os/security/crypto/weakcrypto/test/tpkcs5kdf/scripts/tpkcs12kdftests.txt
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
     1 // Copyright (c) Symbian Software Ltd 2006 - 2007. All rights reserved.
     2 
     3 <action>
     4 	<actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
     5 	<actiontype>DeriveKey</actiontype>
     6 	<actionbody>
     7 		<derivekey>
     8 			<passwd>password</passwd>
     9 			<salt>1234567878563412</salt>
    10 			<iterations>5</iterations>
    11 			<key>D1DAA78615F287E6</key>
    12 		</derivekey>
    13 	</actionbody>
    14 	<actionresult>
    15 		<return>KErrNone</return>
    16 	</actionresult>
    17 </action>
    18 <action>
    19 	<actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
    20 	<actiontype>DeriveKey</actiontype>
    21 	<actionbody>
    22 		<derivekey>
    23 			<passwd>password</passwd>
    24 			<salt>1234567878563412</salt>
    25 			<iterations>100</iterations>
    26 			<key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
    27 		</derivekey>
    28 	</actionbody>
    29 	<actionresult>
    30 		<return>KErrNone</return>
    31 	</actionresult>
    32 </action>
    33 <action>
    34 	<actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
    35 	<actiontype>DeriveKey</actiontype>
    36 	<actionbody>
    37 		<derivekey>
    38 			<passwd>password</passwd>
    39 			<salt>1234567878563412</salt>
    40 			<iterations>1000</iterations>
    41 			<key>142F8FAFCE633CCD9265D90FC8FE4252</key>
    42 		</derivekey>
    43 	</actionbody>
    44 	<actionresult>
    45 		<return>KErrNone</return>
    46 	</actionresult>
    47 </action>
    48 <action>
    49 	<actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
    50 	<actiontype>DeriveKey</actiontype>
    51 	<actionbody>
    52 		<derivekey>
    53 			<passwd>password</passwd>
    54 			<salt>1234567878563412</salt>
    55 			<iterations>10000</iterations>
    56 			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
    57 		</derivekey>
    58 	</actionbody>
    59 	<actionresult>
    60 		<return>KErrNone</return>
    61 	</actionresult>
    62 </action>
    63 <action>
    64 	<actionname>PKCS5 Key Derivation Test 5 -- 16 byte key, really long password vector generated from openssl</actionname>
    65 	<actiontype>DeriveKey</actiontype>
    66 	<actionbody>
    67 		<derivekey>
    68 			<passwd>This is an example of a really long really long password, I'm attempting to see how long we can make it and still see if our code will work. This really shouldn't be a problem</passwd>
    69 			<salt>1234567878563412</salt>
    70 			<iterations>1000</iterations>
    71 			<key>A39EDFA35086746DE5B4792035D9A070</key>
    72 		</derivekey>
    73 	</actionbody>
    74 	<actionresult>
    75 		<return>KErrNone</return>
    76 	</actionresult>
    77 </action>
    78 <action>
    79 	<actionname>PKCS5 Key Derivation Test 6 -- 16 byte key, medium size password vector generated from openssl</actionname>
    80 	<actiontype>DeriveKey</actiontype>
    81 	<actionbody>
    82 		<derivekey>
    83 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
    84 			<salt>1234567878563412</salt>
    85 			<iterations>1000</iterations>
    86 			<key>5F9219EED8BD0BCF5B3440B062305E05</key>
    87 		</derivekey>
    88 	</actionbody>
    89 	<actionresult>
    90 		<return>KErrNone</return>
    91 	</actionresult>
    92 </action>
    93 <action>
    94 	<actionname>PKCS5 Key Derivation Test 7 -- 32 byte key, long salt, short password vector generated from openssl</actionname>
    95 	<actiontype>DeriveKey</actiontype>
    96 	<actionbody>
    97 		<derivekey>
    98 			<passwd>password</passwd>
    99 			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
   100 			<iterations>1000</iterations>
   101 			<key>5648F3832B18C6A85165B093627F2268CCE1E79DC2F85D3909C36356789B349D</key>
   102 		</derivekey>
   103 	</actionbody>
   104 	<actionresult>
   105 		<return>KErrNone</return>
   106 	</actionresult>
   107 </action>
   108 <action>
   109 	<actionname>PKCS5 Key Derivation Test 8 -- 32 byte key, long salt, long password vector generated from openssl</actionname>
   110 	<actiontype>DeriveKey</actiontype>
   111 	<actionbody>
   112 		<derivekey>
   113 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   114 			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
   115 			<iterations>1000</iterations>
   116 			<key>9F14D62760272D4388FA70E31C2B7940A083F0190C244F25F293D98D58766016</key>
   117 		</derivekey>
   118 	</actionbody>
   119 	<actionresult>
   120 		<return>KErrNone</return>
   121 	</actionresult>
   122 </action>
   123 <action>
   124 	<actionname>PKCS5 Key Derivation Test 9 -- 16 byte key, really long password vector generated from openssl</actionname>
   125 	<actiontype>DeriveKey</actiontype>
   126 	<actionbody>
   127 		<derivekey>
   128 			<passwd>Thisisanexampleofareallylongreallylongpassword,I'mattemptingtoseehowlongwecanmakeitandstillseeifourcodewillwork.Thisreallyshouldn'tbeaproblem</passwd>
   129 			<salt>1234567878563412</salt>
   130 			<iterations>1000</iterations>
   131 			<key>529C96D62F54418DD6AD33724F3014D6</key>
   132 		</derivekey>
   133 	</actionbody>
   134 	<actionresult>
   135 		<return>KErrNone</return>
   136 	</actionresult>
   137 </action>
   138 <action>
   139 	<actionname>PKCS5 Key Derivation Test 10 -- 16 byte key, really long password vector generated from openssl</actionname>
   140 	<actiontype>DeriveKey</actiontype>
   141 	<actionbody>
   142 		<derivekey>
   143 			<passwd>ThisisanexampleofareallylongreallylongpasswordImattemptingtoseehowlongwecanmakeitandstillseeifourcodewillworkThisreallyshouldntbeaproblem</passwd>
   144 			<salt>1234567878563412</salt>
   145 			<iterations>1000</iterations>
   146 			<key>E493D7C57BD77047C9D709DF99CBD3C7</key>
   147 		</derivekey>
   148 	</actionbody>
   149 	<actionresult>
   150 		<return>KErrNone</return>
   151 	</actionresult>
   152 </action>
   153 <action>
   154 	<actionname>PKCS5 Key Derivation Test 11 -- 16 byte key, really long password vector generated from openssl</actionname>
   155 	<actiontype>DeriveKey</actiontype>
   156 	<actionbody>
   157 		<derivekey>
   158 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   159 			<salt>1234567878563412</salt>
   160 			<iterations>1000</iterations>
   161 			<key>EBD56BEE980D41A38AFA53642AAE4B25</key>
   162 		</derivekey>
   163 	</actionbody>
   164 	<actionresult>
   165 		<return>KErrNone</return>
   166 	</actionresult>
   167 </action>
   168 <action>
   169 	<actionname>PKCS5 Key Derivation Test 12 -- 32 byte key, really long password vector generated from openssl</actionname>
   170 	<actiontype>DeriveKey</actiontype>
   171 	<actionbody>
   172 		<derivekey>
   173 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   174 			<salt>1234567878563412</salt>
   175 			<iterations>1000</iterations>
   176 			<key>EBD56BEE980D41A38AFA53642AAE4B251FF9C2A1503B2EF65F28E59DEF906A60</key>
   177 		</derivekey>
   178 	</actionbody>
   179 	<actionresult>
   180 		<return>KErrNone</return>
   181 	</actionresult>
   182 </action>
   183 <action>
   184 	<actionname>PKCS5 Key Derivation Test 13 -- 32 byte key, long password vector generated from openssl</actionname>
   185 	<actiontype>DeriveKey</actiontype>
   186 	<actionbody>
   187 		<derivekey>
   188 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   189 			<salt>1234567878563412</salt>
   190 			<iterations>1000</iterations>
   191 			<key>1FFB655FEEC4202B0466BF24AA9800D0A96BFA7F904D655253CE2E32B0B7B795</key>
   192 		</derivekey>
   193 	</actionbody>
   194 	<actionresult>
   195 		<return>KErrNone</return>
   196 	</actionresult>
   197 </action>
   198 <action>
   199 	<actionname>PKCS5 Key Derivation Test 14 -- 32 byte key, long password vector generated from openssl</actionname>
   200 	<actiontype>DeriveKey</actiontype>
   201 	<actionbody>
   202 		<derivekey>
   203 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   204 			<salt>1234567878563412</salt>
   205 			<iterations>1000</iterations>
   206 			<key>A544F0E2F88507E44F92CA2DCAC8B67C0E0D780182CF7DDC18AB1CA9BB3C2904</key>
   207 		</derivekey>
   208 	</actionbody>
   209 	<actionresult>
   210 		<return>KErrNone</return>
   211 	</actionresult>
   212 </action>
   213 <action>
   214 	<actionname>PKCS5 Key Derivation Test 15 -- 32 byte key, medium length password vector generated from openssl</actionname>
   215 	<actiontype>DeriveKey</actiontype>
   216 	<actionbody>
   217 		<derivekey>
   218 			<passwd>passwordpasswordpasswordpasswordpasswordpassword</passwd>
   219 			<salt>1234567878563412</salt>
   220 			<iterations>1000</iterations>
   221 			<key>F1DC1A4224F0C9A4655FFDB7D5BE75060BFFD0B682293A5D2E61BD5A773B81BC</key>
   222 		</derivekey>
   223 	</actionbody>
   224 	<actionresult>
   225 		<return>KErrNone</return>
   226 	</actionresult>
   227 </action>
   228 <action>
   229 	<actionname>PKCS5 Key Derivation Test 16 -- 32 byte key, long password vector generated from openssl</actionname>
   230 	<actiontype>DeriveKey</actiontype>
   231 	<actionbody>
   232 		<derivekey>
   233 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   234 			<salt>1234567878563412</salt>
   235 			<iterations>1000</iterations>
   236 			<key>798B6F4DA56ECDA25C82A63F3577C3FF97A3A2A92BE3DD810C47704916890615</key>
   237 		</derivekey>
   238 	</actionbody>
   239 	<actionresult>
   240 		<return>KErrNone</return>
   241 	</actionresult>
   242 </action>
   243 <action>
   244 	<actionname>PKCS5 Key Derivation Test 17 -- 32 byte key, long password vector generated from openssl</actionname>
   245 	<actiontype>DeriveKey</actiontype>
   246 	<actionbody>
   247 		<derivekey>
   248 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   249 			<salt>1234567878563412</salt>
   250 			<iterations>1000</iterations>
   251 			<key>5F9219EED8BD0BCF5B3440B062305E052CE70AEBC9A43CE9F4F39E3D0E56603D</key>
   252 		</derivekey>
   253 	</actionbody>
   254 	<actionresult>
   255 		<return>KErrNone</return>
   256 	</actionresult>
   257 </action>
   258 <action>
   259 	<actionname>PKCS5 Key Derivation Test 18 -- 32 byte key, long password vector generated from openssl</actionname>
   260 	<actiontype>DeriveKey</actiontype>
   261 	<actionbody>
   262 		<derivekey>
   263 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
   264 			<salt>1234567878563412</salt>
   265 			<iterations>1000</iterations>
   266 			<key>421B82FF5825F9BE0E580C4D07BFF0CF54FFFD1BAD7763BF483A8291359F60E6</key>
   267 		</derivekey>
   268 	</actionbody>
   269 	<actionresult>
   270 		<return>KErrNone</return>
   271 	</actionresult>
   272 </action>
   273 <action>
   274 	<actionname>PKCS5 Key Derivation Test 19 -- 32 byte key, 65 byte password to test the fix in the CHMAC::Init code vector generated from openssl</actionname>
   275 	<actiontype>DeriveKey</actiontype>
   276 	<actionbody>
   277 		<derivekey>
   278 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordp</passwd>
   279 			<salt>1234567878563412</salt>
   280 			<iterations>1000</iterations>
   281 			<key>5D0AAB5A6A7BCD6F5376DF142E7FEAC98728F4F1322091138300A95DB5EBDE72</key>
   282 		</derivekey>
   283 	</actionbody>
   284 	<actionresult>
   285 		<return>KErrNone</return>
   286 	</actionresult>
   287 </action>
   288 <action>
   289 	<actionname>PKCS5 Key Derivation Test 20 -- 32 byte key, password with spaces vector generated from openssl</actionname>
   290 	<actiontype>DeriveKey</actiontype>
   291 	<actionbody>
   292 		<derivekey>
   293 			<passwd>password password password password password password password passwordp</passwd>
   294 			<salt>1234567878563412</salt>
   295 			<iterations>1000</iterations>
   296 			<key>EE99202289798A02DC6EAEB81A501C43AE3F8513B8F9ECC62FFBF3D0F70EF444</key>
   297 		</derivekey>
   298 	</actionbody>
   299 	<actionresult>
   300 		<return>KErrNone</return>
   301 	</actionresult>
   302 </action>
   303 <action>
   304 	<actionname>PKCS5 Key Derivation Test 21 -- 1 byte key vector generated from openssl</actionname>
   305 	<actiontype>DeriveKey</actiontype>
   306 	<actionbody>
   307 		<derivekey>
   308 			<passwd>password</passwd>
   309 			<salt>1234567878563412</salt>
   310 			<iterations>10000</iterations>
   311 			<key>66</key>
   312 		</derivekey>
   313 	</actionbody>
   314 	<actionresult>
   315 		<return>KErrNone</return>
   316 	</actionresult>
   317 </action>
   318 <action>
   319 	<actionname>PKCS5 Key Derivation Test 22 -- 128 byte key vector generated from openssl</actionname>
   320 	<actiontype>DeriveKey</actiontype>
   321 	<actionbody>
   322 		<derivekey>
   323 			<passwd>password</passwd>
   324 			<salt>1234567878563412</salt>
   325 			<iterations>10000</iterations>
   326 			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584E6FCB5C7636C3A04DA7F38778BE00C842A5A202578408C27FA08A3A7AACDF7A7B3F9763A33DDDCD09B3E07FA95106B07892F6981AA450447E106BCA8252B1532</key>
   327 		</derivekey>
   328 	</actionbody>
   329 	<actionresult>
   330 		<return>KErrNone</return>
   331 	</actionresult>
   332 </action>
   333 <action>
   334 	<actionname>PKCS5 Key Derivation Test 23 -- 160 (multiple of hash size) byte key vector generated from openssl</actionname>
   335 	<actiontype>DeriveKey</actiontype>
   336 	<actionbody>
   337 		<derivekey>
   338 			<passwd>alkiasdk29s.382{</passwd>
   339 			<salt>1234567878563412</salt>
   340 			<iterations>30000</iterations>
   341 			<key>62E18995350965CF1E02F111ADBEE270FBBAE6A2D8C6B94D24F1E4E41B04FE40C1C7CE7E768092362A75F220601AAF3FBBE339F33D97CA0443D8DD795B88BF97F9A41561A80D20659486459995CA559D5C37792C608CF279E880142319D333D17C62C35C65E9D2A50E0F4010E2D475ECB179A41366D62617BB48B13FA3A98E3FA0F76236442E324B39EDD1B9AB253A1D6A6A6462E3330B548BC4DAE4CD060FC6</key>
   342 		</derivekey>
   343 	</actionbody>
   344 	<actionresult>
   345 		<return>KErrNone</return>
   346 	</actionresult>
   347 </action>
   348 <action>
   349 	<actionname>PKCS5 Key Derivation Test 24 -- 8 byte key vector generated from openssl</actionname>
   350 	<actiontype>DeriveKey</actiontype>
   351 	<actionbody>
   352 		<derivekey>
   353 			<passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
   354 			<salt>1234567878563412</salt>
   355 			<iterations>1000</iterations>
   356 			<key>F104F4B53A4A160F</key>
   357 		</derivekey>
   358 	</actionbody>
   359 	<actionresult>
   360 		<return>KErrNone</return>
   361 	</actionresult>
   362 </action>
   363 <action>
   364 	<actionname>PKCS5 Key Derivation Test 25 -- 256 byte key vector generated from openssl</actionname>
   365 	<actiontype>DeriveKey</actiontype>
   366 	<actionbody>
   367 		<derivekey>
   368 			<passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
   369 			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
   370 			<iterations>10000</iterations>
   371 			<key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key>
   372 		</derivekey>
   373 	</actionbody>
   374 	<actionresult>
   375 		<return>KErrNone</return>
   376 	</actionresult>
   377 </action>
   378 // Out of Memory tests follow
   379 <action>
   380     <actionname>OOM Start</actionname>
   381     <actiontype>startmemfailure</actiontype>
   382     <actionbody></actionbody>
   383     <actionresult>
   384         <return>KErrNone</return>
   385     </actionresult>
   386 </action>
   387 <action>
   388 	<actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
   389 	<actiontype>DeriveKey</actiontype>
   390 	<actionbody>
   391 		<derivekey>
   392 			<passwd>password</passwd>
   393 			<salt>1234567878563412</salt>
   394 			<iterations>5</iterations>
   395 			<key>D1DAA78615F287E6</key>
   396 		</derivekey>
   397 	</actionbody>
   398 	<actionresult>
   399 		<return>KErrNone</return>
   400 	</actionresult>
   401 </action>
   402 <action>
   403 	<actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
   404 	<actiontype>DeriveKey</actiontype>
   405 	<actionbody>
   406 		<derivekey>
   407 			<passwd>password</passwd>
   408 			<salt>1234567878563412</salt>
   409 			<iterations>100</iterations>
   410 			<key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
   411 		</derivekey>
   412 	</actionbody>
   413 	<actionresult>
   414 		<return>KErrNone</return>
   415 	</actionresult>
   416 </action>
   417 <action>
   418 	<actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
   419 	<actiontype>DeriveKey</actiontype>
   420 	<actionbody>
   421 		<derivekey>
   422 			<passwd>password</passwd>
   423 			<salt>1234567878563412</salt>
   424 			<iterations>1000</iterations>
   425 			<key>142F8FAFCE633CCD9265D90FC8FE4252</key>
   426 		</derivekey>
   427 	</actionbody>
   428 	<actionresult>
   429 		<return>KErrNone</return>
   430 	</actionresult>
   431 </action>
   432 <action>
   433 	<actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
   434 	<actiontype>DeriveKey</actiontype>
   435 	<actionbody>
   436 		<derivekey>
   437 			<passwd>password</passwd>
   438 			<salt>1234567878563412</salt>
   439 			<iterations>10000</iterations>
   440 			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
   441 		</derivekey>
   442 	</actionbody>
   443 	<actionresult>
   444 		<return>KErrNone</return>
   445 	</actionresult>
   446 </action>
   447 <action>
   448 	<actionname>PKCS5 Key Derivation Test 5 -- leave from performAction other than KErrNoMemory</actionname>
   449 	<actiontype>DeriveKey</actiontype>
   450 	<actionbody>
   451 		<derivekey>
   452 			<passwd>password</passwd>
   453 			<salt>1234567878563412</salt>
   454 			<iterations>10000</iterations>
   455 			<key>66</key>
   456 			<leaveinperformaction>1</leaveinperformaction>
   457 		</derivekey>
   458 		<knowndefect>ETrue</knowndefect>
   459 	</actionbody>
   460 	<actionresult>
   461 		<return>KErrNone</return>
   462 	</actionresult>
   463 </action>
   464 <action>
   465     <actionname>OOM End</actionname>
   466     <actiontype>stopmemfailure</actiontype>
   467     <actionbody></actionbody>
   468     <actionresult>
   469         <return>KErrNone</return>
   470     </actionresult>
   471 </action>
   472 //End of out of memory tests
   473 
   474 // =====================================================================
   475 // PKCS#12 tests
   476 
   477 <action>
   478     <actionname>OOM Start</actionname>
   479     <actiontype>startmemfailure</actiontype>
   480     <actionbody></actionbody>
   481     <actionresult>
   482         <return>KErrNone</return>
   483     </actionresult>
   484 </action>
   485 
   486 //! @SYMTestCaseID CIT_PREQ1054_01
   487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   488 //! @SYMREQ CIT_PREQ1054
   489 //! @SYMTestPriority medium
   490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   492 <action>
   493 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   494 	<actiontype>DeriveKey</actiontype>
   495 	<actionbody>
   496 		<derivekey>
   497 			<kdf>pkcs#12</kdf>
   498 			<passwd>0000</passwd>
   499 			<salt>53414C54</salt>
   500 			<iterations>1</iterations>
   501 			<key>3037AFC8EA</key>
   502 		</derivekey>
   503 	</actionbody>
   504 </action>
   505 
   506 //! @SYMTestCaseID CIT_PREQ1054_01
   507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   508 //! @SYMREQ CIT_PREQ1054
   509 //! @SYMTestPriority medium
   510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   512 <action>
   513 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   514 	<actiontype>DeriveKey</actiontype>
   515 	<actionbody>
   516 		<derivekey>
   517 			<kdf>pkcs#12</kdf>
   518 			<passwd>0001</passwd>
   519 			<salt>53414C54</salt>
   520 			<iterations>1</iterations>
   521 			<key>37F44080CB</key>
   522 		</derivekey>
   523 	</actionbody>
   524 </action>
   525 
   526 //! @SYMTestCaseID CIT_PREQ1054_01
   527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   528 //! @SYMREQ CIT_PREQ1054
   529 //! @SYMTestPriority medium
   530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   532 <action>
   533 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   534 	<actiontype>DeriveKey</actiontype>
   535 	<actionbody>
   536 		<derivekey>
   537 			<kdf>pkcs#12</kdf>
   538 			<passwd>PSWD</passwd>
   539 			<salt>53414C54</salt>
   540 			<iterations>1</iterations>
   541 			<key>8A18939ACF</key>
   542 		</derivekey>
   543 	</actionbody>
   544 </action>
   545 
   546 //! @SYMTestCaseID CIT_PREQ1054_01
   547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   548 //! @SYMREQ CIT_PREQ1054
   549 //! @SYMTestPriority medium
   550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   552 <action>
   553 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   554 	<actiontype>DeriveKey</actiontype>
   555 	<actionbody>
   556 		<derivekey>
   557 			<kdf>pkcs#12</kdf>
   558 			<passwd>password</passwd>
   559 			<salt>53414C54</salt>
   560 			<iterations>1</iterations>
   561 			<key>AFF6C5EDE0</key>
   562 		</derivekey>
   563 	</actionbody>
   564 </action>
   565 
   566 //! @SYMTestCaseID CIT_PREQ1054_01
   567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   568 //! @SYMREQ CIT_PREQ1054
   569 //! @SYMTestPriority medium
   570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   572 <action>
   573 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   574 	<actiontype>DeriveKey</actiontype>
   575 	<actionbody>
   576 		<derivekey>
   577 			<kdf>pkcs#12</kdf>
   578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   579 			<salt>53414C54</salt>
   580 			<iterations>1</iterations>
   581 			<key>2ED53BB2CE</key>
   582 		</derivekey>
   583 	</actionbody>
   584 </action>
   585 
   586 //! @SYMTestCaseID CIT_PREQ1054_01
   587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   588 //! @SYMREQ CIT_PREQ1054
   589 //! @SYMTestPriority medium
   590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   592 <action>
   593 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   594 	<actiontype>DeriveKey</actiontype>
   595 	<actionbody>
   596 		<derivekey>
   597 			<kdf>pkcs#12</kdf>
   598 			<passwd>0000</passwd>
   599 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   600 			<iterations>1</iterations>
   601 			<key>49CABE7B67</key>
   602 		</derivekey>
   603 	</actionbody>
   604 </action>
   605 
   606 //! @SYMTestCaseID CIT_PREQ1054_01
   607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   608 //! @SYMREQ CIT_PREQ1054
   609 //! @SYMTestPriority medium
   610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   612 <action>
   613 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   614 	<actiontype>DeriveKey</actiontype>
   615 	<actionbody>
   616 		<derivekey>
   617 			<kdf>pkcs#12</kdf>
   618 			<passwd>0001</passwd>
   619 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   620 			<iterations>1</iterations>
   621 			<key>F994B990D3</key>
   622 		</derivekey>
   623 	</actionbody>
   624 </action>
   625 
   626 //! @SYMTestCaseID CIT_PREQ1054_01
   627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   628 //! @SYMREQ CIT_PREQ1054
   629 //! @SYMTestPriority medium
   630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   632 <action>
   633 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   634 	<actiontype>DeriveKey</actiontype>
   635 	<actionbody>
   636 		<derivekey>
   637 			<kdf>pkcs#12</kdf>
   638 			<passwd>PSWD</passwd>
   639 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   640 			<iterations>1</iterations>
   641 			<key>1AFAAD7E51</key>
   642 		</derivekey>
   643 	</actionbody>
   644 </action>
   645 
   646 //! @SYMTestCaseID CIT_PREQ1054_01
   647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   648 //! @SYMREQ CIT_PREQ1054
   649 //! @SYMTestPriority medium
   650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   652 <action>
   653 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   654 	<actiontype>DeriveKey</actiontype>
   655 	<actionbody>
   656 		<derivekey>
   657 			<kdf>pkcs#12</kdf>
   658 			<passwd>password</passwd>
   659 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   660 			<iterations>1</iterations>
   661 			<key>878C91098D</key>
   662 		</derivekey>
   663 	</actionbody>
   664 </action>
   665 
   666 //! @SYMTestCaseID CIT_PREQ1054_01
   667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   668 //! @SYMREQ CIT_PREQ1054
   669 //! @SYMTestPriority medium
   670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   672 <action>
   673 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   674 	<actiontype>DeriveKey</actiontype>
   675 	<actionbody>
   676 		<derivekey>
   677 			<kdf>pkcs#12</kdf>
   678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   679 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   680 			<iterations>1</iterations>
   681 			<key>0DE3F08CAF</key>
   682 		</derivekey>
   683 	</actionbody>
   684 </action>
   685 
   686 //! @SYMTestCaseID CIT_PREQ1054_01
   687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   688 //! @SYMREQ CIT_PREQ1054
   689 //! @SYMTestPriority medium
   690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   692 <action>
   693 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   694 	<actiontype>DeriveKey</actiontype>
   695 	<actionbody>
   696 		<derivekey>
   697 			<kdf>pkcs#12</kdf>
   698 			<passwd>0000</passwd>
   699 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   700 			<iterations>1</iterations>
   701 			<key>90253A49C0</key>
   702 		</derivekey>
   703 	</actionbody>
   704 </action>
   705 
   706 //! @SYMTestCaseID CIT_PREQ1054_01
   707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   708 //! @SYMREQ CIT_PREQ1054
   709 //! @SYMTestPriority medium
   710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   712 <action>
   713 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   714 	<actiontype>DeriveKey</actiontype>
   715 	<actionbody>
   716 		<derivekey>
   717 			<kdf>pkcs#12</kdf>
   718 			<passwd>0001</passwd>
   719 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   720 			<iterations>1</iterations>
   721 			<key>40BE97AB93</key>
   722 		</derivekey>
   723 	</actionbody>
   724 </action>
   725 
   726 //! @SYMTestCaseID CIT_PREQ1054_01
   727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   728 //! @SYMREQ CIT_PREQ1054
   729 //! @SYMTestPriority medium
   730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   732 <action>
   733 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   734 	<actiontype>DeriveKey</actiontype>
   735 	<actionbody>
   736 		<derivekey>
   737 			<kdf>pkcs#12</kdf>
   738 			<passwd>PSWD</passwd>
   739 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   740 			<iterations>1</iterations>
   741 			<key>A64B43E14E</key>
   742 		</derivekey>
   743 	</actionbody>
   744 </action>
   745 
   746 //! @SYMTestCaseID CIT_PREQ1054_01
   747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   748 //! @SYMREQ CIT_PREQ1054
   749 //! @SYMTestPriority medium
   750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   752 <action>
   753 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   754 	<actiontype>DeriveKey</actiontype>
   755 	<actionbody>
   756 		<derivekey>
   757 			<kdf>pkcs#12</kdf>
   758 			<passwd>password</passwd>
   759 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   760 			<iterations>1</iterations>
   761 			<key>E323D5F588</key>
   762 		</derivekey>
   763 	</actionbody>
   764 </action>
   765 
   766 //! @SYMTestCaseID CIT_PREQ1054_01
   767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   768 //! @SYMREQ CIT_PREQ1054
   769 //! @SYMTestPriority medium
   770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   772 <action>
   773 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   774 	<actiontype>DeriveKey</actiontype>
   775 	<actionbody>
   776 		<derivekey>
   777 			<kdf>pkcs#12</kdf>
   778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   779 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
   780 			<iterations>1</iterations>
   781 			<key>27476572AF</key>
   782 		</derivekey>
   783 	</actionbody>
   784 </action>
   785 
   786 //! @SYMTestCaseID CIT_PREQ1054_01
   787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   788 //! @SYMREQ CIT_PREQ1054
   789 //! @SYMTestPriority medium
   790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   792 <action>
   793 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   794 	<actiontype>DeriveKey</actiontype>
   795 	<actionbody>
   796 		<derivekey>
   797 			<kdf>pkcs#12</kdf>
   798 			<passwd>0000</passwd>
   799 			<salt>53414C54</salt>
   800 			<iterations>2</iterations>
   801 			<key>A1D9010A67</key>
   802 		</derivekey>
   803 	</actionbody>
   804 </action>
   805 
   806 //! @SYMTestCaseID CIT_PREQ1054_01
   807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   808 //! @SYMREQ CIT_PREQ1054
   809 //! @SYMTestPriority medium
   810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   812 <action>
   813 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   814 	<actiontype>DeriveKey</actiontype>
   815 	<actionbody>
   816 		<derivekey>
   817 			<kdf>pkcs#12</kdf>
   818 			<passwd>0001</passwd>
   819 			<salt>53414C54</salt>
   820 			<iterations>2</iterations>
   821 			<key>17E4E1F15B</key>
   822 		</derivekey>
   823 	</actionbody>
   824 </action>
   825 
   826 //! @SYMTestCaseID CIT_PREQ1054_01
   827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   828 //! @SYMREQ CIT_PREQ1054
   829 //! @SYMTestPriority medium
   830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   832 <action>
   833 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   834 	<actiontype>DeriveKey</actiontype>
   835 	<actionbody>
   836 		<derivekey>
   837 			<kdf>pkcs#12</kdf>
   838 			<passwd>PSWD</passwd>
   839 			<salt>53414C54</salt>
   840 			<iterations>2</iterations>
   841 			<key>D1B71808FC</key>
   842 		</derivekey>
   843 	</actionbody>
   844 </action>
   845 
   846 //! @SYMTestCaseID CIT_PREQ1054_01
   847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   848 //! @SYMREQ CIT_PREQ1054
   849 //! @SYMTestPriority medium
   850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   852 <action>
   853 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   854 	<actiontype>DeriveKey</actiontype>
   855 	<actionbody>
   856 		<derivekey>
   857 			<kdf>pkcs#12</kdf>
   858 			<passwd>password</passwd>
   859 			<salt>53414C54</salt>
   860 			<iterations>2</iterations>
   861 			<key>EE7E4073F2</key>
   862 		</derivekey>
   863 	</actionbody>
   864 </action>
   865 
   866 //! @SYMTestCaseID CIT_PREQ1054_01
   867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   868 //! @SYMREQ CIT_PREQ1054
   869 //! @SYMTestPriority medium
   870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   872 <action>
   873 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
   874 	<actiontype>DeriveKey</actiontype>
   875 	<actionbody>
   876 		<derivekey>
   877 			<kdf>pkcs#12</kdf>
   878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   879 			<salt>53414C54</salt>
   880 			<iterations>2</iterations>
   881 			<key>5BF185C726</key>
   882 		</derivekey>
   883 	</actionbody>
   884 </action>
   885 
   886 //! @SYMTestCaseID CIT_PREQ1054_01
   887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   888 //! @SYMREQ CIT_PREQ1054
   889 //! @SYMTestPriority medium
   890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   892 <action>
   893 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   894 	<actiontype>DeriveKey</actiontype>
   895 	<actionbody>
   896 		<derivekey>
   897 			<kdf>pkcs#12</kdf>
   898 			<passwd>0000</passwd>
   899 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   900 			<iterations>2</iterations>
   901 			<key>72ADF5E041</key>
   902 		</derivekey>
   903 	</actionbody>
   904 </action>
   905 
   906 //! @SYMTestCaseID CIT_PREQ1054_01
   907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   908 //! @SYMREQ CIT_PREQ1054
   909 //! @SYMTestPriority medium
   910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   912 <action>
   913 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   914 	<actiontype>DeriveKey</actiontype>
   915 	<actionbody>
   916 		<derivekey>
   917 			<kdf>pkcs#12</kdf>
   918 			<passwd>0001</passwd>
   919 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   920 			<iterations>2</iterations>
   921 			<key>63E6DF459C</key>
   922 		</derivekey>
   923 	</actionbody>
   924 </action>
   925 
   926 //! @SYMTestCaseID CIT_PREQ1054_01
   927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   928 //! @SYMREQ CIT_PREQ1054
   929 //! @SYMTestPriority medium
   930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   932 <action>
   933 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   934 	<actiontype>DeriveKey</actiontype>
   935 	<actionbody>
   936 		<derivekey>
   937 			<kdf>pkcs#12</kdf>
   938 			<passwd>PSWD</passwd>
   939 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   940 			<iterations>2</iterations>
   941 			<key>C2099204AB</key>
   942 		</derivekey>
   943 	</actionbody>
   944 </action>
   945 
   946 //! @SYMTestCaseID CIT_PREQ1054_01
   947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   948 //! @SYMREQ CIT_PREQ1054
   949 //! @SYMTestPriority medium
   950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   952 <action>
   953 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   954 	<actiontype>DeriveKey</actiontype>
   955 	<actionbody>
   956 		<derivekey>
   957 			<kdf>pkcs#12</kdf>
   958 			<passwd>password</passwd>
   959 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   960 			<iterations>2</iterations>
   961 			<key>3204D28A32</key>
   962 		</derivekey>
   963 	</actionbody>
   964 </action>
   965 
   966 //! @SYMTestCaseID CIT_PREQ1054_01
   967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   968 //! @SYMREQ CIT_PREQ1054
   969 //! @SYMTestPriority medium
   970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   972 <action>
   973 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
   974 	<actiontype>DeriveKey</actiontype>
   975 	<actionbody>
   976 		<derivekey>
   977 			<kdf>pkcs#12</kdf>
   978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
   979 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
   980 			<iterations>2</iterations>
   981 			<key>FB845F70A4</key>
   982 		</derivekey>
   983 	</actionbody>
   984 </action>
   985 
   986 //! @SYMTestCaseID CIT_PREQ1054_01
   987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
   988 //! @SYMREQ CIT_PREQ1054
   989 //! @SYMTestPriority medium
   990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
   991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
   992 <action>
   993 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
   994 	<actiontype>DeriveKey</actiontype>
   995 	<actionbody>
   996 		<derivekey>
   997 			<kdf>pkcs#12</kdf>
   998 			<passwd>0000</passwd>
   999 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1000 			<iterations>2</iterations>
  1001 			<key>B9230EEC1D</key>
  1002 		</derivekey>
  1003 	</actionbody>
  1004 </action>
  1005 
  1006 //! @SYMTestCaseID CIT_PREQ1054_01
  1007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1008 //! @SYMREQ CIT_PREQ1054
  1009 //! @SYMTestPriority medium
  1010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1012 <action>
  1013 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1014 	<actiontype>DeriveKey</actiontype>
  1015 	<actionbody>
  1016 		<derivekey>
  1017 			<kdf>pkcs#12</kdf>
  1018 			<passwd>0001</passwd>
  1019 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1020 			<iterations>2</iterations>
  1021 			<key>462B0F2D1B</key>
  1022 		</derivekey>
  1023 	</actionbody>
  1024 </action>
  1025 
  1026 //! @SYMTestCaseID CIT_PREQ1054_01
  1027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1028 //! @SYMREQ CIT_PREQ1054
  1029 //! @SYMTestPriority medium
  1030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1032 <action>
  1033 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1034 	<actiontype>DeriveKey</actiontype>
  1035 	<actionbody>
  1036 		<derivekey>
  1037 			<kdf>pkcs#12</kdf>
  1038 			<passwd>PSWD</passwd>
  1039 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1040 			<iterations>2</iterations>
  1041 			<key>05B66EF1BB</key>
  1042 		</derivekey>
  1043 	</actionbody>
  1044 </action>
  1045 
  1046 //! @SYMTestCaseID CIT_PREQ1054_01
  1047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1048 //! @SYMREQ CIT_PREQ1054
  1049 //! @SYMTestPriority medium
  1050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1052 <action>
  1053 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1054 	<actiontype>DeriveKey</actiontype>
  1055 	<actionbody>
  1056 		<derivekey>
  1057 			<kdf>pkcs#12</kdf>
  1058 			<passwd>password</passwd>
  1059 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1060 			<iterations>2</iterations>
  1061 			<key>C1B7E77C96</key>
  1062 		</derivekey>
  1063 	</actionbody>
  1064 </action>
  1065 
  1066 //! @SYMTestCaseID CIT_PREQ1054_01
  1067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1068 //! @SYMREQ CIT_PREQ1054
  1069 //! @SYMTestPriority medium
  1070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1072 <action>
  1073 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1074 	<actiontype>DeriveKey</actiontype>
  1075 	<actionbody>
  1076 		<derivekey>
  1077 			<kdf>pkcs#12</kdf>
  1078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1079 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1080 			<iterations>2</iterations>
  1081 			<key>3DE08CDACF</key>
  1082 		</derivekey>
  1083 	</actionbody>
  1084 </action>
  1085 
  1086 //! @SYMTestCaseID CIT_PREQ1054_01
  1087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1088 //! @SYMREQ CIT_PREQ1054
  1089 //! @SYMTestPriority medium
  1090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1092 <action>
  1093 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1094 	<actiontype>DeriveKey</actiontype>
  1095 	<actionbody>
  1096 		<derivekey>
  1097 			<kdf>pkcs#12</kdf>
  1098 			<passwd>0000</passwd>
  1099 			<salt>53414C54</salt>
  1100 			<iterations>4</iterations>
  1101 			<key>D0158BFC57</key>
  1102 		</derivekey>
  1103 	</actionbody>
  1104 </action>
  1105 
  1106 //! @SYMTestCaseID CIT_PREQ1054_01
  1107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1108 //! @SYMREQ CIT_PREQ1054
  1109 //! @SYMTestPriority medium
  1110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1112 <action>
  1113 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1114 	<actiontype>DeriveKey</actiontype>
  1115 	<actionbody>
  1116 		<derivekey>
  1117 			<kdf>pkcs#12</kdf>
  1118 			<passwd>0001</passwd>
  1119 			<salt>53414C54</salt>
  1120 			<iterations>4</iterations>
  1121 			<key>AEB6CD53F0</key>
  1122 		</derivekey>
  1123 	</actionbody>
  1124 </action>
  1125 
  1126 //! @SYMTestCaseID CIT_PREQ1054_01
  1127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1128 //! @SYMREQ CIT_PREQ1054
  1129 //! @SYMTestPriority medium
  1130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1132 <action>
  1133 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1134 	<actiontype>DeriveKey</actiontype>
  1135 	<actionbody>
  1136 		<derivekey>
  1137 			<kdf>pkcs#12</kdf>
  1138 			<passwd>PSWD</passwd>
  1139 			<salt>53414C54</salt>
  1140 			<iterations>4</iterations>
  1141 			<key>80010C12B6</key>
  1142 		</derivekey>
  1143 	</actionbody>
  1144 </action>
  1145 
  1146 //! @SYMTestCaseID CIT_PREQ1054_01
  1147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1148 //! @SYMREQ CIT_PREQ1054
  1149 //! @SYMTestPriority medium
  1150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1152 <action>
  1153 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1154 	<actiontype>DeriveKey</actiontype>
  1155 	<actionbody>
  1156 		<derivekey>
  1157 			<kdf>pkcs#12</kdf>
  1158 			<passwd>password</passwd>
  1159 			<salt>53414C54</salt>
  1160 			<iterations>4</iterations>
  1161 			<key>497DE34C4C</key>
  1162 		</derivekey>
  1163 	</actionbody>
  1164 </action>
  1165 
  1166 //! @SYMTestCaseID CIT_PREQ1054_01
  1167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1168 //! @SYMREQ CIT_PREQ1054
  1169 //! @SYMTestPriority medium
  1170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1172 <action>
  1173 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1174 	<actiontype>DeriveKey</actiontype>
  1175 	<actionbody>
  1176 		<derivekey>
  1177 			<kdf>pkcs#12</kdf>
  1178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1179 			<salt>53414C54</salt>
  1180 			<iterations>4</iterations>
  1181 			<key>146C6A5B58</key>
  1182 		</derivekey>
  1183 	</actionbody>
  1184 </action>
  1185 
  1186 //! @SYMTestCaseID CIT_PREQ1054_01
  1187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1188 //! @SYMREQ CIT_PREQ1054
  1189 //! @SYMTestPriority medium
  1190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1192 <action>
  1193 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1194 	<actiontype>DeriveKey</actiontype>
  1195 	<actionbody>
  1196 		<derivekey>
  1197 			<kdf>pkcs#12</kdf>
  1198 			<passwd>0000</passwd>
  1199 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1200 			<iterations>4</iterations>
  1201 			<key>E89772E7A5</key>
  1202 		</derivekey>
  1203 	</actionbody>
  1204 </action>
  1205 
  1206 //! @SYMTestCaseID CIT_PREQ1054_01
  1207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1208 //! @SYMREQ CIT_PREQ1054
  1209 //! @SYMTestPriority medium
  1210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1212 <action>
  1213 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1214 	<actiontype>DeriveKey</actiontype>
  1215 	<actionbody>
  1216 		<derivekey>
  1217 			<kdf>pkcs#12</kdf>
  1218 			<passwd>0001</passwd>
  1219 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1220 			<iterations>4</iterations>
  1221 			<key>2393071377</key>
  1222 		</derivekey>
  1223 	</actionbody>
  1224 </action>
  1225 
  1226 //! @SYMTestCaseID CIT_PREQ1054_01
  1227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1228 //! @SYMREQ CIT_PREQ1054
  1229 //! @SYMTestPriority medium
  1230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1232 <action>
  1233 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1234 	<actiontype>DeriveKey</actiontype>
  1235 	<actionbody>
  1236 		<derivekey>
  1237 			<kdf>pkcs#12</kdf>
  1238 			<passwd>PSWD</passwd>
  1239 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1240 			<iterations>4</iterations>
  1241 			<key>DF2D961FE3</key>
  1242 		</derivekey>
  1243 	</actionbody>
  1244 </action>
  1245 
  1246 //! @SYMTestCaseID CIT_PREQ1054_01
  1247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1248 //! @SYMREQ CIT_PREQ1054
  1249 //! @SYMTestPriority medium
  1250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1252 <action>
  1253 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1254 	<actiontype>DeriveKey</actiontype>
  1255 	<actionbody>
  1256 		<derivekey>
  1257 			<kdf>pkcs#12</kdf>
  1258 			<passwd>password</passwd>
  1259 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1260 			<iterations>4</iterations>
  1261 			<key>363619530B</key>
  1262 		</derivekey>
  1263 	</actionbody>
  1264 </action>
  1265 
  1266 //! @SYMTestCaseID CIT_PREQ1054_01
  1267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1268 //! @SYMREQ CIT_PREQ1054
  1269 //! @SYMTestPriority medium
  1270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1272 <action>
  1273 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1274 	<actiontype>DeriveKey</actiontype>
  1275 	<actionbody>
  1276 		<derivekey>
  1277 			<kdf>pkcs#12</kdf>
  1278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1279 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1280 			<iterations>4</iterations>
  1281 			<key>B43FA2D22B</key>
  1282 		</derivekey>
  1283 	</actionbody>
  1284 </action>
  1285 
  1286 //! @SYMTestCaseID CIT_PREQ1054_01
  1287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1288 //! @SYMREQ CIT_PREQ1054
  1289 //! @SYMTestPriority medium
  1290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1292 <action>
  1293 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1294 	<actiontype>DeriveKey</actiontype>
  1295 	<actionbody>
  1296 		<derivekey>
  1297 			<kdf>pkcs#12</kdf>
  1298 			<passwd>0000</passwd>
  1299 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1300 			<iterations>4</iterations>
  1301 			<key>EF50923D65</key>
  1302 		</derivekey>
  1303 	</actionbody>
  1304 </action>
  1305 
  1306 //! @SYMTestCaseID CIT_PREQ1054_01
  1307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1308 //! @SYMREQ CIT_PREQ1054
  1309 //! @SYMTestPriority medium
  1310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1312 <action>
  1313 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1314 	<actiontype>DeriveKey</actiontype>
  1315 	<actionbody>
  1316 		<derivekey>
  1317 			<kdf>pkcs#12</kdf>
  1318 			<passwd>0001</passwd>
  1319 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1320 			<iterations>4</iterations>
  1321 			<key>9A618595C7</key>
  1322 		</derivekey>
  1323 	</actionbody>
  1324 </action>
  1325 
  1326 //! @SYMTestCaseID CIT_PREQ1054_01
  1327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1328 //! @SYMREQ CIT_PREQ1054
  1329 //! @SYMTestPriority medium
  1330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1332 <action>
  1333 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1334 	<actiontype>DeriveKey</actiontype>
  1335 	<actionbody>
  1336 		<derivekey>
  1337 			<kdf>pkcs#12</kdf>
  1338 			<passwd>PSWD</passwd>
  1339 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1340 			<iterations>4</iterations>
  1341 			<key>B3B33AA8A6</key>
  1342 		</derivekey>
  1343 	</actionbody>
  1344 </action>
  1345 
  1346 //! @SYMTestCaseID CIT_PREQ1054_01
  1347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1348 //! @SYMREQ CIT_PREQ1054
  1349 //! @SYMTestPriority medium
  1350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1352 <action>
  1353 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1354 	<actiontype>DeriveKey</actiontype>
  1355 	<actionbody>
  1356 		<derivekey>
  1357 			<kdf>pkcs#12</kdf>
  1358 			<passwd>password</passwd>
  1359 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1360 			<iterations>4</iterations>
  1361 			<key>C007DC1ADA</key>
  1362 		</derivekey>
  1363 	</actionbody>
  1364 </action>
  1365 
  1366 //! @SYMTestCaseID CIT_PREQ1054_01
  1367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1368 //! @SYMREQ CIT_PREQ1054
  1369 //! @SYMTestPriority medium
  1370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1372 <action>
  1373 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1374 	<actiontype>DeriveKey</actiontype>
  1375 	<actionbody>
  1376 		<derivekey>
  1377 			<kdf>pkcs#12</kdf>
  1378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1379 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1380 			<iterations>4</iterations>
  1381 			<key>91DF366136</key>
  1382 		</derivekey>
  1383 	</actionbody>
  1384 </action>
  1385 
  1386 //! @SYMTestCaseID CIT_PREQ1054_01
  1387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1388 //! @SYMREQ CIT_PREQ1054
  1389 //! @SYMTestPriority medium
  1390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1392 <action>
  1393 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1394 	<actiontype>DeriveKey</actiontype>
  1395 	<actionbody>
  1396 		<derivekey>
  1397 			<kdf>pkcs#12</kdf>
  1398 			<passwd>0000</passwd>
  1399 			<salt>53414C54</salt>
  1400 			<iterations>8</iterations>
  1401 			<key>9A08D3C4F5</key>
  1402 		</derivekey>
  1403 	</actionbody>
  1404 </action>
  1405 
  1406 //! @SYMTestCaseID CIT_PREQ1054_01
  1407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1408 //! @SYMREQ CIT_PREQ1054
  1409 //! @SYMTestPriority medium
  1410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1412 <action>
  1413 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1414 	<actiontype>DeriveKey</actiontype>
  1415 	<actionbody>
  1416 		<derivekey>
  1417 			<kdf>pkcs#12</kdf>
  1418 			<passwd>0001</passwd>
  1419 			<salt>53414C54</salt>
  1420 			<iterations>8</iterations>
  1421 			<key>33002FA0B6</key>
  1422 		</derivekey>
  1423 	</actionbody>
  1424 </action>
  1425 
  1426 //! @SYMTestCaseID CIT_PREQ1054_01
  1427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1428 //! @SYMREQ CIT_PREQ1054
  1429 //! @SYMTestPriority medium
  1430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1432 <action>
  1433 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1434 	<actiontype>DeriveKey</actiontype>
  1435 	<actionbody>
  1436 		<derivekey>
  1437 			<kdf>pkcs#12</kdf>
  1438 			<passwd>PSWD</passwd>
  1439 			<salt>53414C54</salt>
  1440 			<iterations>8</iterations>
  1441 			<key>22001FA269</key>
  1442 		</derivekey>
  1443 	</actionbody>
  1444 </action>
  1445 
  1446 //! @SYMTestCaseID CIT_PREQ1054_01
  1447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1448 //! @SYMREQ CIT_PREQ1054
  1449 //! @SYMTestPriority medium
  1450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1452 <action>
  1453 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1454 	<actiontype>DeriveKey</actiontype>
  1455 	<actionbody>
  1456 		<derivekey>
  1457 			<kdf>pkcs#12</kdf>
  1458 			<passwd>password</passwd>
  1459 			<salt>53414C54</salt>
  1460 			<iterations>8</iterations>
  1461 			<key>B0935F1122</key>
  1462 		</derivekey>
  1463 	</actionbody>
  1464 </action>
  1465 
  1466 //! @SYMTestCaseID CIT_PREQ1054_01
  1467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1468 //! @SYMREQ CIT_PREQ1054
  1469 //! @SYMTestPriority medium
  1470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1472 <action>
  1473 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1474 	<actiontype>DeriveKey</actiontype>
  1475 	<actionbody>
  1476 		<derivekey>
  1477 			<kdf>pkcs#12</kdf>
  1478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1479 			<salt>53414C54</salt>
  1480 			<iterations>8</iterations>
  1481 			<key>6602B1B4BB</key>
  1482 		</derivekey>
  1483 	</actionbody>
  1484 </action>
  1485 
  1486 //! @SYMTestCaseID CIT_PREQ1054_01
  1487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1488 //! @SYMREQ CIT_PREQ1054
  1489 //! @SYMTestPriority medium
  1490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1492 <action>
  1493 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1494 	<actiontype>DeriveKey</actiontype>
  1495 	<actionbody>
  1496 		<derivekey>
  1497 			<kdf>pkcs#12</kdf>
  1498 			<passwd>0000</passwd>
  1499 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1500 			<iterations>8</iterations>
  1501 			<key>3A478368DD</key>
  1502 		</derivekey>
  1503 	</actionbody>
  1504 </action>
  1505 
  1506 //! @SYMTestCaseID CIT_PREQ1054_01
  1507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1508 //! @SYMREQ CIT_PREQ1054
  1509 //! @SYMTestPriority medium
  1510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1512 <action>
  1513 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1514 	<actiontype>DeriveKey</actiontype>
  1515 	<actionbody>
  1516 		<derivekey>
  1517 			<kdf>pkcs#12</kdf>
  1518 			<passwd>0001</passwd>
  1519 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1520 			<iterations>8</iterations>
  1521 			<key>6473EB1244</key>
  1522 		</derivekey>
  1523 	</actionbody>
  1524 </action>
  1525 
  1526 //! @SYMTestCaseID CIT_PREQ1054_01
  1527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1528 //! @SYMREQ CIT_PREQ1054
  1529 //! @SYMTestPriority medium
  1530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1532 <action>
  1533 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1534 	<actiontype>DeriveKey</actiontype>
  1535 	<actionbody>
  1536 		<derivekey>
  1537 			<kdf>pkcs#12</kdf>
  1538 			<passwd>PSWD</passwd>
  1539 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1540 			<iterations>8</iterations>
  1541 			<key>AA762B8736</key>
  1542 		</derivekey>
  1543 	</actionbody>
  1544 </action>
  1545 
  1546 //! @SYMTestCaseID CIT_PREQ1054_01
  1547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1548 //! @SYMREQ CIT_PREQ1054
  1549 //! @SYMTestPriority medium
  1550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1552 <action>
  1553 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1554 	<actiontype>DeriveKey</actiontype>
  1555 	<actionbody>
  1556 		<derivekey>
  1557 			<kdf>pkcs#12</kdf>
  1558 			<passwd>password</passwd>
  1559 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1560 			<iterations>8</iterations>
  1561 			<key>F00C5240B0</key>
  1562 		</derivekey>
  1563 	</actionbody>
  1564 </action>
  1565 
  1566 //! @SYMTestCaseID CIT_PREQ1054_01
  1567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1568 //! @SYMREQ CIT_PREQ1054
  1569 //! @SYMTestPriority medium
  1570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1572 <action>
  1573 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1574 	<actiontype>DeriveKey</actiontype>
  1575 	<actionbody>
  1576 		<derivekey>
  1577 			<kdf>pkcs#12</kdf>
  1578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1579 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1580 			<iterations>8</iterations>
  1581 			<key>935593CA37</key>
  1582 		</derivekey>
  1583 	</actionbody>
  1584 </action>
  1585 
  1586 //! @SYMTestCaseID CIT_PREQ1054_01
  1587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1588 //! @SYMREQ CIT_PREQ1054
  1589 //! @SYMTestPriority medium
  1590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1592 <action>
  1593 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1594 	<actiontype>DeriveKey</actiontype>
  1595 	<actionbody>
  1596 		<derivekey>
  1597 			<kdf>pkcs#12</kdf>
  1598 			<passwd>0000</passwd>
  1599 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1600 			<iterations>8</iterations>
  1601 			<key>FCE1F429AE</key>
  1602 		</derivekey>
  1603 	</actionbody>
  1604 </action>
  1605 
  1606 //! @SYMTestCaseID CIT_PREQ1054_01
  1607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1608 //! @SYMREQ CIT_PREQ1054
  1609 //! @SYMTestPriority medium
  1610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1612 <action>
  1613 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1614 	<actiontype>DeriveKey</actiontype>
  1615 	<actionbody>
  1616 		<derivekey>
  1617 			<kdf>pkcs#12</kdf>
  1618 			<passwd>0001</passwd>
  1619 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1620 			<iterations>8</iterations>
  1621 			<key>82B4A13659</key>
  1622 		</derivekey>
  1623 	</actionbody>
  1624 </action>
  1625 
  1626 //! @SYMTestCaseID CIT_PREQ1054_01
  1627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1628 //! @SYMREQ CIT_PREQ1054
  1629 //! @SYMTestPriority medium
  1630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1632 <action>
  1633 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1634 	<actiontype>DeriveKey</actiontype>
  1635 	<actionbody>
  1636 		<derivekey>
  1637 			<kdf>pkcs#12</kdf>
  1638 			<passwd>PSWD</passwd>
  1639 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1640 			<iterations>8</iterations>
  1641 			<key>45FE091D4D</key>
  1642 		</derivekey>
  1643 	</actionbody>
  1644 </action>
  1645 
  1646 //! @SYMTestCaseID CIT_PREQ1054_01
  1647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1648 //! @SYMREQ CIT_PREQ1054
  1649 //! @SYMTestPriority medium
  1650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1652 <action>
  1653 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1654 	<actiontype>DeriveKey</actiontype>
  1655 	<actionbody>
  1656 		<derivekey>
  1657 			<kdf>pkcs#12</kdf>
  1658 			<passwd>password</passwd>
  1659 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1660 			<iterations>8</iterations>
  1661 			<key>5670457314</key>
  1662 		</derivekey>
  1663 	</actionbody>
  1664 </action>
  1665 
  1666 //! @SYMTestCaseID CIT_PREQ1054_01
  1667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1668 //! @SYMREQ CIT_PREQ1054
  1669 //! @SYMTestPriority medium
  1670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1672 <action>
  1673 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1674 	<actiontype>DeriveKey</actiontype>
  1675 	<actionbody>
  1676 		<derivekey>
  1677 			<kdf>pkcs#12</kdf>
  1678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1679 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1680 			<iterations>8</iterations>
  1681 			<key>1C4CAE2514</key>
  1682 		</derivekey>
  1683 	</actionbody>
  1684 </action>
  1685 
  1686 //! @SYMTestCaseID CIT_PREQ1054_01
  1687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1688 //! @SYMREQ CIT_PREQ1054
  1689 //! @SYMTestPriority medium
  1690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1692 <action>
  1693 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1694 	<actiontype>DeriveKey</actiontype>
  1695 	<actionbody>
  1696 		<derivekey>
  1697 			<kdf>pkcs#12</kdf>
  1698 			<passwd>0000</passwd>
  1699 			<salt>53414C54</salt>
  1700 			<iterations>128</iterations>
  1701 			<key>8B4B3CBFB0</key>
  1702 		</derivekey>
  1703 	</actionbody>
  1704 </action>
  1705 
  1706 //! @SYMTestCaseID CIT_PREQ1054_01
  1707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1708 //! @SYMREQ CIT_PREQ1054
  1709 //! @SYMTestPriority medium
  1710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1712 <action>
  1713 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1714 	<actiontype>DeriveKey</actiontype>
  1715 	<actionbody>
  1716 		<derivekey>
  1717 			<kdf>pkcs#12</kdf>
  1718 			<passwd>0001</passwd>
  1719 			<salt>53414C54</salt>
  1720 			<iterations>128</iterations>
  1721 			<key>C89C3A2C9C</key>
  1722 		</derivekey>
  1723 	</actionbody>
  1724 </action>
  1725 
  1726 //! @SYMTestCaseID CIT_PREQ1054_01
  1727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1728 //! @SYMREQ CIT_PREQ1054
  1729 //! @SYMTestPriority medium
  1730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1732 <action>
  1733 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1734 	<actiontype>DeriveKey</actiontype>
  1735 	<actionbody>
  1736 		<derivekey>
  1737 			<kdf>pkcs#12</kdf>
  1738 			<passwd>PSWD</passwd>
  1739 			<salt>53414C54</salt>
  1740 			<iterations>128</iterations>
  1741 			<key>8109F97073</key>
  1742 		</derivekey>
  1743 	</actionbody>
  1744 </action>
  1745 
  1746 //! @SYMTestCaseID CIT_PREQ1054_01
  1747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1748 //! @SYMREQ CIT_PREQ1054
  1749 //! @SYMTestPriority medium
  1750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1752 <action>
  1753 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1754 	<actiontype>DeriveKey</actiontype>
  1755 	<actionbody>
  1756 		<derivekey>
  1757 			<kdf>pkcs#12</kdf>
  1758 			<passwd>password</passwd>
  1759 			<salt>53414C54</salt>
  1760 			<iterations>128</iterations>
  1761 			<key>55E985CC15</key>
  1762 		</derivekey>
  1763 	</actionbody>
  1764 </action>
  1765 
  1766 //! @SYMTestCaseID CIT_PREQ1054_01
  1767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1768 //! @SYMREQ CIT_PREQ1054
  1769 //! @SYMTestPriority medium
  1770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1772 <action>
  1773 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1774 	<actiontype>DeriveKey</actiontype>
  1775 	<actionbody>
  1776 		<derivekey>
  1777 			<kdf>pkcs#12</kdf>
  1778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1779 			<salt>53414C54</salt>
  1780 			<iterations>128</iterations>
  1781 			<key>2802AA97D4</key>
  1782 		</derivekey>
  1783 	</actionbody>
  1784 </action>
  1785 
  1786 //! @SYMTestCaseID CIT_PREQ1054_01
  1787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1788 //! @SYMREQ CIT_PREQ1054
  1789 //! @SYMTestPriority medium
  1790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1792 <action>
  1793 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1794 	<actiontype>DeriveKey</actiontype>
  1795 	<actionbody>
  1796 		<derivekey>
  1797 			<kdf>pkcs#12</kdf>
  1798 			<passwd>0000</passwd>
  1799 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1800 			<iterations>128</iterations>
  1801 			<key>881509A34D</key>
  1802 		</derivekey>
  1803 	</actionbody>
  1804 </action>
  1805 
  1806 //! @SYMTestCaseID CIT_PREQ1054_01
  1807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1808 //! @SYMREQ CIT_PREQ1054
  1809 //! @SYMTestPriority medium
  1810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1812 <action>
  1813 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1814 	<actiontype>DeriveKey</actiontype>
  1815 	<actionbody>
  1816 		<derivekey>
  1817 			<kdf>pkcs#12</kdf>
  1818 			<passwd>0001</passwd>
  1819 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1820 			<iterations>128</iterations>
  1821 			<key>B2918BC593</key>
  1822 		</derivekey>
  1823 	</actionbody>
  1824 </action>
  1825 
  1826 //! @SYMTestCaseID CIT_PREQ1054_01
  1827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1828 //! @SYMREQ CIT_PREQ1054
  1829 //! @SYMTestPriority medium
  1830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1832 <action>
  1833 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1834 	<actiontype>DeriveKey</actiontype>
  1835 	<actionbody>
  1836 		<derivekey>
  1837 			<kdf>pkcs#12</kdf>
  1838 			<passwd>PSWD</passwd>
  1839 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1840 			<iterations>128</iterations>
  1841 			<key>0FE0529B45</key>
  1842 		</derivekey>
  1843 	</actionbody>
  1844 </action>
  1845 
  1846 //! @SYMTestCaseID CIT_PREQ1054_01
  1847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1848 //! @SYMREQ CIT_PREQ1054
  1849 //! @SYMTestPriority medium
  1850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1852 <action>
  1853 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1854 	<actiontype>DeriveKey</actiontype>
  1855 	<actionbody>
  1856 		<derivekey>
  1857 			<kdf>pkcs#12</kdf>
  1858 			<passwd>password</passwd>
  1859 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1860 			<iterations>128</iterations>
  1861 			<key>1FF923C4B1</key>
  1862 		</derivekey>
  1863 	</actionbody>
  1864 </action>
  1865 
  1866 //! @SYMTestCaseID CIT_PREQ1054_01
  1867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1868 //! @SYMREQ CIT_PREQ1054
  1869 //! @SYMTestPriority medium
  1870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1872 <action>
  1873 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  1874 	<actiontype>DeriveKey</actiontype>
  1875 	<actionbody>
  1876 		<derivekey>
  1877 			<kdf>pkcs#12</kdf>
  1878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1879 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  1880 			<iterations>128</iterations>
  1881 			<key>05D1E56D04</key>
  1882 		</derivekey>
  1883 	</actionbody>
  1884 </action>
  1885 
  1886 //! @SYMTestCaseID CIT_PREQ1054_01
  1887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1888 //! @SYMREQ CIT_PREQ1054
  1889 //! @SYMTestPriority medium
  1890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1892 <action>
  1893 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1894 	<actiontype>DeriveKey</actiontype>
  1895 	<actionbody>
  1896 		<derivekey>
  1897 			<kdf>pkcs#12</kdf>
  1898 			<passwd>0000</passwd>
  1899 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1900 			<iterations>128</iterations>
  1901 			<key>99FE149183</key>
  1902 		</derivekey>
  1903 	</actionbody>
  1904 </action>
  1905 
  1906 //! @SYMTestCaseID CIT_PREQ1054_01
  1907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1908 //! @SYMREQ CIT_PREQ1054
  1909 //! @SYMTestPriority medium
  1910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1912 <action>
  1913 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1914 	<actiontype>DeriveKey</actiontype>
  1915 	<actionbody>
  1916 		<derivekey>
  1917 			<kdf>pkcs#12</kdf>
  1918 			<passwd>0001</passwd>
  1919 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1920 			<iterations>128</iterations>
  1921 			<key>79E29F3FCB</key>
  1922 		</derivekey>
  1923 	</actionbody>
  1924 </action>
  1925 
  1926 //! @SYMTestCaseID CIT_PREQ1054_01
  1927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1928 //! @SYMREQ CIT_PREQ1054
  1929 //! @SYMTestPriority medium
  1930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1932 <action>
  1933 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1934 	<actiontype>DeriveKey</actiontype>
  1935 	<actionbody>
  1936 		<derivekey>
  1937 			<kdf>pkcs#12</kdf>
  1938 			<passwd>PSWD</passwd>
  1939 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1940 			<iterations>128</iterations>
  1941 			<key>22A70A8657</key>
  1942 		</derivekey>
  1943 	</actionbody>
  1944 </action>
  1945 
  1946 //! @SYMTestCaseID CIT_PREQ1054_01
  1947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1948 //! @SYMREQ CIT_PREQ1054
  1949 //! @SYMTestPriority medium
  1950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1952 <action>
  1953 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1954 	<actiontype>DeriveKey</actiontype>
  1955 	<actionbody>
  1956 		<derivekey>
  1957 			<kdf>pkcs#12</kdf>
  1958 			<passwd>password</passwd>
  1959 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1960 			<iterations>128</iterations>
  1961 			<key>9CBA922190</key>
  1962 		</derivekey>
  1963 	</actionbody>
  1964 </action>
  1965 
  1966 //! @SYMTestCaseID CIT_PREQ1054_01
  1967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1968 //! @SYMREQ CIT_PREQ1054
  1969 //! @SYMTestPriority medium
  1970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1972 <action>
  1973 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  1974 	<actiontype>DeriveKey</actiontype>
  1975 	<actionbody>
  1976 		<derivekey>
  1977 			<kdf>pkcs#12</kdf>
  1978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  1979 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  1980 			<iterations>128</iterations>
  1981 			<key>A037A8B1C2</key>
  1982 		</derivekey>
  1983 	</actionbody>
  1984 </action>
  1985 
  1986 //! @SYMTestCaseID CIT_PREQ1054_01
  1987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  1988 //! @SYMREQ CIT_PREQ1054
  1989 //! @SYMTestPriority medium
  1990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  1991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1992 <action>
  1993 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  1994 	<actiontype>DeriveKey</actiontype>
  1995 	<actionbody>
  1996 		<derivekey>
  1997 			<kdf>pkcs#12</kdf>
  1998 			<passwd>0000</passwd>
  1999 			<salt>53414C54</salt>
  2000 			<iterations>1024</iterations>
  2001 			<key>82824BE51C</key>
  2002 		</derivekey>
  2003 	</actionbody>
  2004 </action>
  2005 
  2006 //! @SYMTestCaseID CIT_PREQ1054_01
  2007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2008 //! @SYMREQ CIT_PREQ1054
  2009 //! @SYMTestPriority medium
  2010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2012 <action>
  2013 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2014 	<actiontype>DeriveKey</actiontype>
  2015 	<actionbody>
  2016 		<derivekey>
  2017 			<kdf>pkcs#12</kdf>
  2018 			<passwd>0001</passwd>
  2019 			<salt>53414C54</salt>
  2020 			<iterations>1024</iterations>
  2021 			<key>E166049AC4</key>
  2022 		</derivekey>
  2023 	</actionbody>
  2024 </action>
  2025 
  2026 //! @SYMTestCaseID CIT_PREQ1054_01
  2027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2028 //! @SYMREQ CIT_PREQ1054
  2029 //! @SYMTestPriority medium
  2030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2032 <action>
  2033 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2034 	<actiontype>DeriveKey</actiontype>
  2035 	<actionbody>
  2036 		<derivekey>
  2037 			<kdf>pkcs#12</kdf>
  2038 			<passwd>PSWD</passwd>
  2039 			<salt>53414C54</salt>
  2040 			<iterations>1024</iterations>
  2041 			<key>90E975CC54</key>
  2042 		</derivekey>
  2043 	</actionbody>
  2044 </action>
  2045 
  2046 //! @SYMTestCaseID CIT_PREQ1054_01
  2047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2048 //! @SYMREQ CIT_PREQ1054
  2049 //! @SYMTestPriority medium
  2050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2052 <action>
  2053 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2054 	<actiontype>DeriveKey</actiontype>
  2055 	<actionbody>
  2056 		<derivekey>
  2057 			<kdf>pkcs#12</kdf>
  2058 			<passwd>password</passwd>
  2059 			<salt>53414C54</salt>
  2060 			<iterations>1024</iterations>
  2061 			<key>1FFD40D7BB</key>
  2062 		</derivekey>
  2063 	</actionbody>
  2064 </action>
  2065 
  2066 //! @SYMTestCaseID CIT_PREQ1054_01
  2067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2068 //! @SYMREQ CIT_PREQ1054
  2069 //! @SYMTestPriority medium
  2070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2072 <action>
  2073 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2074 	<actiontype>DeriveKey</actiontype>
  2075 	<actionbody>
  2076 		<derivekey>
  2077 			<kdf>pkcs#12</kdf>
  2078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2079 			<salt>53414C54</salt>
  2080 			<iterations>1024</iterations>
  2081 			<key>406C92305A</key>
  2082 		</derivekey>
  2083 	</actionbody>
  2084 </action>
  2085 
  2086 //! @SYMTestCaseID CIT_PREQ1054_01
  2087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2088 //! @SYMREQ CIT_PREQ1054
  2089 //! @SYMTestPriority medium
  2090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2092 <action>
  2093 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2094 	<actiontype>DeriveKey</actiontype>
  2095 	<actionbody>
  2096 		<derivekey>
  2097 			<kdf>pkcs#12</kdf>
  2098 			<passwd>0000</passwd>
  2099 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2100 			<iterations>1024</iterations>
  2101 			<key>E82BD75AA9</key>
  2102 		</derivekey>
  2103 	</actionbody>
  2104 </action>
  2105 
  2106 //! @SYMTestCaseID CIT_PREQ1054_01
  2107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2108 //! @SYMREQ CIT_PREQ1054
  2109 //! @SYMTestPriority medium
  2110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2112 <action>
  2113 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2114 	<actiontype>DeriveKey</actiontype>
  2115 	<actionbody>
  2116 		<derivekey>
  2117 			<kdf>pkcs#12</kdf>
  2118 			<passwd>0001</passwd>
  2119 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2120 			<iterations>1024</iterations>
  2121 			<key>0182E41FCA</key>
  2122 		</derivekey>
  2123 	</actionbody>
  2124 </action>
  2125 
  2126 //! @SYMTestCaseID CIT_PREQ1054_01
  2127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2128 //! @SYMREQ CIT_PREQ1054
  2129 //! @SYMTestPriority medium
  2130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2132 <action>
  2133 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2134 	<actiontype>DeriveKey</actiontype>
  2135 	<actionbody>
  2136 		<derivekey>
  2137 			<kdf>pkcs#12</kdf>
  2138 			<passwd>PSWD</passwd>
  2139 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2140 			<iterations>1024</iterations>
  2141 			<key>101FB77598</key>
  2142 		</derivekey>
  2143 	</actionbody>
  2144 </action>
  2145 
  2146 //! @SYMTestCaseID CIT_PREQ1054_01
  2147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2148 //! @SYMREQ CIT_PREQ1054
  2149 //! @SYMTestPriority medium
  2150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2152 <action>
  2153 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2154 	<actiontype>DeriveKey</actiontype>
  2155 	<actionbody>
  2156 		<derivekey>
  2157 			<kdf>pkcs#12</kdf>
  2158 			<passwd>password</passwd>
  2159 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2160 			<iterations>1024</iterations>
  2161 			<key>D7499C6A12</key>
  2162 		</derivekey>
  2163 	</actionbody>
  2164 </action>
  2165 
  2166 //! @SYMTestCaseID CIT_PREQ1054_01
  2167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2168 //! @SYMREQ CIT_PREQ1054
  2169 //! @SYMTestPriority medium
  2170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2172 <action>
  2173 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2174 	<actiontype>DeriveKey</actiontype>
  2175 	<actionbody>
  2176 		<derivekey>
  2177 			<kdf>pkcs#12</kdf>
  2178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2179 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2180 			<iterations>1024</iterations>
  2181 			<key>2C6222B8E2</key>
  2182 		</derivekey>
  2183 	</actionbody>
  2184 </action>
  2185 
  2186 //! @SYMTestCaseID CIT_PREQ1054_01
  2187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2188 //! @SYMREQ CIT_PREQ1054
  2189 //! @SYMTestPriority medium
  2190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2192 <action>
  2193 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2194 	<actiontype>DeriveKey</actiontype>
  2195 	<actionbody>
  2196 		<derivekey>
  2197 			<kdf>pkcs#12</kdf>
  2198 			<passwd>0000</passwd>
  2199 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2200 			<iterations>1024</iterations>
  2201 			<key>6789F0680A</key>
  2202 		</derivekey>
  2203 	</actionbody>
  2204 </action>
  2205 
  2206 //! @SYMTestCaseID CIT_PREQ1054_01
  2207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2208 //! @SYMREQ CIT_PREQ1054
  2209 //! @SYMTestPriority medium
  2210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2212 <action>
  2213 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2214 	<actiontype>DeriveKey</actiontype>
  2215 	<actionbody>
  2216 		<derivekey>
  2217 			<kdf>pkcs#12</kdf>
  2218 			<passwd>0001</passwd>
  2219 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2220 			<iterations>1024</iterations>
  2221 			<key>43E6637258</key>
  2222 		</derivekey>
  2223 	</actionbody>
  2224 </action>
  2225 
  2226 //! @SYMTestCaseID CIT_PREQ1054_01
  2227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2228 //! @SYMREQ CIT_PREQ1054
  2229 //! @SYMTestPriority medium
  2230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2232 <action>
  2233 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2234 	<actiontype>DeriveKey</actiontype>
  2235 	<actionbody>
  2236 		<derivekey>
  2237 			<kdf>pkcs#12</kdf>
  2238 			<passwd>PSWD</passwd>
  2239 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2240 			<iterations>1024</iterations>
  2241 			<key>8B3308BDD5</key>
  2242 		</derivekey>
  2243 	</actionbody>
  2244 </action>
  2245 
  2246 //! @SYMTestCaseID CIT_PREQ1054_01
  2247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2248 //! @SYMREQ CIT_PREQ1054
  2249 //! @SYMTestPriority medium
  2250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2252 <action>
  2253 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2254 	<actiontype>DeriveKey</actiontype>
  2255 	<actionbody>
  2256 		<derivekey>
  2257 			<kdf>pkcs#12</kdf>
  2258 			<passwd>password</passwd>
  2259 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2260 			<iterations>1024</iterations>
  2261 			<key>CA202602C9</key>
  2262 		</derivekey>
  2263 	</actionbody>
  2264 </action>
  2265 
  2266 //! @SYMTestCaseID CIT_PREQ1054_01
  2267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2268 //! @SYMREQ CIT_PREQ1054
  2269 //! @SYMTestPriority medium
  2270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2272 <action>
  2273 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2274 	<actiontype>DeriveKey</actiontype>
  2275 	<actionbody>
  2276 		<derivekey>
  2277 			<kdf>pkcs#12</kdf>
  2278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2279 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2280 			<iterations>1024</iterations>
  2281 			<key>F6A33ADA6A</key>
  2282 		</derivekey>
  2283 	</actionbody>
  2284 </action>
  2285 
  2286 //! @SYMTestCaseID CIT_PREQ1054_01
  2287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2288 //! @SYMREQ CIT_PREQ1054
  2289 //! @SYMTestPriority medium
  2290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2292 <action>
  2293 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2294 	<actiontype>DeriveKey</actiontype>
  2295 	<actionbody>
  2296 		<derivekey>
  2297 			<kdf>pkcs#12</kdf>
  2298 			<passwd>0000</passwd>
  2299 			<salt>53414C54</salt>
  2300 			<iterations>1536</iterations>
  2301 			<key>79A4E1398F</key>
  2302 		</derivekey>
  2303 	</actionbody>
  2304 </action>
  2305 
  2306 //! @SYMTestCaseID CIT_PREQ1054_01
  2307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2308 //! @SYMREQ CIT_PREQ1054
  2309 //! @SYMTestPriority medium
  2310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2312 <action>
  2313 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2314 	<actiontype>DeriveKey</actiontype>
  2315 	<actionbody>
  2316 		<derivekey>
  2317 			<kdf>pkcs#12</kdf>
  2318 			<passwd>0001</passwd>
  2319 			<salt>53414C54</salt>
  2320 			<iterations>1536</iterations>
  2321 			<key>6F2402CCE4</key>
  2322 		</derivekey>
  2323 	</actionbody>
  2324 </action>
  2325 
  2326 //! @SYMTestCaseID CIT_PREQ1054_01
  2327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2328 //! @SYMREQ CIT_PREQ1054
  2329 //! @SYMTestPriority medium
  2330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2332 <action>
  2333 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2334 	<actiontype>DeriveKey</actiontype>
  2335 	<actionbody>
  2336 		<derivekey>
  2337 			<kdf>pkcs#12</kdf>
  2338 			<passwd>PSWD</passwd>
  2339 			<salt>53414C54</salt>
  2340 			<iterations>1536</iterations>
  2341 			<key>B9ED7B3135</key>
  2342 		</derivekey>
  2343 	</actionbody>
  2344 </action>
  2345 
  2346 //! @SYMTestCaseID CIT_PREQ1054_01
  2347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2348 //! @SYMREQ CIT_PREQ1054
  2349 //! @SYMTestPriority medium
  2350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2352 <action>
  2353 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2354 	<actiontype>DeriveKey</actiontype>
  2355 	<actionbody>
  2356 		<derivekey>
  2357 			<kdf>pkcs#12</kdf>
  2358 			<passwd>password</passwd>
  2359 			<salt>53414C54</salt>
  2360 			<iterations>1536</iterations>
  2361 			<key>65B27A78C7</key>
  2362 		</derivekey>
  2363 	</actionbody>
  2364 </action>
  2365 
  2366 //! @SYMTestCaseID CIT_PREQ1054_01
  2367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2368 //! @SYMREQ CIT_PREQ1054
  2369 //! @SYMTestPriority medium
  2370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2372 <action>
  2373 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2374 	<actiontype>DeriveKey</actiontype>
  2375 	<actionbody>
  2376 		<derivekey>
  2377 			<kdf>pkcs#12</kdf>
  2378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2379 			<salt>53414C54</salt>
  2380 			<iterations>1536</iterations>
  2381 			<key>8F8FC96A3D</key>
  2382 		</derivekey>
  2383 	</actionbody>
  2384 </action>
  2385 
  2386 //! @SYMTestCaseID CIT_PREQ1054_01
  2387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2388 //! @SYMREQ CIT_PREQ1054
  2389 //! @SYMTestPriority medium
  2390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2392 <action>
  2393 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2394 	<actiontype>DeriveKey</actiontype>
  2395 	<actionbody>
  2396 		<derivekey>
  2397 			<kdf>pkcs#12</kdf>
  2398 			<passwd>0000</passwd>
  2399 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2400 			<iterations>1536</iterations>
  2401 			<key>642DDC3F4E</key>
  2402 		</derivekey>
  2403 	</actionbody>
  2404 </action>
  2405 
  2406 //! @SYMTestCaseID CIT_PREQ1054_01
  2407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2408 //! @SYMREQ CIT_PREQ1054
  2409 //! @SYMTestPriority medium
  2410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2412 <action>
  2413 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2414 	<actiontype>DeriveKey</actiontype>
  2415 	<actionbody>
  2416 		<derivekey>
  2417 			<kdf>pkcs#12</kdf>
  2418 			<passwd>0001</passwd>
  2419 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2420 			<iterations>1536</iterations>
  2421 			<key>0FE4BDC100</key>
  2422 		</derivekey>
  2423 	</actionbody>
  2424 </action>
  2425 
  2426 //! @SYMTestCaseID CIT_PREQ1054_01
  2427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2428 //! @SYMREQ CIT_PREQ1054
  2429 //! @SYMTestPriority medium
  2430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2432 <action>
  2433 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2434 	<actiontype>DeriveKey</actiontype>
  2435 	<actionbody>
  2436 		<derivekey>
  2437 			<kdf>pkcs#12</kdf>
  2438 			<passwd>PSWD</passwd>
  2439 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2440 			<iterations>1536</iterations>
  2441 			<key>32D7F10C5E</key>
  2442 		</derivekey>
  2443 	</actionbody>
  2444 </action>
  2445 
  2446 //! @SYMTestCaseID CIT_PREQ1054_01
  2447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2448 //! @SYMREQ CIT_PREQ1054
  2449 //! @SYMTestPriority medium
  2450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2452 <action>
  2453 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2454 	<actiontype>DeriveKey</actiontype>
  2455 	<actionbody>
  2456 		<derivekey>
  2457 			<kdf>pkcs#12</kdf>
  2458 			<passwd>password</passwd>
  2459 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2460 			<iterations>1536</iterations>
  2461 			<key>C05FE26245</key>
  2462 		</derivekey>
  2463 	</actionbody>
  2464 </action>
  2465 
  2466 //! @SYMTestCaseID CIT_PREQ1054_01
  2467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2468 //! @SYMREQ CIT_PREQ1054
  2469 //! @SYMTestPriority medium
  2470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2472 <action>
  2473 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2474 	<actiontype>DeriveKey</actiontype>
  2475 	<actionbody>
  2476 		<derivekey>
  2477 			<kdf>pkcs#12</kdf>
  2478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2479 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2480 			<iterations>1536</iterations>
  2481 			<key>818C967A8F</key>
  2482 		</derivekey>
  2483 	</actionbody>
  2484 </action>
  2485 
  2486 //! @SYMTestCaseID CIT_PREQ1054_01
  2487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2488 //! @SYMREQ CIT_PREQ1054
  2489 //! @SYMTestPriority medium
  2490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2492 <action>
  2493 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2494 	<actiontype>DeriveKey</actiontype>
  2495 	<actionbody>
  2496 		<derivekey>
  2497 			<kdf>pkcs#12</kdf>
  2498 			<passwd>0000</passwd>
  2499 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2500 			<iterations>1536</iterations>
  2501 			<key>5301B5B2A1</key>
  2502 		</derivekey>
  2503 	</actionbody>
  2504 </action>
  2505 
  2506 //! @SYMTestCaseID CIT_PREQ1054_01
  2507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2508 //! @SYMREQ CIT_PREQ1054
  2509 //! @SYMTestPriority medium
  2510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2512 <action>
  2513 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2514 	<actiontype>DeriveKey</actiontype>
  2515 	<actionbody>
  2516 		<derivekey>
  2517 			<kdf>pkcs#12</kdf>
  2518 			<passwd>0001</passwd>
  2519 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2520 			<iterations>1536</iterations>
  2521 			<key>9CB5BD2394</key>
  2522 		</derivekey>
  2523 	</actionbody>
  2524 </action>
  2525 
  2526 //! @SYMTestCaseID CIT_PREQ1054_01
  2527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2528 //! @SYMREQ CIT_PREQ1054
  2529 //! @SYMTestPriority medium
  2530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2532 <action>
  2533 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2534 	<actiontype>DeriveKey</actiontype>
  2535 	<actionbody>
  2536 		<derivekey>
  2537 			<kdf>pkcs#12</kdf>
  2538 			<passwd>PSWD</passwd>
  2539 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2540 			<iterations>1536</iterations>
  2541 			<key>EB90D956B3</key>
  2542 		</derivekey>
  2543 	</actionbody>
  2544 </action>
  2545 
  2546 //! @SYMTestCaseID CIT_PREQ1054_01
  2547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2548 //! @SYMREQ CIT_PREQ1054
  2549 //! @SYMTestPriority medium
  2550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2552 <action>
  2553 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2554 	<actiontype>DeriveKey</actiontype>
  2555 	<actionbody>
  2556 		<derivekey>
  2557 			<kdf>pkcs#12</kdf>
  2558 			<passwd>password</passwd>
  2559 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2560 			<iterations>1536</iterations>
  2561 			<key>ACAFB5EB24</key>
  2562 		</derivekey>
  2563 	</actionbody>
  2564 </action>
  2565 
  2566 //! @SYMTestCaseID CIT_PREQ1054_01
  2567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2568 //! @SYMREQ CIT_PREQ1054
  2569 //! @SYMTestPriority medium
  2570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2572 <action>
  2573 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2574 	<actiontype>DeriveKey</actiontype>
  2575 	<actionbody>
  2576 		<derivekey>
  2577 			<kdf>pkcs#12</kdf>
  2578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2579 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2580 			<iterations>1536</iterations>
  2581 			<key>A7B0859D9D</key>
  2582 		</derivekey>
  2583 	</actionbody>
  2584 </action>
  2585 
  2586 //! @SYMTestCaseID CIT_PREQ1054_01
  2587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2588 //! @SYMREQ CIT_PREQ1054
  2589 //! @SYMTestPriority medium
  2590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2592 <action>
  2593 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2594 	<actiontype>DeriveKey</actiontype>
  2595 	<actionbody>
  2596 		<derivekey>
  2597 			<kdf>pkcs#12</kdf>
  2598 			<passwd>0000</passwd>
  2599 			<salt>53414C54</salt>
  2600 			<iterations>2048</iterations>
  2601 			<key>B0F0F2EB44</key>
  2602 		</derivekey>
  2603 	</actionbody>
  2604 </action>
  2605 
  2606 //! @SYMTestCaseID CIT_PREQ1054_01
  2607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2608 //! @SYMREQ CIT_PREQ1054
  2609 //! @SYMTestPriority medium
  2610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2612 <action>
  2613 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2614 	<actiontype>DeriveKey</actiontype>
  2615 	<actionbody>
  2616 		<derivekey>
  2617 			<kdf>pkcs#12</kdf>
  2618 			<passwd>0001</passwd>
  2619 			<salt>53414C54</salt>
  2620 			<iterations>2048</iterations>
  2621 			<key>C11C0499CC</key>
  2622 		</derivekey>
  2623 	</actionbody>
  2624 </action>
  2625 
  2626 //! @SYMTestCaseID CIT_PREQ1054_01
  2627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2628 //! @SYMREQ CIT_PREQ1054
  2629 //! @SYMTestPriority medium
  2630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2632 <action>
  2633 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2634 	<actiontype>DeriveKey</actiontype>
  2635 	<actionbody>
  2636 		<derivekey>
  2637 			<kdf>pkcs#12</kdf>
  2638 			<passwd>PSWD</passwd>
  2639 			<salt>53414C54</salt>
  2640 			<iterations>2048</iterations>
  2641 			<key>3F63500AC4</key>
  2642 		</derivekey>
  2643 	</actionbody>
  2644 </action>
  2645 
  2646 //! @SYMTestCaseID CIT_PREQ1054_01
  2647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2648 //! @SYMREQ CIT_PREQ1054
  2649 //! @SYMTestPriority medium
  2650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2652 <action>
  2653 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2654 	<actiontype>DeriveKey</actiontype>
  2655 	<actionbody>
  2656 		<derivekey>
  2657 			<kdf>pkcs#12</kdf>
  2658 			<passwd>password</passwd>
  2659 			<salt>53414C54</salt>
  2660 			<iterations>2048</iterations>
  2661 			<key>B47F802F12</key>
  2662 		</derivekey>
  2663 	</actionbody>
  2664 </action>
  2665 
  2666 //! @SYMTestCaseID CIT_PREQ1054_01
  2667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2668 //! @SYMREQ CIT_PREQ1054
  2669 //! @SYMTestPriority medium
  2670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2672 <action>
  2673 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
  2674 	<actiontype>DeriveKey</actiontype>
  2675 	<actionbody>
  2676 		<derivekey>
  2677 			<kdf>pkcs#12</kdf>
  2678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2679 			<salt>53414C54</salt>
  2680 			<iterations>2048</iterations>
  2681 			<key>3099237692</key>
  2682 		</derivekey>
  2683 	</actionbody>
  2684 </action>
  2685 
  2686 //! @SYMTestCaseID CIT_PREQ1054_01
  2687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2688 //! @SYMREQ CIT_PREQ1054
  2689 //! @SYMTestPriority medium
  2690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2692 <action>
  2693 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2694 	<actiontype>DeriveKey</actiontype>
  2695 	<actionbody>
  2696 		<derivekey>
  2697 			<kdf>pkcs#12</kdf>
  2698 			<passwd>0000</passwd>
  2699 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2700 			<iterations>2048</iterations>
  2701 			<key>CD04522946</key>
  2702 		</derivekey>
  2703 	</actionbody>
  2704 </action>
  2705 
  2706 //! @SYMTestCaseID CIT_PREQ1054_01
  2707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2708 //! @SYMREQ CIT_PREQ1054
  2709 //! @SYMTestPriority medium
  2710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2712 <action>
  2713 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2714 	<actiontype>DeriveKey</actiontype>
  2715 	<actionbody>
  2716 		<derivekey>
  2717 			<kdf>pkcs#12</kdf>
  2718 			<passwd>0001</passwd>
  2719 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2720 			<iterations>2048</iterations>
  2721 			<key>D85432F8AC</key>
  2722 		</derivekey>
  2723 	</actionbody>
  2724 </action>
  2725 
  2726 //! @SYMTestCaseID CIT_PREQ1054_01
  2727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2728 //! @SYMREQ CIT_PREQ1054
  2729 //! @SYMTestPriority medium
  2730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2732 <action>
  2733 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2734 	<actiontype>DeriveKey</actiontype>
  2735 	<actionbody>
  2736 		<derivekey>
  2737 			<kdf>pkcs#12</kdf>
  2738 			<passwd>PSWD</passwd>
  2739 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2740 			<iterations>2048</iterations>
  2741 			<key>C77FDE2E52</key>
  2742 		</derivekey>
  2743 	</actionbody>
  2744 </action>
  2745 
  2746 //! @SYMTestCaseID CIT_PREQ1054_01
  2747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2748 //! @SYMREQ CIT_PREQ1054
  2749 //! @SYMTestPriority medium
  2750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2752 <action>
  2753 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2754 	<actiontype>DeriveKey</actiontype>
  2755 	<actionbody>
  2756 		<derivekey>
  2757 			<kdf>pkcs#12</kdf>
  2758 			<passwd>password</passwd>
  2759 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2760 			<iterations>2048</iterations>
  2761 			<key>62E06B8A26</key>
  2762 		</derivekey>
  2763 	</actionbody>
  2764 </action>
  2765 
  2766 //! @SYMTestCaseID CIT_PREQ1054_01
  2767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2768 //! @SYMREQ CIT_PREQ1054
  2769 //! @SYMTestPriority medium
  2770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2772 <action>
  2773 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
  2774 	<actiontype>DeriveKey</actiontype>
  2775 	<actionbody>
  2776 		<derivekey>
  2777 			<kdf>pkcs#12</kdf>
  2778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2779 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  2780 			<iterations>2048</iterations>
  2781 			<key>A5B348EB49</key>
  2782 		</derivekey>
  2783 	</actionbody>
  2784 </action>
  2785 
  2786 //! @SYMTestCaseID CIT_PREQ1054_01
  2787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2788 //! @SYMREQ CIT_PREQ1054
  2789 //! @SYMTestPriority medium
  2790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2792 <action>
  2793 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2794 	<actiontype>DeriveKey</actiontype>
  2795 	<actionbody>
  2796 		<derivekey>
  2797 			<kdf>pkcs#12</kdf>
  2798 			<passwd>0000</passwd>
  2799 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2800 			<iterations>2048</iterations>
  2801 			<key>2A824C1B6B</key>
  2802 		</derivekey>
  2803 	</actionbody>
  2804 </action>
  2805 
  2806 //! @SYMTestCaseID CIT_PREQ1054_01
  2807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2808 //! @SYMREQ CIT_PREQ1054
  2809 //! @SYMTestPriority medium
  2810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2812 <action>
  2813 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2814 	<actiontype>DeriveKey</actiontype>
  2815 	<actionbody>
  2816 		<derivekey>
  2817 			<kdf>pkcs#12</kdf>
  2818 			<passwd>0001</passwd>
  2819 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2820 			<iterations>2048</iterations>
  2821 			<key>4B8D18B96E</key>
  2822 		</derivekey>
  2823 	</actionbody>
  2824 </action>
  2825 
  2826 //! @SYMTestCaseID CIT_PREQ1054_01
  2827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2828 //! @SYMREQ CIT_PREQ1054
  2829 //! @SYMTestPriority medium
  2830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2832 <action>
  2833 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2834 	<actiontype>DeriveKey</actiontype>
  2835 	<actionbody>
  2836 		<derivekey>
  2837 			<kdf>pkcs#12</kdf>
  2838 			<passwd>PSWD</passwd>
  2839 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2840 			<iterations>2048</iterations>
  2841 			<key>9DABF586AD</key>
  2842 		</derivekey>
  2843 	</actionbody>
  2844 </action>
  2845 
  2846 //! @SYMTestCaseID CIT_PREQ1054_01
  2847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2848 //! @SYMREQ CIT_PREQ1054
  2849 //! @SYMTestPriority medium
  2850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2852 <action>
  2853 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2854 	<actiontype>DeriveKey</actiontype>
  2855 	<actionbody>
  2856 		<derivekey>
  2857 			<kdf>pkcs#12</kdf>
  2858 			<passwd>password</passwd>
  2859 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2860 			<iterations>2048</iterations>
  2861 			<key>F734BE1BF9</key>
  2862 		</derivekey>
  2863 	</actionbody>
  2864 </action>
  2865 
  2866 //! @SYMTestCaseID CIT_PREQ1054_01
  2867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2868 //! @SYMREQ CIT_PREQ1054
  2869 //! @SYMTestPriority medium
  2870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2872 <action>
  2873 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
  2874 	<actiontype>DeriveKey</actiontype>
  2875 	<actionbody>
  2876 		<derivekey>
  2877 			<kdf>pkcs#12</kdf>
  2878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2879 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  2880 			<iterations>2048</iterations>
  2881 			<key>47C18634A0</key>
  2882 		</derivekey>
  2883 	</actionbody>
  2884 </action>
  2885 
  2886 //! @SYMTestCaseID CIT_PREQ1054_01
  2887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2888 //! @SYMREQ CIT_PREQ1054
  2889 //! @SYMTestPriority medium
  2890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2892 <action>
  2893 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  2894 	<actiontype>DeriveKey</actiontype>
  2895 	<actionbody>
  2896 		<derivekey>
  2897 			<kdf>pkcs#12</kdf>
  2898 			<passwd>0000</passwd>
  2899 			<salt>53414C54</salt>
  2900 			<iterations>1</iterations>
  2901 			<key>3037AFC8EACD4E2AEAB3C1E343B81DE8</key>
  2902 		</derivekey>
  2903 	</actionbody>
  2904 </action>
  2905 
  2906 //! @SYMTestCaseID CIT_PREQ1054_01
  2907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2908 //! @SYMREQ CIT_PREQ1054
  2909 //! @SYMTestPriority medium
  2910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2912 <action>
  2913 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  2914 	<actiontype>DeriveKey</actiontype>
  2915 	<actionbody>
  2916 		<derivekey>
  2917 			<kdf>pkcs#12</kdf>
  2918 			<passwd>0001</passwd>
  2919 			<salt>53414C54</salt>
  2920 			<iterations>1</iterations>
  2921 			<key>37F44080CB10A6F7E2719CC979FE0F2E</key>
  2922 		</derivekey>
  2923 	</actionbody>
  2924 </action>
  2925 
  2926 //! @SYMTestCaseID CIT_PREQ1054_01
  2927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2928 //! @SYMREQ CIT_PREQ1054
  2929 //! @SYMTestPriority medium
  2930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2932 <action>
  2933 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  2934 	<actiontype>DeriveKey</actiontype>
  2935 	<actionbody>
  2936 		<derivekey>
  2937 			<kdf>pkcs#12</kdf>
  2938 			<passwd>PSWD</passwd>
  2939 			<salt>53414C54</salt>
  2940 			<iterations>1</iterations>
  2941 			<key>8A18939ACF4A00A900FE2351DCBAFD0C</key>
  2942 		</derivekey>
  2943 	</actionbody>
  2944 </action>
  2945 
  2946 //! @SYMTestCaseID CIT_PREQ1054_01
  2947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2948 //! @SYMREQ CIT_PREQ1054
  2949 //! @SYMTestPriority medium
  2950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2952 <action>
  2953 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  2954 	<actiontype>DeriveKey</actiontype>
  2955 	<actionbody>
  2956 		<derivekey>
  2957 			<kdf>pkcs#12</kdf>
  2958 			<passwd>password</passwd>
  2959 			<salt>53414C54</salt>
  2960 			<iterations>1</iterations>
  2961 			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0</key>
  2962 		</derivekey>
  2963 	</actionbody>
  2964 </action>
  2965 
  2966 //! @SYMTestCaseID CIT_PREQ1054_01
  2967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2968 //! @SYMREQ CIT_PREQ1054
  2969 //! @SYMTestPriority medium
  2970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2972 <action>
  2973 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  2974 	<actiontype>DeriveKey</actiontype>
  2975 	<actionbody>
  2976 		<derivekey>
  2977 			<kdf>pkcs#12</kdf>
  2978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  2979 			<salt>53414C54</salt>
  2980 			<iterations>1</iterations>
  2981 			<key>2ED53BB2CE3C39A2F4039B734F9D94C5</key>
  2982 		</derivekey>
  2983 	</actionbody>
  2984 </action>
  2985 
  2986 //! @SYMTestCaseID CIT_PREQ1054_01
  2987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  2988 //! @SYMREQ CIT_PREQ1054
  2989 //! @SYMTestPriority medium
  2990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  2991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2992 <action>
  2993 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  2994 	<actiontype>DeriveKey</actiontype>
  2995 	<actionbody>
  2996 		<derivekey>
  2997 			<kdf>pkcs#12</kdf>
  2998 			<passwd>0000</passwd>
  2999 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3000 			<iterations>1</iterations>
  3001 			<key>49CABE7B67736931126499722509C03D</key>
  3002 		</derivekey>
  3003 	</actionbody>
  3004 </action>
  3005 
  3006 //! @SYMTestCaseID CIT_PREQ1054_01
  3007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3008 //! @SYMREQ CIT_PREQ1054
  3009 //! @SYMTestPriority medium
  3010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3012 <action>
  3013 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3014 	<actiontype>DeriveKey</actiontype>
  3015 	<actionbody>
  3016 		<derivekey>
  3017 			<kdf>pkcs#12</kdf>
  3018 			<passwd>0001</passwd>
  3019 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3020 			<iterations>1</iterations>
  3021 			<key>F994B990D3554AFB778C729E9BAA0CC6</key>
  3022 		</derivekey>
  3023 	</actionbody>
  3024 </action>
  3025 
  3026 //! @SYMTestCaseID CIT_PREQ1054_01
  3027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3028 //! @SYMREQ CIT_PREQ1054
  3029 //! @SYMTestPriority medium
  3030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3032 <action>
  3033 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3034 	<actiontype>DeriveKey</actiontype>
  3035 	<actionbody>
  3036 		<derivekey>
  3037 			<kdf>pkcs#12</kdf>
  3038 			<passwd>PSWD</passwd>
  3039 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3040 			<iterations>1</iterations>
  3041 			<key>1AFAAD7E51964CCD2760CCE134E1F2B8</key>
  3042 		</derivekey>
  3043 	</actionbody>
  3044 </action>
  3045 
  3046 //! @SYMTestCaseID CIT_PREQ1054_01
  3047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3048 //! @SYMREQ CIT_PREQ1054
  3049 //! @SYMTestPriority medium
  3050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3052 <action>
  3053 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3054 	<actiontype>DeriveKey</actiontype>
  3055 	<actionbody>
  3056 		<derivekey>
  3057 			<kdf>pkcs#12</kdf>
  3058 			<passwd>password</passwd>
  3059 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3060 			<iterations>1</iterations>
  3061 			<key>878C91098D1F4FD0DD8CBC3A8149DF5F</key>
  3062 		</derivekey>
  3063 	</actionbody>
  3064 </action>
  3065 
  3066 //! @SYMTestCaseID CIT_PREQ1054_01
  3067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3068 //! @SYMREQ CIT_PREQ1054
  3069 //! @SYMTestPriority medium
  3070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3072 <action>
  3073 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3074 	<actiontype>DeriveKey</actiontype>
  3075 	<actionbody>
  3076 		<derivekey>
  3077 			<kdf>pkcs#12</kdf>
  3078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3079 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3080 			<iterations>1</iterations>
  3081 			<key>0DE3F08CAF4FF556C956527AD47C3497</key>
  3082 		</derivekey>
  3083 	</actionbody>
  3084 </action>
  3085 
  3086 //! @SYMTestCaseID CIT_PREQ1054_01
  3087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3088 //! @SYMREQ CIT_PREQ1054
  3089 //! @SYMTestPriority medium
  3090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3092 <action>
  3093 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3094 	<actiontype>DeriveKey</actiontype>
  3095 	<actionbody>
  3096 		<derivekey>
  3097 			<kdf>pkcs#12</kdf>
  3098 			<passwd>0000</passwd>
  3099 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3100 			<iterations>1</iterations>
  3101 			<key>90253A49C069E7FF35281461A4DDBE0B</key>
  3102 		</derivekey>
  3103 	</actionbody>
  3104 </action>
  3105 
  3106 //! @SYMTestCaseID CIT_PREQ1054_01
  3107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3108 //! @SYMREQ CIT_PREQ1054
  3109 //! @SYMTestPriority medium
  3110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3112 <action>
  3113 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3114 	<actiontype>DeriveKey</actiontype>
  3115 	<actionbody>
  3116 		<derivekey>
  3117 			<kdf>pkcs#12</kdf>
  3118 			<passwd>0001</passwd>
  3119 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3120 			<iterations>1</iterations>
  3121 			<key>40BE97AB930A7E8B6DB634C93B94E699</key>
  3122 		</derivekey>
  3123 	</actionbody>
  3124 </action>
  3125 
  3126 //! @SYMTestCaseID CIT_PREQ1054_01
  3127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3128 //! @SYMREQ CIT_PREQ1054
  3129 //! @SYMTestPriority medium
  3130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3132 <action>
  3133 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3134 	<actiontype>DeriveKey</actiontype>
  3135 	<actionbody>
  3136 		<derivekey>
  3137 			<kdf>pkcs#12</kdf>
  3138 			<passwd>PSWD</passwd>
  3139 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3140 			<iterations>1</iterations>
  3141 			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6</key>
  3142 		</derivekey>
  3143 	</actionbody>
  3144 </action>
  3145 
  3146 //! @SYMTestCaseID CIT_PREQ1054_01
  3147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3148 //! @SYMREQ CIT_PREQ1054
  3149 //! @SYMTestPriority medium
  3150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3152 <action>
  3153 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3154 	<actiontype>DeriveKey</actiontype>
  3155 	<actionbody>
  3156 		<derivekey>
  3157 			<kdf>pkcs#12</kdf>
  3158 			<passwd>password</passwd>
  3159 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3160 			<iterations>1</iterations>
  3161 			<key>E323D5F588414AE68EF8FCA46879C1C7</key>
  3162 		</derivekey>
  3163 	</actionbody>
  3164 </action>
  3165 
  3166 //! @SYMTestCaseID CIT_PREQ1054_01
  3167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3168 //! @SYMREQ CIT_PREQ1054
  3169 //! @SYMTestPriority medium
  3170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3172 <action>
  3173 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3174 	<actiontype>DeriveKey</actiontype>
  3175 	<actionbody>
  3176 		<derivekey>
  3177 			<kdf>pkcs#12</kdf>
  3178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3179 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3180 			<iterations>1</iterations>
  3181 			<key>27476572AF26E99AB85CD350DC802ABA</key>
  3182 		</derivekey>
  3183 	</actionbody>
  3184 </action>
  3185 
  3186 //! @SYMTestCaseID CIT_PREQ1054_01
  3187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3188 //! @SYMREQ CIT_PREQ1054
  3189 //! @SYMTestPriority medium
  3190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3192 <action>
  3193 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3194 	<actiontype>DeriveKey</actiontype>
  3195 	<actionbody>
  3196 		<derivekey>
  3197 			<kdf>pkcs#12</kdf>
  3198 			<passwd>0000</passwd>
  3199 			<salt>53414C54</salt>
  3200 			<iterations>2</iterations>
  3201 			<key>A1D9010A6761CB2675F1C33BB3C52158</key>
  3202 		</derivekey>
  3203 	</actionbody>
  3204 </action>
  3205 
  3206 //! @SYMTestCaseID CIT_PREQ1054_01
  3207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3208 //! @SYMREQ CIT_PREQ1054
  3209 //! @SYMTestPriority medium
  3210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3212 <action>
  3213 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3214 	<actiontype>DeriveKey</actiontype>
  3215 	<actionbody>
  3216 		<derivekey>
  3217 			<kdf>pkcs#12</kdf>
  3218 			<passwd>0001</passwd>
  3219 			<salt>53414C54</salt>
  3220 			<iterations>2</iterations>
  3221 			<key>17E4E1F15BC31052E563BFF7B5D11D15</key>
  3222 		</derivekey>
  3223 	</actionbody>
  3224 </action>
  3225 
  3226 //! @SYMTestCaseID CIT_PREQ1054_01
  3227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3228 //! @SYMREQ CIT_PREQ1054
  3229 //! @SYMTestPriority medium
  3230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3232 <action>
  3233 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3234 	<actiontype>DeriveKey</actiontype>
  3235 	<actionbody>
  3236 		<derivekey>
  3237 			<kdf>pkcs#12</kdf>
  3238 			<passwd>PSWD</passwd>
  3239 			<salt>53414C54</salt>
  3240 			<iterations>2</iterations>
  3241 			<key>D1B71808FCCA5C97E8E52CF5E23C633C</key>
  3242 		</derivekey>
  3243 	</actionbody>
  3244 </action>
  3245 
  3246 //! @SYMTestCaseID CIT_PREQ1054_01
  3247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3248 //! @SYMREQ CIT_PREQ1054
  3249 //! @SYMTestPriority medium
  3250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3252 <action>
  3253 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3254 	<actiontype>DeriveKey</actiontype>
  3255 	<actionbody>
  3256 		<derivekey>
  3257 			<kdf>pkcs#12</kdf>
  3258 			<passwd>password</passwd>
  3259 			<salt>53414C54</salt>
  3260 			<iterations>2</iterations>
  3261 			<key>EE7E4073F2E6008722BB9842540998C2</key>
  3262 		</derivekey>
  3263 	</actionbody>
  3264 </action>
  3265 
  3266 //! @SYMTestCaseID CIT_PREQ1054_01
  3267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3268 //! @SYMREQ CIT_PREQ1054
  3269 //! @SYMTestPriority medium
  3270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3272 <action>
  3273 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3274 	<actiontype>DeriveKey</actiontype>
  3275 	<actionbody>
  3276 		<derivekey>
  3277 			<kdf>pkcs#12</kdf>
  3278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3279 			<salt>53414C54</salt>
  3280 			<iterations>2</iterations>
  3281 			<key>5BF185C726EE2182888A834066C30BA9</key>
  3282 		</derivekey>
  3283 	</actionbody>
  3284 </action>
  3285 
  3286 //! @SYMTestCaseID CIT_PREQ1054_01
  3287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3288 //! @SYMREQ CIT_PREQ1054
  3289 //! @SYMTestPriority medium
  3290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3292 <action>
  3293 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3294 	<actiontype>DeriveKey</actiontype>
  3295 	<actionbody>
  3296 		<derivekey>
  3297 			<kdf>pkcs#12</kdf>
  3298 			<passwd>0000</passwd>
  3299 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3300 			<iterations>2</iterations>
  3301 			<key>72ADF5E0413FDBF6659A1E7D495BBE32</key>
  3302 		</derivekey>
  3303 	</actionbody>
  3304 </action>
  3305 
  3306 //! @SYMTestCaseID CIT_PREQ1054_01
  3307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3308 //! @SYMREQ CIT_PREQ1054
  3309 //! @SYMTestPriority medium
  3310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3312 <action>
  3313 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3314 	<actiontype>DeriveKey</actiontype>
  3315 	<actionbody>
  3316 		<derivekey>
  3317 			<kdf>pkcs#12</kdf>
  3318 			<passwd>0001</passwd>
  3319 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3320 			<iterations>2</iterations>
  3321 			<key>63E6DF459C899D72577C20FFE4F27670</key>
  3322 		</derivekey>
  3323 	</actionbody>
  3324 </action>
  3325 
  3326 //! @SYMTestCaseID CIT_PREQ1054_01
  3327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3328 //! @SYMREQ CIT_PREQ1054
  3329 //! @SYMTestPriority medium
  3330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3332 <action>
  3333 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3334 	<actiontype>DeriveKey</actiontype>
  3335 	<actionbody>
  3336 		<derivekey>
  3337 			<kdf>pkcs#12</kdf>
  3338 			<passwd>PSWD</passwd>
  3339 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3340 			<iterations>2</iterations>
  3341 			<key>C2099204ABFBB841875BD7595A89D31A</key>
  3342 		</derivekey>
  3343 	</actionbody>
  3344 </action>
  3345 
  3346 //! @SYMTestCaseID CIT_PREQ1054_01
  3347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3348 //! @SYMREQ CIT_PREQ1054
  3349 //! @SYMTestPriority medium
  3350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3352 <action>
  3353 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3354 	<actiontype>DeriveKey</actiontype>
  3355 	<actionbody>
  3356 		<derivekey>
  3357 			<kdf>pkcs#12</kdf>
  3358 			<passwd>password</passwd>
  3359 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3360 			<iterations>2</iterations>
  3361 			<key>3204D28A32DF299B612958906C79154A</key>
  3362 		</derivekey>
  3363 	</actionbody>
  3364 </action>
  3365 
  3366 //! @SYMTestCaseID CIT_PREQ1054_01
  3367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3368 //! @SYMREQ CIT_PREQ1054
  3369 //! @SYMTestPriority medium
  3370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3372 <action>
  3373 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3374 	<actiontype>DeriveKey</actiontype>
  3375 	<actionbody>
  3376 		<derivekey>
  3377 			<kdf>pkcs#12</kdf>
  3378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3379 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3380 			<iterations>2</iterations>
  3381 			<key>FB845F70A40E96C536641C3F797AAE39</key>
  3382 		</derivekey>
  3383 	</actionbody>
  3384 </action>
  3385 
  3386 //! @SYMTestCaseID CIT_PREQ1054_01
  3387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3388 //! @SYMREQ CIT_PREQ1054
  3389 //! @SYMTestPriority medium
  3390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3392 <action>
  3393 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3394 	<actiontype>DeriveKey</actiontype>
  3395 	<actionbody>
  3396 		<derivekey>
  3397 			<kdf>pkcs#12</kdf>
  3398 			<passwd>0000</passwd>
  3399 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3400 			<iterations>2</iterations>
  3401 			<key>B9230EEC1D615A6DFEF5A8793CB06783</key>
  3402 		</derivekey>
  3403 	</actionbody>
  3404 </action>
  3405 
  3406 //! @SYMTestCaseID CIT_PREQ1054_01
  3407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3408 //! @SYMREQ CIT_PREQ1054
  3409 //! @SYMTestPriority medium
  3410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3412 <action>
  3413 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3414 	<actiontype>DeriveKey</actiontype>
  3415 	<actionbody>
  3416 		<derivekey>
  3417 			<kdf>pkcs#12</kdf>
  3418 			<passwd>0001</passwd>
  3419 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3420 			<iterations>2</iterations>
  3421 			<key>462B0F2D1B18297A3F2C5E4058A0083E</key>
  3422 		</derivekey>
  3423 	</actionbody>
  3424 </action>
  3425 
  3426 //! @SYMTestCaseID CIT_PREQ1054_01
  3427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3428 //! @SYMREQ CIT_PREQ1054
  3429 //! @SYMTestPriority medium
  3430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3432 <action>
  3433 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3434 	<actiontype>DeriveKey</actiontype>
  3435 	<actionbody>
  3436 		<derivekey>
  3437 			<kdf>pkcs#12</kdf>
  3438 			<passwd>PSWD</passwd>
  3439 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3440 			<iterations>2</iterations>
  3441 			<key>05B66EF1BB844470CBBB46D5F4C7DB29</key>
  3442 		</derivekey>
  3443 	</actionbody>
  3444 </action>
  3445 
  3446 //! @SYMTestCaseID CIT_PREQ1054_01
  3447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3448 //! @SYMREQ CIT_PREQ1054
  3449 //! @SYMTestPriority medium
  3450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3452 <action>
  3453 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3454 	<actiontype>DeriveKey</actiontype>
  3455 	<actionbody>
  3456 		<derivekey>
  3457 			<kdf>pkcs#12</kdf>
  3458 			<passwd>password</passwd>
  3459 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3460 			<iterations>2</iterations>
  3461 			<key>C1B7E77C96BB5EE1386E8461A58F0D0C</key>
  3462 		</derivekey>
  3463 	</actionbody>
  3464 </action>
  3465 
  3466 //! @SYMTestCaseID CIT_PREQ1054_01
  3467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3468 //! @SYMREQ CIT_PREQ1054
  3469 //! @SYMTestPriority medium
  3470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3472 <action>
  3473 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3474 	<actiontype>DeriveKey</actiontype>
  3475 	<actionbody>
  3476 		<derivekey>
  3477 			<kdf>pkcs#12</kdf>
  3478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3479 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3480 			<iterations>2</iterations>
  3481 			<key>3DE08CDACF489F30BBD75C0FF401EC02</key>
  3482 		</derivekey>
  3483 	</actionbody>
  3484 </action>
  3485 
  3486 //! @SYMTestCaseID CIT_PREQ1054_01
  3487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3488 //! @SYMREQ CIT_PREQ1054
  3489 //! @SYMTestPriority medium
  3490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3492 <action>
  3493 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3494 	<actiontype>DeriveKey</actiontype>
  3495 	<actionbody>
  3496 		<derivekey>
  3497 			<kdf>pkcs#12</kdf>
  3498 			<passwd>0000</passwd>
  3499 			<salt>53414C54</salt>
  3500 			<iterations>4</iterations>
  3501 			<key>D0158BFC57E643965DC161741725CE94</key>
  3502 		</derivekey>
  3503 	</actionbody>
  3504 </action>
  3505 
  3506 //! @SYMTestCaseID CIT_PREQ1054_01
  3507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3508 //! @SYMREQ CIT_PREQ1054
  3509 //! @SYMTestPriority medium
  3510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3512 <action>
  3513 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3514 	<actiontype>DeriveKey</actiontype>
  3515 	<actionbody>
  3516 		<derivekey>
  3517 			<kdf>pkcs#12</kdf>
  3518 			<passwd>0001</passwd>
  3519 			<salt>53414C54</salt>
  3520 			<iterations>4</iterations>
  3521 			<key>AEB6CD53F0D6830161100C4BFD439B34</key>
  3522 		</derivekey>
  3523 	</actionbody>
  3524 </action>
  3525 
  3526 //! @SYMTestCaseID CIT_PREQ1054_01
  3527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3528 //! @SYMREQ CIT_PREQ1054
  3529 //! @SYMTestPriority medium
  3530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3532 <action>
  3533 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3534 	<actiontype>DeriveKey</actiontype>
  3535 	<actionbody>
  3536 		<derivekey>
  3537 			<kdf>pkcs#12</kdf>
  3538 			<passwd>PSWD</passwd>
  3539 			<salt>53414C54</salt>
  3540 			<iterations>4</iterations>
  3541 			<key>80010C12B66CC739F4ACF8BB15419770</key>
  3542 		</derivekey>
  3543 	</actionbody>
  3544 </action>
  3545 
  3546 //! @SYMTestCaseID CIT_PREQ1054_01
  3547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3548 //! @SYMREQ CIT_PREQ1054
  3549 //! @SYMTestPriority medium
  3550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3552 <action>
  3553 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3554 	<actiontype>DeriveKey</actiontype>
  3555 	<actionbody>
  3556 		<derivekey>
  3557 			<kdf>pkcs#12</kdf>
  3558 			<passwd>password</passwd>
  3559 			<salt>53414C54</salt>
  3560 			<iterations>4</iterations>
  3561 			<key>497DE34C4C64E56AD53E5F8F6E16D1A3</key>
  3562 		</derivekey>
  3563 	</actionbody>
  3564 </action>
  3565 
  3566 //! @SYMTestCaseID CIT_PREQ1054_01
  3567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3568 //! @SYMREQ CIT_PREQ1054
  3569 //! @SYMTestPriority medium
  3570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3572 <action>
  3573 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3574 	<actiontype>DeriveKey</actiontype>
  3575 	<actionbody>
  3576 		<derivekey>
  3577 			<kdf>pkcs#12</kdf>
  3578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3579 			<salt>53414C54</salt>
  3580 			<iterations>4</iterations>
  3581 			<key>146C6A5B58AF8561220DE4C13A133248</key>
  3582 		</derivekey>
  3583 	</actionbody>
  3584 </action>
  3585 
  3586 //! @SYMTestCaseID CIT_PREQ1054_01
  3587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3588 //! @SYMREQ CIT_PREQ1054
  3589 //! @SYMTestPriority medium
  3590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3592 <action>
  3593 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3594 	<actiontype>DeriveKey</actiontype>
  3595 	<actionbody>
  3596 		<derivekey>
  3597 			<kdf>pkcs#12</kdf>
  3598 			<passwd>0000</passwd>
  3599 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3600 			<iterations>4</iterations>
  3601 			<key>E89772E7A52D6D8C65AAE01D0380ED59</key>
  3602 		</derivekey>
  3603 	</actionbody>
  3604 </action>
  3605 
  3606 //! @SYMTestCaseID CIT_PREQ1054_01
  3607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3608 //! @SYMREQ CIT_PREQ1054
  3609 //! @SYMTestPriority medium
  3610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3612 <action>
  3613 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3614 	<actiontype>DeriveKey</actiontype>
  3615 	<actionbody>
  3616 		<derivekey>
  3617 			<kdf>pkcs#12</kdf>
  3618 			<passwd>0001</passwd>
  3619 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3620 			<iterations>4</iterations>
  3621 			<key>23930713772E26DBBABB53F3C5C77501</key>
  3622 		</derivekey>
  3623 	</actionbody>
  3624 </action>
  3625 
  3626 //! @SYMTestCaseID CIT_PREQ1054_01
  3627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3628 //! @SYMREQ CIT_PREQ1054
  3629 //! @SYMTestPriority medium
  3630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3632 <action>
  3633 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3634 	<actiontype>DeriveKey</actiontype>
  3635 	<actionbody>
  3636 		<derivekey>
  3637 			<kdf>pkcs#12</kdf>
  3638 			<passwd>PSWD</passwd>
  3639 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3640 			<iterations>4</iterations>
  3641 			<key>DF2D961FE3929BBA41493EB5421FEF7C</key>
  3642 		</derivekey>
  3643 	</actionbody>
  3644 </action>
  3645 
  3646 //! @SYMTestCaseID CIT_PREQ1054_01
  3647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3648 //! @SYMREQ CIT_PREQ1054
  3649 //! @SYMTestPriority medium
  3650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3652 <action>
  3653 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3654 	<actiontype>DeriveKey</actiontype>
  3655 	<actionbody>
  3656 		<derivekey>
  3657 			<kdf>pkcs#12</kdf>
  3658 			<passwd>password</passwd>
  3659 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3660 			<iterations>4</iterations>
  3661 			<key>363619530B170B7BAE1C046B29351C23</key>
  3662 		</derivekey>
  3663 	</actionbody>
  3664 </action>
  3665 
  3666 //! @SYMTestCaseID CIT_PREQ1054_01
  3667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3668 //! @SYMREQ CIT_PREQ1054
  3669 //! @SYMTestPriority medium
  3670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3672 <action>
  3673 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3674 	<actiontype>DeriveKey</actiontype>
  3675 	<actionbody>
  3676 		<derivekey>
  3677 			<kdf>pkcs#12</kdf>
  3678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3679 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3680 			<iterations>4</iterations>
  3681 			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF</key>
  3682 		</derivekey>
  3683 	</actionbody>
  3684 </action>
  3685 
  3686 //! @SYMTestCaseID CIT_PREQ1054_01
  3687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3688 //! @SYMREQ CIT_PREQ1054
  3689 //! @SYMTestPriority medium
  3690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3692 <action>
  3693 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3694 	<actiontype>DeriveKey</actiontype>
  3695 	<actionbody>
  3696 		<derivekey>
  3697 			<kdf>pkcs#12</kdf>
  3698 			<passwd>0000</passwd>
  3699 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3700 			<iterations>4</iterations>
  3701 			<key>EF50923D65A0610BDC51AD5DB1B4F4F9</key>
  3702 		</derivekey>
  3703 	</actionbody>
  3704 </action>
  3705 
  3706 //! @SYMTestCaseID CIT_PREQ1054_01
  3707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3708 //! @SYMREQ CIT_PREQ1054
  3709 //! @SYMTestPriority medium
  3710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3712 <action>
  3713 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3714 	<actiontype>DeriveKey</actiontype>
  3715 	<actionbody>
  3716 		<derivekey>
  3717 			<kdf>pkcs#12</kdf>
  3718 			<passwd>0001</passwd>
  3719 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3720 			<iterations>4</iterations>
  3721 			<key>9A618595C714486B7D7E3120005C8BC1</key>
  3722 		</derivekey>
  3723 	</actionbody>
  3724 </action>
  3725 
  3726 //! @SYMTestCaseID CIT_PREQ1054_01
  3727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3728 //! @SYMREQ CIT_PREQ1054
  3729 //! @SYMTestPriority medium
  3730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3732 <action>
  3733 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3734 	<actiontype>DeriveKey</actiontype>
  3735 	<actionbody>
  3736 		<derivekey>
  3737 			<kdf>pkcs#12</kdf>
  3738 			<passwd>PSWD</passwd>
  3739 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3740 			<iterations>4</iterations>
  3741 			<key>B3B33AA8A6777605E3029C0F8DC45290</key>
  3742 		</derivekey>
  3743 	</actionbody>
  3744 </action>
  3745 
  3746 //! @SYMTestCaseID CIT_PREQ1054_01
  3747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3748 //! @SYMREQ CIT_PREQ1054
  3749 //! @SYMTestPriority medium
  3750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3752 <action>
  3753 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3754 	<actiontype>DeriveKey</actiontype>
  3755 	<actionbody>
  3756 		<derivekey>
  3757 			<kdf>pkcs#12</kdf>
  3758 			<passwd>password</passwd>
  3759 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3760 			<iterations>4</iterations>
  3761 			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD</key>
  3762 		</derivekey>
  3763 	</actionbody>
  3764 </action>
  3765 
  3766 //! @SYMTestCaseID CIT_PREQ1054_01
  3767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3768 //! @SYMREQ CIT_PREQ1054
  3769 //! @SYMTestPriority medium
  3770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3772 <action>
  3773 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3774 	<actiontype>DeriveKey</actiontype>
  3775 	<actionbody>
  3776 		<derivekey>
  3777 			<kdf>pkcs#12</kdf>
  3778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3779 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  3780 			<iterations>4</iterations>
  3781 			<key>91DF3661364A0DAD28180A41ADCB5567</key>
  3782 		</derivekey>
  3783 	</actionbody>
  3784 </action>
  3785 
  3786 //! @SYMTestCaseID CIT_PREQ1054_01
  3787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3788 //! @SYMREQ CIT_PREQ1054
  3789 //! @SYMTestPriority medium
  3790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3792 <action>
  3793 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3794 	<actiontype>DeriveKey</actiontype>
  3795 	<actionbody>
  3796 		<derivekey>
  3797 			<kdf>pkcs#12</kdf>
  3798 			<passwd>0000</passwd>
  3799 			<salt>53414C54</salt>
  3800 			<iterations>8</iterations>
  3801 			<key>9A08D3C4F584ECD1E538B7A46DCFDEA1</key>
  3802 		</derivekey>
  3803 	</actionbody>
  3804 </action>
  3805 
  3806 //! @SYMTestCaseID CIT_PREQ1054_01
  3807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3808 //! @SYMREQ CIT_PREQ1054
  3809 //! @SYMTestPriority medium
  3810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3812 <action>
  3813 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3814 	<actiontype>DeriveKey</actiontype>
  3815 	<actionbody>
  3816 		<derivekey>
  3817 			<kdf>pkcs#12</kdf>
  3818 			<passwd>0001</passwd>
  3819 			<salt>53414C54</salt>
  3820 			<iterations>8</iterations>
  3821 			<key>33002FA0B6A5A27991A062FF6173E357</key>
  3822 		</derivekey>
  3823 	</actionbody>
  3824 </action>
  3825 
  3826 //! @SYMTestCaseID CIT_PREQ1054_01
  3827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3828 //! @SYMREQ CIT_PREQ1054
  3829 //! @SYMTestPriority medium
  3830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3832 <action>
  3833 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3834 	<actiontype>DeriveKey</actiontype>
  3835 	<actionbody>
  3836 		<derivekey>
  3837 			<kdf>pkcs#12</kdf>
  3838 			<passwd>PSWD</passwd>
  3839 			<salt>53414C54</salt>
  3840 			<iterations>8</iterations>
  3841 			<key>22001FA26964DCD0BE3C58AB6E43557C</key>
  3842 		</derivekey>
  3843 	</actionbody>
  3844 </action>
  3845 
  3846 //! @SYMTestCaseID CIT_PREQ1054_01
  3847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3848 //! @SYMREQ CIT_PREQ1054
  3849 //! @SYMTestPriority medium
  3850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3852 <action>
  3853 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3854 	<actiontype>DeriveKey</actiontype>
  3855 	<actionbody>
  3856 		<derivekey>
  3857 			<kdf>pkcs#12</kdf>
  3858 			<passwd>password</passwd>
  3859 			<salt>53414C54</salt>
  3860 			<iterations>8</iterations>
  3861 			<key>B0935F11227F5A473073DCD188886687</key>
  3862 		</derivekey>
  3863 	</actionbody>
  3864 </action>
  3865 
  3866 //! @SYMTestCaseID CIT_PREQ1054_01
  3867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3868 //! @SYMREQ CIT_PREQ1054
  3869 //! @SYMTestPriority medium
  3870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3872 <action>
  3873 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  3874 	<actiontype>DeriveKey</actiontype>
  3875 	<actionbody>
  3876 		<derivekey>
  3877 			<kdf>pkcs#12</kdf>
  3878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3879 			<salt>53414C54</salt>
  3880 			<iterations>8</iterations>
  3881 			<key>6602B1B4BBB670208041ECD8E1634845</key>
  3882 		</derivekey>
  3883 	</actionbody>
  3884 </action>
  3885 
  3886 //! @SYMTestCaseID CIT_PREQ1054_01
  3887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3888 //! @SYMREQ CIT_PREQ1054
  3889 //! @SYMTestPriority medium
  3890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3892 <action>
  3893 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3894 	<actiontype>DeriveKey</actiontype>
  3895 	<actionbody>
  3896 		<derivekey>
  3897 			<kdf>pkcs#12</kdf>
  3898 			<passwd>0000</passwd>
  3899 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3900 			<iterations>8</iterations>
  3901 			<key>3A478368DD5DC61BAA09325959A3F46C</key>
  3902 		</derivekey>
  3903 	</actionbody>
  3904 </action>
  3905 
  3906 //! @SYMTestCaseID CIT_PREQ1054_01
  3907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3908 //! @SYMREQ CIT_PREQ1054
  3909 //! @SYMTestPriority medium
  3910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3912 <action>
  3913 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3914 	<actiontype>DeriveKey</actiontype>
  3915 	<actionbody>
  3916 		<derivekey>
  3917 			<kdf>pkcs#12</kdf>
  3918 			<passwd>0001</passwd>
  3919 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3920 			<iterations>8</iterations>
  3921 			<key>6473EB1244E055149E0858C49FAE7B8D</key>
  3922 		</derivekey>
  3923 	</actionbody>
  3924 </action>
  3925 
  3926 //! @SYMTestCaseID CIT_PREQ1054_01
  3927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3928 //! @SYMREQ CIT_PREQ1054
  3929 //! @SYMTestPriority medium
  3930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3932 <action>
  3933 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3934 	<actiontype>DeriveKey</actiontype>
  3935 	<actionbody>
  3936 		<derivekey>
  3937 			<kdf>pkcs#12</kdf>
  3938 			<passwd>PSWD</passwd>
  3939 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3940 			<iterations>8</iterations>
  3941 			<key>AA762B8736D4C37BAD263103CA283E09</key>
  3942 		</derivekey>
  3943 	</actionbody>
  3944 </action>
  3945 
  3946 //! @SYMTestCaseID CIT_PREQ1054_01
  3947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3948 //! @SYMREQ CIT_PREQ1054
  3949 //! @SYMTestPriority medium
  3950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3952 <action>
  3953 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3954 	<actiontype>DeriveKey</actiontype>
  3955 	<actionbody>
  3956 		<derivekey>
  3957 			<kdf>pkcs#12</kdf>
  3958 			<passwd>password</passwd>
  3959 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3960 			<iterations>8</iterations>
  3961 			<key>F00C5240B03C9A2324BD5FE0AEEE1B62</key>
  3962 		</derivekey>
  3963 	</actionbody>
  3964 </action>
  3965 
  3966 //! @SYMTestCaseID CIT_PREQ1054_01
  3967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3968 //! @SYMREQ CIT_PREQ1054
  3969 //! @SYMTestPriority medium
  3970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3972 <action>
  3973 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  3974 	<actiontype>DeriveKey</actiontype>
  3975 	<actionbody>
  3976 		<derivekey>
  3977 			<kdf>pkcs#12</kdf>
  3978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  3979 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  3980 			<iterations>8</iterations>
  3981 			<key>935593CA370BB6988F2F41D2F4ABF56E</key>
  3982 		</derivekey>
  3983 	</actionbody>
  3984 </action>
  3985 
  3986 //! @SYMTestCaseID CIT_PREQ1054_01
  3987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  3988 //! @SYMREQ CIT_PREQ1054
  3989 //! @SYMTestPriority medium
  3990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  3991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3992 <action>
  3993 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  3994 	<actiontype>DeriveKey</actiontype>
  3995 	<actionbody>
  3996 		<derivekey>
  3997 			<kdf>pkcs#12</kdf>
  3998 			<passwd>0000</passwd>
  3999 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4000 			<iterations>8</iterations>
  4001 			<key>FCE1F429AEB3B9818D96B88DD25CDED9</key>
  4002 		</derivekey>
  4003 	</actionbody>
  4004 </action>
  4005 
  4006 //! @SYMTestCaseID CIT_PREQ1054_01
  4007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4008 //! @SYMREQ CIT_PREQ1054
  4009 //! @SYMTestPriority medium
  4010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4012 <action>
  4013 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4014 	<actiontype>DeriveKey</actiontype>
  4015 	<actionbody>
  4016 		<derivekey>
  4017 			<kdf>pkcs#12</kdf>
  4018 			<passwd>0001</passwd>
  4019 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4020 			<iterations>8</iterations>
  4021 			<key>82B4A13659033EA4025DB51A6CB573F9</key>
  4022 		</derivekey>
  4023 	</actionbody>
  4024 </action>
  4025 
  4026 //! @SYMTestCaseID CIT_PREQ1054_01
  4027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4028 //! @SYMREQ CIT_PREQ1054
  4029 //! @SYMTestPriority medium
  4030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4032 <action>
  4033 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4034 	<actiontype>DeriveKey</actiontype>
  4035 	<actionbody>
  4036 		<derivekey>
  4037 			<kdf>pkcs#12</kdf>
  4038 			<passwd>PSWD</passwd>
  4039 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4040 			<iterations>8</iterations>
  4041 			<key>45FE091D4DD2D50FA7D3340B1DB838F2</key>
  4042 		</derivekey>
  4043 	</actionbody>
  4044 </action>
  4045 
  4046 //! @SYMTestCaseID CIT_PREQ1054_01
  4047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4048 //! @SYMREQ CIT_PREQ1054
  4049 //! @SYMTestPriority medium
  4050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4052 <action>
  4053 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4054 	<actiontype>DeriveKey</actiontype>
  4055 	<actionbody>
  4056 		<derivekey>
  4057 			<kdf>pkcs#12</kdf>
  4058 			<passwd>password</passwd>
  4059 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4060 			<iterations>8</iterations>
  4061 			<key>5670457314E405B0ED1583FC4B82FEAD</key>
  4062 		</derivekey>
  4063 	</actionbody>
  4064 </action>
  4065 
  4066 //! @SYMTestCaseID CIT_PREQ1054_01
  4067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4068 //! @SYMREQ CIT_PREQ1054
  4069 //! @SYMTestPriority medium
  4070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4072 <action>
  4073 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4074 	<actiontype>DeriveKey</actiontype>
  4075 	<actionbody>
  4076 		<derivekey>
  4077 			<kdf>pkcs#12</kdf>
  4078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4079 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4080 			<iterations>8</iterations>
  4081 			<key>1C4CAE25146D74F3762B5C3FD3A91752</key>
  4082 		</derivekey>
  4083 	</actionbody>
  4084 </action>
  4085 
  4086 //! @SYMTestCaseID CIT_PREQ1054_01
  4087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4088 //! @SYMREQ CIT_PREQ1054
  4089 //! @SYMTestPriority medium
  4090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4092 <action>
  4093 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4094 	<actiontype>DeriveKey</actiontype>
  4095 	<actionbody>
  4096 		<derivekey>
  4097 			<kdf>pkcs#12</kdf>
  4098 			<passwd>0000</passwd>
  4099 			<salt>53414C54</salt>
  4100 			<iterations>128</iterations>
  4101 			<key>8B4B3CBFB00466F63B30FEAD111E163D</key>
  4102 		</derivekey>
  4103 	</actionbody>
  4104 </action>
  4105 
  4106 //! @SYMTestCaseID CIT_PREQ1054_01
  4107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4108 //! @SYMREQ CIT_PREQ1054
  4109 //! @SYMTestPriority medium
  4110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4112 <action>
  4113 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4114 	<actiontype>DeriveKey</actiontype>
  4115 	<actionbody>
  4116 		<derivekey>
  4117 			<kdf>pkcs#12</kdf>
  4118 			<passwd>0001</passwd>
  4119 			<salt>53414C54</salt>
  4120 			<iterations>128</iterations>
  4121 			<key>C89C3A2C9C06626EB831F4BB5262809B</key>
  4122 		</derivekey>
  4123 	</actionbody>
  4124 </action>
  4125 
  4126 //! @SYMTestCaseID CIT_PREQ1054_01
  4127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4128 //! @SYMREQ CIT_PREQ1054
  4129 //! @SYMTestPriority medium
  4130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4132 <action>
  4133 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4134 	<actiontype>DeriveKey</actiontype>
  4135 	<actionbody>
  4136 		<derivekey>
  4137 			<kdf>pkcs#12</kdf>
  4138 			<passwd>PSWD</passwd>
  4139 			<salt>53414C54</salt>
  4140 			<iterations>128</iterations>
  4141 			<key>8109F97073FF3D286B21095E7AFBBAFA</key>
  4142 		</derivekey>
  4143 	</actionbody>
  4144 </action>
  4145 
  4146 //! @SYMTestCaseID CIT_PREQ1054_01
  4147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4148 //! @SYMREQ CIT_PREQ1054
  4149 //! @SYMTestPriority medium
  4150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4152 <action>
  4153 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4154 	<actiontype>DeriveKey</actiontype>
  4155 	<actionbody>
  4156 		<derivekey>
  4157 			<kdf>pkcs#12</kdf>
  4158 			<passwd>password</passwd>
  4159 			<salt>53414C54</salt>
  4160 			<iterations>128</iterations>
  4161 			<key>55E985CC1581F3D0052F53DB469F6DC9</key>
  4162 		</derivekey>
  4163 	</actionbody>
  4164 </action>
  4165 
  4166 //! @SYMTestCaseID CIT_PREQ1054_01
  4167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4168 //! @SYMREQ CIT_PREQ1054
  4169 //! @SYMTestPriority medium
  4170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4172 <action>
  4173 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4174 	<actiontype>DeriveKey</actiontype>
  4175 	<actionbody>
  4176 		<derivekey>
  4177 			<kdf>pkcs#12</kdf>
  4178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4179 			<salt>53414C54</salt>
  4180 			<iterations>128</iterations>
  4181 			<key>2802AA97D4C79B1813AB23F2DD710722</key>
  4182 		</derivekey>
  4183 	</actionbody>
  4184 </action>
  4185 
  4186 //! @SYMTestCaseID CIT_PREQ1054_01
  4187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4188 //! @SYMREQ CIT_PREQ1054
  4189 //! @SYMTestPriority medium
  4190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4192 <action>
  4193 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4194 	<actiontype>DeriveKey</actiontype>
  4195 	<actionbody>
  4196 		<derivekey>
  4197 			<kdf>pkcs#12</kdf>
  4198 			<passwd>0000</passwd>
  4199 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4200 			<iterations>128</iterations>
  4201 			<key>881509A34D80B5AB5CEC65B859DF2D99</key>
  4202 		</derivekey>
  4203 	</actionbody>
  4204 </action>
  4205 
  4206 //! @SYMTestCaseID CIT_PREQ1054_01
  4207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4208 //! @SYMREQ CIT_PREQ1054
  4209 //! @SYMTestPriority medium
  4210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4212 <action>
  4213 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4214 	<actiontype>DeriveKey</actiontype>
  4215 	<actionbody>
  4216 		<derivekey>
  4217 			<kdf>pkcs#12</kdf>
  4218 			<passwd>0001</passwd>
  4219 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4220 			<iterations>128</iterations>
  4221 			<key>B2918BC593DEC4559C279CFA050CB0F9</key>
  4222 		</derivekey>
  4223 	</actionbody>
  4224 </action>
  4225 
  4226 //! @SYMTestCaseID CIT_PREQ1054_01
  4227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4228 //! @SYMREQ CIT_PREQ1054
  4229 //! @SYMTestPriority medium
  4230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4232 <action>
  4233 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4234 	<actiontype>DeriveKey</actiontype>
  4235 	<actionbody>
  4236 		<derivekey>
  4237 			<kdf>pkcs#12</kdf>
  4238 			<passwd>PSWD</passwd>
  4239 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4240 			<iterations>128</iterations>
  4241 			<key>0FE0529B45AFC9BB66323C2182DE414A</key>
  4242 		</derivekey>
  4243 	</actionbody>
  4244 </action>
  4245 
  4246 //! @SYMTestCaseID CIT_PREQ1054_01
  4247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4248 //! @SYMREQ CIT_PREQ1054
  4249 //! @SYMTestPriority medium
  4250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4252 <action>
  4253 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4254 	<actiontype>DeriveKey</actiontype>
  4255 	<actionbody>
  4256 		<derivekey>
  4257 			<kdf>pkcs#12</kdf>
  4258 			<passwd>password</passwd>
  4259 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4260 			<iterations>128</iterations>
  4261 			<key>1FF923C4B1E1007EF168E4185280F818</key>
  4262 		</derivekey>
  4263 	</actionbody>
  4264 </action>
  4265 
  4266 //! @SYMTestCaseID CIT_PREQ1054_01
  4267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4268 //! @SYMREQ CIT_PREQ1054
  4269 //! @SYMTestPriority medium
  4270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4272 <action>
  4273 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4274 	<actiontype>DeriveKey</actiontype>
  4275 	<actionbody>
  4276 		<derivekey>
  4277 			<kdf>pkcs#12</kdf>
  4278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4279 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4280 			<iterations>128</iterations>
  4281 			<key>05D1E56D04BC435A60BDE06C5AFAC9E3</key>
  4282 		</derivekey>
  4283 	</actionbody>
  4284 </action>
  4285 
  4286 //! @SYMTestCaseID CIT_PREQ1054_01
  4287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4288 //! @SYMREQ CIT_PREQ1054
  4289 //! @SYMTestPriority medium
  4290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4292 <action>
  4293 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4294 	<actiontype>DeriveKey</actiontype>
  4295 	<actionbody>
  4296 		<derivekey>
  4297 			<kdf>pkcs#12</kdf>
  4298 			<passwd>0000</passwd>
  4299 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4300 			<iterations>128</iterations>
  4301 			<key>99FE149183022F9EB2EB815BCC9504E5</key>
  4302 		</derivekey>
  4303 	</actionbody>
  4304 </action>
  4305 
  4306 //! @SYMTestCaseID CIT_PREQ1054_01
  4307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4308 //! @SYMREQ CIT_PREQ1054
  4309 //! @SYMTestPriority medium
  4310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4312 <action>
  4313 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4314 	<actiontype>DeriveKey</actiontype>
  4315 	<actionbody>
  4316 		<derivekey>
  4317 			<kdf>pkcs#12</kdf>
  4318 			<passwd>0001</passwd>
  4319 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4320 			<iterations>128</iterations>
  4321 			<key>79E29F3FCB3777460EC0F43D3D7048A7</key>
  4322 		</derivekey>
  4323 	</actionbody>
  4324 </action>
  4325 
  4326 //! @SYMTestCaseID CIT_PREQ1054_01
  4327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4328 //! @SYMREQ CIT_PREQ1054
  4329 //! @SYMTestPriority medium
  4330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4332 <action>
  4333 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4334 	<actiontype>DeriveKey</actiontype>
  4335 	<actionbody>
  4336 		<derivekey>
  4337 			<kdf>pkcs#12</kdf>
  4338 			<passwd>PSWD</passwd>
  4339 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4340 			<iterations>128</iterations>
  4341 			<key>22A70A865774E55CF08A704356112522</key>
  4342 		</derivekey>
  4343 	</actionbody>
  4344 </action>
  4345 
  4346 //! @SYMTestCaseID CIT_PREQ1054_01
  4347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4348 //! @SYMREQ CIT_PREQ1054
  4349 //! @SYMTestPriority medium
  4350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4352 <action>
  4353 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4354 	<actiontype>DeriveKey</actiontype>
  4355 	<actionbody>
  4356 		<derivekey>
  4357 			<kdf>pkcs#12</kdf>
  4358 			<passwd>password</passwd>
  4359 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4360 			<iterations>128</iterations>
  4361 			<key>9CBA922190F1659F6AA3B2B98347EEC2</key>
  4362 		</derivekey>
  4363 	</actionbody>
  4364 </action>
  4365 
  4366 //! @SYMTestCaseID CIT_PREQ1054_01
  4367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4368 //! @SYMREQ CIT_PREQ1054
  4369 //! @SYMTestPriority medium
  4370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4372 <action>
  4373 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4374 	<actiontype>DeriveKey</actiontype>
  4375 	<actionbody>
  4376 		<derivekey>
  4377 			<kdf>pkcs#12</kdf>
  4378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4379 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4380 			<iterations>128</iterations>
  4381 			<key>A037A8B1C20DC883FAABF82D8A591B9E</key>
  4382 		</derivekey>
  4383 	</actionbody>
  4384 </action>
  4385 
  4386 //! @SYMTestCaseID CIT_PREQ1054_01
  4387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4388 //! @SYMREQ CIT_PREQ1054
  4389 //! @SYMTestPriority medium
  4390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4392 <action>
  4393 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4394 	<actiontype>DeriveKey</actiontype>
  4395 	<actionbody>
  4396 		<derivekey>
  4397 			<kdf>pkcs#12</kdf>
  4398 			<passwd>0000</passwd>
  4399 			<salt>53414C54</salt>
  4400 			<iterations>1024</iterations>
  4401 			<key>82824BE51C81A5FF4C4268E256F6621B</key>
  4402 		</derivekey>
  4403 	</actionbody>
  4404 </action>
  4405 
  4406 //! @SYMTestCaseID CIT_PREQ1054_01
  4407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4408 //! @SYMREQ CIT_PREQ1054
  4409 //! @SYMTestPriority medium
  4410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4412 <action>
  4413 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4414 	<actiontype>DeriveKey</actiontype>
  4415 	<actionbody>
  4416 		<derivekey>
  4417 			<kdf>pkcs#12</kdf>
  4418 			<passwd>0001</passwd>
  4419 			<salt>53414C54</salt>
  4420 			<iterations>1024</iterations>
  4421 			<key>E166049AC4E765E513AFA8A35DDBE756</key>
  4422 		</derivekey>
  4423 	</actionbody>
  4424 </action>
  4425 
  4426 //! @SYMTestCaseID CIT_PREQ1054_01
  4427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4428 //! @SYMREQ CIT_PREQ1054
  4429 //! @SYMTestPriority medium
  4430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4432 <action>
  4433 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4434 	<actiontype>DeriveKey</actiontype>
  4435 	<actionbody>
  4436 		<derivekey>
  4437 			<kdf>pkcs#12</kdf>
  4438 			<passwd>PSWD</passwd>
  4439 			<salt>53414C54</salt>
  4440 			<iterations>1024</iterations>
  4441 			<key>90E975CC54F8BDA5A6CED39088716B27</key>
  4442 		</derivekey>
  4443 	</actionbody>
  4444 </action>
  4445 
  4446 //! @SYMTestCaseID CIT_PREQ1054_01
  4447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4448 //! @SYMREQ CIT_PREQ1054
  4449 //! @SYMTestPriority medium
  4450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4452 <action>
  4453 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4454 	<actiontype>DeriveKey</actiontype>
  4455 	<actionbody>
  4456 		<derivekey>
  4457 			<kdf>pkcs#12</kdf>
  4458 			<passwd>password</passwd>
  4459 			<salt>53414C54</salt>
  4460 			<iterations>1024</iterations>
  4461 			<key>1FFD40D7BBA891A7E6C4DED39FB0740B</key>
  4462 		</derivekey>
  4463 	</actionbody>
  4464 </action>
  4465 
  4466 //! @SYMTestCaseID CIT_PREQ1054_01
  4467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4468 //! @SYMREQ CIT_PREQ1054
  4469 //! @SYMTestPriority medium
  4470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4472 <action>
  4473 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4474 	<actiontype>DeriveKey</actiontype>
  4475 	<actionbody>
  4476 		<derivekey>
  4477 			<kdf>pkcs#12</kdf>
  4478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4479 			<salt>53414C54</salt>
  4480 			<iterations>1024</iterations>
  4481 			<key>406C92305ACD663AB0B9EB66DED79295</key>
  4482 		</derivekey>
  4483 	</actionbody>
  4484 </action>
  4485 
  4486 //! @SYMTestCaseID CIT_PREQ1054_01
  4487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4488 //! @SYMREQ CIT_PREQ1054
  4489 //! @SYMTestPriority medium
  4490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4492 <action>
  4493 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4494 	<actiontype>DeriveKey</actiontype>
  4495 	<actionbody>
  4496 		<derivekey>
  4497 			<kdf>pkcs#12</kdf>
  4498 			<passwd>0000</passwd>
  4499 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4500 			<iterations>1024</iterations>
  4501 			<key>E82BD75AA9467E0B8D92362A56CB5D73</key>
  4502 		</derivekey>
  4503 	</actionbody>
  4504 </action>
  4505 
  4506 //! @SYMTestCaseID CIT_PREQ1054_01
  4507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4508 //! @SYMREQ CIT_PREQ1054
  4509 //! @SYMTestPriority medium
  4510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4512 <action>
  4513 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4514 	<actiontype>DeriveKey</actiontype>
  4515 	<actionbody>
  4516 		<derivekey>
  4517 			<kdf>pkcs#12</kdf>
  4518 			<passwd>0001</passwd>
  4519 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4520 			<iterations>1024</iterations>
  4521 			<key>0182E41FCA166CEAED10972BDF5F57A8</key>
  4522 		</derivekey>
  4523 	</actionbody>
  4524 </action>
  4525 
  4526 //! @SYMTestCaseID CIT_PREQ1054_01
  4527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4528 //! @SYMREQ CIT_PREQ1054
  4529 //! @SYMTestPriority medium
  4530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4532 <action>
  4533 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4534 	<actiontype>DeriveKey</actiontype>
  4535 	<actionbody>
  4536 		<derivekey>
  4537 			<kdf>pkcs#12</kdf>
  4538 			<passwd>PSWD</passwd>
  4539 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4540 			<iterations>1024</iterations>
  4541 			<key>101FB775982CA15E37A065F7CDC5593D</key>
  4542 		</derivekey>
  4543 	</actionbody>
  4544 </action>
  4545 
  4546 //! @SYMTestCaseID CIT_PREQ1054_01
  4547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4548 //! @SYMREQ CIT_PREQ1054
  4549 //! @SYMTestPriority medium
  4550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4552 <action>
  4553 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4554 	<actiontype>DeriveKey</actiontype>
  4555 	<actionbody>
  4556 		<derivekey>
  4557 			<kdf>pkcs#12</kdf>
  4558 			<passwd>password</passwd>
  4559 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4560 			<iterations>1024</iterations>
  4561 			<key>D7499C6A1218C419A1F81AA5E3F41E88</key>
  4562 		</derivekey>
  4563 	</actionbody>
  4564 </action>
  4565 
  4566 //! @SYMTestCaseID CIT_PREQ1054_01
  4567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4568 //! @SYMREQ CIT_PREQ1054
  4569 //! @SYMTestPriority medium
  4570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4572 <action>
  4573 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4574 	<actiontype>DeriveKey</actiontype>
  4575 	<actionbody>
  4576 		<derivekey>
  4577 			<kdf>pkcs#12</kdf>
  4578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4579 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4580 			<iterations>1024</iterations>
  4581 			<key>2C6222B8E2E97F63FFE9E2FC32D673FA</key>
  4582 		</derivekey>
  4583 	</actionbody>
  4584 </action>
  4585 
  4586 //! @SYMTestCaseID CIT_PREQ1054_01
  4587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4588 //! @SYMREQ CIT_PREQ1054
  4589 //! @SYMTestPriority medium
  4590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4592 <action>
  4593 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4594 	<actiontype>DeriveKey</actiontype>
  4595 	<actionbody>
  4596 		<derivekey>
  4597 			<kdf>pkcs#12</kdf>
  4598 			<passwd>0000</passwd>
  4599 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4600 			<iterations>1024</iterations>
  4601 			<key>6789F0680A5C5840B8ED34B061494171</key>
  4602 		</derivekey>
  4603 	</actionbody>
  4604 </action>
  4605 
  4606 //! @SYMTestCaseID CIT_PREQ1054_01
  4607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4608 //! @SYMREQ CIT_PREQ1054
  4609 //! @SYMTestPriority medium
  4610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4612 <action>
  4613 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4614 	<actiontype>DeriveKey</actiontype>
  4615 	<actionbody>
  4616 		<derivekey>
  4617 			<kdf>pkcs#12</kdf>
  4618 			<passwd>0001</passwd>
  4619 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4620 			<iterations>1024</iterations>
  4621 			<key>43E663725870C4801A917C41C9B58C41</key>
  4622 		</derivekey>
  4623 	</actionbody>
  4624 </action>
  4625 
  4626 //! @SYMTestCaseID CIT_PREQ1054_01
  4627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4628 //! @SYMREQ CIT_PREQ1054
  4629 //! @SYMTestPriority medium
  4630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4632 <action>
  4633 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4634 	<actiontype>DeriveKey</actiontype>
  4635 	<actionbody>
  4636 		<derivekey>
  4637 			<kdf>pkcs#12</kdf>
  4638 			<passwd>PSWD</passwd>
  4639 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4640 			<iterations>1024</iterations>
  4641 			<key>8B3308BDD5A8AE507200EAA16FE19D42</key>
  4642 		</derivekey>
  4643 	</actionbody>
  4644 </action>
  4645 
  4646 //! @SYMTestCaseID CIT_PREQ1054_01
  4647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4648 //! @SYMREQ CIT_PREQ1054
  4649 //! @SYMTestPriority medium
  4650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4652 <action>
  4653 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4654 	<actiontype>DeriveKey</actiontype>
  4655 	<actionbody>
  4656 		<derivekey>
  4657 			<kdf>pkcs#12</kdf>
  4658 			<passwd>password</passwd>
  4659 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4660 			<iterations>1024</iterations>
  4661 			<key>CA202602C9A265559B6B96729B574DAA</key>
  4662 		</derivekey>
  4663 	</actionbody>
  4664 </action>
  4665 
  4666 //! @SYMTestCaseID CIT_PREQ1054_01
  4667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4668 //! @SYMREQ CIT_PREQ1054
  4669 //! @SYMTestPriority medium
  4670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4672 <action>
  4673 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4674 	<actiontype>DeriveKey</actiontype>
  4675 	<actionbody>
  4676 		<derivekey>
  4677 			<kdf>pkcs#12</kdf>
  4678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4679 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4680 			<iterations>1024</iterations>
  4681 			<key>F6A33ADA6A0F5990E9DA747550DE0941</key>
  4682 		</derivekey>
  4683 	</actionbody>
  4684 </action>
  4685 
  4686 //! @SYMTestCaseID CIT_PREQ1054_01
  4687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4688 //! @SYMREQ CIT_PREQ1054
  4689 //! @SYMTestPriority medium
  4690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4692 <action>
  4693 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4694 	<actiontype>DeriveKey</actiontype>
  4695 	<actionbody>
  4696 		<derivekey>
  4697 			<kdf>pkcs#12</kdf>
  4698 			<passwd>0000</passwd>
  4699 			<salt>53414C54</salt>
  4700 			<iterations>1536</iterations>
  4701 			<key>79A4E1398F511B262E60DCFE9E838C93</key>
  4702 		</derivekey>
  4703 	</actionbody>
  4704 </action>
  4705 
  4706 //! @SYMTestCaseID CIT_PREQ1054_01
  4707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4708 //! @SYMREQ CIT_PREQ1054
  4709 //! @SYMTestPriority medium
  4710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4712 <action>
  4713 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4714 	<actiontype>DeriveKey</actiontype>
  4715 	<actionbody>
  4716 		<derivekey>
  4717 			<kdf>pkcs#12</kdf>
  4718 			<passwd>0001</passwd>
  4719 			<salt>53414C54</salt>
  4720 			<iterations>1536</iterations>
  4721 			<key>6F2402CCE4A91C1B848CCABD915657A2</key>
  4722 		</derivekey>
  4723 	</actionbody>
  4724 </action>
  4725 
  4726 //! @SYMTestCaseID CIT_PREQ1054_01
  4727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4728 //! @SYMREQ CIT_PREQ1054
  4729 //! @SYMTestPriority medium
  4730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4732 <action>
  4733 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4734 	<actiontype>DeriveKey</actiontype>
  4735 	<actionbody>
  4736 		<derivekey>
  4737 			<kdf>pkcs#12</kdf>
  4738 			<passwd>PSWD</passwd>
  4739 			<salt>53414C54</salt>
  4740 			<iterations>1536</iterations>
  4741 			<key>B9ED7B3135488439E78DF480AD845E7E</key>
  4742 		</derivekey>
  4743 	</actionbody>
  4744 </action>
  4745 
  4746 //! @SYMTestCaseID CIT_PREQ1054_01
  4747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4748 //! @SYMREQ CIT_PREQ1054
  4749 //! @SYMTestPriority medium
  4750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4752 <action>
  4753 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4754 	<actiontype>DeriveKey</actiontype>
  4755 	<actionbody>
  4756 		<derivekey>
  4757 			<kdf>pkcs#12</kdf>
  4758 			<passwd>password</passwd>
  4759 			<salt>53414C54</salt>
  4760 			<iterations>1536</iterations>
  4761 			<key>65B27A78C72DFEEA6C92846330CE98C6</key>
  4762 		</derivekey>
  4763 	</actionbody>
  4764 </action>
  4765 
  4766 //! @SYMTestCaseID CIT_PREQ1054_01
  4767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4768 //! @SYMREQ CIT_PREQ1054
  4769 //! @SYMTestPriority medium
  4770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4772 <action>
  4773 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4774 	<actiontype>DeriveKey</actiontype>
  4775 	<actionbody>
  4776 		<derivekey>
  4777 			<kdf>pkcs#12</kdf>
  4778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4779 			<salt>53414C54</salt>
  4780 			<iterations>1536</iterations>
  4781 			<key>8F8FC96A3D958731780B50E843D6BB65</key>
  4782 		</derivekey>
  4783 	</actionbody>
  4784 </action>
  4785 
  4786 //! @SYMTestCaseID CIT_PREQ1054_01
  4787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4788 //! @SYMREQ CIT_PREQ1054
  4789 //! @SYMTestPriority medium
  4790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4792 <action>
  4793 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4794 	<actiontype>DeriveKey</actiontype>
  4795 	<actionbody>
  4796 		<derivekey>
  4797 			<kdf>pkcs#12</kdf>
  4798 			<passwd>0000</passwd>
  4799 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4800 			<iterations>1536</iterations>
  4801 			<key>642DDC3F4E11C3051D6CDED8DD898C4C</key>
  4802 		</derivekey>
  4803 	</actionbody>
  4804 </action>
  4805 
  4806 //! @SYMTestCaseID CIT_PREQ1054_01
  4807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4808 //! @SYMREQ CIT_PREQ1054
  4809 //! @SYMTestPriority medium
  4810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4812 <action>
  4813 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4814 	<actiontype>DeriveKey</actiontype>
  4815 	<actionbody>
  4816 		<derivekey>
  4817 			<kdf>pkcs#12</kdf>
  4818 			<passwd>0001</passwd>
  4819 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4820 			<iterations>1536</iterations>
  4821 			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F1</key>
  4822 		</derivekey>
  4823 	</actionbody>
  4824 </action>
  4825 
  4826 //! @SYMTestCaseID CIT_PREQ1054_01
  4827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4828 //! @SYMREQ CIT_PREQ1054
  4829 //! @SYMTestPriority medium
  4830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4832 <action>
  4833 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4834 	<actiontype>DeriveKey</actiontype>
  4835 	<actionbody>
  4836 		<derivekey>
  4837 			<kdf>pkcs#12</kdf>
  4838 			<passwd>PSWD</passwd>
  4839 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4840 			<iterations>1536</iterations>
  4841 			<key>32D7F10C5EAA9961B590E8FE4561B9D5</key>
  4842 		</derivekey>
  4843 	</actionbody>
  4844 </action>
  4845 
  4846 //! @SYMTestCaseID CIT_PREQ1054_01
  4847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4848 //! @SYMREQ CIT_PREQ1054
  4849 //! @SYMTestPriority medium
  4850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4852 <action>
  4853 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4854 	<actiontype>DeriveKey</actiontype>
  4855 	<actionbody>
  4856 		<derivekey>
  4857 			<kdf>pkcs#12</kdf>
  4858 			<passwd>password</passwd>
  4859 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4860 			<iterations>1536</iterations>
  4861 			<key>C05FE26245C742CC01B23C655E5D934D</key>
  4862 		</derivekey>
  4863 	</actionbody>
  4864 </action>
  4865 
  4866 //! @SYMTestCaseID CIT_PREQ1054_01
  4867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4868 //! @SYMREQ CIT_PREQ1054
  4869 //! @SYMTestPriority medium
  4870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4872 <action>
  4873 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  4874 	<actiontype>DeriveKey</actiontype>
  4875 	<actionbody>
  4876 		<derivekey>
  4877 			<kdf>pkcs#12</kdf>
  4878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4879 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  4880 			<iterations>1536</iterations>
  4881 			<key>818C967A8F742565CCA37CEA8C683FCC</key>
  4882 		</derivekey>
  4883 	</actionbody>
  4884 </action>
  4885 
  4886 //! @SYMTestCaseID CIT_PREQ1054_01
  4887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4888 //! @SYMREQ CIT_PREQ1054
  4889 //! @SYMTestPriority medium
  4890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4892 <action>
  4893 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4894 	<actiontype>DeriveKey</actiontype>
  4895 	<actionbody>
  4896 		<derivekey>
  4897 			<kdf>pkcs#12</kdf>
  4898 			<passwd>0000</passwd>
  4899 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4900 			<iterations>1536</iterations>
  4901 			<key>5301B5B2A1A6EB6832DC47F3A0850B56</key>
  4902 		</derivekey>
  4903 	</actionbody>
  4904 </action>
  4905 
  4906 //! @SYMTestCaseID CIT_PREQ1054_01
  4907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4908 //! @SYMREQ CIT_PREQ1054
  4909 //! @SYMTestPriority medium
  4910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4912 <action>
  4913 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4914 	<actiontype>DeriveKey</actiontype>
  4915 	<actionbody>
  4916 		<derivekey>
  4917 			<kdf>pkcs#12</kdf>
  4918 			<passwd>0001</passwd>
  4919 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4920 			<iterations>1536</iterations>
  4921 			<key>9CB5BD2394B268E13DCA91EE2BB0A39C</key>
  4922 		</derivekey>
  4923 	</actionbody>
  4924 </action>
  4925 
  4926 //! @SYMTestCaseID CIT_PREQ1054_01
  4927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4928 //! @SYMREQ CIT_PREQ1054
  4929 //! @SYMTestPriority medium
  4930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4932 <action>
  4933 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4934 	<actiontype>DeriveKey</actiontype>
  4935 	<actionbody>
  4936 		<derivekey>
  4937 			<kdf>pkcs#12</kdf>
  4938 			<passwd>PSWD</passwd>
  4939 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4940 			<iterations>1536</iterations>
  4941 			<key>EB90D956B358B7C5E9FC4A4EFA02589B</key>
  4942 		</derivekey>
  4943 	</actionbody>
  4944 </action>
  4945 
  4946 //! @SYMTestCaseID CIT_PREQ1054_01
  4947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4948 //! @SYMREQ CIT_PREQ1054
  4949 //! @SYMTestPriority medium
  4950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4952 <action>
  4953 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4954 	<actiontype>DeriveKey</actiontype>
  4955 	<actionbody>
  4956 		<derivekey>
  4957 			<kdf>pkcs#12</kdf>
  4958 			<passwd>password</passwd>
  4959 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4960 			<iterations>1536</iterations>
  4961 			<key>ACAFB5EB24FFB3B418587B832F52C226</key>
  4962 		</derivekey>
  4963 	</actionbody>
  4964 </action>
  4965 
  4966 //! @SYMTestCaseID CIT_PREQ1054_01
  4967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4968 //! @SYMREQ CIT_PREQ1054
  4969 //! @SYMTestPriority medium
  4970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4972 <action>
  4973 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  4974 	<actiontype>DeriveKey</actiontype>
  4975 	<actionbody>
  4976 		<derivekey>
  4977 			<kdf>pkcs#12</kdf>
  4978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  4979 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  4980 			<iterations>1536</iterations>
  4981 			<key>A7B0859D9D1BF5E59047192BF2B8C7AC</key>
  4982 		</derivekey>
  4983 	</actionbody>
  4984 </action>
  4985 
  4986 //! @SYMTestCaseID CIT_PREQ1054_01
  4987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  4988 //! @SYMREQ CIT_PREQ1054
  4989 //! @SYMTestPriority medium
  4990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  4991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  4992 <action>
  4993 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  4994 	<actiontype>DeriveKey</actiontype>
  4995 	<actionbody>
  4996 		<derivekey>
  4997 			<kdf>pkcs#12</kdf>
  4998 			<passwd>0000</passwd>
  4999 			<salt>53414C54</salt>
  5000 			<iterations>2048</iterations>
  5001 			<key>B0F0F2EB445AB4DBE901D3C248482259</key>
  5002 		</derivekey>
  5003 	</actionbody>
  5004 </action>
  5005 
  5006 //! @SYMTestCaseID CIT_PREQ1054_01
  5007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5008 //! @SYMREQ CIT_PREQ1054
  5009 //! @SYMTestPriority medium
  5010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5012 <action>
  5013 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  5014 	<actiontype>DeriveKey</actiontype>
  5015 	<actionbody>
  5016 		<derivekey>
  5017 			<kdf>pkcs#12</kdf>
  5018 			<passwd>0001</passwd>
  5019 			<salt>53414C54</salt>
  5020 			<iterations>2048</iterations>
  5021 			<key>C11C0499CC9EC9FBB6ACA7BF4C0B5389</key>
  5022 		</derivekey>
  5023 	</actionbody>
  5024 </action>
  5025 
  5026 //! @SYMTestCaseID CIT_PREQ1054_01
  5027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5028 //! @SYMREQ CIT_PREQ1054
  5029 //! @SYMTestPriority medium
  5030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5032 <action>
  5033 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  5034 	<actiontype>DeriveKey</actiontype>
  5035 	<actionbody>
  5036 		<derivekey>
  5037 			<kdf>pkcs#12</kdf>
  5038 			<passwd>PSWD</passwd>
  5039 			<salt>53414C54</salt>
  5040 			<iterations>2048</iterations>
  5041 			<key>3F63500AC41074B4D2C1A991CBBBB013</key>
  5042 		</derivekey>
  5043 	</actionbody>
  5044 </action>
  5045 
  5046 //! @SYMTestCaseID CIT_PREQ1054_01
  5047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5048 //! @SYMREQ CIT_PREQ1054
  5049 //! @SYMTestPriority medium
  5050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5052 <action>
  5053 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  5054 	<actiontype>DeriveKey</actiontype>
  5055 	<actionbody>
  5056 		<derivekey>
  5057 			<kdf>pkcs#12</kdf>
  5058 			<passwd>password</passwd>
  5059 			<salt>53414C54</salt>
  5060 			<iterations>2048</iterations>
  5061 			<key>B47F802F1238A73054DEFD7D3AABFC81</key>
  5062 		</derivekey>
  5063 	</actionbody>
  5064 </action>
  5065 
  5066 //! @SYMTestCaseID CIT_PREQ1054_01
  5067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5068 //! @SYMREQ CIT_PREQ1054
  5069 //! @SYMTestPriority medium
  5070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5072 <action>
  5073 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
  5074 	<actiontype>DeriveKey</actiontype>
  5075 	<actionbody>
  5076 		<derivekey>
  5077 			<kdf>pkcs#12</kdf>
  5078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5079 			<salt>53414C54</salt>
  5080 			<iterations>2048</iterations>
  5081 			<key>3099237692953AB2017A1BF0B12DAFC8</key>
  5082 		</derivekey>
  5083 	</actionbody>
  5084 </action>
  5085 
  5086 //! @SYMTestCaseID CIT_PREQ1054_01
  5087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5088 //! @SYMREQ CIT_PREQ1054
  5089 //! @SYMTestPriority medium
  5090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5092 <action>
  5093 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  5094 	<actiontype>DeriveKey</actiontype>
  5095 	<actionbody>
  5096 		<derivekey>
  5097 			<kdf>pkcs#12</kdf>
  5098 			<passwd>0000</passwd>
  5099 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5100 			<iterations>2048</iterations>
  5101 			<key>CD045229461658BC6C47C259F2D20433</key>
  5102 		</derivekey>
  5103 	</actionbody>
  5104 </action>
  5105 
  5106 //! @SYMTestCaseID CIT_PREQ1054_01
  5107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5108 //! @SYMREQ CIT_PREQ1054
  5109 //! @SYMTestPriority medium
  5110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5112 <action>
  5113 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  5114 	<actiontype>DeriveKey</actiontype>
  5115 	<actionbody>
  5116 		<derivekey>
  5117 			<kdf>pkcs#12</kdf>
  5118 			<passwd>0001</passwd>
  5119 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5120 			<iterations>2048</iterations>
  5121 			<key>D85432F8ACAE9653D34A68D9329F347A</key>
  5122 		</derivekey>
  5123 	</actionbody>
  5124 </action>
  5125 
  5126 //! @SYMTestCaseID CIT_PREQ1054_01
  5127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5128 //! @SYMREQ CIT_PREQ1054
  5129 //! @SYMTestPriority medium
  5130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5132 <action>
  5133 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  5134 	<actiontype>DeriveKey</actiontype>
  5135 	<actionbody>
  5136 		<derivekey>
  5137 			<kdf>pkcs#12</kdf>
  5138 			<passwd>PSWD</passwd>
  5139 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5140 			<iterations>2048</iterations>
  5141 			<key>C77FDE2E52892DF5613E6A3B8F1C80B9</key>
  5142 		</derivekey>
  5143 	</actionbody>
  5144 </action>
  5145 
  5146 //! @SYMTestCaseID CIT_PREQ1054_01
  5147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5148 //! @SYMREQ CIT_PREQ1054
  5149 //! @SYMTestPriority medium
  5150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5152 <action>
  5153 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  5154 	<actiontype>DeriveKey</actiontype>
  5155 	<actionbody>
  5156 		<derivekey>
  5157 			<kdf>pkcs#12</kdf>
  5158 			<passwd>password</passwd>
  5159 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5160 			<iterations>2048</iterations>
  5161 			<key>62E06B8A2650199AE6E73AB3F503BF02</key>
  5162 		</derivekey>
  5163 	</actionbody>
  5164 </action>
  5165 
  5166 //! @SYMTestCaseID CIT_PREQ1054_01
  5167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5168 //! @SYMREQ CIT_PREQ1054
  5169 //! @SYMTestPriority medium
  5170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5172 <action>
  5173 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
  5174 	<actiontype>DeriveKey</actiontype>
  5175 	<actionbody>
  5176 		<derivekey>
  5177 			<kdf>pkcs#12</kdf>
  5178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5179 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5180 			<iterations>2048</iterations>
  5181 			<key>A5B348EB4926290B223724CC8E4ED67F</key>
  5182 		</derivekey>
  5183 	</actionbody>
  5184 </action>
  5185 
  5186 //! @SYMTestCaseID CIT_PREQ1054_01
  5187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5188 //! @SYMREQ CIT_PREQ1054
  5189 //! @SYMTestPriority medium
  5190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5192 <action>
  5193 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  5194 	<actiontype>DeriveKey</actiontype>
  5195 	<actionbody>
  5196 		<derivekey>
  5197 			<kdf>pkcs#12</kdf>
  5198 			<passwd>0000</passwd>
  5199 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5200 			<iterations>2048</iterations>
  5201 			<key>2A824C1B6B36AD48D0A5AE94E27988D4</key>
  5202 		</derivekey>
  5203 	</actionbody>
  5204 </action>
  5205 
  5206 //! @SYMTestCaseID CIT_PREQ1054_01
  5207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5208 //! @SYMREQ CIT_PREQ1054
  5209 //! @SYMTestPriority medium
  5210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5212 <action>
  5213 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  5214 	<actiontype>DeriveKey</actiontype>
  5215 	<actionbody>
  5216 		<derivekey>
  5217 			<kdf>pkcs#12</kdf>
  5218 			<passwd>0001</passwd>
  5219 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5220 			<iterations>2048</iterations>
  5221 			<key>4B8D18B96EB898D1BAA8BDD82BC443F0</key>
  5222 		</derivekey>
  5223 	</actionbody>
  5224 </action>
  5225 
  5226 //! @SYMTestCaseID CIT_PREQ1054_01
  5227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5228 //! @SYMREQ CIT_PREQ1054
  5229 //! @SYMTestPriority medium
  5230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5232 <action>
  5233 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  5234 	<actiontype>DeriveKey</actiontype>
  5235 	<actionbody>
  5236 		<derivekey>
  5237 			<kdf>pkcs#12</kdf>
  5238 			<passwd>PSWD</passwd>
  5239 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5240 			<iterations>2048</iterations>
  5241 			<key>9DABF586AD2BCD603DC38C3987C98D73</key>
  5242 		</derivekey>
  5243 	</actionbody>
  5244 </action>
  5245 
  5246 //! @SYMTestCaseID CIT_PREQ1054_01
  5247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5248 //! @SYMREQ CIT_PREQ1054
  5249 //! @SYMTestPriority medium
  5250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5252 <action>
  5253 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  5254 	<actiontype>DeriveKey</actiontype>
  5255 	<actionbody>
  5256 		<derivekey>
  5257 			<kdf>pkcs#12</kdf>
  5258 			<passwd>password</passwd>
  5259 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5260 			<iterations>2048</iterations>
  5261 			<key>F734BE1BF990A3A59CEA6C821492F0B6</key>
  5262 		</derivekey>
  5263 	</actionbody>
  5264 </action>
  5265 
  5266 //! @SYMTestCaseID CIT_PREQ1054_01
  5267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5268 //! @SYMREQ CIT_PREQ1054
  5269 //! @SYMTestPriority medium
  5270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5272 <action>
  5273 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
  5274 	<actiontype>DeriveKey</actiontype>
  5275 	<actionbody>
  5276 		<derivekey>
  5277 			<kdf>pkcs#12</kdf>
  5278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5279 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5280 			<iterations>2048</iterations>
  5281 			<key>47C18634A09AB37AB6EECBCD5C7E7F23</key>
  5282 		</derivekey>
  5283 	</actionbody>
  5284 </action>
  5285 
  5286 //! @SYMTestCaseID CIT_PREQ1054_01
  5287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5288 //! @SYMREQ CIT_PREQ1054
  5289 //! @SYMTestPriority medium
  5290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5292 <action>
  5293 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5294 	<actiontype>DeriveKey</actiontype>
  5295 	<actionbody>
  5296 		<derivekey>
  5297 			<kdf>pkcs#12</kdf>
  5298 			<passwd>0000</passwd>
  5299 			<salt>53414C54</salt>
  5300 			<iterations>1</iterations>
  5301 			<key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7</key>
  5302 		</derivekey>
  5303 	</actionbody>
  5304 </action>
  5305 
  5306 //! @SYMTestCaseID CIT_PREQ1054_01
  5307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5308 //! @SYMREQ CIT_PREQ1054
  5309 //! @SYMTestPriority medium
  5310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5312 <action>
  5313 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5314 	<actiontype>DeriveKey</actiontype>
  5315 	<actionbody>
  5316 		<derivekey>
  5317 			<kdf>pkcs#12</kdf>
  5318 			<passwd>0001</passwd>
  5319 			<salt>53414C54</salt>
  5320 			<iterations>1</iterations>
  5321 			<key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B</key>
  5322 		</derivekey>
  5323 	</actionbody>
  5324 </action>
  5325 
  5326 //! @SYMTestCaseID CIT_PREQ1054_01
  5327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5328 //! @SYMREQ CIT_PREQ1054
  5329 //! @SYMTestPriority medium
  5330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5332 <action>
  5333 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5334 	<actiontype>DeriveKey</actiontype>
  5335 	<actionbody>
  5336 		<derivekey>
  5337 			<kdf>pkcs#12</kdf>
  5338 			<passwd>PSWD</passwd>
  5339 			<salt>53414C54</salt>
  5340 			<iterations>1</iterations>
  5341 			<key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB09599</key>
  5342 		</derivekey>
  5343 	</actionbody>
  5344 </action>
  5345 
  5346 //! @SYMTestCaseID CIT_PREQ1054_01
  5347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5348 //! @SYMREQ CIT_PREQ1054
  5349 //! @SYMTestPriority medium
  5350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5352 <action>
  5353 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5354 	<actiontype>DeriveKey</actiontype>
  5355 	<actionbody>
  5356 		<derivekey>
  5357 			<kdf>pkcs#12</kdf>
  5358 			<passwd>password</passwd>
  5359 			<salt>53414C54</salt>
  5360 			<iterations>1</iterations>
  5361 			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C5</key>
  5362 		</derivekey>
  5363 	</actionbody>
  5364 </action>
  5365 
  5366 //! @SYMTestCaseID CIT_PREQ1054_01
  5367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5368 //! @SYMREQ CIT_PREQ1054
  5369 //! @SYMTestPriority medium
  5370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5372 <action>
  5373 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5374 	<actiontype>DeriveKey</actiontype>
  5375 	<actionbody>
  5376 		<derivekey>
  5377 			<kdf>pkcs#12</kdf>
  5378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5379 			<salt>53414C54</salt>
  5380 			<iterations>1</iterations>
  5381 			<key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A</key>
  5382 		</derivekey>
  5383 	</actionbody>
  5384 </action>
  5385 
  5386 //! @SYMTestCaseID CIT_PREQ1054_01
  5387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5388 //! @SYMREQ CIT_PREQ1054
  5389 //! @SYMTestPriority medium
  5390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5392 <action>
  5393 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5394 	<actiontype>DeriveKey</actiontype>
  5395 	<actionbody>
  5396 		<derivekey>
  5397 			<kdf>pkcs#12</kdf>
  5398 			<passwd>0000</passwd>
  5399 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5400 			<iterations>1</iterations>
  5401 			<key>49CABE7B67736931126499722509C03D4BBEF714A8</key>
  5402 		</derivekey>
  5403 	</actionbody>
  5404 </action>
  5405 
  5406 //! @SYMTestCaseID CIT_PREQ1054_01
  5407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5408 //! @SYMREQ CIT_PREQ1054
  5409 //! @SYMTestPriority medium
  5410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5412 <action>
  5413 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5414 	<actiontype>DeriveKey</actiontype>
  5415 	<actionbody>
  5416 		<derivekey>
  5417 			<kdf>pkcs#12</kdf>
  5418 			<passwd>0001</passwd>
  5419 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5420 			<iterations>1</iterations>
  5421 			<key>F994B990D3554AFB778C729E9BAA0CC6EB5BA76534</key>
  5422 		</derivekey>
  5423 	</actionbody>
  5424 </action>
  5425 
  5426 //! @SYMTestCaseID CIT_PREQ1054_01
  5427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5428 //! @SYMREQ CIT_PREQ1054
  5429 //! @SYMTestPriority medium
  5430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5432 <action>
  5433 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5434 	<actiontype>DeriveKey</actiontype>
  5435 	<actionbody>
  5436 		<derivekey>
  5437 			<kdf>pkcs#12</kdf>
  5438 			<passwd>PSWD</passwd>
  5439 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5440 			<iterations>1</iterations>
  5441 			<key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC024</key>
  5442 		</derivekey>
  5443 	</actionbody>
  5444 </action>
  5445 
  5446 //! @SYMTestCaseID CIT_PREQ1054_01
  5447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5448 //! @SYMREQ CIT_PREQ1054
  5449 //! @SYMTestPriority medium
  5450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5452 <action>
  5453 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5454 	<actiontype>DeriveKey</actiontype>
  5455 	<actionbody>
  5456 		<derivekey>
  5457 			<kdf>pkcs#12</kdf>
  5458 			<passwd>password</passwd>
  5459 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5460 			<iterations>1</iterations>
  5461 			<key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888</key>
  5462 		</derivekey>
  5463 	</actionbody>
  5464 </action>
  5465 
  5466 //! @SYMTestCaseID CIT_PREQ1054_01
  5467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5468 //! @SYMREQ CIT_PREQ1054
  5469 //! @SYMTestPriority medium
  5470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5472 <action>
  5473 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5474 	<actiontype>DeriveKey</actiontype>
  5475 	<actionbody>
  5476 		<derivekey>
  5477 			<kdf>pkcs#12</kdf>
  5478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5479 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5480 			<iterations>1</iterations>
  5481 			<key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B</key>
  5482 		</derivekey>
  5483 	</actionbody>
  5484 </action>
  5485 
  5486 //! @SYMTestCaseID CIT_PREQ1054_01
  5487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5488 //! @SYMREQ CIT_PREQ1054
  5489 //! @SYMTestPriority medium
  5490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5492 <action>
  5493 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5494 	<actiontype>DeriveKey</actiontype>
  5495 	<actionbody>
  5496 		<derivekey>
  5497 			<kdf>pkcs#12</kdf>
  5498 			<passwd>0000</passwd>
  5499 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5500 			<iterations>1</iterations>
  5501 			<key>90253A49C069E7FF35281461A4DDBE0BB38F4041A0</key>
  5502 		</derivekey>
  5503 	</actionbody>
  5504 </action>
  5505 
  5506 //! @SYMTestCaseID CIT_PREQ1054_01
  5507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5508 //! @SYMREQ CIT_PREQ1054
  5509 //! @SYMTestPriority medium
  5510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5512 <action>
  5513 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5514 	<actiontype>DeriveKey</actiontype>
  5515 	<actionbody>
  5516 		<derivekey>
  5517 			<kdf>pkcs#12</kdf>
  5518 			<passwd>0001</passwd>
  5519 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5520 			<iterations>1</iterations>
  5521 			<key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8</key>
  5522 		</derivekey>
  5523 	</actionbody>
  5524 </action>
  5525 
  5526 //! @SYMTestCaseID CIT_PREQ1054_01
  5527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5528 //! @SYMREQ CIT_PREQ1054
  5529 //! @SYMTestPriority medium
  5530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5532 <action>
  5533 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5534 	<actiontype>DeriveKey</actiontype>
  5535 	<actionbody>
  5536 		<derivekey>
  5537 			<kdf>pkcs#12</kdf>
  5538 			<passwd>PSWD</passwd>
  5539 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5540 			<iterations>1</iterations>
  5541 			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC8</key>
  5542 		</derivekey>
  5543 	</actionbody>
  5544 </action>
  5545 
  5546 //! @SYMTestCaseID CIT_PREQ1054_01
  5547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5548 //! @SYMREQ CIT_PREQ1054
  5549 //! @SYMTestPriority medium
  5550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5552 <action>
  5553 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5554 	<actiontype>DeriveKey</actiontype>
  5555 	<actionbody>
  5556 		<derivekey>
  5557 			<kdf>pkcs#12</kdf>
  5558 			<passwd>password</passwd>
  5559 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5560 			<iterations>1</iterations>
  5561 			<key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C1</key>
  5562 		</derivekey>
  5563 	</actionbody>
  5564 </action>
  5565 
  5566 //! @SYMTestCaseID CIT_PREQ1054_01
  5567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5568 //! @SYMREQ CIT_PREQ1054
  5569 //! @SYMTestPriority medium
  5570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5572 <action>
  5573 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5574 	<actiontype>DeriveKey</actiontype>
  5575 	<actionbody>
  5576 		<derivekey>
  5577 			<kdf>pkcs#12</kdf>
  5578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5579 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5580 			<iterations>1</iterations>
  5581 			<key>27476572AF26E99AB85CD350DC802ABA3A831332A7</key>
  5582 		</derivekey>
  5583 	</actionbody>
  5584 </action>
  5585 
  5586 //! @SYMTestCaseID CIT_PREQ1054_01
  5587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5588 //! @SYMREQ CIT_PREQ1054
  5589 //! @SYMTestPriority medium
  5590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5592 <action>
  5593 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5594 	<actiontype>DeriveKey</actiontype>
  5595 	<actionbody>
  5596 		<derivekey>
  5597 			<kdf>pkcs#12</kdf>
  5598 			<passwd>0000</passwd>
  5599 			<salt>53414C54</salt>
  5600 			<iterations>2</iterations>
  5601 			<key>A1D9010A6761CB2675F1C33BB3C5215851703D0D26</key>
  5602 		</derivekey>
  5603 	</actionbody>
  5604 </action>
  5605 
  5606 //! @SYMTestCaseID CIT_PREQ1054_01
  5607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5608 //! @SYMREQ CIT_PREQ1054
  5609 //! @SYMTestPriority medium
  5610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5612 <action>
  5613 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5614 	<actiontype>DeriveKey</actiontype>
  5615 	<actionbody>
  5616 		<derivekey>
  5617 			<kdf>pkcs#12</kdf>
  5618 			<passwd>0001</passwd>
  5619 			<salt>53414C54</salt>
  5620 			<iterations>2</iterations>
  5621 			<key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47</key>
  5622 		</derivekey>
  5623 	</actionbody>
  5624 </action>
  5625 
  5626 //! @SYMTestCaseID CIT_PREQ1054_01
  5627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5628 //! @SYMREQ CIT_PREQ1054
  5629 //! @SYMTestPriority medium
  5630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5632 <action>
  5633 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5634 	<actiontype>DeriveKey</actiontype>
  5635 	<actionbody>
  5636 		<derivekey>
  5637 			<kdf>pkcs#12</kdf>
  5638 			<passwd>PSWD</passwd>
  5639 			<salt>53414C54</salt>
  5640 			<iterations>2</iterations>
  5641 			<key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE3</key>
  5642 		</derivekey>
  5643 	</actionbody>
  5644 </action>
  5645 
  5646 //! @SYMTestCaseID CIT_PREQ1054_01
  5647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5648 //! @SYMREQ CIT_PREQ1054
  5649 //! @SYMTestPriority medium
  5650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5652 <action>
  5653 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5654 	<actiontype>DeriveKey</actiontype>
  5655 	<actionbody>
  5656 		<derivekey>
  5657 			<kdf>pkcs#12</kdf>
  5658 			<passwd>password</passwd>
  5659 			<salt>53414C54</salt>
  5660 			<iterations>2</iterations>
  5661 			<key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A</key>
  5662 		</derivekey>
  5663 	</actionbody>
  5664 </action>
  5665 
  5666 //! @SYMTestCaseID CIT_PREQ1054_01
  5667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5668 //! @SYMREQ CIT_PREQ1054
  5669 //! @SYMTestPriority medium
  5670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5672 <action>
  5673 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5674 	<actiontype>DeriveKey</actiontype>
  5675 	<actionbody>
  5676 		<derivekey>
  5677 			<kdf>pkcs#12</kdf>
  5678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5679 			<salt>53414C54</salt>
  5680 			<iterations>2</iterations>
  5681 			<key>5BF185C726EE2182888A834066C30BA92C0A6A140F</key>
  5682 		</derivekey>
  5683 	</actionbody>
  5684 </action>
  5685 
  5686 //! @SYMTestCaseID CIT_PREQ1054_01
  5687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5688 //! @SYMREQ CIT_PREQ1054
  5689 //! @SYMTestPriority medium
  5690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5692 <action>
  5693 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5694 	<actiontype>DeriveKey</actiontype>
  5695 	<actionbody>
  5696 		<derivekey>
  5697 			<kdf>pkcs#12</kdf>
  5698 			<passwd>0000</passwd>
  5699 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5700 			<iterations>2</iterations>
  5701 			<key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734</key>
  5702 		</derivekey>
  5703 	</actionbody>
  5704 </action>
  5705 
  5706 //! @SYMTestCaseID CIT_PREQ1054_01
  5707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5708 //! @SYMREQ CIT_PREQ1054
  5709 //! @SYMTestPriority medium
  5710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5712 <action>
  5713 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5714 	<actiontype>DeriveKey</actiontype>
  5715 	<actionbody>
  5716 		<derivekey>
  5717 			<kdf>pkcs#12</kdf>
  5718 			<passwd>0001</passwd>
  5719 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5720 			<iterations>2</iterations>
  5721 			<key>63E6DF459C899D72577C20FFE4F27670F3A85EA780</key>
  5722 		</derivekey>
  5723 	</actionbody>
  5724 </action>
  5725 
  5726 //! @SYMTestCaseID CIT_PREQ1054_01
  5727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5728 //! @SYMREQ CIT_PREQ1054
  5729 //! @SYMTestPriority medium
  5730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5732 <action>
  5733 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5734 	<actiontype>DeriveKey</actiontype>
  5735 	<actionbody>
  5736 		<derivekey>
  5737 			<kdf>pkcs#12</kdf>
  5738 			<passwd>PSWD</passwd>
  5739 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5740 			<iterations>2</iterations>
  5741 			<key>C2099204ABFBB841875BD7595A89D31A9D03A34B94</key>
  5742 		</derivekey>
  5743 	</actionbody>
  5744 </action>
  5745 
  5746 //! @SYMTestCaseID CIT_PREQ1054_01
  5747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5748 //! @SYMREQ CIT_PREQ1054
  5749 //! @SYMTestPriority medium
  5750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5752 <action>
  5753 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5754 	<actiontype>DeriveKey</actiontype>
  5755 	<actionbody>
  5756 		<derivekey>
  5757 			<kdf>pkcs#12</kdf>
  5758 			<passwd>password</passwd>
  5759 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5760 			<iterations>2</iterations>
  5761 			<key>3204D28A32DF299B612958906C79154AED69D3F1C0</key>
  5762 		</derivekey>
  5763 	</actionbody>
  5764 </action>
  5765 
  5766 //! @SYMTestCaseID CIT_PREQ1054_01
  5767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5768 //! @SYMREQ CIT_PREQ1054
  5769 //! @SYMTestPriority medium
  5770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5772 <action>
  5773 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5774 	<actiontype>DeriveKey</actiontype>
  5775 	<actionbody>
  5776 		<derivekey>
  5777 			<kdf>pkcs#12</kdf>
  5778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5779 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  5780 			<iterations>2</iterations>
  5781 			<key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04</key>
  5782 		</derivekey>
  5783 	</actionbody>
  5784 </action>
  5785 
  5786 //! @SYMTestCaseID CIT_PREQ1054_01
  5787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5788 //! @SYMREQ CIT_PREQ1054
  5789 //! @SYMTestPriority medium
  5790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5792 <action>
  5793 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5794 	<actiontype>DeriveKey</actiontype>
  5795 	<actionbody>
  5796 		<derivekey>
  5797 			<kdf>pkcs#12</kdf>
  5798 			<passwd>0000</passwd>
  5799 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5800 			<iterations>2</iterations>
  5801 			<key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11</key>
  5802 		</derivekey>
  5803 	</actionbody>
  5804 </action>
  5805 
  5806 //! @SYMTestCaseID CIT_PREQ1054_01
  5807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5808 //! @SYMREQ CIT_PREQ1054
  5809 //! @SYMTestPriority medium
  5810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5812 <action>
  5813 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5814 	<actiontype>DeriveKey</actiontype>
  5815 	<actionbody>
  5816 		<derivekey>
  5817 			<kdf>pkcs#12</kdf>
  5818 			<passwd>0001</passwd>
  5819 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5820 			<iterations>2</iterations>
  5821 			<key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC</key>
  5822 		</derivekey>
  5823 	</actionbody>
  5824 </action>
  5825 
  5826 //! @SYMTestCaseID CIT_PREQ1054_01
  5827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5828 //! @SYMREQ CIT_PREQ1054
  5829 //! @SYMTestPriority medium
  5830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5832 <action>
  5833 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5834 	<actiontype>DeriveKey</actiontype>
  5835 	<actionbody>
  5836 		<derivekey>
  5837 			<kdf>pkcs#12</kdf>
  5838 			<passwd>PSWD</passwd>
  5839 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5840 			<iterations>2</iterations>
  5841 			<key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F</key>
  5842 		</derivekey>
  5843 	</actionbody>
  5844 </action>
  5845 
  5846 //! @SYMTestCaseID CIT_PREQ1054_01
  5847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5848 //! @SYMREQ CIT_PREQ1054
  5849 //! @SYMTestPriority medium
  5850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5852 <action>
  5853 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5854 	<actiontype>DeriveKey</actiontype>
  5855 	<actionbody>
  5856 		<derivekey>
  5857 			<kdf>pkcs#12</kdf>
  5858 			<passwd>password</passwd>
  5859 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5860 			<iterations>2</iterations>
  5861 			<key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDF</key>
  5862 		</derivekey>
  5863 	</actionbody>
  5864 </action>
  5865 
  5866 //! @SYMTestCaseID CIT_PREQ1054_01
  5867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5868 //! @SYMREQ CIT_PREQ1054
  5869 //! @SYMTestPriority medium
  5870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5872 <action>
  5873 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  5874 	<actiontype>DeriveKey</actiontype>
  5875 	<actionbody>
  5876 		<derivekey>
  5877 			<kdf>pkcs#12</kdf>
  5878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5879 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  5880 			<iterations>2</iterations>
  5881 			<key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647</key>
  5882 		</derivekey>
  5883 	</actionbody>
  5884 </action>
  5885 
  5886 //! @SYMTestCaseID CIT_PREQ1054_01
  5887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5888 //! @SYMREQ CIT_PREQ1054
  5889 //! @SYMTestPriority medium
  5890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5892 <action>
  5893 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5894 	<actiontype>DeriveKey</actiontype>
  5895 	<actionbody>
  5896 		<derivekey>
  5897 			<kdf>pkcs#12</kdf>
  5898 			<passwd>0000</passwd>
  5899 			<salt>53414C54</salt>
  5900 			<iterations>4</iterations>
  5901 			<key>D0158BFC57E643965DC161741725CE9478CDF2A0B5</key>
  5902 		</derivekey>
  5903 	</actionbody>
  5904 </action>
  5905 
  5906 //! @SYMTestCaseID CIT_PREQ1054_01
  5907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5908 //! @SYMREQ CIT_PREQ1054
  5909 //! @SYMTestPriority medium
  5910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5912 <action>
  5913 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5914 	<actiontype>DeriveKey</actiontype>
  5915 	<actionbody>
  5916 		<derivekey>
  5917 			<kdf>pkcs#12</kdf>
  5918 			<passwd>0001</passwd>
  5919 			<salt>53414C54</salt>
  5920 			<iterations>4</iterations>
  5921 			<key>AEB6CD53F0D6830161100C4BFD439B341066339A00</key>
  5922 		</derivekey>
  5923 	</actionbody>
  5924 </action>
  5925 
  5926 //! @SYMTestCaseID CIT_PREQ1054_01
  5927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5928 //! @SYMREQ CIT_PREQ1054
  5929 //! @SYMTestPriority medium
  5930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5932 <action>
  5933 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5934 	<actiontype>DeriveKey</actiontype>
  5935 	<actionbody>
  5936 		<derivekey>
  5937 			<kdf>pkcs#12</kdf>
  5938 			<passwd>PSWD</passwd>
  5939 			<salt>53414C54</salt>
  5940 			<iterations>4</iterations>
  5941 			<key>80010C12B66CC739F4ACF8BB154197709F78AAD39A</key>
  5942 		</derivekey>
  5943 	</actionbody>
  5944 </action>
  5945 
  5946 //! @SYMTestCaseID CIT_PREQ1054_01
  5947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5948 //! @SYMREQ CIT_PREQ1054
  5949 //! @SYMTestPriority medium
  5950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5952 <action>
  5953 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5954 	<actiontype>DeriveKey</actiontype>
  5955 	<actionbody>
  5956 		<derivekey>
  5957 			<kdf>pkcs#12</kdf>
  5958 			<passwd>password</passwd>
  5959 			<salt>53414C54</salt>
  5960 			<iterations>4</iterations>
  5961 			<key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812</key>
  5962 		</derivekey>
  5963 	</actionbody>
  5964 </action>
  5965 
  5966 //! @SYMTestCaseID CIT_PREQ1054_01
  5967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5968 //! @SYMREQ CIT_PREQ1054
  5969 //! @SYMTestPriority medium
  5970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5972 <action>
  5973 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  5974 	<actiontype>DeriveKey</actiontype>
  5975 	<actionbody>
  5976 		<derivekey>
  5977 			<kdf>pkcs#12</kdf>
  5978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  5979 			<salt>53414C54</salt>
  5980 			<iterations>4</iterations>
  5981 			<key>146C6A5B58AF8561220DE4C13A133248300D59D39E</key>
  5982 		</derivekey>
  5983 	</actionbody>
  5984 </action>
  5985 
  5986 //! @SYMTestCaseID CIT_PREQ1054_01
  5987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  5988 //! @SYMREQ CIT_PREQ1054
  5989 //! @SYMTestPriority medium
  5990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  5991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  5992 <action>
  5993 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  5994 	<actiontype>DeriveKey</actiontype>
  5995 	<actionbody>
  5996 		<derivekey>
  5997 			<kdf>pkcs#12</kdf>
  5998 			<passwd>0000</passwd>
  5999 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6000 			<iterations>4</iterations>
  6001 			<key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE</key>
  6002 		</derivekey>
  6003 	</actionbody>
  6004 </action>
  6005 
  6006 //! @SYMTestCaseID CIT_PREQ1054_01
  6007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6008 //! @SYMREQ CIT_PREQ1054
  6009 //! @SYMTestPriority medium
  6010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6012 <action>
  6013 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6014 	<actiontype>DeriveKey</actiontype>
  6015 	<actionbody>
  6016 		<derivekey>
  6017 			<kdf>pkcs#12</kdf>
  6018 			<passwd>0001</passwd>
  6019 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6020 			<iterations>4</iterations>
  6021 			<key>23930713772E26DBBABB53F3C5C775019B8048482B</key>
  6022 		</derivekey>
  6023 	</actionbody>
  6024 </action>
  6025 
  6026 //! @SYMTestCaseID CIT_PREQ1054_01
  6027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6028 //! @SYMREQ CIT_PREQ1054
  6029 //! @SYMTestPriority medium
  6030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6032 <action>
  6033 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6034 	<actiontype>DeriveKey</actiontype>
  6035 	<actionbody>
  6036 		<derivekey>
  6037 			<kdf>pkcs#12</kdf>
  6038 			<passwd>PSWD</passwd>
  6039 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6040 			<iterations>4</iterations>
  6041 			<key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A</key>
  6042 		</derivekey>
  6043 	</actionbody>
  6044 </action>
  6045 
  6046 //! @SYMTestCaseID CIT_PREQ1054_01
  6047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6048 //! @SYMREQ CIT_PREQ1054
  6049 //! @SYMTestPriority medium
  6050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6052 <action>
  6053 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6054 	<actiontype>DeriveKey</actiontype>
  6055 	<actionbody>
  6056 		<derivekey>
  6057 			<kdf>pkcs#12</kdf>
  6058 			<passwd>password</passwd>
  6059 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6060 			<iterations>4</iterations>
  6061 			<key>363619530B170B7BAE1C046B29351C235B8EFED588</key>
  6062 		</derivekey>
  6063 	</actionbody>
  6064 </action>
  6065 
  6066 //! @SYMTestCaseID CIT_PREQ1054_01
  6067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6068 //! @SYMREQ CIT_PREQ1054
  6069 //! @SYMTestPriority medium
  6070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6072 <action>
  6073 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6074 	<actiontype>DeriveKey</actiontype>
  6075 	<actionbody>
  6076 		<derivekey>
  6077 			<kdf>pkcs#12</kdf>
  6078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6079 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6080 			<iterations>4</iterations>
  6081 			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4E</key>
  6082 		</derivekey>
  6083 	</actionbody>
  6084 </action>
  6085 
  6086 //! @SYMTestCaseID CIT_PREQ1054_01
  6087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6088 //! @SYMREQ CIT_PREQ1054
  6089 //! @SYMTestPriority medium
  6090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6092 <action>
  6093 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6094 	<actiontype>DeriveKey</actiontype>
  6095 	<actionbody>
  6096 		<derivekey>
  6097 			<kdf>pkcs#12</kdf>
  6098 			<passwd>0000</passwd>
  6099 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6100 			<iterations>4</iterations>
  6101 			<key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0E</key>
  6102 		</derivekey>
  6103 	</actionbody>
  6104 </action>
  6105 
  6106 //! @SYMTestCaseID CIT_PREQ1054_01
  6107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6108 //! @SYMREQ CIT_PREQ1054
  6109 //! @SYMTestPriority medium
  6110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6112 <action>
  6113 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6114 	<actiontype>DeriveKey</actiontype>
  6115 	<actionbody>
  6116 		<derivekey>
  6117 			<kdf>pkcs#12</kdf>
  6118 			<passwd>0001</passwd>
  6119 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6120 			<iterations>4</iterations>
  6121 			<key>9A618595C714486B7D7E3120005C8BC18D5D95D79B</key>
  6122 		</derivekey>
  6123 	</actionbody>
  6124 </action>
  6125 
  6126 //! @SYMTestCaseID CIT_PREQ1054_01
  6127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6128 //! @SYMREQ CIT_PREQ1054
  6129 //! @SYMTestPriority medium
  6130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6132 <action>
  6133 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6134 	<actiontype>DeriveKey</actiontype>
  6135 	<actionbody>
  6136 		<derivekey>
  6137 			<kdf>pkcs#12</kdf>
  6138 			<passwd>PSWD</passwd>
  6139 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6140 			<iterations>4</iterations>
  6141 			<key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208</key>
  6142 		</derivekey>
  6143 	</actionbody>
  6144 </action>
  6145 
  6146 //! @SYMTestCaseID CIT_PREQ1054_01
  6147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6148 //! @SYMREQ CIT_PREQ1054
  6149 //! @SYMTestPriority medium
  6150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6152 <action>
  6153 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6154 	<actiontype>DeriveKey</actiontype>
  6155 	<actionbody>
  6156 		<derivekey>
  6157 			<kdf>pkcs#12</kdf>
  6158 			<passwd>password</passwd>
  6159 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6160 			<iterations>4</iterations>
  6161 			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2</key>
  6162 		</derivekey>
  6163 	</actionbody>
  6164 </action>
  6165 
  6166 //! @SYMTestCaseID CIT_PREQ1054_01
  6167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6168 //! @SYMREQ CIT_PREQ1054
  6169 //! @SYMTestPriority medium
  6170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6172 <action>
  6173 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6174 	<actiontype>DeriveKey</actiontype>
  6175 	<actionbody>
  6176 		<derivekey>
  6177 			<kdf>pkcs#12</kdf>
  6178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6179 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6180 			<iterations>4</iterations>
  6181 			<key>91DF3661364A0DAD28180A41ADCB55676E992986EF</key>
  6182 		</derivekey>
  6183 	</actionbody>
  6184 </action>
  6185 
  6186 //! @SYMTestCaseID CIT_PREQ1054_01
  6187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6188 //! @SYMREQ CIT_PREQ1054
  6189 //! @SYMTestPriority medium
  6190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6192 <action>
  6193 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6194 	<actiontype>DeriveKey</actiontype>
  6195 	<actionbody>
  6196 		<derivekey>
  6197 			<kdf>pkcs#12</kdf>
  6198 			<passwd>0000</passwd>
  6199 			<salt>53414C54</salt>
  6200 			<iterations>8</iterations>
  6201 			<key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE461</key>
  6202 		</derivekey>
  6203 	</actionbody>
  6204 </action>
  6205 
  6206 //! @SYMTestCaseID CIT_PREQ1054_01
  6207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6208 //! @SYMREQ CIT_PREQ1054
  6209 //! @SYMTestPriority medium
  6210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6212 <action>
  6213 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6214 	<actiontype>DeriveKey</actiontype>
  6215 	<actionbody>
  6216 		<derivekey>
  6217 			<kdf>pkcs#12</kdf>
  6218 			<passwd>0001</passwd>
  6219 			<salt>53414C54</salt>
  6220 			<iterations>8</iterations>
  6221 			<key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1</key>
  6222 		</derivekey>
  6223 	</actionbody>
  6224 </action>
  6225 
  6226 //! @SYMTestCaseID CIT_PREQ1054_01
  6227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6228 //! @SYMREQ CIT_PREQ1054
  6229 //! @SYMTestPriority medium
  6230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6232 <action>
  6233 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6234 	<actiontype>DeriveKey</actiontype>
  6235 	<actionbody>
  6236 		<derivekey>
  6237 			<kdf>pkcs#12</kdf>
  6238 			<passwd>PSWD</passwd>
  6239 			<salt>53414C54</salt>
  6240 			<iterations>8</iterations>
  6241 			<key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466</key>
  6242 		</derivekey>
  6243 	</actionbody>
  6244 </action>
  6245 
  6246 //! @SYMTestCaseID CIT_PREQ1054_01
  6247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6248 //! @SYMREQ CIT_PREQ1054
  6249 //! @SYMTestPriority medium
  6250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6252 <action>
  6253 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6254 	<actiontype>DeriveKey</actiontype>
  6255 	<actionbody>
  6256 		<derivekey>
  6257 			<kdf>pkcs#12</kdf>
  6258 			<passwd>password</passwd>
  6259 			<salt>53414C54</salt>
  6260 			<iterations>8</iterations>
  6261 			<key>B0935F11227F5A473073DCD188886687D2A1811953</key>
  6262 		</derivekey>
  6263 	</actionbody>
  6264 </action>
  6265 
  6266 //! @SYMTestCaseID CIT_PREQ1054_01
  6267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6268 //! @SYMREQ CIT_PREQ1054
  6269 //! @SYMTestPriority medium
  6270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6272 <action>
  6273 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6274 	<actiontype>DeriveKey</actiontype>
  6275 	<actionbody>
  6276 		<derivekey>
  6277 			<kdf>pkcs#12</kdf>
  6278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6279 			<salt>53414C54</salt>
  6280 			<iterations>8</iterations>
  6281 			<key>6602B1B4BBB670208041ECD8E1634845FC0DC28532</key>
  6282 		</derivekey>
  6283 	</actionbody>
  6284 </action>
  6285 
  6286 //! @SYMTestCaseID CIT_PREQ1054_01
  6287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6288 //! @SYMREQ CIT_PREQ1054
  6289 //! @SYMTestPriority medium
  6290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6292 <action>
  6293 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6294 	<actiontype>DeriveKey</actiontype>
  6295 	<actionbody>
  6296 		<derivekey>
  6297 			<kdf>pkcs#12</kdf>
  6298 			<passwd>0000</passwd>
  6299 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6300 			<iterations>8</iterations>
  6301 			<key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E44</key>
  6302 		</derivekey>
  6303 	</actionbody>
  6304 </action>
  6305 
  6306 //! @SYMTestCaseID CIT_PREQ1054_01
  6307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6308 //! @SYMREQ CIT_PREQ1054
  6309 //! @SYMTestPriority medium
  6310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6312 <action>
  6313 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6314 	<actiontype>DeriveKey</actiontype>
  6315 	<actionbody>
  6316 		<derivekey>
  6317 			<kdf>pkcs#12</kdf>
  6318 			<passwd>0001</passwd>
  6319 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6320 			<iterations>8</iterations>
  6321 			<key>6473EB1244E055149E0858C49FAE7B8DC951E7E32A</key>
  6322 		</derivekey>
  6323 	</actionbody>
  6324 </action>
  6325 
  6326 //! @SYMTestCaseID CIT_PREQ1054_01
  6327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6328 //! @SYMREQ CIT_PREQ1054
  6329 //! @SYMTestPriority medium
  6330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6332 <action>
  6333 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6334 	<actiontype>DeriveKey</actiontype>
  6335 	<actionbody>
  6336 		<derivekey>
  6337 			<kdf>pkcs#12</kdf>
  6338 			<passwd>PSWD</passwd>
  6339 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6340 			<iterations>8</iterations>
  6341 			<key>AA762B8736D4C37BAD263103CA283E09010B7EFC53</key>
  6342 		</derivekey>
  6343 	</actionbody>
  6344 </action>
  6345 
  6346 //! @SYMTestCaseID CIT_PREQ1054_01
  6347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6348 //! @SYMREQ CIT_PREQ1054
  6349 //! @SYMTestPriority medium
  6350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6352 <action>
  6353 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6354 	<actiontype>DeriveKey</actiontype>
  6355 	<actionbody>
  6356 		<derivekey>
  6357 			<kdf>pkcs#12</kdf>
  6358 			<passwd>password</passwd>
  6359 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6360 			<iterations>8</iterations>
  6361 			<key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D8</key>
  6362 		</derivekey>
  6363 	</actionbody>
  6364 </action>
  6365 
  6366 //! @SYMTestCaseID CIT_PREQ1054_01
  6367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6368 //! @SYMREQ CIT_PREQ1054
  6369 //! @SYMTestPriority medium
  6370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6372 <action>
  6373 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6374 	<actiontype>DeriveKey</actiontype>
  6375 	<actionbody>
  6376 		<derivekey>
  6377 			<kdf>pkcs#12</kdf>
  6378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6379 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6380 			<iterations>8</iterations>
  6381 			<key>935593CA370BB6988F2F41D2F4ABF56E433064D83E</key>
  6382 		</derivekey>
  6383 	</actionbody>
  6384 </action>
  6385 
  6386 //! @SYMTestCaseID CIT_PREQ1054_01
  6387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6388 //! @SYMREQ CIT_PREQ1054
  6389 //! @SYMTestPriority medium
  6390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6392 <action>
  6393 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6394 	<actiontype>DeriveKey</actiontype>
  6395 	<actionbody>
  6396 		<derivekey>
  6397 			<kdf>pkcs#12</kdf>
  6398 			<passwd>0000</passwd>
  6399 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6400 			<iterations>8</iterations>
  6401 			<key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BF</key>
  6402 		</derivekey>
  6403 	</actionbody>
  6404 </action>
  6405 
  6406 //! @SYMTestCaseID CIT_PREQ1054_01
  6407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6408 //! @SYMREQ CIT_PREQ1054
  6409 //! @SYMTestPriority medium
  6410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6412 <action>
  6413 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6414 	<actiontype>DeriveKey</actiontype>
  6415 	<actionbody>
  6416 		<derivekey>
  6417 			<kdf>pkcs#12</kdf>
  6418 			<passwd>0001</passwd>
  6419 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6420 			<iterations>8</iterations>
  6421 			<key>82B4A13659033EA4025DB51A6CB573F93B03A69634</key>
  6422 		</derivekey>
  6423 	</actionbody>
  6424 </action>
  6425 
  6426 //! @SYMTestCaseID CIT_PREQ1054_01
  6427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6428 //! @SYMREQ CIT_PREQ1054
  6429 //! @SYMTestPriority medium
  6430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6432 <action>
  6433 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6434 	<actiontype>DeriveKey</actiontype>
  6435 	<actionbody>
  6436 		<derivekey>
  6437 			<kdf>pkcs#12</kdf>
  6438 			<passwd>PSWD</passwd>
  6439 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6440 			<iterations>8</iterations>
  6441 			<key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94</key>
  6442 		</derivekey>
  6443 	</actionbody>
  6444 </action>
  6445 
  6446 //! @SYMTestCaseID CIT_PREQ1054_01
  6447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6448 //! @SYMREQ CIT_PREQ1054
  6449 //! @SYMTestPriority medium
  6450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6452 <action>
  6453 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6454 	<actiontype>DeriveKey</actiontype>
  6455 	<actionbody>
  6456 		<derivekey>
  6457 			<kdf>pkcs#12</kdf>
  6458 			<passwd>password</passwd>
  6459 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6460 			<iterations>8</iterations>
  6461 			<key>5670457314E405B0ED1583FC4B82FEAD94B434EBED</key>
  6462 		</derivekey>
  6463 	</actionbody>
  6464 </action>
  6465 
  6466 //! @SYMTestCaseID CIT_PREQ1054_01
  6467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6468 //! @SYMREQ CIT_PREQ1054
  6469 //! @SYMTestPriority medium
  6470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6472 <action>
  6473 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6474 	<actiontype>DeriveKey</actiontype>
  6475 	<actionbody>
  6476 		<derivekey>
  6477 			<kdf>pkcs#12</kdf>
  6478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6479 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6480 			<iterations>8</iterations>
  6481 			<key>1C4CAE25146D74F3762B5C3FD3A917522564855675</key>
  6482 		</derivekey>
  6483 	</actionbody>
  6484 </action>
  6485 
  6486 //! @SYMTestCaseID CIT_PREQ1054_01
  6487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6488 //! @SYMREQ CIT_PREQ1054
  6489 //! @SYMTestPriority medium
  6490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6492 <action>
  6493 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6494 	<actiontype>DeriveKey</actiontype>
  6495 	<actionbody>
  6496 		<derivekey>
  6497 			<kdf>pkcs#12</kdf>
  6498 			<passwd>0000</passwd>
  6499 			<salt>53414C54</salt>
  6500 			<iterations>128</iterations>
  6501 			<key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93</key>
  6502 		</derivekey>
  6503 	</actionbody>
  6504 </action>
  6505 
  6506 //! @SYMTestCaseID CIT_PREQ1054_01
  6507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6508 //! @SYMREQ CIT_PREQ1054
  6509 //! @SYMTestPriority medium
  6510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6512 <action>
  6513 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6514 	<actiontype>DeriveKey</actiontype>
  6515 	<actionbody>
  6516 		<derivekey>
  6517 			<kdf>pkcs#12</kdf>
  6518 			<passwd>0001</passwd>
  6519 			<salt>53414C54</salt>
  6520 			<iterations>128</iterations>
  6521 			<key>C89C3A2C9C06626EB831F4BB5262809B9C138181C4</key>
  6522 		</derivekey>
  6523 	</actionbody>
  6524 </action>
  6525 
  6526 //! @SYMTestCaseID CIT_PREQ1054_01
  6527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6528 //! @SYMREQ CIT_PREQ1054
  6529 //! @SYMTestPriority medium
  6530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6532 <action>
  6533 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6534 	<actiontype>DeriveKey</actiontype>
  6535 	<actionbody>
  6536 		<derivekey>
  6537 			<kdf>pkcs#12</kdf>
  6538 			<passwd>PSWD</passwd>
  6539 			<salt>53414C54</salt>
  6540 			<iterations>128</iterations>
  6541 			<key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EE</key>
  6542 		</derivekey>
  6543 	</actionbody>
  6544 </action>
  6545 
  6546 //! @SYMTestCaseID CIT_PREQ1054_01
  6547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6548 //! @SYMREQ CIT_PREQ1054
  6549 //! @SYMTestPriority medium
  6550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6552 <action>
  6553 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6554 	<actiontype>DeriveKey</actiontype>
  6555 	<actionbody>
  6556 		<derivekey>
  6557 			<kdf>pkcs#12</kdf>
  6558 			<passwd>password</passwd>
  6559 			<salt>53414C54</salt>
  6560 			<iterations>128</iterations>
  6561 			<key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C</key>
  6562 		</derivekey>
  6563 	</actionbody>
  6564 </action>
  6565 
  6566 //! @SYMTestCaseID CIT_PREQ1054_01
  6567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6568 //! @SYMREQ CIT_PREQ1054
  6569 //! @SYMTestPriority medium
  6570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6572 <action>
  6573 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6574 	<actiontype>DeriveKey</actiontype>
  6575 	<actionbody>
  6576 		<derivekey>
  6577 			<kdf>pkcs#12</kdf>
  6578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6579 			<salt>53414C54</salt>
  6580 			<iterations>128</iterations>
  6581 			<key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F</key>
  6582 		</derivekey>
  6583 	</actionbody>
  6584 </action>
  6585 
  6586 //! @SYMTestCaseID CIT_PREQ1054_01
  6587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6588 //! @SYMREQ CIT_PREQ1054
  6589 //! @SYMTestPriority medium
  6590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6592 <action>
  6593 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6594 	<actiontype>DeriveKey</actiontype>
  6595 	<actionbody>
  6596 		<derivekey>
  6597 			<kdf>pkcs#12</kdf>
  6598 			<passwd>0000</passwd>
  6599 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6600 			<iterations>128</iterations>
  6601 			<key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD</key>
  6602 		</derivekey>
  6603 	</actionbody>
  6604 </action>
  6605 
  6606 //! @SYMTestCaseID CIT_PREQ1054_01
  6607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6608 //! @SYMREQ CIT_PREQ1054
  6609 //! @SYMTestPriority medium
  6610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6612 <action>
  6613 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6614 	<actiontype>DeriveKey</actiontype>
  6615 	<actionbody>
  6616 		<derivekey>
  6617 			<kdf>pkcs#12</kdf>
  6618 			<passwd>0001</passwd>
  6619 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6620 			<iterations>128</iterations>
  6621 			<key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3</key>
  6622 		</derivekey>
  6623 	</actionbody>
  6624 </action>
  6625 
  6626 //! @SYMTestCaseID CIT_PREQ1054_01
  6627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6628 //! @SYMREQ CIT_PREQ1054
  6629 //! @SYMTestPriority medium
  6630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6632 <action>
  6633 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6634 	<actiontype>DeriveKey</actiontype>
  6635 	<actionbody>
  6636 		<derivekey>
  6637 			<kdf>pkcs#12</kdf>
  6638 			<passwd>PSWD</passwd>
  6639 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6640 			<iterations>128</iterations>
  6641 			<key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF</key>
  6642 		</derivekey>
  6643 	</actionbody>
  6644 </action>
  6645 
  6646 //! @SYMTestCaseID CIT_PREQ1054_01
  6647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6648 //! @SYMREQ CIT_PREQ1054
  6649 //! @SYMTestPriority medium
  6650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6652 <action>
  6653 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6654 	<actiontype>DeriveKey</actiontype>
  6655 	<actionbody>
  6656 		<derivekey>
  6657 			<kdf>pkcs#12</kdf>
  6658 			<passwd>password</passwd>
  6659 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6660 			<iterations>128</iterations>
  6661 			<key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3</key>
  6662 		</derivekey>
  6663 	</actionbody>
  6664 </action>
  6665 
  6666 //! @SYMTestCaseID CIT_PREQ1054_01
  6667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6668 //! @SYMREQ CIT_PREQ1054
  6669 //! @SYMTestPriority medium
  6670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6672 <action>
  6673 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6674 	<actiontype>DeriveKey</actiontype>
  6675 	<actionbody>
  6676 		<derivekey>
  6677 			<kdf>pkcs#12</kdf>
  6678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6679 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6680 			<iterations>128</iterations>
  6681 			<key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16</key>
  6682 		</derivekey>
  6683 	</actionbody>
  6684 </action>
  6685 
  6686 //! @SYMTestCaseID CIT_PREQ1054_01
  6687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6688 //! @SYMREQ CIT_PREQ1054
  6689 //! @SYMTestPriority medium
  6690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6692 <action>
  6693 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6694 	<actiontype>DeriveKey</actiontype>
  6695 	<actionbody>
  6696 		<derivekey>
  6697 			<kdf>pkcs#12</kdf>
  6698 			<passwd>0000</passwd>
  6699 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6700 			<iterations>128</iterations>
  6701 			<key>99FE149183022F9EB2EB815BCC9504E59C524A1497</key>
  6702 		</derivekey>
  6703 	</actionbody>
  6704 </action>
  6705 
  6706 //! @SYMTestCaseID CIT_PREQ1054_01
  6707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6708 //! @SYMREQ CIT_PREQ1054
  6709 //! @SYMTestPriority medium
  6710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6712 <action>
  6713 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6714 	<actiontype>DeriveKey</actiontype>
  6715 	<actionbody>
  6716 		<derivekey>
  6717 			<kdf>pkcs#12</kdf>
  6718 			<passwd>0001</passwd>
  6719 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6720 			<iterations>128</iterations>
  6721 			<key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FE</key>
  6722 		</derivekey>
  6723 	</actionbody>
  6724 </action>
  6725 
  6726 //! @SYMTestCaseID CIT_PREQ1054_01
  6727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6728 //! @SYMREQ CIT_PREQ1054
  6729 //! @SYMTestPriority medium
  6730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6732 <action>
  6733 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6734 	<actiontype>DeriveKey</actiontype>
  6735 	<actionbody>
  6736 		<derivekey>
  6737 			<kdf>pkcs#12</kdf>
  6738 			<passwd>PSWD</passwd>
  6739 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6740 			<iterations>128</iterations>
  6741 			<key>22A70A865774E55CF08A70435611252278DCE76AED</key>
  6742 		</derivekey>
  6743 	</actionbody>
  6744 </action>
  6745 
  6746 //! @SYMTestCaseID CIT_PREQ1054_01
  6747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6748 //! @SYMREQ CIT_PREQ1054
  6749 //! @SYMTestPriority medium
  6750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6752 <action>
  6753 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6754 	<actiontype>DeriveKey</actiontype>
  6755 	<actionbody>
  6756 		<derivekey>
  6757 			<kdf>pkcs#12</kdf>
  6758 			<passwd>password</passwd>
  6759 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6760 			<iterations>128</iterations>
  6761 			<key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C67</key>
  6762 		</derivekey>
  6763 	</actionbody>
  6764 </action>
  6765 
  6766 //! @SYMTestCaseID CIT_PREQ1054_01
  6767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6768 //! @SYMREQ CIT_PREQ1054
  6769 //! @SYMTestPriority medium
  6770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6772 <action>
  6773 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6774 	<actiontype>DeriveKey</actiontype>
  6775 	<actionbody>
  6776 		<derivekey>
  6777 			<kdf>pkcs#12</kdf>
  6778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6779 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  6780 			<iterations>128</iterations>
  6781 			<key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CE</key>
  6782 		</derivekey>
  6783 	</actionbody>
  6784 </action>
  6785 
  6786 //! @SYMTestCaseID CIT_PREQ1054_01
  6787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6788 //! @SYMREQ CIT_PREQ1054
  6789 //! @SYMTestPriority medium
  6790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6792 <action>
  6793 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6794 	<actiontype>DeriveKey</actiontype>
  6795 	<actionbody>
  6796 		<derivekey>
  6797 			<kdf>pkcs#12</kdf>
  6798 			<passwd>0000</passwd>
  6799 			<salt>53414C54</salt>
  6800 			<iterations>1024</iterations>
  6801 			<key>82824BE51C81A5FF4C4268E256F6621B9656325BEF</key>
  6802 		</derivekey>
  6803 	</actionbody>
  6804 </action>
  6805 
  6806 //! @SYMTestCaseID CIT_PREQ1054_01
  6807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6808 //! @SYMREQ CIT_PREQ1054
  6809 //! @SYMTestPriority medium
  6810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6812 <action>
  6813 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6814 	<actiontype>DeriveKey</actiontype>
  6815 	<actionbody>
  6816 		<derivekey>
  6817 			<kdf>pkcs#12</kdf>
  6818 			<passwd>0001</passwd>
  6819 			<salt>53414C54</salt>
  6820 			<iterations>1024</iterations>
  6821 			<key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2</key>
  6822 		</derivekey>
  6823 	</actionbody>
  6824 </action>
  6825 
  6826 //! @SYMTestCaseID CIT_PREQ1054_01
  6827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6828 //! @SYMREQ CIT_PREQ1054
  6829 //! @SYMTestPriority medium
  6830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6832 <action>
  6833 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6834 	<actiontype>DeriveKey</actiontype>
  6835 	<actionbody>
  6836 		<derivekey>
  6837 			<kdf>pkcs#12</kdf>
  6838 			<passwd>PSWD</passwd>
  6839 			<salt>53414C54</salt>
  6840 			<iterations>1024</iterations>
  6841 			<key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE</key>
  6842 		</derivekey>
  6843 	</actionbody>
  6844 </action>
  6845 
  6846 //! @SYMTestCaseID CIT_PREQ1054_01
  6847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6848 //! @SYMREQ CIT_PREQ1054
  6849 //! @SYMTestPriority medium
  6850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6852 <action>
  6853 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6854 	<actiontype>DeriveKey</actiontype>
  6855 	<actionbody>
  6856 		<derivekey>
  6857 			<kdf>pkcs#12</kdf>
  6858 			<passwd>password</passwd>
  6859 			<salt>53414C54</salt>
  6860 			<iterations>1024</iterations>
  6861 			<key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E84</key>
  6862 		</derivekey>
  6863 	</actionbody>
  6864 </action>
  6865 
  6866 //! @SYMTestCaseID CIT_PREQ1054_01
  6867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6868 //! @SYMREQ CIT_PREQ1054
  6869 //! @SYMTestPriority medium
  6870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6872 <action>
  6873 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  6874 	<actiontype>DeriveKey</actiontype>
  6875 	<actionbody>
  6876 		<derivekey>
  6877 			<kdf>pkcs#12</kdf>
  6878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6879 			<salt>53414C54</salt>
  6880 			<iterations>1024</iterations>
  6881 			<key>406C92305ACD663AB0B9EB66DED7929547C692FE11</key>
  6882 		</derivekey>
  6883 	</actionbody>
  6884 </action>
  6885 
  6886 //! @SYMTestCaseID CIT_PREQ1054_01
  6887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6888 //! @SYMREQ CIT_PREQ1054
  6889 //! @SYMTestPriority medium
  6890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6892 <action>
  6893 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6894 	<actiontype>DeriveKey</actiontype>
  6895 	<actionbody>
  6896 		<derivekey>
  6897 			<kdf>pkcs#12</kdf>
  6898 			<passwd>0000</passwd>
  6899 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6900 			<iterations>1024</iterations>
  6901 			<key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355</key>
  6902 		</derivekey>
  6903 	</actionbody>
  6904 </action>
  6905 
  6906 //! @SYMTestCaseID CIT_PREQ1054_01
  6907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6908 //! @SYMREQ CIT_PREQ1054
  6909 //! @SYMTestPriority medium
  6910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6912 <action>
  6913 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6914 	<actiontype>DeriveKey</actiontype>
  6915 	<actionbody>
  6916 		<derivekey>
  6917 			<kdf>pkcs#12</kdf>
  6918 			<passwd>0001</passwd>
  6919 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6920 			<iterations>1024</iterations>
  6921 			<key>0182E41FCA166CEAED10972BDF5F57A8F851200E37</key>
  6922 		</derivekey>
  6923 	</actionbody>
  6924 </action>
  6925 
  6926 //! @SYMTestCaseID CIT_PREQ1054_01
  6927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6928 //! @SYMREQ CIT_PREQ1054
  6929 //! @SYMTestPriority medium
  6930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6932 <action>
  6933 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6934 	<actiontype>DeriveKey</actiontype>
  6935 	<actionbody>
  6936 		<derivekey>
  6937 			<kdf>pkcs#12</kdf>
  6938 			<passwd>PSWD</passwd>
  6939 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6940 			<iterations>1024</iterations>
  6941 			<key>101FB775982CA15E37A065F7CDC5593DE385BDF504</key>
  6942 		</derivekey>
  6943 	</actionbody>
  6944 </action>
  6945 
  6946 //! @SYMTestCaseID CIT_PREQ1054_01
  6947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6948 //! @SYMREQ CIT_PREQ1054
  6949 //! @SYMTestPriority medium
  6950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6952 <action>
  6953 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6954 	<actiontype>DeriveKey</actiontype>
  6955 	<actionbody>
  6956 		<derivekey>
  6957 			<kdf>pkcs#12</kdf>
  6958 			<passwd>password</passwd>
  6959 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6960 			<iterations>1024</iterations>
  6961 			<key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B614</key>
  6962 		</derivekey>
  6963 	</actionbody>
  6964 </action>
  6965 
  6966 //! @SYMTestCaseID CIT_PREQ1054_01
  6967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6968 //! @SYMREQ CIT_PREQ1054
  6969 //! @SYMTestPriority medium
  6970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6972 <action>
  6973 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  6974 	<actiontype>DeriveKey</actiontype>
  6975 	<actionbody>
  6976 		<derivekey>
  6977 			<kdf>pkcs#12</kdf>
  6978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  6979 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  6980 			<iterations>1024</iterations>
  6981 			<key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95</key>
  6982 		</derivekey>
  6983 	</actionbody>
  6984 </action>
  6985 
  6986 //! @SYMTestCaseID CIT_PREQ1054_01
  6987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  6988 //! @SYMREQ CIT_PREQ1054
  6989 //! @SYMTestPriority medium
  6990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  6991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  6992 <action>
  6993 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  6994 	<actiontype>DeriveKey</actiontype>
  6995 	<actionbody>
  6996 		<derivekey>
  6997 			<kdf>pkcs#12</kdf>
  6998 			<passwd>0000</passwd>
  6999 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7000 			<iterations>1024</iterations>
  7001 			<key>6789F0680A5C5840B8ED34B061494171E6407643F9</key>
  7002 		</derivekey>
  7003 	</actionbody>
  7004 </action>
  7005 
  7006 //! @SYMTestCaseID CIT_PREQ1054_01
  7007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7008 //! @SYMREQ CIT_PREQ1054
  7009 //! @SYMTestPriority medium
  7010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7012 <action>
  7013 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7014 	<actiontype>DeriveKey</actiontype>
  7015 	<actionbody>
  7016 		<derivekey>
  7017 			<kdf>pkcs#12</kdf>
  7018 			<passwd>0001</passwd>
  7019 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7020 			<iterations>1024</iterations>
  7021 			<key>43E663725870C4801A917C41C9B58C419933A93475</key>
  7022 		</derivekey>
  7023 	</actionbody>
  7024 </action>
  7025 
  7026 //! @SYMTestCaseID CIT_PREQ1054_01
  7027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7028 //! @SYMREQ CIT_PREQ1054
  7029 //! @SYMTestPriority medium
  7030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7032 <action>
  7033 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7034 	<actiontype>DeriveKey</actiontype>
  7035 	<actionbody>
  7036 		<derivekey>
  7037 			<kdf>pkcs#12</kdf>
  7038 			<passwd>PSWD</passwd>
  7039 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7040 			<iterations>1024</iterations>
  7041 			<key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5</key>
  7042 		</derivekey>
  7043 	</actionbody>
  7044 </action>
  7045 
  7046 //! @SYMTestCaseID CIT_PREQ1054_01
  7047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7048 //! @SYMREQ CIT_PREQ1054
  7049 //! @SYMTestPriority medium
  7050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7052 <action>
  7053 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7054 	<actiontype>DeriveKey</actiontype>
  7055 	<actionbody>
  7056 		<derivekey>
  7057 			<kdf>pkcs#12</kdf>
  7058 			<passwd>password</passwd>
  7059 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7060 			<iterations>1024</iterations>
  7061 			<key>CA202602C9A265559B6B96729B574DAA9B6D67036F</key>
  7062 		</derivekey>
  7063 	</actionbody>
  7064 </action>
  7065 
  7066 //! @SYMTestCaseID CIT_PREQ1054_01
  7067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7068 //! @SYMREQ CIT_PREQ1054
  7069 //! @SYMTestPriority medium
  7070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7072 <action>
  7073 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7074 	<actiontype>DeriveKey</actiontype>
  7075 	<actionbody>
  7076 		<derivekey>
  7077 			<kdf>pkcs#12</kdf>
  7078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7079 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7080 			<iterations>1024</iterations>
  7081 			<key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D468</key>
  7082 		</derivekey>
  7083 	</actionbody>
  7084 </action>
  7085 
  7086 //! @SYMTestCaseID CIT_PREQ1054_01
  7087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7088 //! @SYMREQ CIT_PREQ1054
  7089 //! @SYMTestPriority medium
  7090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7092 <action>
  7093 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7094 	<actiontype>DeriveKey</actiontype>
  7095 	<actionbody>
  7096 		<derivekey>
  7097 			<kdf>pkcs#12</kdf>
  7098 			<passwd>0000</passwd>
  7099 			<salt>53414C54</salt>
  7100 			<iterations>1536</iterations>
  7101 			<key>79A4E1398F511B262E60DCFE9E838C938B806716A9</key>
  7102 		</derivekey>
  7103 	</actionbody>
  7104 </action>
  7105 
  7106 //! @SYMTestCaseID CIT_PREQ1054_01
  7107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7108 //! @SYMREQ CIT_PREQ1054
  7109 //! @SYMTestPriority medium
  7110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7112 <action>
  7113 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7114 	<actiontype>DeriveKey</actiontype>
  7115 	<actionbody>
  7116 		<derivekey>
  7117 			<kdf>pkcs#12</kdf>
  7118 			<passwd>0001</passwd>
  7119 			<salt>53414C54</salt>
  7120 			<iterations>1536</iterations>
  7121 			<key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D2</key>
  7122 		</derivekey>
  7123 	</actionbody>
  7124 </action>
  7125 
  7126 //! @SYMTestCaseID CIT_PREQ1054_01
  7127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7128 //! @SYMREQ CIT_PREQ1054
  7129 //! @SYMTestPriority medium
  7130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7132 <action>
  7133 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7134 	<actiontype>DeriveKey</actiontype>
  7135 	<actionbody>
  7136 		<derivekey>
  7137 			<kdf>pkcs#12</kdf>
  7138 			<passwd>PSWD</passwd>
  7139 			<salt>53414C54</salt>
  7140 			<iterations>1536</iterations>
  7141 			<key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E6</key>
  7142 		</derivekey>
  7143 	</actionbody>
  7144 </action>
  7145 
  7146 //! @SYMTestCaseID CIT_PREQ1054_01
  7147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7148 //! @SYMREQ CIT_PREQ1054
  7149 //! @SYMTestPriority medium
  7150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7152 <action>
  7153 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7154 	<actiontype>DeriveKey</actiontype>
  7155 	<actionbody>
  7156 		<derivekey>
  7157 			<kdf>pkcs#12</kdf>
  7158 			<passwd>password</passwd>
  7159 			<salt>53414C54</salt>
  7160 			<iterations>1536</iterations>
  7161 			<key>65B27A78C72DFEEA6C92846330CE98C6721909E89B</key>
  7162 		</derivekey>
  7163 	</actionbody>
  7164 </action>
  7165 
  7166 //! @SYMTestCaseID CIT_PREQ1054_01
  7167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7168 //! @SYMREQ CIT_PREQ1054
  7169 //! @SYMTestPriority medium
  7170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7172 <action>
  7173 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7174 	<actiontype>DeriveKey</actiontype>
  7175 	<actionbody>
  7176 		<derivekey>
  7177 			<kdf>pkcs#12</kdf>
  7178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7179 			<salt>53414C54</salt>
  7180 			<iterations>1536</iterations>
  7181 			<key>8F8FC96A3D958731780B50E843D6BB65137A0728C3</key>
  7182 		</derivekey>
  7183 	</actionbody>
  7184 </action>
  7185 
  7186 //! @SYMTestCaseID CIT_PREQ1054_01
  7187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7188 //! @SYMREQ CIT_PREQ1054
  7189 //! @SYMTestPriority medium
  7190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7192 <action>
  7193 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7194 	<actiontype>DeriveKey</actiontype>
  7195 	<actionbody>
  7196 		<derivekey>
  7197 			<kdf>pkcs#12</kdf>
  7198 			<passwd>0000</passwd>
  7199 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7200 			<iterations>1536</iterations>
  7201 			<key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25</key>
  7202 		</derivekey>
  7203 	</actionbody>
  7204 </action>
  7205 
  7206 //! @SYMTestCaseID CIT_PREQ1054_01
  7207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7208 //! @SYMREQ CIT_PREQ1054
  7209 //! @SYMTestPriority medium
  7210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7212 <action>
  7213 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7214 	<actiontype>DeriveKey</actiontype>
  7215 	<actionbody>
  7216 		<derivekey>
  7217 			<kdf>pkcs#12</kdf>
  7218 			<passwd>0001</passwd>
  7219 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7220 			<iterations>1536</iterations>
  7221 			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB4</key>
  7222 		</derivekey>
  7223 	</actionbody>
  7224 </action>
  7225 
  7226 //! @SYMTestCaseID CIT_PREQ1054_01
  7227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7228 //! @SYMREQ CIT_PREQ1054
  7229 //! @SYMTestPriority medium
  7230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7232 <action>
  7233 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7234 	<actiontype>DeriveKey</actiontype>
  7235 	<actionbody>
  7236 		<derivekey>
  7237 			<kdf>pkcs#12</kdf>
  7238 			<passwd>PSWD</passwd>
  7239 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7240 			<iterations>1536</iterations>
  7241 			<key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0C</key>
  7242 		</derivekey>
  7243 	</actionbody>
  7244 </action>
  7245 
  7246 //! @SYMTestCaseID CIT_PREQ1054_01
  7247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7248 //! @SYMREQ CIT_PREQ1054
  7249 //! @SYMTestPriority medium
  7250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7252 <action>
  7253 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7254 	<actiontype>DeriveKey</actiontype>
  7255 	<actionbody>
  7256 		<derivekey>
  7257 			<kdf>pkcs#12</kdf>
  7258 			<passwd>password</passwd>
  7259 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7260 			<iterations>1536</iterations>
  7261 			<key>C05FE26245C742CC01B23C655E5D934D734610DE01</key>
  7262 		</derivekey>
  7263 	</actionbody>
  7264 </action>
  7265 
  7266 //! @SYMTestCaseID CIT_PREQ1054_01
  7267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7268 //! @SYMREQ CIT_PREQ1054
  7269 //! @SYMTestPriority medium
  7270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7272 <action>
  7273 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7274 	<actiontype>DeriveKey</actiontype>
  7275 	<actionbody>
  7276 		<derivekey>
  7277 			<kdf>pkcs#12</kdf>
  7278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7279 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7280 			<iterations>1536</iterations>
  7281 			<key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0</key>
  7282 		</derivekey>
  7283 	</actionbody>
  7284 </action>
  7285 
  7286 //! @SYMTestCaseID CIT_PREQ1054_01
  7287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7288 //! @SYMREQ CIT_PREQ1054
  7289 //! @SYMTestPriority medium
  7290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7292 <action>
  7293 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7294 	<actiontype>DeriveKey</actiontype>
  7295 	<actionbody>
  7296 		<derivekey>
  7297 			<kdf>pkcs#12</kdf>
  7298 			<passwd>0000</passwd>
  7299 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7300 			<iterations>1536</iterations>
  7301 			<key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3</key>
  7302 		</derivekey>
  7303 	</actionbody>
  7304 </action>
  7305 
  7306 //! @SYMTestCaseID CIT_PREQ1054_01
  7307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7308 //! @SYMREQ CIT_PREQ1054
  7309 //! @SYMTestPriority medium
  7310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7312 <action>
  7313 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7314 	<actiontype>DeriveKey</actiontype>
  7315 	<actionbody>
  7316 		<derivekey>
  7317 			<kdf>pkcs#12</kdf>
  7318 			<passwd>0001</passwd>
  7319 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7320 			<iterations>1536</iterations>
  7321 			<key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA</key>
  7322 		</derivekey>
  7323 	</actionbody>
  7324 </action>
  7325 
  7326 //! @SYMTestCaseID CIT_PREQ1054_01
  7327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7328 //! @SYMREQ CIT_PREQ1054
  7329 //! @SYMTestPriority medium
  7330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7332 <action>
  7333 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7334 	<actiontype>DeriveKey</actiontype>
  7335 	<actionbody>
  7336 		<derivekey>
  7337 			<kdf>pkcs#12</kdf>
  7338 			<passwd>PSWD</passwd>
  7339 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7340 			<iterations>1536</iterations>
  7341 			<key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA</key>
  7342 		</derivekey>
  7343 	</actionbody>
  7344 </action>
  7345 
  7346 //! @SYMTestCaseID CIT_PREQ1054_01
  7347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7348 //! @SYMREQ CIT_PREQ1054
  7349 //! @SYMTestPriority medium
  7350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7352 <action>
  7353 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7354 	<actiontype>DeriveKey</actiontype>
  7355 	<actionbody>
  7356 		<derivekey>
  7357 			<kdf>pkcs#12</kdf>
  7358 			<passwd>password</passwd>
  7359 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7360 			<iterations>1536</iterations>
  7361 			<key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD4</key>
  7362 		</derivekey>
  7363 	</actionbody>
  7364 </action>
  7365 
  7366 //! @SYMTestCaseID CIT_PREQ1054_01
  7367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7368 //! @SYMREQ CIT_PREQ1054
  7369 //! @SYMTestPriority medium
  7370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7372 <action>
  7373 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7374 	<actiontype>DeriveKey</actiontype>
  7375 	<actionbody>
  7376 		<derivekey>
  7377 			<kdf>pkcs#12</kdf>
  7378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7379 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7380 			<iterations>1536</iterations>
  7381 			<key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B2</key>
  7382 		</derivekey>
  7383 	</actionbody>
  7384 </action>
  7385 
  7386 //! @SYMTestCaseID CIT_PREQ1054_01
  7387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7388 //! @SYMREQ CIT_PREQ1054
  7389 //! @SYMTestPriority medium
  7390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7392 <action>
  7393 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7394 	<actiontype>DeriveKey</actiontype>
  7395 	<actionbody>
  7396 		<derivekey>
  7397 			<kdf>pkcs#12</kdf>
  7398 			<passwd>0000</passwd>
  7399 			<salt>53414C54</salt>
  7400 			<iterations>2048</iterations>
  7401 			<key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCD</key>
  7402 		</derivekey>
  7403 	</actionbody>
  7404 </action>
  7405 
  7406 //! @SYMTestCaseID CIT_PREQ1054_01
  7407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7408 //! @SYMREQ CIT_PREQ1054
  7409 //! @SYMTestPriority medium
  7410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7412 <action>
  7413 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7414 	<actiontype>DeriveKey</actiontype>
  7415 	<actionbody>
  7416 		<derivekey>
  7417 			<kdf>pkcs#12</kdf>
  7418 			<passwd>0001</passwd>
  7419 			<salt>53414C54</salt>
  7420 			<iterations>2048</iterations>
  7421 			<key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2</key>
  7422 		</derivekey>
  7423 	</actionbody>
  7424 </action>
  7425 
  7426 //! @SYMTestCaseID CIT_PREQ1054_01
  7427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7428 //! @SYMREQ CIT_PREQ1054
  7429 //! @SYMTestPriority medium
  7430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7432 <action>
  7433 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7434 	<actiontype>DeriveKey</actiontype>
  7435 	<actionbody>
  7436 		<derivekey>
  7437 			<kdf>pkcs#12</kdf>
  7438 			<passwd>PSWD</passwd>
  7439 			<salt>53414C54</salt>
  7440 			<iterations>2048</iterations>
  7441 			<key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2</key>
  7442 		</derivekey>
  7443 	</actionbody>
  7444 </action>
  7445 
  7446 //! @SYMTestCaseID CIT_PREQ1054_01
  7447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7448 //! @SYMREQ CIT_PREQ1054
  7449 //! @SYMTestPriority medium
  7450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7452 <action>
  7453 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7454 	<actiontype>DeriveKey</actiontype>
  7455 	<actionbody>
  7456 		<derivekey>
  7457 			<kdf>pkcs#12</kdf>
  7458 			<passwd>password</passwd>
  7459 			<salt>53414C54</salt>
  7460 			<iterations>2048</iterations>
  7461 			<key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D9</key>
  7462 		</derivekey>
  7463 	</actionbody>
  7464 </action>
  7465 
  7466 //! @SYMTestCaseID CIT_PREQ1054_01
  7467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7468 //! @SYMREQ CIT_PREQ1054
  7469 //! @SYMTestPriority medium
  7470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7472 <action>
  7473 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
  7474 	<actiontype>DeriveKey</actiontype>
  7475 	<actionbody>
  7476 		<derivekey>
  7477 			<kdf>pkcs#12</kdf>
  7478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7479 			<salt>53414C54</salt>
  7480 			<iterations>2048</iterations>
  7481 			<key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45</key>
  7482 		</derivekey>
  7483 	</actionbody>
  7484 </action>
  7485 
  7486 //! @SYMTestCaseID CIT_PREQ1054_01
  7487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7488 //! @SYMREQ CIT_PREQ1054
  7489 //! @SYMTestPriority medium
  7490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7492 <action>
  7493 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7494 	<actiontype>DeriveKey</actiontype>
  7495 	<actionbody>
  7496 		<derivekey>
  7497 			<kdf>pkcs#12</kdf>
  7498 			<passwd>0000</passwd>
  7499 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7500 			<iterations>2048</iterations>
  7501 			<key>CD045229461658BC6C47C259F2D20433173DE4D31E</key>
  7502 		</derivekey>
  7503 	</actionbody>
  7504 </action>
  7505 
  7506 //! @SYMTestCaseID CIT_PREQ1054_01
  7507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7508 //! @SYMREQ CIT_PREQ1054
  7509 //! @SYMTestPriority medium
  7510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7512 <action>
  7513 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7514 	<actiontype>DeriveKey</actiontype>
  7515 	<actionbody>
  7516 		<derivekey>
  7517 			<kdf>pkcs#12</kdf>
  7518 			<passwd>0001</passwd>
  7519 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7520 			<iterations>2048</iterations>
  7521 			<key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6D</key>
  7522 		</derivekey>
  7523 	</actionbody>
  7524 </action>
  7525 
  7526 //! @SYMTestCaseID CIT_PREQ1054_01
  7527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7528 //! @SYMREQ CIT_PREQ1054
  7529 //! @SYMTestPriority medium
  7530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7532 <action>
  7533 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7534 	<actiontype>DeriveKey</actiontype>
  7535 	<actionbody>
  7536 		<derivekey>
  7537 			<kdf>pkcs#12</kdf>
  7538 			<passwd>PSWD</passwd>
  7539 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7540 			<iterations>2048</iterations>
  7541 			<key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC</key>
  7542 		</derivekey>
  7543 	</actionbody>
  7544 </action>
  7545 
  7546 //! @SYMTestCaseID CIT_PREQ1054_01
  7547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7548 //! @SYMREQ CIT_PREQ1054
  7549 //! @SYMTestPriority medium
  7550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7552 <action>
  7553 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7554 	<actiontype>DeriveKey</actiontype>
  7555 	<actionbody>
  7556 		<derivekey>
  7557 			<kdf>pkcs#12</kdf>
  7558 			<passwd>password</passwd>
  7559 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7560 			<iterations>2048</iterations>
  7561 			<key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B</key>
  7562 		</derivekey>
  7563 	</actionbody>
  7564 </action>
  7565 
  7566 //! @SYMTestCaseID CIT_PREQ1054_01
  7567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7568 //! @SYMREQ CIT_PREQ1054
  7569 //! @SYMTestPriority medium
  7570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7572 <action>
  7573 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
  7574 	<actiontype>DeriveKey</actiontype>
  7575 	<actionbody>
  7576 		<derivekey>
  7577 			<kdf>pkcs#12</kdf>
  7578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7579 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7580 			<iterations>2048</iterations>
  7581 			<key>A5B348EB4926290B223724CC8E4ED67FF458F23622</key>
  7582 		</derivekey>
  7583 	</actionbody>
  7584 </action>
  7585 
  7586 //! @SYMTestCaseID CIT_PREQ1054_01
  7587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7588 //! @SYMREQ CIT_PREQ1054
  7589 //! @SYMTestPriority medium
  7590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7592 <action>
  7593 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7594 	<actiontype>DeriveKey</actiontype>
  7595 	<actionbody>
  7596 		<derivekey>
  7597 			<kdf>pkcs#12</kdf>
  7598 			<passwd>0000</passwd>
  7599 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7600 			<iterations>2048</iterations>
  7601 			<key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A25</key>
  7602 		</derivekey>
  7603 	</actionbody>
  7604 </action>
  7605 
  7606 //! @SYMTestCaseID CIT_PREQ1054_01
  7607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7608 //! @SYMREQ CIT_PREQ1054
  7609 //! @SYMTestPriority medium
  7610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7612 <action>
  7613 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7614 	<actiontype>DeriveKey</actiontype>
  7615 	<actionbody>
  7616 		<derivekey>
  7617 			<kdf>pkcs#12</kdf>
  7618 			<passwd>0001</passwd>
  7619 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7620 			<iterations>2048</iterations>
  7621 			<key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE1360</key>
  7622 		</derivekey>
  7623 	</actionbody>
  7624 </action>
  7625 
  7626 //! @SYMTestCaseID CIT_PREQ1054_01
  7627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7628 //! @SYMREQ CIT_PREQ1054
  7629 //! @SYMTestPriority medium
  7630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7632 <action>
  7633 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7634 	<actiontype>DeriveKey</actiontype>
  7635 	<actionbody>
  7636 		<derivekey>
  7637 			<kdf>pkcs#12</kdf>
  7638 			<passwd>PSWD</passwd>
  7639 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7640 			<iterations>2048</iterations>
  7641 			<key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2</key>
  7642 		</derivekey>
  7643 	</actionbody>
  7644 </action>
  7645 
  7646 //! @SYMTestCaseID CIT_PREQ1054_01
  7647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7648 //! @SYMREQ CIT_PREQ1054
  7649 //! @SYMTestPriority medium
  7650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7652 <action>
  7653 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7654 	<actiontype>DeriveKey</actiontype>
  7655 	<actionbody>
  7656 		<derivekey>
  7657 			<kdf>pkcs#12</kdf>
  7658 			<passwd>password</passwd>
  7659 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7660 			<iterations>2048</iterations>
  7661 			<key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF0</key>
  7662 		</derivekey>
  7663 	</actionbody>
  7664 </action>
  7665 
  7666 //! @SYMTestCaseID CIT_PREQ1054_01
  7667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7668 //! @SYMREQ CIT_PREQ1054
  7669 //! @SYMTestPriority medium
  7670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7672 <action>
  7673 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
  7674 	<actiontype>DeriveKey</actiontype>
  7675 	<actionbody>
  7676 		<derivekey>
  7677 			<kdf>pkcs#12</kdf>
  7678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7679 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7680 			<iterations>2048</iterations>
  7681 			<key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1</key>
  7682 		</derivekey>
  7683 	</actionbody>
  7684 </action>
  7685 
  7686 //! @SYMTestCaseID CIT_PREQ1054_01
  7687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7688 //! @SYMREQ CIT_PREQ1054
  7689 //! @SYMTestPriority medium
  7690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7692 <action>
  7693 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  7694 	<actiontype>DeriveKey</actiontype>
  7695 	<actionbody>
  7696 		<derivekey>
  7697 			<kdf>pkcs#12</kdf>
  7698 			<passwd>0000</passwd>
  7699 			<salt>53414C54</salt>
  7700 			<iterations>1</iterations>
  7701 			<key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7FB67481AA26FAE2392310DEEF5BA9CB27DCE2D3FB11C95109E</key>
  7702 		</derivekey>
  7703 	</actionbody>
  7704 </action>
  7705 
  7706 //! @SYMTestCaseID CIT_PREQ1054_01
  7707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7708 //! @SYMREQ CIT_PREQ1054
  7709 //! @SYMTestPriority medium
  7710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7712 <action>
  7713 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  7714 	<actiontype>DeriveKey</actiontype>
  7715 	<actionbody>
  7716 		<derivekey>
  7717 			<kdf>pkcs#12</kdf>
  7718 			<passwd>0001</passwd>
  7719 			<salt>53414C54</salt>
  7720 			<iterations>1</iterations>
  7721 			<key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B5FC87F188064903840A07BEA1540D4397A8C3BF85454D5EAEF</key>
  7722 		</derivekey>
  7723 	</actionbody>
  7724 </action>
  7725 
  7726 //! @SYMTestCaseID CIT_PREQ1054_01
  7727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7728 //! @SYMREQ CIT_PREQ1054
  7729 //! @SYMTestPriority medium
  7730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7732 <action>
  7733 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  7734 	<actiontype>DeriveKey</actiontype>
  7735 	<actionbody>
  7736 		<derivekey>
  7737 			<kdf>pkcs#12</kdf>
  7738 			<passwd>PSWD</passwd>
  7739 			<salt>53414C54</salt>
  7740 			<iterations>1</iterations>
  7741 			<key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB0959936E4C6D9ED338B321B97C02E22A12E67A249DF5FFBB5F09E01</key>
  7742 		</derivekey>
  7743 	</actionbody>
  7744 </action>
  7745 
  7746 //! @SYMTestCaseID CIT_PREQ1054_01
  7747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7748 //! @SYMREQ CIT_PREQ1054
  7749 //! @SYMTestPriority medium
  7750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7752 <action>
  7753 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  7754 	<actiontype>DeriveKey</actiontype>
  7755 	<actionbody>
  7756 		<derivekey>
  7757 			<kdf>pkcs#12</kdf>
  7758 			<passwd>password</passwd>
  7759 			<salt>53414C54</salt>
  7760 			<iterations>1</iterations>
  7761 			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C596AEC2CBF2648BC315B5422D9071708C31F2FCC6D7AC48ED63</key>
  7762 		</derivekey>
  7763 	</actionbody>
  7764 </action>
  7765 
  7766 //! @SYMTestCaseID CIT_PREQ1054_01
  7767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7768 //! @SYMREQ CIT_PREQ1054
  7769 //! @SYMTestPriority medium
  7770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7772 <action>
  7773 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  7774 	<actiontype>DeriveKey</actiontype>
  7775 	<actionbody>
  7776 		<derivekey>
  7777 			<kdf>pkcs#12</kdf>
  7778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7779 			<salt>53414C54</salt>
  7780 			<iterations>1</iterations>
  7781 			<key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A655F8AB429B72644AA7EE4C3FA31141DACFEB8D89E1825091F</key>
  7782 		</derivekey>
  7783 	</actionbody>
  7784 </action>
  7785 
  7786 //! @SYMTestCaseID CIT_PREQ1054_01
  7787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7788 //! @SYMREQ CIT_PREQ1054
  7789 //! @SYMTestPriority medium
  7790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7792 <action>
  7793 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  7794 	<actiontype>DeriveKey</actiontype>
  7795 	<actionbody>
  7796 		<derivekey>
  7797 			<kdf>pkcs#12</kdf>
  7798 			<passwd>0000</passwd>
  7799 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7800 			<iterations>1</iterations>
  7801 			<key>49CABE7B67736931126499722509C03D4BBEF714A80CCCCF475F4CA3FCBC217CAFA6AFF894CEA28E0DCD7B5A0D0D</key>
  7802 		</derivekey>
  7803 	</actionbody>
  7804 </action>
  7805 
  7806 //! @SYMTestCaseID CIT_PREQ1054_01
  7807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7808 //! @SYMREQ CIT_PREQ1054
  7809 //! @SYMTestPriority medium
  7810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7812 <action>
  7813 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  7814 	<actiontype>DeriveKey</actiontype>
  7815 	<actionbody>
  7816 		<derivekey>
  7817 			<kdf>pkcs#12</kdf>
  7818 			<passwd>0001</passwd>
  7819 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7820 			<iterations>1</iterations>
  7821 			<key>F994B990D3554AFB778C729E9BAA0CC6EB5BA765340999DE8474B918B754A380F8141A055CD68B85B4CDCC592ED9</key>
  7822 		</derivekey>
  7823 	</actionbody>
  7824 </action>
  7825 
  7826 //! @SYMTestCaseID CIT_PREQ1054_01
  7827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7828 //! @SYMREQ CIT_PREQ1054
  7829 //! @SYMTestPriority medium
  7830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7832 <action>
  7833 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  7834 	<actiontype>DeriveKey</actiontype>
  7835 	<actionbody>
  7836 		<derivekey>
  7837 			<kdf>pkcs#12</kdf>
  7838 			<passwd>PSWD</passwd>
  7839 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7840 			<iterations>1</iterations>
  7841 			<key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC0246300C1BDD916C1EF496E57D589FB2C357D7EF9142AB64B2E02</key>
  7842 		</derivekey>
  7843 	</actionbody>
  7844 </action>
  7845 
  7846 //! @SYMTestCaseID CIT_PREQ1054_01
  7847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7848 //! @SYMREQ CIT_PREQ1054
  7849 //! @SYMTestPriority medium
  7850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7852 <action>
  7853 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  7854 	<actiontype>DeriveKey</actiontype>
  7855 	<actionbody>
  7856 		<derivekey>
  7857 			<kdf>pkcs#12</kdf>
  7858 			<passwd>password</passwd>
  7859 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7860 			<iterations>1</iterations>
  7861 			<key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888F04507B6810813D6DDAF8E0257911B49AB5250127C50809B33</key>
  7862 		</derivekey>
  7863 	</actionbody>
  7864 </action>
  7865 
  7866 //! @SYMTestCaseID CIT_PREQ1054_01
  7867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7868 //! @SYMREQ CIT_PREQ1054
  7869 //! @SYMTestPriority medium
  7870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7872 <action>
  7873 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  7874 	<actiontype>DeriveKey</actiontype>
  7875 	<actionbody>
  7876 		<derivekey>
  7877 			<kdf>pkcs#12</kdf>
  7878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7879 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  7880 			<iterations>1</iterations>
  7881 			<key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B7984CFB3D568FE48E9F78B99EB8561E2F627E46D0EEECF491C</key>
  7882 		</derivekey>
  7883 	</actionbody>
  7884 </action>
  7885 
  7886 //! @SYMTestCaseID CIT_PREQ1054_01
  7887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7888 //! @SYMREQ CIT_PREQ1054
  7889 //! @SYMTestPriority medium
  7890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7892 <action>
  7893 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  7894 	<actiontype>DeriveKey</actiontype>
  7895 	<actionbody>
  7896 		<derivekey>
  7897 			<kdf>pkcs#12</kdf>
  7898 			<passwd>0000</passwd>
  7899 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7900 			<iterations>1</iterations>
  7901 			<key>90253A49C069E7FF35281461A4DDBE0BB38F4041A04FF42A617251CC66ED7314BFAF4CB2F47A98E42B8AA3BE142A</key>
  7902 		</derivekey>
  7903 	</actionbody>
  7904 </action>
  7905 
  7906 //! @SYMTestCaseID CIT_PREQ1054_01
  7907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7908 //! @SYMREQ CIT_PREQ1054
  7909 //! @SYMTestPriority medium
  7910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7912 <action>
  7913 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  7914 	<actiontype>DeriveKey</actiontype>
  7915 	<actionbody>
  7916 		<derivekey>
  7917 			<kdf>pkcs#12</kdf>
  7918 			<passwd>0001</passwd>
  7919 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7920 			<iterations>1</iterations>
  7921 			<key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8FA3F056762C96D7E119F68827FBFCC07B2A9E98238B52AA02B</key>
  7922 		</derivekey>
  7923 	</actionbody>
  7924 </action>
  7925 
  7926 //! @SYMTestCaseID CIT_PREQ1054_01
  7927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7928 //! @SYMREQ CIT_PREQ1054
  7929 //! @SYMTestPriority medium
  7930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7932 <action>
  7933 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  7934 	<actiontype>DeriveKey</actiontype>
  7935 	<actionbody>
  7936 		<derivekey>
  7937 			<kdf>pkcs#12</kdf>
  7938 			<passwd>PSWD</passwd>
  7939 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7940 			<iterations>1</iterations>
  7941 			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC812A4EEE1F3DE7E52EA6A981DB02085FC4AB4860E438EA50BC5</key>
  7942 		</derivekey>
  7943 	</actionbody>
  7944 </action>
  7945 
  7946 //! @SYMTestCaseID CIT_PREQ1054_01
  7947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7948 //! @SYMREQ CIT_PREQ1054
  7949 //! @SYMTestPriority medium
  7950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7952 <action>
  7953 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  7954 	<actiontype>DeriveKey</actiontype>
  7955 	<actionbody>
  7956 		<derivekey>
  7957 			<kdf>pkcs#12</kdf>
  7958 			<passwd>password</passwd>
  7959 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7960 			<iterations>1</iterations>
  7961 			<key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C19C126E28BC5C05064D38F67EF7A72A28795F0CFBA8574DA174</key>
  7962 		</derivekey>
  7963 	</actionbody>
  7964 </action>
  7965 
  7966 //! @SYMTestCaseID CIT_PREQ1054_01
  7967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7968 //! @SYMREQ CIT_PREQ1054
  7969 //! @SYMTestPriority medium
  7970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7972 <action>
  7973 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  7974 	<actiontype>DeriveKey</actiontype>
  7975 	<actionbody>
  7976 		<derivekey>
  7977 			<kdf>pkcs#12</kdf>
  7978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  7979 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  7980 			<iterations>1</iterations>
  7981 			<key>27476572AF26E99AB85CD350DC802ABA3A831332A7E037629B764434E2E02B5AB8E8A3DC181BBA3AD9AF9D7E8F08</key>
  7982 		</derivekey>
  7983 	</actionbody>
  7984 </action>
  7985 
  7986 //! @SYMTestCaseID CIT_PREQ1054_01
  7987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  7988 //! @SYMREQ CIT_PREQ1054
  7989 //! @SYMTestPriority medium
  7990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  7991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  7992 <action>
  7993 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  7994 	<actiontype>DeriveKey</actiontype>
  7995 	<actionbody>
  7996 		<derivekey>
  7997 			<kdf>pkcs#12</kdf>
  7998 			<passwd>0000</passwd>
  7999 			<salt>53414C54</salt>
  8000 			<iterations>2</iterations>
  8001 			<key>A1D9010A6761CB2675F1C33BB3C5215851703D0D2657B057B9372B986ABA327B6C8B8D4372656C74E9756C7C0C2C</key>
  8002 		</derivekey>
  8003 	</actionbody>
  8004 </action>
  8005 
  8006 //! @SYMTestCaseID CIT_PREQ1054_01
  8007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8008 //! @SYMREQ CIT_PREQ1054
  8009 //! @SYMTestPriority medium
  8010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8012 <action>
  8013 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8014 	<actiontype>DeriveKey</actiontype>
  8015 	<actionbody>
  8016 		<derivekey>
  8017 			<kdf>pkcs#12</kdf>
  8018 			<passwd>0001</passwd>
  8019 			<salt>53414C54</salt>
  8020 			<iterations>2</iterations>
  8021 			<key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47AC57D1E3FE07F2C194037B1CE0E18DE0CB8C335975EA51B037</key>
  8022 		</derivekey>
  8023 	</actionbody>
  8024 </action>
  8025 
  8026 //! @SYMTestCaseID CIT_PREQ1054_01
  8027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8028 //! @SYMREQ CIT_PREQ1054
  8029 //! @SYMTestPriority medium
  8030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8032 <action>
  8033 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8034 	<actiontype>DeriveKey</actiontype>
  8035 	<actionbody>
  8036 		<derivekey>
  8037 			<kdf>pkcs#12</kdf>
  8038 			<passwd>PSWD</passwd>
  8039 			<salt>53414C54</salt>
  8040 			<iterations>2</iterations>
  8041 			<key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE332D3AB8A36EE0DC8F1B7E691D2FA8BCCC2C7C371639EBA5CC6</key>
  8042 		</derivekey>
  8043 	</actionbody>
  8044 </action>
  8045 
  8046 //! @SYMTestCaseID CIT_PREQ1054_01
  8047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8048 //! @SYMREQ CIT_PREQ1054
  8049 //! @SYMTestPriority medium
  8050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8052 <action>
  8053 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8054 	<actiontype>DeriveKey</actiontype>
  8055 	<actionbody>
  8056 		<derivekey>
  8057 			<kdf>pkcs#12</kdf>
  8058 			<passwd>password</passwd>
  8059 			<salt>53414C54</salt>
  8060 			<iterations>2</iterations>
  8061 			<key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A0EC11A60E916ADAD62C57711E88134D3451CEE8640938390E9</key>
  8062 		</derivekey>
  8063 	</actionbody>
  8064 </action>
  8065 
  8066 //! @SYMTestCaseID CIT_PREQ1054_01
  8067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8068 //! @SYMREQ CIT_PREQ1054
  8069 //! @SYMTestPriority medium
  8070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8072 <action>
  8073 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8074 	<actiontype>DeriveKey</actiontype>
  8075 	<actionbody>
  8076 		<derivekey>
  8077 			<kdf>pkcs#12</kdf>
  8078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8079 			<salt>53414C54</salt>
  8080 			<iterations>2</iterations>
  8081 			<key>5BF185C726EE2182888A834066C30BA92C0A6A140FD09995773E708440FF38F65CBF71E7449EF43ADDDDCCEE7B63</key>
  8082 		</derivekey>
  8083 	</actionbody>
  8084 </action>
  8085 
  8086 //! @SYMTestCaseID CIT_PREQ1054_01
  8087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8088 //! @SYMREQ CIT_PREQ1054
  8089 //! @SYMTestPriority medium
  8090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8092 <action>
  8093 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8094 	<actiontype>DeriveKey</actiontype>
  8095 	<actionbody>
  8096 		<derivekey>
  8097 			<kdf>pkcs#12</kdf>
  8098 			<passwd>0000</passwd>
  8099 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8100 			<iterations>2</iterations>
  8101 			<key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734423A7247E5DFD46D2CE07E64F4F881362C98992B188EDE499D</key>
  8102 		</derivekey>
  8103 	</actionbody>
  8104 </action>
  8105 
  8106 //! @SYMTestCaseID CIT_PREQ1054_01
  8107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8108 //! @SYMREQ CIT_PREQ1054
  8109 //! @SYMTestPriority medium
  8110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8112 <action>
  8113 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8114 	<actiontype>DeriveKey</actiontype>
  8115 	<actionbody>
  8116 		<derivekey>
  8117 			<kdf>pkcs#12</kdf>
  8118 			<passwd>0001</passwd>
  8119 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8120 			<iterations>2</iterations>
  8121 			<key>63E6DF459C899D72577C20FFE4F27670F3A85EA780B450C711D83FB12C0B0A0539209B1B06AF82EE392AB3FD6A6B</key>
  8122 		</derivekey>
  8123 	</actionbody>
  8124 </action>
  8125 
  8126 //! @SYMTestCaseID CIT_PREQ1054_01
  8127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8128 //! @SYMREQ CIT_PREQ1054
  8129 //! @SYMTestPriority medium
  8130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8132 <action>
  8133 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8134 	<actiontype>DeriveKey</actiontype>
  8135 	<actionbody>
  8136 		<derivekey>
  8137 			<kdf>pkcs#12</kdf>
  8138 			<passwd>PSWD</passwd>
  8139 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8140 			<iterations>2</iterations>
  8141 			<key>C2099204ABFBB841875BD7595A89D31A9D03A34B94D3ED582C55B0787E2FB841ADE1E6171D6FE2BDDB19A658F552</key>
  8142 		</derivekey>
  8143 	</actionbody>
  8144 </action>
  8145 
  8146 //! @SYMTestCaseID CIT_PREQ1054_01
  8147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8148 //! @SYMREQ CIT_PREQ1054
  8149 //! @SYMTestPriority medium
  8150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8152 <action>
  8153 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8154 	<actiontype>DeriveKey</actiontype>
  8155 	<actionbody>
  8156 		<derivekey>
  8157 			<kdf>pkcs#12</kdf>
  8158 			<passwd>password</passwd>
  8159 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8160 			<iterations>2</iterations>
  8161 			<key>3204D28A32DF299B612958906C79154AED69D3F1C0351B1A4B4E2DCA7E93F3CAD92714CC9E13CCD0E95A305EBB13</key>
  8162 		</derivekey>
  8163 	</actionbody>
  8164 </action>
  8165 
  8166 //! @SYMTestCaseID CIT_PREQ1054_01
  8167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8168 //! @SYMREQ CIT_PREQ1054
  8169 //! @SYMTestPriority medium
  8170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8172 <action>
  8173 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8174 	<actiontype>DeriveKey</actiontype>
  8175 	<actionbody>
  8176 		<derivekey>
  8177 			<kdf>pkcs#12</kdf>
  8178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8179 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8180 			<iterations>2</iterations>
  8181 			<key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04873EC243829CE9F83DE277AEC92B18D43211D6DAC966AFFFE8</key>
  8182 		</derivekey>
  8183 	</actionbody>
  8184 </action>
  8185 
  8186 //! @SYMTestCaseID CIT_PREQ1054_01
  8187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8188 //! @SYMREQ CIT_PREQ1054
  8189 //! @SYMTestPriority medium
  8190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8192 <action>
  8193 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8194 	<actiontype>DeriveKey</actiontype>
  8195 	<actionbody>
  8196 		<derivekey>
  8197 			<kdf>pkcs#12</kdf>
  8198 			<passwd>0000</passwd>
  8199 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8200 			<iterations>2</iterations>
  8201 			<key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11162299D91EC09517DEACB6C8992D8D1952B9410AED287F9387</key>
  8202 		</derivekey>
  8203 	</actionbody>
  8204 </action>
  8205 
  8206 //! @SYMTestCaseID CIT_PREQ1054_01
  8207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8208 //! @SYMREQ CIT_PREQ1054
  8209 //! @SYMTestPriority medium
  8210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8212 <action>
  8213 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8214 	<actiontype>DeriveKey</actiontype>
  8215 	<actionbody>
  8216 		<derivekey>
  8217 			<kdf>pkcs#12</kdf>
  8218 			<passwd>0001</passwd>
  8219 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8220 			<iterations>2</iterations>
  8221 			<key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC49A6C7BD0A735DBA22FCBC56A6AACAA2ECE7F146A54C7442A7</key>
  8222 		</derivekey>
  8223 	</actionbody>
  8224 </action>
  8225 
  8226 //! @SYMTestCaseID CIT_PREQ1054_01
  8227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8228 //! @SYMREQ CIT_PREQ1054
  8229 //! @SYMTestPriority medium
  8230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8232 <action>
  8233 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8234 	<actiontype>DeriveKey</actiontype>
  8235 	<actionbody>
  8236 		<derivekey>
  8237 			<kdf>pkcs#12</kdf>
  8238 			<passwd>PSWD</passwd>
  8239 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8240 			<iterations>2</iterations>
  8241 			<key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F41D1179DBADD72CF7CC8A3F03118C5EF87C588C6665E942158</key>
  8242 		</derivekey>
  8243 	</actionbody>
  8244 </action>
  8245 
  8246 //! @SYMTestCaseID CIT_PREQ1054_01
  8247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8248 //! @SYMREQ CIT_PREQ1054
  8249 //! @SYMTestPriority medium
  8250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8252 <action>
  8253 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8254 	<actiontype>DeriveKey</actiontype>
  8255 	<actionbody>
  8256 		<derivekey>
  8257 			<kdf>pkcs#12</kdf>
  8258 			<passwd>password</passwd>
  8259 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8260 			<iterations>2</iterations>
  8261 			<key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDFE51188263603019F80688985DB1EF389A8F2CADA47463756C7</key>
  8262 		</derivekey>
  8263 	</actionbody>
  8264 </action>
  8265 
  8266 //! @SYMTestCaseID CIT_PREQ1054_01
  8267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8268 //! @SYMREQ CIT_PREQ1054
  8269 //! @SYMTestPriority medium
  8270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8272 <action>
  8273 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8274 	<actiontype>DeriveKey</actiontype>
  8275 	<actionbody>
  8276 		<derivekey>
  8277 			<kdf>pkcs#12</kdf>
  8278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8279 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8280 			<iterations>2</iterations>
  8281 			<key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647451A53DE6218B8B2F860931DE8975712EAC7CAF34347828525</key>
  8282 		</derivekey>
  8283 	</actionbody>
  8284 </action>
  8285 
  8286 //! @SYMTestCaseID CIT_PREQ1054_01
  8287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8288 //! @SYMREQ CIT_PREQ1054
  8289 //! @SYMTestPriority medium
  8290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8292 <action>
  8293 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8294 	<actiontype>DeriveKey</actiontype>
  8295 	<actionbody>
  8296 		<derivekey>
  8297 			<kdf>pkcs#12</kdf>
  8298 			<passwd>0000</passwd>
  8299 			<salt>53414C54</salt>
  8300 			<iterations>4</iterations>
  8301 			<key>D0158BFC57E643965DC161741725CE9478CDF2A0B52A78253F32B2DFCC2228C929F19663EC3AF4B6B3B4A514D2AE</key>
  8302 		</derivekey>
  8303 	</actionbody>
  8304 </action>
  8305 
  8306 //! @SYMTestCaseID CIT_PREQ1054_01
  8307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8308 //! @SYMREQ CIT_PREQ1054
  8309 //! @SYMTestPriority medium
  8310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8312 <action>
  8313 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8314 	<actiontype>DeriveKey</actiontype>
  8315 	<actionbody>
  8316 		<derivekey>
  8317 			<kdf>pkcs#12</kdf>
  8318 			<passwd>0001</passwd>
  8319 			<salt>53414C54</salt>
  8320 			<iterations>4</iterations>
  8321 			<key>AEB6CD53F0D6830161100C4BFD439B341066339A0025D3CF7DC68CEE4D9AC92B10B29EB19973637D27DC2C9BF911</key>
  8322 		</derivekey>
  8323 	</actionbody>
  8324 </action>
  8325 
  8326 //! @SYMTestCaseID CIT_PREQ1054_01
  8327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8328 //! @SYMREQ CIT_PREQ1054
  8329 //! @SYMTestPriority medium
  8330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8332 <action>
  8333 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8334 	<actiontype>DeriveKey</actiontype>
  8335 	<actionbody>
  8336 		<derivekey>
  8337 			<kdf>pkcs#12</kdf>
  8338 			<passwd>PSWD</passwd>
  8339 			<salt>53414C54</salt>
  8340 			<iterations>4</iterations>
  8341 			<key>80010C12B66CC739F4ACF8BB154197709F78AAD39ABC8EEC11F7C88CD138DE85A21B5D5DCB9C8E50E0AFABE82149</key>
  8342 		</derivekey>
  8343 	</actionbody>
  8344 </action>
  8345 
  8346 //! @SYMTestCaseID CIT_PREQ1054_01
  8347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8348 //! @SYMREQ CIT_PREQ1054
  8349 //! @SYMTestPriority medium
  8350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8352 <action>
  8353 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8354 	<actiontype>DeriveKey</actiontype>
  8355 	<actionbody>
  8356 		<derivekey>
  8357 			<kdf>pkcs#12</kdf>
  8358 			<passwd>password</passwd>
  8359 			<salt>53414C54</salt>
  8360 			<iterations>4</iterations>
  8361 			<key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812046A01A53F6FB1C9051ED917D0B3C08A82CADA712730DD2410</key>
  8362 		</derivekey>
  8363 	</actionbody>
  8364 </action>
  8365 
  8366 //! @SYMTestCaseID CIT_PREQ1054_01
  8367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8368 //! @SYMREQ CIT_PREQ1054
  8369 //! @SYMTestPriority medium
  8370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8372 <action>
  8373 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8374 	<actiontype>DeriveKey</actiontype>
  8375 	<actionbody>
  8376 		<derivekey>
  8377 			<kdf>pkcs#12</kdf>
  8378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8379 			<salt>53414C54</salt>
  8380 			<iterations>4</iterations>
  8381 			<key>146C6A5B58AF8561220DE4C13A133248300D59D39E22569CC568CB98585324F9287A672ABFCDF360A26B8B83D1AE</key>
  8382 		</derivekey>
  8383 	</actionbody>
  8384 </action>
  8385 
  8386 //! @SYMTestCaseID CIT_PREQ1054_01
  8387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8388 //! @SYMREQ CIT_PREQ1054
  8389 //! @SYMTestPriority medium
  8390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8392 <action>
  8393 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8394 	<actiontype>DeriveKey</actiontype>
  8395 	<actionbody>
  8396 		<derivekey>
  8397 			<kdf>pkcs#12</kdf>
  8398 			<passwd>0000</passwd>
  8399 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8400 			<iterations>4</iterations>
  8401 			<key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE22F0030D6D6FBF85D6A56D7D55A3002233181BCC2A0C4108C8</key>
  8402 		</derivekey>
  8403 	</actionbody>
  8404 </action>
  8405 
  8406 //! @SYMTestCaseID CIT_PREQ1054_01
  8407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8408 //! @SYMREQ CIT_PREQ1054
  8409 //! @SYMTestPriority medium
  8410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8412 <action>
  8413 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8414 	<actiontype>DeriveKey</actiontype>
  8415 	<actionbody>
  8416 		<derivekey>
  8417 			<kdf>pkcs#12</kdf>
  8418 			<passwd>0001</passwd>
  8419 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8420 			<iterations>4</iterations>
  8421 			<key>23930713772E26DBBABB53F3C5C775019B8048482B6FECC40729F2D5023D6F3C27092166E11A435738C3E0DBF7B0</key>
  8422 		</derivekey>
  8423 	</actionbody>
  8424 </action>
  8425 
  8426 //! @SYMTestCaseID CIT_PREQ1054_01
  8427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8428 //! @SYMREQ CIT_PREQ1054
  8429 //! @SYMTestPriority medium
  8430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8432 <action>
  8433 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8434 	<actiontype>DeriveKey</actiontype>
  8435 	<actionbody>
  8436 		<derivekey>
  8437 			<kdf>pkcs#12</kdf>
  8438 			<passwd>PSWD</passwd>
  8439 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8440 			<iterations>4</iterations>
  8441 			<key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A93D6A3DD0A61826365407B4C1CBB589C0BC10EC8B510A83771</key>
  8442 		</derivekey>
  8443 	</actionbody>
  8444 </action>
  8445 
  8446 //! @SYMTestCaseID CIT_PREQ1054_01
  8447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8448 //! @SYMREQ CIT_PREQ1054
  8449 //! @SYMTestPriority medium
  8450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8452 <action>
  8453 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8454 	<actiontype>DeriveKey</actiontype>
  8455 	<actionbody>
  8456 		<derivekey>
  8457 			<kdf>pkcs#12</kdf>
  8458 			<passwd>password</passwd>
  8459 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8460 			<iterations>4</iterations>
  8461 			<key>363619530B170B7BAE1C046B29351C235B8EFED58879EAB2DAF93502D254C5569C2667F16B2AA036619AAF4D8E33</key>
  8462 		</derivekey>
  8463 	</actionbody>
  8464 </action>
  8465 
  8466 //! @SYMTestCaseID CIT_PREQ1054_01
  8467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8468 //! @SYMREQ CIT_PREQ1054
  8469 //! @SYMTestPriority medium
  8470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8472 <action>
  8473 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8474 	<actiontype>DeriveKey</actiontype>
  8475 	<actionbody>
  8476 		<derivekey>
  8477 			<kdf>pkcs#12</kdf>
  8478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8479 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8480 			<iterations>4</iterations>
  8481 			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4EFF6FE83AD6ED83E4F217EF7E0C6727BEF0614398026907E7E6</key>
  8482 		</derivekey>
  8483 	</actionbody>
  8484 </action>
  8485 
  8486 //! @SYMTestCaseID CIT_PREQ1054_01
  8487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8488 //! @SYMREQ CIT_PREQ1054
  8489 //! @SYMTestPriority medium
  8490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8492 <action>
  8493 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8494 	<actiontype>DeriveKey</actiontype>
  8495 	<actionbody>
  8496 		<derivekey>
  8497 			<kdf>pkcs#12</kdf>
  8498 			<passwd>0000</passwd>
  8499 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8500 			<iterations>4</iterations>
  8501 			<key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0EA1D3AB1983B1E0496EB6FD7259774354267B1976BE459A1D23</key>
  8502 		</derivekey>
  8503 	</actionbody>
  8504 </action>
  8505 
  8506 //! @SYMTestCaseID CIT_PREQ1054_01
  8507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8508 //! @SYMREQ CIT_PREQ1054
  8509 //! @SYMTestPriority medium
  8510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8512 <action>
  8513 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8514 	<actiontype>DeriveKey</actiontype>
  8515 	<actionbody>
  8516 		<derivekey>
  8517 			<kdf>pkcs#12</kdf>
  8518 			<passwd>0001</passwd>
  8519 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8520 			<iterations>4</iterations>
  8521 			<key>9A618595C714486B7D7E3120005C8BC18D5D95D79B54DE1063C64DBE97C41BFC6A4A5239B77F2F603C7AFE06247C</key>
  8522 		</derivekey>
  8523 	</actionbody>
  8524 </action>
  8525 
  8526 //! @SYMTestCaseID CIT_PREQ1054_01
  8527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8528 //! @SYMREQ CIT_PREQ1054
  8529 //! @SYMTestPriority medium
  8530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8532 <action>
  8533 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8534 	<actiontype>DeriveKey</actiontype>
  8535 	<actionbody>
  8536 		<derivekey>
  8537 			<kdf>pkcs#12</kdf>
  8538 			<passwd>PSWD</passwd>
  8539 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8540 			<iterations>4</iterations>
  8541 			<key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208FA46F3C504ABA355D99FE3A4291DBAB83CB6980CD28C153D24</key>
  8542 		</derivekey>
  8543 	</actionbody>
  8544 </action>
  8545 
  8546 //! @SYMTestCaseID CIT_PREQ1054_01
  8547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8548 //! @SYMREQ CIT_PREQ1054
  8549 //! @SYMTestPriority medium
  8550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8552 <action>
  8553 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8554 	<actiontype>DeriveKey</actiontype>
  8555 	<actionbody>
  8556 		<derivekey>
  8557 			<kdf>pkcs#12</kdf>
  8558 			<passwd>password</passwd>
  8559 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8560 			<iterations>4</iterations>
  8561 			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2F2B76DBC180C689C88147F5366D48C10086AD45B445F818F22</key>
  8562 		</derivekey>
  8563 	</actionbody>
  8564 </action>
  8565 
  8566 //! @SYMTestCaseID CIT_PREQ1054_01
  8567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8568 //! @SYMREQ CIT_PREQ1054
  8569 //! @SYMTestPriority medium
  8570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8572 <action>
  8573 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8574 	<actiontype>DeriveKey</actiontype>
  8575 	<actionbody>
  8576 		<derivekey>
  8577 			<kdf>pkcs#12</kdf>
  8578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8579 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8580 			<iterations>4</iterations>
  8581 			<key>91DF3661364A0DAD28180A41ADCB55676E992986EFCD5481A7EBCCA45806E087BB95BAEFD24685A7D9B08426EFCF</key>
  8582 		</derivekey>
  8583 	</actionbody>
  8584 </action>
  8585 
  8586 //! @SYMTestCaseID CIT_PREQ1054_01
  8587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8588 //! @SYMREQ CIT_PREQ1054
  8589 //! @SYMTestPriority medium
  8590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8592 <action>
  8593 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8594 	<actiontype>DeriveKey</actiontype>
  8595 	<actionbody>
  8596 		<derivekey>
  8597 			<kdf>pkcs#12</kdf>
  8598 			<passwd>0000</passwd>
  8599 			<salt>53414C54</salt>
  8600 			<iterations>8</iterations>
  8601 			<key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE4612564ECF299468389BF3597B38FF0ADB79AE9A718D7FC5E0D7E</key>
  8602 		</derivekey>
  8603 	</actionbody>
  8604 </action>
  8605 
  8606 //! @SYMTestCaseID CIT_PREQ1054_01
  8607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8608 //! @SYMREQ CIT_PREQ1054
  8609 //! @SYMTestPriority medium
  8610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8612 <action>
  8613 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8614 	<actiontype>DeriveKey</actiontype>
  8615 	<actionbody>
  8616 		<derivekey>
  8617 			<kdf>pkcs#12</kdf>
  8618 			<passwd>0001</passwd>
  8619 			<salt>53414C54</salt>
  8620 			<iterations>8</iterations>
  8621 			<key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1CD2460647D83960A81A688C1E7C3CB1745C640F96CA26BAB55</key>
  8622 		</derivekey>
  8623 	</actionbody>
  8624 </action>
  8625 
  8626 //! @SYMTestCaseID CIT_PREQ1054_01
  8627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8628 //! @SYMREQ CIT_PREQ1054
  8629 //! @SYMTestPriority medium
  8630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8632 <action>
  8633 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8634 	<actiontype>DeriveKey</actiontype>
  8635 	<actionbody>
  8636 		<derivekey>
  8637 			<kdf>pkcs#12</kdf>
  8638 			<passwd>PSWD</passwd>
  8639 			<salt>53414C54</salt>
  8640 			<iterations>8</iterations>
  8641 			<key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466B5176BC31A916229C8DC27918BEAC1912CCD1BEDD4D9AC6F7F</key>
  8642 		</derivekey>
  8643 	</actionbody>
  8644 </action>
  8645 
  8646 //! @SYMTestCaseID CIT_PREQ1054_01
  8647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8648 //! @SYMREQ CIT_PREQ1054
  8649 //! @SYMTestPriority medium
  8650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8652 <action>
  8653 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8654 	<actiontype>DeriveKey</actiontype>
  8655 	<actionbody>
  8656 		<derivekey>
  8657 			<kdf>pkcs#12</kdf>
  8658 			<passwd>password</passwd>
  8659 			<salt>53414C54</salt>
  8660 			<iterations>8</iterations>
  8661 			<key>B0935F11227F5A473073DCD188886687D2A18119532A1D5D0A8631441599FF319BD921404D04DA973217A199F621</key>
  8662 		</derivekey>
  8663 	</actionbody>
  8664 </action>
  8665 
  8666 //! @SYMTestCaseID CIT_PREQ1054_01
  8667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8668 //! @SYMREQ CIT_PREQ1054
  8669 //! @SYMTestPriority medium
  8670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8672 <action>
  8673 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8674 	<actiontype>DeriveKey</actiontype>
  8675 	<actionbody>
  8676 		<derivekey>
  8677 			<kdf>pkcs#12</kdf>
  8678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8679 			<salt>53414C54</salt>
  8680 			<iterations>8</iterations>
  8681 			<key>6602B1B4BBB670208041ECD8E1634845FC0DC28532AF24AA6CB93368E87126BC821DB7B3F4301455B454E9715981</key>
  8682 		</derivekey>
  8683 	</actionbody>
  8684 </action>
  8685 
  8686 //! @SYMTestCaseID CIT_PREQ1054_01
  8687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8688 //! @SYMREQ CIT_PREQ1054
  8689 //! @SYMTestPriority medium
  8690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8692 <action>
  8693 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8694 	<actiontype>DeriveKey</actiontype>
  8695 	<actionbody>
  8696 		<derivekey>
  8697 			<kdf>pkcs#12</kdf>
  8698 			<passwd>0000</passwd>
  8699 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8700 			<iterations>8</iterations>
  8701 			<key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E449B3AFB8236BFFDF548BA07B6269CB5C0D0E0E00AABB5E872F7</key>
  8702 		</derivekey>
  8703 	</actionbody>
  8704 </action>
  8705 
  8706 //! @SYMTestCaseID CIT_PREQ1054_01
  8707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8708 //! @SYMREQ CIT_PREQ1054
  8709 //! @SYMTestPriority medium
  8710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8712 <action>
  8713 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8714 	<actiontype>DeriveKey</actiontype>
  8715 	<actionbody>
  8716 		<derivekey>
  8717 			<kdf>pkcs#12</kdf>
  8718 			<passwd>0001</passwd>
  8719 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8720 			<iterations>8</iterations>
  8721 			<key>6473EB1244E055149E0858C49FAE7B8DC951E7E32AC2AA2146482717104D3E93074D41BCA226B3212A41E4EC0F00</key>
  8722 		</derivekey>
  8723 	</actionbody>
  8724 </action>
  8725 
  8726 //! @SYMTestCaseID CIT_PREQ1054_01
  8727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8728 //! @SYMREQ CIT_PREQ1054
  8729 //! @SYMTestPriority medium
  8730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8732 <action>
  8733 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8734 	<actiontype>DeriveKey</actiontype>
  8735 	<actionbody>
  8736 		<derivekey>
  8737 			<kdf>pkcs#12</kdf>
  8738 			<passwd>PSWD</passwd>
  8739 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8740 			<iterations>8</iterations>
  8741 			<key>AA762B8736D4C37BAD263103CA283E09010B7EFC538B44C6C3CB724C8CEC28C91F57A2778A8C74CBBF00A63D6875</key>
  8742 		</derivekey>
  8743 	</actionbody>
  8744 </action>
  8745 
  8746 //! @SYMTestCaseID CIT_PREQ1054_01
  8747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8748 //! @SYMREQ CIT_PREQ1054
  8749 //! @SYMTestPriority medium
  8750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8752 <action>
  8753 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8754 	<actiontype>DeriveKey</actiontype>
  8755 	<actionbody>
  8756 		<derivekey>
  8757 			<kdf>pkcs#12</kdf>
  8758 			<passwd>password</passwd>
  8759 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8760 			<iterations>8</iterations>
  8761 			<key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D88232044436DA8D74F09E19B578C65F8629D022FD8D529F11E2</key>
  8762 		</derivekey>
  8763 	</actionbody>
  8764 </action>
  8765 
  8766 //! @SYMTestCaseID CIT_PREQ1054_01
  8767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8768 //! @SYMREQ CIT_PREQ1054
  8769 //! @SYMTestPriority medium
  8770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8772 <action>
  8773 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8774 	<actiontype>DeriveKey</actiontype>
  8775 	<actionbody>
  8776 		<derivekey>
  8777 			<kdf>pkcs#12</kdf>
  8778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8779 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  8780 			<iterations>8</iterations>
  8781 			<key>935593CA370BB6988F2F41D2F4ABF56E433064D83E5C5C9892BDB854C8219FFBC1404D590450B1613EB0D2CC0447</key>
  8782 		</derivekey>
  8783 	</actionbody>
  8784 </action>
  8785 
  8786 //! @SYMTestCaseID CIT_PREQ1054_01
  8787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8788 //! @SYMREQ CIT_PREQ1054
  8789 //! @SYMTestPriority medium
  8790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8792 <action>
  8793 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8794 	<actiontype>DeriveKey</actiontype>
  8795 	<actionbody>
  8796 		<derivekey>
  8797 			<kdf>pkcs#12</kdf>
  8798 			<passwd>0000</passwd>
  8799 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8800 			<iterations>8</iterations>
  8801 			<key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BFCE80BAAFDC06F9C1D1A2862C10203D891E0B2C23F5394ED271</key>
  8802 		</derivekey>
  8803 	</actionbody>
  8804 </action>
  8805 
  8806 //! @SYMTestCaseID CIT_PREQ1054_01
  8807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8808 //! @SYMREQ CIT_PREQ1054
  8809 //! @SYMTestPriority medium
  8810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8812 <action>
  8813 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8814 	<actiontype>DeriveKey</actiontype>
  8815 	<actionbody>
  8816 		<derivekey>
  8817 			<kdf>pkcs#12</kdf>
  8818 			<passwd>0001</passwd>
  8819 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8820 			<iterations>8</iterations>
  8821 			<key>82B4A13659033EA4025DB51A6CB573F93B03A69634D71DFB7E270A406AF705382CCA3BB17F29C88ED81EA583AFF5</key>
  8822 		</derivekey>
  8823 	</actionbody>
  8824 </action>
  8825 
  8826 //! @SYMTestCaseID CIT_PREQ1054_01
  8827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8828 //! @SYMREQ CIT_PREQ1054
  8829 //! @SYMTestPriority medium
  8830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8832 <action>
  8833 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8834 	<actiontype>DeriveKey</actiontype>
  8835 	<actionbody>
  8836 		<derivekey>
  8837 			<kdf>pkcs#12</kdf>
  8838 			<passwd>PSWD</passwd>
  8839 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8840 			<iterations>8</iterations>
  8841 			<key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94047C10AE3CA2853B57E8E59A819DE9BB2D4F3BFBD302F978C7</key>
  8842 		</derivekey>
  8843 	</actionbody>
  8844 </action>
  8845 
  8846 //! @SYMTestCaseID CIT_PREQ1054_01
  8847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8848 //! @SYMREQ CIT_PREQ1054
  8849 //! @SYMTestPriority medium
  8850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8852 <action>
  8853 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8854 	<actiontype>DeriveKey</actiontype>
  8855 	<actionbody>
  8856 		<derivekey>
  8857 			<kdf>pkcs#12</kdf>
  8858 			<passwd>password</passwd>
  8859 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8860 			<iterations>8</iterations>
  8861 			<key>5670457314E405B0ED1583FC4B82FEAD94B434EBEDD86DFBC39161A8A7E48CAD3591C2C9A14FAA242D860ED55163</key>
  8862 		</derivekey>
  8863 	</actionbody>
  8864 </action>
  8865 
  8866 //! @SYMTestCaseID CIT_PREQ1054_01
  8867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8868 //! @SYMREQ CIT_PREQ1054
  8869 //! @SYMTestPriority medium
  8870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8872 <action>
  8873 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  8874 	<actiontype>DeriveKey</actiontype>
  8875 	<actionbody>
  8876 		<derivekey>
  8877 			<kdf>pkcs#12</kdf>
  8878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8879 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  8880 			<iterations>8</iterations>
  8881 			<key>1C4CAE25146D74F3762B5C3FD3A917522564855675801D9D7D946C11B6F57C42C2E7447F8CACF4178D8F7A001A18</key>
  8882 		</derivekey>
  8883 	</actionbody>
  8884 </action>
  8885 
  8886 //! @SYMTestCaseID CIT_PREQ1054_01
  8887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8888 //! @SYMREQ CIT_PREQ1054
  8889 //! @SYMTestPriority medium
  8890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8892 <action>
  8893 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8894 	<actiontype>DeriveKey</actiontype>
  8895 	<actionbody>
  8896 		<derivekey>
  8897 			<kdf>pkcs#12</kdf>
  8898 			<passwd>0000</passwd>
  8899 			<salt>53414C54</salt>
  8900 			<iterations>128</iterations>
  8901 			<key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93AF1D5E01AB3B9973959193DE7A2433CB46A8A15F2D84D97DBC</key>
  8902 		</derivekey>
  8903 	</actionbody>
  8904 </action>
  8905 
  8906 //! @SYMTestCaseID CIT_PREQ1054_01
  8907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8908 //! @SYMREQ CIT_PREQ1054
  8909 //! @SYMTestPriority medium
  8910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8912 <action>
  8913 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8914 	<actiontype>DeriveKey</actiontype>
  8915 	<actionbody>
  8916 		<derivekey>
  8917 			<kdf>pkcs#12</kdf>
  8918 			<passwd>0001</passwd>
  8919 			<salt>53414C54</salt>
  8920 			<iterations>128</iterations>
  8921 			<key>C89C3A2C9C06626EB831F4BB5262809B9C138181C44B6D521245B6BBDBE2271369C6B77EC12626368DFCEB358BB8</key>
  8922 		</derivekey>
  8923 	</actionbody>
  8924 </action>
  8925 
  8926 //! @SYMTestCaseID CIT_PREQ1054_01
  8927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8928 //! @SYMREQ CIT_PREQ1054
  8929 //! @SYMTestPriority medium
  8930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8932 <action>
  8933 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8934 	<actiontype>DeriveKey</actiontype>
  8935 	<actionbody>
  8936 		<derivekey>
  8937 			<kdf>pkcs#12</kdf>
  8938 			<passwd>PSWD</passwd>
  8939 			<salt>53414C54</salt>
  8940 			<iterations>128</iterations>
  8941 			<key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EEE6D0B4E9C0A5EBBFF08FC23CB11E1DB17EBAE6A93C2DA749A6</key>
  8942 		</derivekey>
  8943 	</actionbody>
  8944 </action>
  8945 
  8946 //! @SYMTestCaseID CIT_PREQ1054_01
  8947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8948 //! @SYMREQ CIT_PREQ1054
  8949 //! @SYMTestPriority medium
  8950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8952 <action>
  8953 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8954 	<actiontype>DeriveKey</actiontype>
  8955 	<actionbody>
  8956 		<derivekey>
  8957 			<kdf>pkcs#12</kdf>
  8958 			<passwd>password</passwd>
  8959 			<salt>53414C54</salt>
  8960 			<iterations>128</iterations>
  8961 			<key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C2011A3B26BD1C95A8797741938D8E3F2057F76B04310B3D922</key>
  8962 		</derivekey>
  8963 	</actionbody>
  8964 </action>
  8965 
  8966 //! @SYMTestCaseID CIT_PREQ1054_01
  8967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8968 //! @SYMREQ CIT_PREQ1054
  8969 //! @SYMTestPriority medium
  8970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8972 <action>
  8973 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  8974 	<actiontype>DeriveKey</actiontype>
  8975 	<actionbody>
  8976 		<derivekey>
  8977 			<kdf>pkcs#12</kdf>
  8978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  8979 			<salt>53414C54</salt>
  8980 			<iterations>128</iterations>
  8981 			<key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F97A6D3BDA02B3173244164AAE9123987A00699B74F042C35DC</key>
  8982 		</derivekey>
  8983 	</actionbody>
  8984 </action>
  8985 
  8986 //! @SYMTestCaseID CIT_PREQ1054_01
  8987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  8988 //! @SYMREQ CIT_PREQ1054
  8989 //! @SYMTestPriority medium
  8990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  8991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  8992 <action>
  8993 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  8994 	<actiontype>DeriveKey</actiontype>
  8995 	<actionbody>
  8996 		<derivekey>
  8997 			<kdf>pkcs#12</kdf>
  8998 			<passwd>0000</passwd>
  8999 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9000 			<iterations>128</iterations>
  9001 			<key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD8D380FA3C08389E335A71B575F3D48228119EA2E34351C7E51</key>
  9002 		</derivekey>
  9003 	</actionbody>
  9004 </action>
  9005 
  9006 //! @SYMTestCaseID CIT_PREQ1054_01
  9007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9008 //! @SYMREQ CIT_PREQ1054
  9009 //! @SYMTestPriority medium
  9010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9012 <action>
  9013 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9014 	<actiontype>DeriveKey</actiontype>
  9015 	<actionbody>
  9016 		<derivekey>
  9017 			<kdf>pkcs#12</kdf>
  9018 			<passwd>0001</passwd>
  9019 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9020 			<iterations>128</iterations>
  9021 			<key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3FD6375B5D9AB89DDA3B28526392E1BED3594C3A22594137133</key>
  9022 		</derivekey>
  9023 	</actionbody>
  9024 </action>
  9025 
  9026 //! @SYMTestCaseID CIT_PREQ1054_01
  9027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9028 //! @SYMREQ CIT_PREQ1054
  9029 //! @SYMTestPriority medium
  9030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9032 <action>
  9033 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9034 	<actiontype>DeriveKey</actiontype>
  9035 	<actionbody>
  9036 		<derivekey>
  9037 			<kdf>pkcs#12</kdf>
  9038 			<passwd>PSWD</passwd>
  9039 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9040 			<iterations>128</iterations>
  9041 			<key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF6F15DAE903AEAA4C8A9A23B8DA9E91293F5ED1904E6D8F8ED5</key>
  9042 		</derivekey>
  9043 	</actionbody>
  9044 </action>
  9045 
  9046 //! @SYMTestCaseID CIT_PREQ1054_01
  9047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9048 //! @SYMREQ CIT_PREQ1054
  9049 //! @SYMTestPriority medium
  9050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9052 <action>
  9053 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9054 	<actiontype>DeriveKey</actiontype>
  9055 	<actionbody>
  9056 		<derivekey>
  9057 			<kdf>pkcs#12</kdf>
  9058 			<passwd>password</passwd>
  9059 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9060 			<iterations>128</iterations>
  9061 			<key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3483C97430FABCCAB60A1F471741095AEB2B22B00951CEFB816</key>
  9062 		</derivekey>
  9063 	</actionbody>
  9064 </action>
  9065 
  9066 //! @SYMTestCaseID CIT_PREQ1054_01
  9067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9068 //! @SYMREQ CIT_PREQ1054
  9069 //! @SYMTestPriority medium
  9070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9072 <action>
  9073 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9074 	<actiontype>DeriveKey</actiontype>
  9075 	<actionbody>
  9076 		<derivekey>
  9077 			<kdf>pkcs#12</kdf>
  9078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9079 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9080 			<iterations>128</iterations>
  9081 			<key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16C2FF4007B705AC86ACDBE7C08A599E170F42573671CAAC9978</key>
  9082 		</derivekey>
  9083 	</actionbody>
  9084 </action>
  9085 
  9086 //! @SYMTestCaseID CIT_PREQ1054_01
  9087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9088 //! @SYMREQ CIT_PREQ1054
  9089 //! @SYMTestPriority medium
  9090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9092 <action>
  9093 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9094 	<actiontype>DeriveKey</actiontype>
  9095 	<actionbody>
  9096 		<derivekey>
  9097 			<kdf>pkcs#12</kdf>
  9098 			<passwd>0000</passwd>
  9099 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9100 			<iterations>128</iterations>
  9101 			<key>99FE149183022F9EB2EB815BCC9504E59C524A1497922B0A2AAB43D17ACD0C3C782048DA1AD2BA09B56143681975</key>
  9102 		</derivekey>
  9103 	</actionbody>
  9104 </action>
  9105 
  9106 //! @SYMTestCaseID CIT_PREQ1054_01
  9107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9108 //! @SYMREQ CIT_PREQ1054
  9109 //! @SYMTestPriority medium
  9110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9112 <action>
  9113 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9114 	<actiontype>DeriveKey</actiontype>
  9115 	<actionbody>
  9116 		<derivekey>
  9117 			<kdf>pkcs#12</kdf>
  9118 			<passwd>0001</passwd>
  9119 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9120 			<iterations>128</iterations>
  9121 			<key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FEB822868DC3090EEB79DED23D3E5F8FADAF47EB100E36B393BF</key>
  9122 		</derivekey>
  9123 	</actionbody>
  9124 </action>
  9125 
  9126 //! @SYMTestCaseID CIT_PREQ1054_01
  9127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9128 //! @SYMREQ CIT_PREQ1054
  9129 //! @SYMTestPriority medium
  9130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9132 <action>
  9133 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9134 	<actiontype>DeriveKey</actiontype>
  9135 	<actionbody>
  9136 		<derivekey>
  9137 			<kdf>pkcs#12</kdf>
  9138 			<passwd>PSWD</passwd>
  9139 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9140 			<iterations>128</iterations>
  9141 			<key>22A70A865774E55CF08A70435611252278DCE76AED5C8A686073CBBEFEA2A3498BF5505B3E9CC6A1BE108737874F</key>
  9142 		</derivekey>
  9143 	</actionbody>
  9144 </action>
  9145 
  9146 //! @SYMTestCaseID CIT_PREQ1054_01
  9147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9148 //! @SYMREQ CIT_PREQ1054
  9149 //! @SYMTestPriority medium
  9150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9152 <action>
  9153 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9154 	<actiontype>DeriveKey</actiontype>
  9155 	<actionbody>
  9156 		<derivekey>
  9157 			<kdf>pkcs#12</kdf>
  9158 			<passwd>password</passwd>
  9159 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9160 			<iterations>128</iterations>
  9161 			<key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C672CFA941C4ECCF5F173B42AABBBE23AEF7593C67EF5B183C3C8</key>
  9162 		</derivekey>
  9163 	</actionbody>
  9164 </action>
  9165 
  9166 //! @SYMTestCaseID CIT_PREQ1054_01
  9167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9168 //! @SYMREQ CIT_PREQ1054
  9169 //! @SYMTestPriority medium
  9170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9172 <action>
  9173 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9174 	<actiontype>DeriveKey</actiontype>
  9175 	<actionbody>
  9176 		<derivekey>
  9177 			<kdf>pkcs#12</kdf>
  9178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9179 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9180 			<iterations>128</iterations>
  9181 			<key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CED20B6799ADA986C06DDF299F615C6B222A9C12CB65CD078D9A</key>
  9182 		</derivekey>
  9183 	</actionbody>
  9184 </action>
  9185 
  9186 //! @SYMTestCaseID CIT_PREQ1054_01
  9187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9188 //! @SYMREQ CIT_PREQ1054
  9189 //! @SYMTestPriority medium
  9190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9192 <action>
  9193 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9194 	<actiontype>DeriveKey</actiontype>
  9195 	<actionbody>
  9196 		<derivekey>
  9197 			<kdf>pkcs#12</kdf>
  9198 			<passwd>0000</passwd>
  9199 			<salt>53414C54</salt>
  9200 			<iterations>1024</iterations>
  9201 			<key>82824BE51C81A5FF4C4268E256F6621B9656325BEFB8E936331AB1AB8BDE634EA6298D7B8EB79832AAF01CF1F49A</key>
  9202 		</derivekey>
  9203 	</actionbody>
  9204 </action>
  9205 
  9206 //! @SYMTestCaseID CIT_PREQ1054_01
  9207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9208 //! @SYMREQ CIT_PREQ1054
  9209 //! @SYMTestPriority medium
  9210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9212 <action>
  9213 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9214 	<actiontype>DeriveKey</actiontype>
  9215 	<actionbody>
  9216 		<derivekey>
  9217 			<kdf>pkcs#12</kdf>
  9218 			<passwd>0001</passwd>
  9219 			<salt>53414C54</salt>
  9220 			<iterations>1024</iterations>
  9221 			<key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2680CD8CEAEF02609895F3CAC00A837D49674737EEC85151786</key>
  9222 		</derivekey>
  9223 	</actionbody>
  9224 </action>
  9225 
  9226 //! @SYMTestCaseID CIT_PREQ1054_01
  9227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9228 //! @SYMREQ CIT_PREQ1054
  9229 //! @SYMTestPriority medium
  9230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9232 <action>
  9233 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9234 	<actiontype>DeriveKey</actiontype>
  9235 	<actionbody>
  9236 		<derivekey>
  9237 			<kdf>pkcs#12</kdf>
  9238 			<passwd>PSWD</passwd>
  9239 			<salt>53414C54</salt>
  9240 			<iterations>1024</iterations>
  9241 			<key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE53571C9CE41B5FB82532D38F0DB4489BC642605ACF4FDCAEF5</key>
  9242 		</derivekey>
  9243 	</actionbody>
  9244 </action>
  9245 
  9246 //! @SYMTestCaseID CIT_PREQ1054_01
  9247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9248 //! @SYMREQ CIT_PREQ1054
  9249 //! @SYMTestPriority medium
  9250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9252 <action>
  9253 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9254 	<actiontype>DeriveKey</actiontype>
  9255 	<actionbody>
  9256 		<derivekey>
  9257 			<kdf>pkcs#12</kdf>
  9258 			<passwd>password</passwd>
  9259 			<salt>53414C54</salt>
  9260 			<iterations>1024</iterations>
  9261 			<key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E848576D39CDFA77EFE9969986D072D8C44B9147961EC0A3BC5AC</key>
  9262 		</derivekey>
  9263 	</actionbody>
  9264 </action>
  9265 
  9266 //! @SYMTestCaseID CIT_PREQ1054_01
  9267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9268 //! @SYMREQ CIT_PREQ1054
  9269 //! @SYMTestPriority medium
  9270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9272 <action>
  9273 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9274 	<actiontype>DeriveKey</actiontype>
  9275 	<actionbody>
  9276 		<derivekey>
  9277 			<kdf>pkcs#12</kdf>
  9278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9279 			<salt>53414C54</salt>
  9280 			<iterations>1024</iterations>
  9281 			<key>406C92305ACD663AB0B9EB66DED7929547C692FE118E8D16D80EDCE4FAFBB47960F4B4AB7272496528D235E45B5A</key>
  9282 		</derivekey>
  9283 	</actionbody>
  9284 </action>
  9285 
  9286 //! @SYMTestCaseID CIT_PREQ1054_01
  9287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9288 //! @SYMREQ CIT_PREQ1054
  9289 //! @SYMTestPriority medium
  9290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9292 <action>
  9293 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9294 	<actiontype>DeriveKey</actiontype>
  9295 	<actionbody>
  9296 		<derivekey>
  9297 			<kdf>pkcs#12</kdf>
  9298 			<passwd>0000</passwd>
  9299 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9300 			<iterations>1024</iterations>
  9301 			<key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355C1E6AFFDE182AC0F49BF46F175F79F51352196D93EA67E17DF</key>
  9302 		</derivekey>
  9303 	</actionbody>
  9304 </action>
  9305 
  9306 //! @SYMTestCaseID CIT_PREQ1054_01
  9307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9308 //! @SYMREQ CIT_PREQ1054
  9309 //! @SYMTestPriority medium
  9310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9312 <action>
  9313 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9314 	<actiontype>DeriveKey</actiontype>
  9315 	<actionbody>
  9316 		<derivekey>
  9317 			<kdf>pkcs#12</kdf>
  9318 			<passwd>0001</passwd>
  9319 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9320 			<iterations>1024</iterations>
  9321 			<key>0182E41FCA166CEAED10972BDF5F57A8F851200E371EC06DC900E66ACAEA25B12EFE28E7571395A1B57ABB8E9DAC</key>
  9322 		</derivekey>
  9323 	</actionbody>
  9324 </action>
  9325 
  9326 //! @SYMTestCaseID CIT_PREQ1054_01
  9327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9328 //! @SYMREQ CIT_PREQ1054
  9329 //! @SYMTestPriority medium
  9330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9332 <action>
  9333 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9334 	<actiontype>DeriveKey</actiontype>
  9335 	<actionbody>
  9336 		<derivekey>
  9337 			<kdf>pkcs#12</kdf>
  9338 			<passwd>PSWD</passwd>
  9339 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9340 			<iterations>1024</iterations>
  9341 			<key>101FB775982CA15E37A065F7CDC5593DE385BDF504433650CC572F880CE0F525E77551ACFFCF92F66C9D407BFABF</key>
  9342 		</derivekey>
  9343 	</actionbody>
  9344 </action>
  9345 
  9346 //! @SYMTestCaseID CIT_PREQ1054_01
  9347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9348 //! @SYMREQ CIT_PREQ1054
  9349 //! @SYMTestPriority medium
  9350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9352 <action>
  9353 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9354 	<actiontype>DeriveKey</actiontype>
  9355 	<actionbody>
  9356 		<derivekey>
  9357 			<kdf>pkcs#12</kdf>
  9358 			<passwd>password</passwd>
  9359 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9360 			<iterations>1024</iterations>
  9361 			<key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B61492CF0D98500BD3842C77C2D639589A83E60B22BE53751156F1</key>
  9362 		</derivekey>
  9363 	</actionbody>
  9364 </action>
  9365 
  9366 //! @SYMTestCaseID CIT_PREQ1054_01
  9367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9368 //! @SYMREQ CIT_PREQ1054
  9369 //! @SYMTestPriority medium
  9370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9372 <action>
  9373 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9374 	<actiontype>DeriveKey</actiontype>
  9375 	<actionbody>
  9376 		<derivekey>
  9377 			<kdf>pkcs#12</kdf>
  9378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9379 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9380 			<iterations>1024</iterations>
  9381 			<key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95969233AAFAC6ABB4C369DDD9394FBCE2C4D86670BAA2AD6355</key>
  9382 		</derivekey>
  9383 	</actionbody>
  9384 </action>
  9385 
  9386 //! @SYMTestCaseID CIT_PREQ1054_01
  9387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9388 //! @SYMREQ CIT_PREQ1054
  9389 //! @SYMTestPriority medium
  9390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9392 <action>
  9393 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9394 	<actiontype>DeriveKey</actiontype>
  9395 	<actionbody>
  9396 		<derivekey>
  9397 			<kdf>pkcs#12</kdf>
  9398 			<passwd>0000</passwd>
  9399 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9400 			<iterations>1024</iterations>
  9401 			<key>6789F0680A5C5840B8ED34B061494171E6407643F9400545C62690ED570B3AAD96654D5DE15C7CA6AE242E6123E9</key>
  9402 		</derivekey>
  9403 	</actionbody>
  9404 </action>
  9405 
  9406 //! @SYMTestCaseID CIT_PREQ1054_01
  9407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9408 //! @SYMREQ CIT_PREQ1054
  9409 //! @SYMTestPriority medium
  9410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9412 <action>
  9413 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9414 	<actiontype>DeriveKey</actiontype>
  9415 	<actionbody>
  9416 		<derivekey>
  9417 			<kdf>pkcs#12</kdf>
  9418 			<passwd>0001</passwd>
  9419 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9420 			<iterations>1024</iterations>
  9421 			<key>43E663725870C4801A917C41C9B58C419933A93475CEA2FBB864F29E6D949DF2AAA8ADAB91C8A32B68062F12EE61</key>
  9422 		</derivekey>
  9423 	</actionbody>
  9424 </action>
  9425 
  9426 //! @SYMTestCaseID CIT_PREQ1054_01
  9427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9428 //! @SYMREQ CIT_PREQ1054
  9429 //! @SYMTestPriority medium
  9430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9432 <action>
  9433 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9434 	<actiontype>DeriveKey</actiontype>
  9435 	<actionbody>
  9436 		<derivekey>
  9437 			<kdf>pkcs#12</kdf>
  9438 			<passwd>PSWD</passwd>
  9439 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9440 			<iterations>1024</iterations>
  9441 			<key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5C24BF367B0C63BE89EA9EB57615C0ABFAFC3FB8DFDEA3907AA</key>
  9442 		</derivekey>
  9443 	</actionbody>
  9444 </action>
  9445 
  9446 //! @SYMTestCaseID CIT_PREQ1054_01
  9447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9448 //! @SYMREQ CIT_PREQ1054
  9449 //! @SYMTestPriority medium
  9450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9452 <action>
  9453 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9454 	<actiontype>DeriveKey</actiontype>
  9455 	<actionbody>
  9456 		<derivekey>
  9457 			<kdf>pkcs#12</kdf>
  9458 			<passwd>password</passwd>
  9459 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9460 			<iterations>1024</iterations>
  9461 			<key>CA202602C9A265559B6B96729B574DAA9B6D67036F69D903784374671E9B7E087ADE4AB9C5AE6BB62530C90F4E9C</key>
  9462 		</derivekey>
  9463 	</actionbody>
  9464 </action>
  9465 
  9466 //! @SYMTestCaseID CIT_PREQ1054_01
  9467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9468 //! @SYMREQ CIT_PREQ1054
  9469 //! @SYMTestPriority medium
  9470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9472 <action>
  9473 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9474 	<actiontype>DeriveKey</actiontype>
  9475 	<actionbody>
  9476 		<derivekey>
  9477 			<kdf>pkcs#12</kdf>
  9478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9479 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9480 			<iterations>1024</iterations>
  9481 			<key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D4689DBDFBE81CF5F337376B8EEC58ADFD518A26768ABEB20131B9</key>
  9482 		</derivekey>
  9483 	</actionbody>
  9484 </action>
  9485 
  9486 //! @SYMTestCaseID CIT_PREQ1054_01
  9487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9488 //! @SYMREQ CIT_PREQ1054
  9489 //! @SYMTestPriority medium
  9490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9492 <action>
  9493 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9494 	<actiontype>DeriveKey</actiontype>
  9495 	<actionbody>
  9496 		<derivekey>
  9497 			<kdf>pkcs#12</kdf>
  9498 			<passwd>0000</passwd>
  9499 			<salt>53414C54</salt>
  9500 			<iterations>1536</iterations>
  9501 			<key>79A4E1398F511B262E60DCFE9E838C938B806716A9831A1BF6FFE616ADE12860428079E9CD2165E9194346EB6677</key>
  9502 		</derivekey>
  9503 	</actionbody>
  9504 </action>
  9505 
  9506 //! @SYMTestCaseID CIT_PREQ1054_01
  9507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9508 //! @SYMREQ CIT_PREQ1054
  9509 //! @SYMTestPriority medium
  9510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9512 <action>
  9513 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9514 	<actiontype>DeriveKey</actiontype>
  9515 	<actionbody>
  9516 		<derivekey>
  9517 			<kdf>pkcs#12</kdf>
  9518 			<passwd>0001</passwd>
  9519 			<salt>53414C54</salt>
  9520 			<iterations>1536</iterations>
  9521 			<key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D25BFDD890E8B903E66B306ED5C9F5C7B53BEA11BD495C328951</key>
  9522 		</derivekey>
  9523 	</actionbody>
  9524 </action>
  9525 
  9526 //! @SYMTestCaseID CIT_PREQ1054_01
  9527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9528 //! @SYMREQ CIT_PREQ1054
  9529 //! @SYMTestPriority medium
  9530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9532 <action>
  9533 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9534 	<actiontype>DeriveKey</actiontype>
  9535 	<actionbody>
  9536 		<derivekey>
  9537 			<kdf>pkcs#12</kdf>
  9538 			<passwd>PSWD</passwd>
  9539 			<salt>53414C54</salt>
  9540 			<iterations>1536</iterations>
  9541 			<key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E64B6690AE6ED16C5A82A0F7E7D9578BA7F62A7427260733165A</key>
  9542 		</derivekey>
  9543 	</actionbody>
  9544 </action>
  9545 
  9546 //! @SYMTestCaseID CIT_PREQ1054_01
  9547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9548 //! @SYMREQ CIT_PREQ1054
  9549 //! @SYMTestPriority medium
  9550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9552 <action>
  9553 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9554 	<actiontype>DeriveKey</actiontype>
  9555 	<actionbody>
  9556 		<derivekey>
  9557 			<kdf>pkcs#12</kdf>
  9558 			<passwd>password</passwd>
  9559 			<salt>53414C54</salt>
  9560 			<iterations>1536</iterations>
  9561 			<key>65B27A78C72DFEEA6C92846330CE98C6721909E89B014925B22427256BC6A4EFEB7A83A2244E59A25E7DE2F01FA6</key>
  9562 		</derivekey>
  9563 	</actionbody>
  9564 </action>
  9565 
  9566 //! @SYMTestCaseID CIT_PREQ1054_01
  9567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9568 //! @SYMREQ CIT_PREQ1054
  9569 //! @SYMTestPriority medium
  9570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9572 <action>
  9573 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9574 	<actiontype>DeriveKey</actiontype>
  9575 	<actionbody>
  9576 		<derivekey>
  9577 			<kdf>pkcs#12</kdf>
  9578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9579 			<salt>53414C54</salt>
  9580 			<iterations>1536</iterations>
  9581 			<key>8F8FC96A3D958731780B50E843D6BB65137A0728C3A4C55D23D4A0E99EBA71F56EC19356B50B987F486F3FF74A9C</key>
  9582 		</derivekey>
  9583 	</actionbody>
  9584 </action>
  9585 
  9586 //! @SYMTestCaseID CIT_PREQ1054_01
  9587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9588 //! @SYMREQ CIT_PREQ1054
  9589 //! @SYMTestPriority medium
  9590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9592 <action>
  9593 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9594 	<actiontype>DeriveKey</actiontype>
  9595 	<actionbody>
  9596 		<derivekey>
  9597 			<kdf>pkcs#12</kdf>
  9598 			<passwd>0000</passwd>
  9599 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9600 			<iterations>1536</iterations>
  9601 			<key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25C6120B9099920440D11725F1D4F7CABFB8A170BF9744B74461</key>
  9602 		</derivekey>
  9603 	</actionbody>
  9604 </action>
  9605 
  9606 //! @SYMTestCaseID CIT_PREQ1054_01
  9607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9608 //! @SYMREQ CIT_PREQ1054
  9609 //! @SYMTestPriority medium
  9610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9612 <action>
  9613 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9614 	<actiontype>DeriveKey</actiontype>
  9615 	<actionbody>
  9616 		<derivekey>
  9617 			<kdf>pkcs#12</kdf>
  9618 			<passwd>0001</passwd>
  9619 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9620 			<iterations>1536</iterations>
  9621 			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB413E8EAC164C3BA1FAD7ABC1CADB1BF7458010BF7814262F563</key>
  9622 		</derivekey>
  9623 	</actionbody>
  9624 </action>
  9625 
  9626 //! @SYMTestCaseID CIT_PREQ1054_01
  9627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9628 //! @SYMREQ CIT_PREQ1054
  9629 //! @SYMTestPriority medium
  9630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9632 <action>
  9633 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9634 	<actiontype>DeriveKey</actiontype>
  9635 	<actionbody>
  9636 		<derivekey>
  9637 			<kdf>pkcs#12</kdf>
  9638 			<passwd>PSWD</passwd>
  9639 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9640 			<iterations>1536</iterations>
  9641 			<key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0CC173973E296F655BAB0BFEA7E51BACD8FC73AB278469439B58</key>
  9642 		</derivekey>
  9643 	</actionbody>
  9644 </action>
  9645 
  9646 //! @SYMTestCaseID CIT_PREQ1054_01
  9647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9648 //! @SYMREQ CIT_PREQ1054
  9649 //! @SYMTestPriority medium
  9650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9652 <action>
  9653 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9654 	<actiontype>DeriveKey</actiontype>
  9655 	<actionbody>
  9656 		<derivekey>
  9657 			<kdf>pkcs#12</kdf>
  9658 			<passwd>password</passwd>
  9659 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9660 			<iterations>1536</iterations>
  9661 			<key>C05FE26245C742CC01B23C655E5D934D734610DE015AEFA126CC8A53FBD91EC774AE631F57444E206494BE6EB304</key>
  9662 		</derivekey>
  9663 	</actionbody>
  9664 </action>
  9665 
  9666 //! @SYMTestCaseID CIT_PREQ1054_01
  9667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9668 //! @SYMREQ CIT_PREQ1054
  9669 //! @SYMTestPriority medium
  9670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9672 <action>
  9673 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9674 	<actiontype>DeriveKey</actiontype>
  9675 	<actionbody>
  9676 		<derivekey>
  9677 			<kdf>pkcs#12</kdf>
  9678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9679 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9680 			<iterations>1536</iterations>
  9681 			<key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0E036709FBD02F0FA15B7497042FF3E0B56ED26ACC058F1D00B</key>
  9682 		</derivekey>
  9683 	</actionbody>
  9684 </action>
  9685 
  9686 //! @SYMTestCaseID CIT_PREQ1054_01
  9687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9688 //! @SYMREQ CIT_PREQ1054
  9689 //! @SYMTestPriority medium
  9690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9692 <action>
  9693 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9694 	<actiontype>DeriveKey</actiontype>
  9695 	<actionbody>
  9696 		<derivekey>
  9697 			<kdf>pkcs#12</kdf>
  9698 			<passwd>0000</passwd>
  9699 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9700 			<iterations>1536</iterations>
  9701 			<key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3E8CDC6C4D8D7D7226769FADE4650767B4472BBD418B2D969EB</key>
  9702 		</derivekey>
  9703 	</actionbody>
  9704 </action>
  9705 
  9706 //! @SYMTestCaseID CIT_PREQ1054_01
  9707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9708 //! @SYMREQ CIT_PREQ1054
  9709 //! @SYMTestPriority medium
  9710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9712 <action>
  9713 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9714 	<actiontype>DeriveKey</actiontype>
  9715 	<actionbody>
  9716 		<derivekey>
  9717 			<kdf>pkcs#12</kdf>
  9718 			<passwd>0001</passwd>
  9719 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9720 			<iterations>1536</iterations>
  9721 			<key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA3932F031B4FB2D6F799C857B7B821D5CB05419EE6DF2D10BBD</key>
  9722 		</derivekey>
  9723 	</actionbody>
  9724 </action>
  9725 
  9726 //! @SYMTestCaseID CIT_PREQ1054_01
  9727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9728 //! @SYMREQ CIT_PREQ1054
  9729 //! @SYMTestPriority medium
  9730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9732 <action>
  9733 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9734 	<actiontype>DeriveKey</actiontype>
  9735 	<actionbody>
  9736 		<derivekey>
  9737 			<kdf>pkcs#12</kdf>
  9738 			<passwd>PSWD</passwd>
  9739 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9740 			<iterations>1536</iterations>
  9741 			<key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA949B44DA6EAFD9D83FCD9365C617C137F7EC9C3EF036BD592C</key>
  9742 		</derivekey>
  9743 	</actionbody>
  9744 </action>
  9745 
  9746 //! @SYMTestCaseID CIT_PREQ1054_01
  9747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9748 //! @SYMREQ CIT_PREQ1054
  9749 //! @SYMTestPriority medium
  9750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9752 <action>
  9753 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9754 	<actiontype>DeriveKey</actiontype>
  9755 	<actionbody>
  9756 		<derivekey>
  9757 			<kdf>pkcs#12</kdf>
  9758 			<passwd>password</passwd>
  9759 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9760 			<iterations>1536</iterations>
  9761 			<key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD458CDBB895741595BD6F879B9134D56F8695A654407E4809C56</key>
  9762 		</derivekey>
  9763 	</actionbody>
  9764 </action>
  9765 
  9766 //! @SYMTestCaseID CIT_PREQ1054_01
  9767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9768 //! @SYMREQ CIT_PREQ1054
  9769 //! @SYMTestPriority medium
  9770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9772 <action>
  9773 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9774 	<actiontype>DeriveKey</actiontype>
  9775 	<actionbody>
  9776 		<derivekey>
  9777 			<kdf>pkcs#12</kdf>
  9778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9779 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
  9780 			<iterations>1536</iterations>
  9781 			<key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B272CB0DD4D76CAE04D831A4C12BC353F7C60F50ED67DF548599</key>
  9782 		</derivekey>
  9783 	</actionbody>
  9784 </action>
  9785 
  9786 //! @SYMTestCaseID CIT_PREQ1054_01
  9787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9788 //! @SYMREQ CIT_PREQ1054
  9789 //! @SYMTestPriority medium
  9790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9792 <action>
  9793 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9794 	<actiontype>DeriveKey</actiontype>
  9795 	<actionbody>
  9796 		<derivekey>
  9797 			<kdf>pkcs#12</kdf>
  9798 			<passwd>0000</passwd>
  9799 			<salt>53414C54</salt>
  9800 			<iterations>2048</iterations>
  9801 			<key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCDD858068993D4F95777E800B47B0A091487E50D888139BBAA95</key>
  9802 		</derivekey>
  9803 	</actionbody>
  9804 </action>
  9805 
  9806 //! @SYMTestCaseID CIT_PREQ1054_01
  9807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9808 //! @SYMREQ CIT_PREQ1054
  9809 //! @SYMTestPriority medium
  9810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9812 <action>
  9813 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9814 	<actiontype>DeriveKey</actiontype>
  9815 	<actionbody>
  9816 		<derivekey>
  9817 			<kdf>pkcs#12</kdf>
  9818 			<passwd>0001</passwd>
  9819 			<salt>53414C54</salt>
  9820 			<iterations>2048</iterations>
  9821 			<key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2275085600120C9642E197813F99DBE317142466C44961771AF</key>
  9822 		</derivekey>
  9823 	</actionbody>
  9824 </action>
  9825 
  9826 //! @SYMTestCaseID CIT_PREQ1054_01
  9827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9828 //! @SYMREQ CIT_PREQ1054
  9829 //! @SYMTestPriority medium
  9830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9832 <action>
  9833 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9834 	<actiontype>DeriveKey</actiontype>
  9835 	<actionbody>
  9836 		<derivekey>
  9837 			<kdf>pkcs#12</kdf>
  9838 			<passwd>PSWD</passwd>
  9839 			<salt>53414C54</salt>
  9840 			<iterations>2048</iterations>
  9841 			<key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2D6DD3D0577A59043B25D770FAC6CFF48666D15795B61297255</key>
  9842 		</derivekey>
  9843 	</actionbody>
  9844 </action>
  9845 
  9846 //! @SYMTestCaseID CIT_PREQ1054_01
  9847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9848 //! @SYMREQ CIT_PREQ1054
  9849 //! @SYMTestPriority medium
  9850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9852 <action>
  9853 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9854 	<actiontype>DeriveKey</actiontype>
  9855 	<actionbody>
  9856 		<derivekey>
  9857 			<kdf>pkcs#12</kdf>
  9858 			<passwd>password</passwd>
  9859 			<salt>53414C54</salt>
  9860 			<iterations>2048</iterations>
  9861 			<key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D97444114C46756D3F2FD1DF12182CF6C83CF32E72D1A70DF206</key>
  9862 		</derivekey>
  9863 	</actionbody>
  9864 </action>
  9865 
  9866 //! @SYMTestCaseID CIT_PREQ1054_01
  9867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9868 //! @SYMREQ CIT_PREQ1054
  9869 //! @SYMTestPriority medium
  9870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9872 <action>
  9873 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
  9874 	<actiontype>DeriveKey</actiontype>
  9875 	<actionbody>
  9876 		<derivekey>
  9877 			<kdf>pkcs#12</kdf>
  9878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9879 			<salt>53414C54</salt>
  9880 			<iterations>2048</iterations>
  9881 			<key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45F218B705E54071E5BE4AB622F2E9B45FCA663D8B30ADCC0073</key>
  9882 		</derivekey>
  9883 	</actionbody>
  9884 </action>
  9885 
  9886 //! @SYMTestCaseID CIT_PREQ1054_01
  9887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9888 //! @SYMREQ CIT_PREQ1054
  9889 //! @SYMTestPriority medium
  9890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9892 <action>
  9893 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9894 	<actiontype>DeriveKey</actiontype>
  9895 	<actionbody>
  9896 		<derivekey>
  9897 			<kdf>pkcs#12</kdf>
  9898 			<passwd>0000</passwd>
  9899 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9900 			<iterations>2048</iterations>
  9901 			<key>CD045229461658BC6C47C259F2D20433173DE4D31E54B1D693738FBA6D643ECB095761373FB0E49F9C478BA11755</key>
  9902 		</derivekey>
  9903 	</actionbody>
  9904 </action>
  9905 
  9906 //! @SYMTestCaseID CIT_PREQ1054_01
  9907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9908 //! @SYMREQ CIT_PREQ1054
  9909 //! @SYMTestPriority medium
  9910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9912 <action>
  9913 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9914 	<actiontype>DeriveKey</actiontype>
  9915 	<actionbody>
  9916 		<derivekey>
  9917 			<kdf>pkcs#12</kdf>
  9918 			<passwd>0001</passwd>
  9919 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9920 			<iterations>2048</iterations>
  9921 			<key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6DC8B942CA4D9447EDFC29A5BDC1D450A73B298C6A9A8ED7D2F4</key>
  9922 		</derivekey>
  9923 	</actionbody>
  9924 </action>
  9925 
  9926 //! @SYMTestCaseID CIT_PREQ1054_01
  9927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9928 //! @SYMREQ CIT_PREQ1054
  9929 //! @SYMTestPriority medium
  9930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9932 <action>
  9933 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9934 	<actiontype>DeriveKey</actiontype>
  9935 	<actionbody>
  9936 		<derivekey>
  9937 			<kdf>pkcs#12</kdf>
  9938 			<passwd>PSWD</passwd>
  9939 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9940 			<iterations>2048</iterations>
  9941 			<key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC37C801DE5E02A6DD1A193970B4505A403005B378BE47D61FEB</key>
  9942 		</derivekey>
  9943 	</actionbody>
  9944 </action>
  9945 
  9946 //! @SYMTestCaseID CIT_PREQ1054_01
  9947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9948 //! @SYMREQ CIT_PREQ1054
  9949 //! @SYMTestPriority medium
  9950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9952 <action>
  9953 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9954 	<actiontype>DeriveKey</actiontype>
  9955 	<actionbody>
  9956 		<derivekey>
  9957 			<kdf>pkcs#12</kdf>
  9958 			<passwd>password</passwd>
  9959 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9960 			<iterations>2048</iterations>
  9961 			<key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B2F0294723113F25347AEAF0109E270C77A2524CAC118D164B8</key>
  9962 		</derivekey>
  9963 	</actionbody>
  9964 </action>
  9965 
  9966 //! @SYMTestCaseID CIT_PREQ1054_01
  9967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9968 //! @SYMREQ CIT_PREQ1054
  9969 //! @SYMTestPriority medium
  9970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9972 <action>
  9973 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
  9974 	<actiontype>DeriveKey</actiontype>
  9975 	<actionbody>
  9976 		<derivekey>
  9977 			<kdf>pkcs#12</kdf>
  9978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
  9979 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
  9980 			<iterations>2048</iterations>
  9981 			<key>A5B348EB4926290B223724CC8E4ED67FF458F2362279F0DF9F3A92AFF0473030D0EBA6E4173AF91E7AE535D3E988</key>
  9982 		</derivekey>
  9983 	</actionbody>
  9984 </action>
  9985 
  9986 //! @SYMTestCaseID CIT_PREQ1054_01
  9987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
  9988 //! @SYMREQ CIT_PREQ1054
  9989 //! @SYMTestPriority medium
  9990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
  9991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  9992 <action>
  9993 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
  9994 	<actiontype>DeriveKey</actiontype>
  9995 	<actionbody>
  9996 		<derivekey>
  9997 			<kdf>pkcs#12</kdf>
  9998 			<passwd>0000</passwd>
  9999 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 10000 			<iterations>2048</iterations>
 10001 			<key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A259262CE1B3E626454FF2A5B69A372FE3894C48E574F70F191F4</key>
 10002 		</derivekey>
 10003 	</actionbody>
 10004 </action>
 10005 
 10006 //! @SYMTestCaseID CIT_PREQ1054_01
 10007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
 10008 //! @SYMREQ CIT_PREQ1054
 10009 //! @SYMTestPriority medium
 10010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
 10011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
 10012 <action>
 10013 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
 10014 	<actiontype>DeriveKey</actiontype>
 10015 	<actionbody>
 10016 		<derivekey>
 10017 			<kdf>pkcs#12</kdf>
 10018 			<passwd>0001</passwd>
 10019 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 10020 			<iterations>2048</iterations>
 10021 			<key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE13602A15DF682A601681221A748627D1C585C079F8DCBD5ABE9763</key>
 10022 		</derivekey>
 10023 	</actionbody>
 10024 </action>
 10025 
 10026 //! @SYMTestCaseID CIT_PREQ1054_01
 10027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
 10028 //! @SYMREQ CIT_PREQ1054
 10029 //! @SYMTestPriority medium
 10030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
 10031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
 10032 <action>
 10033 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
 10034 	<actiontype>DeriveKey</actiontype>
 10035 	<actionbody>
 10036 		<derivekey>
 10037 			<kdf>pkcs#12</kdf>
 10038 			<passwd>PSWD</passwd>
 10039 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 10040 			<iterations>2048</iterations>
 10041 			<key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2A148121AE3E9E23B3891882F575F204CB0639FC9FDB9D5B0BD</key>
 10042 		</derivekey>
 10043 	</actionbody>
 10044 </action>
 10045 
 10046 //! @SYMTestCaseID CIT_PREQ1054_01
 10047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
 10048 //! @SYMREQ CIT_PREQ1054
 10049 //! @SYMTestPriority medium
 10050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
 10051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
 10052 <action>
 10053 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
 10054 	<actiontype>DeriveKey</actiontype>
 10055 	<actionbody>
 10056 		<derivekey>
 10057 			<kdf>pkcs#12</kdf>
 10058 			<passwd>password</passwd>
 10059 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 10060 			<iterations>2048</iterations>
 10061 			<key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF08E3059843173C72CD79EFEADE34A6DA91F6AB8E92383F1BDFA</key>
 10062 		</derivekey>
 10063 	</actionbody>
 10064 </action>
 10065 
 10066 //! @SYMTestCaseID CIT_PREQ1054_01
 10067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
 10068 //! @SYMREQ CIT_PREQ1054
 10069 //! @SYMTestPriority medium
 10070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
 10071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
 10072 <action>
 10073 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
 10074 	<actiontype>DeriveKey</actiontype>
 10075 	<actionbody>
 10076 		<derivekey>
 10077 			<kdf>pkcs#12</kdf>
 10078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
 10079 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
 10080 			<iterations>2048</iterations>
 10081 			<key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1167ED13693E8373DFB92EC6F000DBADB9363CA12E9E16ED019</key>
 10082 		</derivekey>
 10083 	</actionbody>
 10084 </action>
 10085 
 10086 <action>
 10087     <actionname>OOM End</actionname>
 10088     <actiontype>stopmemfailure</actiontype>
 10089     <actionbody></actionbody>
 10090     <actionresult>
 10091         <return>KErrNone</return>
 10092     </actionresult>
 10093 </action>
 10094