Update contrib.
2 // Copyright (C) 2005 - 2006 Symbian Ltd. All Rights Reserved
6 <actionname>Element test case 1 with explicit kdf, salt len and iterations, ECipherRC2_CBC_128_16</actionname>
7 <actiontype>Element</actiontype>
9 <cipher>ECipherRC2_CBC_128_16</cipher>
11 <salt_len_bytes>16</salt_len_bytes>
12 <iter_count>1000</iter_count>
14 <passwd>password</passwd>
15 <input>This is what I want to encrypt</input>
19 <return>KErrNone</return>
24 <actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
25 <actiontype>Element</actiontype>
27 <cipher>ECipherRC2_CBC_128_16</cipher>
29 <passwd>password</passwd>
30 <input>This is what I want to encrypt</input>
34 <return>KErrNone</return>
39 <actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
40 <actiontype>Element</actiontype>
42 <cipher>ECipherRC2_CBC_128_16</cipher>
44 <passwd>password</passwd>
45 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
49 <return>KErrNone</return>
54 <actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
55 <actiontype>Element</actiontype>
57 <cipher>ECipherRC2_CBC_128_16</cipher>
59 <passwd>a90lkjasjk3lk32kdf89</passwd>
60 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
64 <return>KErrNone</return>
69 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
70 <actiontype>Set</actiontype>
72 <cipher>ECipherRC2_CBC_128_16</cipher>
74 <passwd>a90lkjasjk3lk32kdf89</passwd>
75 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
79 <return>KErrNone</return>
84 <actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
85 <actiontype>Set</actiontype>
87 <cipher>ECipherRC2_CBC_128_16</cipher>
89 <salt_len_bytes>16</salt_len_bytes>
90 <iter_count>1000</iter_count>
92 <passwd>a90lkjasjk3lk32kdf89</passwd>
93 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
97 <return>KErrNone</return>
102 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
103 <actiontype>Set</actiontype>
105 <cipher>ECipherRC2_CBC_128_16</cipher>
107 <passwd>a90lkjasjk3lk32kdf89</passwd>
112 <return>KErrNone</return>
117 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
118 <actiontype>Set</actiontype>
120 <cipher>ECipherRC2_CBC_128_16</cipher>
122 <passwd>a90lkjasjk3lk32kdf89</passwd>
123 <input>ZYXWUTSR</input>
127 <return>KErrNone</return>
132 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
133 <actiontype>Set</actiontype>
135 <cipher>ECipherRC2_CBC_128_16</cipher>
138 <input>ZYXWUTSR</input>
142 <return>KErrNone</return>
147 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
148 <actiontype>Set</actiontype>
150 <cipher>ECipherRC2_CBC_128_16</cipher>
153 <input>ZYXWUTSR</input>
157 <return>KErrNone</return>
162 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
163 <actiontype>Set</actiontype>
165 <cipher>ECipherRC2_CBC_128_16</cipher>
172 <return>KErrNone</return>
176 ///////////////////////////////////////////////////////////////////////////////////
177 ///////////////////////////////////////////////////////////////////////////////////
178 ///////////////////////////////////////////////////////////////////////////////////
181 <actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
182 <actiontype>Element</actiontype>
184 <cipher>ECipherRC2_CBC_40_16</cipher>
186 <passwd>password</passwd>
187 <input>This is what I want to encrypt</input>
191 <return>KErrNone</return>
196 <actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
197 <actiontype>Element</actiontype>
199 <cipher>ECipherRC2_CBC_40_16</cipher>
201 <passwd>password</passwd>
202 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
206 <return>KErrNone</return>
211 <actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
212 <actiontype>Element</actiontype>
214 <cipher>ECipherRC2_CBC_40_16</cipher>
216 <passwd>a90lkjasjk3lk32kdf89</passwd>
217 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
221 <return>KErrNone</return>
226 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
227 <actiontype>Set</actiontype>
229 <cipher>ECipherRC2_CBC_40_16</cipher>
231 <passwd>a90lkjasjk3lk32kdf89</passwd>
232 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
236 <return>KErrNone</return>
241 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
242 <actiontype>Set</actiontype>
244 <cipher>ECipherRC2_CBC_40_16</cipher>
246 <passwd>a90lkjasjk3lk32kdf89</passwd>
251 <return>KErrNone</return>
256 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
257 <actiontype>Set</actiontype>
259 <cipher>ECipherRC2_CBC_40_16</cipher>
261 <passwd>a90lkjasjk3lk32kdf89</passwd>
262 <input>ZYXWUTSR</input>
266 <return>KErrNone</return>
271 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
272 <actiontype>Set</actiontype>
274 <cipher>ECipherRC2_CBC_40_16</cipher>
277 <input>ZYXWUTSR</input>
281 <return>KErrNone</return>
286 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
287 <actiontype>Set</actiontype>
289 <cipher>ECipherRC2_CBC_40_16</cipher>
292 <input>ZYXWUTSR</input>
296 <return>KErrNone</return>
301 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
302 <actiontype>Set</actiontype>
304 <cipher>ECipherRC2_CBC_40_16</cipher>
311 <return>KErrNone</return>
315 ///////////////////////////////////////////////////////////////////////////////////
316 ///////////////////////////////////////////////////////////////////////////////////
317 ///////////////////////////////////////////////////////////////////////////////////
320 <actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
321 <actiontype>Element</actiontype>
323 <cipher>ECipherRC2_CBC_128</cipher>
325 <passwd>password</passwd>
326 <input>This is what I want to encrypt</input>
330 <return>KErrNone</return>
335 <actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
336 <actiontype>Element</actiontype>
338 <cipher>ECipherRC2_CBC_128</cipher>
340 <passwd>password</passwd>
341 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
345 <return>KErrNone</return>
350 <actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
351 <actiontype>Element</actiontype>
353 <cipher>ECipherRC2_CBC_128</cipher>
355 <passwd>a90lkjasjk3lk32kdf89</passwd>
356 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
360 <return>KErrNone</return>
365 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
366 <actiontype>Set</actiontype>
368 <cipher>ECipherRC2_CBC_128</cipher>
370 <passwd>a90lkjasjk3lk32kdf89</passwd>
371 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
375 <return>KErrNone</return>
380 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
381 <actiontype>Set</actiontype>
383 <cipher>ECipherRC2_CBC_128</cipher>
385 <passwd>a90lkjasjk3lk32kdf89</passwd>
390 <return>KErrNone</return>
395 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
396 <actiontype>Set</actiontype>
398 <cipher>ECipherRC2_CBC_128</cipher>
400 <passwd>a90lkjasjk3lk32kdf89</passwd>
401 <input>ZYXWUTSR</input>
405 <return>KErrNone</return>
410 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
411 <actiontype>Set</actiontype>
413 <cipher>ECipherRC2_CBC_128</cipher>
416 <input>ZYXWUTSR</input>
420 <return>KErrNone</return>
425 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
426 <actiontype>Set</actiontype>
428 <cipher>ECipherRC2_CBC_128</cipher>
431 <input>ZYXWUTSR</input>
435 <return>KErrNone</return>
440 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
441 <actiontype>Set</actiontype>
443 <cipher>ECipherRC2_CBC_128</cipher>
450 <return>KErrNone</return>
454 ///////////////////////////////////////////////////////////////////////////////////
455 ///////////////////////////////////////////////////////////////////////////////////
456 ///////////////////////////////////////////////////////////////////////////////////
459 <actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
460 <actiontype>Element</actiontype>
462 <cipher>ECipherRC2_CBC_40</cipher>
464 <passwd>password</passwd>
465 <input>This is what I want to encrypt</input>
469 <return>KErrNone</return>
474 <actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
475 <actiontype>Element</actiontype>
477 <cipher>ECipherRC2_CBC_40</cipher>
479 <passwd>password</passwd>
480 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
484 <return>KErrNone</return>
489 <actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
490 <actiontype>Element</actiontype>
492 <cipher>ECipherRC2_CBC_40</cipher>
494 <passwd>a90lkjasjk3lk32kdf89</passwd>
495 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
499 <return>KErrNone</return>
504 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
505 <actiontype>Set</actiontype>
507 <cipher>ECipherRC2_CBC_40</cipher>
509 <passwd>a90lkjasjk3lk32kdf89</passwd>
510 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
514 <return>KErrNone</return>
519 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
520 <actiontype>Set</actiontype>
522 <cipher>ECipherRC2_CBC_40</cipher>
524 <passwd>a90lkjasjk3lk32kdf89</passwd>
529 <return>KErrNone</return>
534 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
535 <actiontype>Set</actiontype>
537 <cipher>ECipherRC2_CBC_40</cipher>
539 <passwd>a90lkjasjk3lk32kdf89</passwd>
540 <input>ZYXWUTSR</input>
544 <return>KErrNone</return>
549 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
550 <actiontype>Set</actiontype>
552 <cipher>ECipherRC2_CBC_40</cipher>
555 <input>ZYXWUTSR</input>
559 <return>KErrNone</return>
564 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
565 <actiontype>Set</actiontype>
567 <cipher>ECipherRC2_CBC_40</cipher>
570 <input>ZYXWUTSR</input>
574 <return>KErrNone</return>
579 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
580 <actiontype>Set</actiontype>
582 <cipher>ECipherRC2_CBC_40</cipher>
589 <return>KErrNone</return>
593 ///////////////////////////////////////////////////////////////////////////////////
594 ///////////////////////////////////////////////////////////////////////////////////
595 ///////////////////////////////////////////////////////////////////////////////////
598 <actionname>Element test case 1, ECipher3DES_CBC</actionname>
599 <actiontype>Element</actiontype>
601 <cipher>ECipher3DES_CBC</cipher>
603 <passwd>password</passwd>
604 <input>This is what I want to encrypt</input>
608 <return>KErrNone</return>
613 <actionname>Element test case 2, ECipher3DES_CBC</actionname>
614 <actiontype>Element</actiontype>
616 <cipher>ECipher3DES_CBC</cipher>
618 <passwd>password</passwd>
619 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
623 <return>KErrNone</return>
628 <actionname>Element test case 3, ECipher3DES_CBC</actionname>
629 <actiontype>Element</actiontype>
631 <cipher>ECipher3DES_CBC</cipher>
633 <passwd>a90lkjasjk3lk32kdf89</passwd>
634 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
638 <return>KErrNone</return>
643 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
644 <actiontype>Set</actiontype>
646 <cipher>ECipher3DES_CBC</cipher>
648 <passwd>a90lkjasjk3lk32kdf89</passwd>
649 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
653 <return>KErrNone</return>
658 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
659 <actiontype>Set</actiontype>
661 <cipher>ECipher3DES_CBC</cipher>
663 <passwd>a90lkjasjk3lk32kdf89</passwd>
668 <return>KErrNone</return>
673 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
674 <actiontype>Set</actiontype>
676 <cipher>ECipher3DES_CBC</cipher>
678 <passwd>a90lkjasjk3lk32kdf89</passwd>
679 <input>ZYXWUTSR</input>
683 <return>KErrNone</return>
688 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
689 <actiontype>Set</actiontype>
691 <cipher>ECipher3DES_CBC</cipher>
694 <input>ZYXWUTSR</input>
698 <return>KErrNone</return>
703 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
704 <actiontype>Set</actiontype>
706 <cipher>ECipher3DES_CBC</cipher>
709 <input>ZYXWUTSR</input>
713 <return>KErrNone</return>
718 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
719 <actiontype>Set</actiontype>
721 <cipher>ECipher3DES_CBC</cipher>
728 <return>KErrNone</return>
732 ///////////////////////////////////////////////////////////////////////////////////
733 ///////////////////////////////////////////////////////////////////////////////////
734 ///////////////////////////////////////////////////////////////////////////////////
737 <actionname>Element test case 1, ECipherAES_CBC_256</actionname>
738 <actiontype>Element</actiontype>
740 <cipher>ECipherAES_CBC_256</cipher>
742 <passwd>password</passwd>
743 <input>This is what I want to encrypt</input>
747 <return>KErrNone</return>
752 <actionname>Element test case 2, ECipherAES_CBC_256</actionname>
753 <actiontype>Element</actiontype>
755 <cipher>ECipherAES_CBC_256</cipher>
757 <passwd>password</passwd>
758 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
762 <return>KErrNone</return>
767 <actionname>Element test case 3, ECipherAES_CBC_256</actionname>
768 <actiontype>Element</actiontype>
770 <cipher>ECipherAES_CBC_256</cipher>
772 <passwd>a90lkjasjk3lk32kdf89</passwd>
773 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
777 <return>KErrNone</return>
782 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
783 <actiontype>Set</actiontype>
785 <cipher>ECipherAES_CBC_256</cipher>
787 <passwd>a90lkjasjk3lk32kdf89</passwd>
788 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
792 <return>KErrNone</return>
797 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
798 <actiontype>Set</actiontype>
800 <cipher>ECipherAES_CBC_256</cipher>
802 <passwd>a90lkjasjk3lk32kdf89</passwd>
807 <return>KErrNone</return>
812 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
813 <actiontype>Set</actiontype>
815 <cipher>ECipherAES_CBC_256</cipher>
817 <passwd>a90lkjasjk3lk32kdf89</passwd>
818 <input>ZYXWUTSR</input>
822 <return>KErrNone</return>
827 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
828 <actiontype>Set</actiontype>
830 <cipher>ECipherAES_CBC_256</cipher>
833 <input>ZYXWUTSR</input>
837 <return>KErrNone</return>
842 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
843 <actiontype>Set</actiontype>
845 <cipher>ECipherAES_CBC_256</cipher>
848 <input>ZYXWUTSR</input>
852 <return>KErrNone</return>
857 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
858 <actiontype>Set</actiontype>
860 <cipher>ECipherAES_CBC_256</cipher>
867 <return>KErrNone</return>
871 ///////////////////////////////////////////////////////////////////////////////////
872 ///////////////////////////////////////////////////////////////////////////////////
873 ///////////////////////////////////////////////////////////////////////////////////
876 <actionname>Element test case 1, ECipherAES_CBC_192</actionname>
877 <actiontype>Element</actiontype>
879 <cipher>ECipherAES_CBC_192</cipher>
881 <passwd>password</passwd>
882 <input>This is what I want to encrypt</input>
886 <return>KErrNone</return>
891 <actionname>Element test case 2, ECipherAES_CBC_192</actionname>
892 <actiontype>Element</actiontype>
894 <cipher>ECipherAES_CBC_192</cipher>
896 <passwd>password</passwd>
897 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
901 <return>KErrNone</return>
906 <actionname>Element test case 3, ECipherAES_CBC_192</actionname>
907 <actiontype>Element</actiontype>
909 <cipher>ECipherAES_CBC_192</cipher>
911 <passwd>a90lkjasjk3lk32kdf89</passwd>
912 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
916 <return>KErrNone</return>
921 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
922 <actiontype>Set</actiontype>
924 <cipher>ECipherAES_CBC_192</cipher>
926 <passwd>a90lkjasjk3lk32kdf89</passwd>
927 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
931 <return>KErrNone</return>
936 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
937 <actiontype>Set</actiontype>
939 <cipher>ECipherAES_CBC_192</cipher>
941 <passwd>a90lkjasjk3lk32kdf89</passwd>
946 <return>KErrNone</return>
951 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
952 <actiontype>Set</actiontype>
954 <cipher>ECipherAES_CBC_192</cipher>
956 <passwd>a90lkjasjk3lk32kdf89</passwd>
957 <input>ZYXWUTSR</input>
961 <return>KErrNone</return>
966 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
967 <actiontype>Set</actiontype>
969 <cipher>ECipherAES_CBC_192</cipher>
972 <input>ZYXWUTSR</input>
976 <return>KErrNone</return>
981 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
982 <actiontype>Set</actiontype>
984 <cipher>ECipherAES_CBC_192</cipher>
987 <input>ZYXWUTSR</input>
991 <return>KErrNone</return>
996 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
997 <actiontype>Set</actiontype>
999 <cipher>ECipherAES_CBC_192</cipher>
1006 <return>KErrNone</return>
1010 ///////////////////////////////////////////////////////////////////////////////////
1011 ///////////////////////////////////////////////////////////////////////////////////
1012 ///////////////////////////////////////////////////////////////////////////////////
1016 <actionname>Element test case 1, ECipherAES_CBC_128</actionname>
1017 <actiontype>Element</actiontype>
1019 <cipher>ECipherAES_CBC_128</cipher>
1021 <passwd>password</passwd>
1022 <input>This is what I want to encrypt</input>
1026 <return>KErrNone</return>
1031 <actionname>Element test case 2, ECipherAES_CBC_128</actionname>
1032 <actiontype>Element</actiontype>
1034 <cipher>ECipherAES_CBC_128</cipher>
1036 <passwd>password</passwd>
1037 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1041 <return>KErrNone</return>
1046 <actionname>Element test case 3, ECipherAES_CBC_128</actionname>
1047 <actiontype>Element</actiontype>
1049 <cipher>ECipherAES_CBC_128</cipher>
1051 <passwd>a90lkjasjk3lk32kdf89</passwd>
1052 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1056 <return>KErrNone</return>
1061 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
1062 <actiontype>Set</actiontype>
1064 <cipher>ECipherAES_CBC_128</cipher>
1066 <passwd>a90lkjasjk3lk32kdf89</passwd>
1067 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1071 <return>KErrNone</return>
1076 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
1077 <actiontype>Set</actiontype>
1079 <cipher>ECipherAES_CBC_128</cipher>
1081 <passwd>a90lkjasjk3lk32kdf89</passwd>
1086 <return>KErrNone</return>
1091 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
1092 <actiontype>Set</actiontype>
1094 <cipher>ECipherAES_CBC_128</cipher>
1096 <passwd>a90lkjasjk3lk32kdf89</passwd>
1097 <input>ZYXWUTSR</input>
1101 <return>KErrNone</return>
1106 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
1107 <actiontype>Set</actiontype>
1109 <cipher>ECipherAES_CBC_128</cipher>
1112 <input>ZYXWUTSR</input>
1116 <return>KErrNone</return>
1121 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
1122 <actiontype>Set</actiontype>
1124 <cipher>ECipherAES_CBC_128</cipher>
1127 <input>ZYXWUTSR</input>
1131 <return>KErrNone</return>
1136 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
1137 <actiontype>Set</actiontype>
1139 <cipher>ECipherAES_CBC_128</cipher>
1146 <return>KErrNone</return>
1150 ///////////////////////////////////////////////////////////////////////////////////
1151 ///////////////////////////////////////////////////////////////////////////////////
1152 ///////////////////////////////////////////////////////////////////////////////////
1155 // Start of Permanent File Store PBE testing between weak and strong crypto
1157 <actionname>Write encrypted data to a PFS named according to crypto strength</actionname>
1158 <actiontype>WritePFS</actiontype>
1161 <passwd>a90lkjasjk3lk32kdf89</passwd>
1162 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1166 <return>KErrNone</return>
1170 <actionname>Decrypting weak crypto file</actionname>
1171 <actiontype>ReadPFS</actiontype>
1174 <strength>weak</strength>
1175 <passwd>a90lkjasjk3lk32kdf89</passwd>
1176 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1180 <return>KErrNone</return>
1184 <actionname>Decrypting strong crypto file</actionname>
1185 <actiontype>ReadPFS</actiontype>
1188 <strength>strong</strength>
1189 <passwd>a90lkjasjk3lk32kdf89</passwd>
1190 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1194 <return>KErrNone</return>
1198 //Start of OOM testing
1200 <actionname>OOM start</actionname>
1201 <actiontype>startmemfailure</actiontype>
1202 <actionbody></actionbody>
1204 <return>KErrNone</return>
1208 <actionname>Element test case 2</actionname>
1209 <actiontype>Element</actiontype>
1212 <passwd>password</passwd>
1213 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1217 <return>KErrNone</return>
1221 <actionname>Test of Set encryption, password changing, exporting importing Test 1</actionname>
1222 <actiontype>Set</actiontype>
1225 <passwd>a90lkjasjk3lk32kdf89</passwd>
1226 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1230 <return>KErrNone</return>
1234 <actionname>OOM end</actionname>
1235 <actiontype>stopmemfailure</actiontype>
1236 <actionbody></actionbody>
1238 <return>KErrNone</return>
1243 // =======================================================================
1247 //! @SYMTestCaseID CIT_PREQ1054_02
1248 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1249 //! @SYMREQ CIT_PREQ1054
1250 //! @SYMTestPriority medium
1251 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1252 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1254 <actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
1255 <actiontype>Element</actiontype>
1258 <salt_len_bytes>20</salt_len_bytes>
1259 <iter_count>1024</iter_count>
1260 <cipher>ECipherRC2_CBC_128_16</cipher>
1262 <passwd>password</passwd>
1263 <input>This is what I want to encrypt</input>
1267 <return>KErrNone</return>
1272 //! @SYMTestCaseID CIT_PREQ1054_02
1273 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1274 //! @SYMREQ CIT_PREQ1054
1275 //! @SYMTestPriority medium
1276 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1277 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1279 <actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
1280 <actiontype>Element</actiontype>
1283 <salt_len_bytes>20</salt_len_bytes>
1284 <iter_count>1024</iter_count>
1285 <cipher>ECipherRC2_CBC_128_16</cipher>
1287 <passwd>password</passwd>
1288 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1292 <return>KErrNone</return>
1296 //! @SYMTestCaseID CIT_PREQ1054_02
1297 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1298 //! @SYMREQ CIT_PREQ1054
1299 //! @SYMTestPriority medium
1300 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1301 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1303 <actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
1304 <actiontype>Element</actiontype>
1307 <salt_len_bytes>20</salt_len_bytes>
1308 <iter_count>1024</iter_count>
1309 <cipher>ECipherRC2_CBC_128_16</cipher>
1311 <passwd>a90lkjasjk3lk32kdf89</passwd>
1312 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1316 <return>KErrNone</return>
1321 //! @SYMTestCaseID CIT_PREQ1054_02
1322 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1323 //! @SYMREQ CIT_PREQ1054
1324 //! @SYMTestPriority medium
1325 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1326 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1328 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
1329 <actiontype>Set</actiontype>
1332 <salt_len_bytes>20</salt_len_bytes>
1333 <iter_count>1024</iter_count>
1334 <cipher>ECipherRC2_CBC_128_16</cipher>
1336 <passwd>a90lkjasjk3lk32kdf89</passwd>
1337 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1341 <return>KErrNone</return>
1346 //! @SYMTestCaseID CIT_PREQ1054_02
1347 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#5 KDF.
1348 //! @SYMREQ CIT_PREQ1054
1349 //! @SYMTestPriority medium
1350 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1353 <actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
1354 <actiontype>Set</actiontype>
1357 <salt_len_bytes>20</salt_len_bytes>
1358 <iter_count>1024</iter_count>
1359 <cipher>ECipherRC2_CBC_128_16</cipher>
1361 <salt_len_bytes>16</salt_len_bytes>
1362 <iter_count>1000</iter_count>
1364 <passwd>a90lkjasjk3lk32kdf89</passwd>
1365 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1369 <return>KErrNone</return>
1374 //! @SYMTestCaseID CIT_PREQ1054_02
1375 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1376 //! @SYMREQ CIT_PREQ1054
1377 //! @SYMTestPriority medium
1378 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1379 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1381 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
1382 <actiontype>Set</actiontype>
1385 <salt_len_bytes>20</salt_len_bytes>
1386 <iter_count>1024</iter_count>
1387 <cipher>ECipherRC2_CBC_128_16</cipher>
1389 <passwd>a90lkjasjk3lk32kdf89</passwd>
1394 <return>KErrNone</return>
1399 //! @SYMTestCaseID CIT_PREQ1054_02
1400 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1401 //! @SYMREQ CIT_PREQ1054
1402 //! @SYMTestPriority medium
1403 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1404 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1406 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
1407 <actiontype>Set</actiontype>
1410 <salt_len_bytes>20</salt_len_bytes>
1411 <iter_count>1024</iter_count>
1412 <cipher>ECipherRC2_CBC_128_16</cipher>
1414 <passwd>a90lkjasjk3lk32kdf89</passwd>
1415 <input>ZYXWUTSR</input>
1419 <return>KErrNone</return>
1424 //! @SYMTestCaseID CIT_PREQ1054_02
1425 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1426 //! @SYMREQ CIT_PREQ1054
1427 //! @SYMTestPriority medium
1428 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1429 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1431 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
1432 <actiontype>Set</actiontype>
1435 <salt_len_bytes>20</salt_len_bytes>
1436 <iter_count>1024</iter_count>
1437 <cipher>ECipherRC2_CBC_128_16</cipher>
1440 <input>ZYXWUTSR</input>
1444 <return>KErrNone</return>
1449 //! @SYMTestCaseID CIT_PREQ1054_02
1450 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1451 //! @SYMREQ CIT_PREQ1054
1452 //! @SYMTestPriority medium
1453 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1454 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1456 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
1457 <actiontype>Set</actiontype>
1460 <salt_len_bytes>20</salt_len_bytes>
1461 <iter_count>1024</iter_count>
1462 <cipher>ECipherRC2_CBC_128_16</cipher>
1465 <input>ZYXWUTSR</input>
1469 <return>KErrNone</return>
1474 //! @SYMTestCaseID CIT_PREQ1054_02
1475 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1476 //! @SYMREQ CIT_PREQ1054
1477 //! @SYMTestPriority medium
1478 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1479 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1481 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
1482 <actiontype>Set</actiontype>
1485 <salt_len_bytes>20</salt_len_bytes>
1486 <iter_count>1024</iter_count>
1487 <cipher>ECipherRC2_CBC_128_16</cipher>
1494 <return>KErrNone</return>
1498 ///////////////////////////////////////////////////////////////////////////////////
1499 ///////////////////////////////////////////////////////////////////////////////////
1500 ///////////////////////////////////////////////////////////////////////////////////
1503 //! @SYMTestCaseID CIT_PREQ1054_02
1504 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1505 //! @SYMREQ CIT_PREQ1054
1506 //! @SYMTestPriority medium
1507 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1508 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1510 <actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
1511 <actiontype>Element</actiontype>
1514 <salt_len_bytes>20</salt_len_bytes>
1515 <iter_count>1024</iter_count>
1516 <cipher>ECipherRC2_CBC_40_16</cipher>
1518 <passwd>password</passwd>
1519 <input>This is what I want to encrypt</input>
1523 <return>KErrNone</return>
1528 //! @SYMTestCaseID CIT_PREQ1054_02
1529 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1530 //! @SYMREQ CIT_PREQ1054
1531 //! @SYMTestPriority medium
1532 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1533 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1535 <actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
1536 <actiontype>Element</actiontype>
1539 <salt_len_bytes>20</salt_len_bytes>
1540 <iter_count>1024</iter_count>
1541 <cipher>ECipherRC2_CBC_40_16</cipher>
1543 <passwd>password</passwd>
1544 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1548 <return>KErrNone</return>
1553 //! @SYMTestCaseID CIT_PREQ1054_02
1554 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1555 //! @SYMREQ CIT_PREQ1054
1556 //! @SYMTestPriority medium
1557 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1558 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1560 <actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
1561 <actiontype>Element</actiontype>
1564 <salt_len_bytes>20</salt_len_bytes>
1565 <iter_count>1024</iter_count>
1566 <cipher>ECipherRC2_CBC_40_16</cipher>
1568 <passwd>a90lkjasjk3lk32kdf89</passwd>
1569 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1573 <return>KErrNone</return>
1578 //! @SYMTestCaseID CIT_PREQ1054_02
1579 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1580 //! @SYMREQ CIT_PREQ1054
1581 //! @SYMTestPriority medium
1582 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1583 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1585 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
1586 <actiontype>Set</actiontype>
1589 <salt_len_bytes>20</salt_len_bytes>
1590 <iter_count>1024</iter_count>
1591 <cipher>ECipherRC2_CBC_40_16</cipher>
1593 <passwd>a90lkjasjk3lk32kdf89</passwd>
1594 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1598 <return>KErrNone</return>
1603 //! @SYMTestCaseID CIT_PREQ1054_02
1604 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1605 //! @SYMREQ CIT_PREQ1054
1606 //! @SYMTestPriority medium
1607 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1608 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1610 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
1611 <actiontype>Set</actiontype>
1614 <salt_len_bytes>20</salt_len_bytes>
1615 <iter_count>1024</iter_count>
1616 <cipher>ECipherRC2_CBC_40_16</cipher>
1618 <passwd>a90lkjasjk3lk32kdf89</passwd>
1623 <return>KErrNone</return>
1628 //! @SYMTestCaseID CIT_PREQ1054_02
1629 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1630 //! @SYMREQ CIT_PREQ1054
1631 //! @SYMTestPriority medium
1632 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1633 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1635 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
1636 <actiontype>Set</actiontype>
1639 <salt_len_bytes>20</salt_len_bytes>
1640 <iter_count>1024</iter_count>
1641 <cipher>ECipherRC2_CBC_40_16</cipher>
1643 <passwd>a90lkjasjk3lk32kdf89</passwd>
1644 <input>ZYXWUTSR</input>
1648 <return>KErrNone</return>
1653 //! @SYMTestCaseID CIT_PREQ1054_02
1654 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1655 //! @SYMREQ CIT_PREQ1054
1656 //! @SYMTestPriority medium
1657 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1658 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1660 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
1661 <actiontype>Set</actiontype>
1664 <salt_len_bytes>20</salt_len_bytes>
1665 <iter_count>1024</iter_count>
1666 <cipher>ECipherRC2_CBC_40_16</cipher>
1669 <input>ZYXWUTSR</input>
1673 <return>KErrNone</return>
1678 //! @SYMTestCaseID CIT_PREQ1054_02
1679 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1680 //! @SYMREQ CIT_PREQ1054
1681 //! @SYMTestPriority medium
1682 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1683 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1685 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
1686 <actiontype>Set</actiontype>
1689 <salt_len_bytes>20</salt_len_bytes>
1690 <iter_count>1024</iter_count>
1691 <cipher>ECipherRC2_CBC_40_16</cipher>
1694 <input>ZYXWUTSR</input>
1698 <return>KErrNone</return>
1703 //! @SYMTestCaseID CIT_PREQ1054_02
1704 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1705 //! @SYMREQ CIT_PREQ1054
1706 //! @SYMTestPriority medium
1707 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1708 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1710 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
1711 <actiontype>Set</actiontype>
1714 <salt_len_bytes>20</salt_len_bytes>
1715 <iter_count>1024</iter_count>
1716 <cipher>ECipherRC2_CBC_40_16</cipher>
1723 <return>KErrNone</return>
1727 ///////////////////////////////////////////////////////////////////////////////////
1728 ///////////////////////////////////////////////////////////////////////////////////
1729 ///////////////////////////////////////////////////////////////////////////////////
1732 //! @SYMTestCaseID CIT_PREQ1054_02
1733 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1734 //! @SYMREQ CIT_PREQ1054
1735 //! @SYMTestPriority medium
1736 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1737 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1739 <actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
1740 <actiontype>Element</actiontype>
1743 <salt_len_bytes>20</salt_len_bytes>
1744 <iter_count>1024</iter_count>
1745 <cipher>ECipherRC2_CBC_128</cipher>
1747 <passwd>password</passwd>
1748 <input>This is what I want to encrypt</input>
1752 <return>KErrNone</return>
1757 //! @SYMTestCaseID CIT_PREQ1054_02
1758 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1759 //! @SYMREQ CIT_PREQ1054
1760 //! @SYMTestPriority medium
1761 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1762 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1764 <actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
1765 <actiontype>Element</actiontype>
1768 <salt_len_bytes>20</salt_len_bytes>
1769 <iter_count>1024</iter_count>
1770 <cipher>ECipherRC2_CBC_128</cipher>
1772 <passwd>password</passwd>
1773 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1777 <return>KErrNone</return>
1782 //! @SYMTestCaseID CIT_PREQ1054_02
1783 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1784 //! @SYMREQ CIT_PREQ1054
1785 //! @SYMTestPriority medium
1786 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1787 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1789 <actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
1790 <actiontype>Element</actiontype>
1793 <salt_len_bytes>20</salt_len_bytes>
1794 <iter_count>1024</iter_count>
1795 <cipher>ECipherRC2_CBC_128</cipher>
1797 <passwd>a90lkjasjk3lk32kdf89</passwd>
1798 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1802 <return>KErrNone</return>
1807 //! @SYMTestCaseID CIT_PREQ1054_02
1808 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1809 //! @SYMREQ CIT_PREQ1054
1810 //! @SYMTestPriority medium
1811 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1812 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1814 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
1815 <actiontype>Set</actiontype>
1818 <salt_len_bytes>20</salt_len_bytes>
1819 <iter_count>1024</iter_count>
1820 <cipher>ECipherRC2_CBC_128</cipher>
1822 <passwd>a90lkjasjk3lk32kdf89</passwd>
1823 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
1827 <return>KErrNone</return>
1832 //! @SYMTestCaseID CIT_PREQ1054_02
1833 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1834 //! @SYMREQ CIT_PREQ1054
1835 //! @SYMTestPriority medium
1836 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1837 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1839 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
1840 <actiontype>Set</actiontype>
1843 <salt_len_bytes>20</salt_len_bytes>
1844 <iter_count>1024</iter_count>
1845 <cipher>ECipherRC2_CBC_128</cipher>
1847 <passwd>a90lkjasjk3lk32kdf89</passwd>
1852 <return>KErrNone</return>
1857 //! @SYMTestCaseID CIT_PREQ1054_02
1858 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1859 //! @SYMREQ CIT_PREQ1054
1860 //! @SYMTestPriority medium
1861 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1862 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1864 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
1865 <actiontype>Set</actiontype>
1868 <salt_len_bytes>20</salt_len_bytes>
1869 <iter_count>1024</iter_count>
1870 <cipher>ECipherRC2_CBC_128</cipher>
1872 <passwd>a90lkjasjk3lk32kdf89</passwd>
1873 <input>ZYXWUTSR</input>
1877 <return>KErrNone</return>
1882 //! @SYMTestCaseID CIT_PREQ1054_02
1883 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1884 //! @SYMREQ CIT_PREQ1054
1885 //! @SYMTestPriority medium
1886 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1887 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1889 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
1890 <actiontype>Set</actiontype>
1893 <salt_len_bytes>20</salt_len_bytes>
1894 <iter_count>1024</iter_count>
1895 <cipher>ECipherRC2_CBC_128</cipher>
1898 <input>ZYXWUTSR</input>
1902 <return>KErrNone</return>
1907 //! @SYMTestCaseID CIT_PREQ1054_02
1908 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1909 //! @SYMREQ CIT_PREQ1054
1910 //! @SYMTestPriority medium
1911 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1912 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1914 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
1915 <actiontype>Set</actiontype>
1918 <salt_len_bytes>20</salt_len_bytes>
1919 <iter_count>1024</iter_count>
1920 <cipher>ECipherRC2_CBC_128</cipher>
1923 <input>ZYXWUTSR</input>
1927 <return>KErrNone</return>
1932 //! @SYMTestCaseID CIT_PREQ1054_02
1933 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1934 //! @SYMREQ CIT_PREQ1054
1935 //! @SYMTestPriority medium
1936 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1937 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1939 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
1940 <actiontype>Set</actiontype>
1943 <salt_len_bytes>20</salt_len_bytes>
1944 <iter_count>1024</iter_count>
1945 <cipher>ECipherRC2_CBC_128</cipher>
1952 <return>KErrNone</return>
1956 ///////////////////////////////////////////////////////////////////////////////////
1957 ///////////////////////////////////////////////////////////////////////////////////
1958 ///////////////////////////////////////////////////////////////////////////////////
1961 //! @SYMTestCaseID CIT_PREQ1054_02
1962 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1963 //! @SYMREQ CIT_PREQ1054
1964 //! @SYMTestPriority medium
1965 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1966 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1968 <actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
1969 <actiontype>Element</actiontype>
1972 <salt_len_bytes>20</salt_len_bytes>
1973 <iter_count>1024</iter_count>
1974 <cipher>ECipherRC2_CBC_40</cipher>
1976 <passwd>password</passwd>
1977 <input>This is what I want to encrypt</input>
1981 <return>KErrNone</return>
1986 //! @SYMTestCaseID CIT_PREQ1054_02
1987 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
1988 //! @SYMREQ CIT_PREQ1054
1989 //! @SYMTestPriority medium
1990 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
1991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
1993 <actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
1994 <actiontype>Element</actiontype>
1997 <salt_len_bytes>20</salt_len_bytes>
1998 <iter_count>1024</iter_count>
1999 <cipher>ECipherRC2_CBC_40</cipher>
2001 <passwd>password</passwd>
2002 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2006 <return>KErrNone</return>
2011 //! @SYMTestCaseID CIT_PREQ1054_02
2012 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2013 //! @SYMREQ CIT_PREQ1054
2014 //! @SYMTestPriority medium
2015 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2016 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2018 <actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
2019 <actiontype>Element</actiontype>
2022 <salt_len_bytes>20</salt_len_bytes>
2023 <iter_count>1024</iter_count>
2024 <cipher>ECipherRC2_CBC_40</cipher>
2026 <passwd>a90lkjasjk3lk32kdf89</passwd>
2027 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2031 <return>KErrNone</return>
2036 //! @SYMTestCaseID CIT_PREQ1054_02
2037 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2038 //! @SYMREQ CIT_PREQ1054
2039 //! @SYMTestPriority medium
2040 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2041 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2043 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
2044 <actiontype>Set</actiontype>
2047 <salt_len_bytes>20</salt_len_bytes>
2048 <iter_count>1024</iter_count>
2049 <cipher>ECipherRC2_CBC_40</cipher>
2051 <passwd>a90lkjasjk3lk32kdf89</passwd>
2052 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2056 <return>KErrNone</return>
2061 //! @SYMTestCaseID CIT_PREQ1054_02
2062 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2063 //! @SYMREQ CIT_PREQ1054
2064 //! @SYMTestPriority medium
2065 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2066 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2068 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
2069 <actiontype>Set</actiontype>
2072 <salt_len_bytes>20</salt_len_bytes>
2073 <iter_count>1024</iter_count>
2074 <cipher>ECipherRC2_CBC_40</cipher>
2076 <passwd>a90lkjasjk3lk32kdf89</passwd>
2081 <return>KErrNone</return>
2086 //! @SYMTestCaseID CIT_PREQ1054_02
2087 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2088 //! @SYMREQ CIT_PREQ1054
2089 //! @SYMTestPriority medium
2090 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2093 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
2094 <actiontype>Set</actiontype>
2097 <salt_len_bytes>20</salt_len_bytes>
2098 <iter_count>1024</iter_count>
2099 <cipher>ECipherRC2_CBC_40</cipher>
2101 <passwd>a90lkjasjk3lk32kdf89</passwd>
2102 <input>ZYXWUTSR</input>
2106 <return>KErrNone</return>
2111 //! @SYMTestCaseID CIT_PREQ1054_02
2112 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2113 //! @SYMREQ CIT_PREQ1054
2114 //! @SYMTestPriority medium
2115 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2116 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2118 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
2119 <actiontype>Set</actiontype>
2122 <salt_len_bytes>20</salt_len_bytes>
2123 <iter_count>1024</iter_count>
2124 <cipher>ECipherRC2_CBC_40</cipher>
2127 <input>ZYXWUTSR</input>
2131 <return>KErrNone</return>
2136 //! @SYMTestCaseID CIT_PREQ1054_02
2137 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2138 //! @SYMREQ CIT_PREQ1054
2139 //! @SYMTestPriority medium
2140 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2141 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2143 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
2144 <actiontype>Set</actiontype>
2147 <salt_len_bytes>20</salt_len_bytes>
2148 <iter_count>1024</iter_count>
2149 <cipher>ECipherRC2_CBC_40</cipher>
2152 <input>ZYXWUTSR</input>
2156 <return>KErrNone</return>
2161 //! @SYMTestCaseID CIT_PREQ1054_02
2162 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2163 //! @SYMREQ CIT_PREQ1054
2164 //! @SYMTestPriority medium
2165 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2166 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2168 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
2169 <actiontype>Set</actiontype>
2172 <salt_len_bytes>20</salt_len_bytes>
2173 <iter_count>1024</iter_count>
2174 <cipher>ECipherRC2_CBC_40</cipher>
2181 <return>KErrNone</return>
2185 ///////////////////////////////////////////////////////////////////////////////////
2186 ///////////////////////////////////////////////////////////////////////////////////
2187 ///////////////////////////////////////////////////////////////////////////////////
2190 //! @SYMTestCaseID CIT_PREQ1054_02
2191 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2192 //! @SYMREQ CIT_PREQ1054
2193 //! @SYMTestPriority medium
2194 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2195 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2197 <actionname>Element test case 1, ECipher3DES_CBC</actionname>
2198 <actiontype>Element</actiontype>
2201 <salt_len_bytes>20</salt_len_bytes>
2202 <iter_count>1024</iter_count>
2203 <cipher>ECipher3DES_CBC</cipher>
2205 <passwd>password</passwd>
2206 <input>This is what I want to encrypt</input>
2210 <return>KErrNone</return>
2215 //! @SYMTestCaseID CIT_PREQ1054_02
2216 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2217 //! @SYMREQ CIT_PREQ1054
2218 //! @SYMTestPriority medium
2219 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2220 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2222 <actionname>Element test case 2, ECipher3DES_CBC</actionname>
2223 <actiontype>Element</actiontype>
2226 <salt_len_bytes>20</salt_len_bytes>
2227 <iter_count>1024</iter_count>
2228 <cipher>ECipher3DES_CBC</cipher>
2230 <passwd>password</passwd>
2231 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2235 <return>KErrNone</return>
2240 //! @SYMTestCaseID CIT_PREQ1054_02
2241 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2242 //! @SYMREQ CIT_PREQ1054
2243 //! @SYMTestPriority medium
2244 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2245 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2247 <actionname>Element test case 3, ECipher3DES_CBC</actionname>
2248 <actiontype>Element</actiontype>
2251 <salt_len_bytes>20</salt_len_bytes>
2252 <iter_count>1024</iter_count>
2253 <cipher>ECipher3DES_CBC</cipher>
2255 <passwd>a90lkjasjk3lk32kdf89</passwd>
2256 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2260 <return>KErrNone</return>
2265 //! @SYMTestCaseID CIT_PREQ1054_02
2266 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2267 //! @SYMREQ CIT_PREQ1054
2268 //! @SYMTestPriority medium
2269 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2270 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2272 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
2273 <actiontype>Set</actiontype>
2276 <salt_len_bytes>20</salt_len_bytes>
2277 <iter_count>1024</iter_count>
2278 <cipher>ECipher3DES_CBC</cipher>
2280 <passwd>a90lkjasjk3lk32kdf89</passwd>
2281 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2285 <return>KErrNone</return>
2290 //! @SYMTestCaseID CIT_PREQ1054_02
2291 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2292 //! @SYMREQ CIT_PREQ1054
2293 //! @SYMTestPriority medium
2294 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2295 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2297 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
2298 <actiontype>Set</actiontype>
2301 <salt_len_bytes>20</salt_len_bytes>
2302 <iter_count>1024</iter_count>
2303 <cipher>ECipher3DES_CBC</cipher>
2305 <passwd>a90lkjasjk3lk32kdf89</passwd>
2310 <return>KErrNone</return>
2315 //! @SYMTestCaseID CIT_PREQ1054_02
2316 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2317 //! @SYMREQ CIT_PREQ1054
2318 //! @SYMTestPriority medium
2319 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2320 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2322 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
2323 <actiontype>Set</actiontype>
2326 <salt_len_bytes>20</salt_len_bytes>
2327 <iter_count>1024</iter_count>
2328 <cipher>ECipher3DES_CBC</cipher>
2330 <passwd>a90lkjasjk3lk32kdf89</passwd>
2331 <input>ZYXWUTSR</input>
2335 <return>KErrNone</return>
2340 //! @SYMTestCaseID CIT_PREQ1054_02
2341 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2342 //! @SYMREQ CIT_PREQ1054
2343 //! @SYMTestPriority medium
2344 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2345 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2347 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
2348 <actiontype>Set</actiontype>
2351 <salt_len_bytes>20</salt_len_bytes>
2352 <iter_count>1024</iter_count>
2353 <cipher>ECipher3DES_CBC</cipher>
2356 <input>ZYXWUTSR</input>
2360 <return>KErrNone</return>
2365 //! @SYMTestCaseID CIT_PREQ1054_02
2366 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2367 //! @SYMREQ CIT_PREQ1054
2368 //! @SYMTestPriority medium
2369 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2370 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2372 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
2373 <actiontype>Set</actiontype>
2376 <salt_len_bytes>20</salt_len_bytes>
2377 <iter_count>1024</iter_count>
2378 <cipher>ECipher3DES_CBC</cipher>
2381 <input>ZYXWUTSR</input>
2385 <return>KErrNone</return>
2390 //! @SYMTestCaseID CIT_PREQ1054_02
2391 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2392 //! @SYMREQ CIT_PREQ1054
2393 //! @SYMTestPriority medium
2394 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2395 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2397 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
2398 <actiontype>Set</actiontype>
2401 <salt_len_bytes>20</salt_len_bytes>
2402 <iter_count>1024</iter_count>
2403 <cipher>ECipher3DES_CBC</cipher>
2410 <return>KErrNone</return>
2414 ///////////////////////////////////////////////////////////////////////////////////
2415 ///////////////////////////////////////////////////////////////////////////////////
2416 ///////////////////////////////////////////////////////////////////////////////////
2419 //! @SYMTestCaseID CIT_PREQ1054_02
2420 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2421 //! @SYMREQ CIT_PREQ1054
2422 //! @SYMTestPriority medium
2423 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2424 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2426 <actionname>Element test case 1, ECipherAES_CBC_256</actionname>
2427 <actiontype>Element</actiontype>
2430 <salt_len_bytes>20</salt_len_bytes>
2431 <iter_count>1024</iter_count>
2432 <cipher>ECipherAES_CBC_256</cipher>
2434 <passwd>password</passwd>
2435 <input>This is what I want to encrypt</input>
2439 <return>KErrNone</return>
2444 //! @SYMTestCaseID CIT_PREQ1054_02
2445 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2446 //! @SYMREQ CIT_PREQ1054
2447 //! @SYMTestPriority medium
2448 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2449 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2451 <actionname>Element test case 2, ECipherAES_CBC_256</actionname>
2452 <actiontype>Element</actiontype>
2455 <salt_len_bytes>20</salt_len_bytes>
2456 <iter_count>1024</iter_count>
2457 <cipher>ECipherAES_CBC_256</cipher>
2459 <passwd>password</passwd>
2460 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2464 <return>KErrNone</return>
2469 //! @SYMTestCaseID CIT_PREQ1054_02
2470 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2471 //! @SYMREQ CIT_PREQ1054
2472 //! @SYMTestPriority medium
2473 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2474 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2476 <actionname>Element test case 3, ECipherAES_CBC_256</actionname>
2477 <actiontype>Element</actiontype>
2480 <salt_len_bytes>20</salt_len_bytes>
2481 <iter_count>1024</iter_count>
2482 <cipher>ECipherAES_CBC_256</cipher>
2484 <passwd>a90lkjasjk3lk32kdf89</passwd>
2485 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2489 <return>KErrNone</return>
2494 //! @SYMTestCaseID CIT_PREQ1054_02
2495 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2496 //! @SYMREQ CIT_PREQ1054
2497 //! @SYMTestPriority medium
2498 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2499 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2501 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
2502 <actiontype>Set</actiontype>
2505 <salt_len_bytes>20</salt_len_bytes>
2506 <iter_count>1024</iter_count>
2507 <cipher>ECipherAES_CBC_256</cipher>
2509 <passwd>a90lkjasjk3lk32kdf89</passwd>
2510 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2514 <return>KErrNone</return>
2519 //! @SYMTestCaseID CIT_PREQ1054_02
2520 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2521 //! @SYMREQ CIT_PREQ1054
2522 //! @SYMTestPriority medium
2523 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2524 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2526 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
2527 <actiontype>Set</actiontype>
2530 <salt_len_bytes>20</salt_len_bytes>
2531 <iter_count>1024</iter_count>
2532 <cipher>ECipherAES_CBC_256</cipher>
2534 <passwd>a90lkjasjk3lk32kdf89</passwd>
2539 <return>KErrNone</return>
2544 //! @SYMTestCaseID CIT_PREQ1054_02
2545 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2546 //! @SYMREQ CIT_PREQ1054
2547 //! @SYMTestPriority medium
2548 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2549 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2551 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
2552 <actiontype>Set</actiontype>
2555 <salt_len_bytes>20</salt_len_bytes>
2556 <iter_count>1024</iter_count>
2557 <cipher>ECipherAES_CBC_256</cipher>
2559 <passwd>a90lkjasjk3lk32kdf89</passwd>
2560 <input>ZYXWUTSR</input>
2564 <return>KErrNone</return>
2569 //! @SYMTestCaseID CIT_PREQ1054_02
2570 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2571 //! @SYMREQ CIT_PREQ1054
2572 //! @SYMTestPriority medium
2573 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2574 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2576 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
2577 <actiontype>Set</actiontype>
2580 <salt_len_bytes>20</salt_len_bytes>
2581 <iter_count>1024</iter_count>
2582 <cipher>ECipherAES_CBC_256</cipher>
2585 <input>ZYXWUTSR</input>
2589 <return>KErrNone</return>
2594 //! @SYMTestCaseID CIT_PREQ1054_02
2595 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2596 //! @SYMREQ CIT_PREQ1054
2597 //! @SYMTestPriority medium
2598 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2599 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2601 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
2602 <actiontype>Set</actiontype>
2605 <salt_len_bytes>20</salt_len_bytes>
2606 <iter_count>1024</iter_count>
2607 <cipher>ECipherAES_CBC_256</cipher>
2610 <input>ZYXWUTSR</input>
2614 <return>KErrNone</return>
2619 //! @SYMTestCaseID CIT_PREQ1054_02
2620 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2621 //! @SYMREQ CIT_PREQ1054
2622 //! @SYMTestPriority medium
2623 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2624 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2626 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
2627 <actiontype>Set</actiontype>
2630 <salt_len_bytes>20</salt_len_bytes>
2631 <iter_count>1024</iter_count>
2632 <cipher>ECipherAES_CBC_256</cipher>
2639 <return>KErrNone</return>
2643 ///////////////////////////////////////////////////////////////////////////////////
2644 ///////////////////////////////////////////////////////////////////////////////////
2645 ///////////////////////////////////////////////////////////////////////////////////
2648 //! @SYMTestCaseID CIT_PREQ1054_02
2649 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2650 //! @SYMREQ CIT_PREQ1054
2651 //! @SYMTestPriority medium
2652 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2653 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2655 <actionname>Element test case 1, ECipherAES_CBC_192</actionname>
2656 <actiontype>Element</actiontype>
2659 <salt_len_bytes>20</salt_len_bytes>
2660 <iter_count>1024</iter_count>
2661 <cipher>ECipherAES_CBC_192</cipher>
2663 <passwd>password</passwd>
2664 <input>This is what I want to encrypt</input>
2668 <return>KErrNone</return>
2673 //! @SYMTestCaseID CIT_PREQ1054_02
2674 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2675 //! @SYMREQ CIT_PREQ1054
2676 //! @SYMTestPriority medium
2677 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2678 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2680 <actionname>Element test case 2, ECipherAES_CBC_192</actionname>
2681 <actiontype>Element</actiontype>
2684 <salt_len_bytes>20</salt_len_bytes>
2685 <iter_count>1024</iter_count>
2686 <cipher>ECipherAES_CBC_192</cipher>
2688 <passwd>password</passwd>
2689 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2693 <return>KErrNone</return>
2698 //! @SYMTestCaseID CIT_PREQ1054_02
2699 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2700 //! @SYMREQ CIT_PREQ1054
2701 //! @SYMTestPriority medium
2702 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2703 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2705 <actionname>Element test case 3, ECipherAES_CBC_192</actionname>
2706 <actiontype>Element</actiontype>
2709 <salt_len_bytes>20</salt_len_bytes>
2710 <iter_count>1024</iter_count>
2711 <cipher>ECipherAES_CBC_192</cipher>
2713 <passwd>a90lkjasjk3lk32kdf89</passwd>
2714 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2718 <return>KErrNone</return>
2723 //! @SYMTestCaseID CIT_PREQ1054_02
2724 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2725 //! @SYMREQ CIT_PREQ1054
2726 //! @SYMTestPriority medium
2727 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2728 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2730 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
2731 <actiontype>Set</actiontype>
2734 <salt_len_bytes>20</salt_len_bytes>
2735 <iter_count>1024</iter_count>
2736 <cipher>ECipherAES_CBC_192</cipher>
2738 <passwd>a90lkjasjk3lk32kdf89</passwd>
2739 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2743 <return>KErrNone</return>
2748 //! @SYMTestCaseID CIT_PREQ1054_02
2749 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2750 //! @SYMREQ CIT_PREQ1054
2751 //! @SYMTestPriority medium
2752 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2753 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2755 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
2756 <actiontype>Set</actiontype>
2759 <salt_len_bytes>20</salt_len_bytes>
2760 <iter_count>1024</iter_count>
2761 <cipher>ECipherAES_CBC_192</cipher>
2763 <passwd>a90lkjasjk3lk32kdf89</passwd>
2768 <return>KErrNone</return>
2773 //! @SYMTestCaseID CIT_PREQ1054_02
2774 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2775 //! @SYMREQ CIT_PREQ1054
2776 //! @SYMTestPriority medium
2777 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2778 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2780 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
2781 <actiontype>Set</actiontype>
2784 <salt_len_bytes>20</salt_len_bytes>
2785 <iter_count>1024</iter_count>
2786 <cipher>ECipherAES_CBC_192</cipher>
2788 <passwd>a90lkjasjk3lk32kdf89</passwd>
2789 <input>ZYXWUTSR</input>
2793 <return>KErrNone</return>
2798 //! @SYMTestCaseID CIT_PREQ1054_02
2799 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2800 //! @SYMREQ CIT_PREQ1054
2801 //! @SYMTestPriority medium
2802 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2803 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2805 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
2806 <actiontype>Set</actiontype>
2809 <salt_len_bytes>20</salt_len_bytes>
2810 <iter_count>1024</iter_count>
2811 <cipher>ECipherAES_CBC_192</cipher>
2814 <input>ZYXWUTSR</input>
2818 <return>KErrNone</return>
2823 //! @SYMTestCaseID CIT_PREQ1054_02
2824 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2825 //! @SYMREQ CIT_PREQ1054
2826 //! @SYMTestPriority medium
2827 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2828 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2830 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
2831 <actiontype>Set</actiontype>
2834 <salt_len_bytes>20</salt_len_bytes>
2835 <iter_count>1024</iter_count>
2836 <cipher>ECipherAES_CBC_192</cipher>
2839 <input>ZYXWUTSR</input>
2843 <return>KErrNone</return>
2848 //! @SYMTestCaseID CIT_PREQ1054_02
2849 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2850 //! @SYMREQ CIT_PREQ1054
2851 //! @SYMTestPriority medium
2852 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2853 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2855 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
2856 <actiontype>Set</actiontype>
2859 <salt_len_bytes>20</salt_len_bytes>
2860 <iter_count>1024</iter_count>
2861 <cipher>ECipherAES_CBC_192</cipher>
2868 <return>KErrNone</return>
2872 ///////////////////////////////////////////////////////////////////////////////////
2873 ///////////////////////////////////////////////////////////////////////////////////
2874 ///////////////////////////////////////////////////////////////////////////////////
2878 //! @SYMTestCaseID CIT_PREQ1054_02
2879 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2880 //! @SYMREQ CIT_PREQ1054
2881 //! @SYMTestPriority medium
2882 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2883 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2885 <actionname>Element test case 1, ECipherAES_CBC_128</actionname>
2886 <actiontype>Element</actiontype>
2889 <salt_len_bytes>20</salt_len_bytes>
2890 <iter_count>1024</iter_count>
2891 <cipher>ECipherAES_CBC_128</cipher>
2893 <passwd>password</passwd>
2894 <input>This is what I want to encrypt</input>
2898 <return>KErrNone</return>
2903 //! @SYMTestCaseID CIT_PREQ1054_02
2904 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2905 //! @SYMREQ CIT_PREQ1054
2906 //! @SYMTestPriority medium
2907 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2908 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2910 <actionname>Element test case 2, ECipherAES_CBC_128</actionname>
2911 <actiontype>Element</actiontype>
2914 <salt_len_bytes>20</salt_len_bytes>
2915 <iter_count>1024</iter_count>
2916 <cipher>ECipherAES_CBC_128</cipher>
2918 <passwd>password</passwd>
2919 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2923 <return>KErrNone</return>
2928 //! @SYMTestCaseID CIT_PREQ1054_02
2929 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2930 //! @SYMREQ CIT_PREQ1054
2931 //! @SYMTestPriority medium
2932 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2933 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2935 <actionname>Element test case 3, ECipherAES_CBC_128</actionname>
2936 <actiontype>Element</actiontype>
2939 <salt_len_bytes>20</salt_len_bytes>
2940 <iter_count>1024</iter_count>
2941 <cipher>ECipherAES_CBC_128</cipher>
2943 <passwd>a90lkjasjk3lk32kdf89</passwd>
2944 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2948 <return>KErrNone</return>
2953 //! @SYMTestCaseID CIT_PREQ1054_02
2954 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2955 //! @SYMREQ CIT_PREQ1054
2956 //! @SYMTestPriority medium
2957 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2958 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2960 <actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
2961 <actiontype>Set</actiontype>
2964 <salt_len_bytes>20</salt_len_bytes>
2965 <iter_count>1024</iter_count>
2966 <cipher>ECipherAES_CBC_128</cipher>
2968 <passwd>a90lkjasjk3lk32kdf89</passwd>
2969 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
2973 <return>KErrNone</return>
2978 //! @SYMTestCaseID CIT_PREQ1054_02
2979 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
2980 //! @SYMREQ CIT_PREQ1054
2981 //! @SYMTestPriority medium
2982 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
2983 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
2985 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
2986 <actiontype>Set</actiontype>
2989 <salt_len_bytes>20</salt_len_bytes>
2990 <iter_count>1024</iter_count>
2991 <cipher>ECipherAES_CBC_128</cipher>
2993 <passwd>a90lkjasjk3lk32kdf89</passwd>
2998 <return>KErrNone</return>
3003 //! @SYMTestCaseID CIT_PREQ1054_02
3004 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3005 //! @SYMREQ CIT_PREQ1054
3006 //! @SYMTestPriority medium
3007 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3008 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3010 <actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
3011 <actiontype>Set</actiontype>
3014 <salt_len_bytes>20</salt_len_bytes>
3015 <iter_count>1024</iter_count>
3016 <cipher>ECipherAES_CBC_128</cipher>
3018 <passwd>a90lkjasjk3lk32kdf89</passwd>
3019 <input>ZYXWUTSR</input>
3023 <return>KErrNone</return>
3028 //! @SYMTestCaseID CIT_PREQ1054_02
3029 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3030 //! @SYMREQ CIT_PREQ1054
3031 //! @SYMTestPriority medium
3032 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3033 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3035 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
3036 <actiontype>Set</actiontype>
3039 <salt_len_bytes>20</salt_len_bytes>
3040 <iter_count>1024</iter_count>
3041 <cipher>ECipherAES_CBC_128</cipher>
3044 <input>ZYXWUTSR</input>
3048 <return>KErrNone</return>
3053 //! @SYMTestCaseID CIT_PREQ1054_02
3054 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3055 //! @SYMREQ CIT_PREQ1054
3056 //! @SYMTestPriority medium
3057 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3058 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3060 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
3061 <actiontype>Set</actiontype>
3064 <salt_len_bytes>20</salt_len_bytes>
3065 <iter_count>1024</iter_count>
3066 <cipher>ECipherAES_CBC_128</cipher>
3069 <input>ZYXWUTSR</input>
3073 <return>KErrNone</return>
3078 //! @SYMTestCaseID CIT_PREQ1054_02
3079 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3080 //! @SYMREQ CIT_PREQ1054
3081 //! @SYMTestPriority medium
3082 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3083 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3085 <actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
3086 <actiontype>Set</actiontype>
3089 <salt_len_bytes>20</salt_len_bytes>
3090 <iter_count>1024</iter_count>
3091 <cipher>ECipherAES_CBC_128</cipher>
3098 <return>KErrNone</return>
3101 ////////////////////////////////////////////////////////////////////
3102 // PKCS12 tests using PKCS#12 PBE algorithm with PKCS#12 KDF function.
3103 // ECipherRC2_CBC_128_16, ECipher3DES_CBC tests defined above.
3104 // "Set" tests are not supported for stream cipher ECipherARC4_40,ECipherARC4_128
3106 <actionname>Element test case 1, ECipherRC2_CBC_40_5</actionname>
3107 <actiontype>Element</actiontype>
3110 <salt_len_bytes>20</salt_len_bytes>
3111 <iter_count>1024</iter_count>
3112 <cipher>ECipherRC2_CBC_40_5</cipher>
3114 <passwd>a90lkjasjk3lk32kdf89</passwd>
3115 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
3119 <return>KErrNone</return>
3124 <actionname>Element test case 2, ECipherARC4_128</actionname>
3125 <actiontype>Element</actiontype>
3128 <salt_len_bytes>20</salt_len_bytes>
3129 <iter_count>1024</iter_count>
3130 <cipher>ECipherARC4_128</cipher>
3132 <passwd>a90lkjasjk3lk32kdf89</passwd>
3133 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
3137 <return>KErrNone</return>
3142 <actionname>Element test case 3, ECipherARC4_40</actionname>
3143 <actiontype>Element</actiontype>
3146 <salt_len_bytes>20</salt_len_bytes>
3147 <iter_count>1024</iter_count>
3148 <cipher>ECipherARC4_40</cipher>
3150 <passwd>a90lkjasjk3lk32kdf89</passwd>
3151 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
3155 <return>KErrNone</return>
3160 <actionname>Element test case 4, ECipher2Key3DES_CBC</actionname>
3161 <actiontype>Element</actiontype>
3164 <salt_len_bytes>20</salt_len_bytes>
3165 <iter_count>1024</iter_count>
3166 <cipher>ECipher2Key3DES_CBC</cipher>
3168 <passwd>a90lkjasjk3lk32kdf89</passwd>
3169 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
3173 <return>KErrNone</return>
3178 <actionname>Test of Set encryption, password changing, exporting importing Test 5, ECipherRC2_CBC_40_5</actionname>
3179 <actiontype>Set</actiontype>
3182 <salt_len_bytes>20</salt_len_bytes>
3183 <iter_count>1024</iter_count>
3184 <cipher>ECipherRC2_CBC_40_5</cipher>
3186 <passwd>a90lkjasjk3lk32kdf89</passwd>
3187 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
3191 <return>KErrNone</return>
3195 <actionname>Test of Set encryption, password changing, exporting importing Test 9, ECipher2Key3DES_CBC</actionname>
3196 <actiontype>Set</actiontype>
3199 <salt_len_bytes>20</salt_len_bytes>
3200 <iter_count>1024</iter_count>
3201 <cipher>ECipher2Key3DES_CBC</cipher>
3203 <passwd>a90lkjasjk3lk32kdf89</passwd>
3204 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
3208 <return>KErrNone</return>
3211 /////////////////////////////////////////
3213 // Run selected PKCS#12 tests in OOM
3216 //! @SYMTestCaseID CIT_PREQ1054_02
3217 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3218 //! @SYMREQ CIT_PREQ1054
3219 //! @SYMTestPriority medium
3220 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3221 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3223 <actionname>OOM start</actionname>
3224 <actiontype>startmemfailure</actiontype>
3225 <actionbody></actionbody>
3227 <return>KErrNone</return>
3232 //! @SYMTestCaseID CIT_PREQ1054_02
3233 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3234 //! @SYMREQ CIT_PREQ1054
3235 //! @SYMTestPriority medium
3236 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3237 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3239 <actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
3240 <actiontype>Element</actiontype>
3243 <salt_len_bytes>20</salt_len_bytes>
3244 <iter_count>1024</iter_count>
3245 <cipher>ECipherRC2_CBC_128_16</cipher>
3247 <passwd>password</passwd>
3248 <input>This is what I want to encrypt</input>
3252 <return>KErrNone</return>
3257 //! @SYMTestCaseID CIT_PREQ1054_02
3258 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3259 //! @SYMREQ CIT_PREQ1054
3260 //! @SYMTestPriority medium
3261 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3262 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3264 <actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
3265 <actiontype>Element</actiontype>
3268 <salt_len_bytes>20</salt_len_bytes>
3269 <iter_count>1024</iter_count>
3270 <cipher>ECipherRC2_CBC_40_16</cipher>
3272 <passwd>a90lkjasjk3lk32kdf89</passwd>
3273 <input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!</input>
3277 <return>KErrNone</return>
3282 //! @SYMTestCaseID CIT_PREQ1054_02
3283 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3284 //! @SYMREQ CIT_PREQ1054
3285 //! @SYMTestPriority medium
3286 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3287 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3289 <actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
3290 <actiontype>Set</actiontype>
3293 <salt_len_bytes>20</salt_len_bytes>
3294 <iter_count>1024</iter_count>
3295 <cipher>ECipherAES_CBC_128</cipher>
3297 <passwd>a90lkjasjk3lk32kdf89</passwd>
3302 <return>KErrNone</return>
3307 //! @SYMTestCaseID CIT_PREQ1054_02
3308 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
3309 //! @SYMREQ CIT_PREQ1054
3310 //! @SYMTestPriority medium
3311 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
3312 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
3314 <actionname>OOM end</actionname>
3315 <actiontype>stopmemfailure</actiontype>
3316 <actionbody></actionbody>
3318 <return>KErrNone</return>
3324 <actionname>Compatibility old PKCS#5</actionname>
3325 <actiontype>ExternPbeParams</actiontype>
3327 <orig-filename>c:\tpbe\pkcs5-orig.dat</orig-filename>
3328 <expected-cipher>2</expected-cipher>
3329 <expected-salt>53414c5434353637</expected-salt>
3330 <expected-iv>49563233343536373839616263646566</expected-iv>
3331 <expected-iter-count>1234</expected-iter-count>
3332 <expected-kdf>0</expected-kdf>
3335 <return>KErrNone</return>
3340 <actionname>Data compatibility orig PKCS#12</actionname>
3341 <actiontype>ExternPbeParams</actiontype>
3343 <orig-filename>c:\tpbe\pkcs12-first.dat</orig-filename>
3344 <expected-cipher>2</expected-cipher>
3345 <expected-salt>53414c5434353637</expected-salt>
3346 <expected-iv>49563233343536373839616263646566</expected-iv>
3347 <expected-iter-count>1234</expected-iter-count>
3348 <expected-kdf>1</expected-kdf>
3351 <return>KErrNone</return>