os/security/crypto/weakcrypto/test/tpbe/scripts/tpbetests_v2.txt
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
     1 
     2 // Copyright (C) 2005 - 2006 Symbian Ltd. All Rights Reserved
     3 
     4 
     5 <action>
     6 	<actionname>Element test case 1 with explicit kdf, salt len and iterations, ECipherRC2_CBC_128_16</actionname>
     7 	<actiontype>Element</actiontype>
     8 	<actionbody>
     9 		<cipher>ECipherRC2_CBC_128_16</cipher>
    10 		<kdf>PKCS#5</kdf>
    11 		<salt_len_bytes>16</salt_len_bytes>
    12 		<iter_count>1000</iter_count>
    13 		<element>
    14 			<passwd>password</passwd>
    15 			<input>This is what I want to encrypt</input>
    16 		</element>
    17 	</actionbody>
    18 	<actionresult>
    19 		<return>KErrNone</return>
    20 	</actionresult>
    21 </action>
    22 
    23 <action>
    24 	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
    25 	<actiontype>Element</actiontype>
    26 	<actionbody>
    27 		<cipher>ECipherRC2_CBC_128_16</cipher>
    28 		<element>
    29 			<passwd>password</passwd>
    30 			<input>This is what I want to encrypt</input>
    31 		</element>
    32 	</actionbody>
    33 	<actionresult>
    34 		<return>KErrNone</return>
    35 	</actionresult>
    36 </action>
    37 
    38 <action>
    39 	<actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
    40 	<actiontype>Element</actiontype>
    41 	<actionbody>
    42 		<cipher>ECipherRC2_CBC_128_16</cipher>
    43 		<element>
    44 			<passwd>password</passwd>
    45 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
    46 		</element>
    47 	</actionbody>
    48 	<actionresult>
    49 		<return>KErrNone</return>
    50 	</actionresult>
    51 </action>
    52 
    53 <action>
    54 	<actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
    55 	<actiontype>Element</actiontype>
    56 	<actionbody>
    57 		<cipher>ECipherRC2_CBC_128_16</cipher>
    58 		<element>
    59 			<passwd>a90lkjasjk3lk32kdf89</passwd>
    60 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
    61 		</element>
    62 	</actionbody>
    63 	<actionresult>
    64 		<return>KErrNone</return>
    65 	</actionresult>
    66 </action>
    67 
    68 <action>
    69 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
    70 	<actiontype>Set</actiontype>
    71 	<actionbody>
    72 		<cipher>ECipherRC2_CBC_128_16</cipher>
    73 		<set>
    74 			<passwd>a90lkjasjk3lk32kdf89</passwd>
    75 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
    76 		</set>
    77 	</actionbody>
    78 	<actionresult>
    79 		<return>KErrNone</return>
    80 	</actionresult>
    81 </action>
    82 
    83 <action>
    84 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
    85 	<actiontype>Set</actiontype>
    86 	<actionbody>
    87 		<cipher>ECipherRC2_CBC_128_16</cipher>
    88 		<kdf>PKCS#5</kdf>
    89 		<salt_len_bytes>16</salt_len_bytes>
    90 		<iter_count>1000</iter_count>
    91 		<set>
    92 			<passwd>a90lkjasjk3lk32kdf89</passwd>
    93 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
    94 		</set>
    95 	</actionbody>
    96 	<actionresult>
    97 		<return>KErrNone</return>
    98 	</actionresult>
    99 </action>
   100 
   101 <action>
   102 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
   103 	<actiontype>Set</actiontype>
   104 	<actionbody>
   105 		<cipher>ECipherRC2_CBC_128_16</cipher>
   106 		<set>
   107 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   108 			<input>B</input>
   109 		</set>
   110 	</actionbody>
   111 	<actionresult>
   112 		<return>KErrNone</return>
   113 	</actionresult>
   114 </action>
   115 
   116 <action>
   117 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
   118 	<actiontype>Set</actiontype>
   119 	<actionbody>
   120 		<cipher>ECipherRC2_CBC_128_16</cipher>
   121 		<set>
   122 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   123 			<input>ZYXWUTSR</input>
   124 		</set>
   125 	</actionbody>
   126 	<actionresult>
   127 		<return>KErrNone</return>
   128 	</actionresult>
   129 </action>
   130 
   131 <action>
   132 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
   133 	<actiontype>Set</actiontype>
   134 	<actionbody>
   135 		<cipher>ECipherRC2_CBC_128_16</cipher>
   136 		<set>
   137 			<passwd>m</passwd>
   138 			<input>ZYXWUTSR</input>
   139 		</set>
   140 	</actionbody>
   141 	<actionresult>
   142 		<return>KErrNone</return>
   143 	</actionresult>
   144 </action>
   145 
   146 <action>
   147 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
   148 	<actiontype>Set</actiontype>
   149 	<actionbody>
   150 		<cipher>ECipherRC2_CBC_128_16</cipher>
   151 		<set>
   152 			<passwd></passwd>
   153 			<input>ZYXWUTSR</input>
   154 		</set>
   155 	</actionbody>
   156 	<actionresult>
   157 		<return>KErrNone</return>
   158 	</actionresult>
   159 </action>
   160 
   161 <action>
   162 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
   163 	<actiontype>Set</actiontype>
   164 	<actionbody>
   165 		<cipher>ECipherRC2_CBC_128_16</cipher>
   166 		<set>
   167 			<passwd></passwd>
   168 			<input></input>
   169 		</set>
   170 	</actionbody>
   171 	<actionresult>
   172 		<return>KErrNone</return>
   173 	</actionresult>
   174 </action>
   175 
   176 ///////////////////////////////////////////////////////////////////////////////////
   177 ///////////////////////////////////////////////////////////////////////////////////
   178 ///////////////////////////////////////////////////////////////////////////////////
   179 
   180 <action>
   181 	<actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
   182 	<actiontype>Element</actiontype>
   183 	<actionbody>
   184 		<cipher>ECipherRC2_CBC_40_16</cipher>
   185 		<element>
   186 			<passwd>password</passwd>
   187 			<input>This is what I want to encrypt</input>
   188 		</element>
   189 	</actionbody>
   190 	<actionresult>
   191 		<return>KErrNone</return>
   192 	</actionresult>
   193 </action>
   194 
   195 <action>
   196 	<actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
   197 	<actiontype>Element</actiontype>
   198 	<actionbody>
   199 		<cipher>ECipherRC2_CBC_40_16</cipher>
   200 		<element>
   201 			<passwd>password</passwd>
   202 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   203 		</element>
   204 	</actionbody>
   205 	<actionresult>
   206 		<return>KErrNone</return>
   207 	</actionresult>
   208 </action>
   209 
   210 <action>
   211 	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
   212 	<actiontype>Element</actiontype>
   213 	<actionbody>
   214 		<cipher>ECipherRC2_CBC_40_16</cipher>
   215 		<element>
   216 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   217 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   218 		</element>
   219 	</actionbody>
   220 	<actionresult>
   221 		<return>KErrNone</return>
   222 	</actionresult>
   223 </action>
   224 
   225 <action>
   226 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
   227 	<actiontype>Set</actiontype>
   228 	<actionbody>
   229 		<cipher>ECipherRC2_CBC_40_16</cipher>
   230 		<set>
   231 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   232 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   233 		</set>
   234 	</actionbody>
   235 	<actionresult>
   236 		<return>KErrNone</return>
   237 	</actionresult>
   238 </action>
   239 
   240 <action>
   241 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
   242 	<actiontype>Set</actiontype>
   243 	<actionbody>
   244 		<cipher>ECipherRC2_CBC_40_16</cipher>
   245 		<set>
   246 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   247 			<input>B</input>
   248 		</set>
   249 	</actionbody>
   250 	<actionresult>
   251 		<return>KErrNone</return>
   252 	</actionresult>
   253 </action>
   254 
   255 <action>
   256 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
   257 	<actiontype>Set</actiontype>
   258 	<actionbody>
   259 		<cipher>ECipherRC2_CBC_40_16</cipher>
   260 		<set>
   261 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   262 			<input>ZYXWUTSR</input>
   263 		</set>
   264 	</actionbody>
   265 	<actionresult>
   266 		<return>KErrNone</return>
   267 	</actionresult>
   268 </action>
   269 
   270 <action>
   271 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
   272 	<actiontype>Set</actiontype>
   273 	<actionbody>
   274 		<cipher>ECipherRC2_CBC_40_16</cipher>
   275 		<set>
   276 			<passwd>m</passwd>
   277 			<input>ZYXWUTSR</input>
   278 		</set>
   279 	</actionbody>
   280 	<actionresult>
   281 		<return>KErrNone</return>
   282 	</actionresult>
   283 </action>
   284 
   285 <action>
   286 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
   287 	<actiontype>Set</actiontype>
   288 	<actionbody>
   289 		<cipher>ECipherRC2_CBC_40_16</cipher>
   290 		<set>
   291 			<passwd></passwd>
   292 			<input>ZYXWUTSR</input>
   293 		</set>
   294 	</actionbody>
   295 	<actionresult>
   296 		<return>KErrNone</return>
   297 	</actionresult>
   298 </action>
   299 
   300 <action>
   301 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
   302 	<actiontype>Set</actiontype>
   303 	<actionbody>
   304 		<cipher>ECipherRC2_CBC_40_16</cipher>
   305 		<set>
   306 			<passwd></passwd>
   307 			<input></input>
   308 		</set>
   309 	</actionbody>
   310 	<actionresult>
   311 		<return>KErrNone</return>
   312 	</actionresult>
   313 </action>
   314 
   315 ///////////////////////////////////////////////////////////////////////////////////
   316 ///////////////////////////////////////////////////////////////////////////////////
   317 ///////////////////////////////////////////////////////////////////////////////////
   318 
   319 <action>
   320 	<actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
   321 	<actiontype>Element</actiontype>
   322 	<actionbody>
   323 		<cipher>ECipherRC2_CBC_128</cipher>
   324 		<element>
   325 			<passwd>password</passwd>
   326 			<input>This is what I want to encrypt</input>
   327 		</element>
   328 	</actionbody>
   329 	<actionresult>
   330 		<return>KErrNone</return>
   331 	</actionresult>
   332 </action>
   333 
   334 <action>
   335 	<actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
   336 	<actiontype>Element</actiontype>
   337 	<actionbody>
   338 		<cipher>ECipherRC2_CBC_128</cipher>
   339 		<element>
   340 			<passwd>password</passwd>
   341 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   342 		</element>
   343 	</actionbody>
   344 	<actionresult>
   345 		<return>KErrNone</return>
   346 	</actionresult>
   347 </action>
   348 
   349 <action>
   350 	<actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
   351 	<actiontype>Element</actiontype>
   352 	<actionbody>
   353 		<cipher>ECipherRC2_CBC_128</cipher>
   354 		<element>
   355 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   356 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   357 		</element>
   358 	</actionbody>
   359 	<actionresult>
   360 		<return>KErrNone</return>
   361 	</actionresult>
   362 </action>
   363 
   364 <action>
   365 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
   366 	<actiontype>Set</actiontype>
   367 	<actionbody>
   368 		<cipher>ECipherRC2_CBC_128</cipher>
   369 		<set>
   370 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   371 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   372 		</set>
   373 	</actionbody>
   374 	<actionresult>
   375 		<return>KErrNone</return>
   376 	</actionresult>
   377 </action>
   378 
   379 <action>
   380 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
   381 	<actiontype>Set</actiontype>
   382 	<actionbody>
   383 		<cipher>ECipherRC2_CBC_128</cipher>
   384 		<set>
   385 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   386 			<input>B</input>
   387 		</set>
   388 	</actionbody>
   389 	<actionresult>
   390 		<return>KErrNone</return>
   391 	</actionresult>
   392 </action>
   393 
   394 <action>
   395 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
   396 	<actiontype>Set</actiontype>
   397 	<actionbody>
   398 		<cipher>ECipherRC2_CBC_128</cipher>
   399 		<set>
   400 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   401 			<input>ZYXWUTSR</input>
   402 		</set>
   403 	</actionbody>
   404 	<actionresult>
   405 		<return>KErrNone</return>
   406 	</actionresult>
   407 </action>
   408 
   409 <action>
   410 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
   411 	<actiontype>Set</actiontype>
   412 	<actionbody>
   413 		<cipher>ECipherRC2_CBC_128</cipher>
   414 		<set>
   415 			<passwd>m</passwd>
   416 			<input>ZYXWUTSR</input>
   417 		</set>
   418 	</actionbody>
   419 	<actionresult>
   420 		<return>KErrNone</return>
   421 	</actionresult>
   422 </action>
   423 
   424 <action>
   425 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
   426 	<actiontype>Set</actiontype>
   427 	<actionbody>
   428 		<cipher>ECipherRC2_CBC_128</cipher>
   429 		<set>
   430 			<passwd></passwd>
   431 			<input>ZYXWUTSR</input>
   432 		</set>
   433 	</actionbody>
   434 	<actionresult>
   435 		<return>KErrNone</return>
   436 	</actionresult>
   437 </action>
   438 
   439 <action>
   440 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
   441 	<actiontype>Set</actiontype>
   442 	<actionbody>
   443 		<cipher>ECipherRC2_CBC_128</cipher>
   444 		<set>
   445 			<passwd></passwd>
   446 			<input></input>
   447 		</set>
   448 	</actionbody>
   449 	<actionresult>
   450 		<return>KErrNone</return>
   451 	</actionresult>
   452 </action>
   453 
   454 ///////////////////////////////////////////////////////////////////////////////////
   455 ///////////////////////////////////////////////////////////////////////////////////
   456 ///////////////////////////////////////////////////////////////////////////////////
   457 
   458 <action>
   459 	<actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
   460 	<actiontype>Element</actiontype>
   461 	<actionbody>
   462 		<cipher>ECipherRC2_CBC_40</cipher>
   463 		<element>
   464 			<passwd>password</passwd>
   465 			<input>This is what I want to encrypt</input>
   466 		</element>
   467 	</actionbody>
   468 	<actionresult>
   469 		<return>KErrNone</return>
   470 	</actionresult>
   471 </action>
   472 
   473 <action>
   474 	<actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
   475 	<actiontype>Element</actiontype>
   476 	<actionbody>
   477 		<cipher>ECipherRC2_CBC_40</cipher>
   478 		<element>
   479 			<passwd>password</passwd>
   480 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   481 		</element>
   482 	</actionbody>
   483 	<actionresult>
   484 		<return>KErrNone</return>
   485 	</actionresult>
   486 </action>
   487 
   488 <action>
   489 	<actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
   490 	<actiontype>Element</actiontype>
   491 	<actionbody>
   492 		<cipher>ECipherRC2_CBC_40</cipher>
   493 		<element>
   494 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   495 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   496 		</element>
   497 	</actionbody>
   498 	<actionresult>
   499 		<return>KErrNone</return>
   500 	</actionresult>
   501 </action>
   502 
   503 <action>
   504 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
   505 	<actiontype>Set</actiontype>
   506 	<actionbody>
   507 		<cipher>ECipherRC2_CBC_40</cipher>
   508 		<set>
   509 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   510 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   511 		</set>
   512 	</actionbody>
   513 	<actionresult>
   514 		<return>KErrNone</return>
   515 	</actionresult>
   516 </action>
   517 
   518 <action>
   519 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
   520 	<actiontype>Set</actiontype>
   521 	<actionbody>
   522 		<cipher>ECipherRC2_CBC_40</cipher>
   523 		<set>
   524 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   525 			<input>B</input>
   526 		</set>
   527 	</actionbody>
   528 	<actionresult>
   529 		<return>KErrNone</return>
   530 	</actionresult>
   531 </action>
   532 
   533 <action>
   534 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
   535 	<actiontype>Set</actiontype>
   536 	<actionbody>
   537 		<cipher>ECipherRC2_CBC_40</cipher>
   538 		<set>
   539 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   540 			<input>ZYXWUTSR</input>
   541 		</set>
   542 	</actionbody>
   543 	<actionresult>
   544 		<return>KErrNone</return>
   545 	</actionresult>
   546 </action>
   547 
   548 <action>
   549 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
   550 	<actiontype>Set</actiontype>
   551 	<actionbody>
   552 		<cipher>ECipherRC2_CBC_40</cipher>
   553 		<set>
   554 			<passwd>m</passwd>
   555 			<input>ZYXWUTSR</input>
   556 		</set>
   557 	</actionbody>
   558 	<actionresult>
   559 		<return>KErrNone</return>
   560 	</actionresult>
   561 </action>
   562 
   563 <action>
   564 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
   565 	<actiontype>Set</actiontype>
   566 	<actionbody>
   567 		<cipher>ECipherRC2_CBC_40</cipher>
   568 		<set>
   569 			<passwd></passwd>
   570 			<input>ZYXWUTSR</input>
   571 		</set>
   572 	</actionbody>
   573 	<actionresult>
   574 		<return>KErrNone</return>
   575 	</actionresult>
   576 </action>
   577 
   578 <action>
   579 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
   580 	<actiontype>Set</actiontype>
   581 	<actionbody>
   582 		<cipher>ECipherRC2_CBC_40</cipher>
   583 		<set>
   584 			<passwd></passwd>
   585 			<input></input>
   586 		</set>
   587 	</actionbody>
   588 	<actionresult>
   589 		<return>KErrNone</return>
   590 	</actionresult>
   591 </action>
   592 
   593 ///////////////////////////////////////////////////////////////////////////////////
   594 ///////////////////////////////////////////////////////////////////////////////////
   595 ///////////////////////////////////////////////////////////////////////////////////
   596 
   597 <action>
   598 	<actionname>Element test case 1, ECipher3DES_CBC</actionname>
   599 	<actiontype>Element</actiontype>
   600 	<actionbody>
   601 		<cipher>ECipher3DES_CBC</cipher>
   602 		<element>
   603 			<passwd>password</passwd>
   604 			<input>This is what I want to encrypt</input>
   605 		</element>
   606 	</actionbody>
   607 	<actionresult>
   608 		<return>KErrNone</return>
   609 	</actionresult>
   610 </action>
   611 
   612 <action>
   613 	<actionname>Element test case 2, ECipher3DES_CBC</actionname>
   614 	<actiontype>Element</actiontype>
   615 	<actionbody>
   616 		<cipher>ECipher3DES_CBC</cipher>
   617 		<element>
   618 			<passwd>password</passwd>
   619 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   620 		</element>
   621 	</actionbody>
   622 	<actionresult>
   623 		<return>KErrNone</return>
   624 	</actionresult>
   625 </action>
   626 
   627 <action>
   628 	<actionname>Element test case 3, ECipher3DES_CBC</actionname>
   629 	<actiontype>Element</actiontype>
   630 	<actionbody>
   631 		<cipher>ECipher3DES_CBC</cipher>
   632 		<element>
   633 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   634 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   635 		</element>
   636 	</actionbody>
   637 	<actionresult>
   638 		<return>KErrNone</return>
   639 	</actionresult>
   640 </action>
   641 
   642 <action>
   643 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
   644 	<actiontype>Set</actiontype>
   645 	<actionbody>
   646 		<cipher>ECipher3DES_CBC</cipher>
   647 		<set>
   648 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   649 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   650 		</set>
   651 	</actionbody>
   652 	<actionresult>
   653 		<return>KErrNone</return>
   654 	</actionresult>
   655 </action>
   656 
   657 <action>
   658 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
   659 	<actiontype>Set</actiontype>
   660 	<actionbody>
   661 		<cipher>ECipher3DES_CBC</cipher>
   662 		<set>
   663 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   664 			<input>B</input>
   665 		</set>
   666 	</actionbody>
   667 	<actionresult>
   668 		<return>KErrNone</return>
   669 	</actionresult>
   670 </action>
   671 
   672 <action>
   673 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
   674 	<actiontype>Set</actiontype>
   675 	<actionbody>
   676 		<cipher>ECipher3DES_CBC</cipher>
   677 		<set>
   678 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   679 			<input>ZYXWUTSR</input>
   680 		</set>
   681 	</actionbody>
   682 	<actionresult>
   683 		<return>KErrNone</return>
   684 	</actionresult>
   685 </action>
   686 
   687 <action>
   688 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
   689 	<actiontype>Set</actiontype>
   690 	<actionbody>
   691 		<cipher>ECipher3DES_CBC</cipher>
   692 		<set>
   693 			<passwd>m</passwd>
   694 			<input>ZYXWUTSR</input>
   695 		</set>
   696 	</actionbody>
   697 	<actionresult>
   698 		<return>KErrNone</return>
   699 	</actionresult>
   700 </action>
   701 
   702 <action>
   703 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
   704 	<actiontype>Set</actiontype>
   705 	<actionbody>
   706 		<cipher>ECipher3DES_CBC</cipher>
   707 		<set>
   708 			<passwd></passwd>
   709 			<input>ZYXWUTSR</input>
   710 		</set>
   711 	</actionbody>
   712 	<actionresult>
   713 		<return>KErrNone</return>
   714 	</actionresult>
   715 </action>
   716 
   717 <action>
   718 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
   719 	<actiontype>Set</actiontype>
   720 	<actionbody>
   721 		<cipher>ECipher3DES_CBC</cipher>
   722 		<set>
   723 			<passwd></passwd>
   724 			<input></input>
   725 		</set>
   726 	</actionbody>
   727 	<actionresult>
   728 		<return>KErrNone</return>
   729 	</actionresult>
   730 </action>
   731 
   732 ///////////////////////////////////////////////////////////////////////////////////
   733 ///////////////////////////////////////////////////////////////////////////////////
   734 ///////////////////////////////////////////////////////////////////////////////////
   735 
   736 <action>
   737 	<actionname>Element test case 1, ECipherAES_CBC_256</actionname>
   738 	<actiontype>Element</actiontype>
   739 	<actionbody>
   740 		<cipher>ECipherAES_CBC_256</cipher>
   741 		<element>
   742 			<passwd>password</passwd>
   743 			<input>This is what I want to encrypt</input>
   744 		</element>
   745 	</actionbody>
   746 	<actionresult>
   747 		<return>KErrNone</return>
   748 	</actionresult>
   749 </action>
   750 
   751 <action>
   752 	<actionname>Element test case 2, ECipherAES_CBC_256</actionname>
   753 	<actiontype>Element</actiontype>
   754 	<actionbody>
   755 		<cipher>ECipherAES_CBC_256</cipher>
   756 		<element>
   757 			<passwd>password</passwd>
   758 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   759 		</element>
   760 	</actionbody>
   761 	<actionresult>
   762 		<return>KErrNone</return>
   763 	</actionresult>
   764 </action>
   765 
   766 <action>
   767 	<actionname>Element test case 3, ECipherAES_CBC_256</actionname>
   768 	<actiontype>Element</actiontype>
   769 	<actionbody>
   770 		<cipher>ECipherAES_CBC_256</cipher>
   771 		<element>
   772 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   773 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   774 		</element>
   775 	</actionbody>
   776 	<actionresult>
   777 		<return>KErrNone</return>
   778 	</actionresult>
   779 </action>
   780 
   781 <action>
   782 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
   783 	<actiontype>Set</actiontype>
   784 	<actionbody>
   785 		<cipher>ECipherAES_CBC_256</cipher>
   786 		<set>
   787 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   788 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   789 		</set>
   790 	</actionbody>
   791 	<actionresult>
   792 		<return>KErrNone</return>
   793 	</actionresult>
   794 </action>
   795 
   796 <action>
   797 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
   798 	<actiontype>Set</actiontype>
   799 	<actionbody>
   800 		<cipher>ECipherAES_CBC_256</cipher>
   801 		<set>
   802 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   803 			<input>B</input>
   804 		</set>
   805 	</actionbody>
   806 	<actionresult>
   807 		<return>KErrNone</return>
   808 	</actionresult>
   809 </action>
   810 
   811 <action>
   812 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
   813 	<actiontype>Set</actiontype>
   814 	<actionbody>
   815 		<cipher>ECipherAES_CBC_256</cipher>
   816 		<set>
   817 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   818 			<input>ZYXWUTSR</input>
   819 		</set>
   820 	</actionbody>
   821 	<actionresult>
   822 		<return>KErrNone</return>
   823 	</actionresult>
   824 </action>
   825 
   826 <action>
   827 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
   828 	<actiontype>Set</actiontype>
   829 	<actionbody>
   830 		<cipher>ECipherAES_CBC_256</cipher>
   831 		<set>
   832 			<passwd>m</passwd>
   833 			<input>ZYXWUTSR</input>
   834 		</set>
   835 	</actionbody>
   836 	<actionresult>
   837 		<return>KErrNone</return>
   838 	</actionresult>
   839 </action>
   840 
   841 <action>
   842 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
   843 	<actiontype>Set</actiontype>
   844 	<actionbody>
   845 		<cipher>ECipherAES_CBC_256</cipher>
   846 		<set>
   847 			<passwd></passwd>
   848 			<input>ZYXWUTSR</input>
   849 		</set>
   850 	</actionbody>
   851 	<actionresult>
   852 		<return>KErrNone</return>
   853 	</actionresult>
   854 </action>
   855 
   856 <action>
   857 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
   858 	<actiontype>Set</actiontype>
   859 	<actionbody>
   860 		<cipher>ECipherAES_CBC_256</cipher>
   861 		<set>
   862 			<passwd></passwd>
   863 			<input></input>
   864 		</set>
   865 	</actionbody>
   866 	<actionresult>
   867 		<return>KErrNone</return>
   868 	</actionresult>
   869 </action>
   870 
   871 ///////////////////////////////////////////////////////////////////////////////////
   872 ///////////////////////////////////////////////////////////////////////////////////
   873 ///////////////////////////////////////////////////////////////////////////////////
   874 
   875 <action>
   876 	<actionname>Element test case 1, ECipherAES_CBC_192</actionname>
   877 	<actiontype>Element</actiontype>
   878 	<actionbody>
   879 		<cipher>ECipherAES_CBC_192</cipher>
   880 		<element>
   881 			<passwd>password</passwd>
   882 			<input>This is what I want to encrypt</input>
   883 		</element>
   884 	</actionbody>
   885 	<actionresult>
   886 		<return>KErrNone</return>
   887 	</actionresult>
   888 </action>
   889 
   890 <action>
   891 	<actionname>Element test case 2, ECipherAES_CBC_192</actionname>
   892 	<actiontype>Element</actiontype>
   893 	<actionbody>
   894 		<cipher>ECipherAES_CBC_192</cipher>
   895 		<element>
   896 			<passwd>password</passwd>
   897 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   898 		</element>
   899 	</actionbody>
   900 	<actionresult>
   901 		<return>KErrNone</return>
   902 	</actionresult>
   903 </action>
   904 
   905 <action>
   906 	<actionname>Element test case 3, ECipherAES_CBC_192</actionname>
   907 	<actiontype>Element</actiontype>
   908 	<actionbody>
   909 		<cipher>ECipherAES_CBC_192</cipher>
   910 		<element>
   911 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   912 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   913 		</element>
   914 	</actionbody>
   915 	<actionresult>
   916 		<return>KErrNone</return>
   917 	</actionresult>
   918 </action>
   919 
   920 <action>
   921 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
   922 	<actiontype>Set</actiontype>
   923 	<actionbody>
   924 		<cipher>ECipherAES_CBC_192</cipher>
   925 		<set>
   926 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   927 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
   928 		</set>
   929 	</actionbody>
   930 	<actionresult>
   931 		<return>KErrNone</return>
   932 	</actionresult>
   933 </action>
   934 
   935 <action>
   936 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
   937 	<actiontype>Set</actiontype>
   938 	<actionbody>
   939 		<cipher>ECipherAES_CBC_192</cipher>
   940 		<set>
   941 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   942 			<input>B</input>
   943 		</set>
   944 	</actionbody>
   945 	<actionresult>
   946 		<return>KErrNone</return>
   947 	</actionresult>
   948 </action>
   949 
   950 <action>
   951 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
   952 	<actiontype>Set</actiontype>
   953 	<actionbody>
   954 		<cipher>ECipherAES_CBC_192</cipher>
   955 		<set>
   956 			<passwd>a90lkjasjk3lk32kdf89</passwd>
   957 			<input>ZYXWUTSR</input>
   958 		</set>
   959 	</actionbody>
   960 	<actionresult>
   961 		<return>KErrNone</return>
   962 	</actionresult>
   963 </action>
   964 
   965 <action>
   966 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
   967 	<actiontype>Set</actiontype>
   968 	<actionbody>
   969 		<cipher>ECipherAES_CBC_192</cipher>
   970 		<set>
   971 			<passwd>m</passwd>
   972 			<input>ZYXWUTSR</input>
   973 		</set>
   974 	</actionbody>
   975 	<actionresult>
   976 		<return>KErrNone</return>
   977 	</actionresult>
   978 </action>
   979 
   980 <action>
   981 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
   982 	<actiontype>Set</actiontype>
   983 	<actionbody>
   984 		<cipher>ECipherAES_CBC_192</cipher>
   985 		<set>
   986 			<passwd></passwd>
   987 			<input>ZYXWUTSR</input>
   988 		</set>
   989 	</actionbody>
   990 	<actionresult>
   991 		<return>KErrNone</return>
   992 	</actionresult>
   993 </action>
   994 
   995 <action>
   996 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
   997 	<actiontype>Set</actiontype>
   998 	<actionbody>
   999 		<cipher>ECipherAES_CBC_192</cipher>
  1000 		<set>
  1001 			<passwd></passwd>
  1002 			<input></input>
  1003 		</set>
  1004 	</actionbody>
  1005 	<actionresult>
  1006 		<return>KErrNone</return>
  1007 	</actionresult>
  1008 </action>
  1009 
  1010 ///////////////////////////////////////////////////////////////////////////////////
  1011 ///////////////////////////////////////////////////////////////////////////////////
  1012 ///////////////////////////////////////////////////////////////////////////////////
  1013 
  1014 
  1015 <action>
  1016 	<actionname>Element test case 1, ECipherAES_CBC_128</actionname>
  1017 	<actiontype>Element</actiontype>
  1018 	<actionbody>
  1019 		<cipher>ECipherAES_CBC_128</cipher>
  1020 		<element>
  1021 			<passwd>password</passwd>
  1022 			<input>This is what I want to encrypt</input>
  1023 		</element>
  1024 	</actionbody>
  1025 	<actionresult>
  1026 		<return>KErrNone</return>
  1027 	</actionresult>
  1028 </action>
  1029 
  1030 <action>
  1031 	<actionname>Element test case 2, ECipherAES_CBC_128</actionname>
  1032 	<actiontype>Element</actiontype>
  1033 	<actionbody>
  1034 		<cipher>ECipherAES_CBC_128</cipher>
  1035 		<element>
  1036 			<passwd>password</passwd>
  1037 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1038 		</element>
  1039 	</actionbody>
  1040 	<actionresult>
  1041 		<return>KErrNone</return>
  1042 	</actionresult>
  1043 </action>
  1044 
  1045 <action>
  1046 	<actionname>Element test case 3, ECipherAES_CBC_128</actionname>
  1047 	<actiontype>Element</actiontype>
  1048 	<actionbody>
  1049 		<cipher>ECipherAES_CBC_128</cipher>
  1050 		<element>
  1051 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1052 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1053 		</element>
  1054 	</actionbody>
  1055 	<actionresult>
  1056 		<return>KErrNone</return>
  1057 	</actionresult>
  1058 </action>
  1059 
  1060 <action>
  1061 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
  1062 	<actiontype>Set</actiontype>
  1063 	<actionbody>
  1064 		<cipher>ECipherAES_CBC_128</cipher>
  1065 		<set>
  1066 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1067 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1068 		</set>
  1069 	</actionbody>
  1070 	<actionresult>
  1071 		<return>KErrNone</return>
  1072 	</actionresult>
  1073 </action>
  1074 
  1075 <action>
  1076 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
  1077 	<actiontype>Set</actiontype>
  1078 	<actionbody>
  1079 		<cipher>ECipherAES_CBC_128</cipher>
  1080 		<set>
  1081 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1082 			<input>B</input>
  1083 		</set>
  1084 	</actionbody>
  1085 	<actionresult>
  1086 		<return>KErrNone</return>
  1087 	</actionresult>
  1088 </action>
  1089 
  1090 <action>
  1091 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
  1092 	<actiontype>Set</actiontype>
  1093 	<actionbody>
  1094 		<cipher>ECipherAES_CBC_128</cipher>
  1095 		<set>
  1096 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1097 			<input>ZYXWUTSR</input>
  1098 		</set>
  1099 	</actionbody>
  1100 	<actionresult>
  1101 		<return>KErrNone</return>
  1102 	</actionresult>
  1103 </action>
  1104 
  1105 <action>
  1106 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
  1107 	<actiontype>Set</actiontype>
  1108 	<actionbody>
  1109 		<cipher>ECipherAES_CBC_128</cipher>
  1110 		<set>
  1111 			<passwd>m</passwd>
  1112 			<input>ZYXWUTSR</input>
  1113 		</set>
  1114 	</actionbody>
  1115 	<actionresult>
  1116 		<return>KErrNone</return>
  1117 	</actionresult>
  1118 </action>
  1119 
  1120 <action>
  1121 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
  1122 	<actiontype>Set</actiontype>
  1123 	<actionbody>
  1124 		<cipher>ECipherAES_CBC_128</cipher>
  1125 		<set>
  1126 			<passwd></passwd>
  1127 			<input>ZYXWUTSR</input>
  1128 		</set>
  1129 	</actionbody>
  1130 	<actionresult>
  1131 		<return>KErrNone</return>
  1132 	</actionresult>
  1133 </action>
  1134 
  1135 <action>
  1136 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
  1137 	<actiontype>Set</actiontype>
  1138 	<actionbody>
  1139 		<cipher>ECipherAES_CBC_128</cipher>
  1140 		<set>
  1141 			<passwd></passwd>
  1142 			<input></input>
  1143 		</set>
  1144 	</actionbody>
  1145 	<actionresult>
  1146 		<return>KErrNone</return>
  1147 	</actionresult>
  1148 </action>
  1149 
  1150 ///////////////////////////////////////////////////////////////////////////////////
  1151 ///////////////////////////////////////////////////////////////////////////////////
  1152 ///////////////////////////////////////////////////////////////////////////////////
  1153 
  1154 
  1155 // Start of Permanent File Store PBE testing between weak and strong crypto
  1156 <action>
  1157 	<actionname>Write encrypted data to a PFS named according to crypto strength</actionname>
  1158 	<actiontype>WritePFS</actiontype>
  1159 	<actionbody>
  1160 		<writepfs>
  1161 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1162 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1163 		</writepfs>
  1164 	</actionbody>
  1165 	<actionresult>
  1166 		<return>KErrNone</return>
  1167 	</actionresult>
  1168 </action>
  1169 <action>
  1170 	<actionname>Decrypting weak crypto file</actionname>
  1171 	<actiontype>ReadPFS</actiontype>
  1172 	<actionbody>
  1173 		<readpfs>
  1174 			<strength>weak</strength>
  1175 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1176 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1177 		</readpfs>
  1178 	</actionbody>
  1179 	<actionresult>
  1180 		<return>KErrNone</return>
  1181 	</actionresult>
  1182 </action>
  1183 <action>
  1184 	<actionname>Decrypting strong crypto file</actionname>
  1185 	<actiontype>ReadPFS</actiontype>
  1186 	<actionbody>
  1187 		<readpfs>
  1188 			<strength>strong</strength>
  1189 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1190 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1191 		</readpfs>
  1192 	</actionbody>
  1193 	<actionresult>
  1194 		<return>KErrNone</return>
  1195 	</actionresult>
  1196 </action>
  1197 
  1198 //Start of OOM testing
  1199 <action>
  1200     <actionname>OOM start</actionname>
  1201     <actiontype>startmemfailure</actiontype>
  1202     <actionbody></actionbody>
  1203     <actionresult>
  1204         <return>KErrNone</return>
  1205     </actionresult>
  1206 </action>
  1207 <action>
  1208 	<actionname>Element test case 2</actionname>
  1209 	<actiontype>Element</actiontype>
  1210 	<actionbody>
  1211 		<element>
  1212 			<passwd>password</passwd>
  1213 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1214 		</element>
  1215 	</actionbody>
  1216 	<actionresult>
  1217 		<return>KErrNone</return>
  1218 	</actionresult>
  1219 </action>
  1220 <action>
  1221 	<actionname>Test of Set encryption, password changing, exporting importing Test 1</actionname>
  1222 	<actiontype>Set</actiontype>
  1223 	<actionbody>
  1224 		<set>
  1225 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1226 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1227 		</set>
  1228 	</actionbody>
  1229 	<actionresult>
  1230 		<return>KErrNone</return>
  1231 	</actionresult>
  1232 </action>
  1233 <action>
  1234     <actionname>OOM end</actionname>
  1235     <actiontype>stopmemfailure</actiontype>
  1236     <actionbody></actionbody>
  1237     <actionresult>
  1238         <return>KErrNone</return>
  1239     </actionresult>
  1240 </action>
  1241 
  1242 
  1243 // =======================================================================
  1244 // PKCS#12 tests
  1245 
  1246 
  1247 //! @SYMTestCaseID CIT_PREQ1054_02
  1248 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1249 //! @SYMREQ CIT_PREQ1054
  1250 //! @SYMTestPriority medium
  1251 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1252 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1253 <action>
  1254 	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
  1255 	<actiontype>Element</actiontype>
  1256 	<actionbody>
  1257 		<kdf>PKCS#12</kdf>
  1258 		<salt_len_bytes>20</salt_len_bytes>
  1259 		<iter_count>1024</iter_count>
  1260 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1261 		<element>
  1262 			<passwd>password</passwd>
  1263 			<input>This is what I want to encrypt</input>
  1264 		</element>
  1265 	</actionbody>
  1266 	<actionresult>
  1267 		<return>KErrNone</return>
  1268 	</actionresult>
  1269 </action>
  1270 
  1271 
  1272 //! @SYMTestCaseID CIT_PREQ1054_02
  1273 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1274 //! @SYMREQ CIT_PREQ1054
  1275 //! @SYMTestPriority medium
  1276 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1277 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1278 <action>
  1279 	<actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
  1280 	<actiontype>Element</actiontype>
  1281 	<actionbody>
  1282 		<kdf>PKCS#12</kdf>
  1283 		<salt_len_bytes>20</salt_len_bytes>
  1284 		<iter_count>1024</iter_count>
  1285 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1286 		<element>
  1287 			<passwd>password</passwd>
  1288 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1289 		</element>
  1290 	</actionbody>
  1291 	<actionresult>
  1292 		<return>KErrNone</return>
  1293 	</actionresult>
  1294 </action>
  1295 
  1296 //! @SYMTestCaseID CIT_PREQ1054_02
  1297 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1298 //! @SYMREQ CIT_PREQ1054
  1299 //! @SYMTestPriority medium
  1300 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1301 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1302 <action>
  1303 	<actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
  1304 	<actiontype>Element</actiontype>
  1305 	<actionbody>
  1306 		<kdf>PKCS#12</kdf>
  1307 		<salt_len_bytes>20</salt_len_bytes>
  1308 		<iter_count>1024</iter_count>
  1309 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1310 		<element>
  1311 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1312 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1313 		</element>
  1314 	</actionbody>
  1315 	<actionresult>
  1316 		<return>KErrNone</return>
  1317 	</actionresult>
  1318 </action>
  1319 
  1320 
  1321 //! @SYMTestCaseID CIT_PREQ1054_02
  1322 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1323 //! @SYMREQ CIT_PREQ1054
  1324 //! @SYMTestPriority medium
  1325 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1326 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1327 <action>
  1328 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
  1329 	<actiontype>Set</actiontype>
  1330 	<actionbody>
  1331 		<kdf>PKCS#12</kdf>
  1332 		<salt_len_bytes>20</salt_len_bytes>
  1333 		<iter_count>1024</iter_count>
  1334 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1335 		<set>
  1336 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1337 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1338 		</set>
  1339 	</actionbody>
  1340 	<actionresult>
  1341 		<return>KErrNone</return>
  1342 	</actionresult>
  1343 </action>
  1344 
  1345 
  1346 //! @SYMTestCaseID CIT_PREQ1054_02
  1347 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#5 KDF.
  1348 //! @SYMREQ CIT_PREQ1054
  1349 //! @SYMTestPriority medium
  1350 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1352 <action>
  1353 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
  1354 	<actiontype>Set</actiontype>
  1355 	<actionbody>
  1356 		<kdf>PKCS#12</kdf>
  1357 		<salt_len_bytes>20</salt_len_bytes>
  1358 		<iter_count>1024</iter_count>
  1359 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1360 		<kdf>PKCS#5</kdf>
  1361 		<salt_len_bytes>16</salt_len_bytes>
  1362 		<iter_count>1000</iter_count>
  1363 		<set>
  1364 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1365 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1366 		</set>
  1367 	</actionbody>
  1368 	<actionresult>
  1369 		<return>KErrNone</return>
  1370 	</actionresult>
  1371 </action>
  1372 
  1373 
  1374 //! @SYMTestCaseID CIT_PREQ1054_02
  1375 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1376 //! @SYMREQ CIT_PREQ1054
  1377 //! @SYMTestPriority medium
  1378 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1379 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1380 <action>
  1381 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
  1382 	<actiontype>Set</actiontype>
  1383 	<actionbody>
  1384 		<kdf>PKCS#12</kdf>
  1385 		<salt_len_bytes>20</salt_len_bytes>
  1386 		<iter_count>1024</iter_count>
  1387 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1388 		<set>
  1389 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1390 			<input>B</input>
  1391 		</set>
  1392 	</actionbody>
  1393 	<actionresult>
  1394 		<return>KErrNone</return>
  1395 	</actionresult>
  1396 </action>
  1397 
  1398 
  1399 //! @SYMTestCaseID CIT_PREQ1054_02
  1400 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1401 //! @SYMREQ CIT_PREQ1054
  1402 //! @SYMTestPriority medium
  1403 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1404 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1405 <action>
  1406 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
  1407 	<actiontype>Set</actiontype>
  1408 	<actionbody>
  1409 		<kdf>PKCS#12</kdf>
  1410 		<salt_len_bytes>20</salt_len_bytes>
  1411 		<iter_count>1024</iter_count>
  1412 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1413 		<set>
  1414 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1415 			<input>ZYXWUTSR</input>
  1416 		</set>
  1417 	</actionbody>
  1418 	<actionresult>
  1419 		<return>KErrNone</return>
  1420 	</actionresult>
  1421 </action>
  1422 
  1423 
  1424 //! @SYMTestCaseID CIT_PREQ1054_02
  1425 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1426 //! @SYMREQ CIT_PREQ1054
  1427 //! @SYMTestPriority medium
  1428 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1429 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1430 <action>
  1431 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
  1432 	<actiontype>Set</actiontype>
  1433 	<actionbody>
  1434 		<kdf>PKCS#12</kdf>
  1435 		<salt_len_bytes>20</salt_len_bytes>
  1436 		<iter_count>1024</iter_count>
  1437 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1438 		<set>
  1439 			<passwd>m</passwd>
  1440 			<input>ZYXWUTSR</input>
  1441 		</set>
  1442 	</actionbody>
  1443 	<actionresult>
  1444 		<return>KErrNone</return>
  1445 	</actionresult>
  1446 </action>
  1447 
  1448 
  1449 //! @SYMTestCaseID CIT_PREQ1054_02
  1450 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1451 //! @SYMREQ CIT_PREQ1054
  1452 //! @SYMTestPriority medium
  1453 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1454 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1455 <action>
  1456 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
  1457 	<actiontype>Set</actiontype>
  1458 	<actionbody>
  1459 		<kdf>PKCS#12</kdf>
  1460 		<salt_len_bytes>20</salt_len_bytes>
  1461 		<iter_count>1024</iter_count>
  1462 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1463 		<set>
  1464 			<passwd></passwd>
  1465 			<input>ZYXWUTSR</input>
  1466 		</set>
  1467 	</actionbody>
  1468 	<actionresult>
  1469 		<return>KErrNone</return>
  1470 	</actionresult>
  1471 </action>
  1472 
  1473 
  1474 //! @SYMTestCaseID CIT_PREQ1054_02
  1475 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1476 //! @SYMREQ CIT_PREQ1054
  1477 //! @SYMTestPriority medium
  1478 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1479 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1480 <action>
  1481 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
  1482 	<actiontype>Set</actiontype>
  1483 	<actionbody>
  1484 		<kdf>PKCS#12</kdf>
  1485 		<salt_len_bytes>20</salt_len_bytes>
  1486 		<iter_count>1024</iter_count>
  1487 		<cipher>ECipherRC2_CBC_128_16</cipher>
  1488 		<set>
  1489 			<passwd></passwd>
  1490 			<input></input>
  1491 		</set>
  1492 	</actionbody>
  1493 	<actionresult>
  1494 		<return>KErrNone</return>
  1495 	</actionresult>
  1496 </action>
  1497 
  1498 ///////////////////////////////////////////////////////////////////////////////////
  1499 ///////////////////////////////////////////////////////////////////////////////////
  1500 ///////////////////////////////////////////////////////////////////////////////////
  1501 
  1502 
  1503 //! @SYMTestCaseID CIT_PREQ1054_02
  1504 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1505 //! @SYMREQ CIT_PREQ1054
  1506 //! @SYMTestPriority medium
  1507 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1508 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1509 <action>
  1510 	<actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
  1511 	<actiontype>Element</actiontype>
  1512 	<actionbody>
  1513 		<kdf>PKCS#12</kdf>
  1514 		<salt_len_bytes>20</salt_len_bytes>
  1515 		<iter_count>1024</iter_count>
  1516 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1517 		<element>
  1518 			<passwd>password</passwd>
  1519 			<input>This is what I want to encrypt</input>
  1520 		</element>
  1521 	</actionbody>
  1522 	<actionresult>
  1523 		<return>KErrNone</return>
  1524 	</actionresult>
  1525 </action>
  1526 
  1527 
  1528 //! @SYMTestCaseID CIT_PREQ1054_02
  1529 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1530 //! @SYMREQ CIT_PREQ1054
  1531 //! @SYMTestPriority medium
  1532 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1533 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1534 <action>
  1535 	<actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
  1536 	<actiontype>Element</actiontype>
  1537 	<actionbody>
  1538 		<kdf>PKCS#12</kdf>
  1539 		<salt_len_bytes>20</salt_len_bytes>
  1540 		<iter_count>1024</iter_count>
  1541 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1542 		<element>
  1543 			<passwd>password</passwd>
  1544 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1545 		</element>
  1546 	</actionbody>
  1547 	<actionresult>
  1548 		<return>KErrNone</return>
  1549 	</actionresult>
  1550 </action>
  1551 
  1552 
  1553 //! @SYMTestCaseID CIT_PREQ1054_02
  1554 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1555 //! @SYMREQ CIT_PREQ1054
  1556 //! @SYMTestPriority medium
  1557 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1558 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1559 <action>
  1560 	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
  1561 	<actiontype>Element</actiontype>
  1562 	<actionbody>
  1563 		<kdf>PKCS#12</kdf>
  1564 		<salt_len_bytes>20</salt_len_bytes>
  1565 		<iter_count>1024</iter_count>
  1566 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1567 		<element>
  1568 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1569 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1570 		</element>
  1571 	</actionbody>
  1572 	<actionresult>
  1573 		<return>KErrNone</return>
  1574 	</actionresult>
  1575 </action>
  1576 
  1577 
  1578 //! @SYMTestCaseID CIT_PREQ1054_02
  1579 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1580 //! @SYMREQ CIT_PREQ1054
  1581 //! @SYMTestPriority medium
  1582 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1583 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1584 <action>
  1585 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
  1586 	<actiontype>Set</actiontype>
  1587 	<actionbody>
  1588 		<kdf>PKCS#12</kdf>
  1589 		<salt_len_bytes>20</salt_len_bytes>
  1590 		<iter_count>1024</iter_count>
  1591 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1592 		<set>
  1593 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1594 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1595 		</set>
  1596 	</actionbody>
  1597 	<actionresult>
  1598 		<return>KErrNone</return>
  1599 	</actionresult>
  1600 </action>
  1601 
  1602 
  1603 //! @SYMTestCaseID CIT_PREQ1054_02
  1604 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1605 //! @SYMREQ CIT_PREQ1054
  1606 //! @SYMTestPriority medium
  1607 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1608 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1609 <action>
  1610 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
  1611 	<actiontype>Set</actiontype>
  1612 	<actionbody>
  1613 		<kdf>PKCS#12</kdf>
  1614 		<salt_len_bytes>20</salt_len_bytes>
  1615 		<iter_count>1024</iter_count>
  1616 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1617 		<set>
  1618 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1619 			<input>B</input>
  1620 		</set>
  1621 	</actionbody>
  1622 	<actionresult>
  1623 		<return>KErrNone</return>
  1624 	</actionresult>
  1625 </action>
  1626 
  1627 
  1628 //! @SYMTestCaseID CIT_PREQ1054_02
  1629 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1630 //! @SYMREQ CIT_PREQ1054
  1631 //! @SYMTestPriority medium
  1632 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1633 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1634 <action>
  1635 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
  1636 	<actiontype>Set</actiontype>
  1637 	<actionbody>
  1638 		<kdf>PKCS#12</kdf>
  1639 		<salt_len_bytes>20</salt_len_bytes>
  1640 		<iter_count>1024</iter_count>
  1641 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1642 		<set>
  1643 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1644 			<input>ZYXWUTSR</input>
  1645 		</set>
  1646 	</actionbody>
  1647 	<actionresult>
  1648 		<return>KErrNone</return>
  1649 	</actionresult>
  1650 </action>
  1651 
  1652 
  1653 //! @SYMTestCaseID CIT_PREQ1054_02
  1654 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1655 //! @SYMREQ CIT_PREQ1054
  1656 //! @SYMTestPriority medium
  1657 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1658 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1659 <action>
  1660 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
  1661 	<actiontype>Set</actiontype>
  1662 	<actionbody>
  1663 		<kdf>PKCS#12</kdf>
  1664 		<salt_len_bytes>20</salt_len_bytes>
  1665 		<iter_count>1024</iter_count>
  1666 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1667 		<set>
  1668 			<passwd>m</passwd>
  1669 			<input>ZYXWUTSR</input>
  1670 		</set>
  1671 	</actionbody>
  1672 	<actionresult>
  1673 		<return>KErrNone</return>
  1674 	</actionresult>
  1675 </action>
  1676 
  1677 
  1678 //! @SYMTestCaseID CIT_PREQ1054_02
  1679 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1680 //! @SYMREQ CIT_PREQ1054
  1681 //! @SYMTestPriority medium
  1682 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1683 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1684 <action>
  1685 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
  1686 	<actiontype>Set</actiontype>
  1687 	<actionbody>
  1688 		<kdf>PKCS#12</kdf>
  1689 		<salt_len_bytes>20</salt_len_bytes>
  1690 		<iter_count>1024</iter_count>
  1691 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1692 		<set>
  1693 			<passwd></passwd>
  1694 			<input>ZYXWUTSR</input>
  1695 		</set>
  1696 	</actionbody>
  1697 	<actionresult>
  1698 		<return>KErrNone</return>
  1699 	</actionresult>
  1700 </action>
  1701 
  1702 
  1703 //! @SYMTestCaseID CIT_PREQ1054_02
  1704 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1705 //! @SYMREQ CIT_PREQ1054
  1706 //! @SYMTestPriority medium
  1707 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1708 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1709 <action>
  1710 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
  1711 	<actiontype>Set</actiontype>
  1712 	<actionbody>
  1713 		<kdf>PKCS#12</kdf>
  1714 		<salt_len_bytes>20</salt_len_bytes>
  1715 		<iter_count>1024</iter_count>
  1716 		<cipher>ECipherRC2_CBC_40_16</cipher>
  1717 		<set>
  1718 			<passwd></passwd>
  1719 			<input></input>
  1720 		</set>
  1721 	</actionbody>
  1722 	<actionresult>
  1723 		<return>KErrNone</return>
  1724 	</actionresult>
  1725 </action>
  1726 
  1727 ///////////////////////////////////////////////////////////////////////////////////
  1728 ///////////////////////////////////////////////////////////////////////////////////
  1729 ///////////////////////////////////////////////////////////////////////////////////
  1730 
  1731 
  1732 //! @SYMTestCaseID CIT_PREQ1054_02
  1733 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1734 //! @SYMREQ CIT_PREQ1054
  1735 //! @SYMTestPriority medium
  1736 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1737 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1738 <action>
  1739 	<actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
  1740 	<actiontype>Element</actiontype>
  1741 	<actionbody>
  1742 		<kdf>PKCS#12</kdf>
  1743 		<salt_len_bytes>20</salt_len_bytes>
  1744 		<iter_count>1024</iter_count>
  1745 		<cipher>ECipherRC2_CBC_128</cipher>
  1746 		<element>
  1747 			<passwd>password</passwd>
  1748 			<input>This is what I want to encrypt</input>
  1749 		</element>
  1750 	</actionbody>
  1751 	<actionresult>
  1752 		<return>KErrNone</return>
  1753 	</actionresult>
  1754 </action>
  1755 
  1756 
  1757 //! @SYMTestCaseID CIT_PREQ1054_02
  1758 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1759 //! @SYMREQ CIT_PREQ1054
  1760 //! @SYMTestPriority medium
  1761 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1762 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1763 <action>
  1764 	<actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
  1765 	<actiontype>Element</actiontype>
  1766 	<actionbody>
  1767 		<kdf>PKCS#12</kdf>
  1768 		<salt_len_bytes>20</salt_len_bytes>
  1769 		<iter_count>1024</iter_count>
  1770 		<cipher>ECipherRC2_CBC_128</cipher>
  1771 		<element>
  1772 			<passwd>password</passwd>
  1773 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1774 		</element>
  1775 	</actionbody>
  1776 	<actionresult>
  1777 		<return>KErrNone</return>
  1778 	</actionresult>
  1779 </action>
  1780 
  1781 
  1782 //! @SYMTestCaseID CIT_PREQ1054_02
  1783 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1784 //! @SYMREQ CIT_PREQ1054
  1785 //! @SYMTestPriority medium
  1786 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1787 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1788 <action>
  1789 	<actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
  1790 	<actiontype>Element</actiontype>
  1791 	<actionbody>
  1792 		<kdf>PKCS#12</kdf>
  1793 		<salt_len_bytes>20</salt_len_bytes>
  1794 		<iter_count>1024</iter_count>
  1795 		<cipher>ECipherRC2_CBC_128</cipher>
  1796 		<element>
  1797 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1798 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1799 		</element>
  1800 	</actionbody>
  1801 	<actionresult>
  1802 		<return>KErrNone</return>
  1803 	</actionresult>
  1804 </action>
  1805 
  1806 
  1807 //! @SYMTestCaseID CIT_PREQ1054_02
  1808 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1809 //! @SYMREQ CIT_PREQ1054
  1810 //! @SYMTestPriority medium
  1811 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1812 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1813 <action>
  1814 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
  1815 	<actiontype>Set</actiontype>
  1816 	<actionbody>
  1817 		<kdf>PKCS#12</kdf>
  1818 		<salt_len_bytes>20</salt_len_bytes>
  1819 		<iter_count>1024</iter_count>
  1820 		<cipher>ECipherRC2_CBC_128</cipher>
  1821 		<set>
  1822 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1823 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  1824 		</set>
  1825 	</actionbody>
  1826 	<actionresult>
  1827 		<return>KErrNone</return>
  1828 	</actionresult>
  1829 </action>
  1830 
  1831 
  1832 //! @SYMTestCaseID CIT_PREQ1054_02
  1833 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1834 //! @SYMREQ CIT_PREQ1054
  1835 //! @SYMTestPriority medium
  1836 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1837 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1838 <action>
  1839 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
  1840 	<actiontype>Set</actiontype>
  1841 	<actionbody>
  1842 		<kdf>PKCS#12</kdf>
  1843 		<salt_len_bytes>20</salt_len_bytes>
  1844 		<iter_count>1024</iter_count>
  1845 		<cipher>ECipherRC2_CBC_128</cipher>
  1846 		<set>
  1847 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1848 			<input>B</input>
  1849 		</set>
  1850 	</actionbody>
  1851 	<actionresult>
  1852 		<return>KErrNone</return>
  1853 	</actionresult>
  1854 </action>
  1855 
  1856 
  1857 //! @SYMTestCaseID CIT_PREQ1054_02
  1858 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1859 //! @SYMREQ CIT_PREQ1054
  1860 //! @SYMTestPriority medium
  1861 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1862 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1863 <action>
  1864 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
  1865 	<actiontype>Set</actiontype>
  1866 	<actionbody>
  1867 		<kdf>PKCS#12</kdf>
  1868 		<salt_len_bytes>20</salt_len_bytes>
  1869 		<iter_count>1024</iter_count>
  1870 		<cipher>ECipherRC2_CBC_128</cipher>
  1871 		<set>
  1872 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  1873 			<input>ZYXWUTSR</input>
  1874 		</set>
  1875 	</actionbody>
  1876 	<actionresult>
  1877 		<return>KErrNone</return>
  1878 	</actionresult>
  1879 </action>
  1880 
  1881 
  1882 //! @SYMTestCaseID CIT_PREQ1054_02
  1883 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1884 //! @SYMREQ CIT_PREQ1054
  1885 //! @SYMTestPriority medium
  1886 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1887 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1888 <action>
  1889 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
  1890 	<actiontype>Set</actiontype>
  1891 	<actionbody>
  1892 		<kdf>PKCS#12</kdf>
  1893 		<salt_len_bytes>20</salt_len_bytes>
  1894 		<iter_count>1024</iter_count>
  1895 		<cipher>ECipherRC2_CBC_128</cipher>
  1896 		<set>
  1897 			<passwd>m</passwd>
  1898 			<input>ZYXWUTSR</input>
  1899 		</set>
  1900 	</actionbody>
  1901 	<actionresult>
  1902 		<return>KErrNone</return>
  1903 	</actionresult>
  1904 </action>
  1905 
  1906 
  1907 //! @SYMTestCaseID CIT_PREQ1054_02
  1908 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1909 //! @SYMREQ CIT_PREQ1054
  1910 //! @SYMTestPriority medium
  1911 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1912 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1913 <action>
  1914 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
  1915 	<actiontype>Set</actiontype>
  1916 	<actionbody>
  1917 		<kdf>PKCS#12</kdf>
  1918 		<salt_len_bytes>20</salt_len_bytes>
  1919 		<iter_count>1024</iter_count>
  1920 		<cipher>ECipherRC2_CBC_128</cipher>
  1921 		<set>
  1922 			<passwd></passwd>
  1923 			<input>ZYXWUTSR</input>
  1924 		</set>
  1925 	</actionbody>
  1926 	<actionresult>
  1927 		<return>KErrNone</return>
  1928 	</actionresult>
  1929 </action>
  1930 
  1931 
  1932 //! @SYMTestCaseID CIT_PREQ1054_02
  1933 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1934 //! @SYMREQ CIT_PREQ1054
  1935 //! @SYMTestPriority medium
  1936 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1937 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1938 <action>
  1939 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
  1940 	<actiontype>Set</actiontype>
  1941 	<actionbody>
  1942 		<kdf>PKCS#12</kdf>
  1943 		<salt_len_bytes>20</salt_len_bytes>
  1944 		<iter_count>1024</iter_count>
  1945 		<cipher>ECipherRC2_CBC_128</cipher>
  1946 		<set>
  1947 			<passwd></passwd>
  1948 			<input></input>
  1949 		</set>
  1950 	</actionbody>
  1951 	<actionresult>
  1952 		<return>KErrNone</return>
  1953 	</actionresult>
  1954 </action>
  1955 
  1956 ///////////////////////////////////////////////////////////////////////////////////
  1957 ///////////////////////////////////////////////////////////////////////////////////
  1958 ///////////////////////////////////////////////////////////////////////////////////
  1959 
  1960 
  1961 //! @SYMTestCaseID CIT_PREQ1054_02
  1962 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1963 //! @SYMREQ CIT_PREQ1054
  1964 //! @SYMTestPriority medium
  1965 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1966 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1967 <action>
  1968 	<actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
  1969 	<actiontype>Element</actiontype>
  1970 	<actionbody>
  1971 		<kdf>PKCS#12</kdf>
  1972 		<salt_len_bytes>20</salt_len_bytes>
  1973 		<iter_count>1024</iter_count>
  1974 		<cipher>ECipherRC2_CBC_40</cipher>
  1975 		<element>
  1976 			<passwd>password</passwd>
  1977 			<input>This is what I want to encrypt</input>
  1978 		</element>
  1979 	</actionbody>
  1980 	<actionresult>
  1981 		<return>KErrNone</return>
  1982 	</actionresult>
  1983 </action>
  1984 
  1985 
  1986 //! @SYMTestCaseID CIT_PREQ1054_02
  1987 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  1988 //! @SYMREQ CIT_PREQ1054
  1989 //! @SYMTestPriority medium
  1990 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  1991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  1992 <action>
  1993 	<actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
  1994 	<actiontype>Element</actiontype>
  1995 	<actionbody>
  1996 		<kdf>PKCS#12</kdf>
  1997 		<salt_len_bytes>20</salt_len_bytes>
  1998 		<iter_count>1024</iter_count>
  1999 		<cipher>ECipherRC2_CBC_40</cipher>
  2000 		<element>
  2001 			<passwd>password</passwd>
  2002 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2003 		</element>
  2004 	</actionbody>
  2005 	<actionresult>
  2006 		<return>KErrNone</return>
  2007 	</actionresult>
  2008 </action>
  2009 
  2010 
  2011 //! @SYMTestCaseID CIT_PREQ1054_02
  2012 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2013 //! @SYMREQ CIT_PREQ1054
  2014 //! @SYMTestPriority medium
  2015 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2016 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2017 <action>
  2018 	<actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
  2019 	<actiontype>Element</actiontype>
  2020 	<actionbody>
  2021 		<kdf>PKCS#12</kdf>
  2022 		<salt_len_bytes>20</salt_len_bytes>
  2023 		<iter_count>1024</iter_count>
  2024 		<cipher>ECipherRC2_CBC_40</cipher>
  2025 		<element>
  2026 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2027 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2028 		</element>
  2029 	</actionbody>
  2030 	<actionresult>
  2031 		<return>KErrNone</return>
  2032 	</actionresult>
  2033 </action>
  2034 
  2035 
  2036 //! @SYMTestCaseID CIT_PREQ1054_02
  2037 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2038 //! @SYMREQ CIT_PREQ1054
  2039 //! @SYMTestPriority medium
  2040 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2041 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2042 <action>
  2043 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
  2044 	<actiontype>Set</actiontype>
  2045 	<actionbody>
  2046 		<kdf>PKCS#12</kdf>
  2047 		<salt_len_bytes>20</salt_len_bytes>
  2048 		<iter_count>1024</iter_count>
  2049 		<cipher>ECipherRC2_CBC_40</cipher>
  2050 		<set>
  2051 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2052 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2053 		</set>
  2054 	</actionbody>
  2055 	<actionresult>
  2056 		<return>KErrNone</return>
  2057 	</actionresult>
  2058 </action>
  2059 
  2060 
  2061 //! @SYMTestCaseID CIT_PREQ1054_02
  2062 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2063 //! @SYMREQ CIT_PREQ1054
  2064 //! @SYMTestPriority medium
  2065 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2066 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2067 <action>
  2068 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
  2069 	<actiontype>Set</actiontype>
  2070 	<actionbody>
  2071 		<kdf>PKCS#12</kdf>
  2072 		<salt_len_bytes>20</salt_len_bytes>
  2073 		<iter_count>1024</iter_count>
  2074 		<cipher>ECipherRC2_CBC_40</cipher>
  2075 		<set>
  2076 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2077 			<input>B</input>
  2078 		</set>
  2079 	</actionbody>
  2080 	<actionresult>
  2081 		<return>KErrNone</return>
  2082 	</actionresult>
  2083 </action>
  2084 
  2085 
  2086 //! @SYMTestCaseID CIT_PREQ1054_02
  2087 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2088 //! @SYMREQ CIT_PREQ1054
  2089 //! @SYMTestPriority medium
  2090 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2092 <action>
  2093 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
  2094 	<actiontype>Set</actiontype>
  2095 	<actionbody>
  2096 		<kdf>PKCS#12</kdf>
  2097 		<salt_len_bytes>20</salt_len_bytes>
  2098 		<iter_count>1024</iter_count>
  2099 		<cipher>ECipherRC2_CBC_40</cipher>
  2100 		<set>
  2101 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2102 			<input>ZYXWUTSR</input>
  2103 		</set>
  2104 	</actionbody>
  2105 	<actionresult>
  2106 		<return>KErrNone</return>
  2107 	</actionresult>
  2108 </action>
  2109 
  2110 
  2111 //! @SYMTestCaseID CIT_PREQ1054_02
  2112 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2113 //! @SYMREQ CIT_PREQ1054
  2114 //! @SYMTestPriority medium
  2115 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2116 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2117 <action>
  2118 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
  2119 	<actiontype>Set</actiontype>
  2120 	<actionbody>
  2121 		<kdf>PKCS#12</kdf>
  2122 		<salt_len_bytes>20</salt_len_bytes>
  2123 		<iter_count>1024</iter_count>
  2124 		<cipher>ECipherRC2_CBC_40</cipher>
  2125 		<set>
  2126 			<passwd>m</passwd>
  2127 			<input>ZYXWUTSR</input>
  2128 		</set>
  2129 	</actionbody>
  2130 	<actionresult>
  2131 		<return>KErrNone</return>
  2132 	</actionresult>
  2133 </action>
  2134 
  2135 
  2136 //! @SYMTestCaseID CIT_PREQ1054_02
  2137 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2138 //! @SYMREQ CIT_PREQ1054
  2139 //! @SYMTestPriority medium
  2140 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2141 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2142 <action>
  2143 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
  2144 	<actiontype>Set</actiontype>
  2145 	<actionbody>
  2146 		<kdf>PKCS#12</kdf>
  2147 		<salt_len_bytes>20</salt_len_bytes>
  2148 		<iter_count>1024</iter_count>
  2149 		<cipher>ECipherRC2_CBC_40</cipher>
  2150 		<set>
  2151 			<passwd></passwd>
  2152 			<input>ZYXWUTSR</input>
  2153 		</set>
  2154 	</actionbody>
  2155 	<actionresult>
  2156 		<return>KErrNone</return>
  2157 	</actionresult>
  2158 </action>
  2159 
  2160 
  2161 //! @SYMTestCaseID CIT_PREQ1054_02
  2162 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2163 //! @SYMREQ CIT_PREQ1054
  2164 //! @SYMTestPriority medium
  2165 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2166 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2167 <action>
  2168 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
  2169 	<actiontype>Set</actiontype>
  2170 	<actionbody>
  2171 		<kdf>PKCS#12</kdf>
  2172 		<salt_len_bytes>20</salt_len_bytes>
  2173 		<iter_count>1024</iter_count>
  2174 		<cipher>ECipherRC2_CBC_40</cipher>
  2175 		<set>
  2176 			<passwd></passwd>
  2177 			<input></input>
  2178 		</set>
  2179 	</actionbody>
  2180 	<actionresult>
  2181 		<return>KErrNone</return>
  2182 	</actionresult>
  2183 </action>
  2184 
  2185 ///////////////////////////////////////////////////////////////////////////////////
  2186 ///////////////////////////////////////////////////////////////////////////////////
  2187 ///////////////////////////////////////////////////////////////////////////////////
  2188 
  2189 
  2190 //! @SYMTestCaseID CIT_PREQ1054_02
  2191 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2192 //! @SYMREQ CIT_PREQ1054
  2193 //! @SYMTestPriority medium
  2194 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2195 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2196 <action>
  2197 	<actionname>Element test case 1, ECipher3DES_CBC</actionname>
  2198 	<actiontype>Element</actiontype>
  2199 	<actionbody>
  2200 		<kdf>PKCS#12</kdf>
  2201 		<salt_len_bytes>20</salt_len_bytes>
  2202 		<iter_count>1024</iter_count>
  2203 		<cipher>ECipher3DES_CBC</cipher>
  2204 		<element>
  2205 			<passwd>password</passwd>
  2206 			<input>This is what I want to encrypt</input>
  2207 		</element>
  2208 	</actionbody>
  2209 	<actionresult>
  2210 		<return>KErrNone</return>
  2211 	</actionresult>
  2212 </action>
  2213 
  2214 
  2215 //! @SYMTestCaseID CIT_PREQ1054_02
  2216 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2217 //! @SYMREQ CIT_PREQ1054
  2218 //! @SYMTestPriority medium
  2219 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2220 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2221 <action>
  2222 	<actionname>Element test case 2, ECipher3DES_CBC</actionname>
  2223 	<actiontype>Element</actiontype>
  2224 	<actionbody>
  2225 		<kdf>PKCS#12</kdf>
  2226 		<salt_len_bytes>20</salt_len_bytes>
  2227 		<iter_count>1024</iter_count>
  2228 		<cipher>ECipher3DES_CBC</cipher>
  2229 		<element>
  2230 			<passwd>password</passwd>
  2231 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2232 		</element>
  2233 	</actionbody>
  2234 	<actionresult>
  2235 		<return>KErrNone</return>
  2236 	</actionresult>
  2237 </action>
  2238 
  2239 
  2240 //! @SYMTestCaseID CIT_PREQ1054_02
  2241 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2242 //! @SYMREQ CIT_PREQ1054
  2243 //! @SYMTestPriority medium
  2244 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2245 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2246 <action>
  2247 	<actionname>Element test case 3, ECipher3DES_CBC</actionname>
  2248 	<actiontype>Element</actiontype>
  2249 	<actionbody>
  2250 		<kdf>PKCS#12</kdf>
  2251 		<salt_len_bytes>20</salt_len_bytes>
  2252 		<iter_count>1024</iter_count>
  2253 		<cipher>ECipher3DES_CBC</cipher>
  2254 		<element>
  2255 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2256 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2257 		</element>
  2258 	</actionbody>
  2259 	<actionresult>
  2260 		<return>KErrNone</return>
  2261 	</actionresult>
  2262 </action>
  2263 
  2264 
  2265 //! @SYMTestCaseID CIT_PREQ1054_02
  2266 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2267 //! @SYMREQ CIT_PREQ1054
  2268 //! @SYMTestPriority medium
  2269 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2270 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2271 <action>
  2272 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
  2273 	<actiontype>Set</actiontype>
  2274 	<actionbody>
  2275 		<kdf>PKCS#12</kdf>
  2276 		<salt_len_bytes>20</salt_len_bytes>
  2277 		<iter_count>1024</iter_count>
  2278 		<cipher>ECipher3DES_CBC</cipher>
  2279 		<set>
  2280 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2281 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2282 		</set>
  2283 	</actionbody>
  2284 	<actionresult>
  2285 		<return>KErrNone</return>
  2286 	</actionresult>
  2287 </action>
  2288 
  2289 
  2290 //! @SYMTestCaseID CIT_PREQ1054_02
  2291 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2292 //! @SYMREQ CIT_PREQ1054
  2293 //! @SYMTestPriority medium
  2294 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2295 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2296 <action>
  2297 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
  2298 	<actiontype>Set</actiontype>
  2299 	<actionbody>
  2300 		<kdf>PKCS#12</kdf>
  2301 		<salt_len_bytes>20</salt_len_bytes>
  2302 		<iter_count>1024</iter_count>
  2303 		<cipher>ECipher3DES_CBC</cipher>
  2304 		<set>
  2305 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2306 			<input>B</input>
  2307 		</set>
  2308 	</actionbody>
  2309 	<actionresult>
  2310 		<return>KErrNone</return>
  2311 	</actionresult>
  2312 </action>
  2313 
  2314 
  2315 //! @SYMTestCaseID CIT_PREQ1054_02
  2316 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2317 //! @SYMREQ CIT_PREQ1054
  2318 //! @SYMTestPriority medium
  2319 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2320 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2321 <action>
  2322 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
  2323 	<actiontype>Set</actiontype>
  2324 	<actionbody>
  2325 		<kdf>PKCS#12</kdf>
  2326 		<salt_len_bytes>20</salt_len_bytes>
  2327 		<iter_count>1024</iter_count>
  2328 		<cipher>ECipher3DES_CBC</cipher>
  2329 		<set>
  2330 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2331 			<input>ZYXWUTSR</input>
  2332 		</set>
  2333 	</actionbody>
  2334 	<actionresult>
  2335 		<return>KErrNone</return>
  2336 	</actionresult>
  2337 </action>
  2338 
  2339 
  2340 //! @SYMTestCaseID CIT_PREQ1054_02
  2341 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2342 //! @SYMREQ CIT_PREQ1054
  2343 //! @SYMTestPriority medium
  2344 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2345 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2346 <action>
  2347 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
  2348 	<actiontype>Set</actiontype>
  2349 	<actionbody>
  2350 		<kdf>PKCS#12</kdf>
  2351 		<salt_len_bytes>20</salt_len_bytes>
  2352 		<iter_count>1024</iter_count>
  2353 		<cipher>ECipher3DES_CBC</cipher>
  2354 		<set>
  2355 			<passwd>m</passwd>
  2356 			<input>ZYXWUTSR</input>
  2357 		</set>
  2358 	</actionbody>
  2359 	<actionresult>
  2360 		<return>KErrNone</return>
  2361 	</actionresult>
  2362 </action>
  2363 
  2364 
  2365 //! @SYMTestCaseID CIT_PREQ1054_02
  2366 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2367 //! @SYMREQ CIT_PREQ1054
  2368 //! @SYMTestPriority medium
  2369 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2370 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2371 <action>
  2372 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
  2373 	<actiontype>Set</actiontype>
  2374 	<actionbody>
  2375 		<kdf>PKCS#12</kdf>
  2376 		<salt_len_bytes>20</salt_len_bytes>
  2377 		<iter_count>1024</iter_count>
  2378 		<cipher>ECipher3DES_CBC</cipher>
  2379 		<set>
  2380 			<passwd></passwd>
  2381 			<input>ZYXWUTSR</input>
  2382 		</set>
  2383 	</actionbody>
  2384 	<actionresult>
  2385 		<return>KErrNone</return>
  2386 	</actionresult>
  2387 </action>
  2388 
  2389 
  2390 //! @SYMTestCaseID CIT_PREQ1054_02
  2391 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2392 //! @SYMREQ CIT_PREQ1054
  2393 //! @SYMTestPriority medium
  2394 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2395 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2396 <action>
  2397 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
  2398 	<actiontype>Set</actiontype>
  2399 	<actionbody>
  2400 		<kdf>PKCS#12</kdf>
  2401 		<salt_len_bytes>20</salt_len_bytes>
  2402 		<iter_count>1024</iter_count>
  2403 		<cipher>ECipher3DES_CBC</cipher>
  2404 		<set>
  2405 			<passwd></passwd>
  2406 			<input></input>
  2407 		</set>
  2408 	</actionbody>
  2409 	<actionresult>
  2410 		<return>KErrNone</return>
  2411 	</actionresult>
  2412 </action>
  2413 
  2414 ///////////////////////////////////////////////////////////////////////////////////
  2415 ///////////////////////////////////////////////////////////////////////////////////
  2416 ///////////////////////////////////////////////////////////////////////////////////
  2417 
  2418 
  2419 //! @SYMTestCaseID CIT_PREQ1054_02
  2420 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2421 //! @SYMREQ CIT_PREQ1054
  2422 //! @SYMTestPriority medium
  2423 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2424 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2425 <action>
  2426 	<actionname>Element test case 1, ECipherAES_CBC_256</actionname>
  2427 	<actiontype>Element</actiontype>
  2428 	<actionbody>
  2429 		<kdf>PKCS#12</kdf>
  2430 		<salt_len_bytes>20</salt_len_bytes>
  2431 		<iter_count>1024</iter_count>
  2432 		<cipher>ECipherAES_CBC_256</cipher>
  2433 		<element>
  2434 			<passwd>password</passwd>
  2435 			<input>This is what I want to encrypt</input>
  2436 		</element>
  2437 	</actionbody>
  2438 	<actionresult>
  2439 		<return>KErrNone</return>
  2440 	</actionresult>
  2441 </action>
  2442 
  2443 
  2444 //! @SYMTestCaseID CIT_PREQ1054_02
  2445 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2446 //! @SYMREQ CIT_PREQ1054
  2447 //! @SYMTestPriority medium
  2448 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2449 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2450 <action>
  2451 	<actionname>Element test case 2, ECipherAES_CBC_256</actionname>
  2452 	<actiontype>Element</actiontype>
  2453 	<actionbody>
  2454 		<kdf>PKCS#12</kdf>
  2455 		<salt_len_bytes>20</salt_len_bytes>
  2456 		<iter_count>1024</iter_count>
  2457 		<cipher>ECipherAES_CBC_256</cipher>
  2458 		<element>
  2459 			<passwd>password</passwd>
  2460 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2461 		</element>
  2462 	</actionbody>
  2463 	<actionresult>
  2464 		<return>KErrNone</return>
  2465 	</actionresult>
  2466 </action>
  2467 
  2468 
  2469 //! @SYMTestCaseID CIT_PREQ1054_02
  2470 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2471 //! @SYMREQ CIT_PREQ1054
  2472 //! @SYMTestPriority medium
  2473 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2474 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2475 <action>
  2476 	<actionname>Element test case 3, ECipherAES_CBC_256</actionname>
  2477 	<actiontype>Element</actiontype>
  2478 	<actionbody>
  2479 		<kdf>PKCS#12</kdf>
  2480 		<salt_len_bytes>20</salt_len_bytes>
  2481 		<iter_count>1024</iter_count>
  2482 		<cipher>ECipherAES_CBC_256</cipher>
  2483 		<element>
  2484 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2485 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2486 		</element>
  2487 	</actionbody>
  2488 	<actionresult>
  2489 		<return>KErrNone</return>
  2490 	</actionresult>
  2491 </action>
  2492 
  2493 
  2494 //! @SYMTestCaseID CIT_PREQ1054_02
  2495 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2496 //! @SYMREQ CIT_PREQ1054
  2497 //! @SYMTestPriority medium
  2498 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2499 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2500 <action>
  2501 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
  2502 	<actiontype>Set</actiontype>
  2503 	<actionbody>
  2504 		<kdf>PKCS#12</kdf>
  2505 		<salt_len_bytes>20</salt_len_bytes>
  2506 		<iter_count>1024</iter_count>
  2507 		<cipher>ECipherAES_CBC_256</cipher>
  2508 		<set>
  2509 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2510 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2511 		</set>
  2512 	</actionbody>
  2513 	<actionresult>
  2514 		<return>KErrNone</return>
  2515 	</actionresult>
  2516 </action>
  2517 
  2518 
  2519 //! @SYMTestCaseID CIT_PREQ1054_02
  2520 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2521 //! @SYMREQ CIT_PREQ1054
  2522 //! @SYMTestPriority medium
  2523 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2524 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2525 <action>
  2526 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
  2527 	<actiontype>Set</actiontype>
  2528 	<actionbody>
  2529 		<kdf>PKCS#12</kdf>
  2530 		<salt_len_bytes>20</salt_len_bytes>
  2531 		<iter_count>1024</iter_count>
  2532 		<cipher>ECipherAES_CBC_256</cipher>
  2533 		<set>
  2534 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2535 			<input>B</input>
  2536 		</set>
  2537 	</actionbody>
  2538 	<actionresult>
  2539 		<return>KErrNone</return>
  2540 	</actionresult>
  2541 </action>
  2542 
  2543 
  2544 //! @SYMTestCaseID CIT_PREQ1054_02
  2545 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2546 //! @SYMREQ CIT_PREQ1054
  2547 //! @SYMTestPriority medium
  2548 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2549 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2550 <action>
  2551 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
  2552 	<actiontype>Set</actiontype>
  2553 	<actionbody>
  2554 		<kdf>PKCS#12</kdf>
  2555 		<salt_len_bytes>20</salt_len_bytes>
  2556 		<iter_count>1024</iter_count>
  2557 		<cipher>ECipherAES_CBC_256</cipher>
  2558 		<set>
  2559 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2560 			<input>ZYXWUTSR</input>
  2561 		</set>
  2562 	</actionbody>
  2563 	<actionresult>
  2564 		<return>KErrNone</return>
  2565 	</actionresult>
  2566 </action>
  2567 
  2568 
  2569 //! @SYMTestCaseID CIT_PREQ1054_02
  2570 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2571 //! @SYMREQ CIT_PREQ1054
  2572 //! @SYMTestPriority medium
  2573 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2574 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2575 <action>
  2576 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
  2577 	<actiontype>Set</actiontype>
  2578 	<actionbody>
  2579 		<kdf>PKCS#12</kdf>
  2580 		<salt_len_bytes>20</salt_len_bytes>
  2581 		<iter_count>1024</iter_count>
  2582 		<cipher>ECipherAES_CBC_256</cipher>
  2583 		<set>
  2584 			<passwd>m</passwd>
  2585 			<input>ZYXWUTSR</input>
  2586 		</set>
  2587 	</actionbody>
  2588 	<actionresult>
  2589 		<return>KErrNone</return>
  2590 	</actionresult>
  2591 </action>
  2592 
  2593 
  2594 //! @SYMTestCaseID CIT_PREQ1054_02
  2595 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2596 //! @SYMREQ CIT_PREQ1054
  2597 //! @SYMTestPriority medium
  2598 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2599 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2600 <action>
  2601 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
  2602 	<actiontype>Set</actiontype>
  2603 	<actionbody>
  2604 		<kdf>PKCS#12</kdf>
  2605 		<salt_len_bytes>20</salt_len_bytes>
  2606 		<iter_count>1024</iter_count>
  2607 		<cipher>ECipherAES_CBC_256</cipher>
  2608 		<set>
  2609 			<passwd></passwd>
  2610 			<input>ZYXWUTSR</input>
  2611 		</set>
  2612 	</actionbody>
  2613 	<actionresult>
  2614 		<return>KErrNone</return>
  2615 	</actionresult>
  2616 </action>
  2617 
  2618 
  2619 //! @SYMTestCaseID CIT_PREQ1054_02
  2620 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2621 //! @SYMREQ CIT_PREQ1054
  2622 //! @SYMTestPriority medium
  2623 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2624 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2625 <action>
  2626 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
  2627 	<actiontype>Set</actiontype>
  2628 	<actionbody>
  2629 		<kdf>PKCS#12</kdf>
  2630 		<salt_len_bytes>20</salt_len_bytes>
  2631 		<iter_count>1024</iter_count>
  2632 		<cipher>ECipherAES_CBC_256</cipher>
  2633 		<set>
  2634 			<passwd></passwd>
  2635 			<input></input>
  2636 		</set>
  2637 	</actionbody>
  2638 	<actionresult>
  2639 		<return>KErrNone</return>
  2640 	</actionresult>
  2641 </action>
  2642 
  2643 ///////////////////////////////////////////////////////////////////////////////////
  2644 ///////////////////////////////////////////////////////////////////////////////////
  2645 ///////////////////////////////////////////////////////////////////////////////////
  2646 
  2647 
  2648 //! @SYMTestCaseID CIT_PREQ1054_02
  2649 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2650 //! @SYMREQ CIT_PREQ1054
  2651 //! @SYMTestPriority medium
  2652 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2653 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2654 <action>
  2655 	<actionname>Element test case 1, ECipherAES_CBC_192</actionname>
  2656 	<actiontype>Element</actiontype>
  2657 	<actionbody>
  2658 		<kdf>PKCS#12</kdf>
  2659 		<salt_len_bytes>20</salt_len_bytes>
  2660 		<iter_count>1024</iter_count>
  2661 		<cipher>ECipherAES_CBC_192</cipher>
  2662 		<element>
  2663 			<passwd>password</passwd>
  2664 			<input>This is what I want to encrypt</input>
  2665 		</element>
  2666 	</actionbody>
  2667 	<actionresult>
  2668 		<return>KErrNone</return>
  2669 	</actionresult>
  2670 </action>
  2671 
  2672 
  2673 //! @SYMTestCaseID CIT_PREQ1054_02
  2674 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2675 //! @SYMREQ CIT_PREQ1054
  2676 //! @SYMTestPriority medium
  2677 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2678 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2679 <action>
  2680 	<actionname>Element test case 2, ECipherAES_CBC_192</actionname>
  2681 	<actiontype>Element</actiontype>
  2682 	<actionbody>
  2683 		<kdf>PKCS#12</kdf>
  2684 		<salt_len_bytes>20</salt_len_bytes>
  2685 		<iter_count>1024</iter_count>
  2686 		<cipher>ECipherAES_CBC_192</cipher>
  2687 		<element>
  2688 			<passwd>password</passwd>
  2689 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2690 		</element>
  2691 	</actionbody>
  2692 	<actionresult>
  2693 		<return>KErrNone</return>
  2694 	</actionresult>
  2695 </action>
  2696 
  2697 
  2698 //! @SYMTestCaseID CIT_PREQ1054_02
  2699 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2700 //! @SYMREQ CIT_PREQ1054
  2701 //! @SYMTestPriority medium
  2702 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2703 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2704 <action>
  2705 	<actionname>Element test case 3, ECipherAES_CBC_192</actionname>
  2706 	<actiontype>Element</actiontype>
  2707 	<actionbody>
  2708 		<kdf>PKCS#12</kdf>
  2709 		<salt_len_bytes>20</salt_len_bytes>
  2710 		<iter_count>1024</iter_count>
  2711 		<cipher>ECipherAES_CBC_192</cipher>
  2712 		<element>
  2713 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2714 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2715 		</element>
  2716 	</actionbody>
  2717 	<actionresult>
  2718 		<return>KErrNone</return>
  2719 	</actionresult>
  2720 </action>
  2721 
  2722 
  2723 //! @SYMTestCaseID CIT_PREQ1054_02
  2724 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2725 //! @SYMREQ CIT_PREQ1054
  2726 //! @SYMTestPriority medium
  2727 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2728 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2729 <action>
  2730 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
  2731 	<actiontype>Set</actiontype>
  2732 	<actionbody>
  2733 		<kdf>PKCS#12</kdf>
  2734 		<salt_len_bytes>20</salt_len_bytes>
  2735 		<iter_count>1024</iter_count>
  2736 		<cipher>ECipherAES_CBC_192</cipher>
  2737 		<set>
  2738 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2739 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2740 		</set>
  2741 	</actionbody>
  2742 	<actionresult>
  2743 		<return>KErrNone</return>
  2744 	</actionresult>
  2745 </action>
  2746 
  2747 
  2748 //! @SYMTestCaseID CIT_PREQ1054_02
  2749 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2750 //! @SYMREQ CIT_PREQ1054
  2751 //! @SYMTestPriority medium
  2752 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2753 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2754 <action>
  2755 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
  2756 	<actiontype>Set</actiontype>
  2757 	<actionbody>
  2758 		<kdf>PKCS#12</kdf>
  2759 		<salt_len_bytes>20</salt_len_bytes>
  2760 		<iter_count>1024</iter_count>
  2761 		<cipher>ECipherAES_CBC_192</cipher>
  2762 		<set>
  2763 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2764 			<input>B</input>
  2765 		</set>
  2766 	</actionbody>
  2767 	<actionresult>
  2768 		<return>KErrNone</return>
  2769 	</actionresult>
  2770 </action>
  2771 
  2772 
  2773 //! @SYMTestCaseID CIT_PREQ1054_02
  2774 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2775 //! @SYMREQ CIT_PREQ1054
  2776 //! @SYMTestPriority medium
  2777 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2778 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2779 <action>
  2780 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
  2781 	<actiontype>Set</actiontype>
  2782 	<actionbody>
  2783 		<kdf>PKCS#12</kdf>
  2784 		<salt_len_bytes>20</salt_len_bytes>
  2785 		<iter_count>1024</iter_count>
  2786 		<cipher>ECipherAES_CBC_192</cipher>
  2787 		<set>
  2788 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2789 			<input>ZYXWUTSR</input>
  2790 		</set>
  2791 	</actionbody>
  2792 	<actionresult>
  2793 		<return>KErrNone</return>
  2794 	</actionresult>
  2795 </action>
  2796 
  2797 
  2798 //! @SYMTestCaseID CIT_PREQ1054_02
  2799 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2800 //! @SYMREQ CIT_PREQ1054
  2801 //! @SYMTestPriority medium
  2802 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2803 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2804 <action>
  2805 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
  2806 	<actiontype>Set</actiontype>
  2807 	<actionbody>
  2808 		<kdf>PKCS#12</kdf>
  2809 		<salt_len_bytes>20</salt_len_bytes>
  2810 		<iter_count>1024</iter_count>
  2811 		<cipher>ECipherAES_CBC_192</cipher>
  2812 		<set>
  2813 			<passwd>m</passwd>
  2814 			<input>ZYXWUTSR</input>
  2815 		</set>
  2816 	</actionbody>
  2817 	<actionresult>
  2818 		<return>KErrNone</return>
  2819 	</actionresult>
  2820 </action>
  2821 
  2822 
  2823 //! @SYMTestCaseID CIT_PREQ1054_02
  2824 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2825 //! @SYMREQ CIT_PREQ1054
  2826 //! @SYMTestPriority medium
  2827 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2828 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2829 <action>
  2830 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
  2831 	<actiontype>Set</actiontype>
  2832 	<actionbody>
  2833 		<kdf>PKCS#12</kdf>
  2834 		<salt_len_bytes>20</salt_len_bytes>
  2835 		<iter_count>1024</iter_count>
  2836 		<cipher>ECipherAES_CBC_192</cipher>
  2837 		<set>
  2838 			<passwd></passwd>
  2839 			<input>ZYXWUTSR</input>
  2840 		</set>
  2841 	</actionbody>
  2842 	<actionresult>
  2843 		<return>KErrNone</return>
  2844 	</actionresult>
  2845 </action>
  2846 
  2847 
  2848 //! @SYMTestCaseID CIT_PREQ1054_02
  2849 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2850 //! @SYMREQ CIT_PREQ1054
  2851 //! @SYMTestPriority medium
  2852 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2853 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2854 <action>
  2855 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
  2856 	<actiontype>Set</actiontype>
  2857 	<actionbody>
  2858 		<kdf>PKCS#12</kdf>
  2859 		<salt_len_bytes>20</salt_len_bytes>
  2860 		<iter_count>1024</iter_count>
  2861 		<cipher>ECipherAES_CBC_192</cipher>
  2862 		<set>
  2863 			<passwd></passwd>
  2864 			<input></input>
  2865 		</set>
  2866 	</actionbody>
  2867 	<actionresult>
  2868 		<return>KErrNone</return>
  2869 	</actionresult>
  2870 </action>
  2871 
  2872 ///////////////////////////////////////////////////////////////////////////////////
  2873 ///////////////////////////////////////////////////////////////////////////////////
  2874 ///////////////////////////////////////////////////////////////////////////////////
  2875 
  2876 
  2877 
  2878 //! @SYMTestCaseID CIT_PREQ1054_02
  2879 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2880 //! @SYMREQ CIT_PREQ1054
  2881 //! @SYMTestPriority medium
  2882 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2883 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2884 <action>
  2885 	<actionname>Element test case 1, ECipherAES_CBC_128</actionname>
  2886 	<actiontype>Element</actiontype>
  2887 	<actionbody>
  2888 		<kdf>PKCS#12</kdf>
  2889 		<salt_len_bytes>20</salt_len_bytes>
  2890 		<iter_count>1024</iter_count>
  2891 		<cipher>ECipherAES_CBC_128</cipher>
  2892 		<element>
  2893 			<passwd>password</passwd>
  2894 			<input>This is what I want to encrypt</input>
  2895 		</element>
  2896 	</actionbody>
  2897 	<actionresult>
  2898 		<return>KErrNone</return>
  2899 	</actionresult>
  2900 </action>
  2901 
  2902 
  2903 //! @SYMTestCaseID CIT_PREQ1054_02
  2904 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2905 //! @SYMREQ CIT_PREQ1054
  2906 //! @SYMTestPriority medium
  2907 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2908 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2909 <action>
  2910 	<actionname>Element test case 2, ECipherAES_CBC_128</actionname>
  2911 	<actiontype>Element</actiontype>
  2912 	<actionbody>
  2913 		<kdf>PKCS#12</kdf>
  2914 		<salt_len_bytes>20</salt_len_bytes>
  2915 		<iter_count>1024</iter_count>
  2916 		<cipher>ECipherAES_CBC_128</cipher>
  2917 		<element>
  2918 			<passwd>password</passwd>
  2919 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2920 		</element>
  2921 	</actionbody>
  2922 	<actionresult>
  2923 		<return>KErrNone</return>
  2924 	</actionresult>
  2925 </action>
  2926 
  2927 
  2928 //! @SYMTestCaseID CIT_PREQ1054_02
  2929 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2930 //! @SYMREQ CIT_PREQ1054
  2931 //! @SYMTestPriority medium
  2932 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2933 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2934 <action>
  2935 	<actionname>Element test case 3, ECipherAES_CBC_128</actionname>
  2936 	<actiontype>Element</actiontype>
  2937 	<actionbody>
  2938 		<kdf>PKCS#12</kdf>
  2939 		<salt_len_bytes>20</salt_len_bytes>
  2940 		<iter_count>1024</iter_count>
  2941 		<cipher>ECipherAES_CBC_128</cipher>
  2942 		<element>
  2943 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2944 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2945 		</element>
  2946 	</actionbody>
  2947 	<actionresult>
  2948 		<return>KErrNone</return>
  2949 	</actionresult>
  2950 </action>
  2951 
  2952 
  2953 //! @SYMTestCaseID CIT_PREQ1054_02
  2954 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2955 //! @SYMREQ CIT_PREQ1054
  2956 //! @SYMTestPriority medium
  2957 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2958 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2959 <action>
  2960 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
  2961 	<actiontype>Set</actiontype>
  2962 	<actionbody>
  2963 		<kdf>PKCS#12</kdf>
  2964 		<salt_len_bytes>20</salt_len_bytes>
  2965 		<iter_count>1024</iter_count>
  2966 		<cipher>ECipherAES_CBC_128</cipher>
  2967 		<set>
  2968 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2969 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  2970 		</set>
  2971 	</actionbody>
  2972 	<actionresult>
  2973 		<return>KErrNone</return>
  2974 	</actionresult>
  2975 </action>
  2976 
  2977 
  2978 //! @SYMTestCaseID CIT_PREQ1054_02
  2979 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  2980 //! @SYMREQ CIT_PREQ1054
  2981 //! @SYMTestPriority medium
  2982 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  2983 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  2984 <action>
  2985 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
  2986 	<actiontype>Set</actiontype>
  2987 	<actionbody>
  2988 		<kdf>PKCS#12</kdf>
  2989 		<salt_len_bytes>20</salt_len_bytes>
  2990 		<iter_count>1024</iter_count>
  2991 		<cipher>ECipherAES_CBC_128</cipher>
  2992 		<set>
  2993 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  2994 			<input>B</input>
  2995 		</set>
  2996 	</actionbody>
  2997 	<actionresult>
  2998 		<return>KErrNone</return>
  2999 	</actionresult>
  3000 </action>
  3001 
  3002 
  3003 //! @SYMTestCaseID CIT_PREQ1054_02
  3004 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3005 //! @SYMREQ CIT_PREQ1054
  3006 //! @SYMTestPriority medium
  3007 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3008 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3009 <action>
  3010 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
  3011 	<actiontype>Set</actiontype>
  3012 	<actionbody>
  3013 		<kdf>PKCS#12</kdf>
  3014 		<salt_len_bytes>20</salt_len_bytes>
  3015 		<iter_count>1024</iter_count>
  3016 		<cipher>ECipherAES_CBC_128</cipher>
  3017 		<set>
  3018 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3019 			<input>ZYXWUTSR</input>
  3020 		</set>
  3021 	</actionbody>
  3022 	<actionresult>
  3023 		<return>KErrNone</return>
  3024 	</actionresult>
  3025 </action>
  3026 
  3027 
  3028 //! @SYMTestCaseID CIT_PREQ1054_02
  3029 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3030 //! @SYMREQ CIT_PREQ1054
  3031 //! @SYMTestPriority medium
  3032 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3033 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3034 <action>
  3035 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
  3036 	<actiontype>Set</actiontype>
  3037 	<actionbody>
  3038 		<kdf>PKCS#12</kdf>
  3039 		<salt_len_bytes>20</salt_len_bytes>
  3040 		<iter_count>1024</iter_count>
  3041 		<cipher>ECipherAES_CBC_128</cipher>
  3042 		<set>
  3043 			<passwd>m</passwd>
  3044 			<input>ZYXWUTSR</input>
  3045 		</set>
  3046 	</actionbody>
  3047 	<actionresult>
  3048 		<return>KErrNone</return>
  3049 	</actionresult>
  3050 </action>
  3051 
  3052 
  3053 //! @SYMTestCaseID CIT_PREQ1054_02
  3054 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3055 //! @SYMREQ CIT_PREQ1054
  3056 //! @SYMTestPriority medium
  3057 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3058 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3059 <action>
  3060 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
  3061 	<actiontype>Set</actiontype>
  3062 	<actionbody>
  3063 		<kdf>PKCS#12</kdf>
  3064 		<salt_len_bytes>20</salt_len_bytes>
  3065 		<iter_count>1024</iter_count>
  3066 		<cipher>ECipherAES_CBC_128</cipher>
  3067 		<set>
  3068 			<passwd></passwd>
  3069 			<input>ZYXWUTSR</input>
  3070 		</set>
  3071 	</actionbody>
  3072 	<actionresult>
  3073 		<return>KErrNone</return>
  3074 	</actionresult>
  3075 </action>
  3076 
  3077 
  3078 //! @SYMTestCaseID CIT_PREQ1054_02
  3079 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3080 //! @SYMREQ CIT_PREQ1054
  3081 //! @SYMTestPriority medium
  3082 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3083 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3084 <action>
  3085 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
  3086 	<actiontype>Set</actiontype>
  3087 	<actionbody>
  3088 		<kdf>PKCS#12</kdf>
  3089 		<salt_len_bytes>20</salt_len_bytes>
  3090 		<iter_count>1024</iter_count>
  3091 		<cipher>ECipherAES_CBC_128</cipher>
  3092 		<set>
  3093 			<passwd></passwd>
  3094 			<input></input>
  3095 		</set>
  3096 	</actionbody>
  3097 	<actionresult>
  3098 		<return>KErrNone</return>
  3099 	</actionresult>
  3100 </action>
  3101 ////////////////////////////////////////////////////////////////////
  3102 // PKCS12 tests using PKCS#12 PBE algorithm with PKCS#12 KDF function. 
  3103 //  ECipherRC2_CBC_128_16, ECipher3DES_CBC tests defined above.
  3104 //  "Set" tests are not supported for stream cipher ECipherARC4_40,ECipherARC4_128
  3105 <action>
  3106 	<actionname>Element test case 1, ECipherRC2_CBC_40_5</actionname>
  3107 	<actiontype>Element</actiontype>
  3108 	<actionbody>
  3109 		<kdf>PKCS#12</kdf>
  3110 		<salt_len_bytes>20</salt_len_bytes>
  3111 		<iter_count>1024</iter_count>
  3112 		<cipher>ECipherRC2_CBC_40_5</cipher>
  3113 		<element>
  3114 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3115 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  3116 		</element>
  3117 	</actionbody>
  3118 	<actionresult>
  3119 		<return>KErrNone</return>
  3120 	</actionresult>
  3121 </action>
  3122 
  3123 <action>
  3124 	<actionname>Element test case 2, ECipherARC4_128</actionname>
  3125 	<actiontype>Element</actiontype>
  3126 	<actionbody>
  3127 		<kdf>PKCS#12</kdf>
  3128 		<salt_len_bytes>20</salt_len_bytes>
  3129 		<iter_count>1024</iter_count>
  3130 		<cipher>ECipherARC4_128</cipher>
  3131 		<element>
  3132 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3133 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  3134 		</element>
  3135 	</actionbody>
  3136 	<actionresult>
  3137 		<return>KErrNone</return>
  3138 	</actionresult>
  3139 </action>
  3140 
  3141 <action>
  3142 	<actionname>Element test case 3, ECipherARC4_40</actionname>
  3143 	<actiontype>Element</actiontype>
  3144 	<actionbody>
  3145 		<kdf>PKCS#12</kdf>
  3146 		<salt_len_bytes>20</salt_len_bytes>
  3147 		<iter_count>1024</iter_count>
  3148 		<cipher>ECipherARC4_40</cipher>
  3149 		<element>
  3150 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3151 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  3152 		</element>
  3153 	</actionbody>
  3154 	<actionresult>
  3155 		<return>KErrNone</return>
  3156 	</actionresult>
  3157 </action>
  3158 
  3159 <action>
  3160 	<actionname>Element test case 4, ECipher2Key3DES_CBC</actionname>
  3161 	<actiontype>Element</actiontype>
  3162 	<actionbody>
  3163 		<kdf>PKCS#12</kdf>
  3164 		<salt_len_bytes>20</salt_len_bytes>
  3165 		<iter_count>1024</iter_count>
  3166 		<cipher>ECipher2Key3DES_CBC</cipher>
  3167 		<element>
  3168 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3169 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  3170 		</element>
  3171 	</actionbody>
  3172 	<actionresult>
  3173 		<return>KErrNone</return>
  3174 	</actionresult>
  3175 </action>
  3176 
  3177 <action>
  3178 	<actionname>Test of Set encryption, password changing, exporting importing Test 5, ECipherRC2_CBC_40_5</actionname>
  3179 	<actiontype>Set</actiontype>
  3180 	<actionbody>
  3181 		<kdf>PKCS#12</kdf>
  3182 		<salt_len_bytes>20</salt_len_bytes>
  3183 		<iter_count>1024</iter_count>
  3184 		<cipher>ECipherRC2_CBC_40_5</cipher>
  3185 		<set>
  3186 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3187 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  3188 		</set>
  3189 	</actionbody>
  3190 	<actionresult>
  3191 		<return>KErrNone</return>
  3192 	</actionresult>
  3193 </action>
  3194 <action>
  3195 	<actionname>Test of Set encryption, password changing, exporting importing Test 9, ECipher2Key3DES_CBC</actionname>
  3196 	<actiontype>Set</actiontype>
  3197 	<actionbody>
  3198 		<kdf>PKCS#12</kdf>
  3199 		<salt_len_bytes>20</salt_len_bytes>
  3200 		<iter_count>1024</iter_count>
  3201 		<cipher>ECipher2Key3DES_CBC</cipher>
  3202 		<set>
  3203 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3204 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  3205 		</set>
  3206 	</actionbody>
  3207 	<actionresult>
  3208 		<return>KErrNone</return>
  3209 	</actionresult>
  3210 </action>
  3211 /////////////////////////////////////////
  3212 
  3213 // Run selected PKCS#12 tests in OOM
  3214 
  3215 
  3216 //! @SYMTestCaseID CIT_PREQ1054_02
  3217 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3218 //! @SYMREQ CIT_PREQ1054
  3219 //! @SYMTestPriority medium
  3220 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3221 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3222 <action>
  3223     <actionname>OOM start</actionname>
  3224     <actiontype>startmemfailure</actiontype>
  3225     <actionbody></actionbody>
  3226     <actionresult>
  3227         <return>KErrNone</return>
  3228     </actionresult>
  3229 </action>
  3230 
  3231 
  3232 //! @SYMTestCaseID CIT_PREQ1054_02
  3233 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3234 //! @SYMREQ CIT_PREQ1054
  3235 //! @SYMTestPriority medium
  3236 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3237 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3238 <action>
  3239 	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
  3240 	<actiontype>Element</actiontype>
  3241 	<actionbody>
  3242 		<kdf>PKCS#12</kdf>
  3243 		<salt_len_bytes>20</salt_len_bytes>
  3244 		<iter_count>1024</iter_count>
  3245 		<cipher>ECipherRC2_CBC_128_16</cipher>
  3246 		<element>
  3247 			<passwd>password</passwd>
  3248 			<input>This is what I want to encrypt</input>
  3249 		</element>
  3250 	</actionbody>
  3251 	<actionresult>
  3252 		<return>KErrNone</return>
  3253 	</actionresult>
  3254 </action>
  3255 
  3256 
  3257 //! @SYMTestCaseID CIT_PREQ1054_02
  3258 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3259 //! @SYMREQ CIT_PREQ1054
  3260 //! @SYMTestPriority medium
  3261 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3262 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3263 <action>
  3264 	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
  3265 	<actiontype>Element</actiontype>
  3266 	<actionbody>
  3267 		<kdf>PKCS#12</kdf>
  3268 		<salt_len_bytes>20</salt_len_bytes>
  3269 		<iter_count>1024</iter_count>
  3270 		<cipher>ECipherRC2_CBC_40_16</cipher>
  3271 		<element>
  3272 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3273 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
  3274 		</element>
  3275 	</actionbody>
  3276 	<actionresult>
  3277 		<return>KErrNone</return>
  3278 	</actionresult>
  3279 </action>
  3280 
  3281 
  3282 //! @SYMTestCaseID CIT_PREQ1054_02
  3283 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3284 //! @SYMREQ CIT_PREQ1054
  3285 //! @SYMTestPriority medium
  3286 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3287 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3288 <action>
  3289 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
  3290 	<actiontype>Set</actiontype>
  3291 	<actionbody>
  3292 		<kdf>PKCS#12</kdf>
  3293 		<salt_len_bytes>20</salt_len_bytes>
  3294 		<iter_count>1024</iter_count>
  3295 		<cipher>ECipherAES_CBC_128</cipher>
  3296 		<set>
  3297 			<passwd>a90lkjasjk3lk32kdf89</passwd>
  3298 			<input>B</input>
  3299 		</set>
  3300 	</actionbody>
  3301 	<actionresult>
  3302 		<return>KErrNone</return>
  3303 	</actionresult>
  3304 </action>
  3305 
  3306 
  3307 //! @SYMTestCaseID CIT_PREQ1054_02
  3308 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
  3309 //! @SYMREQ CIT_PREQ1054
  3310 //! @SYMTestPriority medium
  3311 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
  3312 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
  3313 <action>
  3314 	<actionname>OOM end</actionname>
  3315 	<actiontype>stopmemfailure</actiontype>
  3316 	<actionbody></actionbody>
  3317 	<actionresult>
  3318 		<return>KErrNone</return>
  3319 	</actionresult>
  3320 </action>
  3321 
  3322 
  3323 <action>
  3324 	<actionname>Compatibility old PKCS#5</actionname>
  3325 	<actiontype>ExternPbeParams</actiontype>
  3326 	<actionbody>
  3327 		<orig-filename>c:\tpbe\pkcs5-orig.dat</orig-filename>
  3328 		<expected-cipher>2</expected-cipher>
  3329 		<expected-salt>53414c5434353637</expected-salt>
  3330 		<expected-iv>49563233343536373839616263646566</expected-iv>
  3331 		<expected-iter-count>1234</expected-iter-count>
  3332 		<expected-kdf>0</expected-kdf>
  3333 	</actionbody>
  3334 	<actionresult>
  3335 		<return>KErrNone</return>
  3336 	</actionresult>
  3337 </action>
  3338 
  3339 <action>
  3340 	<actionname>Data compatibility orig PKCS#12</actionname>
  3341 	<actiontype>ExternPbeParams</actiontype>
  3342 	<actionbody>
  3343 		<orig-filename>c:\tpbe\pkcs12-first.dat</orig-filename>
  3344 		<expected-cipher>2</expected-cipher>
  3345 		<expected-salt>53414c5434353637</expected-salt>
  3346 		<expected-iv>49563233343536373839616263646566</expected-iv>
  3347 		<expected-iter-count>1234</expected-iter-count>
  3348 		<expected-kdf>1</expected-kdf>
  3349 	</actionbody>
  3350 	<actionresult>
  3351 		<return>KErrNone</return>
  3352 	</actionresult>
  3353 </action>
  3354