sl@0:
sl@0: // Copyright (C) 2005 - 2006 Symbian Ltd. All Rights Reserved
sl@0:
sl@0:
sl@0:
sl@0: Element test case 1 with explicit kdf, salt len and iterations, ECipherRC2_CBC_128_16
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0: PKCS#5
sl@0: 16
sl@0: 1000
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_128_16
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipherRC2_CBC_128_16
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_128_16
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0: PKCS#5
sl@0: 16
sl@0: 1000
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_40_16
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipherRC2_CBC_40_16
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_40_16
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_128
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipherRC2_CBC_128
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_128
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_40
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipherRC2_CBC_40
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_40
sl@0: Element
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: Element test case 1, ECipher3DES_CBC
sl@0: Element
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipher3DES_CBC
sl@0: Element
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipher3DES_CBC
sl@0: Element
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: ECipher3DES_CBC
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: Element test case 1, ECipherAES_CBC_256
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipherAES_CBC_256
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipherAES_CBC_256
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_256
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: Element test case 1, ECipherAES_CBC_192
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipherAES_CBC_192
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipherAES_CBC_192
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_192
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0:
sl@0: Element test case 1, ECipherAES_CBC_128
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipherAES_CBC_128
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipherAES_CBC_128
sl@0: Element
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: ECipherAES_CBC_128
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: // Start of Permanent File Store PBE testing between weak and strong crypto
sl@0:
sl@0: Write encrypted data to a PFS named according to crypto strength
sl@0: WritePFS
sl@0:
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: Decrypting weak crypto file
sl@0: ReadPFS
sl@0:
sl@0:
sl@0: weak
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: Decrypting strong crypto file
sl@0: ReadPFS
sl@0:
sl@0:
sl@0: strong
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: //Start of OOM testing
sl@0:
sl@0: OOM start
sl@0: startmemfailure
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2
sl@0: Element
sl@0:
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1
sl@0: Set
sl@0:
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: OOM end
sl@0: stopmemfailure
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: // =======================================================================
sl@0: // PKCS#12 tests
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_128_16
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 2, ECipherRC2_CBC_128_16
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_128_16
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#5 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0: PKCS#5
sl@0: 16
sl@0: 1000
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_40_16
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 2, ECipherRC2_CBC_40_16
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_40_16
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_128
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 2, ECipherRC2_CBC_128
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_128
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_40
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 2, ECipherRC2_CBC_40
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_40
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipher3DES_CBC
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 2, ECipher3DES_CBC
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipher3DES_CBC
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher3DES_CBC
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipherAES_CBC_256
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 2, ECipherAES_CBC_256
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipherAES_CBC_256
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_256
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipherAES_CBC_192
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 2, ECipherAES_CBC_192
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipherAES_CBC_192
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_192
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0: ///////////////////////////////////////////////////////////////////////////////////
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipherAES_CBC_128
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 2, ECipherAES_CBC_128
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: password
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipherAES_CBC_128
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: m
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0:
sl@0: ZYXWUTSR
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0: ////////////////////////////////////////////////////////////////////
sl@0: // PKCS12 tests using PKCS#12 PBE algorithm with PKCS#12 KDF function.
sl@0: // ECipherRC2_CBC_128_16, ECipher3DES_CBC tests defined above.
sl@0: // "Set" tests are not supported for stream cipher ECipherARC4_40,ECipherARC4_128
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_40_5
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_5
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 2, ECipherARC4_128
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherARC4_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 3, ECipherARC4_40
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherARC4_40
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Element test case 4, ECipher2Key3DES_CBC
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher2Key3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 5, ECipherRC2_CBC_40_5
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_5
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 9, ECipher2Key3DES_CBC
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipher2Key3DES_CBC
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0: /////////////////////////////////////////
sl@0:
sl@0: // Run selected PKCS#12 tests in OOM
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: OOM start
sl@0: startmemfailure
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 1, ECipherRC2_CBC_128_16
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_128_16
sl@0:
sl@0: password
sl@0: This is what I want to encrypt
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Element test case 3, ECipherRC2_CBC_40_16
sl@0: Element
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherRC2_CBC_40_16
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see!
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128
sl@0: Set
sl@0:
sl@0: PKCS#12
sl@0: 20
sl@0: 1024
sl@0: ECipherAES_CBC_128
sl@0:
sl@0: a90lkjasjk3lk32kdf89
sl@0: B
sl@0:
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: //! @SYMTestCaseID CIT_PREQ1054_02
sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
sl@0: //! @SYMREQ CIT_PREQ1054
sl@0: //! @SYMTestPriority medium
sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream.
sl@0:
sl@0: OOM end
sl@0: stopmemfailure
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Compatibility old PKCS#5
sl@0: ExternPbeParams
sl@0:
sl@0: c:\tpbe\pkcs5-orig.dat
sl@0: 2
sl@0: 53414c5434353637
sl@0: 49563233343536373839616263646566
sl@0: 1234
sl@0: 0
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0:
sl@0:
sl@0: Data compatibility orig PKCS#12
sl@0: ExternPbeParams
sl@0:
sl@0: c:\tpbe\pkcs12-first.dat
sl@0: 2
sl@0: 53414c5434353637
sl@0: 49563233343536373839616263646566
sl@0: 1234
sl@0: 1
sl@0:
sl@0:
sl@0: KErrNone
sl@0:
sl@0:
sl@0: