os/security/crypto/weakcrypto/test/tpkcs5kdf/scripts/tpkcs12kdftests.txt
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/security/crypto/weakcrypto/test/tpkcs5kdf/scripts/tpkcs12kdftests.txt	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,10094 @@
     1.4 +// Copyright (c) Symbian Software Ltd 2006 - 2007. All rights reserved.
     1.5 +
     1.6 +<action>
     1.7 +	<actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
     1.8 +	<actiontype>DeriveKey</actiontype>
     1.9 +	<actionbody>
    1.10 +		<derivekey>
    1.11 +			<passwd>password</passwd>
    1.12 +			<salt>1234567878563412</salt>
    1.13 +			<iterations>5</iterations>
    1.14 +			<key>D1DAA78615F287E6</key>
    1.15 +		</derivekey>
    1.16 +	</actionbody>
    1.17 +	<actionresult>
    1.18 +		<return>KErrNone</return>
    1.19 +	</actionresult>
    1.20 +</action>
    1.21 +<action>
    1.22 +	<actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
    1.23 +	<actiontype>DeriveKey</actiontype>
    1.24 +	<actionbody>
    1.25 +		<derivekey>
    1.26 +			<passwd>password</passwd>
    1.27 +			<salt>1234567878563412</salt>
    1.28 +			<iterations>100</iterations>
    1.29 +			<key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
    1.30 +		</derivekey>
    1.31 +	</actionbody>
    1.32 +	<actionresult>
    1.33 +		<return>KErrNone</return>
    1.34 +	</actionresult>
    1.35 +</action>
    1.36 +<action>
    1.37 +	<actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
    1.38 +	<actiontype>DeriveKey</actiontype>
    1.39 +	<actionbody>
    1.40 +		<derivekey>
    1.41 +			<passwd>password</passwd>
    1.42 +			<salt>1234567878563412</salt>
    1.43 +			<iterations>1000</iterations>
    1.44 +			<key>142F8FAFCE633CCD9265D90FC8FE4252</key>
    1.45 +		</derivekey>
    1.46 +	</actionbody>
    1.47 +	<actionresult>
    1.48 +		<return>KErrNone</return>
    1.49 +	</actionresult>
    1.50 +</action>
    1.51 +<action>
    1.52 +	<actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
    1.53 +	<actiontype>DeriveKey</actiontype>
    1.54 +	<actionbody>
    1.55 +		<derivekey>
    1.56 +			<passwd>password</passwd>
    1.57 +			<salt>1234567878563412</salt>
    1.58 +			<iterations>10000</iterations>
    1.59 +			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
    1.60 +		</derivekey>
    1.61 +	</actionbody>
    1.62 +	<actionresult>
    1.63 +		<return>KErrNone</return>
    1.64 +	</actionresult>
    1.65 +</action>
    1.66 +<action>
    1.67 +	<actionname>PKCS5 Key Derivation Test 5 -- 16 byte key, really long password vector generated from openssl</actionname>
    1.68 +	<actiontype>DeriveKey</actiontype>
    1.69 +	<actionbody>
    1.70 +		<derivekey>
    1.71 +			<passwd>This is an example of a really long really long password, I'm attempting to see how long we can make it and still see if our code will work. This really shouldn't be a problem</passwd>
    1.72 +			<salt>1234567878563412</salt>
    1.73 +			<iterations>1000</iterations>
    1.74 +			<key>A39EDFA35086746DE5B4792035D9A070</key>
    1.75 +		</derivekey>
    1.76 +	</actionbody>
    1.77 +	<actionresult>
    1.78 +		<return>KErrNone</return>
    1.79 +	</actionresult>
    1.80 +</action>
    1.81 +<action>
    1.82 +	<actionname>PKCS5 Key Derivation Test 6 -- 16 byte key, medium size password vector generated from openssl</actionname>
    1.83 +	<actiontype>DeriveKey</actiontype>
    1.84 +	<actionbody>
    1.85 +		<derivekey>
    1.86 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
    1.87 +			<salt>1234567878563412</salt>
    1.88 +			<iterations>1000</iterations>
    1.89 +			<key>5F9219EED8BD0BCF5B3440B062305E05</key>
    1.90 +		</derivekey>
    1.91 +	</actionbody>
    1.92 +	<actionresult>
    1.93 +		<return>KErrNone</return>
    1.94 +	</actionresult>
    1.95 +</action>
    1.96 +<action>
    1.97 +	<actionname>PKCS5 Key Derivation Test 7 -- 32 byte key, long salt, short password vector generated from openssl</actionname>
    1.98 +	<actiontype>DeriveKey</actiontype>
    1.99 +	<actionbody>
   1.100 +		<derivekey>
   1.101 +			<passwd>password</passwd>
   1.102 +			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
   1.103 +			<iterations>1000</iterations>
   1.104 +			<key>5648F3832B18C6A85165B093627F2268CCE1E79DC2F85D3909C36356789B349D</key>
   1.105 +		</derivekey>
   1.106 +	</actionbody>
   1.107 +	<actionresult>
   1.108 +		<return>KErrNone</return>
   1.109 +	</actionresult>
   1.110 +</action>
   1.111 +<action>
   1.112 +	<actionname>PKCS5 Key Derivation Test 8 -- 32 byte key, long salt, long password vector generated from openssl</actionname>
   1.113 +	<actiontype>DeriveKey</actiontype>
   1.114 +	<actionbody>
   1.115 +		<derivekey>
   1.116 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   1.117 +			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
   1.118 +			<iterations>1000</iterations>
   1.119 +			<key>9F14D62760272D4388FA70E31C2B7940A083F0190C244F25F293D98D58766016</key>
   1.120 +		</derivekey>
   1.121 +	</actionbody>
   1.122 +	<actionresult>
   1.123 +		<return>KErrNone</return>
   1.124 +	</actionresult>
   1.125 +</action>
   1.126 +<action>
   1.127 +	<actionname>PKCS5 Key Derivation Test 9 -- 16 byte key, really long password vector generated from openssl</actionname>
   1.128 +	<actiontype>DeriveKey</actiontype>
   1.129 +	<actionbody>
   1.130 +		<derivekey>
   1.131 +			<passwd>Thisisanexampleofareallylongreallylongpassword,I'mattemptingtoseehowlongwecanmakeitandstillseeifourcodewillwork.Thisreallyshouldn'tbeaproblem</passwd>
   1.132 +			<salt>1234567878563412</salt>
   1.133 +			<iterations>1000</iterations>
   1.134 +			<key>529C96D62F54418DD6AD33724F3014D6</key>
   1.135 +		</derivekey>
   1.136 +	</actionbody>
   1.137 +	<actionresult>
   1.138 +		<return>KErrNone</return>
   1.139 +	</actionresult>
   1.140 +</action>
   1.141 +<action>
   1.142 +	<actionname>PKCS5 Key Derivation Test 10 -- 16 byte key, really long password vector generated from openssl</actionname>
   1.143 +	<actiontype>DeriveKey</actiontype>
   1.144 +	<actionbody>
   1.145 +		<derivekey>
   1.146 +			<passwd>ThisisanexampleofareallylongreallylongpasswordImattemptingtoseehowlongwecanmakeitandstillseeifourcodewillworkThisreallyshouldntbeaproblem</passwd>
   1.147 +			<salt>1234567878563412</salt>
   1.148 +			<iterations>1000</iterations>
   1.149 +			<key>E493D7C57BD77047C9D709DF99CBD3C7</key>
   1.150 +		</derivekey>
   1.151 +	</actionbody>
   1.152 +	<actionresult>
   1.153 +		<return>KErrNone</return>
   1.154 +	</actionresult>
   1.155 +</action>
   1.156 +<action>
   1.157 +	<actionname>PKCS5 Key Derivation Test 11 -- 16 byte key, really long password vector generated from openssl</actionname>
   1.158 +	<actiontype>DeriveKey</actiontype>
   1.159 +	<actionbody>
   1.160 +		<derivekey>
   1.161 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   1.162 +			<salt>1234567878563412</salt>
   1.163 +			<iterations>1000</iterations>
   1.164 +			<key>EBD56BEE980D41A38AFA53642AAE4B25</key>
   1.165 +		</derivekey>
   1.166 +	</actionbody>
   1.167 +	<actionresult>
   1.168 +		<return>KErrNone</return>
   1.169 +	</actionresult>
   1.170 +</action>
   1.171 +<action>
   1.172 +	<actionname>PKCS5 Key Derivation Test 12 -- 32 byte key, really long password vector generated from openssl</actionname>
   1.173 +	<actiontype>DeriveKey</actiontype>
   1.174 +	<actionbody>
   1.175 +		<derivekey>
   1.176 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   1.177 +			<salt>1234567878563412</salt>
   1.178 +			<iterations>1000</iterations>
   1.179 +			<key>EBD56BEE980D41A38AFA53642AAE4B251FF9C2A1503B2EF65F28E59DEF906A60</key>
   1.180 +		</derivekey>
   1.181 +	</actionbody>
   1.182 +	<actionresult>
   1.183 +		<return>KErrNone</return>
   1.184 +	</actionresult>
   1.185 +</action>
   1.186 +<action>
   1.187 +	<actionname>PKCS5 Key Derivation Test 13 -- 32 byte key, long password vector generated from openssl</actionname>
   1.188 +	<actiontype>DeriveKey</actiontype>
   1.189 +	<actionbody>
   1.190 +		<derivekey>
   1.191 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   1.192 +			<salt>1234567878563412</salt>
   1.193 +			<iterations>1000</iterations>
   1.194 +			<key>1FFB655FEEC4202B0466BF24AA9800D0A96BFA7F904D655253CE2E32B0B7B795</key>
   1.195 +		</derivekey>
   1.196 +	</actionbody>
   1.197 +	<actionresult>
   1.198 +		<return>KErrNone</return>
   1.199 +	</actionresult>
   1.200 +</action>
   1.201 +<action>
   1.202 +	<actionname>PKCS5 Key Derivation Test 14 -- 32 byte key, long password vector generated from openssl</actionname>
   1.203 +	<actiontype>DeriveKey</actiontype>
   1.204 +	<actionbody>
   1.205 +		<derivekey>
   1.206 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   1.207 +			<salt>1234567878563412</salt>
   1.208 +			<iterations>1000</iterations>
   1.209 +			<key>A544F0E2F88507E44F92CA2DCAC8B67C0E0D780182CF7DDC18AB1CA9BB3C2904</key>
   1.210 +		</derivekey>
   1.211 +	</actionbody>
   1.212 +	<actionresult>
   1.213 +		<return>KErrNone</return>
   1.214 +	</actionresult>
   1.215 +</action>
   1.216 +<action>
   1.217 +	<actionname>PKCS5 Key Derivation Test 15 -- 32 byte key, medium length password vector generated from openssl</actionname>
   1.218 +	<actiontype>DeriveKey</actiontype>
   1.219 +	<actionbody>
   1.220 +		<derivekey>
   1.221 +			<passwd>passwordpasswordpasswordpasswordpasswordpassword</passwd>
   1.222 +			<salt>1234567878563412</salt>
   1.223 +			<iterations>1000</iterations>
   1.224 +			<key>F1DC1A4224F0C9A4655FFDB7D5BE75060BFFD0B682293A5D2E61BD5A773B81BC</key>
   1.225 +		</derivekey>
   1.226 +	</actionbody>
   1.227 +	<actionresult>
   1.228 +		<return>KErrNone</return>
   1.229 +	</actionresult>
   1.230 +</action>
   1.231 +<action>
   1.232 +	<actionname>PKCS5 Key Derivation Test 16 -- 32 byte key, long password vector generated from openssl</actionname>
   1.233 +	<actiontype>DeriveKey</actiontype>
   1.234 +	<actionbody>
   1.235 +		<derivekey>
   1.236 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   1.237 +			<salt>1234567878563412</salt>
   1.238 +			<iterations>1000</iterations>
   1.239 +			<key>798B6F4DA56ECDA25C82A63F3577C3FF97A3A2A92BE3DD810C47704916890615</key>
   1.240 +		</derivekey>
   1.241 +	</actionbody>
   1.242 +	<actionresult>
   1.243 +		<return>KErrNone</return>
   1.244 +	</actionresult>
   1.245 +</action>
   1.246 +<action>
   1.247 +	<actionname>PKCS5 Key Derivation Test 17 -- 32 byte key, long password vector generated from openssl</actionname>
   1.248 +	<actiontype>DeriveKey</actiontype>
   1.249 +	<actionbody>
   1.250 +		<derivekey>
   1.251 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   1.252 +			<salt>1234567878563412</salt>
   1.253 +			<iterations>1000</iterations>
   1.254 +			<key>5F9219EED8BD0BCF5B3440B062305E052CE70AEBC9A43CE9F4F39E3D0E56603D</key>
   1.255 +		</derivekey>
   1.256 +	</actionbody>
   1.257 +	<actionresult>
   1.258 +		<return>KErrNone</return>
   1.259 +	</actionresult>
   1.260 +</action>
   1.261 +<action>
   1.262 +	<actionname>PKCS5 Key Derivation Test 18 -- 32 byte key, long password vector generated from openssl</actionname>
   1.263 +	<actiontype>DeriveKey</actiontype>
   1.264 +	<actionbody>
   1.265 +		<derivekey>
   1.266 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   1.267 +			<salt>1234567878563412</salt>
   1.268 +			<iterations>1000</iterations>
   1.269 +			<key>421B82FF5825F9BE0E580C4D07BFF0CF54FFFD1BAD7763BF483A8291359F60E6</key>
   1.270 +		</derivekey>
   1.271 +	</actionbody>
   1.272 +	<actionresult>
   1.273 +		<return>KErrNone</return>
   1.274 +	</actionresult>
   1.275 +</action>
   1.276 +<action>
   1.277 +	<actionname>PKCS5 Key Derivation Test 19 -- 32 byte key, 65 byte password to test the fix in the CHMAC::Init code vector generated from openssl</actionname>
   1.278 +	<actiontype>DeriveKey</actiontype>
   1.279 +	<actionbody>
   1.280 +		<derivekey>
   1.281 +			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordp</passwd>
   1.282 +			<salt>1234567878563412</salt>
   1.283 +			<iterations>1000</iterations>
   1.284 +			<key>5D0AAB5A6A7BCD6F5376DF142E7FEAC98728F4F1322091138300A95DB5EBDE72</key>
   1.285 +		</derivekey>
   1.286 +	</actionbody>
   1.287 +	<actionresult>
   1.288 +		<return>KErrNone</return>
   1.289 +	</actionresult>
   1.290 +</action>
   1.291 +<action>
   1.292 +	<actionname>PKCS5 Key Derivation Test 20 -- 32 byte key, password with spaces vector generated from openssl</actionname>
   1.293 +	<actiontype>DeriveKey</actiontype>
   1.294 +	<actionbody>
   1.295 +		<derivekey>
   1.296 +			<passwd>password password password password password password password passwordp</passwd>
   1.297 +			<salt>1234567878563412</salt>
   1.298 +			<iterations>1000</iterations>
   1.299 +			<key>EE99202289798A02DC6EAEB81A501C43AE3F8513B8F9ECC62FFBF3D0F70EF444</key>
   1.300 +		</derivekey>
   1.301 +	</actionbody>
   1.302 +	<actionresult>
   1.303 +		<return>KErrNone</return>
   1.304 +	</actionresult>
   1.305 +</action>
   1.306 +<action>
   1.307 +	<actionname>PKCS5 Key Derivation Test 21 -- 1 byte key vector generated from openssl</actionname>
   1.308 +	<actiontype>DeriveKey</actiontype>
   1.309 +	<actionbody>
   1.310 +		<derivekey>
   1.311 +			<passwd>password</passwd>
   1.312 +			<salt>1234567878563412</salt>
   1.313 +			<iterations>10000</iterations>
   1.314 +			<key>66</key>
   1.315 +		</derivekey>
   1.316 +	</actionbody>
   1.317 +	<actionresult>
   1.318 +		<return>KErrNone</return>
   1.319 +	</actionresult>
   1.320 +</action>
   1.321 +<action>
   1.322 +	<actionname>PKCS5 Key Derivation Test 22 -- 128 byte key vector generated from openssl</actionname>
   1.323 +	<actiontype>DeriveKey</actiontype>
   1.324 +	<actionbody>
   1.325 +		<derivekey>
   1.326 +			<passwd>password</passwd>
   1.327 +			<salt>1234567878563412</salt>
   1.328 +			<iterations>10000</iterations>
   1.329 +			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584E6FCB5C7636C3A04DA7F38778BE00C842A5A202578408C27FA08A3A7AACDF7A7B3F9763A33DDDCD09B3E07FA95106B07892F6981AA450447E106BCA8252B1532</key>
   1.330 +		</derivekey>
   1.331 +	</actionbody>
   1.332 +	<actionresult>
   1.333 +		<return>KErrNone</return>
   1.334 +	</actionresult>
   1.335 +</action>
   1.336 +<action>
   1.337 +	<actionname>PKCS5 Key Derivation Test 23 -- 160 (multiple of hash size) byte key vector generated from openssl</actionname>
   1.338 +	<actiontype>DeriveKey</actiontype>
   1.339 +	<actionbody>
   1.340 +		<derivekey>
   1.341 +			<passwd>alkiasdk29s.382{</passwd>
   1.342 +			<salt>1234567878563412</salt>
   1.343 +			<iterations>30000</iterations>
   1.344 +			<key>62E18995350965CF1E02F111ADBEE270FBBAE6A2D8C6B94D24F1E4E41B04FE40C1C7CE7E768092362A75F220601AAF3FBBE339F33D97CA0443D8DD795B88BF97F9A41561A80D20659486459995CA559D5C37792C608CF279E880142319D333D17C62C35C65E9D2A50E0F4010E2D475ECB179A41366D62617BB48B13FA3A98E3FA0F76236442E324B39EDD1B9AB253A1D6A6A6462E3330B548BC4DAE4CD060FC6</key>
   1.345 +		</derivekey>
   1.346 +	</actionbody>
   1.347 +	<actionresult>
   1.348 +		<return>KErrNone</return>
   1.349 +	</actionresult>
   1.350 +</action>
   1.351 +<action>
   1.352 +	<actionname>PKCS5 Key Derivation Test 24 -- 8 byte key vector generated from openssl</actionname>
   1.353 +	<actiontype>DeriveKey</actiontype>
   1.354 +	<actionbody>
   1.355 +		<derivekey>
   1.356 +			<passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
   1.357 +			<salt>1234567878563412</salt>
   1.358 +			<iterations>1000</iterations>
   1.359 +			<key>F104F4B53A4A160F</key>
   1.360 +		</derivekey>
   1.361 +	</actionbody>
   1.362 +	<actionresult>
   1.363 +		<return>KErrNone</return>
   1.364 +	</actionresult>
   1.365 +</action>
   1.366 +<action>
   1.367 +	<actionname>PKCS5 Key Derivation Test 25 -- 256 byte key vector generated from openssl</actionname>
   1.368 +	<actiontype>DeriveKey</actiontype>
   1.369 +	<actionbody>
   1.370 +		<derivekey>
   1.371 +			<passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
   1.372 +			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
   1.373 +			<iterations>10000</iterations>
   1.374 +			<key>24360C775D9B1E95D0280884846FA049E39B60E2D301219C87B2FA3F8EF13F93C977E2A7A2750B3F6518CBC1539BA9CA2628BDC454657D7D7BF964DCFE6EF489A16A7DA4B6FA3DCA2C6E4457D5822D3CDD712633EE990F3254E1931FD4645EF25F036D76EE2A79394AA82CFF3B3AF9D9C1A84860D1753E5FF7DF45D76B115F159F655EFFE309B6472EB77FC8D149C5EAD72084D37ADBE144356D63350911FD192B1E16B8F37B1BC624A8BC0C29D4B190F16A9A9CC373BE74B9935EFD52FA6828107E21D180BB1079EF8300BF17D5163CA06E27A0B322E5E44CC2A34A0927654B24D4EBF59BF0790A108114B91118548AFEFBF96C5C66D99AFCEA4E32D4EAF9A9</key>
   1.375 +		</derivekey>
   1.376 +	</actionbody>
   1.377 +	<actionresult>
   1.378 +		<return>KErrNone</return>
   1.379 +	</actionresult>
   1.380 +</action>
   1.381 +// Out of Memory tests follow
   1.382 +<action>
   1.383 +    <actionname>OOM Start</actionname>
   1.384 +    <actiontype>startmemfailure</actiontype>
   1.385 +    <actionbody></actionbody>
   1.386 +    <actionresult>
   1.387 +        <return>KErrNone</return>
   1.388 +    </actionresult>
   1.389 +</action>
   1.390 +<action>
   1.391 +	<actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
   1.392 +	<actiontype>DeriveKey</actiontype>
   1.393 +	<actionbody>
   1.394 +		<derivekey>
   1.395 +			<passwd>password</passwd>
   1.396 +			<salt>1234567878563412</salt>
   1.397 +			<iterations>5</iterations>
   1.398 +			<key>D1DAA78615F287E6</key>
   1.399 +		</derivekey>
   1.400 +	</actionbody>
   1.401 +	<actionresult>
   1.402 +		<return>KErrNone</return>
   1.403 +	</actionresult>
   1.404 +</action>
   1.405 +<action>
   1.406 +	<actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
   1.407 +	<actiontype>DeriveKey</actiontype>
   1.408 +	<actionbody>
   1.409 +		<derivekey>
   1.410 +			<passwd>password</passwd>
   1.411 +			<salt>1234567878563412</salt>
   1.412 +			<iterations>100</iterations>
   1.413 +			<key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
   1.414 +		</derivekey>
   1.415 +	</actionbody>
   1.416 +	<actionresult>
   1.417 +		<return>KErrNone</return>
   1.418 +	</actionresult>
   1.419 +</action>
   1.420 +<action>
   1.421 +	<actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
   1.422 +	<actiontype>DeriveKey</actiontype>
   1.423 +	<actionbody>
   1.424 +		<derivekey>
   1.425 +			<passwd>password</passwd>
   1.426 +			<salt>1234567878563412</salt>
   1.427 +			<iterations>1000</iterations>
   1.428 +			<key>142F8FAFCE633CCD9265D90FC8FE4252</key>
   1.429 +		</derivekey>
   1.430 +	</actionbody>
   1.431 +	<actionresult>
   1.432 +		<return>KErrNone</return>
   1.433 +	</actionresult>
   1.434 +</action>
   1.435 +<action>
   1.436 +	<actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
   1.437 +	<actiontype>DeriveKey</actiontype>
   1.438 +	<actionbody>
   1.439 +		<derivekey>
   1.440 +			<passwd>password</passwd>
   1.441 +			<salt>1234567878563412</salt>
   1.442 +			<iterations>10000</iterations>
   1.443 +			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
   1.444 +		</derivekey>
   1.445 +	</actionbody>
   1.446 +	<actionresult>
   1.447 +		<return>KErrNone</return>
   1.448 +	</actionresult>
   1.449 +</action>
   1.450 +<action>
   1.451 +	<actionname>PKCS5 Key Derivation Test 5 -- leave from performAction other than KErrNoMemory</actionname>
   1.452 +	<actiontype>DeriveKey</actiontype>
   1.453 +	<actionbody>
   1.454 +		<derivekey>
   1.455 +			<passwd>password</passwd>
   1.456 +			<salt>1234567878563412</salt>
   1.457 +			<iterations>10000</iterations>
   1.458 +			<key>66</key>
   1.459 +			<leaveinperformaction>1</leaveinperformaction>
   1.460 +		</derivekey>
   1.461 +		<knowndefect>ETrue</knowndefect>
   1.462 +	</actionbody>
   1.463 +	<actionresult>
   1.464 +		<return>KErrNone</return>
   1.465 +	</actionresult>
   1.466 +</action>
   1.467 +<action>
   1.468 +    <actionname>OOM End</actionname>
   1.469 +    <actiontype>stopmemfailure</actiontype>
   1.470 +    <actionbody></actionbody>
   1.471 +    <actionresult>
   1.472 +        <return>KErrNone</return>
   1.473 +    </actionresult>
   1.474 +</action>
   1.475 +//End of out of memory tests
   1.476 +
   1.477 +// =====================================================================
   1.478 +// PKCS#12 tests
   1.479 +
   1.480 +<action>
   1.481 +    <actionname>OOM Start</actionname>
   1.482 +    <actiontype>startmemfailure</actiontype>
   1.483 +    <actionbody></actionbody>
   1.484 +    <actionresult>
   1.485 +        <return>KErrNone</return>
   1.486 +    </actionresult>
   1.487 +</action>
   1.488 +
   1.489 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.491 +//! @SYMREQ CIT_PREQ1054
   1.492 +//! @SYMTestPriority medium
   1.493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.495 +<action>
   1.496 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.497 +	<actiontype>DeriveKey</actiontype>
   1.498 +	<actionbody>
   1.499 +		<derivekey>
   1.500 +			<kdf>pkcs#12</kdf>
   1.501 +			<passwd>0000</passwd>
   1.502 +			<salt>53414C54</salt>
   1.503 +			<iterations>1</iterations>
   1.504 +			<key>3037AFC8EA</key>
   1.505 +		</derivekey>
   1.506 +	</actionbody>
   1.507 +</action>
   1.508 +
   1.509 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.511 +//! @SYMREQ CIT_PREQ1054
   1.512 +//! @SYMTestPriority medium
   1.513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.515 +<action>
   1.516 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.517 +	<actiontype>DeriveKey</actiontype>
   1.518 +	<actionbody>
   1.519 +		<derivekey>
   1.520 +			<kdf>pkcs#12</kdf>
   1.521 +			<passwd>0001</passwd>
   1.522 +			<salt>53414C54</salt>
   1.523 +			<iterations>1</iterations>
   1.524 +			<key>37F44080CB</key>
   1.525 +		</derivekey>
   1.526 +	</actionbody>
   1.527 +</action>
   1.528 +
   1.529 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.531 +//! @SYMREQ CIT_PREQ1054
   1.532 +//! @SYMTestPriority medium
   1.533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.535 +<action>
   1.536 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.537 +	<actiontype>DeriveKey</actiontype>
   1.538 +	<actionbody>
   1.539 +		<derivekey>
   1.540 +			<kdf>pkcs#12</kdf>
   1.541 +			<passwd>PSWD</passwd>
   1.542 +			<salt>53414C54</salt>
   1.543 +			<iterations>1</iterations>
   1.544 +			<key>8A18939ACF</key>
   1.545 +		</derivekey>
   1.546 +	</actionbody>
   1.547 +</action>
   1.548 +
   1.549 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.551 +//! @SYMREQ CIT_PREQ1054
   1.552 +//! @SYMTestPriority medium
   1.553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.555 +<action>
   1.556 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.557 +	<actiontype>DeriveKey</actiontype>
   1.558 +	<actionbody>
   1.559 +		<derivekey>
   1.560 +			<kdf>pkcs#12</kdf>
   1.561 +			<passwd>password</passwd>
   1.562 +			<salt>53414C54</salt>
   1.563 +			<iterations>1</iterations>
   1.564 +			<key>AFF6C5EDE0</key>
   1.565 +		</derivekey>
   1.566 +	</actionbody>
   1.567 +</action>
   1.568 +
   1.569 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.571 +//! @SYMREQ CIT_PREQ1054
   1.572 +//! @SYMTestPriority medium
   1.573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.575 +<action>
   1.576 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.577 +	<actiontype>DeriveKey</actiontype>
   1.578 +	<actionbody>
   1.579 +		<derivekey>
   1.580 +			<kdf>pkcs#12</kdf>
   1.581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   1.582 +			<salt>53414C54</salt>
   1.583 +			<iterations>1</iterations>
   1.584 +			<key>2ED53BB2CE</key>
   1.585 +		</derivekey>
   1.586 +	</actionbody>
   1.587 +</action>
   1.588 +
   1.589 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.591 +//! @SYMREQ CIT_PREQ1054
   1.592 +//! @SYMTestPriority medium
   1.593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.595 +<action>
   1.596 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.597 +	<actiontype>DeriveKey</actiontype>
   1.598 +	<actionbody>
   1.599 +		<derivekey>
   1.600 +			<kdf>pkcs#12</kdf>
   1.601 +			<passwd>0000</passwd>
   1.602 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.603 +			<iterations>1</iterations>
   1.604 +			<key>49CABE7B67</key>
   1.605 +		</derivekey>
   1.606 +	</actionbody>
   1.607 +</action>
   1.608 +
   1.609 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.611 +//! @SYMREQ CIT_PREQ1054
   1.612 +//! @SYMTestPriority medium
   1.613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.615 +<action>
   1.616 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.617 +	<actiontype>DeriveKey</actiontype>
   1.618 +	<actionbody>
   1.619 +		<derivekey>
   1.620 +			<kdf>pkcs#12</kdf>
   1.621 +			<passwd>0001</passwd>
   1.622 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.623 +			<iterations>1</iterations>
   1.624 +			<key>F994B990D3</key>
   1.625 +		</derivekey>
   1.626 +	</actionbody>
   1.627 +</action>
   1.628 +
   1.629 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.631 +//! @SYMREQ CIT_PREQ1054
   1.632 +//! @SYMTestPriority medium
   1.633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.635 +<action>
   1.636 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.637 +	<actiontype>DeriveKey</actiontype>
   1.638 +	<actionbody>
   1.639 +		<derivekey>
   1.640 +			<kdf>pkcs#12</kdf>
   1.641 +			<passwd>PSWD</passwd>
   1.642 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.643 +			<iterations>1</iterations>
   1.644 +			<key>1AFAAD7E51</key>
   1.645 +		</derivekey>
   1.646 +	</actionbody>
   1.647 +</action>
   1.648 +
   1.649 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.651 +//! @SYMREQ CIT_PREQ1054
   1.652 +//! @SYMTestPriority medium
   1.653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.655 +<action>
   1.656 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.657 +	<actiontype>DeriveKey</actiontype>
   1.658 +	<actionbody>
   1.659 +		<derivekey>
   1.660 +			<kdf>pkcs#12</kdf>
   1.661 +			<passwd>password</passwd>
   1.662 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.663 +			<iterations>1</iterations>
   1.664 +			<key>878C91098D</key>
   1.665 +		</derivekey>
   1.666 +	</actionbody>
   1.667 +</action>
   1.668 +
   1.669 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.671 +//! @SYMREQ CIT_PREQ1054
   1.672 +//! @SYMTestPriority medium
   1.673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.675 +<action>
   1.676 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.677 +	<actiontype>DeriveKey</actiontype>
   1.678 +	<actionbody>
   1.679 +		<derivekey>
   1.680 +			<kdf>pkcs#12</kdf>
   1.681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   1.682 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.683 +			<iterations>1</iterations>
   1.684 +			<key>0DE3F08CAF</key>
   1.685 +		</derivekey>
   1.686 +	</actionbody>
   1.687 +</action>
   1.688 +
   1.689 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.691 +//! @SYMREQ CIT_PREQ1054
   1.692 +//! @SYMTestPriority medium
   1.693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.695 +<action>
   1.696 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   1.697 +	<actiontype>DeriveKey</actiontype>
   1.698 +	<actionbody>
   1.699 +		<derivekey>
   1.700 +			<kdf>pkcs#12</kdf>
   1.701 +			<passwd>0000</passwd>
   1.702 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   1.703 +			<iterations>1</iterations>
   1.704 +			<key>90253A49C0</key>
   1.705 +		</derivekey>
   1.706 +	</actionbody>
   1.707 +</action>
   1.708 +
   1.709 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.711 +//! @SYMREQ CIT_PREQ1054
   1.712 +//! @SYMTestPriority medium
   1.713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.715 +<action>
   1.716 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   1.717 +	<actiontype>DeriveKey</actiontype>
   1.718 +	<actionbody>
   1.719 +		<derivekey>
   1.720 +			<kdf>pkcs#12</kdf>
   1.721 +			<passwd>0001</passwd>
   1.722 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   1.723 +			<iterations>1</iterations>
   1.724 +			<key>40BE97AB93</key>
   1.725 +		</derivekey>
   1.726 +	</actionbody>
   1.727 +</action>
   1.728 +
   1.729 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.731 +//! @SYMREQ CIT_PREQ1054
   1.732 +//! @SYMTestPriority medium
   1.733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.735 +<action>
   1.736 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   1.737 +	<actiontype>DeriveKey</actiontype>
   1.738 +	<actionbody>
   1.739 +		<derivekey>
   1.740 +			<kdf>pkcs#12</kdf>
   1.741 +			<passwd>PSWD</passwd>
   1.742 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   1.743 +			<iterations>1</iterations>
   1.744 +			<key>A64B43E14E</key>
   1.745 +		</derivekey>
   1.746 +	</actionbody>
   1.747 +</action>
   1.748 +
   1.749 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.751 +//! @SYMREQ CIT_PREQ1054
   1.752 +//! @SYMTestPriority medium
   1.753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.755 +<action>
   1.756 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   1.757 +	<actiontype>DeriveKey</actiontype>
   1.758 +	<actionbody>
   1.759 +		<derivekey>
   1.760 +			<kdf>pkcs#12</kdf>
   1.761 +			<passwd>password</passwd>
   1.762 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   1.763 +			<iterations>1</iterations>
   1.764 +			<key>E323D5F588</key>
   1.765 +		</derivekey>
   1.766 +	</actionbody>
   1.767 +</action>
   1.768 +
   1.769 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.771 +//! @SYMREQ CIT_PREQ1054
   1.772 +//! @SYMTestPriority medium
   1.773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.775 +<action>
   1.776 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   1.777 +	<actiontype>DeriveKey</actiontype>
   1.778 +	<actionbody>
   1.779 +		<derivekey>
   1.780 +			<kdf>pkcs#12</kdf>
   1.781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   1.782 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   1.783 +			<iterations>1</iterations>
   1.784 +			<key>27476572AF</key>
   1.785 +		</derivekey>
   1.786 +	</actionbody>
   1.787 +</action>
   1.788 +
   1.789 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.791 +//! @SYMREQ CIT_PREQ1054
   1.792 +//! @SYMTestPriority medium
   1.793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.795 +<action>
   1.796 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.797 +	<actiontype>DeriveKey</actiontype>
   1.798 +	<actionbody>
   1.799 +		<derivekey>
   1.800 +			<kdf>pkcs#12</kdf>
   1.801 +			<passwd>0000</passwd>
   1.802 +			<salt>53414C54</salt>
   1.803 +			<iterations>2</iterations>
   1.804 +			<key>A1D9010A67</key>
   1.805 +		</derivekey>
   1.806 +	</actionbody>
   1.807 +</action>
   1.808 +
   1.809 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.811 +//! @SYMREQ CIT_PREQ1054
   1.812 +//! @SYMTestPriority medium
   1.813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.815 +<action>
   1.816 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.817 +	<actiontype>DeriveKey</actiontype>
   1.818 +	<actionbody>
   1.819 +		<derivekey>
   1.820 +			<kdf>pkcs#12</kdf>
   1.821 +			<passwd>0001</passwd>
   1.822 +			<salt>53414C54</salt>
   1.823 +			<iterations>2</iterations>
   1.824 +			<key>17E4E1F15B</key>
   1.825 +		</derivekey>
   1.826 +	</actionbody>
   1.827 +</action>
   1.828 +
   1.829 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.831 +//! @SYMREQ CIT_PREQ1054
   1.832 +//! @SYMTestPriority medium
   1.833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.835 +<action>
   1.836 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.837 +	<actiontype>DeriveKey</actiontype>
   1.838 +	<actionbody>
   1.839 +		<derivekey>
   1.840 +			<kdf>pkcs#12</kdf>
   1.841 +			<passwd>PSWD</passwd>
   1.842 +			<salt>53414C54</salt>
   1.843 +			<iterations>2</iterations>
   1.844 +			<key>D1B71808FC</key>
   1.845 +		</derivekey>
   1.846 +	</actionbody>
   1.847 +</action>
   1.848 +
   1.849 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.851 +//! @SYMREQ CIT_PREQ1054
   1.852 +//! @SYMTestPriority medium
   1.853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.855 +<action>
   1.856 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.857 +	<actiontype>DeriveKey</actiontype>
   1.858 +	<actionbody>
   1.859 +		<derivekey>
   1.860 +			<kdf>pkcs#12</kdf>
   1.861 +			<passwd>password</passwd>
   1.862 +			<salt>53414C54</salt>
   1.863 +			<iterations>2</iterations>
   1.864 +			<key>EE7E4073F2</key>
   1.865 +		</derivekey>
   1.866 +	</actionbody>
   1.867 +</action>
   1.868 +
   1.869 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.871 +//! @SYMREQ CIT_PREQ1054
   1.872 +//! @SYMTestPriority medium
   1.873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.875 +<action>
   1.876 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   1.877 +	<actiontype>DeriveKey</actiontype>
   1.878 +	<actionbody>
   1.879 +		<derivekey>
   1.880 +			<kdf>pkcs#12</kdf>
   1.881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   1.882 +			<salt>53414C54</salt>
   1.883 +			<iterations>2</iterations>
   1.884 +			<key>5BF185C726</key>
   1.885 +		</derivekey>
   1.886 +	</actionbody>
   1.887 +</action>
   1.888 +
   1.889 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.891 +//! @SYMREQ CIT_PREQ1054
   1.892 +//! @SYMTestPriority medium
   1.893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.895 +<action>
   1.896 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.897 +	<actiontype>DeriveKey</actiontype>
   1.898 +	<actionbody>
   1.899 +		<derivekey>
   1.900 +			<kdf>pkcs#12</kdf>
   1.901 +			<passwd>0000</passwd>
   1.902 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.903 +			<iterations>2</iterations>
   1.904 +			<key>72ADF5E041</key>
   1.905 +		</derivekey>
   1.906 +	</actionbody>
   1.907 +</action>
   1.908 +
   1.909 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.911 +//! @SYMREQ CIT_PREQ1054
   1.912 +//! @SYMTestPriority medium
   1.913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.915 +<action>
   1.916 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.917 +	<actiontype>DeriveKey</actiontype>
   1.918 +	<actionbody>
   1.919 +		<derivekey>
   1.920 +			<kdf>pkcs#12</kdf>
   1.921 +			<passwd>0001</passwd>
   1.922 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.923 +			<iterations>2</iterations>
   1.924 +			<key>63E6DF459C</key>
   1.925 +		</derivekey>
   1.926 +	</actionbody>
   1.927 +</action>
   1.928 +
   1.929 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.931 +//! @SYMREQ CIT_PREQ1054
   1.932 +//! @SYMTestPriority medium
   1.933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.935 +<action>
   1.936 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.937 +	<actiontype>DeriveKey</actiontype>
   1.938 +	<actionbody>
   1.939 +		<derivekey>
   1.940 +			<kdf>pkcs#12</kdf>
   1.941 +			<passwd>PSWD</passwd>
   1.942 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.943 +			<iterations>2</iterations>
   1.944 +			<key>C2099204AB</key>
   1.945 +		</derivekey>
   1.946 +	</actionbody>
   1.947 +</action>
   1.948 +
   1.949 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.951 +//! @SYMREQ CIT_PREQ1054
   1.952 +//! @SYMTestPriority medium
   1.953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.955 +<action>
   1.956 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.957 +	<actiontype>DeriveKey</actiontype>
   1.958 +	<actionbody>
   1.959 +		<derivekey>
   1.960 +			<kdf>pkcs#12</kdf>
   1.961 +			<passwd>password</passwd>
   1.962 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.963 +			<iterations>2</iterations>
   1.964 +			<key>3204D28A32</key>
   1.965 +		</derivekey>
   1.966 +	</actionbody>
   1.967 +</action>
   1.968 +
   1.969 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.971 +//! @SYMREQ CIT_PREQ1054
   1.972 +//! @SYMTestPriority medium
   1.973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.975 +<action>
   1.976 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   1.977 +	<actiontype>DeriveKey</actiontype>
   1.978 +	<actionbody>
   1.979 +		<derivekey>
   1.980 +			<kdf>pkcs#12</kdf>
   1.981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   1.982 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   1.983 +			<iterations>2</iterations>
   1.984 +			<key>FB845F70A4</key>
   1.985 +		</derivekey>
   1.986 +	</actionbody>
   1.987 +</action>
   1.988 +
   1.989 +//! @SYMTestCaseID CIT_PREQ1054_01
   1.990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   1.991 +//! @SYMREQ CIT_PREQ1054
   1.992 +//! @SYMTestPriority medium
   1.993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   1.994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
   1.995 +<action>
   1.996 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   1.997 +	<actiontype>DeriveKey</actiontype>
   1.998 +	<actionbody>
   1.999 +		<derivekey>
  1.1000 +			<kdf>pkcs#12</kdf>
  1.1001 +			<passwd>0000</passwd>
  1.1002 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1003 +			<iterations>2</iterations>
  1.1004 +			<key>B9230EEC1D</key>
  1.1005 +		</derivekey>
  1.1006 +	</actionbody>
  1.1007 +</action>
  1.1008 +
  1.1009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1011 +//! @SYMREQ CIT_PREQ1054
  1.1012 +//! @SYMTestPriority medium
  1.1013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1015 +<action>
  1.1016 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1017 +	<actiontype>DeriveKey</actiontype>
  1.1018 +	<actionbody>
  1.1019 +		<derivekey>
  1.1020 +			<kdf>pkcs#12</kdf>
  1.1021 +			<passwd>0001</passwd>
  1.1022 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1023 +			<iterations>2</iterations>
  1.1024 +			<key>462B0F2D1B</key>
  1.1025 +		</derivekey>
  1.1026 +	</actionbody>
  1.1027 +</action>
  1.1028 +
  1.1029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1031 +//! @SYMREQ CIT_PREQ1054
  1.1032 +//! @SYMTestPriority medium
  1.1033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1035 +<action>
  1.1036 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1037 +	<actiontype>DeriveKey</actiontype>
  1.1038 +	<actionbody>
  1.1039 +		<derivekey>
  1.1040 +			<kdf>pkcs#12</kdf>
  1.1041 +			<passwd>PSWD</passwd>
  1.1042 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1043 +			<iterations>2</iterations>
  1.1044 +			<key>05B66EF1BB</key>
  1.1045 +		</derivekey>
  1.1046 +	</actionbody>
  1.1047 +</action>
  1.1048 +
  1.1049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1051 +//! @SYMREQ CIT_PREQ1054
  1.1052 +//! @SYMTestPriority medium
  1.1053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1055 +<action>
  1.1056 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1057 +	<actiontype>DeriveKey</actiontype>
  1.1058 +	<actionbody>
  1.1059 +		<derivekey>
  1.1060 +			<kdf>pkcs#12</kdf>
  1.1061 +			<passwd>password</passwd>
  1.1062 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1063 +			<iterations>2</iterations>
  1.1064 +			<key>C1B7E77C96</key>
  1.1065 +		</derivekey>
  1.1066 +	</actionbody>
  1.1067 +</action>
  1.1068 +
  1.1069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1071 +//! @SYMREQ CIT_PREQ1054
  1.1072 +//! @SYMTestPriority medium
  1.1073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1075 +<action>
  1.1076 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1077 +	<actiontype>DeriveKey</actiontype>
  1.1078 +	<actionbody>
  1.1079 +		<derivekey>
  1.1080 +			<kdf>pkcs#12</kdf>
  1.1081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1082 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1083 +			<iterations>2</iterations>
  1.1084 +			<key>3DE08CDACF</key>
  1.1085 +		</derivekey>
  1.1086 +	</actionbody>
  1.1087 +</action>
  1.1088 +
  1.1089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1091 +//! @SYMREQ CIT_PREQ1054
  1.1092 +//! @SYMTestPriority medium
  1.1093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1095 +<action>
  1.1096 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1097 +	<actiontype>DeriveKey</actiontype>
  1.1098 +	<actionbody>
  1.1099 +		<derivekey>
  1.1100 +			<kdf>pkcs#12</kdf>
  1.1101 +			<passwd>0000</passwd>
  1.1102 +			<salt>53414C54</salt>
  1.1103 +			<iterations>4</iterations>
  1.1104 +			<key>D0158BFC57</key>
  1.1105 +		</derivekey>
  1.1106 +	</actionbody>
  1.1107 +</action>
  1.1108 +
  1.1109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1111 +//! @SYMREQ CIT_PREQ1054
  1.1112 +//! @SYMTestPriority medium
  1.1113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1115 +<action>
  1.1116 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1117 +	<actiontype>DeriveKey</actiontype>
  1.1118 +	<actionbody>
  1.1119 +		<derivekey>
  1.1120 +			<kdf>pkcs#12</kdf>
  1.1121 +			<passwd>0001</passwd>
  1.1122 +			<salt>53414C54</salt>
  1.1123 +			<iterations>4</iterations>
  1.1124 +			<key>AEB6CD53F0</key>
  1.1125 +		</derivekey>
  1.1126 +	</actionbody>
  1.1127 +</action>
  1.1128 +
  1.1129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1131 +//! @SYMREQ CIT_PREQ1054
  1.1132 +//! @SYMTestPriority medium
  1.1133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1135 +<action>
  1.1136 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1137 +	<actiontype>DeriveKey</actiontype>
  1.1138 +	<actionbody>
  1.1139 +		<derivekey>
  1.1140 +			<kdf>pkcs#12</kdf>
  1.1141 +			<passwd>PSWD</passwd>
  1.1142 +			<salt>53414C54</salt>
  1.1143 +			<iterations>4</iterations>
  1.1144 +			<key>80010C12B6</key>
  1.1145 +		</derivekey>
  1.1146 +	</actionbody>
  1.1147 +</action>
  1.1148 +
  1.1149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1151 +//! @SYMREQ CIT_PREQ1054
  1.1152 +//! @SYMTestPriority medium
  1.1153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1155 +<action>
  1.1156 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1157 +	<actiontype>DeriveKey</actiontype>
  1.1158 +	<actionbody>
  1.1159 +		<derivekey>
  1.1160 +			<kdf>pkcs#12</kdf>
  1.1161 +			<passwd>password</passwd>
  1.1162 +			<salt>53414C54</salt>
  1.1163 +			<iterations>4</iterations>
  1.1164 +			<key>497DE34C4C</key>
  1.1165 +		</derivekey>
  1.1166 +	</actionbody>
  1.1167 +</action>
  1.1168 +
  1.1169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1171 +//! @SYMREQ CIT_PREQ1054
  1.1172 +//! @SYMTestPriority medium
  1.1173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1175 +<action>
  1.1176 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1177 +	<actiontype>DeriveKey</actiontype>
  1.1178 +	<actionbody>
  1.1179 +		<derivekey>
  1.1180 +			<kdf>pkcs#12</kdf>
  1.1181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1182 +			<salt>53414C54</salt>
  1.1183 +			<iterations>4</iterations>
  1.1184 +			<key>146C6A5B58</key>
  1.1185 +		</derivekey>
  1.1186 +	</actionbody>
  1.1187 +</action>
  1.1188 +
  1.1189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1191 +//! @SYMREQ CIT_PREQ1054
  1.1192 +//! @SYMTestPriority medium
  1.1193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1195 +<action>
  1.1196 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1197 +	<actiontype>DeriveKey</actiontype>
  1.1198 +	<actionbody>
  1.1199 +		<derivekey>
  1.1200 +			<kdf>pkcs#12</kdf>
  1.1201 +			<passwd>0000</passwd>
  1.1202 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1203 +			<iterations>4</iterations>
  1.1204 +			<key>E89772E7A5</key>
  1.1205 +		</derivekey>
  1.1206 +	</actionbody>
  1.1207 +</action>
  1.1208 +
  1.1209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1211 +//! @SYMREQ CIT_PREQ1054
  1.1212 +//! @SYMTestPriority medium
  1.1213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1215 +<action>
  1.1216 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1217 +	<actiontype>DeriveKey</actiontype>
  1.1218 +	<actionbody>
  1.1219 +		<derivekey>
  1.1220 +			<kdf>pkcs#12</kdf>
  1.1221 +			<passwd>0001</passwd>
  1.1222 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1223 +			<iterations>4</iterations>
  1.1224 +			<key>2393071377</key>
  1.1225 +		</derivekey>
  1.1226 +	</actionbody>
  1.1227 +</action>
  1.1228 +
  1.1229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1231 +//! @SYMREQ CIT_PREQ1054
  1.1232 +//! @SYMTestPriority medium
  1.1233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1235 +<action>
  1.1236 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1237 +	<actiontype>DeriveKey</actiontype>
  1.1238 +	<actionbody>
  1.1239 +		<derivekey>
  1.1240 +			<kdf>pkcs#12</kdf>
  1.1241 +			<passwd>PSWD</passwd>
  1.1242 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1243 +			<iterations>4</iterations>
  1.1244 +			<key>DF2D961FE3</key>
  1.1245 +		</derivekey>
  1.1246 +	</actionbody>
  1.1247 +</action>
  1.1248 +
  1.1249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1251 +//! @SYMREQ CIT_PREQ1054
  1.1252 +//! @SYMTestPriority medium
  1.1253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1255 +<action>
  1.1256 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1257 +	<actiontype>DeriveKey</actiontype>
  1.1258 +	<actionbody>
  1.1259 +		<derivekey>
  1.1260 +			<kdf>pkcs#12</kdf>
  1.1261 +			<passwd>password</passwd>
  1.1262 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1263 +			<iterations>4</iterations>
  1.1264 +			<key>363619530B</key>
  1.1265 +		</derivekey>
  1.1266 +	</actionbody>
  1.1267 +</action>
  1.1268 +
  1.1269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1271 +//! @SYMREQ CIT_PREQ1054
  1.1272 +//! @SYMTestPriority medium
  1.1273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1275 +<action>
  1.1276 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1277 +	<actiontype>DeriveKey</actiontype>
  1.1278 +	<actionbody>
  1.1279 +		<derivekey>
  1.1280 +			<kdf>pkcs#12</kdf>
  1.1281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1282 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1283 +			<iterations>4</iterations>
  1.1284 +			<key>B43FA2D22B</key>
  1.1285 +		</derivekey>
  1.1286 +	</actionbody>
  1.1287 +</action>
  1.1288 +
  1.1289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1291 +//! @SYMREQ CIT_PREQ1054
  1.1292 +//! @SYMTestPriority medium
  1.1293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1295 +<action>
  1.1296 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1297 +	<actiontype>DeriveKey</actiontype>
  1.1298 +	<actionbody>
  1.1299 +		<derivekey>
  1.1300 +			<kdf>pkcs#12</kdf>
  1.1301 +			<passwd>0000</passwd>
  1.1302 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1303 +			<iterations>4</iterations>
  1.1304 +			<key>EF50923D65</key>
  1.1305 +		</derivekey>
  1.1306 +	</actionbody>
  1.1307 +</action>
  1.1308 +
  1.1309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1311 +//! @SYMREQ CIT_PREQ1054
  1.1312 +//! @SYMTestPriority medium
  1.1313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1315 +<action>
  1.1316 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1317 +	<actiontype>DeriveKey</actiontype>
  1.1318 +	<actionbody>
  1.1319 +		<derivekey>
  1.1320 +			<kdf>pkcs#12</kdf>
  1.1321 +			<passwd>0001</passwd>
  1.1322 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1323 +			<iterations>4</iterations>
  1.1324 +			<key>9A618595C7</key>
  1.1325 +		</derivekey>
  1.1326 +	</actionbody>
  1.1327 +</action>
  1.1328 +
  1.1329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1331 +//! @SYMREQ CIT_PREQ1054
  1.1332 +//! @SYMTestPriority medium
  1.1333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1335 +<action>
  1.1336 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1337 +	<actiontype>DeriveKey</actiontype>
  1.1338 +	<actionbody>
  1.1339 +		<derivekey>
  1.1340 +			<kdf>pkcs#12</kdf>
  1.1341 +			<passwd>PSWD</passwd>
  1.1342 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1343 +			<iterations>4</iterations>
  1.1344 +			<key>B3B33AA8A6</key>
  1.1345 +		</derivekey>
  1.1346 +	</actionbody>
  1.1347 +</action>
  1.1348 +
  1.1349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1351 +//! @SYMREQ CIT_PREQ1054
  1.1352 +//! @SYMTestPriority medium
  1.1353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1355 +<action>
  1.1356 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1357 +	<actiontype>DeriveKey</actiontype>
  1.1358 +	<actionbody>
  1.1359 +		<derivekey>
  1.1360 +			<kdf>pkcs#12</kdf>
  1.1361 +			<passwd>password</passwd>
  1.1362 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1363 +			<iterations>4</iterations>
  1.1364 +			<key>C007DC1ADA</key>
  1.1365 +		</derivekey>
  1.1366 +	</actionbody>
  1.1367 +</action>
  1.1368 +
  1.1369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1371 +//! @SYMREQ CIT_PREQ1054
  1.1372 +//! @SYMTestPriority medium
  1.1373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1375 +<action>
  1.1376 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1377 +	<actiontype>DeriveKey</actiontype>
  1.1378 +	<actionbody>
  1.1379 +		<derivekey>
  1.1380 +			<kdf>pkcs#12</kdf>
  1.1381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1382 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1383 +			<iterations>4</iterations>
  1.1384 +			<key>91DF366136</key>
  1.1385 +		</derivekey>
  1.1386 +	</actionbody>
  1.1387 +</action>
  1.1388 +
  1.1389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1391 +//! @SYMREQ CIT_PREQ1054
  1.1392 +//! @SYMTestPriority medium
  1.1393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1395 +<action>
  1.1396 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1397 +	<actiontype>DeriveKey</actiontype>
  1.1398 +	<actionbody>
  1.1399 +		<derivekey>
  1.1400 +			<kdf>pkcs#12</kdf>
  1.1401 +			<passwd>0000</passwd>
  1.1402 +			<salt>53414C54</salt>
  1.1403 +			<iterations>8</iterations>
  1.1404 +			<key>9A08D3C4F5</key>
  1.1405 +		</derivekey>
  1.1406 +	</actionbody>
  1.1407 +</action>
  1.1408 +
  1.1409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1411 +//! @SYMREQ CIT_PREQ1054
  1.1412 +//! @SYMTestPriority medium
  1.1413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1415 +<action>
  1.1416 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1417 +	<actiontype>DeriveKey</actiontype>
  1.1418 +	<actionbody>
  1.1419 +		<derivekey>
  1.1420 +			<kdf>pkcs#12</kdf>
  1.1421 +			<passwd>0001</passwd>
  1.1422 +			<salt>53414C54</salt>
  1.1423 +			<iterations>8</iterations>
  1.1424 +			<key>33002FA0B6</key>
  1.1425 +		</derivekey>
  1.1426 +	</actionbody>
  1.1427 +</action>
  1.1428 +
  1.1429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1431 +//! @SYMREQ CIT_PREQ1054
  1.1432 +//! @SYMTestPriority medium
  1.1433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1435 +<action>
  1.1436 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1437 +	<actiontype>DeriveKey</actiontype>
  1.1438 +	<actionbody>
  1.1439 +		<derivekey>
  1.1440 +			<kdf>pkcs#12</kdf>
  1.1441 +			<passwd>PSWD</passwd>
  1.1442 +			<salt>53414C54</salt>
  1.1443 +			<iterations>8</iterations>
  1.1444 +			<key>22001FA269</key>
  1.1445 +		</derivekey>
  1.1446 +	</actionbody>
  1.1447 +</action>
  1.1448 +
  1.1449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1451 +//! @SYMREQ CIT_PREQ1054
  1.1452 +//! @SYMTestPriority medium
  1.1453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1455 +<action>
  1.1456 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1457 +	<actiontype>DeriveKey</actiontype>
  1.1458 +	<actionbody>
  1.1459 +		<derivekey>
  1.1460 +			<kdf>pkcs#12</kdf>
  1.1461 +			<passwd>password</passwd>
  1.1462 +			<salt>53414C54</salt>
  1.1463 +			<iterations>8</iterations>
  1.1464 +			<key>B0935F1122</key>
  1.1465 +		</derivekey>
  1.1466 +	</actionbody>
  1.1467 +</action>
  1.1468 +
  1.1469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1471 +//! @SYMREQ CIT_PREQ1054
  1.1472 +//! @SYMTestPriority medium
  1.1473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1475 +<action>
  1.1476 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1477 +	<actiontype>DeriveKey</actiontype>
  1.1478 +	<actionbody>
  1.1479 +		<derivekey>
  1.1480 +			<kdf>pkcs#12</kdf>
  1.1481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1482 +			<salt>53414C54</salt>
  1.1483 +			<iterations>8</iterations>
  1.1484 +			<key>6602B1B4BB</key>
  1.1485 +		</derivekey>
  1.1486 +	</actionbody>
  1.1487 +</action>
  1.1488 +
  1.1489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1491 +//! @SYMREQ CIT_PREQ1054
  1.1492 +//! @SYMTestPriority medium
  1.1493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1495 +<action>
  1.1496 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1497 +	<actiontype>DeriveKey</actiontype>
  1.1498 +	<actionbody>
  1.1499 +		<derivekey>
  1.1500 +			<kdf>pkcs#12</kdf>
  1.1501 +			<passwd>0000</passwd>
  1.1502 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1503 +			<iterations>8</iterations>
  1.1504 +			<key>3A478368DD</key>
  1.1505 +		</derivekey>
  1.1506 +	</actionbody>
  1.1507 +</action>
  1.1508 +
  1.1509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1511 +//! @SYMREQ CIT_PREQ1054
  1.1512 +//! @SYMTestPriority medium
  1.1513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1515 +<action>
  1.1516 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1517 +	<actiontype>DeriveKey</actiontype>
  1.1518 +	<actionbody>
  1.1519 +		<derivekey>
  1.1520 +			<kdf>pkcs#12</kdf>
  1.1521 +			<passwd>0001</passwd>
  1.1522 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1523 +			<iterations>8</iterations>
  1.1524 +			<key>6473EB1244</key>
  1.1525 +		</derivekey>
  1.1526 +	</actionbody>
  1.1527 +</action>
  1.1528 +
  1.1529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1531 +//! @SYMREQ CIT_PREQ1054
  1.1532 +//! @SYMTestPriority medium
  1.1533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1535 +<action>
  1.1536 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1537 +	<actiontype>DeriveKey</actiontype>
  1.1538 +	<actionbody>
  1.1539 +		<derivekey>
  1.1540 +			<kdf>pkcs#12</kdf>
  1.1541 +			<passwd>PSWD</passwd>
  1.1542 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1543 +			<iterations>8</iterations>
  1.1544 +			<key>AA762B8736</key>
  1.1545 +		</derivekey>
  1.1546 +	</actionbody>
  1.1547 +</action>
  1.1548 +
  1.1549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1551 +//! @SYMREQ CIT_PREQ1054
  1.1552 +//! @SYMTestPriority medium
  1.1553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1555 +<action>
  1.1556 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1557 +	<actiontype>DeriveKey</actiontype>
  1.1558 +	<actionbody>
  1.1559 +		<derivekey>
  1.1560 +			<kdf>pkcs#12</kdf>
  1.1561 +			<passwd>password</passwd>
  1.1562 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1563 +			<iterations>8</iterations>
  1.1564 +			<key>F00C5240B0</key>
  1.1565 +		</derivekey>
  1.1566 +	</actionbody>
  1.1567 +</action>
  1.1568 +
  1.1569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1571 +//! @SYMREQ CIT_PREQ1054
  1.1572 +//! @SYMTestPriority medium
  1.1573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1575 +<action>
  1.1576 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1577 +	<actiontype>DeriveKey</actiontype>
  1.1578 +	<actionbody>
  1.1579 +		<derivekey>
  1.1580 +			<kdf>pkcs#12</kdf>
  1.1581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1582 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1583 +			<iterations>8</iterations>
  1.1584 +			<key>935593CA37</key>
  1.1585 +		</derivekey>
  1.1586 +	</actionbody>
  1.1587 +</action>
  1.1588 +
  1.1589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1591 +//! @SYMREQ CIT_PREQ1054
  1.1592 +//! @SYMTestPriority medium
  1.1593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1595 +<action>
  1.1596 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1597 +	<actiontype>DeriveKey</actiontype>
  1.1598 +	<actionbody>
  1.1599 +		<derivekey>
  1.1600 +			<kdf>pkcs#12</kdf>
  1.1601 +			<passwd>0000</passwd>
  1.1602 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1603 +			<iterations>8</iterations>
  1.1604 +			<key>FCE1F429AE</key>
  1.1605 +		</derivekey>
  1.1606 +	</actionbody>
  1.1607 +</action>
  1.1608 +
  1.1609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1611 +//! @SYMREQ CIT_PREQ1054
  1.1612 +//! @SYMTestPriority medium
  1.1613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1615 +<action>
  1.1616 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1617 +	<actiontype>DeriveKey</actiontype>
  1.1618 +	<actionbody>
  1.1619 +		<derivekey>
  1.1620 +			<kdf>pkcs#12</kdf>
  1.1621 +			<passwd>0001</passwd>
  1.1622 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1623 +			<iterations>8</iterations>
  1.1624 +			<key>82B4A13659</key>
  1.1625 +		</derivekey>
  1.1626 +	</actionbody>
  1.1627 +</action>
  1.1628 +
  1.1629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1631 +//! @SYMREQ CIT_PREQ1054
  1.1632 +//! @SYMTestPriority medium
  1.1633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1635 +<action>
  1.1636 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1637 +	<actiontype>DeriveKey</actiontype>
  1.1638 +	<actionbody>
  1.1639 +		<derivekey>
  1.1640 +			<kdf>pkcs#12</kdf>
  1.1641 +			<passwd>PSWD</passwd>
  1.1642 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1643 +			<iterations>8</iterations>
  1.1644 +			<key>45FE091D4D</key>
  1.1645 +		</derivekey>
  1.1646 +	</actionbody>
  1.1647 +</action>
  1.1648 +
  1.1649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1651 +//! @SYMREQ CIT_PREQ1054
  1.1652 +//! @SYMTestPriority medium
  1.1653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1655 +<action>
  1.1656 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1657 +	<actiontype>DeriveKey</actiontype>
  1.1658 +	<actionbody>
  1.1659 +		<derivekey>
  1.1660 +			<kdf>pkcs#12</kdf>
  1.1661 +			<passwd>password</passwd>
  1.1662 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1663 +			<iterations>8</iterations>
  1.1664 +			<key>5670457314</key>
  1.1665 +		</derivekey>
  1.1666 +	</actionbody>
  1.1667 +</action>
  1.1668 +
  1.1669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1671 +//! @SYMREQ CIT_PREQ1054
  1.1672 +//! @SYMTestPriority medium
  1.1673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1675 +<action>
  1.1676 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1677 +	<actiontype>DeriveKey</actiontype>
  1.1678 +	<actionbody>
  1.1679 +		<derivekey>
  1.1680 +			<kdf>pkcs#12</kdf>
  1.1681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1682 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1683 +			<iterations>8</iterations>
  1.1684 +			<key>1C4CAE2514</key>
  1.1685 +		</derivekey>
  1.1686 +	</actionbody>
  1.1687 +</action>
  1.1688 +
  1.1689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1691 +//! @SYMREQ CIT_PREQ1054
  1.1692 +//! @SYMTestPriority medium
  1.1693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1695 +<action>
  1.1696 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1697 +	<actiontype>DeriveKey</actiontype>
  1.1698 +	<actionbody>
  1.1699 +		<derivekey>
  1.1700 +			<kdf>pkcs#12</kdf>
  1.1701 +			<passwd>0000</passwd>
  1.1702 +			<salt>53414C54</salt>
  1.1703 +			<iterations>128</iterations>
  1.1704 +			<key>8B4B3CBFB0</key>
  1.1705 +		</derivekey>
  1.1706 +	</actionbody>
  1.1707 +</action>
  1.1708 +
  1.1709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1711 +//! @SYMREQ CIT_PREQ1054
  1.1712 +//! @SYMTestPriority medium
  1.1713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1715 +<action>
  1.1716 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1717 +	<actiontype>DeriveKey</actiontype>
  1.1718 +	<actionbody>
  1.1719 +		<derivekey>
  1.1720 +			<kdf>pkcs#12</kdf>
  1.1721 +			<passwd>0001</passwd>
  1.1722 +			<salt>53414C54</salt>
  1.1723 +			<iterations>128</iterations>
  1.1724 +			<key>C89C3A2C9C</key>
  1.1725 +		</derivekey>
  1.1726 +	</actionbody>
  1.1727 +</action>
  1.1728 +
  1.1729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1731 +//! @SYMREQ CIT_PREQ1054
  1.1732 +//! @SYMTestPriority medium
  1.1733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1735 +<action>
  1.1736 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1737 +	<actiontype>DeriveKey</actiontype>
  1.1738 +	<actionbody>
  1.1739 +		<derivekey>
  1.1740 +			<kdf>pkcs#12</kdf>
  1.1741 +			<passwd>PSWD</passwd>
  1.1742 +			<salt>53414C54</salt>
  1.1743 +			<iterations>128</iterations>
  1.1744 +			<key>8109F97073</key>
  1.1745 +		</derivekey>
  1.1746 +	</actionbody>
  1.1747 +</action>
  1.1748 +
  1.1749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1751 +//! @SYMREQ CIT_PREQ1054
  1.1752 +//! @SYMTestPriority medium
  1.1753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1755 +<action>
  1.1756 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1757 +	<actiontype>DeriveKey</actiontype>
  1.1758 +	<actionbody>
  1.1759 +		<derivekey>
  1.1760 +			<kdf>pkcs#12</kdf>
  1.1761 +			<passwd>password</passwd>
  1.1762 +			<salt>53414C54</salt>
  1.1763 +			<iterations>128</iterations>
  1.1764 +			<key>55E985CC15</key>
  1.1765 +		</derivekey>
  1.1766 +	</actionbody>
  1.1767 +</action>
  1.1768 +
  1.1769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1771 +//! @SYMREQ CIT_PREQ1054
  1.1772 +//! @SYMTestPriority medium
  1.1773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1775 +<action>
  1.1776 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1777 +	<actiontype>DeriveKey</actiontype>
  1.1778 +	<actionbody>
  1.1779 +		<derivekey>
  1.1780 +			<kdf>pkcs#12</kdf>
  1.1781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1782 +			<salt>53414C54</salt>
  1.1783 +			<iterations>128</iterations>
  1.1784 +			<key>2802AA97D4</key>
  1.1785 +		</derivekey>
  1.1786 +	</actionbody>
  1.1787 +</action>
  1.1788 +
  1.1789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1791 +//! @SYMREQ CIT_PREQ1054
  1.1792 +//! @SYMTestPriority medium
  1.1793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1795 +<action>
  1.1796 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1797 +	<actiontype>DeriveKey</actiontype>
  1.1798 +	<actionbody>
  1.1799 +		<derivekey>
  1.1800 +			<kdf>pkcs#12</kdf>
  1.1801 +			<passwd>0000</passwd>
  1.1802 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1803 +			<iterations>128</iterations>
  1.1804 +			<key>881509A34D</key>
  1.1805 +		</derivekey>
  1.1806 +	</actionbody>
  1.1807 +</action>
  1.1808 +
  1.1809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1811 +//! @SYMREQ CIT_PREQ1054
  1.1812 +//! @SYMTestPriority medium
  1.1813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1815 +<action>
  1.1816 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1817 +	<actiontype>DeriveKey</actiontype>
  1.1818 +	<actionbody>
  1.1819 +		<derivekey>
  1.1820 +			<kdf>pkcs#12</kdf>
  1.1821 +			<passwd>0001</passwd>
  1.1822 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1823 +			<iterations>128</iterations>
  1.1824 +			<key>B2918BC593</key>
  1.1825 +		</derivekey>
  1.1826 +	</actionbody>
  1.1827 +</action>
  1.1828 +
  1.1829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1831 +//! @SYMREQ CIT_PREQ1054
  1.1832 +//! @SYMTestPriority medium
  1.1833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1835 +<action>
  1.1836 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1837 +	<actiontype>DeriveKey</actiontype>
  1.1838 +	<actionbody>
  1.1839 +		<derivekey>
  1.1840 +			<kdf>pkcs#12</kdf>
  1.1841 +			<passwd>PSWD</passwd>
  1.1842 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1843 +			<iterations>128</iterations>
  1.1844 +			<key>0FE0529B45</key>
  1.1845 +		</derivekey>
  1.1846 +	</actionbody>
  1.1847 +</action>
  1.1848 +
  1.1849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1851 +//! @SYMREQ CIT_PREQ1054
  1.1852 +//! @SYMTestPriority medium
  1.1853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1855 +<action>
  1.1856 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1857 +	<actiontype>DeriveKey</actiontype>
  1.1858 +	<actionbody>
  1.1859 +		<derivekey>
  1.1860 +			<kdf>pkcs#12</kdf>
  1.1861 +			<passwd>password</passwd>
  1.1862 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1863 +			<iterations>128</iterations>
  1.1864 +			<key>1FF923C4B1</key>
  1.1865 +		</derivekey>
  1.1866 +	</actionbody>
  1.1867 +</action>
  1.1868 +
  1.1869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1871 +//! @SYMREQ CIT_PREQ1054
  1.1872 +//! @SYMTestPriority medium
  1.1873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1875 +<action>
  1.1876 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.1877 +	<actiontype>DeriveKey</actiontype>
  1.1878 +	<actionbody>
  1.1879 +		<derivekey>
  1.1880 +			<kdf>pkcs#12</kdf>
  1.1881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1882 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.1883 +			<iterations>128</iterations>
  1.1884 +			<key>05D1E56D04</key>
  1.1885 +		</derivekey>
  1.1886 +	</actionbody>
  1.1887 +</action>
  1.1888 +
  1.1889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1891 +//! @SYMREQ CIT_PREQ1054
  1.1892 +//! @SYMTestPriority medium
  1.1893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1895 +<action>
  1.1896 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1897 +	<actiontype>DeriveKey</actiontype>
  1.1898 +	<actionbody>
  1.1899 +		<derivekey>
  1.1900 +			<kdf>pkcs#12</kdf>
  1.1901 +			<passwd>0000</passwd>
  1.1902 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1903 +			<iterations>128</iterations>
  1.1904 +			<key>99FE149183</key>
  1.1905 +		</derivekey>
  1.1906 +	</actionbody>
  1.1907 +</action>
  1.1908 +
  1.1909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1911 +//! @SYMREQ CIT_PREQ1054
  1.1912 +//! @SYMTestPriority medium
  1.1913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1915 +<action>
  1.1916 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1917 +	<actiontype>DeriveKey</actiontype>
  1.1918 +	<actionbody>
  1.1919 +		<derivekey>
  1.1920 +			<kdf>pkcs#12</kdf>
  1.1921 +			<passwd>0001</passwd>
  1.1922 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1923 +			<iterations>128</iterations>
  1.1924 +			<key>79E29F3FCB</key>
  1.1925 +		</derivekey>
  1.1926 +	</actionbody>
  1.1927 +</action>
  1.1928 +
  1.1929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1931 +//! @SYMREQ CIT_PREQ1054
  1.1932 +//! @SYMTestPriority medium
  1.1933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1935 +<action>
  1.1936 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1937 +	<actiontype>DeriveKey</actiontype>
  1.1938 +	<actionbody>
  1.1939 +		<derivekey>
  1.1940 +			<kdf>pkcs#12</kdf>
  1.1941 +			<passwd>PSWD</passwd>
  1.1942 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1943 +			<iterations>128</iterations>
  1.1944 +			<key>22A70A8657</key>
  1.1945 +		</derivekey>
  1.1946 +	</actionbody>
  1.1947 +</action>
  1.1948 +
  1.1949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1951 +//! @SYMREQ CIT_PREQ1054
  1.1952 +//! @SYMTestPriority medium
  1.1953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1955 +<action>
  1.1956 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1957 +	<actiontype>DeriveKey</actiontype>
  1.1958 +	<actionbody>
  1.1959 +		<derivekey>
  1.1960 +			<kdf>pkcs#12</kdf>
  1.1961 +			<passwd>password</passwd>
  1.1962 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1963 +			<iterations>128</iterations>
  1.1964 +			<key>9CBA922190</key>
  1.1965 +		</derivekey>
  1.1966 +	</actionbody>
  1.1967 +</action>
  1.1968 +
  1.1969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1971 +//! @SYMREQ CIT_PREQ1054
  1.1972 +//! @SYMTestPriority medium
  1.1973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1975 +<action>
  1.1976 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.1977 +	<actiontype>DeriveKey</actiontype>
  1.1978 +	<actionbody>
  1.1979 +		<derivekey>
  1.1980 +			<kdf>pkcs#12</kdf>
  1.1981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.1982 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.1983 +			<iterations>128</iterations>
  1.1984 +			<key>A037A8B1C2</key>
  1.1985 +		</derivekey>
  1.1986 +	</actionbody>
  1.1987 +</action>
  1.1988 +
  1.1989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.1990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.1991 +//! @SYMREQ CIT_PREQ1054
  1.1992 +//! @SYMTestPriority medium
  1.1993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.1994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.1995 +<action>
  1.1996 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.1997 +	<actiontype>DeriveKey</actiontype>
  1.1998 +	<actionbody>
  1.1999 +		<derivekey>
  1.2000 +			<kdf>pkcs#12</kdf>
  1.2001 +			<passwd>0000</passwd>
  1.2002 +			<salt>53414C54</salt>
  1.2003 +			<iterations>1024</iterations>
  1.2004 +			<key>82824BE51C</key>
  1.2005 +		</derivekey>
  1.2006 +	</actionbody>
  1.2007 +</action>
  1.2008 +
  1.2009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2011 +//! @SYMREQ CIT_PREQ1054
  1.2012 +//! @SYMTestPriority medium
  1.2013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2015 +<action>
  1.2016 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2017 +	<actiontype>DeriveKey</actiontype>
  1.2018 +	<actionbody>
  1.2019 +		<derivekey>
  1.2020 +			<kdf>pkcs#12</kdf>
  1.2021 +			<passwd>0001</passwd>
  1.2022 +			<salt>53414C54</salt>
  1.2023 +			<iterations>1024</iterations>
  1.2024 +			<key>E166049AC4</key>
  1.2025 +		</derivekey>
  1.2026 +	</actionbody>
  1.2027 +</action>
  1.2028 +
  1.2029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2031 +//! @SYMREQ CIT_PREQ1054
  1.2032 +//! @SYMTestPriority medium
  1.2033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2035 +<action>
  1.2036 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2037 +	<actiontype>DeriveKey</actiontype>
  1.2038 +	<actionbody>
  1.2039 +		<derivekey>
  1.2040 +			<kdf>pkcs#12</kdf>
  1.2041 +			<passwd>PSWD</passwd>
  1.2042 +			<salt>53414C54</salt>
  1.2043 +			<iterations>1024</iterations>
  1.2044 +			<key>90E975CC54</key>
  1.2045 +		</derivekey>
  1.2046 +	</actionbody>
  1.2047 +</action>
  1.2048 +
  1.2049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2051 +//! @SYMREQ CIT_PREQ1054
  1.2052 +//! @SYMTestPriority medium
  1.2053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2055 +<action>
  1.2056 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2057 +	<actiontype>DeriveKey</actiontype>
  1.2058 +	<actionbody>
  1.2059 +		<derivekey>
  1.2060 +			<kdf>pkcs#12</kdf>
  1.2061 +			<passwd>password</passwd>
  1.2062 +			<salt>53414C54</salt>
  1.2063 +			<iterations>1024</iterations>
  1.2064 +			<key>1FFD40D7BB</key>
  1.2065 +		</derivekey>
  1.2066 +	</actionbody>
  1.2067 +</action>
  1.2068 +
  1.2069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2071 +//! @SYMREQ CIT_PREQ1054
  1.2072 +//! @SYMTestPriority medium
  1.2073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2075 +<action>
  1.2076 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2077 +	<actiontype>DeriveKey</actiontype>
  1.2078 +	<actionbody>
  1.2079 +		<derivekey>
  1.2080 +			<kdf>pkcs#12</kdf>
  1.2081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2082 +			<salt>53414C54</salt>
  1.2083 +			<iterations>1024</iterations>
  1.2084 +			<key>406C92305A</key>
  1.2085 +		</derivekey>
  1.2086 +	</actionbody>
  1.2087 +</action>
  1.2088 +
  1.2089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2091 +//! @SYMREQ CIT_PREQ1054
  1.2092 +//! @SYMTestPriority medium
  1.2093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2095 +<action>
  1.2096 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2097 +	<actiontype>DeriveKey</actiontype>
  1.2098 +	<actionbody>
  1.2099 +		<derivekey>
  1.2100 +			<kdf>pkcs#12</kdf>
  1.2101 +			<passwd>0000</passwd>
  1.2102 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2103 +			<iterations>1024</iterations>
  1.2104 +			<key>E82BD75AA9</key>
  1.2105 +		</derivekey>
  1.2106 +	</actionbody>
  1.2107 +</action>
  1.2108 +
  1.2109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2111 +//! @SYMREQ CIT_PREQ1054
  1.2112 +//! @SYMTestPriority medium
  1.2113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2115 +<action>
  1.2116 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2117 +	<actiontype>DeriveKey</actiontype>
  1.2118 +	<actionbody>
  1.2119 +		<derivekey>
  1.2120 +			<kdf>pkcs#12</kdf>
  1.2121 +			<passwd>0001</passwd>
  1.2122 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2123 +			<iterations>1024</iterations>
  1.2124 +			<key>0182E41FCA</key>
  1.2125 +		</derivekey>
  1.2126 +	</actionbody>
  1.2127 +</action>
  1.2128 +
  1.2129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2131 +//! @SYMREQ CIT_PREQ1054
  1.2132 +//! @SYMTestPriority medium
  1.2133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2135 +<action>
  1.2136 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2137 +	<actiontype>DeriveKey</actiontype>
  1.2138 +	<actionbody>
  1.2139 +		<derivekey>
  1.2140 +			<kdf>pkcs#12</kdf>
  1.2141 +			<passwd>PSWD</passwd>
  1.2142 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2143 +			<iterations>1024</iterations>
  1.2144 +			<key>101FB77598</key>
  1.2145 +		</derivekey>
  1.2146 +	</actionbody>
  1.2147 +</action>
  1.2148 +
  1.2149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2151 +//! @SYMREQ CIT_PREQ1054
  1.2152 +//! @SYMTestPriority medium
  1.2153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2155 +<action>
  1.2156 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2157 +	<actiontype>DeriveKey</actiontype>
  1.2158 +	<actionbody>
  1.2159 +		<derivekey>
  1.2160 +			<kdf>pkcs#12</kdf>
  1.2161 +			<passwd>password</passwd>
  1.2162 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2163 +			<iterations>1024</iterations>
  1.2164 +			<key>D7499C6A12</key>
  1.2165 +		</derivekey>
  1.2166 +	</actionbody>
  1.2167 +</action>
  1.2168 +
  1.2169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2171 +//! @SYMREQ CIT_PREQ1054
  1.2172 +//! @SYMTestPriority medium
  1.2173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2175 +<action>
  1.2176 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2177 +	<actiontype>DeriveKey</actiontype>
  1.2178 +	<actionbody>
  1.2179 +		<derivekey>
  1.2180 +			<kdf>pkcs#12</kdf>
  1.2181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2182 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2183 +			<iterations>1024</iterations>
  1.2184 +			<key>2C6222B8E2</key>
  1.2185 +		</derivekey>
  1.2186 +	</actionbody>
  1.2187 +</action>
  1.2188 +
  1.2189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2191 +//! @SYMREQ CIT_PREQ1054
  1.2192 +//! @SYMTestPriority medium
  1.2193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2195 +<action>
  1.2196 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2197 +	<actiontype>DeriveKey</actiontype>
  1.2198 +	<actionbody>
  1.2199 +		<derivekey>
  1.2200 +			<kdf>pkcs#12</kdf>
  1.2201 +			<passwd>0000</passwd>
  1.2202 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2203 +			<iterations>1024</iterations>
  1.2204 +			<key>6789F0680A</key>
  1.2205 +		</derivekey>
  1.2206 +	</actionbody>
  1.2207 +</action>
  1.2208 +
  1.2209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2211 +//! @SYMREQ CIT_PREQ1054
  1.2212 +//! @SYMTestPriority medium
  1.2213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2215 +<action>
  1.2216 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2217 +	<actiontype>DeriveKey</actiontype>
  1.2218 +	<actionbody>
  1.2219 +		<derivekey>
  1.2220 +			<kdf>pkcs#12</kdf>
  1.2221 +			<passwd>0001</passwd>
  1.2222 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2223 +			<iterations>1024</iterations>
  1.2224 +			<key>43E6637258</key>
  1.2225 +		</derivekey>
  1.2226 +	</actionbody>
  1.2227 +</action>
  1.2228 +
  1.2229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2231 +//! @SYMREQ CIT_PREQ1054
  1.2232 +//! @SYMTestPriority medium
  1.2233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2235 +<action>
  1.2236 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2237 +	<actiontype>DeriveKey</actiontype>
  1.2238 +	<actionbody>
  1.2239 +		<derivekey>
  1.2240 +			<kdf>pkcs#12</kdf>
  1.2241 +			<passwd>PSWD</passwd>
  1.2242 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2243 +			<iterations>1024</iterations>
  1.2244 +			<key>8B3308BDD5</key>
  1.2245 +		</derivekey>
  1.2246 +	</actionbody>
  1.2247 +</action>
  1.2248 +
  1.2249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2251 +//! @SYMREQ CIT_PREQ1054
  1.2252 +//! @SYMTestPriority medium
  1.2253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2255 +<action>
  1.2256 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2257 +	<actiontype>DeriveKey</actiontype>
  1.2258 +	<actionbody>
  1.2259 +		<derivekey>
  1.2260 +			<kdf>pkcs#12</kdf>
  1.2261 +			<passwd>password</passwd>
  1.2262 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2263 +			<iterations>1024</iterations>
  1.2264 +			<key>CA202602C9</key>
  1.2265 +		</derivekey>
  1.2266 +	</actionbody>
  1.2267 +</action>
  1.2268 +
  1.2269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2271 +//! @SYMREQ CIT_PREQ1054
  1.2272 +//! @SYMTestPriority medium
  1.2273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2275 +<action>
  1.2276 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2277 +	<actiontype>DeriveKey</actiontype>
  1.2278 +	<actionbody>
  1.2279 +		<derivekey>
  1.2280 +			<kdf>pkcs#12</kdf>
  1.2281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2282 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2283 +			<iterations>1024</iterations>
  1.2284 +			<key>F6A33ADA6A</key>
  1.2285 +		</derivekey>
  1.2286 +	</actionbody>
  1.2287 +</action>
  1.2288 +
  1.2289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2291 +//! @SYMREQ CIT_PREQ1054
  1.2292 +//! @SYMTestPriority medium
  1.2293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2295 +<action>
  1.2296 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2297 +	<actiontype>DeriveKey</actiontype>
  1.2298 +	<actionbody>
  1.2299 +		<derivekey>
  1.2300 +			<kdf>pkcs#12</kdf>
  1.2301 +			<passwd>0000</passwd>
  1.2302 +			<salt>53414C54</salt>
  1.2303 +			<iterations>1536</iterations>
  1.2304 +			<key>79A4E1398F</key>
  1.2305 +		</derivekey>
  1.2306 +	</actionbody>
  1.2307 +</action>
  1.2308 +
  1.2309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2311 +//! @SYMREQ CIT_PREQ1054
  1.2312 +//! @SYMTestPriority medium
  1.2313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2315 +<action>
  1.2316 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2317 +	<actiontype>DeriveKey</actiontype>
  1.2318 +	<actionbody>
  1.2319 +		<derivekey>
  1.2320 +			<kdf>pkcs#12</kdf>
  1.2321 +			<passwd>0001</passwd>
  1.2322 +			<salt>53414C54</salt>
  1.2323 +			<iterations>1536</iterations>
  1.2324 +			<key>6F2402CCE4</key>
  1.2325 +		</derivekey>
  1.2326 +	</actionbody>
  1.2327 +</action>
  1.2328 +
  1.2329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2331 +//! @SYMREQ CIT_PREQ1054
  1.2332 +//! @SYMTestPriority medium
  1.2333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2335 +<action>
  1.2336 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2337 +	<actiontype>DeriveKey</actiontype>
  1.2338 +	<actionbody>
  1.2339 +		<derivekey>
  1.2340 +			<kdf>pkcs#12</kdf>
  1.2341 +			<passwd>PSWD</passwd>
  1.2342 +			<salt>53414C54</salt>
  1.2343 +			<iterations>1536</iterations>
  1.2344 +			<key>B9ED7B3135</key>
  1.2345 +		</derivekey>
  1.2346 +	</actionbody>
  1.2347 +</action>
  1.2348 +
  1.2349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2351 +//! @SYMREQ CIT_PREQ1054
  1.2352 +//! @SYMTestPriority medium
  1.2353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2355 +<action>
  1.2356 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2357 +	<actiontype>DeriveKey</actiontype>
  1.2358 +	<actionbody>
  1.2359 +		<derivekey>
  1.2360 +			<kdf>pkcs#12</kdf>
  1.2361 +			<passwd>password</passwd>
  1.2362 +			<salt>53414C54</salt>
  1.2363 +			<iterations>1536</iterations>
  1.2364 +			<key>65B27A78C7</key>
  1.2365 +		</derivekey>
  1.2366 +	</actionbody>
  1.2367 +</action>
  1.2368 +
  1.2369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2371 +//! @SYMREQ CIT_PREQ1054
  1.2372 +//! @SYMTestPriority medium
  1.2373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2375 +<action>
  1.2376 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2377 +	<actiontype>DeriveKey</actiontype>
  1.2378 +	<actionbody>
  1.2379 +		<derivekey>
  1.2380 +			<kdf>pkcs#12</kdf>
  1.2381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2382 +			<salt>53414C54</salt>
  1.2383 +			<iterations>1536</iterations>
  1.2384 +			<key>8F8FC96A3D</key>
  1.2385 +		</derivekey>
  1.2386 +	</actionbody>
  1.2387 +</action>
  1.2388 +
  1.2389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2391 +//! @SYMREQ CIT_PREQ1054
  1.2392 +//! @SYMTestPriority medium
  1.2393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2395 +<action>
  1.2396 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2397 +	<actiontype>DeriveKey</actiontype>
  1.2398 +	<actionbody>
  1.2399 +		<derivekey>
  1.2400 +			<kdf>pkcs#12</kdf>
  1.2401 +			<passwd>0000</passwd>
  1.2402 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2403 +			<iterations>1536</iterations>
  1.2404 +			<key>642DDC3F4E</key>
  1.2405 +		</derivekey>
  1.2406 +	</actionbody>
  1.2407 +</action>
  1.2408 +
  1.2409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2411 +//! @SYMREQ CIT_PREQ1054
  1.2412 +//! @SYMTestPriority medium
  1.2413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2415 +<action>
  1.2416 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2417 +	<actiontype>DeriveKey</actiontype>
  1.2418 +	<actionbody>
  1.2419 +		<derivekey>
  1.2420 +			<kdf>pkcs#12</kdf>
  1.2421 +			<passwd>0001</passwd>
  1.2422 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2423 +			<iterations>1536</iterations>
  1.2424 +			<key>0FE4BDC100</key>
  1.2425 +		</derivekey>
  1.2426 +	</actionbody>
  1.2427 +</action>
  1.2428 +
  1.2429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2431 +//! @SYMREQ CIT_PREQ1054
  1.2432 +//! @SYMTestPriority medium
  1.2433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2435 +<action>
  1.2436 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2437 +	<actiontype>DeriveKey</actiontype>
  1.2438 +	<actionbody>
  1.2439 +		<derivekey>
  1.2440 +			<kdf>pkcs#12</kdf>
  1.2441 +			<passwd>PSWD</passwd>
  1.2442 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2443 +			<iterations>1536</iterations>
  1.2444 +			<key>32D7F10C5E</key>
  1.2445 +		</derivekey>
  1.2446 +	</actionbody>
  1.2447 +</action>
  1.2448 +
  1.2449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2451 +//! @SYMREQ CIT_PREQ1054
  1.2452 +//! @SYMTestPriority medium
  1.2453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2455 +<action>
  1.2456 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2457 +	<actiontype>DeriveKey</actiontype>
  1.2458 +	<actionbody>
  1.2459 +		<derivekey>
  1.2460 +			<kdf>pkcs#12</kdf>
  1.2461 +			<passwd>password</passwd>
  1.2462 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2463 +			<iterations>1536</iterations>
  1.2464 +			<key>C05FE26245</key>
  1.2465 +		</derivekey>
  1.2466 +	</actionbody>
  1.2467 +</action>
  1.2468 +
  1.2469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2471 +//! @SYMREQ CIT_PREQ1054
  1.2472 +//! @SYMTestPriority medium
  1.2473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2475 +<action>
  1.2476 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2477 +	<actiontype>DeriveKey</actiontype>
  1.2478 +	<actionbody>
  1.2479 +		<derivekey>
  1.2480 +			<kdf>pkcs#12</kdf>
  1.2481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2482 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2483 +			<iterations>1536</iterations>
  1.2484 +			<key>818C967A8F</key>
  1.2485 +		</derivekey>
  1.2486 +	</actionbody>
  1.2487 +</action>
  1.2488 +
  1.2489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2491 +//! @SYMREQ CIT_PREQ1054
  1.2492 +//! @SYMTestPriority medium
  1.2493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2495 +<action>
  1.2496 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2497 +	<actiontype>DeriveKey</actiontype>
  1.2498 +	<actionbody>
  1.2499 +		<derivekey>
  1.2500 +			<kdf>pkcs#12</kdf>
  1.2501 +			<passwd>0000</passwd>
  1.2502 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2503 +			<iterations>1536</iterations>
  1.2504 +			<key>5301B5B2A1</key>
  1.2505 +		</derivekey>
  1.2506 +	</actionbody>
  1.2507 +</action>
  1.2508 +
  1.2509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2511 +//! @SYMREQ CIT_PREQ1054
  1.2512 +//! @SYMTestPriority medium
  1.2513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2515 +<action>
  1.2516 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2517 +	<actiontype>DeriveKey</actiontype>
  1.2518 +	<actionbody>
  1.2519 +		<derivekey>
  1.2520 +			<kdf>pkcs#12</kdf>
  1.2521 +			<passwd>0001</passwd>
  1.2522 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2523 +			<iterations>1536</iterations>
  1.2524 +			<key>9CB5BD2394</key>
  1.2525 +		</derivekey>
  1.2526 +	</actionbody>
  1.2527 +</action>
  1.2528 +
  1.2529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2531 +//! @SYMREQ CIT_PREQ1054
  1.2532 +//! @SYMTestPriority medium
  1.2533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2535 +<action>
  1.2536 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2537 +	<actiontype>DeriveKey</actiontype>
  1.2538 +	<actionbody>
  1.2539 +		<derivekey>
  1.2540 +			<kdf>pkcs#12</kdf>
  1.2541 +			<passwd>PSWD</passwd>
  1.2542 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2543 +			<iterations>1536</iterations>
  1.2544 +			<key>EB90D956B3</key>
  1.2545 +		</derivekey>
  1.2546 +	</actionbody>
  1.2547 +</action>
  1.2548 +
  1.2549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2551 +//! @SYMREQ CIT_PREQ1054
  1.2552 +//! @SYMTestPriority medium
  1.2553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2555 +<action>
  1.2556 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2557 +	<actiontype>DeriveKey</actiontype>
  1.2558 +	<actionbody>
  1.2559 +		<derivekey>
  1.2560 +			<kdf>pkcs#12</kdf>
  1.2561 +			<passwd>password</passwd>
  1.2562 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2563 +			<iterations>1536</iterations>
  1.2564 +			<key>ACAFB5EB24</key>
  1.2565 +		</derivekey>
  1.2566 +	</actionbody>
  1.2567 +</action>
  1.2568 +
  1.2569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2571 +//! @SYMREQ CIT_PREQ1054
  1.2572 +//! @SYMTestPriority medium
  1.2573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2575 +<action>
  1.2576 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2577 +	<actiontype>DeriveKey</actiontype>
  1.2578 +	<actionbody>
  1.2579 +		<derivekey>
  1.2580 +			<kdf>pkcs#12</kdf>
  1.2581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2582 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2583 +			<iterations>1536</iterations>
  1.2584 +			<key>A7B0859D9D</key>
  1.2585 +		</derivekey>
  1.2586 +	</actionbody>
  1.2587 +</action>
  1.2588 +
  1.2589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2591 +//! @SYMREQ CIT_PREQ1054
  1.2592 +//! @SYMTestPriority medium
  1.2593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2595 +<action>
  1.2596 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2597 +	<actiontype>DeriveKey</actiontype>
  1.2598 +	<actionbody>
  1.2599 +		<derivekey>
  1.2600 +			<kdf>pkcs#12</kdf>
  1.2601 +			<passwd>0000</passwd>
  1.2602 +			<salt>53414C54</salt>
  1.2603 +			<iterations>2048</iterations>
  1.2604 +			<key>B0F0F2EB44</key>
  1.2605 +		</derivekey>
  1.2606 +	</actionbody>
  1.2607 +</action>
  1.2608 +
  1.2609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2611 +//! @SYMREQ CIT_PREQ1054
  1.2612 +//! @SYMTestPriority medium
  1.2613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2615 +<action>
  1.2616 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2617 +	<actiontype>DeriveKey</actiontype>
  1.2618 +	<actionbody>
  1.2619 +		<derivekey>
  1.2620 +			<kdf>pkcs#12</kdf>
  1.2621 +			<passwd>0001</passwd>
  1.2622 +			<salt>53414C54</salt>
  1.2623 +			<iterations>2048</iterations>
  1.2624 +			<key>C11C0499CC</key>
  1.2625 +		</derivekey>
  1.2626 +	</actionbody>
  1.2627 +</action>
  1.2628 +
  1.2629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2631 +//! @SYMREQ CIT_PREQ1054
  1.2632 +//! @SYMTestPriority medium
  1.2633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2635 +<action>
  1.2636 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2637 +	<actiontype>DeriveKey</actiontype>
  1.2638 +	<actionbody>
  1.2639 +		<derivekey>
  1.2640 +			<kdf>pkcs#12</kdf>
  1.2641 +			<passwd>PSWD</passwd>
  1.2642 +			<salt>53414C54</salt>
  1.2643 +			<iterations>2048</iterations>
  1.2644 +			<key>3F63500AC4</key>
  1.2645 +		</derivekey>
  1.2646 +	</actionbody>
  1.2647 +</action>
  1.2648 +
  1.2649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2651 +//! @SYMREQ CIT_PREQ1054
  1.2652 +//! @SYMTestPriority medium
  1.2653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2655 +<action>
  1.2656 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2657 +	<actiontype>DeriveKey</actiontype>
  1.2658 +	<actionbody>
  1.2659 +		<derivekey>
  1.2660 +			<kdf>pkcs#12</kdf>
  1.2661 +			<passwd>password</passwd>
  1.2662 +			<salt>53414C54</salt>
  1.2663 +			<iterations>2048</iterations>
  1.2664 +			<key>B47F802F12</key>
  1.2665 +		</derivekey>
  1.2666 +	</actionbody>
  1.2667 +</action>
  1.2668 +
  1.2669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2671 +//! @SYMREQ CIT_PREQ1054
  1.2672 +//! @SYMTestPriority medium
  1.2673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2675 +<action>
  1.2676 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1.2677 +	<actiontype>DeriveKey</actiontype>
  1.2678 +	<actionbody>
  1.2679 +		<derivekey>
  1.2680 +			<kdf>pkcs#12</kdf>
  1.2681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2682 +			<salt>53414C54</salt>
  1.2683 +			<iterations>2048</iterations>
  1.2684 +			<key>3099237692</key>
  1.2685 +		</derivekey>
  1.2686 +	</actionbody>
  1.2687 +</action>
  1.2688 +
  1.2689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2691 +//! @SYMREQ CIT_PREQ1054
  1.2692 +//! @SYMTestPriority medium
  1.2693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2695 +<action>
  1.2696 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2697 +	<actiontype>DeriveKey</actiontype>
  1.2698 +	<actionbody>
  1.2699 +		<derivekey>
  1.2700 +			<kdf>pkcs#12</kdf>
  1.2701 +			<passwd>0000</passwd>
  1.2702 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2703 +			<iterations>2048</iterations>
  1.2704 +			<key>CD04522946</key>
  1.2705 +		</derivekey>
  1.2706 +	</actionbody>
  1.2707 +</action>
  1.2708 +
  1.2709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2711 +//! @SYMREQ CIT_PREQ1054
  1.2712 +//! @SYMTestPriority medium
  1.2713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2715 +<action>
  1.2716 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2717 +	<actiontype>DeriveKey</actiontype>
  1.2718 +	<actionbody>
  1.2719 +		<derivekey>
  1.2720 +			<kdf>pkcs#12</kdf>
  1.2721 +			<passwd>0001</passwd>
  1.2722 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2723 +			<iterations>2048</iterations>
  1.2724 +			<key>D85432F8AC</key>
  1.2725 +		</derivekey>
  1.2726 +	</actionbody>
  1.2727 +</action>
  1.2728 +
  1.2729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2731 +//! @SYMREQ CIT_PREQ1054
  1.2732 +//! @SYMTestPriority medium
  1.2733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2735 +<action>
  1.2736 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2737 +	<actiontype>DeriveKey</actiontype>
  1.2738 +	<actionbody>
  1.2739 +		<derivekey>
  1.2740 +			<kdf>pkcs#12</kdf>
  1.2741 +			<passwd>PSWD</passwd>
  1.2742 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2743 +			<iterations>2048</iterations>
  1.2744 +			<key>C77FDE2E52</key>
  1.2745 +		</derivekey>
  1.2746 +	</actionbody>
  1.2747 +</action>
  1.2748 +
  1.2749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2751 +//! @SYMREQ CIT_PREQ1054
  1.2752 +//! @SYMTestPriority medium
  1.2753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2755 +<action>
  1.2756 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2757 +	<actiontype>DeriveKey</actiontype>
  1.2758 +	<actionbody>
  1.2759 +		<derivekey>
  1.2760 +			<kdf>pkcs#12</kdf>
  1.2761 +			<passwd>password</passwd>
  1.2762 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2763 +			<iterations>2048</iterations>
  1.2764 +			<key>62E06B8A26</key>
  1.2765 +		</derivekey>
  1.2766 +	</actionbody>
  1.2767 +</action>
  1.2768 +
  1.2769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2771 +//! @SYMREQ CIT_PREQ1054
  1.2772 +//! @SYMTestPriority medium
  1.2773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2775 +<action>
  1.2776 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1.2777 +	<actiontype>DeriveKey</actiontype>
  1.2778 +	<actionbody>
  1.2779 +		<derivekey>
  1.2780 +			<kdf>pkcs#12</kdf>
  1.2781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2782 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.2783 +			<iterations>2048</iterations>
  1.2784 +			<key>A5B348EB49</key>
  1.2785 +		</derivekey>
  1.2786 +	</actionbody>
  1.2787 +</action>
  1.2788 +
  1.2789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2791 +//! @SYMREQ CIT_PREQ1054
  1.2792 +//! @SYMTestPriority medium
  1.2793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2795 +<action>
  1.2796 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2797 +	<actiontype>DeriveKey</actiontype>
  1.2798 +	<actionbody>
  1.2799 +		<derivekey>
  1.2800 +			<kdf>pkcs#12</kdf>
  1.2801 +			<passwd>0000</passwd>
  1.2802 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2803 +			<iterations>2048</iterations>
  1.2804 +			<key>2A824C1B6B</key>
  1.2805 +		</derivekey>
  1.2806 +	</actionbody>
  1.2807 +</action>
  1.2808 +
  1.2809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2811 +//! @SYMREQ CIT_PREQ1054
  1.2812 +//! @SYMTestPriority medium
  1.2813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2815 +<action>
  1.2816 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2817 +	<actiontype>DeriveKey</actiontype>
  1.2818 +	<actionbody>
  1.2819 +		<derivekey>
  1.2820 +			<kdf>pkcs#12</kdf>
  1.2821 +			<passwd>0001</passwd>
  1.2822 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2823 +			<iterations>2048</iterations>
  1.2824 +			<key>4B8D18B96E</key>
  1.2825 +		</derivekey>
  1.2826 +	</actionbody>
  1.2827 +</action>
  1.2828 +
  1.2829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2831 +//! @SYMREQ CIT_PREQ1054
  1.2832 +//! @SYMTestPriority medium
  1.2833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2835 +<action>
  1.2836 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2837 +	<actiontype>DeriveKey</actiontype>
  1.2838 +	<actionbody>
  1.2839 +		<derivekey>
  1.2840 +			<kdf>pkcs#12</kdf>
  1.2841 +			<passwd>PSWD</passwd>
  1.2842 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2843 +			<iterations>2048</iterations>
  1.2844 +			<key>9DABF586AD</key>
  1.2845 +		</derivekey>
  1.2846 +	</actionbody>
  1.2847 +</action>
  1.2848 +
  1.2849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2851 +//! @SYMREQ CIT_PREQ1054
  1.2852 +//! @SYMTestPriority medium
  1.2853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2855 +<action>
  1.2856 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2857 +	<actiontype>DeriveKey</actiontype>
  1.2858 +	<actionbody>
  1.2859 +		<derivekey>
  1.2860 +			<kdf>pkcs#12</kdf>
  1.2861 +			<passwd>password</passwd>
  1.2862 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2863 +			<iterations>2048</iterations>
  1.2864 +			<key>F734BE1BF9</key>
  1.2865 +		</derivekey>
  1.2866 +	</actionbody>
  1.2867 +</action>
  1.2868 +
  1.2869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2871 +//! @SYMREQ CIT_PREQ1054
  1.2872 +//! @SYMTestPriority medium
  1.2873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2875 +<action>
  1.2876 +	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1.2877 +	<actiontype>DeriveKey</actiontype>
  1.2878 +	<actionbody>
  1.2879 +		<derivekey>
  1.2880 +			<kdf>pkcs#12</kdf>
  1.2881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2882 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.2883 +			<iterations>2048</iterations>
  1.2884 +			<key>47C18634A0</key>
  1.2885 +		</derivekey>
  1.2886 +	</actionbody>
  1.2887 +</action>
  1.2888 +
  1.2889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2891 +//! @SYMREQ CIT_PREQ1054
  1.2892 +//! @SYMTestPriority medium
  1.2893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2895 +<action>
  1.2896 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.2897 +	<actiontype>DeriveKey</actiontype>
  1.2898 +	<actionbody>
  1.2899 +		<derivekey>
  1.2900 +			<kdf>pkcs#12</kdf>
  1.2901 +			<passwd>0000</passwd>
  1.2902 +			<salt>53414C54</salt>
  1.2903 +			<iterations>1</iterations>
  1.2904 +			<key>3037AFC8EACD4E2AEAB3C1E343B81DE8</key>
  1.2905 +		</derivekey>
  1.2906 +	</actionbody>
  1.2907 +</action>
  1.2908 +
  1.2909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2911 +//! @SYMREQ CIT_PREQ1054
  1.2912 +//! @SYMTestPriority medium
  1.2913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2915 +<action>
  1.2916 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.2917 +	<actiontype>DeriveKey</actiontype>
  1.2918 +	<actionbody>
  1.2919 +		<derivekey>
  1.2920 +			<kdf>pkcs#12</kdf>
  1.2921 +			<passwd>0001</passwd>
  1.2922 +			<salt>53414C54</salt>
  1.2923 +			<iterations>1</iterations>
  1.2924 +			<key>37F44080CB10A6F7E2719CC979FE0F2E</key>
  1.2925 +		</derivekey>
  1.2926 +	</actionbody>
  1.2927 +</action>
  1.2928 +
  1.2929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2931 +//! @SYMREQ CIT_PREQ1054
  1.2932 +//! @SYMTestPriority medium
  1.2933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2935 +<action>
  1.2936 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.2937 +	<actiontype>DeriveKey</actiontype>
  1.2938 +	<actionbody>
  1.2939 +		<derivekey>
  1.2940 +			<kdf>pkcs#12</kdf>
  1.2941 +			<passwd>PSWD</passwd>
  1.2942 +			<salt>53414C54</salt>
  1.2943 +			<iterations>1</iterations>
  1.2944 +			<key>8A18939ACF4A00A900FE2351DCBAFD0C</key>
  1.2945 +		</derivekey>
  1.2946 +	</actionbody>
  1.2947 +</action>
  1.2948 +
  1.2949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2951 +//! @SYMREQ CIT_PREQ1054
  1.2952 +//! @SYMTestPriority medium
  1.2953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2955 +<action>
  1.2956 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.2957 +	<actiontype>DeriveKey</actiontype>
  1.2958 +	<actionbody>
  1.2959 +		<derivekey>
  1.2960 +			<kdf>pkcs#12</kdf>
  1.2961 +			<passwd>password</passwd>
  1.2962 +			<salt>53414C54</salt>
  1.2963 +			<iterations>1</iterations>
  1.2964 +			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0</key>
  1.2965 +		</derivekey>
  1.2966 +	</actionbody>
  1.2967 +</action>
  1.2968 +
  1.2969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2971 +//! @SYMREQ CIT_PREQ1054
  1.2972 +//! @SYMTestPriority medium
  1.2973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2975 +<action>
  1.2976 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.2977 +	<actiontype>DeriveKey</actiontype>
  1.2978 +	<actionbody>
  1.2979 +		<derivekey>
  1.2980 +			<kdf>pkcs#12</kdf>
  1.2981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.2982 +			<salt>53414C54</salt>
  1.2983 +			<iterations>1</iterations>
  1.2984 +			<key>2ED53BB2CE3C39A2F4039B734F9D94C5</key>
  1.2985 +		</derivekey>
  1.2986 +	</actionbody>
  1.2987 +</action>
  1.2988 +
  1.2989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.2990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.2991 +//! @SYMREQ CIT_PREQ1054
  1.2992 +//! @SYMTestPriority medium
  1.2993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.2994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.2995 +<action>
  1.2996 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.2997 +	<actiontype>DeriveKey</actiontype>
  1.2998 +	<actionbody>
  1.2999 +		<derivekey>
  1.3000 +			<kdf>pkcs#12</kdf>
  1.3001 +			<passwd>0000</passwd>
  1.3002 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3003 +			<iterations>1</iterations>
  1.3004 +			<key>49CABE7B67736931126499722509C03D</key>
  1.3005 +		</derivekey>
  1.3006 +	</actionbody>
  1.3007 +</action>
  1.3008 +
  1.3009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3011 +//! @SYMREQ CIT_PREQ1054
  1.3012 +//! @SYMTestPriority medium
  1.3013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3015 +<action>
  1.3016 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3017 +	<actiontype>DeriveKey</actiontype>
  1.3018 +	<actionbody>
  1.3019 +		<derivekey>
  1.3020 +			<kdf>pkcs#12</kdf>
  1.3021 +			<passwd>0001</passwd>
  1.3022 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3023 +			<iterations>1</iterations>
  1.3024 +			<key>F994B990D3554AFB778C729E9BAA0CC6</key>
  1.3025 +		</derivekey>
  1.3026 +	</actionbody>
  1.3027 +</action>
  1.3028 +
  1.3029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3031 +//! @SYMREQ CIT_PREQ1054
  1.3032 +//! @SYMTestPriority medium
  1.3033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3035 +<action>
  1.3036 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3037 +	<actiontype>DeriveKey</actiontype>
  1.3038 +	<actionbody>
  1.3039 +		<derivekey>
  1.3040 +			<kdf>pkcs#12</kdf>
  1.3041 +			<passwd>PSWD</passwd>
  1.3042 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3043 +			<iterations>1</iterations>
  1.3044 +			<key>1AFAAD7E51964CCD2760CCE134E1F2B8</key>
  1.3045 +		</derivekey>
  1.3046 +	</actionbody>
  1.3047 +</action>
  1.3048 +
  1.3049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3051 +//! @SYMREQ CIT_PREQ1054
  1.3052 +//! @SYMTestPriority medium
  1.3053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3055 +<action>
  1.3056 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3057 +	<actiontype>DeriveKey</actiontype>
  1.3058 +	<actionbody>
  1.3059 +		<derivekey>
  1.3060 +			<kdf>pkcs#12</kdf>
  1.3061 +			<passwd>password</passwd>
  1.3062 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3063 +			<iterations>1</iterations>
  1.3064 +			<key>878C91098D1F4FD0DD8CBC3A8149DF5F</key>
  1.3065 +		</derivekey>
  1.3066 +	</actionbody>
  1.3067 +</action>
  1.3068 +
  1.3069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3071 +//! @SYMREQ CIT_PREQ1054
  1.3072 +//! @SYMTestPriority medium
  1.3073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3075 +<action>
  1.3076 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3077 +	<actiontype>DeriveKey</actiontype>
  1.3078 +	<actionbody>
  1.3079 +		<derivekey>
  1.3080 +			<kdf>pkcs#12</kdf>
  1.3081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3082 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3083 +			<iterations>1</iterations>
  1.3084 +			<key>0DE3F08CAF4FF556C956527AD47C3497</key>
  1.3085 +		</derivekey>
  1.3086 +	</actionbody>
  1.3087 +</action>
  1.3088 +
  1.3089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3091 +//! @SYMREQ CIT_PREQ1054
  1.3092 +//! @SYMTestPriority medium
  1.3093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3095 +<action>
  1.3096 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3097 +	<actiontype>DeriveKey</actiontype>
  1.3098 +	<actionbody>
  1.3099 +		<derivekey>
  1.3100 +			<kdf>pkcs#12</kdf>
  1.3101 +			<passwd>0000</passwd>
  1.3102 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3103 +			<iterations>1</iterations>
  1.3104 +			<key>90253A49C069E7FF35281461A4DDBE0B</key>
  1.3105 +		</derivekey>
  1.3106 +	</actionbody>
  1.3107 +</action>
  1.3108 +
  1.3109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3111 +//! @SYMREQ CIT_PREQ1054
  1.3112 +//! @SYMTestPriority medium
  1.3113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3115 +<action>
  1.3116 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3117 +	<actiontype>DeriveKey</actiontype>
  1.3118 +	<actionbody>
  1.3119 +		<derivekey>
  1.3120 +			<kdf>pkcs#12</kdf>
  1.3121 +			<passwd>0001</passwd>
  1.3122 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3123 +			<iterations>1</iterations>
  1.3124 +			<key>40BE97AB930A7E8B6DB634C93B94E699</key>
  1.3125 +		</derivekey>
  1.3126 +	</actionbody>
  1.3127 +</action>
  1.3128 +
  1.3129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3131 +//! @SYMREQ CIT_PREQ1054
  1.3132 +//! @SYMTestPriority medium
  1.3133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3135 +<action>
  1.3136 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3137 +	<actiontype>DeriveKey</actiontype>
  1.3138 +	<actionbody>
  1.3139 +		<derivekey>
  1.3140 +			<kdf>pkcs#12</kdf>
  1.3141 +			<passwd>PSWD</passwd>
  1.3142 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3143 +			<iterations>1</iterations>
  1.3144 +			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6</key>
  1.3145 +		</derivekey>
  1.3146 +	</actionbody>
  1.3147 +</action>
  1.3148 +
  1.3149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3151 +//! @SYMREQ CIT_PREQ1054
  1.3152 +//! @SYMTestPriority medium
  1.3153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3155 +<action>
  1.3156 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3157 +	<actiontype>DeriveKey</actiontype>
  1.3158 +	<actionbody>
  1.3159 +		<derivekey>
  1.3160 +			<kdf>pkcs#12</kdf>
  1.3161 +			<passwd>password</passwd>
  1.3162 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3163 +			<iterations>1</iterations>
  1.3164 +			<key>E323D5F588414AE68EF8FCA46879C1C7</key>
  1.3165 +		</derivekey>
  1.3166 +	</actionbody>
  1.3167 +</action>
  1.3168 +
  1.3169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3171 +//! @SYMREQ CIT_PREQ1054
  1.3172 +//! @SYMTestPriority medium
  1.3173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3175 +<action>
  1.3176 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3177 +	<actiontype>DeriveKey</actiontype>
  1.3178 +	<actionbody>
  1.3179 +		<derivekey>
  1.3180 +			<kdf>pkcs#12</kdf>
  1.3181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3182 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3183 +			<iterations>1</iterations>
  1.3184 +			<key>27476572AF26E99AB85CD350DC802ABA</key>
  1.3185 +		</derivekey>
  1.3186 +	</actionbody>
  1.3187 +</action>
  1.3188 +
  1.3189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3191 +//! @SYMREQ CIT_PREQ1054
  1.3192 +//! @SYMTestPriority medium
  1.3193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3195 +<action>
  1.3196 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3197 +	<actiontype>DeriveKey</actiontype>
  1.3198 +	<actionbody>
  1.3199 +		<derivekey>
  1.3200 +			<kdf>pkcs#12</kdf>
  1.3201 +			<passwd>0000</passwd>
  1.3202 +			<salt>53414C54</salt>
  1.3203 +			<iterations>2</iterations>
  1.3204 +			<key>A1D9010A6761CB2675F1C33BB3C52158</key>
  1.3205 +		</derivekey>
  1.3206 +	</actionbody>
  1.3207 +</action>
  1.3208 +
  1.3209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3211 +//! @SYMREQ CIT_PREQ1054
  1.3212 +//! @SYMTestPriority medium
  1.3213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3215 +<action>
  1.3216 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3217 +	<actiontype>DeriveKey</actiontype>
  1.3218 +	<actionbody>
  1.3219 +		<derivekey>
  1.3220 +			<kdf>pkcs#12</kdf>
  1.3221 +			<passwd>0001</passwd>
  1.3222 +			<salt>53414C54</salt>
  1.3223 +			<iterations>2</iterations>
  1.3224 +			<key>17E4E1F15BC31052E563BFF7B5D11D15</key>
  1.3225 +		</derivekey>
  1.3226 +	</actionbody>
  1.3227 +</action>
  1.3228 +
  1.3229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3231 +//! @SYMREQ CIT_PREQ1054
  1.3232 +//! @SYMTestPriority medium
  1.3233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3235 +<action>
  1.3236 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3237 +	<actiontype>DeriveKey</actiontype>
  1.3238 +	<actionbody>
  1.3239 +		<derivekey>
  1.3240 +			<kdf>pkcs#12</kdf>
  1.3241 +			<passwd>PSWD</passwd>
  1.3242 +			<salt>53414C54</salt>
  1.3243 +			<iterations>2</iterations>
  1.3244 +			<key>D1B71808FCCA5C97E8E52CF5E23C633C</key>
  1.3245 +		</derivekey>
  1.3246 +	</actionbody>
  1.3247 +</action>
  1.3248 +
  1.3249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3251 +//! @SYMREQ CIT_PREQ1054
  1.3252 +//! @SYMTestPriority medium
  1.3253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3255 +<action>
  1.3256 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3257 +	<actiontype>DeriveKey</actiontype>
  1.3258 +	<actionbody>
  1.3259 +		<derivekey>
  1.3260 +			<kdf>pkcs#12</kdf>
  1.3261 +			<passwd>password</passwd>
  1.3262 +			<salt>53414C54</salt>
  1.3263 +			<iterations>2</iterations>
  1.3264 +			<key>EE7E4073F2E6008722BB9842540998C2</key>
  1.3265 +		</derivekey>
  1.3266 +	</actionbody>
  1.3267 +</action>
  1.3268 +
  1.3269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3271 +//! @SYMREQ CIT_PREQ1054
  1.3272 +//! @SYMTestPriority medium
  1.3273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3275 +<action>
  1.3276 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3277 +	<actiontype>DeriveKey</actiontype>
  1.3278 +	<actionbody>
  1.3279 +		<derivekey>
  1.3280 +			<kdf>pkcs#12</kdf>
  1.3281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3282 +			<salt>53414C54</salt>
  1.3283 +			<iterations>2</iterations>
  1.3284 +			<key>5BF185C726EE2182888A834066C30BA9</key>
  1.3285 +		</derivekey>
  1.3286 +	</actionbody>
  1.3287 +</action>
  1.3288 +
  1.3289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3291 +//! @SYMREQ CIT_PREQ1054
  1.3292 +//! @SYMTestPriority medium
  1.3293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3295 +<action>
  1.3296 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3297 +	<actiontype>DeriveKey</actiontype>
  1.3298 +	<actionbody>
  1.3299 +		<derivekey>
  1.3300 +			<kdf>pkcs#12</kdf>
  1.3301 +			<passwd>0000</passwd>
  1.3302 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3303 +			<iterations>2</iterations>
  1.3304 +			<key>72ADF5E0413FDBF6659A1E7D495BBE32</key>
  1.3305 +		</derivekey>
  1.3306 +	</actionbody>
  1.3307 +</action>
  1.3308 +
  1.3309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3311 +//! @SYMREQ CIT_PREQ1054
  1.3312 +//! @SYMTestPriority medium
  1.3313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3315 +<action>
  1.3316 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3317 +	<actiontype>DeriveKey</actiontype>
  1.3318 +	<actionbody>
  1.3319 +		<derivekey>
  1.3320 +			<kdf>pkcs#12</kdf>
  1.3321 +			<passwd>0001</passwd>
  1.3322 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3323 +			<iterations>2</iterations>
  1.3324 +			<key>63E6DF459C899D72577C20FFE4F27670</key>
  1.3325 +		</derivekey>
  1.3326 +	</actionbody>
  1.3327 +</action>
  1.3328 +
  1.3329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3331 +//! @SYMREQ CIT_PREQ1054
  1.3332 +//! @SYMTestPriority medium
  1.3333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3335 +<action>
  1.3336 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3337 +	<actiontype>DeriveKey</actiontype>
  1.3338 +	<actionbody>
  1.3339 +		<derivekey>
  1.3340 +			<kdf>pkcs#12</kdf>
  1.3341 +			<passwd>PSWD</passwd>
  1.3342 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3343 +			<iterations>2</iterations>
  1.3344 +			<key>C2099204ABFBB841875BD7595A89D31A</key>
  1.3345 +		</derivekey>
  1.3346 +	</actionbody>
  1.3347 +</action>
  1.3348 +
  1.3349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3351 +//! @SYMREQ CIT_PREQ1054
  1.3352 +//! @SYMTestPriority medium
  1.3353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3355 +<action>
  1.3356 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3357 +	<actiontype>DeriveKey</actiontype>
  1.3358 +	<actionbody>
  1.3359 +		<derivekey>
  1.3360 +			<kdf>pkcs#12</kdf>
  1.3361 +			<passwd>password</passwd>
  1.3362 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3363 +			<iterations>2</iterations>
  1.3364 +			<key>3204D28A32DF299B612958906C79154A</key>
  1.3365 +		</derivekey>
  1.3366 +	</actionbody>
  1.3367 +</action>
  1.3368 +
  1.3369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3371 +//! @SYMREQ CIT_PREQ1054
  1.3372 +//! @SYMTestPriority medium
  1.3373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3375 +<action>
  1.3376 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3377 +	<actiontype>DeriveKey</actiontype>
  1.3378 +	<actionbody>
  1.3379 +		<derivekey>
  1.3380 +			<kdf>pkcs#12</kdf>
  1.3381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3382 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3383 +			<iterations>2</iterations>
  1.3384 +			<key>FB845F70A40E96C536641C3F797AAE39</key>
  1.3385 +		</derivekey>
  1.3386 +	</actionbody>
  1.3387 +</action>
  1.3388 +
  1.3389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3391 +//! @SYMREQ CIT_PREQ1054
  1.3392 +//! @SYMTestPriority medium
  1.3393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3395 +<action>
  1.3396 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3397 +	<actiontype>DeriveKey</actiontype>
  1.3398 +	<actionbody>
  1.3399 +		<derivekey>
  1.3400 +			<kdf>pkcs#12</kdf>
  1.3401 +			<passwd>0000</passwd>
  1.3402 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3403 +			<iterations>2</iterations>
  1.3404 +			<key>B9230EEC1D615A6DFEF5A8793CB06783</key>
  1.3405 +		</derivekey>
  1.3406 +	</actionbody>
  1.3407 +</action>
  1.3408 +
  1.3409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3411 +//! @SYMREQ CIT_PREQ1054
  1.3412 +//! @SYMTestPriority medium
  1.3413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3415 +<action>
  1.3416 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3417 +	<actiontype>DeriveKey</actiontype>
  1.3418 +	<actionbody>
  1.3419 +		<derivekey>
  1.3420 +			<kdf>pkcs#12</kdf>
  1.3421 +			<passwd>0001</passwd>
  1.3422 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3423 +			<iterations>2</iterations>
  1.3424 +			<key>462B0F2D1B18297A3F2C5E4058A0083E</key>
  1.3425 +		</derivekey>
  1.3426 +	</actionbody>
  1.3427 +</action>
  1.3428 +
  1.3429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3431 +//! @SYMREQ CIT_PREQ1054
  1.3432 +//! @SYMTestPriority medium
  1.3433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3435 +<action>
  1.3436 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3437 +	<actiontype>DeriveKey</actiontype>
  1.3438 +	<actionbody>
  1.3439 +		<derivekey>
  1.3440 +			<kdf>pkcs#12</kdf>
  1.3441 +			<passwd>PSWD</passwd>
  1.3442 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3443 +			<iterations>2</iterations>
  1.3444 +			<key>05B66EF1BB844470CBBB46D5F4C7DB29</key>
  1.3445 +		</derivekey>
  1.3446 +	</actionbody>
  1.3447 +</action>
  1.3448 +
  1.3449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3451 +//! @SYMREQ CIT_PREQ1054
  1.3452 +//! @SYMTestPriority medium
  1.3453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3455 +<action>
  1.3456 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3457 +	<actiontype>DeriveKey</actiontype>
  1.3458 +	<actionbody>
  1.3459 +		<derivekey>
  1.3460 +			<kdf>pkcs#12</kdf>
  1.3461 +			<passwd>password</passwd>
  1.3462 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3463 +			<iterations>2</iterations>
  1.3464 +			<key>C1B7E77C96BB5EE1386E8461A58F0D0C</key>
  1.3465 +		</derivekey>
  1.3466 +	</actionbody>
  1.3467 +</action>
  1.3468 +
  1.3469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3471 +//! @SYMREQ CIT_PREQ1054
  1.3472 +//! @SYMTestPriority medium
  1.3473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3475 +<action>
  1.3476 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3477 +	<actiontype>DeriveKey</actiontype>
  1.3478 +	<actionbody>
  1.3479 +		<derivekey>
  1.3480 +			<kdf>pkcs#12</kdf>
  1.3481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3482 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3483 +			<iterations>2</iterations>
  1.3484 +			<key>3DE08CDACF489F30BBD75C0FF401EC02</key>
  1.3485 +		</derivekey>
  1.3486 +	</actionbody>
  1.3487 +</action>
  1.3488 +
  1.3489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3491 +//! @SYMREQ CIT_PREQ1054
  1.3492 +//! @SYMTestPriority medium
  1.3493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3495 +<action>
  1.3496 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3497 +	<actiontype>DeriveKey</actiontype>
  1.3498 +	<actionbody>
  1.3499 +		<derivekey>
  1.3500 +			<kdf>pkcs#12</kdf>
  1.3501 +			<passwd>0000</passwd>
  1.3502 +			<salt>53414C54</salt>
  1.3503 +			<iterations>4</iterations>
  1.3504 +			<key>D0158BFC57E643965DC161741725CE94</key>
  1.3505 +		</derivekey>
  1.3506 +	</actionbody>
  1.3507 +</action>
  1.3508 +
  1.3509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3511 +//! @SYMREQ CIT_PREQ1054
  1.3512 +//! @SYMTestPriority medium
  1.3513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3515 +<action>
  1.3516 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3517 +	<actiontype>DeriveKey</actiontype>
  1.3518 +	<actionbody>
  1.3519 +		<derivekey>
  1.3520 +			<kdf>pkcs#12</kdf>
  1.3521 +			<passwd>0001</passwd>
  1.3522 +			<salt>53414C54</salt>
  1.3523 +			<iterations>4</iterations>
  1.3524 +			<key>AEB6CD53F0D6830161100C4BFD439B34</key>
  1.3525 +		</derivekey>
  1.3526 +	</actionbody>
  1.3527 +</action>
  1.3528 +
  1.3529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3531 +//! @SYMREQ CIT_PREQ1054
  1.3532 +//! @SYMTestPriority medium
  1.3533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3535 +<action>
  1.3536 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3537 +	<actiontype>DeriveKey</actiontype>
  1.3538 +	<actionbody>
  1.3539 +		<derivekey>
  1.3540 +			<kdf>pkcs#12</kdf>
  1.3541 +			<passwd>PSWD</passwd>
  1.3542 +			<salt>53414C54</salt>
  1.3543 +			<iterations>4</iterations>
  1.3544 +			<key>80010C12B66CC739F4ACF8BB15419770</key>
  1.3545 +		</derivekey>
  1.3546 +	</actionbody>
  1.3547 +</action>
  1.3548 +
  1.3549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3551 +//! @SYMREQ CIT_PREQ1054
  1.3552 +//! @SYMTestPriority medium
  1.3553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3555 +<action>
  1.3556 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3557 +	<actiontype>DeriveKey</actiontype>
  1.3558 +	<actionbody>
  1.3559 +		<derivekey>
  1.3560 +			<kdf>pkcs#12</kdf>
  1.3561 +			<passwd>password</passwd>
  1.3562 +			<salt>53414C54</salt>
  1.3563 +			<iterations>4</iterations>
  1.3564 +			<key>497DE34C4C64E56AD53E5F8F6E16D1A3</key>
  1.3565 +		</derivekey>
  1.3566 +	</actionbody>
  1.3567 +</action>
  1.3568 +
  1.3569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3571 +//! @SYMREQ CIT_PREQ1054
  1.3572 +//! @SYMTestPriority medium
  1.3573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3575 +<action>
  1.3576 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3577 +	<actiontype>DeriveKey</actiontype>
  1.3578 +	<actionbody>
  1.3579 +		<derivekey>
  1.3580 +			<kdf>pkcs#12</kdf>
  1.3581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3582 +			<salt>53414C54</salt>
  1.3583 +			<iterations>4</iterations>
  1.3584 +			<key>146C6A5B58AF8561220DE4C13A133248</key>
  1.3585 +		</derivekey>
  1.3586 +	</actionbody>
  1.3587 +</action>
  1.3588 +
  1.3589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3591 +//! @SYMREQ CIT_PREQ1054
  1.3592 +//! @SYMTestPriority medium
  1.3593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3595 +<action>
  1.3596 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3597 +	<actiontype>DeriveKey</actiontype>
  1.3598 +	<actionbody>
  1.3599 +		<derivekey>
  1.3600 +			<kdf>pkcs#12</kdf>
  1.3601 +			<passwd>0000</passwd>
  1.3602 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3603 +			<iterations>4</iterations>
  1.3604 +			<key>E89772E7A52D6D8C65AAE01D0380ED59</key>
  1.3605 +		</derivekey>
  1.3606 +	</actionbody>
  1.3607 +</action>
  1.3608 +
  1.3609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3611 +//! @SYMREQ CIT_PREQ1054
  1.3612 +//! @SYMTestPriority medium
  1.3613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3615 +<action>
  1.3616 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3617 +	<actiontype>DeriveKey</actiontype>
  1.3618 +	<actionbody>
  1.3619 +		<derivekey>
  1.3620 +			<kdf>pkcs#12</kdf>
  1.3621 +			<passwd>0001</passwd>
  1.3622 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3623 +			<iterations>4</iterations>
  1.3624 +			<key>23930713772E26DBBABB53F3C5C77501</key>
  1.3625 +		</derivekey>
  1.3626 +	</actionbody>
  1.3627 +</action>
  1.3628 +
  1.3629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3631 +//! @SYMREQ CIT_PREQ1054
  1.3632 +//! @SYMTestPriority medium
  1.3633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3635 +<action>
  1.3636 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3637 +	<actiontype>DeriveKey</actiontype>
  1.3638 +	<actionbody>
  1.3639 +		<derivekey>
  1.3640 +			<kdf>pkcs#12</kdf>
  1.3641 +			<passwd>PSWD</passwd>
  1.3642 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3643 +			<iterations>4</iterations>
  1.3644 +			<key>DF2D961FE3929BBA41493EB5421FEF7C</key>
  1.3645 +		</derivekey>
  1.3646 +	</actionbody>
  1.3647 +</action>
  1.3648 +
  1.3649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3651 +//! @SYMREQ CIT_PREQ1054
  1.3652 +//! @SYMTestPriority medium
  1.3653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3655 +<action>
  1.3656 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3657 +	<actiontype>DeriveKey</actiontype>
  1.3658 +	<actionbody>
  1.3659 +		<derivekey>
  1.3660 +			<kdf>pkcs#12</kdf>
  1.3661 +			<passwd>password</passwd>
  1.3662 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3663 +			<iterations>4</iterations>
  1.3664 +			<key>363619530B170B7BAE1C046B29351C23</key>
  1.3665 +		</derivekey>
  1.3666 +	</actionbody>
  1.3667 +</action>
  1.3668 +
  1.3669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3671 +//! @SYMREQ CIT_PREQ1054
  1.3672 +//! @SYMTestPriority medium
  1.3673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3675 +<action>
  1.3676 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3677 +	<actiontype>DeriveKey</actiontype>
  1.3678 +	<actionbody>
  1.3679 +		<derivekey>
  1.3680 +			<kdf>pkcs#12</kdf>
  1.3681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3682 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3683 +			<iterations>4</iterations>
  1.3684 +			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF</key>
  1.3685 +		</derivekey>
  1.3686 +	</actionbody>
  1.3687 +</action>
  1.3688 +
  1.3689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3691 +//! @SYMREQ CIT_PREQ1054
  1.3692 +//! @SYMTestPriority medium
  1.3693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3695 +<action>
  1.3696 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3697 +	<actiontype>DeriveKey</actiontype>
  1.3698 +	<actionbody>
  1.3699 +		<derivekey>
  1.3700 +			<kdf>pkcs#12</kdf>
  1.3701 +			<passwd>0000</passwd>
  1.3702 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3703 +			<iterations>4</iterations>
  1.3704 +			<key>EF50923D65A0610BDC51AD5DB1B4F4F9</key>
  1.3705 +		</derivekey>
  1.3706 +	</actionbody>
  1.3707 +</action>
  1.3708 +
  1.3709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3711 +//! @SYMREQ CIT_PREQ1054
  1.3712 +//! @SYMTestPriority medium
  1.3713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3715 +<action>
  1.3716 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3717 +	<actiontype>DeriveKey</actiontype>
  1.3718 +	<actionbody>
  1.3719 +		<derivekey>
  1.3720 +			<kdf>pkcs#12</kdf>
  1.3721 +			<passwd>0001</passwd>
  1.3722 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3723 +			<iterations>4</iterations>
  1.3724 +			<key>9A618595C714486B7D7E3120005C8BC1</key>
  1.3725 +		</derivekey>
  1.3726 +	</actionbody>
  1.3727 +</action>
  1.3728 +
  1.3729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3731 +//! @SYMREQ CIT_PREQ1054
  1.3732 +//! @SYMTestPriority medium
  1.3733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3735 +<action>
  1.3736 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3737 +	<actiontype>DeriveKey</actiontype>
  1.3738 +	<actionbody>
  1.3739 +		<derivekey>
  1.3740 +			<kdf>pkcs#12</kdf>
  1.3741 +			<passwd>PSWD</passwd>
  1.3742 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3743 +			<iterations>4</iterations>
  1.3744 +			<key>B3B33AA8A6777605E3029C0F8DC45290</key>
  1.3745 +		</derivekey>
  1.3746 +	</actionbody>
  1.3747 +</action>
  1.3748 +
  1.3749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3751 +//! @SYMREQ CIT_PREQ1054
  1.3752 +//! @SYMTestPriority medium
  1.3753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3755 +<action>
  1.3756 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3757 +	<actiontype>DeriveKey</actiontype>
  1.3758 +	<actionbody>
  1.3759 +		<derivekey>
  1.3760 +			<kdf>pkcs#12</kdf>
  1.3761 +			<passwd>password</passwd>
  1.3762 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3763 +			<iterations>4</iterations>
  1.3764 +			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD</key>
  1.3765 +		</derivekey>
  1.3766 +	</actionbody>
  1.3767 +</action>
  1.3768 +
  1.3769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3771 +//! @SYMREQ CIT_PREQ1054
  1.3772 +//! @SYMTestPriority medium
  1.3773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3775 +<action>
  1.3776 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3777 +	<actiontype>DeriveKey</actiontype>
  1.3778 +	<actionbody>
  1.3779 +		<derivekey>
  1.3780 +			<kdf>pkcs#12</kdf>
  1.3781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3782 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.3783 +			<iterations>4</iterations>
  1.3784 +			<key>91DF3661364A0DAD28180A41ADCB5567</key>
  1.3785 +		</derivekey>
  1.3786 +	</actionbody>
  1.3787 +</action>
  1.3788 +
  1.3789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3791 +//! @SYMREQ CIT_PREQ1054
  1.3792 +//! @SYMTestPriority medium
  1.3793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3795 +<action>
  1.3796 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3797 +	<actiontype>DeriveKey</actiontype>
  1.3798 +	<actionbody>
  1.3799 +		<derivekey>
  1.3800 +			<kdf>pkcs#12</kdf>
  1.3801 +			<passwd>0000</passwd>
  1.3802 +			<salt>53414C54</salt>
  1.3803 +			<iterations>8</iterations>
  1.3804 +			<key>9A08D3C4F584ECD1E538B7A46DCFDEA1</key>
  1.3805 +		</derivekey>
  1.3806 +	</actionbody>
  1.3807 +</action>
  1.3808 +
  1.3809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3811 +//! @SYMREQ CIT_PREQ1054
  1.3812 +//! @SYMTestPriority medium
  1.3813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3815 +<action>
  1.3816 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3817 +	<actiontype>DeriveKey</actiontype>
  1.3818 +	<actionbody>
  1.3819 +		<derivekey>
  1.3820 +			<kdf>pkcs#12</kdf>
  1.3821 +			<passwd>0001</passwd>
  1.3822 +			<salt>53414C54</salt>
  1.3823 +			<iterations>8</iterations>
  1.3824 +			<key>33002FA0B6A5A27991A062FF6173E357</key>
  1.3825 +		</derivekey>
  1.3826 +	</actionbody>
  1.3827 +</action>
  1.3828 +
  1.3829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3831 +//! @SYMREQ CIT_PREQ1054
  1.3832 +//! @SYMTestPriority medium
  1.3833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3835 +<action>
  1.3836 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3837 +	<actiontype>DeriveKey</actiontype>
  1.3838 +	<actionbody>
  1.3839 +		<derivekey>
  1.3840 +			<kdf>pkcs#12</kdf>
  1.3841 +			<passwd>PSWD</passwd>
  1.3842 +			<salt>53414C54</salt>
  1.3843 +			<iterations>8</iterations>
  1.3844 +			<key>22001FA26964DCD0BE3C58AB6E43557C</key>
  1.3845 +		</derivekey>
  1.3846 +	</actionbody>
  1.3847 +</action>
  1.3848 +
  1.3849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3851 +//! @SYMREQ CIT_PREQ1054
  1.3852 +//! @SYMTestPriority medium
  1.3853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3855 +<action>
  1.3856 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3857 +	<actiontype>DeriveKey</actiontype>
  1.3858 +	<actionbody>
  1.3859 +		<derivekey>
  1.3860 +			<kdf>pkcs#12</kdf>
  1.3861 +			<passwd>password</passwd>
  1.3862 +			<salt>53414C54</salt>
  1.3863 +			<iterations>8</iterations>
  1.3864 +			<key>B0935F11227F5A473073DCD188886687</key>
  1.3865 +		</derivekey>
  1.3866 +	</actionbody>
  1.3867 +</action>
  1.3868 +
  1.3869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3871 +//! @SYMREQ CIT_PREQ1054
  1.3872 +//! @SYMTestPriority medium
  1.3873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3875 +<action>
  1.3876 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.3877 +	<actiontype>DeriveKey</actiontype>
  1.3878 +	<actionbody>
  1.3879 +		<derivekey>
  1.3880 +			<kdf>pkcs#12</kdf>
  1.3881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3882 +			<salt>53414C54</salt>
  1.3883 +			<iterations>8</iterations>
  1.3884 +			<key>6602B1B4BBB670208041ECD8E1634845</key>
  1.3885 +		</derivekey>
  1.3886 +	</actionbody>
  1.3887 +</action>
  1.3888 +
  1.3889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3891 +//! @SYMREQ CIT_PREQ1054
  1.3892 +//! @SYMTestPriority medium
  1.3893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3895 +<action>
  1.3896 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3897 +	<actiontype>DeriveKey</actiontype>
  1.3898 +	<actionbody>
  1.3899 +		<derivekey>
  1.3900 +			<kdf>pkcs#12</kdf>
  1.3901 +			<passwd>0000</passwd>
  1.3902 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3903 +			<iterations>8</iterations>
  1.3904 +			<key>3A478368DD5DC61BAA09325959A3F46C</key>
  1.3905 +		</derivekey>
  1.3906 +	</actionbody>
  1.3907 +</action>
  1.3908 +
  1.3909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3911 +//! @SYMREQ CIT_PREQ1054
  1.3912 +//! @SYMTestPriority medium
  1.3913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3915 +<action>
  1.3916 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3917 +	<actiontype>DeriveKey</actiontype>
  1.3918 +	<actionbody>
  1.3919 +		<derivekey>
  1.3920 +			<kdf>pkcs#12</kdf>
  1.3921 +			<passwd>0001</passwd>
  1.3922 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3923 +			<iterations>8</iterations>
  1.3924 +			<key>6473EB1244E055149E0858C49FAE7B8D</key>
  1.3925 +		</derivekey>
  1.3926 +	</actionbody>
  1.3927 +</action>
  1.3928 +
  1.3929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3931 +//! @SYMREQ CIT_PREQ1054
  1.3932 +//! @SYMTestPriority medium
  1.3933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3935 +<action>
  1.3936 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3937 +	<actiontype>DeriveKey</actiontype>
  1.3938 +	<actionbody>
  1.3939 +		<derivekey>
  1.3940 +			<kdf>pkcs#12</kdf>
  1.3941 +			<passwd>PSWD</passwd>
  1.3942 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3943 +			<iterations>8</iterations>
  1.3944 +			<key>AA762B8736D4C37BAD263103CA283E09</key>
  1.3945 +		</derivekey>
  1.3946 +	</actionbody>
  1.3947 +</action>
  1.3948 +
  1.3949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3951 +//! @SYMREQ CIT_PREQ1054
  1.3952 +//! @SYMTestPriority medium
  1.3953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3955 +<action>
  1.3956 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3957 +	<actiontype>DeriveKey</actiontype>
  1.3958 +	<actionbody>
  1.3959 +		<derivekey>
  1.3960 +			<kdf>pkcs#12</kdf>
  1.3961 +			<passwd>password</passwd>
  1.3962 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3963 +			<iterations>8</iterations>
  1.3964 +			<key>F00C5240B03C9A2324BD5FE0AEEE1B62</key>
  1.3965 +		</derivekey>
  1.3966 +	</actionbody>
  1.3967 +</action>
  1.3968 +
  1.3969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3971 +//! @SYMREQ CIT_PREQ1054
  1.3972 +//! @SYMTestPriority medium
  1.3973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3975 +<action>
  1.3976 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.3977 +	<actiontype>DeriveKey</actiontype>
  1.3978 +	<actionbody>
  1.3979 +		<derivekey>
  1.3980 +			<kdf>pkcs#12</kdf>
  1.3981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.3982 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.3983 +			<iterations>8</iterations>
  1.3984 +			<key>935593CA370BB6988F2F41D2F4ABF56E</key>
  1.3985 +		</derivekey>
  1.3986 +	</actionbody>
  1.3987 +</action>
  1.3988 +
  1.3989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.3990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.3991 +//! @SYMREQ CIT_PREQ1054
  1.3992 +//! @SYMTestPriority medium
  1.3993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.3994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.3995 +<action>
  1.3996 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.3997 +	<actiontype>DeriveKey</actiontype>
  1.3998 +	<actionbody>
  1.3999 +		<derivekey>
  1.4000 +			<kdf>pkcs#12</kdf>
  1.4001 +			<passwd>0000</passwd>
  1.4002 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4003 +			<iterations>8</iterations>
  1.4004 +			<key>FCE1F429AEB3B9818D96B88DD25CDED9</key>
  1.4005 +		</derivekey>
  1.4006 +	</actionbody>
  1.4007 +</action>
  1.4008 +
  1.4009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4011 +//! @SYMREQ CIT_PREQ1054
  1.4012 +//! @SYMTestPriority medium
  1.4013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4015 +<action>
  1.4016 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4017 +	<actiontype>DeriveKey</actiontype>
  1.4018 +	<actionbody>
  1.4019 +		<derivekey>
  1.4020 +			<kdf>pkcs#12</kdf>
  1.4021 +			<passwd>0001</passwd>
  1.4022 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4023 +			<iterations>8</iterations>
  1.4024 +			<key>82B4A13659033EA4025DB51A6CB573F9</key>
  1.4025 +		</derivekey>
  1.4026 +	</actionbody>
  1.4027 +</action>
  1.4028 +
  1.4029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4031 +//! @SYMREQ CIT_PREQ1054
  1.4032 +//! @SYMTestPriority medium
  1.4033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4035 +<action>
  1.4036 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4037 +	<actiontype>DeriveKey</actiontype>
  1.4038 +	<actionbody>
  1.4039 +		<derivekey>
  1.4040 +			<kdf>pkcs#12</kdf>
  1.4041 +			<passwd>PSWD</passwd>
  1.4042 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4043 +			<iterations>8</iterations>
  1.4044 +			<key>45FE091D4DD2D50FA7D3340B1DB838F2</key>
  1.4045 +		</derivekey>
  1.4046 +	</actionbody>
  1.4047 +</action>
  1.4048 +
  1.4049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4051 +//! @SYMREQ CIT_PREQ1054
  1.4052 +//! @SYMTestPriority medium
  1.4053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4055 +<action>
  1.4056 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4057 +	<actiontype>DeriveKey</actiontype>
  1.4058 +	<actionbody>
  1.4059 +		<derivekey>
  1.4060 +			<kdf>pkcs#12</kdf>
  1.4061 +			<passwd>password</passwd>
  1.4062 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4063 +			<iterations>8</iterations>
  1.4064 +			<key>5670457314E405B0ED1583FC4B82FEAD</key>
  1.4065 +		</derivekey>
  1.4066 +	</actionbody>
  1.4067 +</action>
  1.4068 +
  1.4069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4071 +//! @SYMREQ CIT_PREQ1054
  1.4072 +//! @SYMTestPriority medium
  1.4073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4075 +<action>
  1.4076 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4077 +	<actiontype>DeriveKey</actiontype>
  1.4078 +	<actionbody>
  1.4079 +		<derivekey>
  1.4080 +			<kdf>pkcs#12</kdf>
  1.4081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4082 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4083 +			<iterations>8</iterations>
  1.4084 +			<key>1C4CAE25146D74F3762B5C3FD3A91752</key>
  1.4085 +		</derivekey>
  1.4086 +	</actionbody>
  1.4087 +</action>
  1.4088 +
  1.4089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4091 +//! @SYMREQ CIT_PREQ1054
  1.4092 +//! @SYMTestPriority medium
  1.4093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4095 +<action>
  1.4096 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4097 +	<actiontype>DeriveKey</actiontype>
  1.4098 +	<actionbody>
  1.4099 +		<derivekey>
  1.4100 +			<kdf>pkcs#12</kdf>
  1.4101 +			<passwd>0000</passwd>
  1.4102 +			<salt>53414C54</salt>
  1.4103 +			<iterations>128</iterations>
  1.4104 +			<key>8B4B3CBFB00466F63B30FEAD111E163D</key>
  1.4105 +		</derivekey>
  1.4106 +	</actionbody>
  1.4107 +</action>
  1.4108 +
  1.4109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4111 +//! @SYMREQ CIT_PREQ1054
  1.4112 +//! @SYMTestPriority medium
  1.4113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4115 +<action>
  1.4116 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4117 +	<actiontype>DeriveKey</actiontype>
  1.4118 +	<actionbody>
  1.4119 +		<derivekey>
  1.4120 +			<kdf>pkcs#12</kdf>
  1.4121 +			<passwd>0001</passwd>
  1.4122 +			<salt>53414C54</salt>
  1.4123 +			<iterations>128</iterations>
  1.4124 +			<key>C89C3A2C9C06626EB831F4BB5262809B</key>
  1.4125 +		</derivekey>
  1.4126 +	</actionbody>
  1.4127 +</action>
  1.4128 +
  1.4129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4131 +//! @SYMREQ CIT_PREQ1054
  1.4132 +//! @SYMTestPriority medium
  1.4133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4135 +<action>
  1.4136 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4137 +	<actiontype>DeriveKey</actiontype>
  1.4138 +	<actionbody>
  1.4139 +		<derivekey>
  1.4140 +			<kdf>pkcs#12</kdf>
  1.4141 +			<passwd>PSWD</passwd>
  1.4142 +			<salt>53414C54</salt>
  1.4143 +			<iterations>128</iterations>
  1.4144 +			<key>8109F97073FF3D286B21095E7AFBBAFA</key>
  1.4145 +		</derivekey>
  1.4146 +	</actionbody>
  1.4147 +</action>
  1.4148 +
  1.4149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4151 +//! @SYMREQ CIT_PREQ1054
  1.4152 +//! @SYMTestPriority medium
  1.4153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4155 +<action>
  1.4156 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4157 +	<actiontype>DeriveKey</actiontype>
  1.4158 +	<actionbody>
  1.4159 +		<derivekey>
  1.4160 +			<kdf>pkcs#12</kdf>
  1.4161 +			<passwd>password</passwd>
  1.4162 +			<salt>53414C54</salt>
  1.4163 +			<iterations>128</iterations>
  1.4164 +			<key>55E985CC1581F3D0052F53DB469F6DC9</key>
  1.4165 +		</derivekey>
  1.4166 +	</actionbody>
  1.4167 +</action>
  1.4168 +
  1.4169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4171 +//! @SYMREQ CIT_PREQ1054
  1.4172 +//! @SYMTestPriority medium
  1.4173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4175 +<action>
  1.4176 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4177 +	<actiontype>DeriveKey</actiontype>
  1.4178 +	<actionbody>
  1.4179 +		<derivekey>
  1.4180 +			<kdf>pkcs#12</kdf>
  1.4181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4182 +			<salt>53414C54</salt>
  1.4183 +			<iterations>128</iterations>
  1.4184 +			<key>2802AA97D4C79B1813AB23F2DD710722</key>
  1.4185 +		</derivekey>
  1.4186 +	</actionbody>
  1.4187 +</action>
  1.4188 +
  1.4189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4191 +//! @SYMREQ CIT_PREQ1054
  1.4192 +//! @SYMTestPriority medium
  1.4193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4195 +<action>
  1.4196 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4197 +	<actiontype>DeriveKey</actiontype>
  1.4198 +	<actionbody>
  1.4199 +		<derivekey>
  1.4200 +			<kdf>pkcs#12</kdf>
  1.4201 +			<passwd>0000</passwd>
  1.4202 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4203 +			<iterations>128</iterations>
  1.4204 +			<key>881509A34D80B5AB5CEC65B859DF2D99</key>
  1.4205 +		</derivekey>
  1.4206 +	</actionbody>
  1.4207 +</action>
  1.4208 +
  1.4209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4211 +//! @SYMREQ CIT_PREQ1054
  1.4212 +//! @SYMTestPriority medium
  1.4213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4215 +<action>
  1.4216 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4217 +	<actiontype>DeriveKey</actiontype>
  1.4218 +	<actionbody>
  1.4219 +		<derivekey>
  1.4220 +			<kdf>pkcs#12</kdf>
  1.4221 +			<passwd>0001</passwd>
  1.4222 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4223 +			<iterations>128</iterations>
  1.4224 +			<key>B2918BC593DEC4559C279CFA050CB0F9</key>
  1.4225 +		</derivekey>
  1.4226 +	</actionbody>
  1.4227 +</action>
  1.4228 +
  1.4229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4231 +//! @SYMREQ CIT_PREQ1054
  1.4232 +//! @SYMTestPriority medium
  1.4233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4235 +<action>
  1.4236 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4237 +	<actiontype>DeriveKey</actiontype>
  1.4238 +	<actionbody>
  1.4239 +		<derivekey>
  1.4240 +			<kdf>pkcs#12</kdf>
  1.4241 +			<passwd>PSWD</passwd>
  1.4242 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4243 +			<iterations>128</iterations>
  1.4244 +			<key>0FE0529B45AFC9BB66323C2182DE414A</key>
  1.4245 +		</derivekey>
  1.4246 +	</actionbody>
  1.4247 +</action>
  1.4248 +
  1.4249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4251 +//! @SYMREQ CIT_PREQ1054
  1.4252 +//! @SYMTestPriority medium
  1.4253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4255 +<action>
  1.4256 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4257 +	<actiontype>DeriveKey</actiontype>
  1.4258 +	<actionbody>
  1.4259 +		<derivekey>
  1.4260 +			<kdf>pkcs#12</kdf>
  1.4261 +			<passwd>password</passwd>
  1.4262 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4263 +			<iterations>128</iterations>
  1.4264 +			<key>1FF923C4B1E1007EF168E4185280F818</key>
  1.4265 +		</derivekey>
  1.4266 +	</actionbody>
  1.4267 +</action>
  1.4268 +
  1.4269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4271 +//! @SYMREQ CIT_PREQ1054
  1.4272 +//! @SYMTestPriority medium
  1.4273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4275 +<action>
  1.4276 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4277 +	<actiontype>DeriveKey</actiontype>
  1.4278 +	<actionbody>
  1.4279 +		<derivekey>
  1.4280 +			<kdf>pkcs#12</kdf>
  1.4281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4282 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4283 +			<iterations>128</iterations>
  1.4284 +			<key>05D1E56D04BC435A60BDE06C5AFAC9E3</key>
  1.4285 +		</derivekey>
  1.4286 +	</actionbody>
  1.4287 +</action>
  1.4288 +
  1.4289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4291 +//! @SYMREQ CIT_PREQ1054
  1.4292 +//! @SYMTestPriority medium
  1.4293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4295 +<action>
  1.4296 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4297 +	<actiontype>DeriveKey</actiontype>
  1.4298 +	<actionbody>
  1.4299 +		<derivekey>
  1.4300 +			<kdf>pkcs#12</kdf>
  1.4301 +			<passwd>0000</passwd>
  1.4302 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4303 +			<iterations>128</iterations>
  1.4304 +			<key>99FE149183022F9EB2EB815BCC9504E5</key>
  1.4305 +		</derivekey>
  1.4306 +	</actionbody>
  1.4307 +</action>
  1.4308 +
  1.4309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4311 +//! @SYMREQ CIT_PREQ1054
  1.4312 +//! @SYMTestPriority medium
  1.4313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4315 +<action>
  1.4316 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4317 +	<actiontype>DeriveKey</actiontype>
  1.4318 +	<actionbody>
  1.4319 +		<derivekey>
  1.4320 +			<kdf>pkcs#12</kdf>
  1.4321 +			<passwd>0001</passwd>
  1.4322 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4323 +			<iterations>128</iterations>
  1.4324 +			<key>79E29F3FCB3777460EC0F43D3D7048A7</key>
  1.4325 +		</derivekey>
  1.4326 +	</actionbody>
  1.4327 +</action>
  1.4328 +
  1.4329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4331 +//! @SYMREQ CIT_PREQ1054
  1.4332 +//! @SYMTestPriority medium
  1.4333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4335 +<action>
  1.4336 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4337 +	<actiontype>DeriveKey</actiontype>
  1.4338 +	<actionbody>
  1.4339 +		<derivekey>
  1.4340 +			<kdf>pkcs#12</kdf>
  1.4341 +			<passwd>PSWD</passwd>
  1.4342 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4343 +			<iterations>128</iterations>
  1.4344 +			<key>22A70A865774E55CF08A704356112522</key>
  1.4345 +		</derivekey>
  1.4346 +	</actionbody>
  1.4347 +</action>
  1.4348 +
  1.4349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4351 +//! @SYMREQ CIT_PREQ1054
  1.4352 +//! @SYMTestPriority medium
  1.4353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4355 +<action>
  1.4356 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4357 +	<actiontype>DeriveKey</actiontype>
  1.4358 +	<actionbody>
  1.4359 +		<derivekey>
  1.4360 +			<kdf>pkcs#12</kdf>
  1.4361 +			<passwd>password</passwd>
  1.4362 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4363 +			<iterations>128</iterations>
  1.4364 +			<key>9CBA922190F1659F6AA3B2B98347EEC2</key>
  1.4365 +		</derivekey>
  1.4366 +	</actionbody>
  1.4367 +</action>
  1.4368 +
  1.4369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4371 +//! @SYMREQ CIT_PREQ1054
  1.4372 +//! @SYMTestPriority medium
  1.4373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4375 +<action>
  1.4376 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4377 +	<actiontype>DeriveKey</actiontype>
  1.4378 +	<actionbody>
  1.4379 +		<derivekey>
  1.4380 +			<kdf>pkcs#12</kdf>
  1.4381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4382 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4383 +			<iterations>128</iterations>
  1.4384 +			<key>A037A8B1C20DC883FAABF82D8A591B9E</key>
  1.4385 +		</derivekey>
  1.4386 +	</actionbody>
  1.4387 +</action>
  1.4388 +
  1.4389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4391 +//! @SYMREQ CIT_PREQ1054
  1.4392 +//! @SYMTestPriority medium
  1.4393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4395 +<action>
  1.4396 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4397 +	<actiontype>DeriveKey</actiontype>
  1.4398 +	<actionbody>
  1.4399 +		<derivekey>
  1.4400 +			<kdf>pkcs#12</kdf>
  1.4401 +			<passwd>0000</passwd>
  1.4402 +			<salt>53414C54</salt>
  1.4403 +			<iterations>1024</iterations>
  1.4404 +			<key>82824BE51C81A5FF4C4268E256F6621B</key>
  1.4405 +		</derivekey>
  1.4406 +	</actionbody>
  1.4407 +</action>
  1.4408 +
  1.4409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4411 +//! @SYMREQ CIT_PREQ1054
  1.4412 +//! @SYMTestPriority medium
  1.4413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4415 +<action>
  1.4416 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4417 +	<actiontype>DeriveKey</actiontype>
  1.4418 +	<actionbody>
  1.4419 +		<derivekey>
  1.4420 +			<kdf>pkcs#12</kdf>
  1.4421 +			<passwd>0001</passwd>
  1.4422 +			<salt>53414C54</salt>
  1.4423 +			<iterations>1024</iterations>
  1.4424 +			<key>E166049AC4E765E513AFA8A35DDBE756</key>
  1.4425 +		</derivekey>
  1.4426 +	</actionbody>
  1.4427 +</action>
  1.4428 +
  1.4429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4431 +//! @SYMREQ CIT_PREQ1054
  1.4432 +//! @SYMTestPriority medium
  1.4433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4435 +<action>
  1.4436 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4437 +	<actiontype>DeriveKey</actiontype>
  1.4438 +	<actionbody>
  1.4439 +		<derivekey>
  1.4440 +			<kdf>pkcs#12</kdf>
  1.4441 +			<passwd>PSWD</passwd>
  1.4442 +			<salt>53414C54</salt>
  1.4443 +			<iterations>1024</iterations>
  1.4444 +			<key>90E975CC54F8BDA5A6CED39088716B27</key>
  1.4445 +		</derivekey>
  1.4446 +	</actionbody>
  1.4447 +</action>
  1.4448 +
  1.4449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4451 +//! @SYMREQ CIT_PREQ1054
  1.4452 +//! @SYMTestPriority medium
  1.4453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4455 +<action>
  1.4456 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4457 +	<actiontype>DeriveKey</actiontype>
  1.4458 +	<actionbody>
  1.4459 +		<derivekey>
  1.4460 +			<kdf>pkcs#12</kdf>
  1.4461 +			<passwd>password</passwd>
  1.4462 +			<salt>53414C54</salt>
  1.4463 +			<iterations>1024</iterations>
  1.4464 +			<key>1FFD40D7BBA891A7E6C4DED39FB0740B</key>
  1.4465 +		</derivekey>
  1.4466 +	</actionbody>
  1.4467 +</action>
  1.4468 +
  1.4469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4471 +//! @SYMREQ CIT_PREQ1054
  1.4472 +//! @SYMTestPriority medium
  1.4473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4475 +<action>
  1.4476 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4477 +	<actiontype>DeriveKey</actiontype>
  1.4478 +	<actionbody>
  1.4479 +		<derivekey>
  1.4480 +			<kdf>pkcs#12</kdf>
  1.4481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4482 +			<salt>53414C54</salt>
  1.4483 +			<iterations>1024</iterations>
  1.4484 +			<key>406C92305ACD663AB0B9EB66DED79295</key>
  1.4485 +		</derivekey>
  1.4486 +	</actionbody>
  1.4487 +</action>
  1.4488 +
  1.4489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4491 +//! @SYMREQ CIT_PREQ1054
  1.4492 +//! @SYMTestPriority medium
  1.4493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4495 +<action>
  1.4496 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4497 +	<actiontype>DeriveKey</actiontype>
  1.4498 +	<actionbody>
  1.4499 +		<derivekey>
  1.4500 +			<kdf>pkcs#12</kdf>
  1.4501 +			<passwd>0000</passwd>
  1.4502 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4503 +			<iterations>1024</iterations>
  1.4504 +			<key>E82BD75AA9467E0B8D92362A56CB5D73</key>
  1.4505 +		</derivekey>
  1.4506 +	</actionbody>
  1.4507 +</action>
  1.4508 +
  1.4509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4511 +//! @SYMREQ CIT_PREQ1054
  1.4512 +//! @SYMTestPriority medium
  1.4513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4515 +<action>
  1.4516 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4517 +	<actiontype>DeriveKey</actiontype>
  1.4518 +	<actionbody>
  1.4519 +		<derivekey>
  1.4520 +			<kdf>pkcs#12</kdf>
  1.4521 +			<passwd>0001</passwd>
  1.4522 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4523 +			<iterations>1024</iterations>
  1.4524 +			<key>0182E41FCA166CEAED10972BDF5F57A8</key>
  1.4525 +		</derivekey>
  1.4526 +	</actionbody>
  1.4527 +</action>
  1.4528 +
  1.4529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4531 +//! @SYMREQ CIT_PREQ1054
  1.4532 +//! @SYMTestPriority medium
  1.4533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4535 +<action>
  1.4536 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4537 +	<actiontype>DeriveKey</actiontype>
  1.4538 +	<actionbody>
  1.4539 +		<derivekey>
  1.4540 +			<kdf>pkcs#12</kdf>
  1.4541 +			<passwd>PSWD</passwd>
  1.4542 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4543 +			<iterations>1024</iterations>
  1.4544 +			<key>101FB775982CA15E37A065F7CDC5593D</key>
  1.4545 +		</derivekey>
  1.4546 +	</actionbody>
  1.4547 +</action>
  1.4548 +
  1.4549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4551 +//! @SYMREQ CIT_PREQ1054
  1.4552 +//! @SYMTestPriority medium
  1.4553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4555 +<action>
  1.4556 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4557 +	<actiontype>DeriveKey</actiontype>
  1.4558 +	<actionbody>
  1.4559 +		<derivekey>
  1.4560 +			<kdf>pkcs#12</kdf>
  1.4561 +			<passwd>password</passwd>
  1.4562 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4563 +			<iterations>1024</iterations>
  1.4564 +			<key>D7499C6A1218C419A1F81AA5E3F41E88</key>
  1.4565 +		</derivekey>
  1.4566 +	</actionbody>
  1.4567 +</action>
  1.4568 +
  1.4569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4571 +//! @SYMREQ CIT_PREQ1054
  1.4572 +//! @SYMTestPriority medium
  1.4573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4575 +<action>
  1.4576 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4577 +	<actiontype>DeriveKey</actiontype>
  1.4578 +	<actionbody>
  1.4579 +		<derivekey>
  1.4580 +			<kdf>pkcs#12</kdf>
  1.4581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4582 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4583 +			<iterations>1024</iterations>
  1.4584 +			<key>2C6222B8E2E97F63FFE9E2FC32D673FA</key>
  1.4585 +		</derivekey>
  1.4586 +	</actionbody>
  1.4587 +</action>
  1.4588 +
  1.4589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4591 +//! @SYMREQ CIT_PREQ1054
  1.4592 +//! @SYMTestPriority medium
  1.4593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4595 +<action>
  1.4596 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4597 +	<actiontype>DeriveKey</actiontype>
  1.4598 +	<actionbody>
  1.4599 +		<derivekey>
  1.4600 +			<kdf>pkcs#12</kdf>
  1.4601 +			<passwd>0000</passwd>
  1.4602 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4603 +			<iterations>1024</iterations>
  1.4604 +			<key>6789F0680A5C5840B8ED34B061494171</key>
  1.4605 +		</derivekey>
  1.4606 +	</actionbody>
  1.4607 +</action>
  1.4608 +
  1.4609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4611 +//! @SYMREQ CIT_PREQ1054
  1.4612 +//! @SYMTestPriority medium
  1.4613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4615 +<action>
  1.4616 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4617 +	<actiontype>DeriveKey</actiontype>
  1.4618 +	<actionbody>
  1.4619 +		<derivekey>
  1.4620 +			<kdf>pkcs#12</kdf>
  1.4621 +			<passwd>0001</passwd>
  1.4622 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4623 +			<iterations>1024</iterations>
  1.4624 +			<key>43E663725870C4801A917C41C9B58C41</key>
  1.4625 +		</derivekey>
  1.4626 +	</actionbody>
  1.4627 +</action>
  1.4628 +
  1.4629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4631 +//! @SYMREQ CIT_PREQ1054
  1.4632 +//! @SYMTestPriority medium
  1.4633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4635 +<action>
  1.4636 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4637 +	<actiontype>DeriveKey</actiontype>
  1.4638 +	<actionbody>
  1.4639 +		<derivekey>
  1.4640 +			<kdf>pkcs#12</kdf>
  1.4641 +			<passwd>PSWD</passwd>
  1.4642 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4643 +			<iterations>1024</iterations>
  1.4644 +			<key>8B3308BDD5A8AE507200EAA16FE19D42</key>
  1.4645 +		</derivekey>
  1.4646 +	</actionbody>
  1.4647 +</action>
  1.4648 +
  1.4649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4651 +//! @SYMREQ CIT_PREQ1054
  1.4652 +//! @SYMTestPriority medium
  1.4653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4655 +<action>
  1.4656 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4657 +	<actiontype>DeriveKey</actiontype>
  1.4658 +	<actionbody>
  1.4659 +		<derivekey>
  1.4660 +			<kdf>pkcs#12</kdf>
  1.4661 +			<passwd>password</passwd>
  1.4662 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4663 +			<iterations>1024</iterations>
  1.4664 +			<key>CA202602C9A265559B6B96729B574DAA</key>
  1.4665 +		</derivekey>
  1.4666 +	</actionbody>
  1.4667 +</action>
  1.4668 +
  1.4669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4671 +//! @SYMREQ CIT_PREQ1054
  1.4672 +//! @SYMTestPriority medium
  1.4673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4675 +<action>
  1.4676 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4677 +	<actiontype>DeriveKey</actiontype>
  1.4678 +	<actionbody>
  1.4679 +		<derivekey>
  1.4680 +			<kdf>pkcs#12</kdf>
  1.4681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4682 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4683 +			<iterations>1024</iterations>
  1.4684 +			<key>F6A33ADA6A0F5990E9DA747550DE0941</key>
  1.4685 +		</derivekey>
  1.4686 +	</actionbody>
  1.4687 +</action>
  1.4688 +
  1.4689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4691 +//! @SYMREQ CIT_PREQ1054
  1.4692 +//! @SYMTestPriority medium
  1.4693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4695 +<action>
  1.4696 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4697 +	<actiontype>DeriveKey</actiontype>
  1.4698 +	<actionbody>
  1.4699 +		<derivekey>
  1.4700 +			<kdf>pkcs#12</kdf>
  1.4701 +			<passwd>0000</passwd>
  1.4702 +			<salt>53414C54</salt>
  1.4703 +			<iterations>1536</iterations>
  1.4704 +			<key>79A4E1398F511B262E60DCFE9E838C93</key>
  1.4705 +		</derivekey>
  1.4706 +	</actionbody>
  1.4707 +</action>
  1.4708 +
  1.4709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4711 +//! @SYMREQ CIT_PREQ1054
  1.4712 +//! @SYMTestPriority medium
  1.4713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4715 +<action>
  1.4716 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4717 +	<actiontype>DeriveKey</actiontype>
  1.4718 +	<actionbody>
  1.4719 +		<derivekey>
  1.4720 +			<kdf>pkcs#12</kdf>
  1.4721 +			<passwd>0001</passwd>
  1.4722 +			<salt>53414C54</salt>
  1.4723 +			<iterations>1536</iterations>
  1.4724 +			<key>6F2402CCE4A91C1B848CCABD915657A2</key>
  1.4725 +		</derivekey>
  1.4726 +	</actionbody>
  1.4727 +</action>
  1.4728 +
  1.4729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4731 +//! @SYMREQ CIT_PREQ1054
  1.4732 +//! @SYMTestPriority medium
  1.4733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4735 +<action>
  1.4736 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4737 +	<actiontype>DeriveKey</actiontype>
  1.4738 +	<actionbody>
  1.4739 +		<derivekey>
  1.4740 +			<kdf>pkcs#12</kdf>
  1.4741 +			<passwd>PSWD</passwd>
  1.4742 +			<salt>53414C54</salt>
  1.4743 +			<iterations>1536</iterations>
  1.4744 +			<key>B9ED7B3135488439E78DF480AD845E7E</key>
  1.4745 +		</derivekey>
  1.4746 +	</actionbody>
  1.4747 +</action>
  1.4748 +
  1.4749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4751 +//! @SYMREQ CIT_PREQ1054
  1.4752 +//! @SYMTestPriority medium
  1.4753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4755 +<action>
  1.4756 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4757 +	<actiontype>DeriveKey</actiontype>
  1.4758 +	<actionbody>
  1.4759 +		<derivekey>
  1.4760 +			<kdf>pkcs#12</kdf>
  1.4761 +			<passwd>password</passwd>
  1.4762 +			<salt>53414C54</salt>
  1.4763 +			<iterations>1536</iterations>
  1.4764 +			<key>65B27A78C72DFEEA6C92846330CE98C6</key>
  1.4765 +		</derivekey>
  1.4766 +	</actionbody>
  1.4767 +</action>
  1.4768 +
  1.4769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4771 +//! @SYMREQ CIT_PREQ1054
  1.4772 +//! @SYMTestPriority medium
  1.4773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4775 +<action>
  1.4776 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4777 +	<actiontype>DeriveKey</actiontype>
  1.4778 +	<actionbody>
  1.4779 +		<derivekey>
  1.4780 +			<kdf>pkcs#12</kdf>
  1.4781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4782 +			<salt>53414C54</salt>
  1.4783 +			<iterations>1536</iterations>
  1.4784 +			<key>8F8FC96A3D958731780B50E843D6BB65</key>
  1.4785 +		</derivekey>
  1.4786 +	</actionbody>
  1.4787 +</action>
  1.4788 +
  1.4789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4791 +//! @SYMREQ CIT_PREQ1054
  1.4792 +//! @SYMTestPriority medium
  1.4793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4795 +<action>
  1.4796 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4797 +	<actiontype>DeriveKey</actiontype>
  1.4798 +	<actionbody>
  1.4799 +		<derivekey>
  1.4800 +			<kdf>pkcs#12</kdf>
  1.4801 +			<passwd>0000</passwd>
  1.4802 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4803 +			<iterations>1536</iterations>
  1.4804 +			<key>642DDC3F4E11C3051D6CDED8DD898C4C</key>
  1.4805 +		</derivekey>
  1.4806 +	</actionbody>
  1.4807 +</action>
  1.4808 +
  1.4809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4811 +//! @SYMREQ CIT_PREQ1054
  1.4812 +//! @SYMTestPriority medium
  1.4813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4815 +<action>
  1.4816 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4817 +	<actiontype>DeriveKey</actiontype>
  1.4818 +	<actionbody>
  1.4819 +		<derivekey>
  1.4820 +			<kdf>pkcs#12</kdf>
  1.4821 +			<passwd>0001</passwd>
  1.4822 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4823 +			<iterations>1536</iterations>
  1.4824 +			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F1</key>
  1.4825 +		</derivekey>
  1.4826 +	</actionbody>
  1.4827 +</action>
  1.4828 +
  1.4829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4831 +//! @SYMREQ CIT_PREQ1054
  1.4832 +//! @SYMTestPriority medium
  1.4833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4835 +<action>
  1.4836 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4837 +	<actiontype>DeriveKey</actiontype>
  1.4838 +	<actionbody>
  1.4839 +		<derivekey>
  1.4840 +			<kdf>pkcs#12</kdf>
  1.4841 +			<passwd>PSWD</passwd>
  1.4842 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4843 +			<iterations>1536</iterations>
  1.4844 +			<key>32D7F10C5EAA9961B590E8FE4561B9D5</key>
  1.4845 +		</derivekey>
  1.4846 +	</actionbody>
  1.4847 +</action>
  1.4848 +
  1.4849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4851 +//! @SYMREQ CIT_PREQ1054
  1.4852 +//! @SYMTestPriority medium
  1.4853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4855 +<action>
  1.4856 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4857 +	<actiontype>DeriveKey</actiontype>
  1.4858 +	<actionbody>
  1.4859 +		<derivekey>
  1.4860 +			<kdf>pkcs#12</kdf>
  1.4861 +			<passwd>password</passwd>
  1.4862 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4863 +			<iterations>1536</iterations>
  1.4864 +			<key>C05FE26245C742CC01B23C655E5D934D</key>
  1.4865 +		</derivekey>
  1.4866 +	</actionbody>
  1.4867 +</action>
  1.4868 +
  1.4869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4871 +//! @SYMREQ CIT_PREQ1054
  1.4872 +//! @SYMTestPriority medium
  1.4873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4875 +<action>
  1.4876 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.4877 +	<actiontype>DeriveKey</actiontype>
  1.4878 +	<actionbody>
  1.4879 +		<derivekey>
  1.4880 +			<kdf>pkcs#12</kdf>
  1.4881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4882 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.4883 +			<iterations>1536</iterations>
  1.4884 +			<key>818C967A8F742565CCA37CEA8C683FCC</key>
  1.4885 +		</derivekey>
  1.4886 +	</actionbody>
  1.4887 +</action>
  1.4888 +
  1.4889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4891 +//! @SYMREQ CIT_PREQ1054
  1.4892 +//! @SYMTestPriority medium
  1.4893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4895 +<action>
  1.4896 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4897 +	<actiontype>DeriveKey</actiontype>
  1.4898 +	<actionbody>
  1.4899 +		<derivekey>
  1.4900 +			<kdf>pkcs#12</kdf>
  1.4901 +			<passwd>0000</passwd>
  1.4902 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4903 +			<iterations>1536</iterations>
  1.4904 +			<key>5301B5B2A1A6EB6832DC47F3A0850B56</key>
  1.4905 +		</derivekey>
  1.4906 +	</actionbody>
  1.4907 +</action>
  1.4908 +
  1.4909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4911 +//! @SYMREQ CIT_PREQ1054
  1.4912 +//! @SYMTestPriority medium
  1.4913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4915 +<action>
  1.4916 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4917 +	<actiontype>DeriveKey</actiontype>
  1.4918 +	<actionbody>
  1.4919 +		<derivekey>
  1.4920 +			<kdf>pkcs#12</kdf>
  1.4921 +			<passwd>0001</passwd>
  1.4922 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4923 +			<iterations>1536</iterations>
  1.4924 +			<key>9CB5BD2394B268E13DCA91EE2BB0A39C</key>
  1.4925 +		</derivekey>
  1.4926 +	</actionbody>
  1.4927 +</action>
  1.4928 +
  1.4929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4931 +//! @SYMREQ CIT_PREQ1054
  1.4932 +//! @SYMTestPriority medium
  1.4933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4935 +<action>
  1.4936 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4937 +	<actiontype>DeriveKey</actiontype>
  1.4938 +	<actionbody>
  1.4939 +		<derivekey>
  1.4940 +			<kdf>pkcs#12</kdf>
  1.4941 +			<passwd>PSWD</passwd>
  1.4942 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4943 +			<iterations>1536</iterations>
  1.4944 +			<key>EB90D956B358B7C5E9FC4A4EFA02589B</key>
  1.4945 +		</derivekey>
  1.4946 +	</actionbody>
  1.4947 +</action>
  1.4948 +
  1.4949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4951 +//! @SYMREQ CIT_PREQ1054
  1.4952 +//! @SYMTestPriority medium
  1.4953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4955 +<action>
  1.4956 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4957 +	<actiontype>DeriveKey</actiontype>
  1.4958 +	<actionbody>
  1.4959 +		<derivekey>
  1.4960 +			<kdf>pkcs#12</kdf>
  1.4961 +			<passwd>password</passwd>
  1.4962 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4963 +			<iterations>1536</iterations>
  1.4964 +			<key>ACAFB5EB24FFB3B418587B832F52C226</key>
  1.4965 +		</derivekey>
  1.4966 +	</actionbody>
  1.4967 +</action>
  1.4968 +
  1.4969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4971 +//! @SYMREQ CIT_PREQ1054
  1.4972 +//! @SYMTestPriority medium
  1.4973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4975 +<action>
  1.4976 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.4977 +	<actiontype>DeriveKey</actiontype>
  1.4978 +	<actionbody>
  1.4979 +		<derivekey>
  1.4980 +			<kdf>pkcs#12</kdf>
  1.4981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.4982 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.4983 +			<iterations>1536</iterations>
  1.4984 +			<key>A7B0859D9D1BF5E59047192BF2B8C7AC</key>
  1.4985 +		</derivekey>
  1.4986 +	</actionbody>
  1.4987 +</action>
  1.4988 +
  1.4989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.4990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.4991 +//! @SYMREQ CIT_PREQ1054
  1.4992 +//! @SYMTestPriority medium
  1.4993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.4994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.4995 +<action>
  1.4996 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.4997 +	<actiontype>DeriveKey</actiontype>
  1.4998 +	<actionbody>
  1.4999 +		<derivekey>
  1.5000 +			<kdf>pkcs#12</kdf>
  1.5001 +			<passwd>0000</passwd>
  1.5002 +			<salt>53414C54</salt>
  1.5003 +			<iterations>2048</iterations>
  1.5004 +			<key>B0F0F2EB445AB4DBE901D3C248482259</key>
  1.5005 +		</derivekey>
  1.5006 +	</actionbody>
  1.5007 +</action>
  1.5008 +
  1.5009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5011 +//! @SYMREQ CIT_PREQ1054
  1.5012 +//! @SYMTestPriority medium
  1.5013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5015 +<action>
  1.5016 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.5017 +	<actiontype>DeriveKey</actiontype>
  1.5018 +	<actionbody>
  1.5019 +		<derivekey>
  1.5020 +			<kdf>pkcs#12</kdf>
  1.5021 +			<passwd>0001</passwd>
  1.5022 +			<salt>53414C54</salt>
  1.5023 +			<iterations>2048</iterations>
  1.5024 +			<key>C11C0499CC9EC9FBB6ACA7BF4C0B5389</key>
  1.5025 +		</derivekey>
  1.5026 +	</actionbody>
  1.5027 +</action>
  1.5028 +
  1.5029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5031 +//! @SYMREQ CIT_PREQ1054
  1.5032 +//! @SYMTestPriority medium
  1.5033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5035 +<action>
  1.5036 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.5037 +	<actiontype>DeriveKey</actiontype>
  1.5038 +	<actionbody>
  1.5039 +		<derivekey>
  1.5040 +			<kdf>pkcs#12</kdf>
  1.5041 +			<passwd>PSWD</passwd>
  1.5042 +			<salt>53414C54</salt>
  1.5043 +			<iterations>2048</iterations>
  1.5044 +			<key>3F63500AC41074B4D2C1A991CBBBB013</key>
  1.5045 +		</derivekey>
  1.5046 +	</actionbody>
  1.5047 +</action>
  1.5048 +
  1.5049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5051 +//! @SYMREQ CIT_PREQ1054
  1.5052 +//! @SYMTestPriority medium
  1.5053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5055 +<action>
  1.5056 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.5057 +	<actiontype>DeriveKey</actiontype>
  1.5058 +	<actionbody>
  1.5059 +		<derivekey>
  1.5060 +			<kdf>pkcs#12</kdf>
  1.5061 +			<passwd>password</passwd>
  1.5062 +			<salt>53414C54</salt>
  1.5063 +			<iterations>2048</iterations>
  1.5064 +			<key>B47F802F1238A73054DEFD7D3AABFC81</key>
  1.5065 +		</derivekey>
  1.5066 +	</actionbody>
  1.5067 +</action>
  1.5068 +
  1.5069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5071 +//! @SYMREQ CIT_PREQ1054
  1.5072 +//! @SYMTestPriority medium
  1.5073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5075 +<action>
  1.5076 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  1.5077 +	<actiontype>DeriveKey</actiontype>
  1.5078 +	<actionbody>
  1.5079 +		<derivekey>
  1.5080 +			<kdf>pkcs#12</kdf>
  1.5081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5082 +			<salt>53414C54</salt>
  1.5083 +			<iterations>2048</iterations>
  1.5084 +			<key>3099237692953AB2017A1BF0B12DAFC8</key>
  1.5085 +		</derivekey>
  1.5086 +	</actionbody>
  1.5087 +</action>
  1.5088 +
  1.5089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5091 +//! @SYMREQ CIT_PREQ1054
  1.5092 +//! @SYMTestPriority medium
  1.5093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5095 +<action>
  1.5096 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.5097 +	<actiontype>DeriveKey</actiontype>
  1.5098 +	<actionbody>
  1.5099 +		<derivekey>
  1.5100 +			<kdf>pkcs#12</kdf>
  1.5101 +			<passwd>0000</passwd>
  1.5102 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5103 +			<iterations>2048</iterations>
  1.5104 +			<key>CD045229461658BC6C47C259F2D20433</key>
  1.5105 +		</derivekey>
  1.5106 +	</actionbody>
  1.5107 +</action>
  1.5108 +
  1.5109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5111 +//! @SYMREQ CIT_PREQ1054
  1.5112 +//! @SYMTestPriority medium
  1.5113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5115 +<action>
  1.5116 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.5117 +	<actiontype>DeriveKey</actiontype>
  1.5118 +	<actionbody>
  1.5119 +		<derivekey>
  1.5120 +			<kdf>pkcs#12</kdf>
  1.5121 +			<passwd>0001</passwd>
  1.5122 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5123 +			<iterations>2048</iterations>
  1.5124 +			<key>D85432F8ACAE9653D34A68D9329F347A</key>
  1.5125 +		</derivekey>
  1.5126 +	</actionbody>
  1.5127 +</action>
  1.5128 +
  1.5129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5131 +//! @SYMREQ CIT_PREQ1054
  1.5132 +//! @SYMTestPriority medium
  1.5133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5135 +<action>
  1.5136 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.5137 +	<actiontype>DeriveKey</actiontype>
  1.5138 +	<actionbody>
  1.5139 +		<derivekey>
  1.5140 +			<kdf>pkcs#12</kdf>
  1.5141 +			<passwd>PSWD</passwd>
  1.5142 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5143 +			<iterations>2048</iterations>
  1.5144 +			<key>C77FDE2E52892DF5613E6A3B8F1C80B9</key>
  1.5145 +		</derivekey>
  1.5146 +	</actionbody>
  1.5147 +</action>
  1.5148 +
  1.5149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5151 +//! @SYMREQ CIT_PREQ1054
  1.5152 +//! @SYMTestPriority medium
  1.5153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5155 +<action>
  1.5156 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.5157 +	<actiontype>DeriveKey</actiontype>
  1.5158 +	<actionbody>
  1.5159 +		<derivekey>
  1.5160 +			<kdf>pkcs#12</kdf>
  1.5161 +			<passwd>password</passwd>
  1.5162 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5163 +			<iterations>2048</iterations>
  1.5164 +			<key>62E06B8A2650199AE6E73AB3F503BF02</key>
  1.5165 +		</derivekey>
  1.5166 +	</actionbody>
  1.5167 +</action>
  1.5168 +
  1.5169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5171 +//! @SYMREQ CIT_PREQ1054
  1.5172 +//! @SYMTestPriority medium
  1.5173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5175 +<action>
  1.5176 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  1.5177 +	<actiontype>DeriveKey</actiontype>
  1.5178 +	<actionbody>
  1.5179 +		<derivekey>
  1.5180 +			<kdf>pkcs#12</kdf>
  1.5181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5182 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5183 +			<iterations>2048</iterations>
  1.5184 +			<key>A5B348EB4926290B223724CC8E4ED67F</key>
  1.5185 +		</derivekey>
  1.5186 +	</actionbody>
  1.5187 +</action>
  1.5188 +
  1.5189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5191 +//! @SYMREQ CIT_PREQ1054
  1.5192 +//! @SYMTestPriority medium
  1.5193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5195 +<action>
  1.5196 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.5197 +	<actiontype>DeriveKey</actiontype>
  1.5198 +	<actionbody>
  1.5199 +		<derivekey>
  1.5200 +			<kdf>pkcs#12</kdf>
  1.5201 +			<passwd>0000</passwd>
  1.5202 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5203 +			<iterations>2048</iterations>
  1.5204 +			<key>2A824C1B6B36AD48D0A5AE94E27988D4</key>
  1.5205 +		</derivekey>
  1.5206 +	</actionbody>
  1.5207 +</action>
  1.5208 +
  1.5209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5211 +//! @SYMREQ CIT_PREQ1054
  1.5212 +//! @SYMTestPriority medium
  1.5213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5215 +<action>
  1.5216 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.5217 +	<actiontype>DeriveKey</actiontype>
  1.5218 +	<actionbody>
  1.5219 +		<derivekey>
  1.5220 +			<kdf>pkcs#12</kdf>
  1.5221 +			<passwd>0001</passwd>
  1.5222 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5223 +			<iterations>2048</iterations>
  1.5224 +			<key>4B8D18B96EB898D1BAA8BDD82BC443F0</key>
  1.5225 +		</derivekey>
  1.5226 +	</actionbody>
  1.5227 +</action>
  1.5228 +
  1.5229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5231 +//! @SYMREQ CIT_PREQ1054
  1.5232 +//! @SYMTestPriority medium
  1.5233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5235 +<action>
  1.5236 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.5237 +	<actiontype>DeriveKey</actiontype>
  1.5238 +	<actionbody>
  1.5239 +		<derivekey>
  1.5240 +			<kdf>pkcs#12</kdf>
  1.5241 +			<passwd>PSWD</passwd>
  1.5242 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5243 +			<iterations>2048</iterations>
  1.5244 +			<key>9DABF586AD2BCD603DC38C3987C98D73</key>
  1.5245 +		</derivekey>
  1.5246 +	</actionbody>
  1.5247 +</action>
  1.5248 +
  1.5249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5251 +//! @SYMREQ CIT_PREQ1054
  1.5252 +//! @SYMTestPriority medium
  1.5253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5255 +<action>
  1.5256 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.5257 +	<actiontype>DeriveKey</actiontype>
  1.5258 +	<actionbody>
  1.5259 +		<derivekey>
  1.5260 +			<kdf>pkcs#12</kdf>
  1.5261 +			<passwd>password</passwd>
  1.5262 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5263 +			<iterations>2048</iterations>
  1.5264 +			<key>F734BE1BF990A3A59CEA6C821492F0B6</key>
  1.5265 +		</derivekey>
  1.5266 +	</actionbody>
  1.5267 +</action>
  1.5268 +
  1.5269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5271 +//! @SYMREQ CIT_PREQ1054
  1.5272 +//! @SYMTestPriority medium
  1.5273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5275 +<action>
  1.5276 +	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  1.5277 +	<actiontype>DeriveKey</actiontype>
  1.5278 +	<actionbody>
  1.5279 +		<derivekey>
  1.5280 +			<kdf>pkcs#12</kdf>
  1.5281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5282 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5283 +			<iterations>2048</iterations>
  1.5284 +			<key>47C18634A09AB37AB6EECBCD5C7E7F23</key>
  1.5285 +		</derivekey>
  1.5286 +	</actionbody>
  1.5287 +</action>
  1.5288 +
  1.5289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5291 +//! @SYMREQ CIT_PREQ1054
  1.5292 +//! @SYMTestPriority medium
  1.5293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5295 +<action>
  1.5296 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5297 +	<actiontype>DeriveKey</actiontype>
  1.5298 +	<actionbody>
  1.5299 +		<derivekey>
  1.5300 +			<kdf>pkcs#12</kdf>
  1.5301 +			<passwd>0000</passwd>
  1.5302 +			<salt>53414C54</salt>
  1.5303 +			<iterations>1</iterations>
  1.5304 +			<key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7</key>
  1.5305 +		</derivekey>
  1.5306 +	</actionbody>
  1.5307 +</action>
  1.5308 +
  1.5309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5311 +//! @SYMREQ CIT_PREQ1054
  1.5312 +//! @SYMTestPriority medium
  1.5313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5315 +<action>
  1.5316 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5317 +	<actiontype>DeriveKey</actiontype>
  1.5318 +	<actionbody>
  1.5319 +		<derivekey>
  1.5320 +			<kdf>pkcs#12</kdf>
  1.5321 +			<passwd>0001</passwd>
  1.5322 +			<salt>53414C54</salt>
  1.5323 +			<iterations>1</iterations>
  1.5324 +			<key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B</key>
  1.5325 +		</derivekey>
  1.5326 +	</actionbody>
  1.5327 +</action>
  1.5328 +
  1.5329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5331 +//! @SYMREQ CIT_PREQ1054
  1.5332 +//! @SYMTestPriority medium
  1.5333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5335 +<action>
  1.5336 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5337 +	<actiontype>DeriveKey</actiontype>
  1.5338 +	<actionbody>
  1.5339 +		<derivekey>
  1.5340 +			<kdf>pkcs#12</kdf>
  1.5341 +			<passwd>PSWD</passwd>
  1.5342 +			<salt>53414C54</salt>
  1.5343 +			<iterations>1</iterations>
  1.5344 +			<key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB09599</key>
  1.5345 +		</derivekey>
  1.5346 +	</actionbody>
  1.5347 +</action>
  1.5348 +
  1.5349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5351 +//! @SYMREQ CIT_PREQ1054
  1.5352 +//! @SYMTestPriority medium
  1.5353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5355 +<action>
  1.5356 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5357 +	<actiontype>DeriveKey</actiontype>
  1.5358 +	<actionbody>
  1.5359 +		<derivekey>
  1.5360 +			<kdf>pkcs#12</kdf>
  1.5361 +			<passwd>password</passwd>
  1.5362 +			<salt>53414C54</salt>
  1.5363 +			<iterations>1</iterations>
  1.5364 +			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C5</key>
  1.5365 +		</derivekey>
  1.5366 +	</actionbody>
  1.5367 +</action>
  1.5368 +
  1.5369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5371 +//! @SYMREQ CIT_PREQ1054
  1.5372 +//! @SYMTestPriority medium
  1.5373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5375 +<action>
  1.5376 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5377 +	<actiontype>DeriveKey</actiontype>
  1.5378 +	<actionbody>
  1.5379 +		<derivekey>
  1.5380 +			<kdf>pkcs#12</kdf>
  1.5381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5382 +			<salt>53414C54</salt>
  1.5383 +			<iterations>1</iterations>
  1.5384 +			<key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A</key>
  1.5385 +		</derivekey>
  1.5386 +	</actionbody>
  1.5387 +</action>
  1.5388 +
  1.5389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5391 +//! @SYMREQ CIT_PREQ1054
  1.5392 +//! @SYMTestPriority medium
  1.5393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5395 +<action>
  1.5396 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5397 +	<actiontype>DeriveKey</actiontype>
  1.5398 +	<actionbody>
  1.5399 +		<derivekey>
  1.5400 +			<kdf>pkcs#12</kdf>
  1.5401 +			<passwd>0000</passwd>
  1.5402 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5403 +			<iterations>1</iterations>
  1.5404 +			<key>49CABE7B67736931126499722509C03D4BBEF714A8</key>
  1.5405 +		</derivekey>
  1.5406 +	</actionbody>
  1.5407 +</action>
  1.5408 +
  1.5409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5411 +//! @SYMREQ CIT_PREQ1054
  1.5412 +//! @SYMTestPriority medium
  1.5413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5415 +<action>
  1.5416 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5417 +	<actiontype>DeriveKey</actiontype>
  1.5418 +	<actionbody>
  1.5419 +		<derivekey>
  1.5420 +			<kdf>pkcs#12</kdf>
  1.5421 +			<passwd>0001</passwd>
  1.5422 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5423 +			<iterations>1</iterations>
  1.5424 +			<key>F994B990D3554AFB778C729E9BAA0CC6EB5BA76534</key>
  1.5425 +		</derivekey>
  1.5426 +	</actionbody>
  1.5427 +</action>
  1.5428 +
  1.5429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5431 +//! @SYMREQ CIT_PREQ1054
  1.5432 +//! @SYMTestPriority medium
  1.5433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5435 +<action>
  1.5436 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5437 +	<actiontype>DeriveKey</actiontype>
  1.5438 +	<actionbody>
  1.5439 +		<derivekey>
  1.5440 +			<kdf>pkcs#12</kdf>
  1.5441 +			<passwd>PSWD</passwd>
  1.5442 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5443 +			<iterations>1</iterations>
  1.5444 +			<key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC024</key>
  1.5445 +		</derivekey>
  1.5446 +	</actionbody>
  1.5447 +</action>
  1.5448 +
  1.5449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5451 +//! @SYMREQ CIT_PREQ1054
  1.5452 +//! @SYMTestPriority medium
  1.5453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5455 +<action>
  1.5456 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5457 +	<actiontype>DeriveKey</actiontype>
  1.5458 +	<actionbody>
  1.5459 +		<derivekey>
  1.5460 +			<kdf>pkcs#12</kdf>
  1.5461 +			<passwd>password</passwd>
  1.5462 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5463 +			<iterations>1</iterations>
  1.5464 +			<key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888</key>
  1.5465 +		</derivekey>
  1.5466 +	</actionbody>
  1.5467 +</action>
  1.5468 +
  1.5469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5471 +//! @SYMREQ CIT_PREQ1054
  1.5472 +//! @SYMTestPriority medium
  1.5473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5475 +<action>
  1.5476 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5477 +	<actiontype>DeriveKey</actiontype>
  1.5478 +	<actionbody>
  1.5479 +		<derivekey>
  1.5480 +			<kdf>pkcs#12</kdf>
  1.5481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5482 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5483 +			<iterations>1</iterations>
  1.5484 +			<key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B</key>
  1.5485 +		</derivekey>
  1.5486 +	</actionbody>
  1.5487 +</action>
  1.5488 +
  1.5489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5491 +//! @SYMREQ CIT_PREQ1054
  1.5492 +//! @SYMTestPriority medium
  1.5493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5495 +<action>
  1.5496 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5497 +	<actiontype>DeriveKey</actiontype>
  1.5498 +	<actionbody>
  1.5499 +		<derivekey>
  1.5500 +			<kdf>pkcs#12</kdf>
  1.5501 +			<passwd>0000</passwd>
  1.5502 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5503 +			<iterations>1</iterations>
  1.5504 +			<key>90253A49C069E7FF35281461A4DDBE0BB38F4041A0</key>
  1.5505 +		</derivekey>
  1.5506 +	</actionbody>
  1.5507 +</action>
  1.5508 +
  1.5509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5511 +//! @SYMREQ CIT_PREQ1054
  1.5512 +//! @SYMTestPriority medium
  1.5513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5515 +<action>
  1.5516 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5517 +	<actiontype>DeriveKey</actiontype>
  1.5518 +	<actionbody>
  1.5519 +		<derivekey>
  1.5520 +			<kdf>pkcs#12</kdf>
  1.5521 +			<passwd>0001</passwd>
  1.5522 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5523 +			<iterations>1</iterations>
  1.5524 +			<key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8</key>
  1.5525 +		</derivekey>
  1.5526 +	</actionbody>
  1.5527 +</action>
  1.5528 +
  1.5529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5531 +//! @SYMREQ CIT_PREQ1054
  1.5532 +//! @SYMTestPriority medium
  1.5533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5535 +<action>
  1.5536 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5537 +	<actiontype>DeriveKey</actiontype>
  1.5538 +	<actionbody>
  1.5539 +		<derivekey>
  1.5540 +			<kdf>pkcs#12</kdf>
  1.5541 +			<passwd>PSWD</passwd>
  1.5542 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5543 +			<iterations>1</iterations>
  1.5544 +			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC8</key>
  1.5545 +		</derivekey>
  1.5546 +	</actionbody>
  1.5547 +</action>
  1.5548 +
  1.5549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5551 +//! @SYMREQ CIT_PREQ1054
  1.5552 +//! @SYMTestPriority medium
  1.5553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5555 +<action>
  1.5556 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5557 +	<actiontype>DeriveKey</actiontype>
  1.5558 +	<actionbody>
  1.5559 +		<derivekey>
  1.5560 +			<kdf>pkcs#12</kdf>
  1.5561 +			<passwd>password</passwd>
  1.5562 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5563 +			<iterations>1</iterations>
  1.5564 +			<key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C1</key>
  1.5565 +		</derivekey>
  1.5566 +	</actionbody>
  1.5567 +</action>
  1.5568 +
  1.5569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5571 +//! @SYMREQ CIT_PREQ1054
  1.5572 +//! @SYMTestPriority medium
  1.5573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5575 +<action>
  1.5576 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5577 +	<actiontype>DeriveKey</actiontype>
  1.5578 +	<actionbody>
  1.5579 +		<derivekey>
  1.5580 +			<kdf>pkcs#12</kdf>
  1.5581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5582 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5583 +			<iterations>1</iterations>
  1.5584 +			<key>27476572AF26E99AB85CD350DC802ABA3A831332A7</key>
  1.5585 +		</derivekey>
  1.5586 +	</actionbody>
  1.5587 +</action>
  1.5588 +
  1.5589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5591 +//! @SYMREQ CIT_PREQ1054
  1.5592 +//! @SYMTestPriority medium
  1.5593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5595 +<action>
  1.5596 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5597 +	<actiontype>DeriveKey</actiontype>
  1.5598 +	<actionbody>
  1.5599 +		<derivekey>
  1.5600 +			<kdf>pkcs#12</kdf>
  1.5601 +			<passwd>0000</passwd>
  1.5602 +			<salt>53414C54</salt>
  1.5603 +			<iterations>2</iterations>
  1.5604 +			<key>A1D9010A6761CB2675F1C33BB3C5215851703D0D26</key>
  1.5605 +		</derivekey>
  1.5606 +	</actionbody>
  1.5607 +</action>
  1.5608 +
  1.5609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5611 +//! @SYMREQ CIT_PREQ1054
  1.5612 +//! @SYMTestPriority medium
  1.5613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5615 +<action>
  1.5616 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5617 +	<actiontype>DeriveKey</actiontype>
  1.5618 +	<actionbody>
  1.5619 +		<derivekey>
  1.5620 +			<kdf>pkcs#12</kdf>
  1.5621 +			<passwd>0001</passwd>
  1.5622 +			<salt>53414C54</salt>
  1.5623 +			<iterations>2</iterations>
  1.5624 +			<key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47</key>
  1.5625 +		</derivekey>
  1.5626 +	</actionbody>
  1.5627 +</action>
  1.5628 +
  1.5629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5631 +//! @SYMREQ CIT_PREQ1054
  1.5632 +//! @SYMTestPriority medium
  1.5633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5635 +<action>
  1.5636 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5637 +	<actiontype>DeriveKey</actiontype>
  1.5638 +	<actionbody>
  1.5639 +		<derivekey>
  1.5640 +			<kdf>pkcs#12</kdf>
  1.5641 +			<passwd>PSWD</passwd>
  1.5642 +			<salt>53414C54</salt>
  1.5643 +			<iterations>2</iterations>
  1.5644 +			<key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE3</key>
  1.5645 +		</derivekey>
  1.5646 +	</actionbody>
  1.5647 +</action>
  1.5648 +
  1.5649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5651 +//! @SYMREQ CIT_PREQ1054
  1.5652 +//! @SYMTestPriority medium
  1.5653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5655 +<action>
  1.5656 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5657 +	<actiontype>DeriveKey</actiontype>
  1.5658 +	<actionbody>
  1.5659 +		<derivekey>
  1.5660 +			<kdf>pkcs#12</kdf>
  1.5661 +			<passwd>password</passwd>
  1.5662 +			<salt>53414C54</salt>
  1.5663 +			<iterations>2</iterations>
  1.5664 +			<key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A</key>
  1.5665 +		</derivekey>
  1.5666 +	</actionbody>
  1.5667 +</action>
  1.5668 +
  1.5669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5671 +//! @SYMREQ CIT_PREQ1054
  1.5672 +//! @SYMTestPriority medium
  1.5673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5675 +<action>
  1.5676 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5677 +	<actiontype>DeriveKey</actiontype>
  1.5678 +	<actionbody>
  1.5679 +		<derivekey>
  1.5680 +			<kdf>pkcs#12</kdf>
  1.5681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5682 +			<salt>53414C54</salt>
  1.5683 +			<iterations>2</iterations>
  1.5684 +			<key>5BF185C726EE2182888A834066C30BA92C0A6A140F</key>
  1.5685 +		</derivekey>
  1.5686 +	</actionbody>
  1.5687 +</action>
  1.5688 +
  1.5689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5691 +//! @SYMREQ CIT_PREQ1054
  1.5692 +//! @SYMTestPriority medium
  1.5693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5695 +<action>
  1.5696 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5697 +	<actiontype>DeriveKey</actiontype>
  1.5698 +	<actionbody>
  1.5699 +		<derivekey>
  1.5700 +			<kdf>pkcs#12</kdf>
  1.5701 +			<passwd>0000</passwd>
  1.5702 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5703 +			<iterations>2</iterations>
  1.5704 +			<key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734</key>
  1.5705 +		</derivekey>
  1.5706 +	</actionbody>
  1.5707 +</action>
  1.5708 +
  1.5709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5711 +//! @SYMREQ CIT_PREQ1054
  1.5712 +//! @SYMTestPriority medium
  1.5713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5715 +<action>
  1.5716 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5717 +	<actiontype>DeriveKey</actiontype>
  1.5718 +	<actionbody>
  1.5719 +		<derivekey>
  1.5720 +			<kdf>pkcs#12</kdf>
  1.5721 +			<passwd>0001</passwd>
  1.5722 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5723 +			<iterations>2</iterations>
  1.5724 +			<key>63E6DF459C899D72577C20FFE4F27670F3A85EA780</key>
  1.5725 +		</derivekey>
  1.5726 +	</actionbody>
  1.5727 +</action>
  1.5728 +
  1.5729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5731 +//! @SYMREQ CIT_PREQ1054
  1.5732 +//! @SYMTestPriority medium
  1.5733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5735 +<action>
  1.5736 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5737 +	<actiontype>DeriveKey</actiontype>
  1.5738 +	<actionbody>
  1.5739 +		<derivekey>
  1.5740 +			<kdf>pkcs#12</kdf>
  1.5741 +			<passwd>PSWD</passwd>
  1.5742 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5743 +			<iterations>2</iterations>
  1.5744 +			<key>C2099204ABFBB841875BD7595A89D31A9D03A34B94</key>
  1.5745 +		</derivekey>
  1.5746 +	</actionbody>
  1.5747 +</action>
  1.5748 +
  1.5749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5751 +//! @SYMREQ CIT_PREQ1054
  1.5752 +//! @SYMTestPriority medium
  1.5753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5755 +<action>
  1.5756 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5757 +	<actiontype>DeriveKey</actiontype>
  1.5758 +	<actionbody>
  1.5759 +		<derivekey>
  1.5760 +			<kdf>pkcs#12</kdf>
  1.5761 +			<passwd>password</passwd>
  1.5762 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5763 +			<iterations>2</iterations>
  1.5764 +			<key>3204D28A32DF299B612958906C79154AED69D3F1C0</key>
  1.5765 +		</derivekey>
  1.5766 +	</actionbody>
  1.5767 +</action>
  1.5768 +
  1.5769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5771 +//! @SYMREQ CIT_PREQ1054
  1.5772 +//! @SYMTestPriority medium
  1.5773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5775 +<action>
  1.5776 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5777 +	<actiontype>DeriveKey</actiontype>
  1.5778 +	<actionbody>
  1.5779 +		<derivekey>
  1.5780 +			<kdf>pkcs#12</kdf>
  1.5781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5782 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.5783 +			<iterations>2</iterations>
  1.5784 +			<key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04</key>
  1.5785 +		</derivekey>
  1.5786 +	</actionbody>
  1.5787 +</action>
  1.5788 +
  1.5789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5791 +//! @SYMREQ CIT_PREQ1054
  1.5792 +//! @SYMTestPriority medium
  1.5793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5795 +<action>
  1.5796 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5797 +	<actiontype>DeriveKey</actiontype>
  1.5798 +	<actionbody>
  1.5799 +		<derivekey>
  1.5800 +			<kdf>pkcs#12</kdf>
  1.5801 +			<passwd>0000</passwd>
  1.5802 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5803 +			<iterations>2</iterations>
  1.5804 +			<key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11</key>
  1.5805 +		</derivekey>
  1.5806 +	</actionbody>
  1.5807 +</action>
  1.5808 +
  1.5809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5811 +//! @SYMREQ CIT_PREQ1054
  1.5812 +//! @SYMTestPriority medium
  1.5813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5815 +<action>
  1.5816 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5817 +	<actiontype>DeriveKey</actiontype>
  1.5818 +	<actionbody>
  1.5819 +		<derivekey>
  1.5820 +			<kdf>pkcs#12</kdf>
  1.5821 +			<passwd>0001</passwd>
  1.5822 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5823 +			<iterations>2</iterations>
  1.5824 +			<key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC</key>
  1.5825 +		</derivekey>
  1.5826 +	</actionbody>
  1.5827 +</action>
  1.5828 +
  1.5829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5831 +//! @SYMREQ CIT_PREQ1054
  1.5832 +//! @SYMTestPriority medium
  1.5833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5835 +<action>
  1.5836 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5837 +	<actiontype>DeriveKey</actiontype>
  1.5838 +	<actionbody>
  1.5839 +		<derivekey>
  1.5840 +			<kdf>pkcs#12</kdf>
  1.5841 +			<passwd>PSWD</passwd>
  1.5842 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5843 +			<iterations>2</iterations>
  1.5844 +			<key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F</key>
  1.5845 +		</derivekey>
  1.5846 +	</actionbody>
  1.5847 +</action>
  1.5848 +
  1.5849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5851 +//! @SYMREQ CIT_PREQ1054
  1.5852 +//! @SYMTestPriority medium
  1.5853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5855 +<action>
  1.5856 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5857 +	<actiontype>DeriveKey</actiontype>
  1.5858 +	<actionbody>
  1.5859 +		<derivekey>
  1.5860 +			<kdf>pkcs#12</kdf>
  1.5861 +			<passwd>password</passwd>
  1.5862 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5863 +			<iterations>2</iterations>
  1.5864 +			<key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDF</key>
  1.5865 +		</derivekey>
  1.5866 +	</actionbody>
  1.5867 +</action>
  1.5868 +
  1.5869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5871 +//! @SYMREQ CIT_PREQ1054
  1.5872 +//! @SYMTestPriority medium
  1.5873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5875 +<action>
  1.5876 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.5877 +	<actiontype>DeriveKey</actiontype>
  1.5878 +	<actionbody>
  1.5879 +		<derivekey>
  1.5880 +			<kdf>pkcs#12</kdf>
  1.5881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5882 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.5883 +			<iterations>2</iterations>
  1.5884 +			<key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647</key>
  1.5885 +		</derivekey>
  1.5886 +	</actionbody>
  1.5887 +</action>
  1.5888 +
  1.5889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5891 +//! @SYMREQ CIT_PREQ1054
  1.5892 +//! @SYMTestPriority medium
  1.5893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5895 +<action>
  1.5896 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5897 +	<actiontype>DeriveKey</actiontype>
  1.5898 +	<actionbody>
  1.5899 +		<derivekey>
  1.5900 +			<kdf>pkcs#12</kdf>
  1.5901 +			<passwd>0000</passwd>
  1.5902 +			<salt>53414C54</salt>
  1.5903 +			<iterations>4</iterations>
  1.5904 +			<key>D0158BFC57E643965DC161741725CE9478CDF2A0B5</key>
  1.5905 +		</derivekey>
  1.5906 +	</actionbody>
  1.5907 +</action>
  1.5908 +
  1.5909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5911 +//! @SYMREQ CIT_PREQ1054
  1.5912 +//! @SYMTestPriority medium
  1.5913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5915 +<action>
  1.5916 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5917 +	<actiontype>DeriveKey</actiontype>
  1.5918 +	<actionbody>
  1.5919 +		<derivekey>
  1.5920 +			<kdf>pkcs#12</kdf>
  1.5921 +			<passwd>0001</passwd>
  1.5922 +			<salt>53414C54</salt>
  1.5923 +			<iterations>4</iterations>
  1.5924 +			<key>AEB6CD53F0D6830161100C4BFD439B341066339A00</key>
  1.5925 +		</derivekey>
  1.5926 +	</actionbody>
  1.5927 +</action>
  1.5928 +
  1.5929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5931 +//! @SYMREQ CIT_PREQ1054
  1.5932 +//! @SYMTestPriority medium
  1.5933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5935 +<action>
  1.5936 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5937 +	<actiontype>DeriveKey</actiontype>
  1.5938 +	<actionbody>
  1.5939 +		<derivekey>
  1.5940 +			<kdf>pkcs#12</kdf>
  1.5941 +			<passwd>PSWD</passwd>
  1.5942 +			<salt>53414C54</salt>
  1.5943 +			<iterations>4</iterations>
  1.5944 +			<key>80010C12B66CC739F4ACF8BB154197709F78AAD39A</key>
  1.5945 +		</derivekey>
  1.5946 +	</actionbody>
  1.5947 +</action>
  1.5948 +
  1.5949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5951 +//! @SYMREQ CIT_PREQ1054
  1.5952 +//! @SYMTestPriority medium
  1.5953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5955 +<action>
  1.5956 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5957 +	<actiontype>DeriveKey</actiontype>
  1.5958 +	<actionbody>
  1.5959 +		<derivekey>
  1.5960 +			<kdf>pkcs#12</kdf>
  1.5961 +			<passwd>password</passwd>
  1.5962 +			<salt>53414C54</salt>
  1.5963 +			<iterations>4</iterations>
  1.5964 +			<key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812</key>
  1.5965 +		</derivekey>
  1.5966 +	</actionbody>
  1.5967 +</action>
  1.5968 +
  1.5969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5971 +//! @SYMREQ CIT_PREQ1054
  1.5972 +//! @SYMTestPriority medium
  1.5973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5975 +<action>
  1.5976 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.5977 +	<actiontype>DeriveKey</actiontype>
  1.5978 +	<actionbody>
  1.5979 +		<derivekey>
  1.5980 +			<kdf>pkcs#12</kdf>
  1.5981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.5982 +			<salt>53414C54</salt>
  1.5983 +			<iterations>4</iterations>
  1.5984 +			<key>146C6A5B58AF8561220DE4C13A133248300D59D39E</key>
  1.5985 +		</derivekey>
  1.5986 +	</actionbody>
  1.5987 +</action>
  1.5988 +
  1.5989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.5990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.5991 +//! @SYMREQ CIT_PREQ1054
  1.5992 +//! @SYMTestPriority medium
  1.5993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.5994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.5995 +<action>
  1.5996 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.5997 +	<actiontype>DeriveKey</actiontype>
  1.5998 +	<actionbody>
  1.5999 +		<derivekey>
  1.6000 +			<kdf>pkcs#12</kdf>
  1.6001 +			<passwd>0000</passwd>
  1.6002 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6003 +			<iterations>4</iterations>
  1.6004 +			<key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE</key>
  1.6005 +		</derivekey>
  1.6006 +	</actionbody>
  1.6007 +</action>
  1.6008 +
  1.6009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6011 +//! @SYMREQ CIT_PREQ1054
  1.6012 +//! @SYMTestPriority medium
  1.6013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6015 +<action>
  1.6016 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6017 +	<actiontype>DeriveKey</actiontype>
  1.6018 +	<actionbody>
  1.6019 +		<derivekey>
  1.6020 +			<kdf>pkcs#12</kdf>
  1.6021 +			<passwd>0001</passwd>
  1.6022 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6023 +			<iterations>4</iterations>
  1.6024 +			<key>23930713772E26DBBABB53F3C5C775019B8048482B</key>
  1.6025 +		</derivekey>
  1.6026 +	</actionbody>
  1.6027 +</action>
  1.6028 +
  1.6029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6031 +//! @SYMREQ CIT_PREQ1054
  1.6032 +//! @SYMTestPriority medium
  1.6033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6035 +<action>
  1.6036 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6037 +	<actiontype>DeriveKey</actiontype>
  1.6038 +	<actionbody>
  1.6039 +		<derivekey>
  1.6040 +			<kdf>pkcs#12</kdf>
  1.6041 +			<passwd>PSWD</passwd>
  1.6042 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6043 +			<iterations>4</iterations>
  1.6044 +			<key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A</key>
  1.6045 +		</derivekey>
  1.6046 +	</actionbody>
  1.6047 +</action>
  1.6048 +
  1.6049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6051 +//! @SYMREQ CIT_PREQ1054
  1.6052 +//! @SYMTestPriority medium
  1.6053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6055 +<action>
  1.6056 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6057 +	<actiontype>DeriveKey</actiontype>
  1.6058 +	<actionbody>
  1.6059 +		<derivekey>
  1.6060 +			<kdf>pkcs#12</kdf>
  1.6061 +			<passwd>password</passwd>
  1.6062 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6063 +			<iterations>4</iterations>
  1.6064 +			<key>363619530B170B7BAE1C046B29351C235B8EFED588</key>
  1.6065 +		</derivekey>
  1.6066 +	</actionbody>
  1.6067 +</action>
  1.6068 +
  1.6069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6071 +//! @SYMREQ CIT_PREQ1054
  1.6072 +//! @SYMTestPriority medium
  1.6073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6075 +<action>
  1.6076 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6077 +	<actiontype>DeriveKey</actiontype>
  1.6078 +	<actionbody>
  1.6079 +		<derivekey>
  1.6080 +			<kdf>pkcs#12</kdf>
  1.6081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6082 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6083 +			<iterations>4</iterations>
  1.6084 +			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4E</key>
  1.6085 +		</derivekey>
  1.6086 +	</actionbody>
  1.6087 +</action>
  1.6088 +
  1.6089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6091 +//! @SYMREQ CIT_PREQ1054
  1.6092 +//! @SYMTestPriority medium
  1.6093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6095 +<action>
  1.6096 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6097 +	<actiontype>DeriveKey</actiontype>
  1.6098 +	<actionbody>
  1.6099 +		<derivekey>
  1.6100 +			<kdf>pkcs#12</kdf>
  1.6101 +			<passwd>0000</passwd>
  1.6102 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6103 +			<iterations>4</iterations>
  1.6104 +			<key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0E</key>
  1.6105 +		</derivekey>
  1.6106 +	</actionbody>
  1.6107 +</action>
  1.6108 +
  1.6109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6111 +//! @SYMREQ CIT_PREQ1054
  1.6112 +//! @SYMTestPriority medium
  1.6113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6115 +<action>
  1.6116 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6117 +	<actiontype>DeriveKey</actiontype>
  1.6118 +	<actionbody>
  1.6119 +		<derivekey>
  1.6120 +			<kdf>pkcs#12</kdf>
  1.6121 +			<passwd>0001</passwd>
  1.6122 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6123 +			<iterations>4</iterations>
  1.6124 +			<key>9A618595C714486B7D7E3120005C8BC18D5D95D79B</key>
  1.6125 +		</derivekey>
  1.6126 +	</actionbody>
  1.6127 +</action>
  1.6128 +
  1.6129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6131 +//! @SYMREQ CIT_PREQ1054
  1.6132 +//! @SYMTestPriority medium
  1.6133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6135 +<action>
  1.6136 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6137 +	<actiontype>DeriveKey</actiontype>
  1.6138 +	<actionbody>
  1.6139 +		<derivekey>
  1.6140 +			<kdf>pkcs#12</kdf>
  1.6141 +			<passwd>PSWD</passwd>
  1.6142 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6143 +			<iterations>4</iterations>
  1.6144 +			<key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208</key>
  1.6145 +		</derivekey>
  1.6146 +	</actionbody>
  1.6147 +</action>
  1.6148 +
  1.6149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6151 +//! @SYMREQ CIT_PREQ1054
  1.6152 +//! @SYMTestPriority medium
  1.6153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6155 +<action>
  1.6156 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6157 +	<actiontype>DeriveKey</actiontype>
  1.6158 +	<actionbody>
  1.6159 +		<derivekey>
  1.6160 +			<kdf>pkcs#12</kdf>
  1.6161 +			<passwd>password</passwd>
  1.6162 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6163 +			<iterations>4</iterations>
  1.6164 +			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2</key>
  1.6165 +		</derivekey>
  1.6166 +	</actionbody>
  1.6167 +</action>
  1.6168 +
  1.6169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6171 +//! @SYMREQ CIT_PREQ1054
  1.6172 +//! @SYMTestPriority medium
  1.6173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6175 +<action>
  1.6176 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6177 +	<actiontype>DeriveKey</actiontype>
  1.6178 +	<actionbody>
  1.6179 +		<derivekey>
  1.6180 +			<kdf>pkcs#12</kdf>
  1.6181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6182 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6183 +			<iterations>4</iterations>
  1.6184 +			<key>91DF3661364A0DAD28180A41ADCB55676E992986EF</key>
  1.6185 +		</derivekey>
  1.6186 +	</actionbody>
  1.6187 +</action>
  1.6188 +
  1.6189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6191 +//! @SYMREQ CIT_PREQ1054
  1.6192 +//! @SYMTestPriority medium
  1.6193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6195 +<action>
  1.6196 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6197 +	<actiontype>DeriveKey</actiontype>
  1.6198 +	<actionbody>
  1.6199 +		<derivekey>
  1.6200 +			<kdf>pkcs#12</kdf>
  1.6201 +			<passwd>0000</passwd>
  1.6202 +			<salt>53414C54</salt>
  1.6203 +			<iterations>8</iterations>
  1.6204 +			<key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE461</key>
  1.6205 +		</derivekey>
  1.6206 +	</actionbody>
  1.6207 +</action>
  1.6208 +
  1.6209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6211 +//! @SYMREQ CIT_PREQ1054
  1.6212 +//! @SYMTestPriority medium
  1.6213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6215 +<action>
  1.6216 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6217 +	<actiontype>DeriveKey</actiontype>
  1.6218 +	<actionbody>
  1.6219 +		<derivekey>
  1.6220 +			<kdf>pkcs#12</kdf>
  1.6221 +			<passwd>0001</passwd>
  1.6222 +			<salt>53414C54</salt>
  1.6223 +			<iterations>8</iterations>
  1.6224 +			<key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1</key>
  1.6225 +		</derivekey>
  1.6226 +	</actionbody>
  1.6227 +</action>
  1.6228 +
  1.6229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6231 +//! @SYMREQ CIT_PREQ1054
  1.6232 +//! @SYMTestPriority medium
  1.6233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6235 +<action>
  1.6236 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6237 +	<actiontype>DeriveKey</actiontype>
  1.6238 +	<actionbody>
  1.6239 +		<derivekey>
  1.6240 +			<kdf>pkcs#12</kdf>
  1.6241 +			<passwd>PSWD</passwd>
  1.6242 +			<salt>53414C54</salt>
  1.6243 +			<iterations>8</iterations>
  1.6244 +			<key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466</key>
  1.6245 +		</derivekey>
  1.6246 +	</actionbody>
  1.6247 +</action>
  1.6248 +
  1.6249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6251 +//! @SYMREQ CIT_PREQ1054
  1.6252 +//! @SYMTestPriority medium
  1.6253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6255 +<action>
  1.6256 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6257 +	<actiontype>DeriveKey</actiontype>
  1.6258 +	<actionbody>
  1.6259 +		<derivekey>
  1.6260 +			<kdf>pkcs#12</kdf>
  1.6261 +			<passwd>password</passwd>
  1.6262 +			<salt>53414C54</salt>
  1.6263 +			<iterations>8</iterations>
  1.6264 +			<key>B0935F11227F5A473073DCD188886687D2A1811953</key>
  1.6265 +		</derivekey>
  1.6266 +	</actionbody>
  1.6267 +</action>
  1.6268 +
  1.6269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6271 +//! @SYMREQ CIT_PREQ1054
  1.6272 +//! @SYMTestPriority medium
  1.6273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6275 +<action>
  1.6276 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6277 +	<actiontype>DeriveKey</actiontype>
  1.6278 +	<actionbody>
  1.6279 +		<derivekey>
  1.6280 +			<kdf>pkcs#12</kdf>
  1.6281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6282 +			<salt>53414C54</salt>
  1.6283 +			<iterations>8</iterations>
  1.6284 +			<key>6602B1B4BBB670208041ECD8E1634845FC0DC28532</key>
  1.6285 +		</derivekey>
  1.6286 +	</actionbody>
  1.6287 +</action>
  1.6288 +
  1.6289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6291 +//! @SYMREQ CIT_PREQ1054
  1.6292 +//! @SYMTestPriority medium
  1.6293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6295 +<action>
  1.6296 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6297 +	<actiontype>DeriveKey</actiontype>
  1.6298 +	<actionbody>
  1.6299 +		<derivekey>
  1.6300 +			<kdf>pkcs#12</kdf>
  1.6301 +			<passwd>0000</passwd>
  1.6302 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6303 +			<iterations>8</iterations>
  1.6304 +			<key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E44</key>
  1.6305 +		</derivekey>
  1.6306 +	</actionbody>
  1.6307 +</action>
  1.6308 +
  1.6309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6311 +//! @SYMREQ CIT_PREQ1054
  1.6312 +//! @SYMTestPriority medium
  1.6313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6315 +<action>
  1.6316 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6317 +	<actiontype>DeriveKey</actiontype>
  1.6318 +	<actionbody>
  1.6319 +		<derivekey>
  1.6320 +			<kdf>pkcs#12</kdf>
  1.6321 +			<passwd>0001</passwd>
  1.6322 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6323 +			<iterations>8</iterations>
  1.6324 +			<key>6473EB1244E055149E0858C49FAE7B8DC951E7E32A</key>
  1.6325 +		</derivekey>
  1.6326 +	</actionbody>
  1.6327 +</action>
  1.6328 +
  1.6329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6331 +//! @SYMREQ CIT_PREQ1054
  1.6332 +//! @SYMTestPriority medium
  1.6333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6335 +<action>
  1.6336 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6337 +	<actiontype>DeriveKey</actiontype>
  1.6338 +	<actionbody>
  1.6339 +		<derivekey>
  1.6340 +			<kdf>pkcs#12</kdf>
  1.6341 +			<passwd>PSWD</passwd>
  1.6342 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6343 +			<iterations>8</iterations>
  1.6344 +			<key>AA762B8736D4C37BAD263103CA283E09010B7EFC53</key>
  1.6345 +		</derivekey>
  1.6346 +	</actionbody>
  1.6347 +</action>
  1.6348 +
  1.6349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6351 +//! @SYMREQ CIT_PREQ1054
  1.6352 +//! @SYMTestPriority medium
  1.6353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6355 +<action>
  1.6356 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6357 +	<actiontype>DeriveKey</actiontype>
  1.6358 +	<actionbody>
  1.6359 +		<derivekey>
  1.6360 +			<kdf>pkcs#12</kdf>
  1.6361 +			<passwd>password</passwd>
  1.6362 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6363 +			<iterations>8</iterations>
  1.6364 +			<key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D8</key>
  1.6365 +		</derivekey>
  1.6366 +	</actionbody>
  1.6367 +</action>
  1.6368 +
  1.6369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6371 +//! @SYMREQ CIT_PREQ1054
  1.6372 +//! @SYMTestPriority medium
  1.6373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6375 +<action>
  1.6376 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6377 +	<actiontype>DeriveKey</actiontype>
  1.6378 +	<actionbody>
  1.6379 +		<derivekey>
  1.6380 +			<kdf>pkcs#12</kdf>
  1.6381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6382 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6383 +			<iterations>8</iterations>
  1.6384 +			<key>935593CA370BB6988F2F41D2F4ABF56E433064D83E</key>
  1.6385 +		</derivekey>
  1.6386 +	</actionbody>
  1.6387 +</action>
  1.6388 +
  1.6389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6391 +//! @SYMREQ CIT_PREQ1054
  1.6392 +//! @SYMTestPriority medium
  1.6393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6395 +<action>
  1.6396 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6397 +	<actiontype>DeriveKey</actiontype>
  1.6398 +	<actionbody>
  1.6399 +		<derivekey>
  1.6400 +			<kdf>pkcs#12</kdf>
  1.6401 +			<passwd>0000</passwd>
  1.6402 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6403 +			<iterations>8</iterations>
  1.6404 +			<key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BF</key>
  1.6405 +		</derivekey>
  1.6406 +	</actionbody>
  1.6407 +</action>
  1.6408 +
  1.6409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6411 +//! @SYMREQ CIT_PREQ1054
  1.6412 +//! @SYMTestPriority medium
  1.6413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6415 +<action>
  1.6416 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6417 +	<actiontype>DeriveKey</actiontype>
  1.6418 +	<actionbody>
  1.6419 +		<derivekey>
  1.6420 +			<kdf>pkcs#12</kdf>
  1.6421 +			<passwd>0001</passwd>
  1.6422 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6423 +			<iterations>8</iterations>
  1.6424 +			<key>82B4A13659033EA4025DB51A6CB573F93B03A69634</key>
  1.6425 +		</derivekey>
  1.6426 +	</actionbody>
  1.6427 +</action>
  1.6428 +
  1.6429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6431 +//! @SYMREQ CIT_PREQ1054
  1.6432 +//! @SYMTestPriority medium
  1.6433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6435 +<action>
  1.6436 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6437 +	<actiontype>DeriveKey</actiontype>
  1.6438 +	<actionbody>
  1.6439 +		<derivekey>
  1.6440 +			<kdf>pkcs#12</kdf>
  1.6441 +			<passwd>PSWD</passwd>
  1.6442 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6443 +			<iterations>8</iterations>
  1.6444 +			<key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94</key>
  1.6445 +		</derivekey>
  1.6446 +	</actionbody>
  1.6447 +</action>
  1.6448 +
  1.6449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6451 +//! @SYMREQ CIT_PREQ1054
  1.6452 +//! @SYMTestPriority medium
  1.6453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6455 +<action>
  1.6456 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6457 +	<actiontype>DeriveKey</actiontype>
  1.6458 +	<actionbody>
  1.6459 +		<derivekey>
  1.6460 +			<kdf>pkcs#12</kdf>
  1.6461 +			<passwd>password</passwd>
  1.6462 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6463 +			<iterations>8</iterations>
  1.6464 +			<key>5670457314E405B0ED1583FC4B82FEAD94B434EBED</key>
  1.6465 +		</derivekey>
  1.6466 +	</actionbody>
  1.6467 +</action>
  1.6468 +
  1.6469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6471 +//! @SYMREQ CIT_PREQ1054
  1.6472 +//! @SYMTestPriority medium
  1.6473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6475 +<action>
  1.6476 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6477 +	<actiontype>DeriveKey</actiontype>
  1.6478 +	<actionbody>
  1.6479 +		<derivekey>
  1.6480 +			<kdf>pkcs#12</kdf>
  1.6481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6482 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6483 +			<iterations>8</iterations>
  1.6484 +			<key>1C4CAE25146D74F3762B5C3FD3A917522564855675</key>
  1.6485 +		</derivekey>
  1.6486 +	</actionbody>
  1.6487 +</action>
  1.6488 +
  1.6489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6491 +//! @SYMREQ CIT_PREQ1054
  1.6492 +//! @SYMTestPriority medium
  1.6493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6495 +<action>
  1.6496 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6497 +	<actiontype>DeriveKey</actiontype>
  1.6498 +	<actionbody>
  1.6499 +		<derivekey>
  1.6500 +			<kdf>pkcs#12</kdf>
  1.6501 +			<passwd>0000</passwd>
  1.6502 +			<salt>53414C54</salt>
  1.6503 +			<iterations>128</iterations>
  1.6504 +			<key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93</key>
  1.6505 +		</derivekey>
  1.6506 +	</actionbody>
  1.6507 +</action>
  1.6508 +
  1.6509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6511 +//! @SYMREQ CIT_PREQ1054
  1.6512 +//! @SYMTestPriority medium
  1.6513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6515 +<action>
  1.6516 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6517 +	<actiontype>DeriveKey</actiontype>
  1.6518 +	<actionbody>
  1.6519 +		<derivekey>
  1.6520 +			<kdf>pkcs#12</kdf>
  1.6521 +			<passwd>0001</passwd>
  1.6522 +			<salt>53414C54</salt>
  1.6523 +			<iterations>128</iterations>
  1.6524 +			<key>C89C3A2C9C06626EB831F4BB5262809B9C138181C4</key>
  1.6525 +		</derivekey>
  1.6526 +	</actionbody>
  1.6527 +</action>
  1.6528 +
  1.6529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6531 +//! @SYMREQ CIT_PREQ1054
  1.6532 +//! @SYMTestPriority medium
  1.6533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6535 +<action>
  1.6536 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6537 +	<actiontype>DeriveKey</actiontype>
  1.6538 +	<actionbody>
  1.6539 +		<derivekey>
  1.6540 +			<kdf>pkcs#12</kdf>
  1.6541 +			<passwd>PSWD</passwd>
  1.6542 +			<salt>53414C54</salt>
  1.6543 +			<iterations>128</iterations>
  1.6544 +			<key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EE</key>
  1.6545 +		</derivekey>
  1.6546 +	</actionbody>
  1.6547 +</action>
  1.6548 +
  1.6549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6551 +//! @SYMREQ CIT_PREQ1054
  1.6552 +//! @SYMTestPriority medium
  1.6553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6555 +<action>
  1.6556 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6557 +	<actiontype>DeriveKey</actiontype>
  1.6558 +	<actionbody>
  1.6559 +		<derivekey>
  1.6560 +			<kdf>pkcs#12</kdf>
  1.6561 +			<passwd>password</passwd>
  1.6562 +			<salt>53414C54</salt>
  1.6563 +			<iterations>128</iterations>
  1.6564 +			<key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C</key>
  1.6565 +		</derivekey>
  1.6566 +	</actionbody>
  1.6567 +</action>
  1.6568 +
  1.6569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6571 +//! @SYMREQ CIT_PREQ1054
  1.6572 +//! @SYMTestPriority medium
  1.6573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6575 +<action>
  1.6576 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6577 +	<actiontype>DeriveKey</actiontype>
  1.6578 +	<actionbody>
  1.6579 +		<derivekey>
  1.6580 +			<kdf>pkcs#12</kdf>
  1.6581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6582 +			<salt>53414C54</salt>
  1.6583 +			<iterations>128</iterations>
  1.6584 +			<key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F</key>
  1.6585 +		</derivekey>
  1.6586 +	</actionbody>
  1.6587 +</action>
  1.6588 +
  1.6589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6591 +//! @SYMREQ CIT_PREQ1054
  1.6592 +//! @SYMTestPriority medium
  1.6593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6595 +<action>
  1.6596 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6597 +	<actiontype>DeriveKey</actiontype>
  1.6598 +	<actionbody>
  1.6599 +		<derivekey>
  1.6600 +			<kdf>pkcs#12</kdf>
  1.6601 +			<passwd>0000</passwd>
  1.6602 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6603 +			<iterations>128</iterations>
  1.6604 +			<key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD</key>
  1.6605 +		</derivekey>
  1.6606 +	</actionbody>
  1.6607 +</action>
  1.6608 +
  1.6609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6611 +//! @SYMREQ CIT_PREQ1054
  1.6612 +//! @SYMTestPriority medium
  1.6613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6615 +<action>
  1.6616 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6617 +	<actiontype>DeriveKey</actiontype>
  1.6618 +	<actionbody>
  1.6619 +		<derivekey>
  1.6620 +			<kdf>pkcs#12</kdf>
  1.6621 +			<passwd>0001</passwd>
  1.6622 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6623 +			<iterations>128</iterations>
  1.6624 +			<key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3</key>
  1.6625 +		</derivekey>
  1.6626 +	</actionbody>
  1.6627 +</action>
  1.6628 +
  1.6629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6631 +//! @SYMREQ CIT_PREQ1054
  1.6632 +//! @SYMTestPriority medium
  1.6633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6635 +<action>
  1.6636 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6637 +	<actiontype>DeriveKey</actiontype>
  1.6638 +	<actionbody>
  1.6639 +		<derivekey>
  1.6640 +			<kdf>pkcs#12</kdf>
  1.6641 +			<passwd>PSWD</passwd>
  1.6642 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6643 +			<iterations>128</iterations>
  1.6644 +			<key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF</key>
  1.6645 +		</derivekey>
  1.6646 +	</actionbody>
  1.6647 +</action>
  1.6648 +
  1.6649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6651 +//! @SYMREQ CIT_PREQ1054
  1.6652 +//! @SYMTestPriority medium
  1.6653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6655 +<action>
  1.6656 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6657 +	<actiontype>DeriveKey</actiontype>
  1.6658 +	<actionbody>
  1.6659 +		<derivekey>
  1.6660 +			<kdf>pkcs#12</kdf>
  1.6661 +			<passwd>password</passwd>
  1.6662 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6663 +			<iterations>128</iterations>
  1.6664 +			<key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3</key>
  1.6665 +		</derivekey>
  1.6666 +	</actionbody>
  1.6667 +</action>
  1.6668 +
  1.6669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6671 +//! @SYMREQ CIT_PREQ1054
  1.6672 +//! @SYMTestPriority medium
  1.6673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6675 +<action>
  1.6676 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6677 +	<actiontype>DeriveKey</actiontype>
  1.6678 +	<actionbody>
  1.6679 +		<derivekey>
  1.6680 +			<kdf>pkcs#12</kdf>
  1.6681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6682 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6683 +			<iterations>128</iterations>
  1.6684 +			<key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16</key>
  1.6685 +		</derivekey>
  1.6686 +	</actionbody>
  1.6687 +</action>
  1.6688 +
  1.6689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6691 +//! @SYMREQ CIT_PREQ1054
  1.6692 +//! @SYMTestPriority medium
  1.6693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6695 +<action>
  1.6696 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6697 +	<actiontype>DeriveKey</actiontype>
  1.6698 +	<actionbody>
  1.6699 +		<derivekey>
  1.6700 +			<kdf>pkcs#12</kdf>
  1.6701 +			<passwd>0000</passwd>
  1.6702 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6703 +			<iterations>128</iterations>
  1.6704 +			<key>99FE149183022F9EB2EB815BCC9504E59C524A1497</key>
  1.6705 +		</derivekey>
  1.6706 +	</actionbody>
  1.6707 +</action>
  1.6708 +
  1.6709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6711 +//! @SYMREQ CIT_PREQ1054
  1.6712 +//! @SYMTestPriority medium
  1.6713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6715 +<action>
  1.6716 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6717 +	<actiontype>DeriveKey</actiontype>
  1.6718 +	<actionbody>
  1.6719 +		<derivekey>
  1.6720 +			<kdf>pkcs#12</kdf>
  1.6721 +			<passwd>0001</passwd>
  1.6722 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6723 +			<iterations>128</iterations>
  1.6724 +			<key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FE</key>
  1.6725 +		</derivekey>
  1.6726 +	</actionbody>
  1.6727 +</action>
  1.6728 +
  1.6729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6731 +//! @SYMREQ CIT_PREQ1054
  1.6732 +//! @SYMTestPriority medium
  1.6733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6735 +<action>
  1.6736 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6737 +	<actiontype>DeriveKey</actiontype>
  1.6738 +	<actionbody>
  1.6739 +		<derivekey>
  1.6740 +			<kdf>pkcs#12</kdf>
  1.6741 +			<passwd>PSWD</passwd>
  1.6742 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6743 +			<iterations>128</iterations>
  1.6744 +			<key>22A70A865774E55CF08A70435611252278DCE76AED</key>
  1.6745 +		</derivekey>
  1.6746 +	</actionbody>
  1.6747 +</action>
  1.6748 +
  1.6749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6751 +//! @SYMREQ CIT_PREQ1054
  1.6752 +//! @SYMTestPriority medium
  1.6753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6755 +<action>
  1.6756 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6757 +	<actiontype>DeriveKey</actiontype>
  1.6758 +	<actionbody>
  1.6759 +		<derivekey>
  1.6760 +			<kdf>pkcs#12</kdf>
  1.6761 +			<passwd>password</passwd>
  1.6762 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6763 +			<iterations>128</iterations>
  1.6764 +			<key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C67</key>
  1.6765 +		</derivekey>
  1.6766 +	</actionbody>
  1.6767 +</action>
  1.6768 +
  1.6769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6771 +//! @SYMREQ CIT_PREQ1054
  1.6772 +//! @SYMTestPriority medium
  1.6773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6775 +<action>
  1.6776 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6777 +	<actiontype>DeriveKey</actiontype>
  1.6778 +	<actionbody>
  1.6779 +		<derivekey>
  1.6780 +			<kdf>pkcs#12</kdf>
  1.6781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6782 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.6783 +			<iterations>128</iterations>
  1.6784 +			<key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CE</key>
  1.6785 +		</derivekey>
  1.6786 +	</actionbody>
  1.6787 +</action>
  1.6788 +
  1.6789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6791 +//! @SYMREQ CIT_PREQ1054
  1.6792 +//! @SYMTestPriority medium
  1.6793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6795 +<action>
  1.6796 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6797 +	<actiontype>DeriveKey</actiontype>
  1.6798 +	<actionbody>
  1.6799 +		<derivekey>
  1.6800 +			<kdf>pkcs#12</kdf>
  1.6801 +			<passwd>0000</passwd>
  1.6802 +			<salt>53414C54</salt>
  1.6803 +			<iterations>1024</iterations>
  1.6804 +			<key>82824BE51C81A5FF4C4268E256F6621B9656325BEF</key>
  1.6805 +		</derivekey>
  1.6806 +	</actionbody>
  1.6807 +</action>
  1.6808 +
  1.6809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6811 +//! @SYMREQ CIT_PREQ1054
  1.6812 +//! @SYMTestPriority medium
  1.6813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6815 +<action>
  1.6816 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6817 +	<actiontype>DeriveKey</actiontype>
  1.6818 +	<actionbody>
  1.6819 +		<derivekey>
  1.6820 +			<kdf>pkcs#12</kdf>
  1.6821 +			<passwd>0001</passwd>
  1.6822 +			<salt>53414C54</salt>
  1.6823 +			<iterations>1024</iterations>
  1.6824 +			<key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2</key>
  1.6825 +		</derivekey>
  1.6826 +	</actionbody>
  1.6827 +</action>
  1.6828 +
  1.6829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6831 +//! @SYMREQ CIT_PREQ1054
  1.6832 +//! @SYMTestPriority medium
  1.6833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6835 +<action>
  1.6836 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6837 +	<actiontype>DeriveKey</actiontype>
  1.6838 +	<actionbody>
  1.6839 +		<derivekey>
  1.6840 +			<kdf>pkcs#12</kdf>
  1.6841 +			<passwd>PSWD</passwd>
  1.6842 +			<salt>53414C54</salt>
  1.6843 +			<iterations>1024</iterations>
  1.6844 +			<key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE</key>
  1.6845 +		</derivekey>
  1.6846 +	</actionbody>
  1.6847 +</action>
  1.6848 +
  1.6849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6851 +//! @SYMREQ CIT_PREQ1054
  1.6852 +//! @SYMTestPriority medium
  1.6853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6855 +<action>
  1.6856 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6857 +	<actiontype>DeriveKey</actiontype>
  1.6858 +	<actionbody>
  1.6859 +		<derivekey>
  1.6860 +			<kdf>pkcs#12</kdf>
  1.6861 +			<passwd>password</passwd>
  1.6862 +			<salt>53414C54</salt>
  1.6863 +			<iterations>1024</iterations>
  1.6864 +			<key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E84</key>
  1.6865 +		</derivekey>
  1.6866 +	</actionbody>
  1.6867 +</action>
  1.6868 +
  1.6869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6871 +//! @SYMREQ CIT_PREQ1054
  1.6872 +//! @SYMTestPriority medium
  1.6873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6875 +<action>
  1.6876 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.6877 +	<actiontype>DeriveKey</actiontype>
  1.6878 +	<actionbody>
  1.6879 +		<derivekey>
  1.6880 +			<kdf>pkcs#12</kdf>
  1.6881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6882 +			<salt>53414C54</salt>
  1.6883 +			<iterations>1024</iterations>
  1.6884 +			<key>406C92305ACD663AB0B9EB66DED7929547C692FE11</key>
  1.6885 +		</derivekey>
  1.6886 +	</actionbody>
  1.6887 +</action>
  1.6888 +
  1.6889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6891 +//! @SYMREQ CIT_PREQ1054
  1.6892 +//! @SYMTestPriority medium
  1.6893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6895 +<action>
  1.6896 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6897 +	<actiontype>DeriveKey</actiontype>
  1.6898 +	<actionbody>
  1.6899 +		<derivekey>
  1.6900 +			<kdf>pkcs#12</kdf>
  1.6901 +			<passwd>0000</passwd>
  1.6902 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6903 +			<iterations>1024</iterations>
  1.6904 +			<key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355</key>
  1.6905 +		</derivekey>
  1.6906 +	</actionbody>
  1.6907 +</action>
  1.6908 +
  1.6909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6911 +//! @SYMREQ CIT_PREQ1054
  1.6912 +//! @SYMTestPriority medium
  1.6913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6915 +<action>
  1.6916 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6917 +	<actiontype>DeriveKey</actiontype>
  1.6918 +	<actionbody>
  1.6919 +		<derivekey>
  1.6920 +			<kdf>pkcs#12</kdf>
  1.6921 +			<passwd>0001</passwd>
  1.6922 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6923 +			<iterations>1024</iterations>
  1.6924 +			<key>0182E41FCA166CEAED10972BDF5F57A8F851200E37</key>
  1.6925 +		</derivekey>
  1.6926 +	</actionbody>
  1.6927 +</action>
  1.6928 +
  1.6929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6931 +//! @SYMREQ CIT_PREQ1054
  1.6932 +//! @SYMTestPriority medium
  1.6933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6935 +<action>
  1.6936 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6937 +	<actiontype>DeriveKey</actiontype>
  1.6938 +	<actionbody>
  1.6939 +		<derivekey>
  1.6940 +			<kdf>pkcs#12</kdf>
  1.6941 +			<passwd>PSWD</passwd>
  1.6942 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6943 +			<iterations>1024</iterations>
  1.6944 +			<key>101FB775982CA15E37A065F7CDC5593DE385BDF504</key>
  1.6945 +		</derivekey>
  1.6946 +	</actionbody>
  1.6947 +</action>
  1.6948 +
  1.6949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6951 +//! @SYMREQ CIT_PREQ1054
  1.6952 +//! @SYMTestPriority medium
  1.6953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6955 +<action>
  1.6956 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6957 +	<actiontype>DeriveKey</actiontype>
  1.6958 +	<actionbody>
  1.6959 +		<derivekey>
  1.6960 +			<kdf>pkcs#12</kdf>
  1.6961 +			<passwd>password</passwd>
  1.6962 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6963 +			<iterations>1024</iterations>
  1.6964 +			<key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B614</key>
  1.6965 +		</derivekey>
  1.6966 +	</actionbody>
  1.6967 +</action>
  1.6968 +
  1.6969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6971 +//! @SYMREQ CIT_PREQ1054
  1.6972 +//! @SYMTestPriority medium
  1.6973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6975 +<action>
  1.6976 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.6977 +	<actiontype>DeriveKey</actiontype>
  1.6978 +	<actionbody>
  1.6979 +		<derivekey>
  1.6980 +			<kdf>pkcs#12</kdf>
  1.6981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.6982 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.6983 +			<iterations>1024</iterations>
  1.6984 +			<key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95</key>
  1.6985 +		</derivekey>
  1.6986 +	</actionbody>
  1.6987 +</action>
  1.6988 +
  1.6989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.6990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.6991 +//! @SYMREQ CIT_PREQ1054
  1.6992 +//! @SYMTestPriority medium
  1.6993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.6994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.6995 +<action>
  1.6996 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.6997 +	<actiontype>DeriveKey</actiontype>
  1.6998 +	<actionbody>
  1.6999 +		<derivekey>
  1.7000 +			<kdf>pkcs#12</kdf>
  1.7001 +			<passwd>0000</passwd>
  1.7002 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7003 +			<iterations>1024</iterations>
  1.7004 +			<key>6789F0680A5C5840B8ED34B061494171E6407643F9</key>
  1.7005 +		</derivekey>
  1.7006 +	</actionbody>
  1.7007 +</action>
  1.7008 +
  1.7009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7011 +//! @SYMREQ CIT_PREQ1054
  1.7012 +//! @SYMTestPriority medium
  1.7013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7015 +<action>
  1.7016 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7017 +	<actiontype>DeriveKey</actiontype>
  1.7018 +	<actionbody>
  1.7019 +		<derivekey>
  1.7020 +			<kdf>pkcs#12</kdf>
  1.7021 +			<passwd>0001</passwd>
  1.7022 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7023 +			<iterations>1024</iterations>
  1.7024 +			<key>43E663725870C4801A917C41C9B58C419933A93475</key>
  1.7025 +		</derivekey>
  1.7026 +	</actionbody>
  1.7027 +</action>
  1.7028 +
  1.7029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7031 +//! @SYMREQ CIT_PREQ1054
  1.7032 +//! @SYMTestPriority medium
  1.7033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7035 +<action>
  1.7036 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7037 +	<actiontype>DeriveKey</actiontype>
  1.7038 +	<actionbody>
  1.7039 +		<derivekey>
  1.7040 +			<kdf>pkcs#12</kdf>
  1.7041 +			<passwd>PSWD</passwd>
  1.7042 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7043 +			<iterations>1024</iterations>
  1.7044 +			<key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5</key>
  1.7045 +		</derivekey>
  1.7046 +	</actionbody>
  1.7047 +</action>
  1.7048 +
  1.7049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7051 +//! @SYMREQ CIT_PREQ1054
  1.7052 +//! @SYMTestPriority medium
  1.7053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7055 +<action>
  1.7056 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7057 +	<actiontype>DeriveKey</actiontype>
  1.7058 +	<actionbody>
  1.7059 +		<derivekey>
  1.7060 +			<kdf>pkcs#12</kdf>
  1.7061 +			<passwd>password</passwd>
  1.7062 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7063 +			<iterations>1024</iterations>
  1.7064 +			<key>CA202602C9A265559B6B96729B574DAA9B6D67036F</key>
  1.7065 +		</derivekey>
  1.7066 +	</actionbody>
  1.7067 +</action>
  1.7068 +
  1.7069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7071 +//! @SYMREQ CIT_PREQ1054
  1.7072 +//! @SYMTestPriority medium
  1.7073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7075 +<action>
  1.7076 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7077 +	<actiontype>DeriveKey</actiontype>
  1.7078 +	<actionbody>
  1.7079 +		<derivekey>
  1.7080 +			<kdf>pkcs#12</kdf>
  1.7081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7082 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7083 +			<iterations>1024</iterations>
  1.7084 +			<key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D468</key>
  1.7085 +		</derivekey>
  1.7086 +	</actionbody>
  1.7087 +</action>
  1.7088 +
  1.7089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7091 +//! @SYMREQ CIT_PREQ1054
  1.7092 +//! @SYMTestPriority medium
  1.7093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7095 +<action>
  1.7096 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7097 +	<actiontype>DeriveKey</actiontype>
  1.7098 +	<actionbody>
  1.7099 +		<derivekey>
  1.7100 +			<kdf>pkcs#12</kdf>
  1.7101 +			<passwd>0000</passwd>
  1.7102 +			<salt>53414C54</salt>
  1.7103 +			<iterations>1536</iterations>
  1.7104 +			<key>79A4E1398F511B262E60DCFE9E838C938B806716A9</key>
  1.7105 +		</derivekey>
  1.7106 +	</actionbody>
  1.7107 +</action>
  1.7108 +
  1.7109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7111 +//! @SYMREQ CIT_PREQ1054
  1.7112 +//! @SYMTestPriority medium
  1.7113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7115 +<action>
  1.7116 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7117 +	<actiontype>DeriveKey</actiontype>
  1.7118 +	<actionbody>
  1.7119 +		<derivekey>
  1.7120 +			<kdf>pkcs#12</kdf>
  1.7121 +			<passwd>0001</passwd>
  1.7122 +			<salt>53414C54</salt>
  1.7123 +			<iterations>1536</iterations>
  1.7124 +			<key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D2</key>
  1.7125 +		</derivekey>
  1.7126 +	</actionbody>
  1.7127 +</action>
  1.7128 +
  1.7129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7131 +//! @SYMREQ CIT_PREQ1054
  1.7132 +//! @SYMTestPriority medium
  1.7133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7135 +<action>
  1.7136 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7137 +	<actiontype>DeriveKey</actiontype>
  1.7138 +	<actionbody>
  1.7139 +		<derivekey>
  1.7140 +			<kdf>pkcs#12</kdf>
  1.7141 +			<passwd>PSWD</passwd>
  1.7142 +			<salt>53414C54</salt>
  1.7143 +			<iterations>1536</iterations>
  1.7144 +			<key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E6</key>
  1.7145 +		</derivekey>
  1.7146 +	</actionbody>
  1.7147 +</action>
  1.7148 +
  1.7149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7151 +//! @SYMREQ CIT_PREQ1054
  1.7152 +//! @SYMTestPriority medium
  1.7153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7155 +<action>
  1.7156 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7157 +	<actiontype>DeriveKey</actiontype>
  1.7158 +	<actionbody>
  1.7159 +		<derivekey>
  1.7160 +			<kdf>pkcs#12</kdf>
  1.7161 +			<passwd>password</passwd>
  1.7162 +			<salt>53414C54</salt>
  1.7163 +			<iterations>1536</iterations>
  1.7164 +			<key>65B27A78C72DFEEA6C92846330CE98C6721909E89B</key>
  1.7165 +		</derivekey>
  1.7166 +	</actionbody>
  1.7167 +</action>
  1.7168 +
  1.7169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7171 +//! @SYMREQ CIT_PREQ1054
  1.7172 +//! @SYMTestPriority medium
  1.7173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7175 +<action>
  1.7176 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7177 +	<actiontype>DeriveKey</actiontype>
  1.7178 +	<actionbody>
  1.7179 +		<derivekey>
  1.7180 +			<kdf>pkcs#12</kdf>
  1.7181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7182 +			<salt>53414C54</salt>
  1.7183 +			<iterations>1536</iterations>
  1.7184 +			<key>8F8FC96A3D958731780B50E843D6BB65137A0728C3</key>
  1.7185 +		</derivekey>
  1.7186 +	</actionbody>
  1.7187 +</action>
  1.7188 +
  1.7189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7191 +//! @SYMREQ CIT_PREQ1054
  1.7192 +//! @SYMTestPriority medium
  1.7193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7195 +<action>
  1.7196 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7197 +	<actiontype>DeriveKey</actiontype>
  1.7198 +	<actionbody>
  1.7199 +		<derivekey>
  1.7200 +			<kdf>pkcs#12</kdf>
  1.7201 +			<passwd>0000</passwd>
  1.7202 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7203 +			<iterations>1536</iterations>
  1.7204 +			<key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25</key>
  1.7205 +		</derivekey>
  1.7206 +	</actionbody>
  1.7207 +</action>
  1.7208 +
  1.7209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7211 +//! @SYMREQ CIT_PREQ1054
  1.7212 +//! @SYMTestPriority medium
  1.7213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7215 +<action>
  1.7216 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7217 +	<actiontype>DeriveKey</actiontype>
  1.7218 +	<actionbody>
  1.7219 +		<derivekey>
  1.7220 +			<kdf>pkcs#12</kdf>
  1.7221 +			<passwd>0001</passwd>
  1.7222 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7223 +			<iterations>1536</iterations>
  1.7224 +			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB4</key>
  1.7225 +		</derivekey>
  1.7226 +	</actionbody>
  1.7227 +</action>
  1.7228 +
  1.7229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7231 +//! @SYMREQ CIT_PREQ1054
  1.7232 +//! @SYMTestPriority medium
  1.7233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7235 +<action>
  1.7236 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7237 +	<actiontype>DeriveKey</actiontype>
  1.7238 +	<actionbody>
  1.7239 +		<derivekey>
  1.7240 +			<kdf>pkcs#12</kdf>
  1.7241 +			<passwd>PSWD</passwd>
  1.7242 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7243 +			<iterations>1536</iterations>
  1.7244 +			<key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0C</key>
  1.7245 +		</derivekey>
  1.7246 +	</actionbody>
  1.7247 +</action>
  1.7248 +
  1.7249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7251 +//! @SYMREQ CIT_PREQ1054
  1.7252 +//! @SYMTestPriority medium
  1.7253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7255 +<action>
  1.7256 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7257 +	<actiontype>DeriveKey</actiontype>
  1.7258 +	<actionbody>
  1.7259 +		<derivekey>
  1.7260 +			<kdf>pkcs#12</kdf>
  1.7261 +			<passwd>password</passwd>
  1.7262 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7263 +			<iterations>1536</iterations>
  1.7264 +			<key>C05FE26245C742CC01B23C655E5D934D734610DE01</key>
  1.7265 +		</derivekey>
  1.7266 +	</actionbody>
  1.7267 +</action>
  1.7268 +
  1.7269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7271 +//! @SYMREQ CIT_PREQ1054
  1.7272 +//! @SYMTestPriority medium
  1.7273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7275 +<action>
  1.7276 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7277 +	<actiontype>DeriveKey</actiontype>
  1.7278 +	<actionbody>
  1.7279 +		<derivekey>
  1.7280 +			<kdf>pkcs#12</kdf>
  1.7281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7282 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7283 +			<iterations>1536</iterations>
  1.7284 +			<key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0</key>
  1.7285 +		</derivekey>
  1.7286 +	</actionbody>
  1.7287 +</action>
  1.7288 +
  1.7289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7291 +//! @SYMREQ CIT_PREQ1054
  1.7292 +//! @SYMTestPriority medium
  1.7293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7295 +<action>
  1.7296 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7297 +	<actiontype>DeriveKey</actiontype>
  1.7298 +	<actionbody>
  1.7299 +		<derivekey>
  1.7300 +			<kdf>pkcs#12</kdf>
  1.7301 +			<passwd>0000</passwd>
  1.7302 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7303 +			<iterations>1536</iterations>
  1.7304 +			<key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3</key>
  1.7305 +		</derivekey>
  1.7306 +	</actionbody>
  1.7307 +</action>
  1.7308 +
  1.7309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7311 +//! @SYMREQ CIT_PREQ1054
  1.7312 +//! @SYMTestPriority medium
  1.7313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7315 +<action>
  1.7316 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7317 +	<actiontype>DeriveKey</actiontype>
  1.7318 +	<actionbody>
  1.7319 +		<derivekey>
  1.7320 +			<kdf>pkcs#12</kdf>
  1.7321 +			<passwd>0001</passwd>
  1.7322 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7323 +			<iterations>1536</iterations>
  1.7324 +			<key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA</key>
  1.7325 +		</derivekey>
  1.7326 +	</actionbody>
  1.7327 +</action>
  1.7328 +
  1.7329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7331 +//! @SYMREQ CIT_PREQ1054
  1.7332 +//! @SYMTestPriority medium
  1.7333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7335 +<action>
  1.7336 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7337 +	<actiontype>DeriveKey</actiontype>
  1.7338 +	<actionbody>
  1.7339 +		<derivekey>
  1.7340 +			<kdf>pkcs#12</kdf>
  1.7341 +			<passwd>PSWD</passwd>
  1.7342 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7343 +			<iterations>1536</iterations>
  1.7344 +			<key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA</key>
  1.7345 +		</derivekey>
  1.7346 +	</actionbody>
  1.7347 +</action>
  1.7348 +
  1.7349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7351 +//! @SYMREQ CIT_PREQ1054
  1.7352 +//! @SYMTestPriority medium
  1.7353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7355 +<action>
  1.7356 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7357 +	<actiontype>DeriveKey</actiontype>
  1.7358 +	<actionbody>
  1.7359 +		<derivekey>
  1.7360 +			<kdf>pkcs#12</kdf>
  1.7361 +			<passwd>password</passwd>
  1.7362 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7363 +			<iterations>1536</iterations>
  1.7364 +			<key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD4</key>
  1.7365 +		</derivekey>
  1.7366 +	</actionbody>
  1.7367 +</action>
  1.7368 +
  1.7369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7371 +//! @SYMREQ CIT_PREQ1054
  1.7372 +//! @SYMTestPriority medium
  1.7373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7375 +<action>
  1.7376 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7377 +	<actiontype>DeriveKey</actiontype>
  1.7378 +	<actionbody>
  1.7379 +		<derivekey>
  1.7380 +			<kdf>pkcs#12</kdf>
  1.7381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7382 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7383 +			<iterations>1536</iterations>
  1.7384 +			<key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B2</key>
  1.7385 +		</derivekey>
  1.7386 +	</actionbody>
  1.7387 +</action>
  1.7388 +
  1.7389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7391 +//! @SYMREQ CIT_PREQ1054
  1.7392 +//! @SYMTestPriority medium
  1.7393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7395 +<action>
  1.7396 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7397 +	<actiontype>DeriveKey</actiontype>
  1.7398 +	<actionbody>
  1.7399 +		<derivekey>
  1.7400 +			<kdf>pkcs#12</kdf>
  1.7401 +			<passwd>0000</passwd>
  1.7402 +			<salt>53414C54</salt>
  1.7403 +			<iterations>2048</iterations>
  1.7404 +			<key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCD</key>
  1.7405 +		</derivekey>
  1.7406 +	</actionbody>
  1.7407 +</action>
  1.7408 +
  1.7409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7411 +//! @SYMREQ CIT_PREQ1054
  1.7412 +//! @SYMTestPriority medium
  1.7413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7415 +<action>
  1.7416 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7417 +	<actiontype>DeriveKey</actiontype>
  1.7418 +	<actionbody>
  1.7419 +		<derivekey>
  1.7420 +			<kdf>pkcs#12</kdf>
  1.7421 +			<passwd>0001</passwd>
  1.7422 +			<salt>53414C54</salt>
  1.7423 +			<iterations>2048</iterations>
  1.7424 +			<key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2</key>
  1.7425 +		</derivekey>
  1.7426 +	</actionbody>
  1.7427 +</action>
  1.7428 +
  1.7429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7431 +//! @SYMREQ CIT_PREQ1054
  1.7432 +//! @SYMTestPriority medium
  1.7433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7435 +<action>
  1.7436 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7437 +	<actiontype>DeriveKey</actiontype>
  1.7438 +	<actionbody>
  1.7439 +		<derivekey>
  1.7440 +			<kdf>pkcs#12</kdf>
  1.7441 +			<passwd>PSWD</passwd>
  1.7442 +			<salt>53414C54</salt>
  1.7443 +			<iterations>2048</iterations>
  1.7444 +			<key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2</key>
  1.7445 +		</derivekey>
  1.7446 +	</actionbody>
  1.7447 +</action>
  1.7448 +
  1.7449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7451 +//! @SYMREQ CIT_PREQ1054
  1.7452 +//! @SYMTestPriority medium
  1.7453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7455 +<action>
  1.7456 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7457 +	<actiontype>DeriveKey</actiontype>
  1.7458 +	<actionbody>
  1.7459 +		<derivekey>
  1.7460 +			<kdf>pkcs#12</kdf>
  1.7461 +			<passwd>password</passwd>
  1.7462 +			<salt>53414C54</salt>
  1.7463 +			<iterations>2048</iterations>
  1.7464 +			<key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D9</key>
  1.7465 +		</derivekey>
  1.7466 +	</actionbody>
  1.7467 +</action>
  1.7468 +
  1.7469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7471 +//! @SYMREQ CIT_PREQ1054
  1.7472 +//! @SYMTestPriority medium
  1.7473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7475 +<action>
  1.7476 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  1.7477 +	<actiontype>DeriveKey</actiontype>
  1.7478 +	<actionbody>
  1.7479 +		<derivekey>
  1.7480 +			<kdf>pkcs#12</kdf>
  1.7481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7482 +			<salt>53414C54</salt>
  1.7483 +			<iterations>2048</iterations>
  1.7484 +			<key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45</key>
  1.7485 +		</derivekey>
  1.7486 +	</actionbody>
  1.7487 +</action>
  1.7488 +
  1.7489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7491 +//! @SYMREQ CIT_PREQ1054
  1.7492 +//! @SYMTestPriority medium
  1.7493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7495 +<action>
  1.7496 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7497 +	<actiontype>DeriveKey</actiontype>
  1.7498 +	<actionbody>
  1.7499 +		<derivekey>
  1.7500 +			<kdf>pkcs#12</kdf>
  1.7501 +			<passwd>0000</passwd>
  1.7502 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7503 +			<iterations>2048</iterations>
  1.7504 +			<key>CD045229461658BC6C47C259F2D20433173DE4D31E</key>
  1.7505 +		</derivekey>
  1.7506 +	</actionbody>
  1.7507 +</action>
  1.7508 +
  1.7509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7511 +//! @SYMREQ CIT_PREQ1054
  1.7512 +//! @SYMTestPriority medium
  1.7513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7515 +<action>
  1.7516 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7517 +	<actiontype>DeriveKey</actiontype>
  1.7518 +	<actionbody>
  1.7519 +		<derivekey>
  1.7520 +			<kdf>pkcs#12</kdf>
  1.7521 +			<passwd>0001</passwd>
  1.7522 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7523 +			<iterations>2048</iterations>
  1.7524 +			<key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6D</key>
  1.7525 +		</derivekey>
  1.7526 +	</actionbody>
  1.7527 +</action>
  1.7528 +
  1.7529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7531 +//! @SYMREQ CIT_PREQ1054
  1.7532 +//! @SYMTestPriority medium
  1.7533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7535 +<action>
  1.7536 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7537 +	<actiontype>DeriveKey</actiontype>
  1.7538 +	<actionbody>
  1.7539 +		<derivekey>
  1.7540 +			<kdf>pkcs#12</kdf>
  1.7541 +			<passwd>PSWD</passwd>
  1.7542 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7543 +			<iterations>2048</iterations>
  1.7544 +			<key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC</key>
  1.7545 +		</derivekey>
  1.7546 +	</actionbody>
  1.7547 +</action>
  1.7548 +
  1.7549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7551 +//! @SYMREQ CIT_PREQ1054
  1.7552 +//! @SYMTestPriority medium
  1.7553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7555 +<action>
  1.7556 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7557 +	<actiontype>DeriveKey</actiontype>
  1.7558 +	<actionbody>
  1.7559 +		<derivekey>
  1.7560 +			<kdf>pkcs#12</kdf>
  1.7561 +			<passwd>password</passwd>
  1.7562 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7563 +			<iterations>2048</iterations>
  1.7564 +			<key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B</key>
  1.7565 +		</derivekey>
  1.7566 +	</actionbody>
  1.7567 +</action>
  1.7568 +
  1.7569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7571 +//! @SYMREQ CIT_PREQ1054
  1.7572 +//! @SYMTestPriority medium
  1.7573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7575 +<action>
  1.7576 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  1.7577 +	<actiontype>DeriveKey</actiontype>
  1.7578 +	<actionbody>
  1.7579 +		<derivekey>
  1.7580 +			<kdf>pkcs#12</kdf>
  1.7581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7582 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7583 +			<iterations>2048</iterations>
  1.7584 +			<key>A5B348EB4926290B223724CC8E4ED67FF458F23622</key>
  1.7585 +		</derivekey>
  1.7586 +	</actionbody>
  1.7587 +</action>
  1.7588 +
  1.7589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7591 +//! @SYMREQ CIT_PREQ1054
  1.7592 +//! @SYMTestPriority medium
  1.7593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7595 +<action>
  1.7596 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7597 +	<actiontype>DeriveKey</actiontype>
  1.7598 +	<actionbody>
  1.7599 +		<derivekey>
  1.7600 +			<kdf>pkcs#12</kdf>
  1.7601 +			<passwd>0000</passwd>
  1.7602 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7603 +			<iterations>2048</iterations>
  1.7604 +			<key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A25</key>
  1.7605 +		</derivekey>
  1.7606 +	</actionbody>
  1.7607 +</action>
  1.7608 +
  1.7609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7611 +//! @SYMREQ CIT_PREQ1054
  1.7612 +//! @SYMTestPriority medium
  1.7613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7615 +<action>
  1.7616 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7617 +	<actiontype>DeriveKey</actiontype>
  1.7618 +	<actionbody>
  1.7619 +		<derivekey>
  1.7620 +			<kdf>pkcs#12</kdf>
  1.7621 +			<passwd>0001</passwd>
  1.7622 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7623 +			<iterations>2048</iterations>
  1.7624 +			<key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE1360</key>
  1.7625 +		</derivekey>
  1.7626 +	</actionbody>
  1.7627 +</action>
  1.7628 +
  1.7629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7631 +//! @SYMREQ CIT_PREQ1054
  1.7632 +//! @SYMTestPriority medium
  1.7633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7635 +<action>
  1.7636 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7637 +	<actiontype>DeriveKey</actiontype>
  1.7638 +	<actionbody>
  1.7639 +		<derivekey>
  1.7640 +			<kdf>pkcs#12</kdf>
  1.7641 +			<passwd>PSWD</passwd>
  1.7642 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7643 +			<iterations>2048</iterations>
  1.7644 +			<key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2</key>
  1.7645 +		</derivekey>
  1.7646 +	</actionbody>
  1.7647 +</action>
  1.7648 +
  1.7649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7651 +//! @SYMREQ CIT_PREQ1054
  1.7652 +//! @SYMTestPriority medium
  1.7653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7655 +<action>
  1.7656 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7657 +	<actiontype>DeriveKey</actiontype>
  1.7658 +	<actionbody>
  1.7659 +		<derivekey>
  1.7660 +			<kdf>pkcs#12</kdf>
  1.7661 +			<passwd>password</passwd>
  1.7662 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7663 +			<iterations>2048</iterations>
  1.7664 +			<key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF0</key>
  1.7665 +		</derivekey>
  1.7666 +	</actionbody>
  1.7667 +</action>
  1.7668 +
  1.7669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7671 +//! @SYMREQ CIT_PREQ1054
  1.7672 +//! @SYMTestPriority medium
  1.7673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7675 +<action>
  1.7676 +	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  1.7677 +	<actiontype>DeriveKey</actiontype>
  1.7678 +	<actionbody>
  1.7679 +		<derivekey>
  1.7680 +			<kdf>pkcs#12</kdf>
  1.7681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7682 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7683 +			<iterations>2048</iterations>
  1.7684 +			<key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1</key>
  1.7685 +		</derivekey>
  1.7686 +	</actionbody>
  1.7687 +</action>
  1.7688 +
  1.7689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7691 +//! @SYMREQ CIT_PREQ1054
  1.7692 +//! @SYMTestPriority medium
  1.7693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7695 +<action>
  1.7696 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.7697 +	<actiontype>DeriveKey</actiontype>
  1.7698 +	<actionbody>
  1.7699 +		<derivekey>
  1.7700 +			<kdf>pkcs#12</kdf>
  1.7701 +			<passwd>0000</passwd>
  1.7702 +			<salt>53414C54</salt>
  1.7703 +			<iterations>1</iterations>
  1.7704 +			<key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7FB67481AA26FAE2392310DEEF5BA9CB27DCE2D3FB11C95109E</key>
  1.7705 +		</derivekey>
  1.7706 +	</actionbody>
  1.7707 +</action>
  1.7708 +
  1.7709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7711 +//! @SYMREQ CIT_PREQ1054
  1.7712 +//! @SYMTestPriority medium
  1.7713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7715 +<action>
  1.7716 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.7717 +	<actiontype>DeriveKey</actiontype>
  1.7718 +	<actionbody>
  1.7719 +		<derivekey>
  1.7720 +			<kdf>pkcs#12</kdf>
  1.7721 +			<passwd>0001</passwd>
  1.7722 +			<salt>53414C54</salt>
  1.7723 +			<iterations>1</iterations>
  1.7724 +			<key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B5FC87F188064903840A07BEA1540D4397A8C3BF85454D5EAEF</key>
  1.7725 +		</derivekey>
  1.7726 +	</actionbody>
  1.7727 +</action>
  1.7728 +
  1.7729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7731 +//! @SYMREQ CIT_PREQ1054
  1.7732 +//! @SYMTestPriority medium
  1.7733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7735 +<action>
  1.7736 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.7737 +	<actiontype>DeriveKey</actiontype>
  1.7738 +	<actionbody>
  1.7739 +		<derivekey>
  1.7740 +			<kdf>pkcs#12</kdf>
  1.7741 +			<passwd>PSWD</passwd>
  1.7742 +			<salt>53414C54</salt>
  1.7743 +			<iterations>1</iterations>
  1.7744 +			<key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB0959936E4C6D9ED338B321B97C02E22A12E67A249DF5FFBB5F09E01</key>
  1.7745 +		</derivekey>
  1.7746 +	</actionbody>
  1.7747 +</action>
  1.7748 +
  1.7749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7751 +//! @SYMREQ CIT_PREQ1054
  1.7752 +//! @SYMTestPriority medium
  1.7753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7755 +<action>
  1.7756 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.7757 +	<actiontype>DeriveKey</actiontype>
  1.7758 +	<actionbody>
  1.7759 +		<derivekey>
  1.7760 +			<kdf>pkcs#12</kdf>
  1.7761 +			<passwd>password</passwd>
  1.7762 +			<salt>53414C54</salt>
  1.7763 +			<iterations>1</iterations>
  1.7764 +			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C596AEC2CBF2648BC315B5422D9071708C31F2FCC6D7AC48ED63</key>
  1.7765 +		</derivekey>
  1.7766 +	</actionbody>
  1.7767 +</action>
  1.7768 +
  1.7769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7771 +//! @SYMREQ CIT_PREQ1054
  1.7772 +//! @SYMTestPriority medium
  1.7773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7775 +<action>
  1.7776 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.7777 +	<actiontype>DeriveKey</actiontype>
  1.7778 +	<actionbody>
  1.7779 +		<derivekey>
  1.7780 +			<kdf>pkcs#12</kdf>
  1.7781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7782 +			<salt>53414C54</salt>
  1.7783 +			<iterations>1</iterations>
  1.7784 +			<key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A655F8AB429B72644AA7EE4C3FA31141DACFEB8D89E1825091F</key>
  1.7785 +		</derivekey>
  1.7786 +	</actionbody>
  1.7787 +</action>
  1.7788 +
  1.7789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7791 +//! @SYMREQ CIT_PREQ1054
  1.7792 +//! @SYMTestPriority medium
  1.7793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7795 +<action>
  1.7796 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.7797 +	<actiontype>DeriveKey</actiontype>
  1.7798 +	<actionbody>
  1.7799 +		<derivekey>
  1.7800 +			<kdf>pkcs#12</kdf>
  1.7801 +			<passwd>0000</passwd>
  1.7802 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7803 +			<iterations>1</iterations>
  1.7804 +			<key>49CABE7B67736931126499722509C03D4BBEF714A80CCCCF475F4CA3FCBC217CAFA6AFF894CEA28E0DCD7B5A0D0D</key>
  1.7805 +		</derivekey>
  1.7806 +	</actionbody>
  1.7807 +</action>
  1.7808 +
  1.7809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7811 +//! @SYMREQ CIT_PREQ1054
  1.7812 +//! @SYMTestPriority medium
  1.7813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7815 +<action>
  1.7816 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.7817 +	<actiontype>DeriveKey</actiontype>
  1.7818 +	<actionbody>
  1.7819 +		<derivekey>
  1.7820 +			<kdf>pkcs#12</kdf>
  1.7821 +			<passwd>0001</passwd>
  1.7822 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7823 +			<iterations>1</iterations>
  1.7824 +			<key>F994B990D3554AFB778C729E9BAA0CC6EB5BA765340999DE8474B918B754A380F8141A055CD68B85B4CDCC592ED9</key>
  1.7825 +		</derivekey>
  1.7826 +	</actionbody>
  1.7827 +</action>
  1.7828 +
  1.7829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7831 +//! @SYMREQ CIT_PREQ1054
  1.7832 +//! @SYMTestPriority medium
  1.7833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7835 +<action>
  1.7836 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.7837 +	<actiontype>DeriveKey</actiontype>
  1.7838 +	<actionbody>
  1.7839 +		<derivekey>
  1.7840 +			<kdf>pkcs#12</kdf>
  1.7841 +			<passwd>PSWD</passwd>
  1.7842 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7843 +			<iterations>1</iterations>
  1.7844 +			<key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC0246300C1BDD916C1EF496E57D589FB2C357D7EF9142AB64B2E02</key>
  1.7845 +		</derivekey>
  1.7846 +	</actionbody>
  1.7847 +</action>
  1.7848 +
  1.7849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7851 +//! @SYMREQ CIT_PREQ1054
  1.7852 +//! @SYMTestPriority medium
  1.7853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7855 +<action>
  1.7856 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.7857 +	<actiontype>DeriveKey</actiontype>
  1.7858 +	<actionbody>
  1.7859 +		<derivekey>
  1.7860 +			<kdf>pkcs#12</kdf>
  1.7861 +			<passwd>password</passwd>
  1.7862 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7863 +			<iterations>1</iterations>
  1.7864 +			<key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888F04507B6810813D6DDAF8E0257911B49AB5250127C50809B33</key>
  1.7865 +		</derivekey>
  1.7866 +	</actionbody>
  1.7867 +</action>
  1.7868 +
  1.7869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7871 +//! @SYMREQ CIT_PREQ1054
  1.7872 +//! @SYMTestPriority medium
  1.7873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7875 +<action>
  1.7876 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.7877 +	<actiontype>DeriveKey</actiontype>
  1.7878 +	<actionbody>
  1.7879 +		<derivekey>
  1.7880 +			<kdf>pkcs#12</kdf>
  1.7881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7882 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.7883 +			<iterations>1</iterations>
  1.7884 +			<key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B7984CFB3D568FE48E9F78B99EB8561E2F627E46D0EEECF491C</key>
  1.7885 +		</derivekey>
  1.7886 +	</actionbody>
  1.7887 +</action>
  1.7888 +
  1.7889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7891 +//! @SYMREQ CIT_PREQ1054
  1.7892 +//! @SYMTestPriority medium
  1.7893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7895 +<action>
  1.7896 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.7897 +	<actiontype>DeriveKey</actiontype>
  1.7898 +	<actionbody>
  1.7899 +		<derivekey>
  1.7900 +			<kdf>pkcs#12</kdf>
  1.7901 +			<passwd>0000</passwd>
  1.7902 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7903 +			<iterations>1</iterations>
  1.7904 +			<key>90253A49C069E7FF35281461A4DDBE0BB38F4041A04FF42A617251CC66ED7314BFAF4CB2F47A98E42B8AA3BE142A</key>
  1.7905 +		</derivekey>
  1.7906 +	</actionbody>
  1.7907 +</action>
  1.7908 +
  1.7909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7911 +//! @SYMREQ CIT_PREQ1054
  1.7912 +//! @SYMTestPriority medium
  1.7913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7915 +<action>
  1.7916 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.7917 +	<actiontype>DeriveKey</actiontype>
  1.7918 +	<actionbody>
  1.7919 +		<derivekey>
  1.7920 +			<kdf>pkcs#12</kdf>
  1.7921 +			<passwd>0001</passwd>
  1.7922 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7923 +			<iterations>1</iterations>
  1.7924 +			<key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8FA3F056762C96D7E119F68827FBFCC07B2A9E98238B52AA02B</key>
  1.7925 +		</derivekey>
  1.7926 +	</actionbody>
  1.7927 +</action>
  1.7928 +
  1.7929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7931 +//! @SYMREQ CIT_PREQ1054
  1.7932 +//! @SYMTestPriority medium
  1.7933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7935 +<action>
  1.7936 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.7937 +	<actiontype>DeriveKey</actiontype>
  1.7938 +	<actionbody>
  1.7939 +		<derivekey>
  1.7940 +			<kdf>pkcs#12</kdf>
  1.7941 +			<passwd>PSWD</passwd>
  1.7942 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7943 +			<iterations>1</iterations>
  1.7944 +			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC812A4EEE1F3DE7E52EA6A981DB02085FC4AB4860E438EA50BC5</key>
  1.7945 +		</derivekey>
  1.7946 +	</actionbody>
  1.7947 +</action>
  1.7948 +
  1.7949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7951 +//! @SYMREQ CIT_PREQ1054
  1.7952 +//! @SYMTestPriority medium
  1.7953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7955 +<action>
  1.7956 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.7957 +	<actiontype>DeriveKey</actiontype>
  1.7958 +	<actionbody>
  1.7959 +		<derivekey>
  1.7960 +			<kdf>pkcs#12</kdf>
  1.7961 +			<passwd>password</passwd>
  1.7962 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7963 +			<iterations>1</iterations>
  1.7964 +			<key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C19C126E28BC5C05064D38F67EF7A72A28795F0CFBA8574DA174</key>
  1.7965 +		</derivekey>
  1.7966 +	</actionbody>
  1.7967 +</action>
  1.7968 +
  1.7969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7971 +//! @SYMREQ CIT_PREQ1054
  1.7972 +//! @SYMTestPriority medium
  1.7973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7975 +<action>
  1.7976 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.7977 +	<actiontype>DeriveKey</actiontype>
  1.7978 +	<actionbody>
  1.7979 +		<derivekey>
  1.7980 +			<kdf>pkcs#12</kdf>
  1.7981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.7982 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.7983 +			<iterations>1</iterations>
  1.7984 +			<key>27476572AF26E99AB85CD350DC802ABA3A831332A7E037629B764434E2E02B5AB8E8A3DC181BBA3AD9AF9D7E8F08</key>
  1.7985 +		</derivekey>
  1.7986 +	</actionbody>
  1.7987 +</action>
  1.7988 +
  1.7989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.7990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.7991 +//! @SYMREQ CIT_PREQ1054
  1.7992 +//! @SYMTestPriority medium
  1.7993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.7994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.7995 +<action>
  1.7996 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.7997 +	<actiontype>DeriveKey</actiontype>
  1.7998 +	<actionbody>
  1.7999 +		<derivekey>
  1.8000 +			<kdf>pkcs#12</kdf>
  1.8001 +			<passwd>0000</passwd>
  1.8002 +			<salt>53414C54</salt>
  1.8003 +			<iterations>2</iterations>
  1.8004 +			<key>A1D9010A6761CB2675F1C33BB3C5215851703D0D2657B057B9372B986ABA327B6C8B8D4372656C74E9756C7C0C2C</key>
  1.8005 +		</derivekey>
  1.8006 +	</actionbody>
  1.8007 +</action>
  1.8008 +
  1.8009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8011 +//! @SYMREQ CIT_PREQ1054
  1.8012 +//! @SYMTestPriority medium
  1.8013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8015 +<action>
  1.8016 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8017 +	<actiontype>DeriveKey</actiontype>
  1.8018 +	<actionbody>
  1.8019 +		<derivekey>
  1.8020 +			<kdf>pkcs#12</kdf>
  1.8021 +			<passwd>0001</passwd>
  1.8022 +			<salt>53414C54</salt>
  1.8023 +			<iterations>2</iterations>
  1.8024 +			<key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47AC57D1E3FE07F2C194037B1CE0E18DE0CB8C335975EA51B037</key>
  1.8025 +		</derivekey>
  1.8026 +	</actionbody>
  1.8027 +</action>
  1.8028 +
  1.8029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8031 +//! @SYMREQ CIT_PREQ1054
  1.8032 +//! @SYMTestPriority medium
  1.8033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8035 +<action>
  1.8036 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8037 +	<actiontype>DeriveKey</actiontype>
  1.8038 +	<actionbody>
  1.8039 +		<derivekey>
  1.8040 +			<kdf>pkcs#12</kdf>
  1.8041 +			<passwd>PSWD</passwd>
  1.8042 +			<salt>53414C54</salt>
  1.8043 +			<iterations>2</iterations>
  1.8044 +			<key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE332D3AB8A36EE0DC8F1B7E691D2FA8BCCC2C7C371639EBA5CC6</key>
  1.8045 +		</derivekey>
  1.8046 +	</actionbody>
  1.8047 +</action>
  1.8048 +
  1.8049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8051 +//! @SYMREQ CIT_PREQ1054
  1.8052 +//! @SYMTestPriority medium
  1.8053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8055 +<action>
  1.8056 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8057 +	<actiontype>DeriveKey</actiontype>
  1.8058 +	<actionbody>
  1.8059 +		<derivekey>
  1.8060 +			<kdf>pkcs#12</kdf>
  1.8061 +			<passwd>password</passwd>
  1.8062 +			<salt>53414C54</salt>
  1.8063 +			<iterations>2</iterations>
  1.8064 +			<key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A0EC11A60E916ADAD62C57711E88134D3451CEE8640938390E9</key>
  1.8065 +		</derivekey>
  1.8066 +	</actionbody>
  1.8067 +</action>
  1.8068 +
  1.8069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8071 +//! @SYMREQ CIT_PREQ1054
  1.8072 +//! @SYMTestPriority medium
  1.8073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8075 +<action>
  1.8076 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8077 +	<actiontype>DeriveKey</actiontype>
  1.8078 +	<actionbody>
  1.8079 +		<derivekey>
  1.8080 +			<kdf>pkcs#12</kdf>
  1.8081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8082 +			<salt>53414C54</salt>
  1.8083 +			<iterations>2</iterations>
  1.8084 +			<key>5BF185C726EE2182888A834066C30BA92C0A6A140FD09995773E708440FF38F65CBF71E7449EF43ADDDDCCEE7B63</key>
  1.8085 +		</derivekey>
  1.8086 +	</actionbody>
  1.8087 +</action>
  1.8088 +
  1.8089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8091 +//! @SYMREQ CIT_PREQ1054
  1.8092 +//! @SYMTestPriority medium
  1.8093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8095 +<action>
  1.8096 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8097 +	<actiontype>DeriveKey</actiontype>
  1.8098 +	<actionbody>
  1.8099 +		<derivekey>
  1.8100 +			<kdf>pkcs#12</kdf>
  1.8101 +			<passwd>0000</passwd>
  1.8102 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8103 +			<iterations>2</iterations>
  1.8104 +			<key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734423A7247E5DFD46D2CE07E64F4F881362C98992B188EDE499D</key>
  1.8105 +		</derivekey>
  1.8106 +	</actionbody>
  1.8107 +</action>
  1.8108 +
  1.8109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8111 +//! @SYMREQ CIT_PREQ1054
  1.8112 +//! @SYMTestPriority medium
  1.8113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8115 +<action>
  1.8116 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8117 +	<actiontype>DeriveKey</actiontype>
  1.8118 +	<actionbody>
  1.8119 +		<derivekey>
  1.8120 +			<kdf>pkcs#12</kdf>
  1.8121 +			<passwd>0001</passwd>
  1.8122 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8123 +			<iterations>2</iterations>
  1.8124 +			<key>63E6DF459C899D72577C20FFE4F27670F3A85EA780B450C711D83FB12C0B0A0539209B1B06AF82EE392AB3FD6A6B</key>
  1.8125 +		</derivekey>
  1.8126 +	</actionbody>
  1.8127 +</action>
  1.8128 +
  1.8129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8131 +//! @SYMREQ CIT_PREQ1054
  1.8132 +//! @SYMTestPriority medium
  1.8133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8135 +<action>
  1.8136 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8137 +	<actiontype>DeriveKey</actiontype>
  1.8138 +	<actionbody>
  1.8139 +		<derivekey>
  1.8140 +			<kdf>pkcs#12</kdf>
  1.8141 +			<passwd>PSWD</passwd>
  1.8142 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8143 +			<iterations>2</iterations>
  1.8144 +			<key>C2099204ABFBB841875BD7595A89D31A9D03A34B94D3ED582C55B0787E2FB841ADE1E6171D6FE2BDDB19A658F552</key>
  1.8145 +		</derivekey>
  1.8146 +	</actionbody>
  1.8147 +</action>
  1.8148 +
  1.8149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8151 +//! @SYMREQ CIT_PREQ1054
  1.8152 +//! @SYMTestPriority medium
  1.8153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8155 +<action>
  1.8156 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8157 +	<actiontype>DeriveKey</actiontype>
  1.8158 +	<actionbody>
  1.8159 +		<derivekey>
  1.8160 +			<kdf>pkcs#12</kdf>
  1.8161 +			<passwd>password</passwd>
  1.8162 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8163 +			<iterations>2</iterations>
  1.8164 +			<key>3204D28A32DF299B612958906C79154AED69D3F1C0351B1A4B4E2DCA7E93F3CAD92714CC9E13CCD0E95A305EBB13</key>
  1.8165 +		</derivekey>
  1.8166 +	</actionbody>
  1.8167 +</action>
  1.8168 +
  1.8169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8171 +//! @SYMREQ CIT_PREQ1054
  1.8172 +//! @SYMTestPriority medium
  1.8173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8175 +<action>
  1.8176 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8177 +	<actiontype>DeriveKey</actiontype>
  1.8178 +	<actionbody>
  1.8179 +		<derivekey>
  1.8180 +			<kdf>pkcs#12</kdf>
  1.8181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8182 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8183 +			<iterations>2</iterations>
  1.8184 +			<key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04873EC243829CE9F83DE277AEC92B18D43211D6DAC966AFFFE8</key>
  1.8185 +		</derivekey>
  1.8186 +	</actionbody>
  1.8187 +</action>
  1.8188 +
  1.8189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8191 +//! @SYMREQ CIT_PREQ1054
  1.8192 +//! @SYMTestPriority medium
  1.8193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8195 +<action>
  1.8196 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8197 +	<actiontype>DeriveKey</actiontype>
  1.8198 +	<actionbody>
  1.8199 +		<derivekey>
  1.8200 +			<kdf>pkcs#12</kdf>
  1.8201 +			<passwd>0000</passwd>
  1.8202 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8203 +			<iterations>2</iterations>
  1.8204 +			<key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11162299D91EC09517DEACB6C8992D8D1952B9410AED287F9387</key>
  1.8205 +		</derivekey>
  1.8206 +	</actionbody>
  1.8207 +</action>
  1.8208 +
  1.8209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8211 +//! @SYMREQ CIT_PREQ1054
  1.8212 +//! @SYMTestPriority medium
  1.8213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8215 +<action>
  1.8216 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8217 +	<actiontype>DeriveKey</actiontype>
  1.8218 +	<actionbody>
  1.8219 +		<derivekey>
  1.8220 +			<kdf>pkcs#12</kdf>
  1.8221 +			<passwd>0001</passwd>
  1.8222 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8223 +			<iterations>2</iterations>
  1.8224 +			<key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC49A6C7BD0A735DBA22FCBC56A6AACAA2ECE7F146A54C7442A7</key>
  1.8225 +		</derivekey>
  1.8226 +	</actionbody>
  1.8227 +</action>
  1.8228 +
  1.8229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8231 +//! @SYMREQ CIT_PREQ1054
  1.8232 +//! @SYMTestPriority medium
  1.8233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8235 +<action>
  1.8236 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8237 +	<actiontype>DeriveKey</actiontype>
  1.8238 +	<actionbody>
  1.8239 +		<derivekey>
  1.8240 +			<kdf>pkcs#12</kdf>
  1.8241 +			<passwd>PSWD</passwd>
  1.8242 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8243 +			<iterations>2</iterations>
  1.8244 +			<key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F41D1179DBADD72CF7CC8A3F03118C5EF87C588C6665E942158</key>
  1.8245 +		</derivekey>
  1.8246 +	</actionbody>
  1.8247 +</action>
  1.8248 +
  1.8249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8251 +//! @SYMREQ CIT_PREQ1054
  1.8252 +//! @SYMTestPriority medium
  1.8253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8255 +<action>
  1.8256 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8257 +	<actiontype>DeriveKey</actiontype>
  1.8258 +	<actionbody>
  1.8259 +		<derivekey>
  1.8260 +			<kdf>pkcs#12</kdf>
  1.8261 +			<passwd>password</passwd>
  1.8262 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8263 +			<iterations>2</iterations>
  1.8264 +			<key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDFE51188263603019F80688985DB1EF389A8F2CADA47463756C7</key>
  1.8265 +		</derivekey>
  1.8266 +	</actionbody>
  1.8267 +</action>
  1.8268 +
  1.8269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8271 +//! @SYMREQ CIT_PREQ1054
  1.8272 +//! @SYMTestPriority medium
  1.8273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8275 +<action>
  1.8276 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8277 +	<actiontype>DeriveKey</actiontype>
  1.8278 +	<actionbody>
  1.8279 +		<derivekey>
  1.8280 +			<kdf>pkcs#12</kdf>
  1.8281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8282 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8283 +			<iterations>2</iterations>
  1.8284 +			<key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647451A53DE6218B8B2F860931DE8975712EAC7CAF34347828525</key>
  1.8285 +		</derivekey>
  1.8286 +	</actionbody>
  1.8287 +</action>
  1.8288 +
  1.8289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8291 +//! @SYMREQ CIT_PREQ1054
  1.8292 +//! @SYMTestPriority medium
  1.8293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8295 +<action>
  1.8296 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8297 +	<actiontype>DeriveKey</actiontype>
  1.8298 +	<actionbody>
  1.8299 +		<derivekey>
  1.8300 +			<kdf>pkcs#12</kdf>
  1.8301 +			<passwd>0000</passwd>
  1.8302 +			<salt>53414C54</salt>
  1.8303 +			<iterations>4</iterations>
  1.8304 +			<key>D0158BFC57E643965DC161741725CE9478CDF2A0B52A78253F32B2DFCC2228C929F19663EC3AF4B6B3B4A514D2AE</key>
  1.8305 +		</derivekey>
  1.8306 +	</actionbody>
  1.8307 +</action>
  1.8308 +
  1.8309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8311 +//! @SYMREQ CIT_PREQ1054
  1.8312 +//! @SYMTestPriority medium
  1.8313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8315 +<action>
  1.8316 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8317 +	<actiontype>DeriveKey</actiontype>
  1.8318 +	<actionbody>
  1.8319 +		<derivekey>
  1.8320 +			<kdf>pkcs#12</kdf>
  1.8321 +			<passwd>0001</passwd>
  1.8322 +			<salt>53414C54</salt>
  1.8323 +			<iterations>4</iterations>
  1.8324 +			<key>AEB6CD53F0D6830161100C4BFD439B341066339A0025D3CF7DC68CEE4D9AC92B10B29EB19973637D27DC2C9BF911</key>
  1.8325 +		</derivekey>
  1.8326 +	</actionbody>
  1.8327 +</action>
  1.8328 +
  1.8329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8331 +//! @SYMREQ CIT_PREQ1054
  1.8332 +//! @SYMTestPriority medium
  1.8333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8335 +<action>
  1.8336 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8337 +	<actiontype>DeriveKey</actiontype>
  1.8338 +	<actionbody>
  1.8339 +		<derivekey>
  1.8340 +			<kdf>pkcs#12</kdf>
  1.8341 +			<passwd>PSWD</passwd>
  1.8342 +			<salt>53414C54</salt>
  1.8343 +			<iterations>4</iterations>
  1.8344 +			<key>80010C12B66CC739F4ACF8BB154197709F78AAD39ABC8EEC11F7C88CD138DE85A21B5D5DCB9C8E50E0AFABE82149</key>
  1.8345 +		</derivekey>
  1.8346 +	</actionbody>
  1.8347 +</action>
  1.8348 +
  1.8349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8351 +//! @SYMREQ CIT_PREQ1054
  1.8352 +//! @SYMTestPriority medium
  1.8353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8355 +<action>
  1.8356 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8357 +	<actiontype>DeriveKey</actiontype>
  1.8358 +	<actionbody>
  1.8359 +		<derivekey>
  1.8360 +			<kdf>pkcs#12</kdf>
  1.8361 +			<passwd>password</passwd>
  1.8362 +			<salt>53414C54</salt>
  1.8363 +			<iterations>4</iterations>
  1.8364 +			<key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812046A01A53F6FB1C9051ED917D0B3C08A82CADA712730DD2410</key>
  1.8365 +		</derivekey>
  1.8366 +	</actionbody>
  1.8367 +</action>
  1.8368 +
  1.8369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8371 +//! @SYMREQ CIT_PREQ1054
  1.8372 +//! @SYMTestPriority medium
  1.8373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8375 +<action>
  1.8376 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8377 +	<actiontype>DeriveKey</actiontype>
  1.8378 +	<actionbody>
  1.8379 +		<derivekey>
  1.8380 +			<kdf>pkcs#12</kdf>
  1.8381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8382 +			<salt>53414C54</salt>
  1.8383 +			<iterations>4</iterations>
  1.8384 +			<key>146C6A5B58AF8561220DE4C13A133248300D59D39E22569CC568CB98585324F9287A672ABFCDF360A26B8B83D1AE</key>
  1.8385 +		</derivekey>
  1.8386 +	</actionbody>
  1.8387 +</action>
  1.8388 +
  1.8389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8391 +//! @SYMREQ CIT_PREQ1054
  1.8392 +//! @SYMTestPriority medium
  1.8393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8395 +<action>
  1.8396 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8397 +	<actiontype>DeriveKey</actiontype>
  1.8398 +	<actionbody>
  1.8399 +		<derivekey>
  1.8400 +			<kdf>pkcs#12</kdf>
  1.8401 +			<passwd>0000</passwd>
  1.8402 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8403 +			<iterations>4</iterations>
  1.8404 +			<key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE22F0030D6D6FBF85D6A56D7D55A3002233181BCC2A0C4108C8</key>
  1.8405 +		</derivekey>
  1.8406 +	</actionbody>
  1.8407 +</action>
  1.8408 +
  1.8409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8411 +//! @SYMREQ CIT_PREQ1054
  1.8412 +//! @SYMTestPriority medium
  1.8413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8415 +<action>
  1.8416 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8417 +	<actiontype>DeriveKey</actiontype>
  1.8418 +	<actionbody>
  1.8419 +		<derivekey>
  1.8420 +			<kdf>pkcs#12</kdf>
  1.8421 +			<passwd>0001</passwd>
  1.8422 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8423 +			<iterations>4</iterations>
  1.8424 +			<key>23930713772E26DBBABB53F3C5C775019B8048482B6FECC40729F2D5023D6F3C27092166E11A435738C3E0DBF7B0</key>
  1.8425 +		</derivekey>
  1.8426 +	</actionbody>
  1.8427 +</action>
  1.8428 +
  1.8429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8431 +//! @SYMREQ CIT_PREQ1054
  1.8432 +//! @SYMTestPriority medium
  1.8433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8435 +<action>
  1.8436 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8437 +	<actiontype>DeriveKey</actiontype>
  1.8438 +	<actionbody>
  1.8439 +		<derivekey>
  1.8440 +			<kdf>pkcs#12</kdf>
  1.8441 +			<passwd>PSWD</passwd>
  1.8442 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8443 +			<iterations>4</iterations>
  1.8444 +			<key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A93D6A3DD0A61826365407B4C1CBB589C0BC10EC8B510A83771</key>
  1.8445 +		</derivekey>
  1.8446 +	</actionbody>
  1.8447 +</action>
  1.8448 +
  1.8449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8451 +//! @SYMREQ CIT_PREQ1054
  1.8452 +//! @SYMTestPriority medium
  1.8453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8455 +<action>
  1.8456 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8457 +	<actiontype>DeriveKey</actiontype>
  1.8458 +	<actionbody>
  1.8459 +		<derivekey>
  1.8460 +			<kdf>pkcs#12</kdf>
  1.8461 +			<passwd>password</passwd>
  1.8462 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8463 +			<iterations>4</iterations>
  1.8464 +			<key>363619530B170B7BAE1C046B29351C235B8EFED58879EAB2DAF93502D254C5569C2667F16B2AA036619AAF4D8E33</key>
  1.8465 +		</derivekey>
  1.8466 +	</actionbody>
  1.8467 +</action>
  1.8468 +
  1.8469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8471 +//! @SYMREQ CIT_PREQ1054
  1.8472 +//! @SYMTestPriority medium
  1.8473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8475 +<action>
  1.8476 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8477 +	<actiontype>DeriveKey</actiontype>
  1.8478 +	<actionbody>
  1.8479 +		<derivekey>
  1.8480 +			<kdf>pkcs#12</kdf>
  1.8481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8482 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8483 +			<iterations>4</iterations>
  1.8484 +			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4EFF6FE83AD6ED83E4F217EF7E0C6727BEF0614398026907E7E6</key>
  1.8485 +		</derivekey>
  1.8486 +	</actionbody>
  1.8487 +</action>
  1.8488 +
  1.8489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8491 +//! @SYMREQ CIT_PREQ1054
  1.8492 +//! @SYMTestPriority medium
  1.8493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8495 +<action>
  1.8496 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8497 +	<actiontype>DeriveKey</actiontype>
  1.8498 +	<actionbody>
  1.8499 +		<derivekey>
  1.8500 +			<kdf>pkcs#12</kdf>
  1.8501 +			<passwd>0000</passwd>
  1.8502 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8503 +			<iterations>4</iterations>
  1.8504 +			<key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0EA1D3AB1983B1E0496EB6FD7259774354267B1976BE459A1D23</key>
  1.8505 +		</derivekey>
  1.8506 +	</actionbody>
  1.8507 +</action>
  1.8508 +
  1.8509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8511 +//! @SYMREQ CIT_PREQ1054
  1.8512 +//! @SYMTestPriority medium
  1.8513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8515 +<action>
  1.8516 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8517 +	<actiontype>DeriveKey</actiontype>
  1.8518 +	<actionbody>
  1.8519 +		<derivekey>
  1.8520 +			<kdf>pkcs#12</kdf>
  1.8521 +			<passwd>0001</passwd>
  1.8522 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8523 +			<iterations>4</iterations>
  1.8524 +			<key>9A618595C714486B7D7E3120005C8BC18D5D95D79B54DE1063C64DBE97C41BFC6A4A5239B77F2F603C7AFE06247C</key>
  1.8525 +		</derivekey>
  1.8526 +	</actionbody>
  1.8527 +</action>
  1.8528 +
  1.8529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8531 +//! @SYMREQ CIT_PREQ1054
  1.8532 +//! @SYMTestPriority medium
  1.8533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8535 +<action>
  1.8536 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8537 +	<actiontype>DeriveKey</actiontype>
  1.8538 +	<actionbody>
  1.8539 +		<derivekey>
  1.8540 +			<kdf>pkcs#12</kdf>
  1.8541 +			<passwd>PSWD</passwd>
  1.8542 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8543 +			<iterations>4</iterations>
  1.8544 +			<key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208FA46F3C504ABA355D99FE3A4291DBAB83CB6980CD28C153D24</key>
  1.8545 +		</derivekey>
  1.8546 +	</actionbody>
  1.8547 +</action>
  1.8548 +
  1.8549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8551 +//! @SYMREQ CIT_PREQ1054
  1.8552 +//! @SYMTestPriority medium
  1.8553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8555 +<action>
  1.8556 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8557 +	<actiontype>DeriveKey</actiontype>
  1.8558 +	<actionbody>
  1.8559 +		<derivekey>
  1.8560 +			<kdf>pkcs#12</kdf>
  1.8561 +			<passwd>password</passwd>
  1.8562 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8563 +			<iterations>4</iterations>
  1.8564 +			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2F2B76DBC180C689C88147F5366D48C10086AD45B445F818F22</key>
  1.8565 +		</derivekey>
  1.8566 +	</actionbody>
  1.8567 +</action>
  1.8568 +
  1.8569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8571 +//! @SYMREQ CIT_PREQ1054
  1.8572 +//! @SYMTestPriority medium
  1.8573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8575 +<action>
  1.8576 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8577 +	<actiontype>DeriveKey</actiontype>
  1.8578 +	<actionbody>
  1.8579 +		<derivekey>
  1.8580 +			<kdf>pkcs#12</kdf>
  1.8581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8582 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8583 +			<iterations>4</iterations>
  1.8584 +			<key>91DF3661364A0DAD28180A41ADCB55676E992986EFCD5481A7EBCCA45806E087BB95BAEFD24685A7D9B08426EFCF</key>
  1.8585 +		</derivekey>
  1.8586 +	</actionbody>
  1.8587 +</action>
  1.8588 +
  1.8589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8591 +//! @SYMREQ CIT_PREQ1054
  1.8592 +//! @SYMTestPriority medium
  1.8593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8595 +<action>
  1.8596 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8597 +	<actiontype>DeriveKey</actiontype>
  1.8598 +	<actionbody>
  1.8599 +		<derivekey>
  1.8600 +			<kdf>pkcs#12</kdf>
  1.8601 +			<passwd>0000</passwd>
  1.8602 +			<salt>53414C54</salt>
  1.8603 +			<iterations>8</iterations>
  1.8604 +			<key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE4612564ECF299468389BF3597B38FF0ADB79AE9A718D7FC5E0D7E</key>
  1.8605 +		</derivekey>
  1.8606 +	</actionbody>
  1.8607 +</action>
  1.8608 +
  1.8609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8611 +//! @SYMREQ CIT_PREQ1054
  1.8612 +//! @SYMTestPriority medium
  1.8613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8615 +<action>
  1.8616 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8617 +	<actiontype>DeriveKey</actiontype>
  1.8618 +	<actionbody>
  1.8619 +		<derivekey>
  1.8620 +			<kdf>pkcs#12</kdf>
  1.8621 +			<passwd>0001</passwd>
  1.8622 +			<salt>53414C54</salt>
  1.8623 +			<iterations>8</iterations>
  1.8624 +			<key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1CD2460647D83960A81A688C1E7C3CB1745C640F96CA26BAB55</key>
  1.8625 +		</derivekey>
  1.8626 +	</actionbody>
  1.8627 +</action>
  1.8628 +
  1.8629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8631 +//! @SYMREQ CIT_PREQ1054
  1.8632 +//! @SYMTestPriority medium
  1.8633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8635 +<action>
  1.8636 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8637 +	<actiontype>DeriveKey</actiontype>
  1.8638 +	<actionbody>
  1.8639 +		<derivekey>
  1.8640 +			<kdf>pkcs#12</kdf>
  1.8641 +			<passwd>PSWD</passwd>
  1.8642 +			<salt>53414C54</salt>
  1.8643 +			<iterations>8</iterations>
  1.8644 +			<key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466B5176BC31A916229C8DC27918BEAC1912CCD1BEDD4D9AC6F7F</key>
  1.8645 +		</derivekey>
  1.8646 +	</actionbody>
  1.8647 +</action>
  1.8648 +
  1.8649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8651 +//! @SYMREQ CIT_PREQ1054
  1.8652 +//! @SYMTestPriority medium
  1.8653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8655 +<action>
  1.8656 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8657 +	<actiontype>DeriveKey</actiontype>
  1.8658 +	<actionbody>
  1.8659 +		<derivekey>
  1.8660 +			<kdf>pkcs#12</kdf>
  1.8661 +			<passwd>password</passwd>
  1.8662 +			<salt>53414C54</salt>
  1.8663 +			<iterations>8</iterations>
  1.8664 +			<key>B0935F11227F5A473073DCD188886687D2A18119532A1D5D0A8631441599FF319BD921404D04DA973217A199F621</key>
  1.8665 +		</derivekey>
  1.8666 +	</actionbody>
  1.8667 +</action>
  1.8668 +
  1.8669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8671 +//! @SYMREQ CIT_PREQ1054
  1.8672 +//! @SYMTestPriority medium
  1.8673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8675 +<action>
  1.8676 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8677 +	<actiontype>DeriveKey</actiontype>
  1.8678 +	<actionbody>
  1.8679 +		<derivekey>
  1.8680 +			<kdf>pkcs#12</kdf>
  1.8681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8682 +			<salt>53414C54</salt>
  1.8683 +			<iterations>8</iterations>
  1.8684 +			<key>6602B1B4BBB670208041ECD8E1634845FC0DC28532AF24AA6CB93368E87126BC821DB7B3F4301455B454E9715981</key>
  1.8685 +		</derivekey>
  1.8686 +	</actionbody>
  1.8687 +</action>
  1.8688 +
  1.8689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8691 +//! @SYMREQ CIT_PREQ1054
  1.8692 +//! @SYMTestPriority medium
  1.8693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8695 +<action>
  1.8696 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8697 +	<actiontype>DeriveKey</actiontype>
  1.8698 +	<actionbody>
  1.8699 +		<derivekey>
  1.8700 +			<kdf>pkcs#12</kdf>
  1.8701 +			<passwd>0000</passwd>
  1.8702 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8703 +			<iterations>8</iterations>
  1.8704 +			<key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E449B3AFB8236BFFDF548BA07B6269CB5C0D0E0E00AABB5E872F7</key>
  1.8705 +		</derivekey>
  1.8706 +	</actionbody>
  1.8707 +</action>
  1.8708 +
  1.8709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8711 +//! @SYMREQ CIT_PREQ1054
  1.8712 +//! @SYMTestPriority medium
  1.8713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8715 +<action>
  1.8716 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8717 +	<actiontype>DeriveKey</actiontype>
  1.8718 +	<actionbody>
  1.8719 +		<derivekey>
  1.8720 +			<kdf>pkcs#12</kdf>
  1.8721 +			<passwd>0001</passwd>
  1.8722 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8723 +			<iterations>8</iterations>
  1.8724 +			<key>6473EB1244E055149E0858C49FAE7B8DC951E7E32AC2AA2146482717104D3E93074D41BCA226B3212A41E4EC0F00</key>
  1.8725 +		</derivekey>
  1.8726 +	</actionbody>
  1.8727 +</action>
  1.8728 +
  1.8729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8731 +//! @SYMREQ CIT_PREQ1054
  1.8732 +//! @SYMTestPriority medium
  1.8733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8735 +<action>
  1.8736 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8737 +	<actiontype>DeriveKey</actiontype>
  1.8738 +	<actionbody>
  1.8739 +		<derivekey>
  1.8740 +			<kdf>pkcs#12</kdf>
  1.8741 +			<passwd>PSWD</passwd>
  1.8742 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8743 +			<iterations>8</iterations>
  1.8744 +			<key>AA762B8736D4C37BAD263103CA283E09010B7EFC538B44C6C3CB724C8CEC28C91F57A2778A8C74CBBF00A63D6875</key>
  1.8745 +		</derivekey>
  1.8746 +	</actionbody>
  1.8747 +</action>
  1.8748 +
  1.8749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8751 +//! @SYMREQ CIT_PREQ1054
  1.8752 +//! @SYMTestPriority medium
  1.8753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8755 +<action>
  1.8756 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8757 +	<actiontype>DeriveKey</actiontype>
  1.8758 +	<actionbody>
  1.8759 +		<derivekey>
  1.8760 +			<kdf>pkcs#12</kdf>
  1.8761 +			<passwd>password</passwd>
  1.8762 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8763 +			<iterations>8</iterations>
  1.8764 +			<key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D88232044436DA8D74F09E19B578C65F8629D022FD8D529F11E2</key>
  1.8765 +		</derivekey>
  1.8766 +	</actionbody>
  1.8767 +</action>
  1.8768 +
  1.8769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8771 +//! @SYMREQ CIT_PREQ1054
  1.8772 +//! @SYMTestPriority medium
  1.8773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8775 +<action>
  1.8776 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8777 +	<actiontype>DeriveKey</actiontype>
  1.8778 +	<actionbody>
  1.8779 +		<derivekey>
  1.8780 +			<kdf>pkcs#12</kdf>
  1.8781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8782 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.8783 +			<iterations>8</iterations>
  1.8784 +			<key>935593CA370BB6988F2F41D2F4ABF56E433064D83E5C5C9892BDB854C8219FFBC1404D590450B1613EB0D2CC0447</key>
  1.8785 +		</derivekey>
  1.8786 +	</actionbody>
  1.8787 +</action>
  1.8788 +
  1.8789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8791 +//! @SYMREQ CIT_PREQ1054
  1.8792 +//! @SYMTestPriority medium
  1.8793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8795 +<action>
  1.8796 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8797 +	<actiontype>DeriveKey</actiontype>
  1.8798 +	<actionbody>
  1.8799 +		<derivekey>
  1.8800 +			<kdf>pkcs#12</kdf>
  1.8801 +			<passwd>0000</passwd>
  1.8802 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8803 +			<iterations>8</iterations>
  1.8804 +			<key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BFCE80BAAFDC06F9C1D1A2862C10203D891E0B2C23F5394ED271</key>
  1.8805 +		</derivekey>
  1.8806 +	</actionbody>
  1.8807 +</action>
  1.8808 +
  1.8809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8811 +//! @SYMREQ CIT_PREQ1054
  1.8812 +//! @SYMTestPriority medium
  1.8813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8815 +<action>
  1.8816 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8817 +	<actiontype>DeriveKey</actiontype>
  1.8818 +	<actionbody>
  1.8819 +		<derivekey>
  1.8820 +			<kdf>pkcs#12</kdf>
  1.8821 +			<passwd>0001</passwd>
  1.8822 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8823 +			<iterations>8</iterations>
  1.8824 +			<key>82B4A13659033EA4025DB51A6CB573F93B03A69634D71DFB7E270A406AF705382CCA3BB17F29C88ED81EA583AFF5</key>
  1.8825 +		</derivekey>
  1.8826 +	</actionbody>
  1.8827 +</action>
  1.8828 +
  1.8829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8831 +//! @SYMREQ CIT_PREQ1054
  1.8832 +//! @SYMTestPriority medium
  1.8833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8835 +<action>
  1.8836 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8837 +	<actiontype>DeriveKey</actiontype>
  1.8838 +	<actionbody>
  1.8839 +		<derivekey>
  1.8840 +			<kdf>pkcs#12</kdf>
  1.8841 +			<passwd>PSWD</passwd>
  1.8842 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8843 +			<iterations>8</iterations>
  1.8844 +			<key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94047C10AE3CA2853B57E8E59A819DE9BB2D4F3BFBD302F978C7</key>
  1.8845 +		</derivekey>
  1.8846 +	</actionbody>
  1.8847 +</action>
  1.8848 +
  1.8849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8851 +//! @SYMREQ CIT_PREQ1054
  1.8852 +//! @SYMTestPriority medium
  1.8853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8855 +<action>
  1.8856 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8857 +	<actiontype>DeriveKey</actiontype>
  1.8858 +	<actionbody>
  1.8859 +		<derivekey>
  1.8860 +			<kdf>pkcs#12</kdf>
  1.8861 +			<passwd>password</passwd>
  1.8862 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8863 +			<iterations>8</iterations>
  1.8864 +			<key>5670457314E405B0ED1583FC4B82FEAD94B434EBEDD86DFBC39161A8A7E48CAD3591C2C9A14FAA242D860ED55163</key>
  1.8865 +		</derivekey>
  1.8866 +	</actionbody>
  1.8867 +</action>
  1.8868 +
  1.8869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8871 +//! @SYMREQ CIT_PREQ1054
  1.8872 +//! @SYMTestPriority medium
  1.8873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8875 +<action>
  1.8876 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.8877 +	<actiontype>DeriveKey</actiontype>
  1.8878 +	<actionbody>
  1.8879 +		<derivekey>
  1.8880 +			<kdf>pkcs#12</kdf>
  1.8881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8882 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.8883 +			<iterations>8</iterations>
  1.8884 +			<key>1C4CAE25146D74F3762B5C3FD3A917522564855675801D9D7D946C11B6F57C42C2E7447F8CACF4178D8F7A001A18</key>
  1.8885 +		</derivekey>
  1.8886 +	</actionbody>
  1.8887 +</action>
  1.8888 +
  1.8889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8891 +//! @SYMREQ CIT_PREQ1054
  1.8892 +//! @SYMTestPriority medium
  1.8893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8895 +<action>
  1.8896 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8897 +	<actiontype>DeriveKey</actiontype>
  1.8898 +	<actionbody>
  1.8899 +		<derivekey>
  1.8900 +			<kdf>pkcs#12</kdf>
  1.8901 +			<passwd>0000</passwd>
  1.8902 +			<salt>53414C54</salt>
  1.8903 +			<iterations>128</iterations>
  1.8904 +			<key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93AF1D5E01AB3B9973959193DE7A2433CB46A8A15F2D84D97DBC</key>
  1.8905 +		</derivekey>
  1.8906 +	</actionbody>
  1.8907 +</action>
  1.8908 +
  1.8909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8911 +//! @SYMREQ CIT_PREQ1054
  1.8912 +//! @SYMTestPriority medium
  1.8913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8915 +<action>
  1.8916 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8917 +	<actiontype>DeriveKey</actiontype>
  1.8918 +	<actionbody>
  1.8919 +		<derivekey>
  1.8920 +			<kdf>pkcs#12</kdf>
  1.8921 +			<passwd>0001</passwd>
  1.8922 +			<salt>53414C54</salt>
  1.8923 +			<iterations>128</iterations>
  1.8924 +			<key>C89C3A2C9C06626EB831F4BB5262809B9C138181C44B6D521245B6BBDBE2271369C6B77EC12626368DFCEB358BB8</key>
  1.8925 +		</derivekey>
  1.8926 +	</actionbody>
  1.8927 +</action>
  1.8928 +
  1.8929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8931 +//! @SYMREQ CIT_PREQ1054
  1.8932 +//! @SYMTestPriority medium
  1.8933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8935 +<action>
  1.8936 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8937 +	<actiontype>DeriveKey</actiontype>
  1.8938 +	<actionbody>
  1.8939 +		<derivekey>
  1.8940 +			<kdf>pkcs#12</kdf>
  1.8941 +			<passwd>PSWD</passwd>
  1.8942 +			<salt>53414C54</salt>
  1.8943 +			<iterations>128</iterations>
  1.8944 +			<key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EEE6D0B4E9C0A5EBBFF08FC23CB11E1DB17EBAE6A93C2DA749A6</key>
  1.8945 +		</derivekey>
  1.8946 +	</actionbody>
  1.8947 +</action>
  1.8948 +
  1.8949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8951 +//! @SYMREQ CIT_PREQ1054
  1.8952 +//! @SYMTestPriority medium
  1.8953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8955 +<action>
  1.8956 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8957 +	<actiontype>DeriveKey</actiontype>
  1.8958 +	<actionbody>
  1.8959 +		<derivekey>
  1.8960 +			<kdf>pkcs#12</kdf>
  1.8961 +			<passwd>password</passwd>
  1.8962 +			<salt>53414C54</salt>
  1.8963 +			<iterations>128</iterations>
  1.8964 +			<key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C2011A3B26BD1C95A8797741938D8E3F2057F76B04310B3D922</key>
  1.8965 +		</derivekey>
  1.8966 +	</actionbody>
  1.8967 +</action>
  1.8968 +
  1.8969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8971 +//! @SYMREQ CIT_PREQ1054
  1.8972 +//! @SYMTestPriority medium
  1.8973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8975 +<action>
  1.8976 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.8977 +	<actiontype>DeriveKey</actiontype>
  1.8978 +	<actionbody>
  1.8979 +		<derivekey>
  1.8980 +			<kdf>pkcs#12</kdf>
  1.8981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.8982 +			<salt>53414C54</salt>
  1.8983 +			<iterations>128</iterations>
  1.8984 +			<key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F97A6D3BDA02B3173244164AAE9123987A00699B74F042C35DC</key>
  1.8985 +		</derivekey>
  1.8986 +	</actionbody>
  1.8987 +</action>
  1.8988 +
  1.8989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.8990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.8991 +//! @SYMREQ CIT_PREQ1054
  1.8992 +//! @SYMTestPriority medium
  1.8993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.8994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.8995 +<action>
  1.8996 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.8997 +	<actiontype>DeriveKey</actiontype>
  1.8998 +	<actionbody>
  1.8999 +		<derivekey>
  1.9000 +			<kdf>pkcs#12</kdf>
  1.9001 +			<passwd>0000</passwd>
  1.9002 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9003 +			<iterations>128</iterations>
  1.9004 +			<key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD8D380FA3C08389E335A71B575F3D48228119EA2E34351C7E51</key>
  1.9005 +		</derivekey>
  1.9006 +	</actionbody>
  1.9007 +</action>
  1.9008 +
  1.9009 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9011 +//! @SYMREQ CIT_PREQ1054
  1.9012 +//! @SYMTestPriority medium
  1.9013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9015 +<action>
  1.9016 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9017 +	<actiontype>DeriveKey</actiontype>
  1.9018 +	<actionbody>
  1.9019 +		<derivekey>
  1.9020 +			<kdf>pkcs#12</kdf>
  1.9021 +			<passwd>0001</passwd>
  1.9022 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9023 +			<iterations>128</iterations>
  1.9024 +			<key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3FD6375B5D9AB89DDA3B28526392E1BED3594C3A22594137133</key>
  1.9025 +		</derivekey>
  1.9026 +	</actionbody>
  1.9027 +</action>
  1.9028 +
  1.9029 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9031 +//! @SYMREQ CIT_PREQ1054
  1.9032 +//! @SYMTestPriority medium
  1.9033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9035 +<action>
  1.9036 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9037 +	<actiontype>DeriveKey</actiontype>
  1.9038 +	<actionbody>
  1.9039 +		<derivekey>
  1.9040 +			<kdf>pkcs#12</kdf>
  1.9041 +			<passwd>PSWD</passwd>
  1.9042 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9043 +			<iterations>128</iterations>
  1.9044 +			<key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF6F15DAE903AEAA4C8A9A23B8DA9E91293F5ED1904E6D8F8ED5</key>
  1.9045 +		</derivekey>
  1.9046 +	</actionbody>
  1.9047 +</action>
  1.9048 +
  1.9049 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9051 +//! @SYMREQ CIT_PREQ1054
  1.9052 +//! @SYMTestPriority medium
  1.9053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9055 +<action>
  1.9056 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9057 +	<actiontype>DeriveKey</actiontype>
  1.9058 +	<actionbody>
  1.9059 +		<derivekey>
  1.9060 +			<kdf>pkcs#12</kdf>
  1.9061 +			<passwd>password</passwd>
  1.9062 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9063 +			<iterations>128</iterations>
  1.9064 +			<key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3483C97430FABCCAB60A1F471741095AEB2B22B00951CEFB816</key>
  1.9065 +		</derivekey>
  1.9066 +	</actionbody>
  1.9067 +</action>
  1.9068 +
  1.9069 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9071 +//! @SYMREQ CIT_PREQ1054
  1.9072 +//! @SYMTestPriority medium
  1.9073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9075 +<action>
  1.9076 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9077 +	<actiontype>DeriveKey</actiontype>
  1.9078 +	<actionbody>
  1.9079 +		<derivekey>
  1.9080 +			<kdf>pkcs#12</kdf>
  1.9081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9082 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9083 +			<iterations>128</iterations>
  1.9084 +			<key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16C2FF4007B705AC86ACDBE7C08A599E170F42573671CAAC9978</key>
  1.9085 +		</derivekey>
  1.9086 +	</actionbody>
  1.9087 +</action>
  1.9088 +
  1.9089 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9090 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9091 +//! @SYMREQ CIT_PREQ1054
  1.9092 +//! @SYMTestPriority medium
  1.9093 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9094 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9095 +<action>
  1.9096 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9097 +	<actiontype>DeriveKey</actiontype>
  1.9098 +	<actionbody>
  1.9099 +		<derivekey>
  1.9100 +			<kdf>pkcs#12</kdf>
  1.9101 +			<passwd>0000</passwd>
  1.9102 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9103 +			<iterations>128</iterations>
  1.9104 +			<key>99FE149183022F9EB2EB815BCC9504E59C524A1497922B0A2AAB43D17ACD0C3C782048DA1AD2BA09B56143681975</key>
  1.9105 +		</derivekey>
  1.9106 +	</actionbody>
  1.9107 +</action>
  1.9108 +
  1.9109 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9110 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9111 +//! @SYMREQ CIT_PREQ1054
  1.9112 +//! @SYMTestPriority medium
  1.9113 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9114 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9115 +<action>
  1.9116 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9117 +	<actiontype>DeriveKey</actiontype>
  1.9118 +	<actionbody>
  1.9119 +		<derivekey>
  1.9120 +			<kdf>pkcs#12</kdf>
  1.9121 +			<passwd>0001</passwd>
  1.9122 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9123 +			<iterations>128</iterations>
  1.9124 +			<key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FEB822868DC3090EEB79DED23D3E5F8FADAF47EB100E36B393BF</key>
  1.9125 +		</derivekey>
  1.9126 +	</actionbody>
  1.9127 +</action>
  1.9128 +
  1.9129 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9130 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9131 +//! @SYMREQ CIT_PREQ1054
  1.9132 +//! @SYMTestPriority medium
  1.9133 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9134 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9135 +<action>
  1.9136 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9137 +	<actiontype>DeriveKey</actiontype>
  1.9138 +	<actionbody>
  1.9139 +		<derivekey>
  1.9140 +			<kdf>pkcs#12</kdf>
  1.9141 +			<passwd>PSWD</passwd>
  1.9142 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9143 +			<iterations>128</iterations>
  1.9144 +			<key>22A70A865774E55CF08A70435611252278DCE76AED5C8A686073CBBEFEA2A3498BF5505B3E9CC6A1BE108737874F</key>
  1.9145 +		</derivekey>
  1.9146 +	</actionbody>
  1.9147 +</action>
  1.9148 +
  1.9149 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9150 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9151 +//! @SYMREQ CIT_PREQ1054
  1.9152 +//! @SYMTestPriority medium
  1.9153 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9154 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9155 +<action>
  1.9156 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9157 +	<actiontype>DeriveKey</actiontype>
  1.9158 +	<actionbody>
  1.9159 +		<derivekey>
  1.9160 +			<kdf>pkcs#12</kdf>
  1.9161 +			<passwd>password</passwd>
  1.9162 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9163 +			<iterations>128</iterations>
  1.9164 +			<key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C672CFA941C4ECCF5F173B42AABBBE23AEF7593C67EF5B183C3C8</key>
  1.9165 +		</derivekey>
  1.9166 +	</actionbody>
  1.9167 +</action>
  1.9168 +
  1.9169 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9170 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9171 +//! @SYMREQ CIT_PREQ1054
  1.9172 +//! @SYMTestPriority medium
  1.9173 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9174 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9175 +<action>
  1.9176 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9177 +	<actiontype>DeriveKey</actiontype>
  1.9178 +	<actionbody>
  1.9179 +		<derivekey>
  1.9180 +			<kdf>pkcs#12</kdf>
  1.9181 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9182 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9183 +			<iterations>128</iterations>
  1.9184 +			<key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CED20B6799ADA986C06DDF299F615C6B222A9C12CB65CD078D9A</key>
  1.9185 +		</derivekey>
  1.9186 +	</actionbody>
  1.9187 +</action>
  1.9188 +
  1.9189 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9190 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9191 +//! @SYMREQ CIT_PREQ1054
  1.9192 +//! @SYMTestPriority medium
  1.9193 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9194 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9195 +<action>
  1.9196 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9197 +	<actiontype>DeriveKey</actiontype>
  1.9198 +	<actionbody>
  1.9199 +		<derivekey>
  1.9200 +			<kdf>pkcs#12</kdf>
  1.9201 +			<passwd>0000</passwd>
  1.9202 +			<salt>53414C54</salt>
  1.9203 +			<iterations>1024</iterations>
  1.9204 +			<key>82824BE51C81A5FF4C4268E256F6621B9656325BEFB8E936331AB1AB8BDE634EA6298D7B8EB79832AAF01CF1F49A</key>
  1.9205 +		</derivekey>
  1.9206 +	</actionbody>
  1.9207 +</action>
  1.9208 +
  1.9209 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9210 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9211 +//! @SYMREQ CIT_PREQ1054
  1.9212 +//! @SYMTestPriority medium
  1.9213 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9214 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9215 +<action>
  1.9216 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9217 +	<actiontype>DeriveKey</actiontype>
  1.9218 +	<actionbody>
  1.9219 +		<derivekey>
  1.9220 +			<kdf>pkcs#12</kdf>
  1.9221 +			<passwd>0001</passwd>
  1.9222 +			<salt>53414C54</salt>
  1.9223 +			<iterations>1024</iterations>
  1.9224 +			<key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2680CD8CEAEF02609895F3CAC00A837D49674737EEC85151786</key>
  1.9225 +		</derivekey>
  1.9226 +	</actionbody>
  1.9227 +</action>
  1.9228 +
  1.9229 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9230 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9231 +//! @SYMREQ CIT_PREQ1054
  1.9232 +//! @SYMTestPriority medium
  1.9233 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9234 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9235 +<action>
  1.9236 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9237 +	<actiontype>DeriveKey</actiontype>
  1.9238 +	<actionbody>
  1.9239 +		<derivekey>
  1.9240 +			<kdf>pkcs#12</kdf>
  1.9241 +			<passwd>PSWD</passwd>
  1.9242 +			<salt>53414C54</salt>
  1.9243 +			<iterations>1024</iterations>
  1.9244 +			<key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE53571C9CE41B5FB82532D38F0DB4489BC642605ACF4FDCAEF5</key>
  1.9245 +		</derivekey>
  1.9246 +	</actionbody>
  1.9247 +</action>
  1.9248 +
  1.9249 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9250 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9251 +//! @SYMREQ CIT_PREQ1054
  1.9252 +//! @SYMTestPriority medium
  1.9253 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9254 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9255 +<action>
  1.9256 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9257 +	<actiontype>DeriveKey</actiontype>
  1.9258 +	<actionbody>
  1.9259 +		<derivekey>
  1.9260 +			<kdf>pkcs#12</kdf>
  1.9261 +			<passwd>password</passwd>
  1.9262 +			<salt>53414C54</salt>
  1.9263 +			<iterations>1024</iterations>
  1.9264 +			<key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E848576D39CDFA77EFE9969986D072D8C44B9147961EC0A3BC5AC</key>
  1.9265 +		</derivekey>
  1.9266 +	</actionbody>
  1.9267 +</action>
  1.9268 +
  1.9269 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9270 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9271 +//! @SYMREQ CIT_PREQ1054
  1.9272 +//! @SYMTestPriority medium
  1.9273 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9274 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9275 +<action>
  1.9276 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9277 +	<actiontype>DeriveKey</actiontype>
  1.9278 +	<actionbody>
  1.9279 +		<derivekey>
  1.9280 +			<kdf>pkcs#12</kdf>
  1.9281 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9282 +			<salt>53414C54</salt>
  1.9283 +			<iterations>1024</iterations>
  1.9284 +			<key>406C92305ACD663AB0B9EB66DED7929547C692FE118E8D16D80EDCE4FAFBB47960F4B4AB7272496528D235E45B5A</key>
  1.9285 +		</derivekey>
  1.9286 +	</actionbody>
  1.9287 +</action>
  1.9288 +
  1.9289 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9290 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9291 +//! @SYMREQ CIT_PREQ1054
  1.9292 +//! @SYMTestPriority medium
  1.9293 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9294 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9295 +<action>
  1.9296 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9297 +	<actiontype>DeriveKey</actiontype>
  1.9298 +	<actionbody>
  1.9299 +		<derivekey>
  1.9300 +			<kdf>pkcs#12</kdf>
  1.9301 +			<passwd>0000</passwd>
  1.9302 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9303 +			<iterations>1024</iterations>
  1.9304 +			<key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355C1E6AFFDE182AC0F49BF46F175F79F51352196D93EA67E17DF</key>
  1.9305 +		</derivekey>
  1.9306 +	</actionbody>
  1.9307 +</action>
  1.9308 +
  1.9309 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9310 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9311 +//! @SYMREQ CIT_PREQ1054
  1.9312 +//! @SYMTestPriority medium
  1.9313 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9314 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9315 +<action>
  1.9316 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9317 +	<actiontype>DeriveKey</actiontype>
  1.9318 +	<actionbody>
  1.9319 +		<derivekey>
  1.9320 +			<kdf>pkcs#12</kdf>
  1.9321 +			<passwd>0001</passwd>
  1.9322 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9323 +			<iterations>1024</iterations>
  1.9324 +			<key>0182E41FCA166CEAED10972BDF5F57A8F851200E371EC06DC900E66ACAEA25B12EFE28E7571395A1B57ABB8E9DAC</key>
  1.9325 +		</derivekey>
  1.9326 +	</actionbody>
  1.9327 +</action>
  1.9328 +
  1.9329 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9330 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9331 +//! @SYMREQ CIT_PREQ1054
  1.9332 +//! @SYMTestPriority medium
  1.9333 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9334 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9335 +<action>
  1.9336 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9337 +	<actiontype>DeriveKey</actiontype>
  1.9338 +	<actionbody>
  1.9339 +		<derivekey>
  1.9340 +			<kdf>pkcs#12</kdf>
  1.9341 +			<passwd>PSWD</passwd>
  1.9342 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9343 +			<iterations>1024</iterations>
  1.9344 +			<key>101FB775982CA15E37A065F7CDC5593DE385BDF504433650CC572F880CE0F525E77551ACFFCF92F66C9D407BFABF</key>
  1.9345 +		</derivekey>
  1.9346 +	</actionbody>
  1.9347 +</action>
  1.9348 +
  1.9349 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9350 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9351 +//! @SYMREQ CIT_PREQ1054
  1.9352 +//! @SYMTestPriority medium
  1.9353 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9354 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9355 +<action>
  1.9356 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9357 +	<actiontype>DeriveKey</actiontype>
  1.9358 +	<actionbody>
  1.9359 +		<derivekey>
  1.9360 +			<kdf>pkcs#12</kdf>
  1.9361 +			<passwd>password</passwd>
  1.9362 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9363 +			<iterations>1024</iterations>
  1.9364 +			<key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B61492CF0D98500BD3842C77C2D639589A83E60B22BE53751156F1</key>
  1.9365 +		</derivekey>
  1.9366 +	</actionbody>
  1.9367 +</action>
  1.9368 +
  1.9369 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9370 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9371 +//! @SYMREQ CIT_PREQ1054
  1.9372 +//! @SYMTestPriority medium
  1.9373 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9374 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9375 +<action>
  1.9376 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9377 +	<actiontype>DeriveKey</actiontype>
  1.9378 +	<actionbody>
  1.9379 +		<derivekey>
  1.9380 +			<kdf>pkcs#12</kdf>
  1.9381 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9382 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9383 +			<iterations>1024</iterations>
  1.9384 +			<key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95969233AAFAC6ABB4C369DDD9394FBCE2C4D86670BAA2AD6355</key>
  1.9385 +		</derivekey>
  1.9386 +	</actionbody>
  1.9387 +</action>
  1.9388 +
  1.9389 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9390 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9391 +//! @SYMREQ CIT_PREQ1054
  1.9392 +//! @SYMTestPriority medium
  1.9393 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9394 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9395 +<action>
  1.9396 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9397 +	<actiontype>DeriveKey</actiontype>
  1.9398 +	<actionbody>
  1.9399 +		<derivekey>
  1.9400 +			<kdf>pkcs#12</kdf>
  1.9401 +			<passwd>0000</passwd>
  1.9402 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9403 +			<iterations>1024</iterations>
  1.9404 +			<key>6789F0680A5C5840B8ED34B061494171E6407643F9400545C62690ED570B3AAD96654D5DE15C7CA6AE242E6123E9</key>
  1.9405 +		</derivekey>
  1.9406 +	</actionbody>
  1.9407 +</action>
  1.9408 +
  1.9409 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9410 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9411 +//! @SYMREQ CIT_PREQ1054
  1.9412 +//! @SYMTestPriority medium
  1.9413 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9414 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9415 +<action>
  1.9416 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9417 +	<actiontype>DeriveKey</actiontype>
  1.9418 +	<actionbody>
  1.9419 +		<derivekey>
  1.9420 +			<kdf>pkcs#12</kdf>
  1.9421 +			<passwd>0001</passwd>
  1.9422 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9423 +			<iterations>1024</iterations>
  1.9424 +			<key>43E663725870C4801A917C41C9B58C419933A93475CEA2FBB864F29E6D949DF2AAA8ADAB91C8A32B68062F12EE61</key>
  1.9425 +		</derivekey>
  1.9426 +	</actionbody>
  1.9427 +</action>
  1.9428 +
  1.9429 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9430 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9431 +//! @SYMREQ CIT_PREQ1054
  1.9432 +//! @SYMTestPriority medium
  1.9433 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9434 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9435 +<action>
  1.9436 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9437 +	<actiontype>DeriveKey</actiontype>
  1.9438 +	<actionbody>
  1.9439 +		<derivekey>
  1.9440 +			<kdf>pkcs#12</kdf>
  1.9441 +			<passwd>PSWD</passwd>
  1.9442 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9443 +			<iterations>1024</iterations>
  1.9444 +			<key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5C24BF367B0C63BE89EA9EB57615C0ABFAFC3FB8DFDEA3907AA</key>
  1.9445 +		</derivekey>
  1.9446 +	</actionbody>
  1.9447 +</action>
  1.9448 +
  1.9449 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9450 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9451 +//! @SYMREQ CIT_PREQ1054
  1.9452 +//! @SYMTestPriority medium
  1.9453 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9454 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9455 +<action>
  1.9456 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9457 +	<actiontype>DeriveKey</actiontype>
  1.9458 +	<actionbody>
  1.9459 +		<derivekey>
  1.9460 +			<kdf>pkcs#12</kdf>
  1.9461 +			<passwd>password</passwd>
  1.9462 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9463 +			<iterations>1024</iterations>
  1.9464 +			<key>CA202602C9A265559B6B96729B574DAA9B6D67036F69D903784374671E9B7E087ADE4AB9C5AE6BB62530C90F4E9C</key>
  1.9465 +		</derivekey>
  1.9466 +	</actionbody>
  1.9467 +</action>
  1.9468 +
  1.9469 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9470 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9471 +//! @SYMREQ CIT_PREQ1054
  1.9472 +//! @SYMTestPriority medium
  1.9473 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9474 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9475 +<action>
  1.9476 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9477 +	<actiontype>DeriveKey</actiontype>
  1.9478 +	<actionbody>
  1.9479 +		<derivekey>
  1.9480 +			<kdf>pkcs#12</kdf>
  1.9481 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9482 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9483 +			<iterations>1024</iterations>
  1.9484 +			<key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D4689DBDFBE81CF5F337376B8EEC58ADFD518A26768ABEB20131B9</key>
  1.9485 +		</derivekey>
  1.9486 +	</actionbody>
  1.9487 +</action>
  1.9488 +
  1.9489 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9490 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9491 +//! @SYMREQ CIT_PREQ1054
  1.9492 +//! @SYMTestPriority medium
  1.9493 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9494 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9495 +<action>
  1.9496 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9497 +	<actiontype>DeriveKey</actiontype>
  1.9498 +	<actionbody>
  1.9499 +		<derivekey>
  1.9500 +			<kdf>pkcs#12</kdf>
  1.9501 +			<passwd>0000</passwd>
  1.9502 +			<salt>53414C54</salt>
  1.9503 +			<iterations>1536</iterations>
  1.9504 +			<key>79A4E1398F511B262E60DCFE9E838C938B806716A9831A1BF6FFE616ADE12860428079E9CD2165E9194346EB6677</key>
  1.9505 +		</derivekey>
  1.9506 +	</actionbody>
  1.9507 +</action>
  1.9508 +
  1.9509 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9510 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9511 +//! @SYMREQ CIT_PREQ1054
  1.9512 +//! @SYMTestPriority medium
  1.9513 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9514 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9515 +<action>
  1.9516 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9517 +	<actiontype>DeriveKey</actiontype>
  1.9518 +	<actionbody>
  1.9519 +		<derivekey>
  1.9520 +			<kdf>pkcs#12</kdf>
  1.9521 +			<passwd>0001</passwd>
  1.9522 +			<salt>53414C54</salt>
  1.9523 +			<iterations>1536</iterations>
  1.9524 +			<key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D25BFDD890E8B903E66B306ED5C9F5C7B53BEA11BD495C328951</key>
  1.9525 +		</derivekey>
  1.9526 +	</actionbody>
  1.9527 +</action>
  1.9528 +
  1.9529 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9530 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9531 +//! @SYMREQ CIT_PREQ1054
  1.9532 +//! @SYMTestPriority medium
  1.9533 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9534 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9535 +<action>
  1.9536 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9537 +	<actiontype>DeriveKey</actiontype>
  1.9538 +	<actionbody>
  1.9539 +		<derivekey>
  1.9540 +			<kdf>pkcs#12</kdf>
  1.9541 +			<passwd>PSWD</passwd>
  1.9542 +			<salt>53414C54</salt>
  1.9543 +			<iterations>1536</iterations>
  1.9544 +			<key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E64B6690AE6ED16C5A82A0F7E7D9578BA7F62A7427260733165A</key>
  1.9545 +		</derivekey>
  1.9546 +	</actionbody>
  1.9547 +</action>
  1.9548 +
  1.9549 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9550 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9551 +//! @SYMREQ CIT_PREQ1054
  1.9552 +//! @SYMTestPriority medium
  1.9553 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9554 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9555 +<action>
  1.9556 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9557 +	<actiontype>DeriveKey</actiontype>
  1.9558 +	<actionbody>
  1.9559 +		<derivekey>
  1.9560 +			<kdf>pkcs#12</kdf>
  1.9561 +			<passwd>password</passwd>
  1.9562 +			<salt>53414C54</salt>
  1.9563 +			<iterations>1536</iterations>
  1.9564 +			<key>65B27A78C72DFEEA6C92846330CE98C6721909E89B014925B22427256BC6A4EFEB7A83A2244E59A25E7DE2F01FA6</key>
  1.9565 +		</derivekey>
  1.9566 +	</actionbody>
  1.9567 +</action>
  1.9568 +
  1.9569 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9570 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9571 +//! @SYMREQ CIT_PREQ1054
  1.9572 +//! @SYMTestPriority medium
  1.9573 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9574 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9575 +<action>
  1.9576 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9577 +	<actiontype>DeriveKey</actiontype>
  1.9578 +	<actionbody>
  1.9579 +		<derivekey>
  1.9580 +			<kdf>pkcs#12</kdf>
  1.9581 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9582 +			<salt>53414C54</salt>
  1.9583 +			<iterations>1536</iterations>
  1.9584 +			<key>8F8FC96A3D958731780B50E843D6BB65137A0728C3A4C55D23D4A0E99EBA71F56EC19356B50B987F486F3FF74A9C</key>
  1.9585 +		</derivekey>
  1.9586 +	</actionbody>
  1.9587 +</action>
  1.9588 +
  1.9589 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9590 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9591 +//! @SYMREQ CIT_PREQ1054
  1.9592 +//! @SYMTestPriority medium
  1.9593 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9594 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9595 +<action>
  1.9596 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9597 +	<actiontype>DeriveKey</actiontype>
  1.9598 +	<actionbody>
  1.9599 +		<derivekey>
  1.9600 +			<kdf>pkcs#12</kdf>
  1.9601 +			<passwd>0000</passwd>
  1.9602 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9603 +			<iterations>1536</iterations>
  1.9604 +			<key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25C6120B9099920440D11725F1D4F7CABFB8A170BF9744B74461</key>
  1.9605 +		</derivekey>
  1.9606 +	</actionbody>
  1.9607 +</action>
  1.9608 +
  1.9609 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9610 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9611 +//! @SYMREQ CIT_PREQ1054
  1.9612 +//! @SYMTestPriority medium
  1.9613 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9614 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9615 +<action>
  1.9616 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9617 +	<actiontype>DeriveKey</actiontype>
  1.9618 +	<actionbody>
  1.9619 +		<derivekey>
  1.9620 +			<kdf>pkcs#12</kdf>
  1.9621 +			<passwd>0001</passwd>
  1.9622 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9623 +			<iterations>1536</iterations>
  1.9624 +			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB413E8EAC164C3BA1FAD7ABC1CADB1BF7458010BF7814262F563</key>
  1.9625 +		</derivekey>
  1.9626 +	</actionbody>
  1.9627 +</action>
  1.9628 +
  1.9629 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9630 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9631 +//! @SYMREQ CIT_PREQ1054
  1.9632 +//! @SYMTestPriority medium
  1.9633 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9634 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9635 +<action>
  1.9636 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9637 +	<actiontype>DeriveKey</actiontype>
  1.9638 +	<actionbody>
  1.9639 +		<derivekey>
  1.9640 +			<kdf>pkcs#12</kdf>
  1.9641 +			<passwd>PSWD</passwd>
  1.9642 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9643 +			<iterations>1536</iterations>
  1.9644 +			<key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0CC173973E296F655BAB0BFEA7E51BACD8FC73AB278469439B58</key>
  1.9645 +		</derivekey>
  1.9646 +	</actionbody>
  1.9647 +</action>
  1.9648 +
  1.9649 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9650 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9651 +//! @SYMREQ CIT_PREQ1054
  1.9652 +//! @SYMTestPriority medium
  1.9653 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9654 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9655 +<action>
  1.9656 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9657 +	<actiontype>DeriveKey</actiontype>
  1.9658 +	<actionbody>
  1.9659 +		<derivekey>
  1.9660 +			<kdf>pkcs#12</kdf>
  1.9661 +			<passwd>password</passwd>
  1.9662 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9663 +			<iterations>1536</iterations>
  1.9664 +			<key>C05FE26245C742CC01B23C655E5D934D734610DE015AEFA126CC8A53FBD91EC774AE631F57444E206494BE6EB304</key>
  1.9665 +		</derivekey>
  1.9666 +	</actionbody>
  1.9667 +</action>
  1.9668 +
  1.9669 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9670 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9671 +//! @SYMREQ CIT_PREQ1054
  1.9672 +//! @SYMTestPriority medium
  1.9673 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9674 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9675 +<action>
  1.9676 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9677 +	<actiontype>DeriveKey</actiontype>
  1.9678 +	<actionbody>
  1.9679 +		<derivekey>
  1.9680 +			<kdf>pkcs#12</kdf>
  1.9681 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9682 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9683 +			<iterations>1536</iterations>
  1.9684 +			<key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0E036709FBD02F0FA15B7497042FF3E0B56ED26ACC058F1D00B</key>
  1.9685 +		</derivekey>
  1.9686 +	</actionbody>
  1.9687 +</action>
  1.9688 +
  1.9689 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9690 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9691 +//! @SYMREQ CIT_PREQ1054
  1.9692 +//! @SYMTestPriority medium
  1.9693 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9694 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9695 +<action>
  1.9696 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9697 +	<actiontype>DeriveKey</actiontype>
  1.9698 +	<actionbody>
  1.9699 +		<derivekey>
  1.9700 +			<kdf>pkcs#12</kdf>
  1.9701 +			<passwd>0000</passwd>
  1.9702 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9703 +			<iterations>1536</iterations>
  1.9704 +			<key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3E8CDC6C4D8D7D7226769FADE4650767B4472BBD418B2D969EB</key>
  1.9705 +		</derivekey>
  1.9706 +	</actionbody>
  1.9707 +</action>
  1.9708 +
  1.9709 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9710 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9711 +//! @SYMREQ CIT_PREQ1054
  1.9712 +//! @SYMTestPriority medium
  1.9713 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9714 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9715 +<action>
  1.9716 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9717 +	<actiontype>DeriveKey</actiontype>
  1.9718 +	<actionbody>
  1.9719 +		<derivekey>
  1.9720 +			<kdf>pkcs#12</kdf>
  1.9721 +			<passwd>0001</passwd>
  1.9722 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9723 +			<iterations>1536</iterations>
  1.9724 +			<key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA3932F031B4FB2D6F799C857B7B821D5CB05419EE6DF2D10BBD</key>
  1.9725 +		</derivekey>
  1.9726 +	</actionbody>
  1.9727 +</action>
  1.9728 +
  1.9729 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9730 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9731 +//! @SYMREQ CIT_PREQ1054
  1.9732 +//! @SYMTestPriority medium
  1.9733 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9734 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9735 +<action>
  1.9736 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9737 +	<actiontype>DeriveKey</actiontype>
  1.9738 +	<actionbody>
  1.9739 +		<derivekey>
  1.9740 +			<kdf>pkcs#12</kdf>
  1.9741 +			<passwd>PSWD</passwd>
  1.9742 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9743 +			<iterations>1536</iterations>
  1.9744 +			<key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA949B44DA6EAFD9D83FCD9365C617C137F7EC9C3EF036BD592C</key>
  1.9745 +		</derivekey>
  1.9746 +	</actionbody>
  1.9747 +</action>
  1.9748 +
  1.9749 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9750 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9751 +//! @SYMREQ CIT_PREQ1054
  1.9752 +//! @SYMTestPriority medium
  1.9753 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9754 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9755 +<action>
  1.9756 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9757 +	<actiontype>DeriveKey</actiontype>
  1.9758 +	<actionbody>
  1.9759 +		<derivekey>
  1.9760 +			<kdf>pkcs#12</kdf>
  1.9761 +			<passwd>password</passwd>
  1.9762 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9763 +			<iterations>1536</iterations>
  1.9764 +			<key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD458CDBB895741595BD6F879B9134D56F8695A654407E4809C56</key>
  1.9765 +		</derivekey>
  1.9766 +	</actionbody>
  1.9767 +</action>
  1.9768 +
  1.9769 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9770 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9771 +//! @SYMREQ CIT_PREQ1054
  1.9772 +//! @SYMTestPriority medium
  1.9773 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9774 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9775 +<action>
  1.9776 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9777 +	<actiontype>DeriveKey</actiontype>
  1.9778 +	<actionbody>
  1.9779 +		<derivekey>
  1.9780 +			<kdf>pkcs#12</kdf>
  1.9781 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9782 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1.9783 +			<iterations>1536</iterations>
  1.9784 +			<key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B272CB0DD4D76CAE04D831A4C12BC353F7C60F50ED67DF548599</key>
  1.9785 +		</derivekey>
  1.9786 +	</actionbody>
  1.9787 +</action>
  1.9788 +
  1.9789 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9790 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9791 +//! @SYMREQ CIT_PREQ1054
  1.9792 +//! @SYMTestPriority medium
  1.9793 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9794 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9795 +<action>
  1.9796 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9797 +	<actiontype>DeriveKey</actiontype>
  1.9798 +	<actionbody>
  1.9799 +		<derivekey>
  1.9800 +			<kdf>pkcs#12</kdf>
  1.9801 +			<passwd>0000</passwd>
  1.9802 +			<salt>53414C54</salt>
  1.9803 +			<iterations>2048</iterations>
  1.9804 +			<key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCDD858068993D4F95777E800B47B0A091487E50D888139BBAA95</key>
  1.9805 +		</derivekey>
  1.9806 +	</actionbody>
  1.9807 +</action>
  1.9808 +
  1.9809 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9810 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9811 +//! @SYMREQ CIT_PREQ1054
  1.9812 +//! @SYMTestPriority medium
  1.9813 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9814 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9815 +<action>
  1.9816 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9817 +	<actiontype>DeriveKey</actiontype>
  1.9818 +	<actionbody>
  1.9819 +		<derivekey>
  1.9820 +			<kdf>pkcs#12</kdf>
  1.9821 +			<passwd>0001</passwd>
  1.9822 +			<salt>53414C54</salt>
  1.9823 +			<iterations>2048</iterations>
  1.9824 +			<key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2275085600120C9642E197813F99DBE317142466C44961771AF</key>
  1.9825 +		</derivekey>
  1.9826 +	</actionbody>
  1.9827 +</action>
  1.9828 +
  1.9829 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9830 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9831 +//! @SYMREQ CIT_PREQ1054
  1.9832 +//! @SYMTestPriority medium
  1.9833 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9834 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9835 +<action>
  1.9836 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9837 +	<actiontype>DeriveKey</actiontype>
  1.9838 +	<actionbody>
  1.9839 +		<derivekey>
  1.9840 +			<kdf>pkcs#12</kdf>
  1.9841 +			<passwd>PSWD</passwd>
  1.9842 +			<salt>53414C54</salt>
  1.9843 +			<iterations>2048</iterations>
  1.9844 +			<key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2D6DD3D0577A59043B25D770FAC6CFF48666D15795B61297255</key>
  1.9845 +		</derivekey>
  1.9846 +	</actionbody>
  1.9847 +</action>
  1.9848 +
  1.9849 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9850 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9851 +//! @SYMREQ CIT_PREQ1054
  1.9852 +//! @SYMTestPriority medium
  1.9853 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9854 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9855 +<action>
  1.9856 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9857 +	<actiontype>DeriveKey</actiontype>
  1.9858 +	<actionbody>
  1.9859 +		<derivekey>
  1.9860 +			<kdf>pkcs#12</kdf>
  1.9861 +			<passwd>password</passwd>
  1.9862 +			<salt>53414C54</salt>
  1.9863 +			<iterations>2048</iterations>
  1.9864 +			<key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D97444114C46756D3F2FD1DF12182CF6C83CF32E72D1A70DF206</key>
  1.9865 +		</derivekey>
  1.9866 +	</actionbody>
  1.9867 +</action>
  1.9868 +
  1.9869 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9870 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9871 +//! @SYMREQ CIT_PREQ1054
  1.9872 +//! @SYMTestPriority medium
  1.9873 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9874 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9875 +<action>
  1.9876 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  1.9877 +	<actiontype>DeriveKey</actiontype>
  1.9878 +	<actionbody>
  1.9879 +		<derivekey>
  1.9880 +			<kdf>pkcs#12</kdf>
  1.9881 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9882 +			<salt>53414C54</salt>
  1.9883 +			<iterations>2048</iterations>
  1.9884 +			<key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45F218B705E54071E5BE4AB622F2E9B45FCA663D8B30ADCC0073</key>
  1.9885 +		</derivekey>
  1.9886 +	</actionbody>
  1.9887 +</action>
  1.9888 +
  1.9889 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9890 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9891 +//! @SYMREQ CIT_PREQ1054
  1.9892 +//! @SYMTestPriority medium
  1.9893 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9894 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9895 +<action>
  1.9896 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9897 +	<actiontype>DeriveKey</actiontype>
  1.9898 +	<actionbody>
  1.9899 +		<derivekey>
  1.9900 +			<kdf>pkcs#12</kdf>
  1.9901 +			<passwd>0000</passwd>
  1.9902 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9903 +			<iterations>2048</iterations>
  1.9904 +			<key>CD045229461658BC6C47C259F2D20433173DE4D31E54B1D693738FBA6D643ECB095761373FB0E49F9C478BA11755</key>
  1.9905 +		</derivekey>
  1.9906 +	</actionbody>
  1.9907 +</action>
  1.9908 +
  1.9909 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9910 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9911 +//! @SYMREQ CIT_PREQ1054
  1.9912 +//! @SYMTestPriority medium
  1.9913 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9914 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9915 +<action>
  1.9916 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9917 +	<actiontype>DeriveKey</actiontype>
  1.9918 +	<actionbody>
  1.9919 +		<derivekey>
  1.9920 +			<kdf>pkcs#12</kdf>
  1.9921 +			<passwd>0001</passwd>
  1.9922 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9923 +			<iterations>2048</iterations>
  1.9924 +			<key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6DC8B942CA4D9447EDFC29A5BDC1D450A73B298C6A9A8ED7D2F4</key>
  1.9925 +		</derivekey>
  1.9926 +	</actionbody>
  1.9927 +</action>
  1.9928 +
  1.9929 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9930 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9931 +//! @SYMREQ CIT_PREQ1054
  1.9932 +//! @SYMTestPriority medium
  1.9933 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9934 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9935 +<action>
  1.9936 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9937 +	<actiontype>DeriveKey</actiontype>
  1.9938 +	<actionbody>
  1.9939 +		<derivekey>
  1.9940 +			<kdf>pkcs#12</kdf>
  1.9941 +			<passwd>PSWD</passwd>
  1.9942 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9943 +			<iterations>2048</iterations>
  1.9944 +			<key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC37C801DE5E02A6DD1A193970B4505A403005B378BE47D61FEB</key>
  1.9945 +		</derivekey>
  1.9946 +	</actionbody>
  1.9947 +</action>
  1.9948 +
  1.9949 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9950 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9951 +//! @SYMREQ CIT_PREQ1054
  1.9952 +//! @SYMTestPriority medium
  1.9953 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9954 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9955 +<action>
  1.9956 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9957 +	<actiontype>DeriveKey</actiontype>
  1.9958 +	<actionbody>
  1.9959 +		<derivekey>
  1.9960 +			<kdf>pkcs#12</kdf>
  1.9961 +			<passwd>password</passwd>
  1.9962 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9963 +			<iterations>2048</iterations>
  1.9964 +			<key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B2F0294723113F25347AEAF0109E270C77A2524CAC118D164B8</key>
  1.9965 +		</derivekey>
  1.9966 +	</actionbody>
  1.9967 +</action>
  1.9968 +
  1.9969 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9970 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9971 +//! @SYMREQ CIT_PREQ1054
  1.9972 +//! @SYMTestPriority medium
  1.9973 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9974 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9975 +<action>
  1.9976 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  1.9977 +	<actiontype>DeriveKey</actiontype>
  1.9978 +	<actionbody>
  1.9979 +		<derivekey>
  1.9980 +			<kdf>pkcs#12</kdf>
  1.9981 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1.9982 +			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1.9983 +			<iterations>2048</iterations>
  1.9984 +			<key>A5B348EB4926290B223724CC8E4ED67FF458F2362279F0DF9F3A92AFF0473030D0EBA6E4173AF91E7AE535D3E988</key>
  1.9985 +		</derivekey>
  1.9986 +	</actionbody>
  1.9987 +</action>
  1.9988 +
  1.9989 +//! @SYMTestCaseID CIT_PREQ1054_01
  1.9990 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1.9991 +//! @SYMREQ CIT_PREQ1054
  1.9992 +//! @SYMTestPriority medium
  1.9993 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1.9994 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1.9995 +<action>
  1.9996 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  1.9997 +	<actiontype>DeriveKey</actiontype>
  1.9998 +	<actionbody>
  1.9999 +		<derivekey>
 1.10000 +			<kdf>pkcs#12</kdf>
 1.10001 +			<passwd>0000</passwd>
 1.10002 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 1.10003 +			<iterations>2048</iterations>
 1.10004 +			<key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A259262CE1B3E626454FF2A5B69A372FE3894C48E574F70F191F4</key>
 1.10005 +		</derivekey>
 1.10006 +	</actionbody>
 1.10007 +</action>
 1.10008 +
 1.10009 +//! @SYMTestCaseID CIT_PREQ1054_01
 1.10010 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
 1.10011 +//! @SYMREQ CIT_PREQ1054
 1.10012 +//! @SYMTestPriority medium
 1.10013 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
 1.10014 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
 1.10015 +<action>
 1.10016 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
 1.10017 +	<actiontype>DeriveKey</actiontype>
 1.10018 +	<actionbody>
 1.10019 +		<derivekey>
 1.10020 +			<kdf>pkcs#12</kdf>
 1.10021 +			<passwd>0001</passwd>
 1.10022 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 1.10023 +			<iterations>2048</iterations>
 1.10024 +			<key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE13602A15DF682A601681221A748627D1C585C079F8DCBD5ABE9763</key>
 1.10025 +		</derivekey>
 1.10026 +	</actionbody>
 1.10027 +</action>
 1.10028 +
 1.10029 +//! @SYMTestCaseID CIT_PREQ1054_01
 1.10030 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
 1.10031 +//! @SYMREQ CIT_PREQ1054
 1.10032 +//! @SYMTestPriority medium
 1.10033 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
 1.10034 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
 1.10035 +<action>
 1.10036 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
 1.10037 +	<actiontype>DeriveKey</actiontype>
 1.10038 +	<actionbody>
 1.10039 +		<derivekey>
 1.10040 +			<kdf>pkcs#12</kdf>
 1.10041 +			<passwd>PSWD</passwd>
 1.10042 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 1.10043 +			<iterations>2048</iterations>
 1.10044 +			<key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2A148121AE3E9E23B3891882F575F204CB0639FC9FDB9D5B0BD</key>
 1.10045 +		</derivekey>
 1.10046 +	</actionbody>
 1.10047 +</action>
 1.10048 +
 1.10049 +//! @SYMTestCaseID CIT_PREQ1054_01
 1.10050 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
 1.10051 +//! @SYMREQ CIT_PREQ1054
 1.10052 +//! @SYMTestPriority medium
 1.10053 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
 1.10054 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
 1.10055 +<action>
 1.10056 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
 1.10057 +	<actiontype>DeriveKey</actiontype>
 1.10058 +	<actionbody>
 1.10059 +		<derivekey>
 1.10060 +			<kdf>pkcs#12</kdf>
 1.10061 +			<passwd>password</passwd>
 1.10062 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 1.10063 +			<iterations>2048</iterations>
 1.10064 +			<key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF08E3059843173C72CD79EFEADE34A6DA91F6AB8E92383F1BDFA</key>
 1.10065 +		</derivekey>
 1.10066 +	</actionbody>
 1.10067 +</action>
 1.10068 +
 1.10069 +//! @SYMTestCaseID CIT_PREQ1054_01
 1.10070 +//! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
 1.10071 +//! @SYMREQ CIT_PREQ1054
 1.10072 +//! @SYMTestPriority medium
 1.10073 +//! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
 1.10074 +//! @SYMTestExpectedResults The generated key matches the expected byte stream.
 1.10075 +<action>
 1.10076 +	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
 1.10077 +	<actiontype>DeriveKey</actiontype>
 1.10078 +	<actionbody>
 1.10079 +		<derivekey>
 1.10080 +			<kdf>pkcs#12</kdf>
 1.10081 +			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
 1.10082 +			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 1.10083 +			<iterations>2048</iterations>
 1.10084 +			<key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1167ED13693E8373DFB92EC6F000DBADB9363CA12E9E16ED019</key>
 1.10085 +		</derivekey>
 1.10086 +	</actionbody>
 1.10087 +</action>
 1.10088 +
 1.10089 +<action>
 1.10090 +    <actionname>OOM End</actionname>
 1.10091 +    <actiontype>stopmemfailure</actiontype>
 1.10092 +    <actionbody></actionbody>
 1.10093 +    <actionresult>
 1.10094 +        <return>KErrNone</return>
 1.10095 +    </actionresult>
 1.10096 +</action>
 1.10097 +