sl@0: sl@0: // Copyright (C) 2005 - 2006 Symbian Ltd. All Rights Reserved sl@0: sl@0: sl@0: sl@0: Element test case 1 with explicit kdf, salt len and iterations, ECipherRC2_CBC_128_16 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: PKCS#5 sl@0: 16 sl@0: 1000 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 1, ECipherRC2_CBC_128_16 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipherRC2_CBC_128_16 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipherRC2_CBC_128_16 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: PKCS#5 sl@0: 16 sl@0: 1000 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: Element test case 1, ECipherRC2_CBC_40_16 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipherRC2_CBC_40_16 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipherRC2_CBC_40_16 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: Element test case 1, ECipherRC2_CBC_128 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipherRC2_CBC_128 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipherRC2_CBC_128 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_128 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: Element test case 1, ECipherRC2_CBC_40 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipherRC2_CBC_40 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipherRC2_CBC_40 sl@0: Element sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: ECipherRC2_CBC_40 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: Element test case 1, ECipher3DES_CBC sl@0: Element sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipher3DES_CBC sl@0: Element sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipher3DES_CBC sl@0: Element sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC sl@0: Set sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC sl@0: Set sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC sl@0: Set sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC sl@0: Set sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC sl@0: Set sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC sl@0: Set sl@0: sl@0: ECipher3DES_CBC sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: Element test case 1, ECipherAES_CBC_256 sl@0: Element sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipherAES_CBC_256 sl@0: Element sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipherAES_CBC_256 sl@0: Element sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: ECipherAES_CBC_256 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: Element test case 1, ECipherAES_CBC_192 sl@0: Element sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipherAES_CBC_192 sl@0: Element sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipherAES_CBC_192 sl@0: Element sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: ECipherAES_CBC_192 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: sl@0: Element test case 1, ECipherAES_CBC_128 sl@0: Element sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipherAES_CBC_128 sl@0: Element sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipherAES_CBC_128 sl@0: Element sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: ECipherAES_CBC_128 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: // Start of Permanent File Store PBE testing between weak and strong crypto sl@0: sl@0: Write encrypted data to a PFS named according to crypto strength sl@0: WritePFS sl@0: sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: Decrypting weak crypto file sl@0: ReadPFS sl@0: sl@0: sl@0: weak sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: Decrypting strong crypto file sl@0: ReadPFS sl@0: sl@0: sl@0: strong sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: //Start of OOM testing sl@0: sl@0: OOM start sl@0: startmemfailure sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: Element test case 2 sl@0: Element sl@0: sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1 sl@0: Set sl@0: sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: OOM end sl@0: stopmemfailure sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: // ======================================================================= sl@0: // PKCS#12 tests sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipherRC2_CBC_128_16 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 2, ECipherRC2_CBC_128_16 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipherRC2_CBC_128_16 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#5 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: PKCS#5 sl@0: 16 sl@0: 1000 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipherRC2_CBC_40_16 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 2, ECipherRC2_CBC_40_16 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipherRC2_CBC_40_16 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipherRC2_CBC_128 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 2, ECipherRC2_CBC_128 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipherRC2_CBC_128 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipherRC2_CBC_40 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 2, ECipherRC2_CBC_40 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipherRC2_CBC_40 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipher3DES_CBC sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 2, ECipher3DES_CBC sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipher3DES_CBC sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher3DES_CBC sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipherAES_CBC_256 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 2, ECipherAES_CBC_256 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipherAES_CBC_256 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_256 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipherAES_CBC_192 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 2, ECipherAES_CBC_192 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipherAES_CBC_192 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_192 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: /////////////////////////////////////////////////////////////////////////////////// sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipherAES_CBC_128 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 2, ECipherAES_CBC_128 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: password sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipherAES_CBC_128 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: m sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: sl@0: ZYXWUTSR sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: //////////////////////////////////////////////////////////////////// sl@0: // PKCS12 tests using PKCS#12 PBE algorithm with PKCS#12 KDF function. sl@0: // ECipherRC2_CBC_128_16, ECipher3DES_CBC tests defined above. sl@0: // "Set" tests are not supported for stream cipher ECipherARC4_40,ECipherARC4_128 sl@0: sl@0: Element test case 1, ECipherRC2_CBC_40_5 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_5 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 2, ECipherARC4_128 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherARC4_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 3, ECipherARC4_40 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherARC4_40 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Element test case 4, ECipher2Key3DES_CBC sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher2Key3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 5, ECipherRC2_CBC_40_5 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_5 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 9, ECipher2Key3DES_CBC sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipher2Key3DES_CBC sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: ///////////////////////////////////////// sl@0: sl@0: // Run selected PKCS#12 tests in OOM sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: OOM start sl@0: startmemfailure sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 1, ECipherRC2_CBC_128_16 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_128_16 sl@0: sl@0: password sl@0: This is what I want to encrypt sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Element test case 3, ECipherRC2_CBC_40_16 sl@0: Element sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherRC2_CBC_40_16 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system. That was becoming a run-on sentence... phew. I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this. The plan is that it won't make a single iota of difference. But we'll see! sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128 sl@0: Set sl@0: sl@0: PKCS#12 sl@0: 20 sl@0: 1024 sl@0: ECipherAES_CBC_128 sl@0: sl@0: a90lkjasjk3lk32kdf89 sl@0: B sl@0: sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: //! @SYMTestCaseID CIT_PREQ1054_02 sl@0: //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF. sl@0: //! @SYMREQ CIT_PREQ1054 sl@0: //! @SYMTestPriority medium sl@0: //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key. sl@0: //! @SYMTestExpectedResults The generated key matches the expected byte stream. sl@0: sl@0: OOM end sl@0: stopmemfailure sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: sl@0: Compatibility old PKCS#5 sl@0: ExternPbeParams sl@0: sl@0: c:\tpbe\pkcs5-orig.dat sl@0: 2 sl@0: 53414c5434353637 sl@0: 49563233343536373839616263646566 sl@0: 1234 sl@0: 0 sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: sl@0: sl@0: Data compatibility orig PKCS#12 sl@0: ExternPbeParams sl@0: sl@0: c:\tpbe\pkcs12-first.dat sl@0: 2 sl@0: 53414c5434353637 sl@0: 49563233343536373839616263646566 sl@0: 1234 sl@0: 1 sl@0: sl@0: sl@0: KErrNone sl@0: sl@0: sl@0: