
1.8839 + <derivekey>
1.8840 + <kdf>pkcs#12</kdf>
1.8841 + <passwd>PSWD</passwd>
1.8842 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8843 + <iterations>8</iterations>
1.8844 + <key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94047C10AE3CA2853B57E8E59A819DE9BB2D4F3BFBD302F978C7</key>
1.8845 + </derivekey>
1.8846 + </actionbody>
1.8847 +</action>
1.8848 +
1.8849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8851 +//! @SYMREQ CIT_PREQ1054
1.8852 +//! @SYMTestPriority medium
1.8853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8855 +<action>
1.8856 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8857 + <actiontype>DeriveKey</actiontype>
1.8858 + <actionbody>
1.8859 + <derivekey>
1.8860 + <kdf>pkcs#12</kdf>
1.8861 + <passwd>password</passwd>
1.8862 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8863 + <iterations>8</iterations>
1.8864 + <key>5670457314E405B0ED1583FC4B82FEAD94B434EBEDD86DFBC39161A8A7E48CAD3591C2C9A14FAA242D860ED55163</key>
1.8865 + </derivekey>
1.8866 + </actionbody>
1.8867 +</action>
1.8868 +
1.8869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8871 +//! @SYMREQ CIT_PREQ1054
1.8872 +//! @SYMTestPriority medium
1.8873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8875 +<action>
1.8876 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.8877 + <actiontype>DeriveKey</actiontype>
1.8878 + <actionbody>
1.8879 + <derivekey>
1.8880 + <kdf>pkcs#12</kdf>
1.8881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8882 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.8883 + <iterations>8</iterations>
1.8884 + <key>1C4CAE25146D74F3762B5C3FD3A917522564855675801D9D7D946C11B6F57C42C2E7447F8CACF4178D8F7A001A18</key>
1.8885 + </derivekey>
1.8886 + </actionbody>
1.8887 +</action>
1.8888 +
1.8889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8891 +//! @SYMREQ CIT_PREQ1054
1.8892 +//! @SYMTestPriority medium
1.8893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8895 +<action>
1.8896 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8897 + <actiontype>DeriveKey</actiontype>
1.8898 + <actionbody>
1.8899 + <derivekey>
1.8900 + <kdf>pkcs#12</kdf>
1.8901 + <passwd>0000</passwd>
1.8902 + <salt>53414C54</salt>
1.8903 + <iterations>128</iterations>
1.8904 + <key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93AF1D5E01AB3B9973959193DE7A2433CB46A8A15F2D84D97DBC</key>
1.8905 + </derivekey>
1.8906 + </actionbody>
1.8907 +</action>
1.8908 +
1.8909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8911 +//! @SYMREQ CIT_PREQ1054
1.8912 +//! @SYMTestPriority medium
1.8913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8915 +<action>
1.8916 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8917 + <actiontype>DeriveKey</actiontype>
1.8918 + <actionbody>
1.8919 + <derivekey>
1.8920 + <kdf>pkcs#12</kdf>
1.8921 + <passwd>0001</passwd>
1.8922 + <salt>53414C54</salt>
1.8923 + <iterations>128</iterations>
1.8924 + <key>C89C3A2C9C06626EB831F4BB5262809B9C138181C44B6D521245B6BBDBE2271369C6B77EC12626368DFCEB358BB8</key>
1.8925 + </derivekey>
1.8926 + </actionbody>
1.8927 +</action>
1.8928 +
1.8929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8931 +//! @SYMREQ CIT_PREQ1054
1.8932 +//! @SYMTestPriority medium
1.8933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8935 +<action>
1.8936 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8937 + <actiontype>DeriveKey</actiontype>
1.8938 + <actionbody>
1.8939 + <derivekey>
1.8940 + <kdf>pkcs#12</kdf>
1.8941 + <passwd>PSWD</passwd>
1.8942 + <salt>53414C54</salt>
1.8943 + <iterations>128</iterations>
1.8944 + <key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EEE6D0B4E9C0A5EBBFF08FC23CB11E1DB17EBAE6A93C2DA749A6</key>
1.8945 + </derivekey>
1.8946 + </actionbody>
1.8947 +</action>
1.8948 +
1.8949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8951 +//! @SYMREQ CIT_PREQ1054
1.8952 +//! @SYMTestPriority medium
1.8953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8955 +<action>
1.8956 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8957 + <actiontype>DeriveKey</actiontype>
1.8958 + <actionbody>
1.8959 + <derivekey>
1.8960 + <kdf>pkcs#12</kdf>
1.8961 + <passwd>password</passwd>
1.8962 + <salt>53414C54</salt>
1.8963 + <iterations>128</iterations>
1.8964 + <key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C2011A3B26BD1C95A8797741938D8E3F2057F76B04310B3D922</key>
1.8965 + </derivekey>
1.8966 + </actionbody>
1.8967 +</action>
1.8968 +
1.8969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8971 +//! @SYMREQ CIT_PREQ1054
1.8972 +//! @SYMTestPriority medium
1.8973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8975 +<action>
1.8976 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.8977 + <actiontype>DeriveKey</actiontype>
1.8978 + <actionbody>
1.8979 + <derivekey>
1.8980 + <kdf>pkcs#12</kdf>
1.8981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.8982 + <salt>53414C54</salt>
1.8983 + <iterations>128</iterations>
1.8984 + <key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F97A6D3BDA02B3173244164AAE9123987A00699B74F042C35DC</key>
1.8985 + </derivekey>
1.8986 + </actionbody>
1.8987 +</action>
1.8988 +
1.8989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.8990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.8991 +//! @SYMREQ CIT_PREQ1054
1.8992 +//! @SYMTestPriority medium
1.8993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.8994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.8995 +<action>
1.8996 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.8997 + <actiontype>DeriveKey</actiontype>
1.8998 + <actionbody>
1.8999 + <derivekey>
1.9000 + <kdf>pkcs#12</kdf>
1.9001 + <passwd>0000</passwd>
1.9002 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9003 + <iterations>128</iterations>
1.9004 + <key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD8D380FA3C08389E335A71B575F3D48228119EA2E34351C7E51</key>
1.9005 + </derivekey>
1.9006 + </actionbody>
1.9007 +</action>
1.9008 +
1.9009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9011 +//! @SYMREQ CIT_PREQ1054
1.9012 +//! @SYMTestPriority medium
1.9013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9015 +<action>
1.9016 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9017 + <actiontype>DeriveKey</actiontype>
1.9018 + <actionbody>
1.9019 + <derivekey>
1.9020 + <kdf>pkcs#12</kdf>
1.9021 + <passwd>0001</passwd>
1.9022 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9023 + <iterations>128</iterations>
1.9024 + <key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3FD6375B5D9AB89DDA3B28526392E1BED3594C3A22594137133</key>
1.9025 + </derivekey>
1.9026 + </actionbody>
1.9027 +</action>
1.9028 +
1.9029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9031 +//! @SYMREQ CIT_PREQ1054
1.9032 +//! @SYMTestPriority medium
1.9033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9035 +<action>
1.9036 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9037 + <actiontype>DeriveKey</actiontype>
1.9038 + <actionbody>
1.9039 + <derivekey>
1.9040 + <kdf>pkcs#12</kdf>
1.9041 + <passwd>PSWD</passwd>
1.9042 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9043 + <iterations>128</iterations>
1.9044 + <key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF6F15DAE903AEAA4C8A9A23B8DA9E91293F5ED1904E6D8F8ED5</key>
1.9045 + </derivekey>
1.9046 + </actionbody>
1.9047 +</action>
1.9048 +
1.9049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9051 +//! @SYMREQ CIT_PREQ1054
1.9052 +//! @SYMTestPriority medium
1.9053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9055 +<action>
1.9056 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9057 + <actiontype>DeriveKey</actiontype>
1.9058 + <actionbody>
1.9059 + <derivekey>
1.9060 + <kdf>pkcs#12</kdf>
1.9061 + <passwd>password</passwd>
1.9062 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9063 + <iterations>128</iterations>
1.9064 + <key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3483C97430FABCCAB60A1F471741095AEB2B22B00951CEFB816</key>
1.9065 + </derivekey>
1.9066 + </actionbody>
1.9067 +</action>
1.9068 +
1.9069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9071 +//! @SYMREQ CIT_PREQ1054
1.9072 +//! @SYMTestPriority medium
1.9073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9075 +<action>
1.9076 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9077 + <actiontype>DeriveKey</actiontype>
1.9078 + <actionbody>
1.9079 + <derivekey>
1.9080 + <kdf>pkcs#12</kdf>
1.9081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9082 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9083 + <iterations>128</iterations>
1.9084 + <key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16C2FF4007B705AC86ACDBE7C08A599E170F42573671CAAC9978</key>
1.9085 + </derivekey>
1.9086 + </actionbody>
1.9087 +</action>
1.9088 +
1.9089 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9091 +//! @SYMREQ CIT_PREQ1054
1.9092 +//! @SYMTestPriority medium
1.9093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9095 +<action>
1.9096 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9097 + <actiontype>DeriveKey</actiontype>
1.9098 + <actionbody>
1.9099 + <derivekey>
1.9100 + <kdf>pkcs#12</kdf>
1.9101 + <passwd>0000</passwd>
1.9102 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9103 + <iterations>128</iterations>
1.9104 + <key>99FE149183022F9EB2EB815BCC9504E59C524A1497922B0A2AAB43D17ACD0C3C782048DA1AD2BA09B56143681975</key>
1.9105 + </derivekey>
1.9106 + </actionbody>
1.9107 +</action>
1.9108 +
1.9109 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9111 +//! @SYMREQ CIT_PREQ1054
1.9112 +//! @SYMTestPriority medium
1.9113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9115 +<action>
1.9116 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9117 + <actiontype>DeriveKey</actiontype>
1.9118 + <actionbody>
1.9119 + <derivekey>
1.9120 + <kdf>pkcs#12</kdf>
1.9121 + <passwd>0001</passwd>
1.9122 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9123 + <iterations>128</iterations>
1.9124 + <key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FEB822868DC3090EEB79DED23D3E5F8FADAF47EB100E36B393BF</key>
1.9125 + </derivekey>
1.9126 + </actionbody>
1.9127 +</action>
1.9128 +
1.9129 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9131 +//! @SYMREQ CIT_PREQ1054
1.9132 +//! @SYMTestPriority medium
1.9133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9135 +<action>
1.9136 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9137 + <actiontype>DeriveKey</actiontype>
1.9138 + <actionbody>
1.9139 + <derivekey>
1.9140 + <kdf>pkcs#12</kdf>
1.9141 + <passwd>PSWD</passwd>
1.9142 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9143 + <iterations>128</iterations>
1.9144 + <key>22A70A865774E55CF08A70435611252278DCE76AED5C8A686073CBBEFEA2A3498BF5505B3E9CC6A1BE108737874F</key>
1.9145 + </derivekey>
1.9146 + </actionbody>
1.9147 +</action>
1.9148 +
1.9149 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9151 +//! @SYMREQ CIT_PREQ1054
1.9152 +//! @SYMTestPriority medium
1.9153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9155 +<action>
1.9156 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9157 + <actiontype>DeriveKey</actiontype>
1.9158 + <actionbody>
1.9159 + <derivekey>
1.9160 + <kdf>pkcs#12</kdf>
1.9161 + <passwd>password</passwd>
1.9162 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9163 + <iterations>128</iterations>
1.9164 + <key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C672CFA941C4ECCF5F173B42AABBBE23AEF7593C67EF5B183C3C8</key>
1.9165 + </derivekey>
1.9166 + </actionbody>
1.9167 +</action>
1.9168 +
1.9169 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9171 +//! @SYMREQ CIT_PREQ1054
1.9172 +//! @SYMTestPriority medium
1.9173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9175 +<action>
1.9176 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9177 + <actiontype>DeriveKey</actiontype>
1.9178 + <actionbody>
1.9179 + <derivekey>
1.9180 + <kdf>pkcs#12</kdf>
1.9181 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9182 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9183 + <iterations>128</iterations>
1.9184 + <key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CED20B6799ADA986C06DDF299F615C6B222A9C12CB65CD078D9A</key>
1.9185 + </derivekey>
1.9186 + </actionbody>
1.9187 +</action>
1.9188 +
1.9189 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9191 +//! @SYMREQ CIT_PREQ1054
1.9192 +//! @SYMTestPriority medium
1.9193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9195 +<action>
1.9196 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9197 + <actiontype>DeriveKey</actiontype>
1.9198 + <actionbody>
1.9199 + <derivekey>
1.9200 + <kdf>pkcs#12</kdf>
1.9201 + <passwd>0000</passwd>
1.9202 + <salt>53414C54</salt>
1.9203 + <iterations>1024</iterations>
1.9204 + <key>82824BE51C81A5FF4C4268E256F6621B9656325BEFB8E936331AB1AB8BDE634EA6298D7B8EB79832AAF01CF1F49A</key>
1.9205 + </derivekey>
1.9206 + </actionbody>
1.9207 +</action>
1.9208 +
1.9209 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9211 +//! @SYMREQ CIT_PREQ1054
1.9212 +//! @SYMTestPriority medium
1.9213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9215 +<action>
1.9216 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9217 + <actiontype>DeriveKey</actiontype>
1.9218 + <actionbody>
1.9219 + <derivekey>
1.9220 + <kdf>pkcs#12</kdf>
1.9221 + <passwd>0001</passwd>
1.9222 + <salt>53414C54</salt>
1.9223 + <iterations>1024</iterations>
1.9224 + <key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2680CD8CEAEF02609895F3CAC00A837D49674737EEC85151786</key>
1.9225 + </derivekey>
1.9226 + </actionbody>
1.9227 +</action>
1.9228 +
1.9229 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9231 +//! @SYMREQ CIT_PREQ1054
1.9232 +//! @SYMTestPriority medium
1.9233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9235 +<action>
1.9236 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9237 + <actiontype>DeriveKey</actiontype>
1.9238 + <actionbody>
1.9239 + <derivekey>
1.9240 + <kdf>pkcs#12</kdf>
1.9241 + <passwd>PSWD</passwd>
1.9242 + <salt>53414C54</salt>
1.9243 + <iterations>1024</iterations>
1.9244 + <key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE53571C9CE41B5FB82532D38F0DB4489BC642605ACF4FDCAEF5</key>
1.9245 + </derivekey>
1.9246 + </actionbody>
1.9247 +</action>
1.9248 +
1.9249 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9251 +//! @SYMREQ CIT_PREQ1054
1.9252 +//! @SYMTestPriority medium
1.9253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9255 +<action>
1.9256 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9257 + <actiontype>DeriveKey</actiontype>
1.9258 + <actionbody>
1.9259 + <derivekey>
1.9260 + <kdf>pkcs#12</kdf>
1.9261 + <passwd>password</passwd>
1.9262 + <salt>53414C54</salt>
1.9263 + <iterations>1024</iterations>
1.9264 + <key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E848576D39CDFA77EFE9969986D072D8C44B9147961EC0A3BC5AC</key>
1.9265 + </derivekey>
1.9266 + </actionbody>
1.9267 +</action>
1.9268 +
1.9269 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9271 +//! @SYMREQ CIT_PREQ1054
1.9272 +//! @SYMTestPriority medium
1.9273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9275 +<action>
1.9276 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9277 + <actiontype>DeriveKey</actiontype>
1.9278 + <actionbody>
1.9279 + <derivekey>
1.9280 + <kdf>pkcs#12</kdf>
1.9281 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9282 + <salt>53414C54</salt>
1.9283 + <iterations>1024</iterations>
1.9284 + <key>406C92305ACD663AB0B9EB66DED7929547C692FE118E8D16D80EDCE4FAFBB47960F4B4AB7272496528D235E45B5A</key>
1.9285 + </derivekey>
1.9286 + </actionbody>
1.9287 +</action>
1.9288 +
1.9289 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9291 +//! @SYMREQ CIT_PREQ1054
1.9292 +//! @SYMTestPriority medium
1.9293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9295 +<action>
1.9296 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9297 + <actiontype>DeriveKey</actiontype>
1.9298 + <actionbody>
1.9299 + <derivekey>
1.9300 + <kdf>pkcs#12</kdf>
1.9301 + <passwd>0000</passwd>
1.9302 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9303 + <iterations>1024</iterations>
1.9304 + <key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355C1E6AFFDE182AC0F49BF46F175F79F51352196D93EA67E17DF</key>
1.9305 + </derivekey>
1.9306 + </actionbody>
1.9307 +</action>
1.9308 +
1.9309 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9311 +//! @SYMREQ CIT_PREQ1054
1.9312 +//! @SYMTestPriority medium
1.9313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9315 +<action>
1.9316 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9317 + <actiontype>DeriveKey</actiontype>
1.9318 + <actionbody>
1.9319 + <derivekey>
1.9320 + <kdf>pkcs#12</kdf>
1.9321 + <passwd>0001</passwd>
1.9322 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9323 + <iterations>1024</iterations>
1.9324 + <key>0182E41FCA166CEAED10972BDF5F57A8F851200E371EC06DC900E66ACAEA25B12EFE28E7571395A1B57ABB8E9DAC</key>
1.9325 + </derivekey>
1.9326 + </actionbody>
1.9327 +</action>
1.9328 +
1.9329 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9331 +//! @SYMREQ CIT_PREQ1054
1.9332 +//! @SYMTestPriority medium
1.9333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9335 +<action>
1.9336 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9337 + <actiontype>DeriveKey</actiontype>
1.9338 + <actionbody>
1.9339 + <derivekey>
1.9340 + <kdf>pkcs#12</kdf>
1.9341 + <passwd>PSWD</passwd>
1.9342 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9343 + <iterations>1024</iterations>
1.9344 + <key>101FB775982CA15E37A065F7CDC5593DE385BDF504433650CC572F880CE0F525E77551ACFFCF92F66C9D407BFABF</key>
1.9345 + </derivekey>
1.9346 + </actionbody>
1.9347 +</action>
1.9348 +
1.9349 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9351 +//! @SYMREQ CIT_PREQ1054
1.9352 +//! @SYMTestPriority medium
1.9353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9355 +<action>
1.9356 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9357 + <actiontype>DeriveKey</actiontype>
1.9358 + <actionbody>
1.9359 + <derivekey>
1.9360 + <kdf>pkcs#12</kdf>
1.9361 + <passwd>password</passwd>
1.9362 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9363 + <iterations>1024</iterations>
1.9364 + <key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B61492CF0D98500BD3842C77C2D639589A83E60B22BE53751156F1</key>
1.9365 + </derivekey>
1.9366 + </actionbody>
1.9367 +</action>
1.9368 +
1.9369 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9371 +//! @SYMREQ CIT_PREQ1054
1.9372 +//! @SYMTestPriority medium
1.9373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9375 +<action>
1.9376 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9377 + <actiontype>DeriveKey</actiontype>
1.9378 + <actionbody>
1.9379 + <derivekey>
1.9380 + <kdf>pkcs#12</kdf>
1.9381 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9382 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9383 + <iterations>1024</iterations>
1.9384 + <key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95969233AAFAC6ABB4C369DDD9394FBCE2C4D86670BAA2AD6355</key>
1.9385 + </derivekey>
1.9386 + </actionbody>
1.9387 +</action>
1.9388 +
1.9389 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9391 +//! @SYMREQ CIT_PREQ1054
1.9392 +//! @SYMTestPriority medium
1.9393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9395 +<action>
1.9396 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9397 + <actiontype>DeriveKey</actiontype>
1.9398 + <actionbody>
1.9399 + <derivekey>
1.9400 + <kdf>pkcs#12</kdf>
1.9401 + <passwd>0000</passwd>
1.9402 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9403 + <iterations>1024</iterations>
1.9404 + <key>6789F0680A5C5840B8ED34B061494171E6407643F9400545C62690ED570B3AAD96654D5DE15C7CA6AE242E6123E9</key>
1.9405 + </derivekey>
1.9406 + </actionbody>
1.9407 +</action>
1.9408 +
1.9409 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9411 +//! @SYMREQ CIT_PREQ1054
1.9412 +//! @SYMTestPriority medium
1.9413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9415 +<action>
1.9416 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9417 + <actiontype>DeriveKey</actiontype>
1.9418 + <actionbody>
1.9419 + <derivekey>
1.9420 + <kdf>pkcs#12</kdf>
1.9421 + <passwd>0001</passwd>
1.9422 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9423 + <iterations>1024</iterations>
1.9424 + <key>43E663725870C4801A917C41C9B58C419933A93475CEA2FBB864F29E6D949DF2AAA8ADAB91C8A32B68062F12EE61</key>
1.9425 + </derivekey>
1.9426 + </actionbody>
1.9427 +</action>
1.9428 +
1.9429 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9431 +//! @SYMREQ CIT_PREQ1054
1.9432 +//! @SYMTestPriority medium
1.9433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9435 +<action>
1.9436 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9437 + <actiontype>DeriveKey</actiontype>
1.9438 + <actionbody>
1.9439 + <derivekey>
1.9440 + <kdf>pkcs#12</kdf>
1.9441 + <passwd>PSWD</passwd>
1.9442 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9443 + <iterations>1024</iterations>
1.9444 + <key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5C24BF367B0C63BE89EA9EB57615C0ABFAFC3FB8DFDEA3907AA</key>
1.9445 + </derivekey>
1.9446 + </actionbody>
1.9447 +</action>
1.9448 +
1.9449 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9451 +//! @SYMREQ CIT_PREQ1054
1.9452 +//! @SYMTestPriority medium
1.9453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9455 +<action>
1.9456 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9457 + <actiontype>DeriveKey</actiontype>
1.9458 + <actionbody>
1.9459 + <derivekey>
1.9460 + <kdf>pkcs#12</kdf>
1.9461 + <passwd>password</passwd>
1.9462 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9463 + <iterations>1024</iterations>
1.9464 + <key>CA202602C9A265559B6B96729B574DAA9B6D67036F69D903784374671E9B7E087ADE4AB9C5AE6BB62530C90F4E9C</key>
1.9465 + </derivekey>
1.9466 + </actionbody>
1.9467 +</action>
1.9468 +
1.9469 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9471 +//! @SYMREQ CIT_PREQ1054
1.9472 +//! @SYMTestPriority medium
1.9473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9475 +<action>
1.9476 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9477 + <actiontype>DeriveKey</actiontype>
1.9478 + <actionbody>
1.9479 + <derivekey>
1.9480 + <kdf>pkcs#12</kdf>
1.9481 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9482 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9483 + <iterations>1024</iterations>
1.9484 + <key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D4689DBDFBE81CF5F337376B8EEC58ADFD518A26768ABEB20131B9</key>
1.9485 + </derivekey>
1.9486 + </actionbody>
1.9487 +</action>
1.9488 +
1.9489 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9491 +//! @SYMREQ CIT_PREQ1054
1.9492 +//! @SYMTestPriority medium
1.9493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9495 +<action>
1.9496 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9497 + <actiontype>DeriveKey</actiontype>
1.9498 + <actionbody>
1.9499 + <derivekey>
1.9500 + <kdf>pkcs#12</kdf>
1.9501 + <passwd>0000</passwd>
1.9502 + <salt>53414C54</salt>
1.9503 + <iterations>1536</iterations>
1.9504 + <key>79A4E1398F511B262E60DCFE9E838C938B806716A9831A1BF6FFE616ADE12860428079E9CD2165E9194346EB6677</key>
1.9505 + </derivekey>
1.9506 + </actionbody>
1.9507 +</action>
1.9508 +
1.9509 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9511 +//! @SYMREQ CIT_PREQ1054
1.9512 +//! @SYMTestPriority medium
1.9513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9515 +<action>
1.9516 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9517 + <actiontype>DeriveKey</actiontype>
1.9518 + <actionbody>
1.9519 + <derivekey>
1.9520 + <kdf>pkcs#12</kdf>
1.9521 + <passwd>0001</passwd>
1.9522 + <salt>53414C54</salt>
1.9523 + <iterations>1536</iterations>
1.9524 + <key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D25BFDD890E8B903E66B306ED5C9F5C7B53BEA11BD495C328951</key>
1.9525 + </derivekey>
1.9526 + </actionbody>
1.9527 +</action>
1.9528 +
1.9529 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9531 +//! @SYMREQ CIT_PREQ1054
1.9532 +//! @SYMTestPriority medium
1.9533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9535 +<action>
1.9536 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9537 + <actiontype>DeriveKey</actiontype>
1.9538 + <actionbody>
1.9539 + <derivekey>
1.9540 + <kdf>pkcs#12</kdf>
1.9541 + <passwd>PSWD</passwd>
1.9542 + <salt>53414C54</salt>
1.9543 + <iterations>1536</iterations>
1.9544 + <key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E64B6690AE6ED16C5A82A0F7E7D9578BA7F62A7427260733165A</key>
1.9545 + </derivekey>
1.9546 + </actionbody>
1.9547 +</action>
1.9548 +
1.9549 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9551 +//! @SYMREQ CIT_PREQ1054
1.9552 +//! @SYMTestPriority medium
1.9553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9555 +<action>
1.9556 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9557 + <actiontype>DeriveKey</actiontype>
1.9558 + <actionbody>
1.9559 + <derivekey>
1.9560 + <kdf>pkcs#12</kdf>
1.9561 + <passwd>password</passwd>
1.9562 + <salt>53414C54</salt>
1.9563 + <iterations>1536</iterations>
1.9564 + <key>65B27A78C72DFEEA6C92846330CE98C6721909E89B014925B22427256BC6A4EFEB7A83A2244E59A25E7DE2F01FA6</key>
1.9565 + </derivekey>
1.9566 + </actionbody>
1.9567 +</action>
1.9568 +
1.9569 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9571 +//! @SYMREQ CIT_PREQ1054
1.9572 +//! @SYMTestPriority medium
1.9573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9575 +<action>
1.9576 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9577 + <actiontype>DeriveKey</actiontype>
1.9578 + <actionbody>
1.9579 + <derivekey>
1.9580 + <kdf>pkcs#12</kdf>
1.9581 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9582 + <salt>53414C54</salt>
1.9583 + <iterations>1536</iterations>
1.9584 + <key>8F8FC96A3D958731780B50E843D6BB65137A0728C3A4C55D23D4A0E99EBA71F56EC19356B50B987F486F3FF74A9C</key>
1.9585 + </derivekey>
1.9586 + </actionbody>
1.9587 +</action>
1.9588 +
1.9589 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9591 +//! @SYMREQ CIT_PREQ1054
1.9592 +//! @SYMTestPriority medium
1.9593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9595 +<action>
1.9596 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9597 + <actiontype>DeriveKey</actiontype>
1.9598 + <actionbody>
1.9599 + <derivekey>
1.9600 + <kdf>pkcs#12</kdf>
1.9601 + <passwd>0000</passwd>
1.9602 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9603 + <iterations>1536</iterations>
1.9604 + <key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25C6120B9099920440D11725F1D4F7CABFB8A170BF9744B74461</key>
1.9605 + </derivekey>
1.9606 + </actionbody>
1.9607 +</action>
1.9608 +
1.9609 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9611 +//! @SYMREQ CIT_PREQ1054
1.9612 +//! @SYMTestPriority medium
1.9613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9615 +<action>
1.9616 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9617 + <actiontype>DeriveKey</actiontype>
1.9618 + <actionbody>
1.9619 + <derivekey>
1.9620 + <kdf>pkcs#12</kdf>
1.9621 + <passwd>0001</passwd>
1.9622 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9623 + <iterations>1536</iterations>
1.9624 + <key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB413E8EAC164C3BA1FAD7ABC1CADB1BF7458010BF7814262F563</key>
1.9625 + </derivekey>
1.9626 + </actionbody>
1.9627 +</action>
1.9628 +
1.9629 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9631 +//! @SYMREQ CIT_PREQ1054
1.9632 +//! @SYMTestPriority medium
1.9633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9635 +<action>
1.9636 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9637 + <actiontype>DeriveKey</actiontype>
1.9638 + <actionbody>
1.9639 + <derivekey>
1.9640 + <kdf>pkcs#12</kdf>
1.9641 + <passwd>PSWD</passwd>
1.9642 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9643 + <iterations>1536</iterations>
1.9644 + <key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0CC173973E296F655BAB0BFEA7E51BACD8FC73AB278469439B58</key>
1.9645 + </derivekey>
1.9646 + </actionbody>
1.9647 +</action>
1.9648 +
1.9649 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9651 +//! @SYMREQ CIT_PREQ1054
1.9652 +//! @SYMTestPriority medium
1.9653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9655 +<action>
1.9656 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9657 + <actiontype>DeriveKey</actiontype>
1.9658 + <actionbody>
1.9659 + <derivekey>
1.9660 + <kdf>pkcs#12</kdf>
1.9661 + <passwd>password</passwd>
1.9662 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9663 + <iterations>1536</iterations>
1.9664 + <key>C05FE26245C742CC01B23C655E5D934D734610DE015AEFA126CC8A53FBD91EC774AE631F57444E206494BE6EB304</key>
1.9665 + </derivekey>
1.9666 + </actionbody>
1.9667 +</action>
1.9668 +
1.9669 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9671 +//! @SYMREQ CIT_PREQ1054
1.9672 +//! @SYMTestPriority medium
1.9673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9675 +<action>
1.9676 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9677 + <actiontype>DeriveKey</actiontype>
1.9678 + <actionbody>
1.9679 + <derivekey>
1.9680 + <kdf>pkcs#12</kdf>
1.9681 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9682 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9683 + <iterations>1536</iterations>
1.9684 + <key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0E036709FBD02F0FA15B7497042FF3E0B56ED26ACC058F1D00B</key>
1.9685 + </derivekey>
1.9686 + </actionbody>
1.9687 +</action>
1.9688 +
1.9689 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9691 +//! @SYMREQ CIT_PREQ1054
1.9692 +//! @SYMTestPriority medium
1.9693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9695 +<action>
1.9696 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9697 + <actiontype>DeriveKey</actiontype>
1.9698 + <actionbody>
1.9699 + <derivekey>
1.9700 + <kdf>pkcs#12</kdf>
1.9701 + <passwd>0000</passwd>
1.9702 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9703 + <iterations>1536</iterations>
1.9704 + <key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3E8CDC6C4D8D7D7226769FADE4650767B4472BBD418B2D969EB</key>
1.9705 + </derivekey>
1.9706 + </actionbody>
1.9707 +</action>
1.9708 +
1.9709 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9711 +//! @SYMREQ CIT_PREQ1054
1.9712 +//! @SYMTestPriority medium
1.9713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9715 +<action>
1.9716 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9717 + <actiontype>DeriveKey</actiontype>
1.9718 + <actionbody>
1.9719 + <derivekey>
1.9720 + <kdf>pkcs#12</kdf>
1.9721 + <passwd>0001</passwd>
1.9722 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9723 + <iterations>1536</iterations>
1.9724 + <key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA3932F031B4FB2D6F799C857B7B821D5CB05419EE6DF2D10BBD</key>
1.9725 + </derivekey>
1.9726 + </actionbody>
1.9727 +</action>
1.9728 +
1.9729 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9731 +//! @SYMREQ CIT_PREQ1054
1.9732 +//! @SYMTestPriority medium
1.9733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9735 +<action>
1.9736 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9737 + <actiontype>DeriveKey</actiontype>
1.9738 + <actionbody>
1.9739 + <derivekey>
1.9740 + <kdf>pkcs#12</kdf>
1.9741 + <passwd>PSWD</passwd>
1.9742 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9743 + <iterations>1536</iterations>
1.9744 + <key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA949B44DA6EAFD9D83FCD9365C617C137F7EC9C3EF036BD592C</key>
1.9745 + </derivekey>
1.9746 + </actionbody>
1.9747 +</action>
1.9748 +
1.9749 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9751 +//! @SYMREQ CIT_PREQ1054
1.9752 +//! @SYMTestPriority medium
1.9753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9755 +<action>
1.9756 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9757 + <actiontype>DeriveKey</actiontype>
1.9758 + <actionbody>
1.9759 + <derivekey>
1.9760 + <kdf>pkcs#12</kdf>
1.9761 + <passwd>password</passwd>
1.9762 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9763 + <iterations>1536</iterations>
1.9764 + <key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD458CDBB895741595BD6F879B9134D56F8695A654407E4809C56</key>
1.9765 + </derivekey>
1.9766 + </actionbody>
1.9767 +</action>
1.9768 +
1.9769 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9771 +//! @SYMREQ CIT_PREQ1054
1.9772 +//! @SYMTestPriority medium
1.9773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9775 +<action>
1.9776 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9777 + <actiontype>DeriveKey</actiontype>
1.9778 + <actionbody>
1.9779 + <derivekey>
1.9780 + <kdf>pkcs#12</kdf>
1.9781 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9782 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.9783 + <iterations>1536</iterations>
1.9784 + <key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B272CB0DD4D76CAE04D831A4C12BC353F7C60F50ED67DF548599</key>
1.9785 + </derivekey>
1.9786 + </actionbody>
1.9787 +</action>
1.9788 +
1.9789 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9791 +//! @SYMREQ CIT_PREQ1054
1.9792 +//! @SYMTestPriority medium
1.9793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9795 +<action>
1.9796 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9797 + <actiontype>DeriveKey</actiontype>
1.9798 + <actionbody>
1.9799 + <derivekey>
1.9800 + <kdf>pkcs#12</kdf>
1.9801 + <passwd>0000</passwd>
1.9802 + <salt>53414C54</salt>
1.9803 + <iterations>2048</iterations>
1.9804 + <key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCDD858068993D4F95777E800B47B0A091487E50D888139BBAA95</key>
1.9805 + </derivekey>
1.9806 + </actionbody>
1.9807 +</action>
1.9808 +
1.9809 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9811 +//! @SYMREQ CIT_PREQ1054
1.9812 +//! @SYMTestPriority medium
1.9813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9815 +<action>
1.9816 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9817 + <actiontype>DeriveKey</actiontype>
1.9818 + <actionbody>
1.9819 + <derivekey>
1.9820 + <kdf>pkcs#12</kdf>
1.9821 + <passwd>0001</passwd>
1.9822 + <salt>53414C54</salt>
1.9823 + <iterations>2048</iterations>
1.9824 + <key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2275085600120C9642E197813F99DBE317142466C44961771AF</key>
1.9825 + </derivekey>
1.9826 + </actionbody>
1.9827 +</action>
1.9828 +
1.9829 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9831 +//! @SYMREQ CIT_PREQ1054
1.9832 +//! @SYMTestPriority medium
1.9833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9835 +<action>
1.9836 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9837 + <actiontype>DeriveKey</actiontype>
1.9838 + <actionbody>
1.9839 + <derivekey>
1.9840 + <kdf>pkcs#12</kdf>
1.9841 + <passwd>PSWD</passwd>
1.9842 + <salt>53414C54</salt>
1.9843 + <iterations>2048</iterations>
1.9844 + <key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2D6DD3D0577A59043B25D770FAC6CFF48666D15795B61297255</key>
1.9845 + </derivekey>
1.9846 + </actionbody>
1.9847 +</action>
1.9848 +
1.9849 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9851 +//! @SYMREQ CIT_PREQ1054
1.9852 +//! @SYMTestPriority medium
1.9853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9855 +<action>
1.9856 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9857 + <actiontype>DeriveKey</actiontype>
1.9858 + <actionbody>
1.9859 + <derivekey>
1.9860 + <kdf>pkcs#12</kdf>
1.9861 + <passwd>password</passwd>
1.9862 + <salt>53414C54</salt>
1.9863 + <iterations>2048</iterations>
1.9864 + <key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D97444114C46756D3F2FD1DF12182CF6C83CF32E72D1A70DF206</key>
1.9865 + </derivekey>
1.9866 + </actionbody>
1.9867 +</action>
1.9868 +
1.9869 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9871 +//! @SYMREQ CIT_PREQ1054
1.9872 +//! @SYMTestPriority medium
1.9873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9875 +<action>
1.9876 + <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
1.9877 + <actiontype>DeriveKey</actiontype>
1.9878 + <actionbody>
1.9879 + <derivekey>
1.9880 + <kdf>pkcs#12</kdf>
1.9881 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9882 + <salt>53414C54</salt>
1.9883 + <iterations>2048</iterations>
1.9884 + <key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45F218B705E54071E5BE4AB622F2E9B45FCA663D8B30ADCC0073</key>
1.9885 + </derivekey>
1.9886 + </actionbody>
1.9887 +</action>
1.9888 +
1.9889 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9891 +//! @SYMREQ CIT_PREQ1054
1.9892 +//! @SYMTestPriority medium
1.9893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9895 +<action>
1.9896 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9897 + <actiontype>DeriveKey</actiontype>
1.9898 + <actionbody>
1.9899 + <derivekey>
1.9900 + <kdf>pkcs#12</kdf>
1.9901 + <passwd>0000</passwd>
1.9902 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9903 + <iterations>2048</iterations>
1.9904 + <key>CD045229461658BC6C47C259F2D20433173DE4D31E54B1D693738FBA6D643ECB095761373FB0E49F9C478BA11755</key>
1.9905 + </derivekey>
1.9906 + </actionbody>
1.9907 +</action>
1.9908 +
1.9909 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9911 +//! @SYMREQ CIT_PREQ1054
1.9912 +//! @SYMTestPriority medium
1.9913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9915 +<action>
1.9916 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9917 + <actiontype>DeriveKey</actiontype>
1.9918 + <actionbody>
1.9919 + <derivekey>
1.9920 + <kdf>pkcs#12</kdf>
1.9921 + <passwd>0001</passwd>
1.9922 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9923 + <iterations>2048</iterations>
1.9924 + <key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6DC8B942CA4D9447EDFC29A5BDC1D450A73B298C6A9A8ED7D2F4</key>
1.9925 + </derivekey>
1.9926 + </actionbody>
1.9927 +</action>
1.9928 +
1.9929 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9931 +//! @SYMREQ CIT_PREQ1054
1.9932 +//! @SYMTestPriority medium
1.9933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9935 +<action>
1.9936 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9937 + <actiontype>DeriveKey</actiontype>
1.9938 + <actionbody>
1.9939 + <derivekey>
1.9940 + <kdf>pkcs#12</kdf>
1.9941 + <passwd>PSWD</passwd>
1.9942 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9943 + <iterations>2048</iterations>
1.9944 + <key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC37C801DE5E02A6DD1A193970B4505A403005B378BE47D61FEB</key>
1.9945 + </derivekey>
1.9946 + </actionbody>
1.9947 +</action>
1.9948 +
1.9949 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9951 +//! @SYMREQ CIT_PREQ1054
1.9952 +//! @SYMTestPriority medium
1.9953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9955 +<action>
1.9956 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9957 + <actiontype>DeriveKey</actiontype>
1.9958 + <actionbody>
1.9959 + <derivekey>
1.9960 + <kdf>pkcs#12</kdf>
1.9961 + <passwd>password</passwd>
1.9962 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9963 + <iterations>2048</iterations>
1.9964 + <key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B2F0294723113F25347AEAF0109E270C77A2524CAC118D164B8</key>
1.9965 + </derivekey>
1.9966 + </actionbody>
1.9967 +</action>
1.9968 +
1.9969 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9971 +//! @SYMREQ CIT_PREQ1054
1.9972 +//! @SYMTestPriority medium
1.9973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9975 +<action>
1.9976 + <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
1.9977 + <actiontype>DeriveKey</actiontype>
1.9978 + <actionbody>
1.9979 + <derivekey>
1.9980 + <kdf>pkcs#12</kdf>
1.9981 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.9982 + <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
1.9983 + <iterations>2048</iterations>
1.9984 + <key>A5B348EB4926290B223724CC8E4ED67FF458F2362279F0DF9F3A92AFF0473030D0EBA6E4173AF91E7AE535D3E988</key>
1.9985 + </derivekey>
1.9986 + </actionbody>
1.9987 +</action>
1.9988 +
1.9989 +//! @SYMTestCaseID CIT_PREQ1054_01
1.9990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.9991 +//! @SYMREQ CIT_PREQ1054
1.9992 +//! @SYMTestPriority medium
1.9993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.9994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.9995 +<action>
1.9996 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.9997 + <actiontype>DeriveKey</actiontype>
1.9998 + <actionbody>
1.9999 + <derivekey>
1.10000 + <kdf>pkcs#12</kdf>
1.10001 + <passwd>0000</passwd>
1.10002 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.10003 + <iterations>2048</iterations>
1.10004 + <key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A259262CE1B3E626454FF2A5B69A372FE3894C48E574F70F191F4</key>
1.10005 + </derivekey>
1.10006 + </actionbody>
1.10007 +</action>
1.10008 +
1.10009 +//! @SYMTestCaseID CIT_PREQ1054_01
1.10010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.10011 +//! @SYMREQ CIT_PREQ1054
1.10012 +//! @SYMTestPriority medium
1.10013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.10014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.10015 +<action>
1.10016 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.10017 + <actiontype>DeriveKey</actiontype>
1.10018 + <actionbody>
1.10019 + <derivekey>
1.10020 + <kdf>pkcs#12</kdf>
1.10021 + <passwd>0001</passwd>
1.10022 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.10023 + <iterations>2048</iterations>
1.10024 + <key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE13602A15DF682A601681221A748627D1C585C079F8DCBD5ABE9763</key>
1.10025 + </derivekey>
1.10026 + </actionbody>
1.10027 +</action>
1.10028 +
1.10029 +//! @SYMTestCaseID CIT_PREQ1054_01
1.10030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.10031 +//! @SYMREQ CIT_PREQ1054
1.10032 +//! @SYMTestPriority medium
1.10033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.10034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.10035 +<action>
1.10036 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.10037 + <actiontype>DeriveKey</actiontype>
1.10038 + <actionbody>
1.10039 + <derivekey>
1.10040 + <kdf>pkcs#12</kdf>
1.10041 + <passwd>PSWD</passwd>
1.10042 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.10043 + <iterations>2048</iterations>
1.10044 + <key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2A148121AE3E9E23B3891882F575F204CB0639FC9FDB9D5B0BD</key>
1.10045 + </derivekey>
1.10046 + </actionbody>
1.10047 +</action>
1.10048 +
1.10049 +//! @SYMTestCaseID CIT_PREQ1054_01
1.10050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.10051 +//! @SYMREQ CIT_PREQ1054
1.10052 +//! @SYMTestPriority medium
1.10053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.10054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.10055 +<action>
1.10056 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.10057 + <actiontype>DeriveKey</actiontype>
1.10058 + <actionbody>
1.10059 + <derivekey>
1.10060 + <kdf>pkcs#12</kdf>
1.10061 + <passwd>password</passwd>
1.10062 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.10063 + <iterations>2048</iterations>
1.10064 + <key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF08E3059843173C72CD79EFEADE34A6DA91F6AB8E92383F1BDFA</key>
1.10065 + </derivekey>
1.10066 + </actionbody>
1.10067 +</action>
1.10068 +
1.10069 +//! @SYMTestCaseID CIT_PREQ1054_01
1.10070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
1.10071 +//! @SYMREQ CIT_PREQ1054
1.10072 +//! @SYMTestPriority medium
1.10073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
1.10074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
1.10075 +<action>
1.10076 + <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
1.10077 + <actiontype>DeriveKey</actiontype>
1.10078 + <actionbody>
1.10079 + <derivekey>
1.10080 + <kdf>pkcs#12</kdf>
1.10081 + <passwd>abcdefghijklmnopqrstuvwxyz</passwd>
1.10082 + <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
1.10083 + <iterations>2048</iterations>
1.10084 + <key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1167ED13693E8373DFB92EC6F000DBADB9363CA12E9E16ED019</key>
1.10085 + </derivekey>
1.10086 + </actionbody>
1.10087 +</action>
1.10088 +
1.10089 +<action>
1.10090 + <actionname>OOM End</actionname>
1.10091 + <actiontype>stopmemfailure</actiontype>
1.10092 + <actionbody></actionbody>
1.10093 + <actionresult>
1.10094 + <return>KErrNone</return>
1.10095 + </actionresult>
1.10096 +</action>
1.10097 +