|
1 // Copyright (c) Symbian Software Ltd 2006 - 2007. All rights reserved. |
|
2 |
|
3 <action> |
|
4 <actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname> |
|
5 <actiontype>DeriveKey</actiontype> |
|
6 <actionbody> |
|
7 <derivekey> |
|
8 <passwd>password</passwd> |
|
9 <salt>1234567878563412</salt> |
|
10 <iterations>5</iterations> |
|
11 <key>D1DAA78615F287E6</key> |
|
12 </derivekey> |
|
13 </actionbody> |
|
14 <actionresult> |
|
15 <return>KErrNone</return> |
|
16 </actionresult> |
|
17 </action> |
|
18 <action> |
|
19 <actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname> |
|
20 <actiontype>DeriveKey</actiontype> |
|
21 <actionbody> |
|
22 <derivekey> |
|
23 <passwd>password</passwd> |
|
24 <salt>1234567878563412</salt> |
|
25 <iterations>100</iterations> |
|
26 <key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key> |
|
27 </derivekey> |
|
28 </actionbody> |
|
29 <actionresult> |
|
30 <return>KErrNone</return> |
|
31 </actionresult> |
|
32 </action> |
|
33 <action> |
|
34 <actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname> |
|
35 <actiontype>DeriveKey</actiontype> |
|
36 <actionbody> |
|
37 <derivekey> |
|
38 <passwd>password</passwd> |
|
39 <salt>1234567878563412</salt> |
|
40 <iterations>1000</iterations> |
|
41 <key>142F8FAFCE633CCD9265D90FC8FE4252</key> |
|
42 </derivekey> |
|
43 </actionbody> |
|
44 <actionresult> |
|
45 <return>KErrNone</return> |
|
46 </actionresult> |
|
47 </action> |
|
48 <action> |
|
49 <actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname> |
|
50 <actiontype>DeriveKey</actiontype> |
|
51 <actionbody> |
|
52 <derivekey> |
|
53 <passwd>password</passwd> |
|
54 <salt>1234567878563412</salt> |
|
55 <iterations>10000</iterations> |
|
56 <key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key> |
|
57 </derivekey> |
|
58 </actionbody> |
|
59 <actionresult> |
|
60 <return>KErrNone</return> |
|
61 </actionresult> |
|
62 </action> |
|
63 <action> |
|
64 <actionname>PKCS5 Key Derivation Test 5 -- 16 byte key, really long password vector generated from openssl</actionname> |
|
65 <actiontype>DeriveKey</actiontype> |
|
66 <actionbody> |
|
67 <derivekey> |
|
68 <passwd>This is an example of a really long really long password, I'm attempting to see how long we can make it and still see if our code will work. This really shouldn't be a problem</passwd> |
|
69 <salt>1234567878563412</salt> |
|
70 <iterations>1000</iterations> |
|
71 <key>A39EDFA35086746DE5B4792035D9A070</key> |
|
72 </derivekey> |
|
73 </actionbody> |
|
74 <actionresult> |
|
75 <return>KErrNone</return> |
|
76 </actionresult> |
|
77 </action> |
|
78 <action> |
|
79 <actionname>PKCS5 Key Derivation Test 6 -- 16 byte key, medium size password vector generated from openssl</actionname> |
|
80 <actiontype>DeriveKey</actiontype> |
|
81 <actionbody> |
|
82 <derivekey> |
|
83 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
84 <salt>1234567878563412</salt> |
|
85 <iterations>1000</iterations> |
|
86 <key>5F9219EED8BD0BCF5B3440B062305E05</key> |
|
87 </derivekey> |
|
88 </actionbody> |
|
89 <actionresult> |
|
90 <return>KErrNone</return> |
|
91 </actionresult> |
|
92 </action> |
|
93 <action> |
|
94 <actionname>PKCS5 Key Derivation Test 7 -- 32 byte key, long salt, short password vector generated from openssl</actionname> |
|
95 <actiontype>DeriveKey</actiontype> |
|
96 <actionbody> |
|
97 <derivekey> |
|
98 <passwd>password</passwd> |
|
99 <salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt> |
|
100 <iterations>1000</iterations> |
|
101 <key>5648F3832B18C6A85165B093627F2268CCE1E79DC2F85D3909C36356789B349D</key> |
|
102 </derivekey> |
|
103 </actionbody> |
|
104 <actionresult> |
|
105 <return>KErrNone</return> |
|
106 </actionresult> |
|
107 </action> |
|
108 <action> |
|
109 <actionname>PKCS5 Key Derivation Test 8 -- 32 byte key, long salt, long password vector generated from openssl</actionname> |
|
110 <actiontype>DeriveKey</actiontype> |
|
111 <actionbody> |
|
112 <derivekey> |
|
113 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
114 <salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt> |
|
115 <iterations>1000</iterations> |
|
116 <key>9F14D62760272D4388FA70E31C2B7940A083F0190C244F25F293D98D58766016</key> |
|
117 </derivekey> |
|
118 </actionbody> |
|
119 <actionresult> |
|
120 <return>KErrNone</return> |
|
121 </actionresult> |
|
122 </action> |
|
123 <action> |
|
124 <actionname>PKCS5 Key Derivation Test 9 -- 16 byte key, really long password vector generated from openssl</actionname> |
|
125 <actiontype>DeriveKey</actiontype> |
|
126 <actionbody> |
|
127 <derivekey> |
|
128 <passwd>Thisisanexampleofareallylongreallylongpassword,I'mattemptingtoseehowlongwecanmakeitandstillseeifourcodewillwork.Thisreallyshouldn'tbeaproblem</passwd> |
|
129 <salt>1234567878563412</salt> |
|
130 <iterations>1000</iterations> |
|
131 <key>529C96D62F54418DD6AD33724F3014D6</key> |
|
132 </derivekey> |
|
133 </actionbody> |
|
134 <actionresult> |
|
135 <return>KErrNone</return> |
|
136 </actionresult> |
|
137 </action> |
|
138 <action> |
|
139 <actionname>PKCS5 Key Derivation Test 10 -- 16 byte key, really long password vector generated from openssl</actionname> |
|
140 <actiontype>DeriveKey</actiontype> |
|
141 <actionbody> |
|
142 <derivekey> |
|
143 <passwd>ThisisanexampleofareallylongreallylongpasswordImattemptingtoseehowlongwecanmakeitandstillseeifourcodewillworkThisreallyshouldntbeaproblem</passwd> |
|
144 <salt>1234567878563412</salt> |
|
145 <iterations>1000</iterations> |
|
146 <key>E493D7C57BD77047C9D709DF99CBD3C7</key> |
|
147 </derivekey> |
|
148 </actionbody> |
|
149 <actionresult> |
|
150 <return>KErrNone</return> |
|
151 </actionresult> |
|
152 </action> |
|
153 <action> |
|
154 <actionname>PKCS5 Key Derivation Test 11 -- 16 byte key, really long password vector generated from openssl</actionname> |
|
155 <actiontype>DeriveKey</actiontype> |
|
156 <actionbody> |
|
157 <derivekey> |
|
158 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
159 <salt>1234567878563412</salt> |
|
160 <iterations>1000</iterations> |
|
161 <key>EBD56BEE980D41A38AFA53642AAE4B25</key> |
|
162 </derivekey> |
|
163 </actionbody> |
|
164 <actionresult> |
|
165 <return>KErrNone</return> |
|
166 </actionresult> |
|
167 </action> |
|
168 <action> |
|
169 <actionname>PKCS5 Key Derivation Test 12 -- 32 byte key, really long password vector generated from openssl</actionname> |
|
170 <actiontype>DeriveKey</actiontype> |
|
171 <actionbody> |
|
172 <derivekey> |
|
173 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
174 <salt>1234567878563412</salt> |
|
175 <iterations>1000</iterations> |
|
176 <key>EBD56BEE980D41A38AFA53642AAE4B251FF9C2A1503B2EF65F28E59DEF906A60</key> |
|
177 </derivekey> |
|
178 </actionbody> |
|
179 <actionresult> |
|
180 <return>KErrNone</return> |
|
181 </actionresult> |
|
182 </action> |
|
183 <action> |
|
184 <actionname>PKCS5 Key Derivation Test 13 -- 32 byte key, long password vector generated from openssl</actionname> |
|
185 <actiontype>DeriveKey</actiontype> |
|
186 <actionbody> |
|
187 <derivekey> |
|
188 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
189 <salt>1234567878563412</salt> |
|
190 <iterations>1000</iterations> |
|
191 <key>1FFB655FEEC4202B0466BF24AA9800D0A96BFA7F904D655253CE2E32B0B7B795</key> |
|
192 </derivekey> |
|
193 </actionbody> |
|
194 <actionresult> |
|
195 <return>KErrNone</return> |
|
196 </actionresult> |
|
197 </action> |
|
198 <action> |
|
199 <actionname>PKCS5 Key Derivation Test 14 -- 32 byte key, long password vector generated from openssl</actionname> |
|
200 <actiontype>DeriveKey</actiontype> |
|
201 <actionbody> |
|
202 <derivekey> |
|
203 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
204 <salt>1234567878563412</salt> |
|
205 <iterations>1000</iterations> |
|
206 <key>A544F0E2F88507E44F92CA2DCAC8B67C0E0D780182CF7DDC18AB1CA9BB3C2904</key> |
|
207 </derivekey> |
|
208 </actionbody> |
|
209 <actionresult> |
|
210 <return>KErrNone</return> |
|
211 </actionresult> |
|
212 </action> |
|
213 <action> |
|
214 <actionname>PKCS5 Key Derivation Test 15 -- 32 byte key, medium length password vector generated from openssl</actionname> |
|
215 <actiontype>DeriveKey</actiontype> |
|
216 <actionbody> |
|
217 <derivekey> |
|
218 <passwd>passwordpasswordpasswordpasswordpasswordpassword</passwd> |
|
219 <salt>1234567878563412</salt> |
|
220 <iterations>1000</iterations> |
|
221 <key>F1DC1A4224F0C9A4655FFDB7D5BE75060BFFD0B682293A5D2E61BD5A773B81BC</key> |
|
222 </derivekey> |
|
223 </actionbody> |
|
224 <actionresult> |
|
225 <return>KErrNone</return> |
|
226 </actionresult> |
|
227 </action> |
|
228 <action> |
|
229 <actionname>PKCS5 Key Derivation Test 16 -- 32 byte key, long password vector generated from openssl</actionname> |
|
230 <actiontype>DeriveKey</actiontype> |
|
231 <actionbody> |
|
232 <derivekey> |
|
233 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
234 <salt>1234567878563412</salt> |
|
235 <iterations>1000</iterations> |
|
236 <key>798B6F4DA56ECDA25C82A63F3577C3FF97A3A2A92BE3DD810C47704916890615</key> |
|
237 </derivekey> |
|
238 </actionbody> |
|
239 <actionresult> |
|
240 <return>KErrNone</return> |
|
241 </actionresult> |
|
242 </action> |
|
243 <action> |
|
244 <actionname>PKCS5 Key Derivation Test 17 -- 32 byte key, long password vector generated from openssl</actionname> |
|
245 <actiontype>DeriveKey</actiontype> |
|
246 <actionbody> |
|
247 <derivekey> |
|
248 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
249 <salt>1234567878563412</salt> |
|
250 <iterations>1000</iterations> |
|
251 <key>5F9219EED8BD0BCF5B3440B062305E052CE70AEBC9A43CE9F4F39E3D0E56603D</key> |
|
252 </derivekey> |
|
253 </actionbody> |
|
254 <actionresult> |
|
255 <return>KErrNone</return> |
|
256 </actionresult> |
|
257 </action> |
|
258 <action> |
|
259 <actionname>PKCS5 Key Derivation Test 18 -- 32 byte key, long password vector generated from openssl</actionname> |
|
260 <actiontype>DeriveKey</actiontype> |
|
261 <actionbody> |
|
262 <derivekey> |
|
263 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd> |
|
264 <salt>1234567878563412</salt> |
|
265 <iterations>1000</iterations> |
|
266 <key>421B82FF5825F9BE0E580C4D07BFF0CF54FFFD1BAD7763BF483A8291359F60E6</key> |
|
267 </derivekey> |
|
268 </actionbody> |
|
269 <actionresult> |
|
270 <return>KErrNone</return> |
|
271 </actionresult> |
|
272 </action> |
|
273 <action> |
|
274 <actionname>PKCS5 Key Derivation Test 19 -- 32 byte key, 65 byte password to test the fix in the CHMAC::Init code vector generated from openssl</actionname> |
|
275 <actiontype>DeriveKey</actiontype> |
|
276 <actionbody> |
|
277 <derivekey> |
|
278 <passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordp</passwd> |
|
279 <salt>1234567878563412</salt> |
|
280 <iterations>1000</iterations> |
|
281 <key>5D0AAB5A6A7BCD6F5376DF142E7FEAC98728F4F1322091138300A95DB5EBDE72</key> |
|
282 </derivekey> |
|
283 </actionbody> |
|
284 <actionresult> |
|
285 <return>KErrNone</return> |
|
286 </actionresult> |
|
287 </action> |
|
288 <action> |
|
289 <actionname>PKCS5 Key Derivation Test 20 -- 32 byte key, password with spaces vector generated from openssl</actionname> |
|
290 <actiontype>DeriveKey</actiontype> |
|
291 <actionbody> |
|
292 <derivekey> |
|
293 <passwd>password password password password password password password passwordp</passwd> |
|
294 <salt>1234567878563412</salt> |
|
295 <iterations>1000</iterations> |
|
296 <key>EE99202289798A02DC6EAEB81A501C43AE3F8513B8F9ECC62FFBF3D0F70EF444</key> |
|
297 </derivekey> |
|
298 </actionbody> |
|
299 <actionresult> |
|
300 <return>KErrNone</return> |
|
301 </actionresult> |
|
302 </action> |
|
303 <action> |
|
304 <actionname>PKCS5 Key Derivation Test 21 -- 1 byte key vector generated from openssl</actionname> |
|
305 <actiontype>DeriveKey</actiontype> |
|
306 <actionbody> |
|
307 <derivekey> |
|
308 <passwd>password</passwd> |
|
309 <salt>1234567878563412</salt> |
|
310 <iterations>10000</iterations> |
|
311 <key>66</key> |
|
312 </derivekey> |
|
313 </actionbody> |
|
314 <actionresult> |
|
315 <return>KErrNone</return> |
|
316 </actionresult> |
|
317 </action> |
|
318 <action> |
|
319 <actionname>PKCS5 Key Derivation Test 22 -- 128 byte key vector generated from openssl</actionname> |
|
320 <actiontype>DeriveKey</actiontype> |
|
321 <actionbody> |
|
322 <derivekey> |
|
323 <passwd>password</passwd> |
|
324 <salt>1234567878563412</salt> |
|
325 <iterations>10000</iterations> |
|
326 <key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584E6FCB5C7636C3A04DA7F38778BE00C842A5A202578408C27FA08A3A7AACDF7A7B3F9763A33DDDCD09B3E07FA95106B07892F6981AA450447E106BCA8252B1532</key> |
|
327 </derivekey> |
|
328 </actionbody> |
|
329 <actionresult> |
|
330 <return>KErrNone</return> |
|
331 </actionresult> |
|
332 </action> |
|
333 <action> |
|
334 <actionname>PKCS5 Key Derivation Test 23 -- 160 (multiple of hash size) byte key vector generated from openssl</actionname> |
|
335 <actiontype>DeriveKey</actiontype> |
|
336 <actionbody> |
|
337 <derivekey> |
|
338 <passwd>alkiasdk29s.382{</passwd> |
|
339 <salt>1234567878563412</salt> |
|
340 <iterations>30000</iterations> |
|
341 <key>62E18995350965CF1E02F111ADBEE270FBBAE6A2D8C6B94D24F1E4E41B04FE40C1C7CE7E768092362A75F220601AAF3FBBE339F33D97CA0443D8DD795B88BF97F9A41561A80D20659486459995CA559D5C37792C608CF279E880142319D333D17C62C35C65E9D2A50E0F4010E2D475ECB179A41366D62617BB48B13FA3A98E3FA0F76236442E324B39EDD1B9AB253A1D6A6A6462E3330B548BC4DAE4CD060FC6</key> |
|
342 </derivekey> |
|
343 </actionbody> |
|
344 <actionresult> |
|
345 <return>KErrNone</return> |
|
346 </actionresult> |
|
347 </action> |
|
348 <action> |
|
349 <actionname>PKCS5 Key Derivation Test 24 -- 8 byte key vector generated from openssl</actionname> |
|
350 <actiontype>DeriveKey</actiontype> |
|
351 <actionbody> |
|
352 <derivekey> |
|
353 <passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd> |
|
354 <salt>1234567878563412</salt> |
|
355 <iterations>1000</iterations> |
|
356 <key>F104F4B53A4A160F</key> |
|
357 </derivekey> |
|
358 </actionbody> |
|
359 <actionresult> |
|
360 <return>KErrNone</return> |
|
361 </actionresult> |
|
362 </action> |
|
363 <action> |
|
364 <actionname>PKCS5 Key Derivation Test 25 -- 256 byte key vector generated from openssl</actionname> |
|
365 <actiontype>DeriveKey</actiontype> |
|
366 <actionbody> |
|
367 <derivekey> |
|
368 <passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd> |
|
369 <salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt> |
|
370 <iterations>10000</iterations> |
|
371 <key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key> |
|
372 </derivekey> |
|
373 </actionbody> |
|
374 <actionresult> |
|
375 <return>KErrNone</return> |
|
376 </actionresult> |
|
377 </action> |
|
378 // Out of Memory tests follow |
|
379 <action> |
|
380 <actionname>OOM Start</actionname> |
|
381 <actiontype>startmemfailure</actiontype> |
|
382 <actionbody></actionbody> |
|
383 <actionresult> |
|
384 <return>KErrNone</return> |
|
385 </actionresult> |
|
386 </action> |
|
387 <action> |
|
388 <actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname> |
|
389 <actiontype>DeriveKey</actiontype> |
|
390 <actionbody> |
|
391 <derivekey> |
|
392 <passwd>password</passwd> |
|
393 <salt>1234567878563412</salt> |
|
394 <iterations>5</iterations> |
|
395 <key>D1DAA78615F287E6</key> |
|
396 </derivekey> |
|
397 </actionbody> |
|
398 <actionresult> |
|
399 <return>KErrNone</return> |
|
400 </actionresult> |
|
401 </action> |
|
402 <action> |
|
403 <actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname> |
|
404 <actiontype>DeriveKey</actiontype> |
|
405 <actionbody> |
|
406 <derivekey> |
|
407 <passwd>password</passwd> |
|
408 <salt>1234567878563412</salt> |
|
409 <iterations>100</iterations> |
|
410 <key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key> |
|
411 </derivekey> |
|
412 </actionbody> |
|
413 <actionresult> |
|
414 <return>KErrNone</return> |
|
415 </actionresult> |
|
416 </action> |
|
417 <action> |
|
418 <actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname> |
|
419 <actiontype>DeriveKey</actiontype> |
|
420 <actionbody> |
|
421 <derivekey> |
|
422 <passwd>password</passwd> |
|
423 <salt>1234567878563412</salt> |
|
424 <iterations>1000</iterations> |
|
425 <key>142F8FAFCE633CCD9265D90FC8FE4252</key> |
|
426 </derivekey> |
|
427 </actionbody> |
|
428 <actionresult> |
|
429 <return>KErrNone</return> |
|
430 </actionresult> |
|
431 </action> |
|
432 <action> |
|
433 <actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname> |
|
434 <actiontype>DeriveKey</actiontype> |
|
435 <actionbody> |
|
436 <derivekey> |
|
437 <passwd>password</passwd> |
|
438 <salt>1234567878563412</salt> |
|
439 <iterations>10000</iterations> |
|
440 <key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key> |
|
441 </derivekey> |
|
442 </actionbody> |
|
443 <actionresult> |
|
444 <return>KErrNone</return> |
|
445 </actionresult> |
|
446 </action> |
|
447 <action> |
|
448 <actionname>PKCS5 Key Derivation Test 5 -- leave from performAction other than KErrNoMemory</actionname> |
|
449 <actiontype>DeriveKey</actiontype> |
|
450 <actionbody> |
|
451 <derivekey> |
|
452 <passwd>password</passwd> |
|
453 <salt>1234567878563412</salt> |
|
454 <iterations>10000</iterations> |
|
455 <key>66</key> |
|
456 <leaveinperformaction>1</leaveinperformaction> |
|
457 </derivekey> |
|
458 <knowndefect>ETrue</knowndefect> |
|
459 </actionbody> |
|
460 <actionresult> |
|
461 <return>KErrNone</return> |
|
462 </actionresult> |
|
463 </action> |
|
464 <action> |
|
465 <actionname>OOM End</actionname> |
|
466 <actiontype>stopmemfailure</actiontype> |
|
467 <actionbody></actionbody> |
|
468 <actionresult> |
|
469 <return>KErrNone</return> |
|
470 </actionresult> |
|
471 </action> |
|
472 //End of out of memory tests |
|
473 |
|
474 // ===================================================================== |
|
475 // PKCS#12 tests |
|
476 |
|
477 <action> |
|
478 <actionname>OOM Start</actionname> |
|
479 <actiontype>startmemfailure</actiontype> |
|
480 <actionbody></actionbody> |
|
481 <actionresult> |
|
482 <return>KErrNone</return> |
|
483 </actionresult> |
|
484 </action> |
|
485 |
|
486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
488 //! @SYMREQ CIT_PREQ1054 |
|
489 //! @SYMTestPriority medium |
|
490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
492 <action> |
|
493 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
494 <actiontype>DeriveKey</actiontype> |
|
495 <actionbody> |
|
496 <derivekey> |
|
497 <kdf>pkcs#12</kdf> |
|
498 <passwd>0000</passwd> |
|
499 <salt>53414C54</salt> |
|
500 <iterations>1</iterations> |
|
501 <key>3037AFC8EA</key> |
|
502 </derivekey> |
|
503 </actionbody> |
|
504 </action> |
|
505 |
|
506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
508 //! @SYMREQ CIT_PREQ1054 |
|
509 //! @SYMTestPriority medium |
|
510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
512 <action> |
|
513 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
514 <actiontype>DeriveKey</actiontype> |
|
515 <actionbody> |
|
516 <derivekey> |
|
517 <kdf>pkcs#12</kdf> |
|
518 <passwd>0001</passwd> |
|
519 <salt>53414C54</salt> |
|
520 <iterations>1</iterations> |
|
521 <key>37F44080CB</key> |
|
522 </derivekey> |
|
523 </actionbody> |
|
524 </action> |
|
525 |
|
526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
528 //! @SYMREQ CIT_PREQ1054 |
|
529 //! @SYMTestPriority medium |
|
530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
532 <action> |
|
533 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
534 <actiontype>DeriveKey</actiontype> |
|
535 <actionbody> |
|
536 <derivekey> |
|
537 <kdf>pkcs#12</kdf> |
|
538 <passwd>PSWD</passwd> |
|
539 <salt>53414C54</salt> |
|
540 <iterations>1</iterations> |
|
541 <key>8A18939ACF</key> |
|
542 </derivekey> |
|
543 </actionbody> |
|
544 </action> |
|
545 |
|
546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
548 //! @SYMREQ CIT_PREQ1054 |
|
549 //! @SYMTestPriority medium |
|
550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
552 <action> |
|
553 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
554 <actiontype>DeriveKey</actiontype> |
|
555 <actionbody> |
|
556 <derivekey> |
|
557 <kdf>pkcs#12</kdf> |
|
558 <passwd>password</passwd> |
|
559 <salt>53414C54</salt> |
|
560 <iterations>1</iterations> |
|
561 <key>AFF6C5EDE0</key> |
|
562 </derivekey> |
|
563 </actionbody> |
|
564 </action> |
|
565 |
|
566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
568 //! @SYMREQ CIT_PREQ1054 |
|
569 //! @SYMTestPriority medium |
|
570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
572 <action> |
|
573 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
574 <actiontype>DeriveKey</actiontype> |
|
575 <actionbody> |
|
576 <derivekey> |
|
577 <kdf>pkcs#12</kdf> |
|
578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
579 <salt>53414C54</salt> |
|
580 <iterations>1</iterations> |
|
581 <key>2ED53BB2CE</key> |
|
582 </derivekey> |
|
583 </actionbody> |
|
584 </action> |
|
585 |
|
586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
588 //! @SYMREQ CIT_PREQ1054 |
|
589 //! @SYMTestPriority medium |
|
590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
592 <action> |
|
593 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
594 <actiontype>DeriveKey</actiontype> |
|
595 <actionbody> |
|
596 <derivekey> |
|
597 <kdf>pkcs#12</kdf> |
|
598 <passwd>0000</passwd> |
|
599 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
600 <iterations>1</iterations> |
|
601 <key>49CABE7B67</key> |
|
602 </derivekey> |
|
603 </actionbody> |
|
604 </action> |
|
605 |
|
606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
608 //! @SYMREQ CIT_PREQ1054 |
|
609 //! @SYMTestPriority medium |
|
610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
612 <action> |
|
613 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
614 <actiontype>DeriveKey</actiontype> |
|
615 <actionbody> |
|
616 <derivekey> |
|
617 <kdf>pkcs#12</kdf> |
|
618 <passwd>0001</passwd> |
|
619 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
620 <iterations>1</iterations> |
|
621 <key>F994B990D3</key> |
|
622 </derivekey> |
|
623 </actionbody> |
|
624 </action> |
|
625 |
|
626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
628 //! @SYMREQ CIT_PREQ1054 |
|
629 //! @SYMTestPriority medium |
|
630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
632 <action> |
|
633 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
634 <actiontype>DeriveKey</actiontype> |
|
635 <actionbody> |
|
636 <derivekey> |
|
637 <kdf>pkcs#12</kdf> |
|
638 <passwd>PSWD</passwd> |
|
639 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
640 <iterations>1</iterations> |
|
641 <key>1AFAAD7E51</key> |
|
642 </derivekey> |
|
643 </actionbody> |
|
644 </action> |
|
645 |
|
646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
648 //! @SYMREQ CIT_PREQ1054 |
|
649 //! @SYMTestPriority medium |
|
650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
652 <action> |
|
653 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
654 <actiontype>DeriveKey</actiontype> |
|
655 <actionbody> |
|
656 <derivekey> |
|
657 <kdf>pkcs#12</kdf> |
|
658 <passwd>password</passwd> |
|
659 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
660 <iterations>1</iterations> |
|
661 <key>878C91098D</key> |
|
662 </derivekey> |
|
663 </actionbody> |
|
664 </action> |
|
665 |
|
666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
668 //! @SYMREQ CIT_PREQ1054 |
|
669 //! @SYMTestPriority medium |
|
670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
672 <action> |
|
673 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
674 <actiontype>DeriveKey</actiontype> |
|
675 <actionbody> |
|
676 <derivekey> |
|
677 <kdf>pkcs#12</kdf> |
|
678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
679 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
680 <iterations>1</iterations> |
|
681 <key>0DE3F08CAF</key> |
|
682 </derivekey> |
|
683 </actionbody> |
|
684 </action> |
|
685 |
|
686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
688 //! @SYMREQ CIT_PREQ1054 |
|
689 //! @SYMTestPriority medium |
|
690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
692 <action> |
|
693 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
694 <actiontype>DeriveKey</actiontype> |
|
695 <actionbody> |
|
696 <derivekey> |
|
697 <kdf>pkcs#12</kdf> |
|
698 <passwd>0000</passwd> |
|
699 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
700 <iterations>1</iterations> |
|
701 <key>90253A49C0</key> |
|
702 </derivekey> |
|
703 </actionbody> |
|
704 </action> |
|
705 |
|
706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
708 //! @SYMREQ CIT_PREQ1054 |
|
709 //! @SYMTestPriority medium |
|
710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
712 <action> |
|
713 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
714 <actiontype>DeriveKey</actiontype> |
|
715 <actionbody> |
|
716 <derivekey> |
|
717 <kdf>pkcs#12</kdf> |
|
718 <passwd>0001</passwd> |
|
719 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
720 <iterations>1</iterations> |
|
721 <key>40BE97AB93</key> |
|
722 </derivekey> |
|
723 </actionbody> |
|
724 </action> |
|
725 |
|
726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
728 //! @SYMREQ CIT_PREQ1054 |
|
729 //! @SYMTestPriority medium |
|
730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
732 <action> |
|
733 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
734 <actiontype>DeriveKey</actiontype> |
|
735 <actionbody> |
|
736 <derivekey> |
|
737 <kdf>pkcs#12</kdf> |
|
738 <passwd>PSWD</passwd> |
|
739 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
740 <iterations>1</iterations> |
|
741 <key>A64B43E14E</key> |
|
742 </derivekey> |
|
743 </actionbody> |
|
744 </action> |
|
745 |
|
746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
748 //! @SYMREQ CIT_PREQ1054 |
|
749 //! @SYMTestPriority medium |
|
750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
752 <action> |
|
753 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
754 <actiontype>DeriveKey</actiontype> |
|
755 <actionbody> |
|
756 <derivekey> |
|
757 <kdf>pkcs#12</kdf> |
|
758 <passwd>password</passwd> |
|
759 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
760 <iterations>1</iterations> |
|
761 <key>E323D5F588</key> |
|
762 </derivekey> |
|
763 </actionbody> |
|
764 </action> |
|
765 |
|
766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
768 //! @SYMREQ CIT_PREQ1054 |
|
769 //! @SYMTestPriority medium |
|
770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
772 <action> |
|
773 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
774 <actiontype>DeriveKey</actiontype> |
|
775 <actionbody> |
|
776 <derivekey> |
|
777 <kdf>pkcs#12</kdf> |
|
778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
779 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
780 <iterations>1</iterations> |
|
781 <key>27476572AF</key> |
|
782 </derivekey> |
|
783 </actionbody> |
|
784 </action> |
|
785 |
|
786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
788 //! @SYMREQ CIT_PREQ1054 |
|
789 //! @SYMTestPriority medium |
|
790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
792 <action> |
|
793 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
794 <actiontype>DeriveKey</actiontype> |
|
795 <actionbody> |
|
796 <derivekey> |
|
797 <kdf>pkcs#12</kdf> |
|
798 <passwd>0000</passwd> |
|
799 <salt>53414C54</salt> |
|
800 <iterations>2</iterations> |
|
801 <key>A1D9010A67</key> |
|
802 </derivekey> |
|
803 </actionbody> |
|
804 </action> |
|
805 |
|
806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
808 //! @SYMREQ CIT_PREQ1054 |
|
809 //! @SYMTestPriority medium |
|
810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
812 <action> |
|
813 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
814 <actiontype>DeriveKey</actiontype> |
|
815 <actionbody> |
|
816 <derivekey> |
|
817 <kdf>pkcs#12</kdf> |
|
818 <passwd>0001</passwd> |
|
819 <salt>53414C54</salt> |
|
820 <iterations>2</iterations> |
|
821 <key>17E4E1F15B</key> |
|
822 </derivekey> |
|
823 </actionbody> |
|
824 </action> |
|
825 |
|
826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
828 //! @SYMREQ CIT_PREQ1054 |
|
829 //! @SYMTestPriority medium |
|
830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
832 <action> |
|
833 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
834 <actiontype>DeriveKey</actiontype> |
|
835 <actionbody> |
|
836 <derivekey> |
|
837 <kdf>pkcs#12</kdf> |
|
838 <passwd>PSWD</passwd> |
|
839 <salt>53414C54</salt> |
|
840 <iterations>2</iterations> |
|
841 <key>D1B71808FC</key> |
|
842 </derivekey> |
|
843 </actionbody> |
|
844 </action> |
|
845 |
|
846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
848 //! @SYMREQ CIT_PREQ1054 |
|
849 //! @SYMTestPriority medium |
|
850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
852 <action> |
|
853 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
854 <actiontype>DeriveKey</actiontype> |
|
855 <actionbody> |
|
856 <derivekey> |
|
857 <kdf>pkcs#12</kdf> |
|
858 <passwd>password</passwd> |
|
859 <salt>53414C54</salt> |
|
860 <iterations>2</iterations> |
|
861 <key>EE7E4073F2</key> |
|
862 </derivekey> |
|
863 </actionbody> |
|
864 </action> |
|
865 |
|
866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
868 //! @SYMREQ CIT_PREQ1054 |
|
869 //! @SYMTestPriority medium |
|
870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
872 <action> |
|
873 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
874 <actiontype>DeriveKey</actiontype> |
|
875 <actionbody> |
|
876 <derivekey> |
|
877 <kdf>pkcs#12</kdf> |
|
878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
879 <salt>53414C54</salt> |
|
880 <iterations>2</iterations> |
|
881 <key>5BF185C726</key> |
|
882 </derivekey> |
|
883 </actionbody> |
|
884 </action> |
|
885 |
|
886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
888 //! @SYMREQ CIT_PREQ1054 |
|
889 //! @SYMTestPriority medium |
|
890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
892 <action> |
|
893 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
894 <actiontype>DeriveKey</actiontype> |
|
895 <actionbody> |
|
896 <derivekey> |
|
897 <kdf>pkcs#12</kdf> |
|
898 <passwd>0000</passwd> |
|
899 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
900 <iterations>2</iterations> |
|
901 <key>72ADF5E041</key> |
|
902 </derivekey> |
|
903 </actionbody> |
|
904 </action> |
|
905 |
|
906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
908 //! @SYMREQ CIT_PREQ1054 |
|
909 //! @SYMTestPriority medium |
|
910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
912 <action> |
|
913 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
914 <actiontype>DeriveKey</actiontype> |
|
915 <actionbody> |
|
916 <derivekey> |
|
917 <kdf>pkcs#12</kdf> |
|
918 <passwd>0001</passwd> |
|
919 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
920 <iterations>2</iterations> |
|
921 <key>63E6DF459C</key> |
|
922 </derivekey> |
|
923 </actionbody> |
|
924 </action> |
|
925 |
|
926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
928 //! @SYMREQ CIT_PREQ1054 |
|
929 //! @SYMTestPriority medium |
|
930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
932 <action> |
|
933 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
934 <actiontype>DeriveKey</actiontype> |
|
935 <actionbody> |
|
936 <derivekey> |
|
937 <kdf>pkcs#12</kdf> |
|
938 <passwd>PSWD</passwd> |
|
939 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
940 <iterations>2</iterations> |
|
941 <key>C2099204AB</key> |
|
942 </derivekey> |
|
943 </actionbody> |
|
944 </action> |
|
945 |
|
946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
948 //! @SYMREQ CIT_PREQ1054 |
|
949 //! @SYMTestPriority medium |
|
950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
952 <action> |
|
953 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
954 <actiontype>DeriveKey</actiontype> |
|
955 <actionbody> |
|
956 <derivekey> |
|
957 <kdf>pkcs#12</kdf> |
|
958 <passwd>password</passwd> |
|
959 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
960 <iterations>2</iterations> |
|
961 <key>3204D28A32</key> |
|
962 </derivekey> |
|
963 </actionbody> |
|
964 </action> |
|
965 |
|
966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
968 //! @SYMREQ CIT_PREQ1054 |
|
969 //! @SYMTestPriority medium |
|
970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
972 <action> |
|
973 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
974 <actiontype>DeriveKey</actiontype> |
|
975 <actionbody> |
|
976 <derivekey> |
|
977 <kdf>pkcs#12</kdf> |
|
978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
979 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
980 <iterations>2</iterations> |
|
981 <key>FB845F70A4</key> |
|
982 </derivekey> |
|
983 </actionbody> |
|
984 </action> |
|
985 |
|
986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
988 //! @SYMREQ CIT_PREQ1054 |
|
989 //! @SYMTestPriority medium |
|
990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
992 <action> |
|
993 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
994 <actiontype>DeriveKey</actiontype> |
|
995 <actionbody> |
|
996 <derivekey> |
|
997 <kdf>pkcs#12</kdf> |
|
998 <passwd>0000</passwd> |
|
999 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1000 <iterations>2</iterations> |
|
1001 <key>B9230EEC1D</key> |
|
1002 </derivekey> |
|
1003 </actionbody> |
|
1004 </action> |
|
1005 |
|
1006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1008 //! @SYMREQ CIT_PREQ1054 |
|
1009 //! @SYMTestPriority medium |
|
1010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1012 <action> |
|
1013 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1014 <actiontype>DeriveKey</actiontype> |
|
1015 <actionbody> |
|
1016 <derivekey> |
|
1017 <kdf>pkcs#12</kdf> |
|
1018 <passwd>0001</passwd> |
|
1019 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1020 <iterations>2</iterations> |
|
1021 <key>462B0F2D1B</key> |
|
1022 </derivekey> |
|
1023 </actionbody> |
|
1024 </action> |
|
1025 |
|
1026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1028 //! @SYMREQ CIT_PREQ1054 |
|
1029 //! @SYMTestPriority medium |
|
1030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1032 <action> |
|
1033 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1034 <actiontype>DeriveKey</actiontype> |
|
1035 <actionbody> |
|
1036 <derivekey> |
|
1037 <kdf>pkcs#12</kdf> |
|
1038 <passwd>PSWD</passwd> |
|
1039 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1040 <iterations>2</iterations> |
|
1041 <key>05B66EF1BB</key> |
|
1042 </derivekey> |
|
1043 </actionbody> |
|
1044 </action> |
|
1045 |
|
1046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1048 //! @SYMREQ CIT_PREQ1054 |
|
1049 //! @SYMTestPriority medium |
|
1050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1052 <action> |
|
1053 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1054 <actiontype>DeriveKey</actiontype> |
|
1055 <actionbody> |
|
1056 <derivekey> |
|
1057 <kdf>pkcs#12</kdf> |
|
1058 <passwd>password</passwd> |
|
1059 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1060 <iterations>2</iterations> |
|
1061 <key>C1B7E77C96</key> |
|
1062 </derivekey> |
|
1063 </actionbody> |
|
1064 </action> |
|
1065 |
|
1066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1068 //! @SYMREQ CIT_PREQ1054 |
|
1069 //! @SYMTestPriority medium |
|
1070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1072 <action> |
|
1073 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1074 <actiontype>DeriveKey</actiontype> |
|
1075 <actionbody> |
|
1076 <derivekey> |
|
1077 <kdf>pkcs#12</kdf> |
|
1078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1079 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1080 <iterations>2</iterations> |
|
1081 <key>3DE08CDACF</key> |
|
1082 </derivekey> |
|
1083 </actionbody> |
|
1084 </action> |
|
1085 |
|
1086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1088 //! @SYMREQ CIT_PREQ1054 |
|
1089 //! @SYMTestPriority medium |
|
1090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1092 <action> |
|
1093 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1094 <actiontype>DeriveKey</actiontype> |
|
1095 <actionbody> |
|
1096 <derivekey> |
|
1097 <kdf>pkcs#12</kdf> |
|
1098 <passwd>0000</passwd> |
|
1099 <salt>53414C54</salt> |
|
1100 <iterations>4</iterations> |
|
1101 <key>D0158BFC57</key> |
|
1102 </derivekey> |
|
1103 </actionbody> |
|
1104 </action> |
|
1105 |
|
1106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1108 //! @SYMREQ CIT_PREQ1054 |
|
1109 //! @SYMTestPriority medium |
|
1110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1112 <action> |
|
1113 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1114 <actiontype>DeriveKey</actiontype> |
|
1115 <actionbody> |
|
1116 <derivekey> |
|
1117 <kdf>pkcs#12</kdf> |
|
1118 <passwd>0001</passwd> |
|
1119 <salt>53414C54</salt> |
|
1120 <iterations>4</iterations> |
|
1121 <key>AEB6CD53F0</key> |
|
1122 </derivekey> |
|
1123 </actionbody> |
|
1124 </action> |
|
1125 |
|
1126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1128 //! @SYMREQ CIT_PREQ1054 |
|
1129 //! @SYMTestPriority medium |
|
1130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1132 <action> |
|
1133 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1134 <actiontype>DeriveKey</actiontype> |
|
1135 <actionbody> |
|
1136 <derivekey> |
|
1137 <kdf>pkcs#12</kdf> |
|
1138 <passwd>PSWD</passwd> |
|
1139 <salt>53414C54</salt> |
|
1140 <iterations>4</iterations> |
|
1141 <key>80010C12B6</key> |
|
1142 </derivekey> |
|
1143 </actionbody> |
|
1144 </action> |
|
1145 |
|
1146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1148 //! @SYMREQ CIT_PREQ1054 |
|
1149 //! @SYMTestPriority medium |
|
1150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1152 <action> |
|
1153 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1154 <actiontype>DeriveKey</actiontype> |
|
1155 <actionbody> |
|
1156 <derivekey> |
|
1157 <kdf>pkcs#12</kdf> |
|
1158 <passwd>password</passwd> |
|
1159 <salt>53414C54</salt> |
|
1160 <iterations>4</iterations> |
|
1161 <key>497DE34C4C</key> |
|
1162 </derivekey> |
|
1163 </actionbody> |
|
1164 </action> |
|
1165 |
|
1166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1168 //! @SYMREQ CIT_PREQ1054 |
|
1169 //! @SYMTestPriority medium |
|
1170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1172 <action> |
|
1173 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1174 <actiontype>DeriveKey</actiontype> |
|
1175 <actionbody> |
|
1176 <derivekey> |
|
1177 <kdf>pkcs#12</kdf> |
|
1178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1179 <salt>53414C54</salt> |
|
1180 <iterations>4</iterations> |
|
1181 <key>146C6A5B58</key> |
|
1182 </derivekey> |
|
1183 </actionbody> |
|
1184 </action> |
|
1185 |
|
1186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1188 //! @SYMREQ CIT_PREQ1054 |
|
1189 //! @SYMTestPriority medium |
|
1190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1192 <action> |
|
1193 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1194 <actiontype>DeriveKey</actiontype> |
|
1195 <actionbody> |
|
1196 <derivekey> |
|
1197 <kdf>pkcs#12</kdf> |
|
1198 <passwd>0000</passwd> |
|
1199 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1200 <iterations>4</iterations> |
|
1201 <key>E89772E7A5</key> |
|
1202 </derivekey> |
|
1203 </actionbody> |
|
1204 </action> |
|
1205 |
|
1206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1208 //! @SYMREQ CIT_PREQ1054 |
|
1209 //! @SYMTestPriority medium |
|
1210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1212 <action> |
|
1213 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1214 <actiontype>DeriveKey</actiontype> |
|
1215 <actionbody> |
|
1216 <derivekey> |
|
1217 <kdf>pkcs#12</kdf> |
|
1218 <passwd>0001</passwd> |
|
1219 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1220 <iterations>4</iterations> |
|
1221 <key>2393071377</key> |
|
1222 </derivekey> |
|
1223 </actionbody> |
|
1224 </action> |
|
1225 |
|
1226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1228 //! @SYMREQ CIT_PREQ1054 |
|
1229 //! @SYMTestPriority medium |
|
1230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1232 <action> |
|
1233 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1234 <actiontype>DeriveKey</actiontype> |
|
1235 <actionbody> |
|
1236 <derivekey> |
|
1237 <kdf>pkcs#12</kdf> |
|
1238 <passwd>PSWD</passwd> |
|
1239 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1240 <iterations>4</iterations> |
|
1241 <key>DF2D961FE3</key> |
|
1242 </derivekey> |
|
1243 </actionbody> |
|
1244 </action> |
|
1245 |
|
1246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1248 //! @SYMREQ CIT_PREQ1054 |
|
1249 //! @SYMTestPriority medium |
|
1250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1252 <action> |
|
1253 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1254 <actiontype>DeriveKey</actiontype> |
|
1255 <actionbody> |
|
1256 <derivekey> |
|
1257 <kdf>pkcs#12</kdf> |
|
1258 <passwd>password</passwd> |
|
1259 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1260 <iterations>4</iterations> |
|
1261 <key>363619530B</key> |
|
1262 </derivekey> |
|
1263 </actionbody> |
|
1264 </action> |
|
1265 |
|
1266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1268 //! @SYMREQ CIT_PREQ1054 |
|
1269 //! @SYMTestPriority medium |
|
1270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1272 <action> |
|
1273 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1274 <actiontype>DeriveKey</actiontype> |
|
1275 <actionbody> |
|
1276 <derivekey> |
|
1277 <kdf>pkcs#12</kdf> |
|
1278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1279 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1280 <iterations>4</iterations> |
|
1281 <key>B43FA2D22B</key> |
|
1282 </derivekey> |
|
1283 </actionbody> |
|
1284 </action> |
|
1285 |
|
1286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1288 //! @SYMREQ CIT_PREQ1054 |
|
1289 //! @SYMTestPriority medium |
|
1290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1292 <action> |
|
1293 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1294 <actiontype>DeriveKey</actiontype> |
|
1295 <actionbody> |
|
1296 <derivekey> |
|
1297 <kdf>pkcs#12</kdf> |
|
1298 <passwd>0000</passwd> |
|
1299 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1300 <iterations>4</iterations> |
|
1301 <key>EF50923D65</key> |
|
1302 </derivekey> |
|
1303 </actionbody> |
|
1304 </action> |
|
1305 |
|
1306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1308 //! @SYMREQ CIT_PREQ1054 |
|
1309 //! @SYMTestPriority medium |
|
1310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1312 <action> |
|
1313 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1314 <actiontype>DeriveKey</actiontype> |
|
1315 <actionbody> |
|
1316 <derivekey> |
|
1317 <kdf>pkcs#12</kdf> |
|
1318 <passwd>0001</passwd> |
|
1319 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1320 <iterations>4</iterations> |
|
1321 <key>9A618595C7</key> |
|
1322 </derivekey> |
|
1323 </actionbody> |
|
1324 </action> |
|
1325 |
|
1326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1328 //! @SYMREQ CIT_PREQ1054 |
|
1329 //! @SYMTestPriority medium |
|
1330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1332 <action> |
|
1333 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1334 <actiontype>DeriveKey</actiontype> |
|
1335 <actionbody> |
|
1336 <derivekey> |
|
1337 <kdf>pkcs#12</kdf> |
|
1338 <passwd>PSWD</passwd> |
|
1339 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1340 <iterations>4</iterations> |
|
1341 <key>B3B33AA8A6</key> |
|
1342 </derivekey> |
|
1343 </actionbody> |
|
1344 </action> |
|
1345 |
|
1346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1348 //! @SYMREQ CIT_PREQ1054 |
|
1349 //! @SYMTestPriority medium |
|
1350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1352 <action> |
|
1353 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1354 <actiontype>DeriveKey</actiontype> |
|
1355 <actionbody> |
|
1356 <derivekey> |
|
1357 <kdf>pkcs#12</kdf> |
|
1358 <passwd>password</passwd> |
|
1359 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1360 <iterations>4</iterations> |
|
1361 <key>C007DC1ADA</key> |
|
1362 </derivekey> |
|
1363 </actionbody> |
|
1364 </action> |
|
1365 |
|
1366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1368 //! @SYMREQ CIT_PREQ1054 |
|
1369 //! @SYMTestPriority medium |
|
1370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1372 <action> |
|
1373 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1374 <actiontype>DeriveKey</actiontype> |
|
1375 <actionbody> |
|
1376 <derivekey> |
|
1377 <kdf>pkcs#12</kdf> |
|
1378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1379 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1380 <iterations>4</iterations> |
|
1381 <key>91DF366136</key> |
|
1382 </derivekey> |
|
1383 </actionbody> |
|
1384 </action> |
|
1385 |
|
1386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1388 //! @SYMREQ CIT_PREQ1054 |
|
1389 //! @SYMTestPriority medium |
|
1390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1392 <action> |
|
1393 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1394 <actiontype>DeriveKey</actiontype> |
|
1395 <actionbody> |
|
1396 <derivekey> |
|
1397 <kdf>pkcs#12</kdf> |
|
1398 <passwd>0000</passwd> |
|
1399 <salt>53414C54</salt> |
|
1400 <iterations>8</iterations> |
|
1401 <key>9A08D3C4F5</key> |
|
1402 </derivekey> |
|
1403 </actionbody> |
|
1404 </action> |
|
1405 |
|
1406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1408 //! @SYMREQ CIT_PREQ1054 |
|
1409 //! @SYMTestPriority medium |
|
1410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1412 <action> |
|
1413 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1414 <actiontype>DeriveKey</actiontype> |
|
1415 <actionbody> |
|
1416 <derivekey> |
|
1417 <kdf>pkcs#12</kdf> |
|
1418 <passwd>0001</passwd> |
|
1419 <salt>53414C54</salt> |
|
1420 <iterations>8</iterations> |
|
1421 <key>33002FA0B6</key> |
|
1422 </derivekey> |
|
1423 </actionbody> |
|
1424 </action> |
|
1425 |
|
1426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1428 //! @SYMREQ CIT_PREQ1054 |
|
1429 //! @SYMTestPriority medium |
|
1430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1432 <action> |
|
1433 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1434 <actiontype>DeriveKey</actiontype> |
|
1435 <actionbody> |
|
1436 <derivekey> |
|
1437 <kdf>pkcs#12</kdf> |
|
1438 <passwd>PSWD</passwd> |
|
1439 <salt>53414C54</salt> |
|
1440 <iterations>8</iterations> |
|
1441 <key>22001FA269</key> |
|
1442 </derivekey> |
|
1443 </actionbody> |
|
1444 </action> |
|
1445 |
|
1446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1448 //! @SYMREQ CIT_PREQ1054 |
|
1449 //! @SYMTestPriority medium |
|
1450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1452 <action> |
|
1453 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1454 <actiontype>DeriveKey</actiontype> |
|
1455 <actionbody> |
|
1456 <derivekey> |
|
1457 <kdf>pkcs#12</kdf> |
|
1458 <passwd>password</passwd> |
|
1459 <salt>53414C54</salt> |
|
1460 <iterations>8</iterations> |
|
1461 <key>B0935F1122</key> |
|
1462 </derivekey> |
|
1463 </actionbody> |
|
1464 </action> |
|
1465 |
|
1466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1468 //! @SYMREQ CIT_PREQ1054 |
|
1469 //! @SYMTestPriority medium |
|
1470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1472 <action> |
|
1473 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1474 <actiontype>DeriveKey</actiontype> |
|
1475 <actionbody> |
|
1476 <derivekey> |
|
1477 <kdf>pkcs#12</kdf> |
|
1478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1479 <salt>53414C54</salt> |
|
1480 <iterations>8</iterations> |
|
1481 <key>6602B1B4BB</key> |
|
1482 </derivekey> |
|
1483 </actionbody> |
|
1484 </action> |
|
1485 |
|
1486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1488 //! @SYMREQ CIT_PREQ1054 |
|
1489 //! @SYMTestPriority medium |
|
1490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1492 <action> |
|
1493 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1494 <actiontype>DeriveKey</actiontype> |
|
1495 <actionbody> |
|
1496 <derivekey> |
|
1497 <kdf>pkcs#12</kdf> |
|
1498 <passwd>0000</passwd> |
|
1499 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1500 <iterations>8</iterations> |
|
1501 <key>3A478368DD</key> |
|
1502 </derivekey> |
|
1503 </actionbody> |
|
1504 </action> |
|
1505 |
|
1506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1508 //! @SYMREQ CIT_PREQ1054 |
|
1509 //! @SYMTestPriority medium |
|
1510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1512 <action> |
|
1513 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1514 <actiontype>DeriveKey</actiontype> |
|
1515 <actionbody> |
|
1516 <derivekey> |
|
1517 <kdf>pkcs#12</kdf> |
|
1518 <passwd>0001</passwd> |
|
1519 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1520 <iterations>8</iterations> |
|
1521 <key>6473EB1244</key> |
|
1522 </derivekey> |
|
1523 </actionbody> |
|
1524 </action> |
|
1525 |
|
1526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1528 //! @SYMREQ CIT_PREQ1054 |
|
1529 //! @SYMTestPriority medium |
|
1530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1532 <action> |
|
1533 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1534 <actiontype>DeriveKey</actiontype> |
|
1535 <actionbody> |
|
1536 <derivekey> |
|
1537 <kdf>pkcs#12</kdf> |
|
1538 <passwd>PSWD</passwd> |
|
1539 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1540 <iterations>8</iterations> |
|
1541 <key>AA762B8736</key> |
|
1542 </derivekey> |
|
1543 </actionbody> |
|
1544 </action> |
|
1545 |
|
1546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1548 //! @SYMREQ CIT_PREQ1054 |
|
1549 //! @SYMTestPriority medium |
|
1550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1552 <action> |
|
1553 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1554 <actiontype>DeriveKey</actiontype> |
|
1555 <actionbody> |
|
1556 <derivekey> |
|
1557 <kdf>pkcs#12</kdf> |
|
1558 <passwd>password</passwd> |
|
1559 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1560 <iterations>8</iterations> |
|
1561 <key>F00C5240B0</key> |
|
1562 </derivekey> |
|
1563 </actionbody> |
|
1564 </action> |
|
1565 |
|
1566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1568 //! @SYMREQ CIT_PREQ1054 |
|
1569 //! @SYMTestPriority medium |
|
1570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1572 <action> |
|
1573 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1574 <actiontype>DeriveKey</actiontype> |
|
1575 <actionbody> |
|
1576 <derivekey> |
|
1577 <kdf>pkcs#12</kdf> |
|
1578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1579 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1580 <iterations>8</iterations> |
|
1581 <key>935593CA37</key> |
|
1582 </derivekey> |
|
1583 </actionbody> |
|
1584 </action> |
|
1585 |
|
1586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1588 //! @SYMREQ CIT_PREQ1054 |
|
1589 //! @SYMTestPriority medium |
|
1590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1592 <action> |
|
1593 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1594 <actiontype>DeriveKey</actiontype> |
|
1595 <actionbody> |
|
1596 <derivekey> |
|
1597 <kdf>pkcs#12</kdf> |
|
1598 <passwd>0000</passwd> |
|
1599 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1600 <iterations>8</iterations> |
|
1601 <key>FCE1F429AE</key> |
|
1602 </derivekey> |
|
1603 </actionbody> |
|
1604 </action> |
|
1605 |
|
1606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1608 //! @SYMREQ CIT_PREQ1054 |
|
1609 //! @SYMTestPriority medium |
|
1610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1612 <action> |
|
1613 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1614 <actiontype>DeriveKey</actiontype> |
|
1615 <actionbody> |
|
1616 <derivekey> |
|
1617 <kdf>pkcs#12</kdf> |
|
1618 <passwd>0001</passwd> |
|
1619 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1620 <iterations>8</iterations> |
|
1621 <key>82B4A13659</key> |
|
1622 </derivekey> |
|
1623 </actionbody> |
|
1624 </action> |
|
1625 |
|
1626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1628 //! @SYMREQ CIT_PREQ1054 |
|
1629 //! @SYMTestPriority medium |
|
1630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1632 <action> |
|
1633 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1634 <actiontype>DeriveKey</actiontype> |
|
1635 <actionbody> |
|
1636 <derivekey> |
|
1637 <kdf>pkcs#12</kdf> |
|
1638 <passwd>PSWD</passwd> |
|
1639 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1640 <iterations>8</iterations> |
|
1641 <key>45FE091D4D</key> |
|
1642 </derivekey> |
|
1643 </actionbody> |
|
1644 </action> |
|
1645 |
|
1646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1648 //! @SYMREQ CIT_PREQ1054 |
|
1649 //! @SYMTestPriority medium |
|
1650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1652 <action> |
|
1653 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1654 <actiontype>DeriveKey</actiontype> |
|
1655 <actionbody> |
|
1656 <derivekey> |
|
1657 <kdf>pkcs#12</kdf> |
|
1658 <passwd>password</passwd> |
|
1659 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1660 <iterations>8</iterations> |
|
1661 <key>5670457314</key> |
|
1662 </derivekey> |
|
1663 </actionbody> |
|
1664 </action> |
|
1665 |
|
1666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1668 //! @SYMREQ CIT_PREQ1054 |
|
1669 //! @SYMTestPriority medium |
|
1670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1672 <action> |
|
1673 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1674 <actiontype>DeriveKey</actiontype> |
|
1675 <actionbody> |
|
1676 <derivekey> |
|
1677 <kdf>pkcs#12</kdf> |
|
1678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1679 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1680 <iterations>8</iterations> |
|
1681 <key>1C4CAE2514</key> |
|
1682 </derivekey> |
|
1683 </actionbody> |
|
1684 </action> |
|
1685 |
|
1686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1688 //! @SYMREQ CIT_PREQ1054 |
|
1689 //! @SYMTestPriority medium |
|
1690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1692 <action> |
|
1693 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1694 <actiontype>DeriveKey</actiontype> |
|
1695 <actionbody> |
|
1696 <derivekey> |
|
1697 <kdf>pkcs#12</kdf> |
|
1698 <passwd>0000</passwd> |
|
1699 <salt>53414C54</salt> |
|
1700 <iterations>128</iterations> |
|
1701 <key>8B4B3CBFB0</key> |
|
1702 </derivekey> |
|
1703 </actionbody> |
|
1704 </action> |
|
1705 |
|
1706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1708 //! @SYMREQ CIT_PREQ1054 |
|
1709 //! @SYMTestPriority medium |
|
1710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1712 <action> |
|
1713 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1714 <actiontype>DeriveKey</actiontype> |
|
1715 <actionbody> |
|
1716 <derivekey> |
|
1717 <kdf>pkcs#12</kdf> |
|
1718 <passwd>0001</passwd> |
|
1719 <salt>53414C54</salt> |
|
1720 <iterations>128</iterations> |
|
1721 <key>C89C3A2C9C</key> |
|
1722 </derivekey> |
|
1723 </actionbody> |
|
1724 </action> |
|
1725 |
|
1726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1728 //! @SYMREQ CIT_PREQ1054 |
|
1729 //! @SYMTestPriority medium |
|
1730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1732 <action> |
|
1733 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1734 <actiontype>DeriveKey</actiontype> |
|
1735 <actionbody> |
|
1736 <derivekey> |
|
1737 <kdf>pkcs#12</kdf> |
|
1738 <passwd>PSWD</passwd> |
|
1739 <salt>53414C54</salt> |
|
1740 <iterations>128</iterations> |
|
1741 <key>8109F97073</key> |
|
1742 </derivekey> |
|
1743 </actionbody> |
|
1744 </action> |
|
1745 |
|
1746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1748 //! @SYMREQ CIT_PREQ1054 |
|
1749 //! @SYMTestPriority medium |
|
1750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1752 <action> |
|
1753 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1754 <actiontype>DeriveKey</actiontype> |
|
1755 <actionbody> |
|
1756 <derivekey> |
|
1757 <kdf>pkcs#12</kdf> |
|
1758 <passwd>password</passwd> |
|
1759 <salt>53414C54</salt> |
|
1760 <iterations>128</iterations> |
|
1761 <key>55E985CC15</key> |
|
1762 </derivekey> |
|
1763 </actionbody> |
|
1764 </action> |
|
1765 |
|
1766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1768 //! @SYMREQ CIT_PREQ1054 |
|
1769 //! @SYMTestPriority medium |
|
1770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1772 <action> |
|
1773 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1774 <actiontype>DeriveKey</actiontype> |
|
1775 <actionbody> |
|
1776 <derivekey> |
|
1777 <kdf>pkcs#12</kdf> |
|
1778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1779 <salt>53414C54</salt> |
|
1780 <iterations>128</iterations> |
|
1781 <key>2802AA97D4</key> |
|
1782 </derivekey> |
|
1783 </actionbody> |
|
1784 </action> |
|
1785 |
|
1786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1788 //! @SYMREQ CIT_PREQ1054 |
|
1789 //! @SYMTestPriority medium |
|
1790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1792 <action> |
|
1793 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1794 <actiontype>DeriveKey</actiontype> |
|
1795 <actionbody> |
|
1796 <derivekey> |
|
1797 <kdf>pkcs#12</kdf> |
|
1798 <passwd>0000</passwd> |
|
1799 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1800 <iterations>128</iterations> |
|
1801 <key>881509A34D</key> |
|
1802 </derivekey> |
|
1803 </actionbody> |
|
1804 </action> |
|
1805 |
|
1806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1808 //! @SYMREQ CIT_PREQ1054 |
|
1809 //! @SYMTestPriority medium |
|
1810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1812 <action> |
|
1813 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1814 <actiontype>DeriveKey</actiontype> |
|
1815 <actionbody> |
|
1816 <derivekey> |
|
1817 <kdf>pkcs#12</kdf> |
|
1818 <passwd>0001</passwd> |
|
1819 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1820 <iterations>128</iterations> |
|
1821 <key>B2918BC593</key> |
|
1822 </derivekey> |
|
1823 </actionbody> |
|
1824 </action> |
|
1825 |
|
1826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1828 //! @SYMREQ CIT_PREQ1054 |
|
1829 //! @SYMTestPriority medium |
|
1830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1832 <action> |
|
1833 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1834 <actiontype>DeriveKey</actiontype> |
|
1835 <actionbody> |
|
1836 <derivekey> |
|
1837 <kdf>pkcs#12</kdf> |
|
1838 <passwd>PSWD</passwd> |
|
1839 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1840 <iterations>128</iterations> |
|
1841 <key>0FE0529B45</key> |
|
1842 </derivekey> |
|
1843 </actionbody> |
|
1844 </action> |
|
1845 |
|
1846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1848 //! @SYMREQ CIT_PREQ1054 |
|
1849 //! @SYMTestPriority medium |
|
1850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1852 <action> |
|
1853 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1854 <actiontype>DeriveKey</actiontype> |
|
1855 <actionbody> |
|
1856 <derivekey> |
|
1857 <kdf>pkcs#12</kdf> |
|
1858 <passwd>password</passwd> |
|
1859 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1860 <iterations>128</iterations> |
|
1861 <key>1FF923C4B1</key> |
|
1862 </derivekey> |
|
1863 </actionbody> |
|
1864 </action> |
|
1865 |
|
1866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1868 //! @SYMREQ CIT_PREQ1054 |
|
1869 //! @SYMTestPriority medium |
|
1870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1872 <action> |
|
1873 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
1874 <actiontype>DeriveKey</actiontype> |
|
1875 <actionbody> |
|
1876 <derivekey> |
|
1877 <kdf>pkcs#12</kdf> |
|
1878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1879 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
1880 <iterations>128</iterations> |
|
1881 <key>05D1E56D04</key> |
|
1882 </derivekey> |
|
1883 </actionbody> |
|
1884 </action> |
|
1885 |
|
1886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1888 //! @SYMREQ CIT_PREQ1054 |
|
1889 //! @SYMTestPriority medium |
|
1890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1892 <action> |
|
1893 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1894 <actiontype>DeriveKey</actiontype> |
|
1895 <actionbody> |
|
1896 <derivekey> |
|
1897 <kdf>pkcs#12</kdf> |
|
1898 <passwd>0000</passwd> |
|
1899 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1900 <iterations>128</iterations> |
|
1901 <key>99FE149183</key> |
|
1902 </derivekey> |
|
1903 </actionbody> |
|
1904 </action> |
|
1905 |
|
1906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1908 //! @SYMREQ CIT_PREQ1054 |
|
1909 //! @SYMTestPriority medium |
|
1910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1912 <action> |
|
1913 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1914 <actiontype>DeriveKey</actiontype> |
|
1915 <actionbody> |
|
1916 <derivekey> |
|
1917 <kdf>pkcs#12</kdf> |
|
1918 <passwd>0001</passwd> |
|
1919 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1920 <iterations>128</iterations> |
|
1921 <key>79E29F3FCB</key> |
|
1922 </derivekey> |
|
1923 </actionbody> |
|
1924 </action> |
|
1925 |
|
1926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1928 //! @SYMREQ CIT_PREQ1054 |
|
1929 //! @SYMTestPriority medium |
|
1930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1932 <action> |
|
1933 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1934 <actiontype>DeriveKey</actiontype> |
|
1935 <actionbody> |
|
1936 <derivekey> |
|
1937 <kdf>pkcs#12</kdf> |
|
1938 <passwd>PSWD</passwd> |
|
1939 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1940 <iterations>128</iterations> |
|
1941 <key>22A70A8657</key> |
|
1942 </derivekey> |
|
1943 </actionbody> |
|
1944 </action> |
|
1945 |
|
1946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1948 //! @SYMREQ CIT_PREQ1054 |
|
1949 //! @SYMTestPriority medium |
|
1950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1952 <action> |
|
1953 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1954 <actiontype>DeriveKey</actiontype> |
|
1955 <actionbody> |
|
1956 <derivekey> |
|
1957 <kdf>pkcs#12</kdf> |
|
1958 <passwd>password</passwd> |
|
1959 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1960 <iterations>128</iterations> |
|
1961 <key>9CBA922190</key> |
|
1962 </derivekey> |
|
1963 </actionbody> |
|
1964 </action> |
|
1965 |
|
1966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1968 //! @SYMREQ CIT_PREQ1054 |
|
1969 //! @SYMTestPriority medium |
|
1970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1972 <action> |
|
1973 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
1974 <actiontype>DeriveKey</actiontype> |
|
1975 <actionbody> |
|
1976 <derivekey> |
|
1977 <kdf>pkcs#12</kdf> |
|
1978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
1979 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
1980 <iterations>128</iterations> |
|
1981 <key>A037A8B1C2</key> |
|
1982 </derivekey> |
|
1983 </actionbody> |
|
1984 </action> |
|
1985 |
|
1986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
1987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
1988 //! @SYMREQ CIT_PREQ1054 |
|
1989 //! @SYMTestPriority medium |
|
1990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
1991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
1992 <action> |
|
1993 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
1994 <actiontype>DeriveKey</actiontype> |
|
1995 <actionbody> |
|
1996 <derivekey> |
|
1997 <kdf>pkcs#12</kdf> |
|
1998 <passwd>0000</passwd> |
|
1999 <salt>53414C54</salt> |
|
2000 <iterations>1024</iterations> |
|
2001 <key>82824BE51C</key> |
|
2002 </derivekey> |
|
2003 </actionbody> |
|
2004 </action> |
|
2005 |
|
2006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2008 //! @SYMREQ CIT_PREQ1054 |
|
2009 //! @SYMTestPriority medium |
|
2010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2012 <action> |
|
2013 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2014 <actiontype>DeriveKey</actiontype> |
|
2015 <actionbody> |
|
2016 <derivekey> |
|
2017 <kdf>pkcs#12</kdf> |
|
2018 <passwd>0001</passwd> |
|
2019 <salt>53414C54</salt> |
|
2020 <iterations>1024</iterations> |
|
2021 <key>E166049AC4</key> |
|
2022 </derivekey> |
|
2023 </actionbody> |
|
2024 </action> |
|
2025 |
|
2026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2028 //! @SYMREQ CIT_PREQ1054 |
|
2029 //! @SYMTestPriority medium |
|
2030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2032 <action> |
|
2033 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2034 <actiontype>DeriveKey</actiontype> |
|
2035 <actionbody> |
|
2036 <derivekey> |
|
2037 <kdf>pkcs#12</kdf> |
|
2038 <passwd>PSWD</passwd> |
|
2039 <salt>53414C54</salt> |
|
2040 <iterations>1024</iterations> |
|
2041 <key>90E975CC54</key> |
|
2042 </derivekey> |
|
2043 </actionbody> |
|
2044 </action> |
|
2045 |
|
2046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2048 //! @SYMREQ CIT_PREQ1054 |
|
2049 //! @SYMTestPriority medium |
|
2050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2052 <action> |
|
2053 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2054 <actiontype>DeriveKey</actiontype> |
|
2055 <actionbody> |
|
2056 <derivekey> |
|
2057 <kdf>pkcs#12</kdf> |
|
2058 <passwd>password</passwd> |
|
2059 <salt>53414C54</salt> |
|
2060 <iterations>1024</iterations> |
|
2061 <key>1FFD40D7BB</key> |
|
2062 </derivekey> |
|
2063 </actionbody> |
|
2064 </action> |
|
2065 |
|
2066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2068 //! @SYMREQ CIT_PREQ1054 |
|
2069 //! @SYMTestPriority medium |
|
2070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2072 <action> |
|
2073 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2074 <actiontype>DeriveKey</actiontype> |
|
2075 <actionbody> |
|
2076 <derivekey> |
|
2077 <kdf>pkcs#12</kdf> |
|
2078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2079 <salt>53414C54</salt> |
|
2080 <iterations>1024</iterations> |
|
2081 <key>406C92305A</key> |
|
2082 </derivekey> |
|
2083 </actionbody> |
|
2084 </action> |
|
2085 |
|
2086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2088 //! @SYMREQ CIT_PREQ1054 |
|
2089 //! @SYMTestPriority medium |
|
2090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2092 <action> |
|
2093 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2094 <actiontype>DeriveKey</actiontype> |
|
2095 <actionbody> |
|
2096 <derivekey> |
|
2097 <kdf>pkcs#12</kdf> |
|
2098 <passwd>0000</passwd> |
|
2099 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2100 <iterations>1024</iterations> |
|
2101 <key>E82BD75AA9</key> |
|
2102 </derivekey> |
|
2103 </actionbody> |
|
2104 </action> |
|
2105 |
|
2106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2108 //! @SYMREQ CIT_PREQ1054 |
|
2109 //! @SYMTestPriority medium |
|
2110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2112 <action> |
|
2113 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2114 <actiontype>DeriveKey</actiontype> |
|
2115 <actionbody> |
|
2116 <derivekey> |
|
2117 <kdf>pkcs#12</kdf> |
|
2118 <passwd>0001</passwd> |
|
2119 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2120 <iterations>1024</iterations> |
|
2121 <key>0182E41FCA</key> |
|
2122 </derivekey> |
|
2123 </actionbody> |
|
2124 </action> |
|
2125 |
|
2126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2128 //! @SYMREQ CIT_PREQ1054 |
|
2129 //! @SYMTestPriority medium |
|
2130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2132 <action> |
|
2133 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2134 <actiontype>DeriveKey</actiontype> |
|
2135 <actionbody> |
|
2136 <derivekey> |
|
2137 <kdf>pkcs#12</kdf> |
|
2138 <passwd>PSWD</passwd> |
|
2139 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2140 <iterations>1024</iterations> |
|
2141 <key>101FB77598</key> |
|
2142 </derivekey> |
|
2143 </actionbody> |
|
2144 </action> |
|
2145 |
|
2146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2148 //! @SYMREQ CIT_PREQ1054 |
|
2149 //! @SYMTestPriority medium |
|
2150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2152 <action> |
|
2153 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2154 <actiontype>DeriveKey</actiontype> |
|
2155 <actionbody> |
|
2156 <derivekey> |
|
2157 <kdf>pkcs#12</kdf> |
|
2158 <passwd>password</passwd> |
|
2159 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2160 <iterations>1024</iterations> |
|
2161 <key>D7499C6A12</key> |
|
2162 </derivekey> |
|
2163 </actionbody> |
|
2164 </action> |
|
2165 |
|
2166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2168 //! @SYMREQ CIT_PREQ1054 |
|
2169 //! @SYMTestPriority medium |
|
2170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2172 <action> |
|
2173 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2174 <actiontype>DeriveKey</actiontype> |
|
2175 <actionbody> |
|
2176 <derivekey> |
|
2177 <kdf>pkcs#12</kdf> |
|
2178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2179 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2180 <iterations>1024</iterations> |
|
2181 <key>2C6222B8E2</key> |
|
2182 </derivekey> |
|
2183 </actionbody> |
|
2184 </action> |
|
2185 |
|
2186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2188 //! @SYMREQ CIT_PREQ1054 |
|
2189 //! @SYMTestPriority medium |
|
2190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2192 <action> |
|
2193 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2194 <actiontype>DeriveKey</actiontype> |
|
2195 <actionbody> |
|
2196 <derivekey> |
|
2197 <kdf>pkcs#12</kdf> |
|
2198 <passwd>0000</passwd> |
|
2199 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2200 <iterations>1024</iterations> |
|
2201 <key>6789F0680A</key> |
|
2202 </derivekey> |
|
2203 </actionbody> |
|
2204 </action> |
|
2205 |
|
2206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2208 //! @SYMREQ CIT_PREQ1054 |
|
2209 //! @SYMTestPriority medium |
|
2210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2212 <action> |
|
2213 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2214 <actiontype>DeriveKey</actiontype> |
|
2215 <actionbody> |
|
2216 <derivekey> |
|
2217 <kdf>pkcs#12</kdf> |
|
2218 <passwd>0001</passwd> |
|
2219 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2220 <iterations>1024</iterations> |
|
2221 <key>43E6637258</key> |
|
2222 </derivekey> |
|
2223 </actionbody> |
|
2224 </action> |
|
2225 |
|
2226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2228 //! @SYMREQ CIT_PREQ1054 |
|
2229 //! @SYMTestPriority medium |
|
2230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2232 <action> |
|
2233 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2234 <actiontype>DeriveKey</actiontype> |
|
2235 <actionbody> |
|
2236 <derivekey> |
|
2237 <kdf>pkcs#12</kdf> |
|
2238 <passwd>PSWD</passwd> |
|
2239 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2240 <iterations>1024</iterations> |
|
2241 <key>8B3308BDD5</key> |
|
2242 </derivekey> |
|
2243 </actionbody> |
|
2244 </action> |
|
2245 |
|
2246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2248 //! @SYMREQ CIT_PREQ1054 |
|
2249 //! @SYMTestPriority medium |
|
2250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2252 <action> |
|
2253 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2254 <actiontype>DeriveKey</actiontype> |
|
2255 <actionbody> |
|
2256 <derivekey> |
|
2257 <kdf>pkcs#12</kdf> |
|
2258 <passwd>password</passwd> |
|
2259 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2260 <iterations>1024</iterations> |
|
2261 <key>CA202602C9</key> |
|
2262 </derivekey> |
|
2263 </actionbody> |
|
2264 </action> |
|
2265 |
|
2266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2268 //! @SYMREQ CIT_PREQ1054 |
|
2269 //! @SYMTestPriority medium |
|
2270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2272 <action> |
|
2273 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2274 <actiontype>DeriveKey</actiontype> |
|
2275 <actionbody> |
|
2276 <derivekey> |
|
2277 <kdf>pkcs#12</kdf> |
|
2278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2279 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2280 <iterations>1024</iterations> |
|
2281 <key>F6A33ADA6A</key> |
|
2282 </derivekey> |
|
2283 </actionbody> |
|
2284 </action> |
|
2285 |
|
2286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2288 //! @SYMREQ CIT_PREQ1054 |
|
2289 //! @SYMTestPriority medium |
|
2290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2292 <action> |
|
2293 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2294 <actiontype>DeriveKey</actiontype> |
|
2295 <actionbody> |
|
2296 <derivekey> |
|
2297 <kdf>pkcs#12</kdf> |
|
2298 <passwd>0000</passwd> |
|
2299 <salt>53414C54</salt> |
|
2300 <iterations>1536</iterations> |
|
2301 <key>79A4E1398F</key> |
|
2302 </derivekey> |
|
2303 </actionbody> |
|
2304 </action> |
|
2305 |
|
2306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2308 //! @SYMREQ CIT_PREQ1054 |
|
2309 //! @SYMTestPriority medium |
|
2310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2312 <action> |
|
2313 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2314 <actiontype>DeriveKey</actiontype> |
|
2315 <actionbody> |
|
2316 <derivekey> |
|
2317 <kdf>pkcs#12</kdf> |
|
2318 <passwd>0001</passwd> |
|
2319 <salt>53414C54</salt> |
|
2320 <iterations>1536</iterations> |
|
2321 <key>6F2402CCE4</key> |
|
2322 </derivekey> |
|
2323 </actionbody> |
|
2324 </action> |
|
2325 |
|
2326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2328 //! @SYMREQ CIT_PREQ1054 |
|
2329 //! @SYMTestPriority medium |
|
2330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2332 <action> |
|
2333 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2334 <actiontype>DeriveKey</actiontype> |
|
2335 <actionbody> |
|
2336 <derivekey> |
|
2337 <kdf>pkcs#12</kdf> |
|
2338 <passwd>PSWD</passwd> |
|
2339 <salt>53414C54</salt> |
|
2340 <iterations>1536</iterations> |
|
2341 <key>B9ED7B3135</key> |
|
2342 </derivekey> |
|
2343 </actionbody> |
|
2344 </action> |
|
2345 |
|
2346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2348 //! @SYMREQ CIT_PREQ1054 |
|
2349 //! @SYMTestPriority medium |
|
2350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2352 <action> |
|
2353 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2354 <actiontype>DeriveKey</actiontype> |
|
2355 <actionbody> |
|
2356 <derivekey> |
|
2357 <kdf>pkcs#12</kdf> |
|
2358 <passwd>password</passwd> |
|
2359 <salt>53414C54</salt> |
|
2360 <iterations>1536</iterations> |
|
2361 <key>65B27A78C7</key> |
|
2362 </derivekey> |
|
2363 </actionbody> |
|
2364 </action> |
|
2365 |
|
2366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2368 //! @SYMREQ CIT_PREQ1054 |
|
2369 //! @SYMTestPriority medium |
|
2370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2372 <action> |
|
2373 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2374 <actiontype>DeriveKey</actiontype> |
|
2375 <actionbody> |
|
2376 <derivekey> |
|
2377 <kdf>pkcs#12</kdf> |
|
2378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2379 <salt>53414C54</salt> |
|
2380 <iterations>1536</iterations> |
|
2381 <key>8F8FC96A3D</key> |
|
2382 </derivekey> |
|
2383 </actionbody> |
|
2384 </action> |
|
2385 |
|
2386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2388 //! @SYMREQ CIT_PREQ1054 |
|
2389 //! @SYMTestPriority medium |
|
2390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2392 <action> |
|
2393 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2394 <actiontype>DeriveKey</actiontype> |
|
2395 <actionbody> |
|
2396 <derivekey> |
|
2397 <kdf>pkcs#12</kdf> |
|
2398 <passwd>0000</passwd> |
|
2399 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2400 <iterations>1536</iterations> |
|
2401 <key>642DDC3F4E</key> |
|
2402 </derivekey> |
|
2403 </actionbody> |
|
2404 </action> |
|
2405 |
|
2406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2408 //! @SYMREQ CIT_PREQ1054 |
|
2409 //! @SYMTestPriority medium |
|
2410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2412 <action> |
|
2413 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2414 <actiontype>DeriveKey</actiontype> |
|
2415 <actionbody> |
|
2416 <derivekey> |
|
2417 <kdf>pkcs#12</kdf> |
|
2418 <passwd>0001</passwd> |
|
2419 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2420 <iterations>1536</iterations> |
|
2421 <key>0FE4BDC100</key> |
|
2422 </derivekey> |
|
2423 </actionbody> |
|
2424 </action> |
|
2425 |
|
2426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2428 //! @SYMREQ CIT_PREQ1054 |
|
2429 //! @SYMTestPriority medium |
|
2430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2432 <action> |
|
2433 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2434 <actiontype>DeriveKey</actiontype> |
|
2435 <actionbody> |
|
2436 <derivekey> |
|
2437 <kdf>pkcs#12</kdf> |
|
2438 <passwd>PSWD</passwd> |
|
2439 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2440 <iterations>1536</iterations> |
|
2441 <key>32D7F10C5E</key> |
|
2442 </derivekey> |
|
2443 </actionbody> |
|
2444 </action> |
|
2445 |
|
2446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2448 //! @SYMREQ CIT_PREQ1054 |
|
2449 //! @SYMTestPriority medium |
|
2450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2452 <action> |
|
2453 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2454 <actiontype>DeriveKey</actiontype> |
|
2455 <actionbody> |
|
2456 <derivekey> |
|
2457 <kdf>pkcs#12</kdf> |
|
2458 <passwd>password</passwd> |
|
2459 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2460 <iterations>1536</iterations> |
|
2461 <key>C05FE26245</key> |
|
2462 </derivekey> |
|
2463 </actionbody> |
|
2464 </action> |
|
2465 |
|
2466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2468 //! @SYMREQ CIT_PREQ1054 |
|
2469 //! @SYMTestPriority medium |
|
2470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2472 <action> |
|
2473 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2474 <actiontype>DeriveKey</actiontype> |
|
2475 <actionbody> |
|
2476 <derivekey> |
|
2477 <kdf>pkcs#12</kdf> |
|
2478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2479 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2480 <iterations>1536</iterations> |
|
2481 <key>818C967A8F</key> |
|
2482 </derivekey> |
|
2483 </actionbody> |
|
2484 </action> |
|
2485 |
|
2486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2488 //! @SYMREQ CIT_PREQ1054 |
|
2489 //! @SYMTestPriority medium |
|
2490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2492 <action> |
|
2493 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2494 <actiontype>DeriveKey</actiontype> |
|
2495 <actionbody> |
|
2496 <derivekey> |
|
2497 <kdf>pkcs#12</kdf> |
|
2498 <passwd>0000</passwd> |
|
2499 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2500 <iterations>1536</iterations> |
|
2501 <key>5301B5B2A1</key> |
|
2502 </derivekey> |
|
2503 </actionbody> |
|
2504 </action> |
|
2505 |
|
2506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2508 //! @SYMREQ CIT_PREQ1054 |
|
2509 //! @SYMTestPriority medium |
|
2510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2512 <action> |
|
2513 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2514 <actiontype>DeriveKey</actiontype> |
|
2515 <actionbody> |
|
2516 <derivekey> |
|
2517 <kdf>pkcs#12</kdf> |
|
2518 <passwd>0001</passwd> |
|
2519 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2520 <iterations>1536</iterations> |
|
2521 <key>9CB5BD2394</key> |
|
2522 </derivekey> |
|
2523 </actionbody> |
|
2524 </action> |
|
2525 |
|
2526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2528 //! @SYMREQ CIT_PREQ1054 |
|
2529 //! @SYMTestPriority medium |
|
2530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2532 <action> |
|
2533 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2534 <actiontype>DeriveKey</actiontype> |
|
2535 <actionbody> |
|
2536 <derivekey> |
|
2537 <kdf>pkcs#12</kdf> |
|
2538 <passwd>PSWD</passwd> |
|
2539 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2540 <iterations>1536</iterations> |
|
2541 <key>EB90D956B3</key> |
|
2542 </derivekey> |
|
2543 </actionbody> |
|
2544 </action> |
|
2545 |
|
2546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2548 //! @SYMREQ CIT_PREQ1054 |
|
2549 //! @SYMTestPriority medium |
|
2550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2552 <action> |
|
2553 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2554 <actiontype>DeriveKey</actiontype> |
|
2555 <actionbody> |
|
2556 <derivekey> |
|
2557 <kdf>pkcs#12</kdf> |
|
2558 <passwd>password</passwd> |
|
2559 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2560 <iterations>1536</iterations> |
|
2561 <key>ACAFB5EB24</key> |
|
2562 </derivekey> |
|
2563 </actionbody> |
|
2564 </action> |
|
2565 |
|
2566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2568 //! @SYMREQ CIT_PREQ1054 |
|
2569 //! @SYMTestPriority medium |
|
2570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2572 <action> |
|
2573 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2574 <actiontype>DeriveKey</actiontype> |
|
2575 <actionbody> |
|
2576 <derivekey> |
|
2577 <kdf>pkcs#12</kdf> |
|
2578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2579 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2580 <iterations>1536</iterations> |
|
2581 <key>A7B0859D9D</key> |
|
2582 </derivekey> |
|
2583 </actionbody> |
|
2584 </action> |
|
2585 |
|
2586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2588 //! @SYMREQ CIT_PREQ1054 |
|
2589 //! @SYMTestPriority medium |
|
2590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2592 <action> |
|
2593 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2594 <actiontype>DeriveKey</actiontype> |
|
2595 <actionbody> |
|
2596 <derivekey> |
|
2597 <kdf>pkcs#12</kdf> |
|
2598 <passwd>0000</passwd> |
|
2599 <salt>53414C54</salt> |
|
2600 <iterations>2048</iterations> |
|
2601 <key>B0F0F2EB44</key> |
|
2602 </derivekey> |
|
2603 </actionbody> |
|
2604 </action> |
|
2605 |
|
2606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2608 //! @SYMREQ CIT_PREQ1054 |
|
2609 //! @SYMTestPriority medium |
|
2610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2612 <action> |
|
2613 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2614 <actiontype>DeriveKey</actiontype> |
|
2615 <actionbody> |
|
2616 <derivekey> |
|
2617 <kdf>pkcs#12</kdf> |
|
2618 <passwd>0001</passwd> |
|
2619 <salt>53414C54</salt> |
|
2620 <iterations>2048</iterations> |
|
2621 <key>C11C0499CC</key> |
|
2622 </derivekey> |
|
2623 </actionbody> |
|
2624 </action> |
|
2625 |
|
2626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2628 //! @SYMREQ CIT_PREQ1054 |
|
2629 //! @SYMTestPriority medium |
|
2630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2632 <action> |
|
2633 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2634 <actiontype>DeriveKey</actiontype> |
|
2635 <actionbody> |
|
2636 <derivekey> |
|
2637 <kdf>pkcs#12</kdf> |
|
2638 <passwd>PSWD</passwd> |
|
2639 <salt>53414C54</salt> |
|
2640 <iterations>2048</iterations> |
|
2641 <key>3F63500AC4</key> |
|
2642 </derivekey> |
|
2643 </actionbody> |
|
2644 </action> |
|
2645 |
|
2646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2648 //! @SYMREQ CIT_PREQ1054 |
|
2649 //! @SYMTestPriority medium |
|
2650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2652 <action> |
|
2653 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2654 <actiontype>DeriveKey</actiontype> |
|
2655 <actionbody> |
|
2656 <derivekey> |
|
2657 <kdf>pkcs#12</kdf> |
|
2658 <passwd>password</passwd> |
|
2659 <salt>53414C54</salt> |
|
2660 <iterations>2048</iterations> |
|
2661 <key>B47F802F12</key> |
|
2662 </derivekey> |
|
2663 </actionbody> |
|
2664 </action> |
|
2665 |
|
2666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2668 //! @SYMREQ CIT_PREQ1054 |
|
2669 //! @SYMTestPriority medium |
|
2670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2672 <action> |
|
2673 <actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname> |
|
2674 <actiontype>DeriveKey</actiontype> |
|
2675 <actionbody> |
|
2676 <derivekey> |
|
2677 <kdf>pkcs#12</kdf> |
|
2678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2679 <salt>53414C54</salt> |
|
2680 <iterations>2048</iterations> |
|
2681 <key>3099237692</key> |
|
2682 </derivekey> |
|
2683 </actionbody> |
|
2684 </action> |
|
2685 |
|
2686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2688 //! @SYMREQ CIT_PREQ1054 |
|
2689 //! @SYMTestPriority medium |
|
2690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2692 <action> |
|
2693 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2694 <actiontype>DeriveKey</actiontype> |
|
2695 <actionbody> |
|
2696 <derivekey> |
|
2697 <kdf>pkcs#12</kdf> |
|
2698 <passwd>0000</passwd> |
|
2699 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2700 <iterations>2048</iterations> |
|
2701 <key>CD04522946</key> |
|
2702 </derivekey> |
|
2703 </actionbody> |
|
2704 </action> |
|
2705 |
|
2706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2708 //! @SYMREQ CIT_PREQ1054 |
|
2709 //! @SYMTestPriority medium |
|
2710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2712 <action> |
|
2713 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2714 <actiontype>DeriveKey</actiontype> |
|
2715 <actionbody> |
|
2716 <derivekey> |
|
2717 <kdf>pkcs#12</kdf> |
|
2718 <passwd>0001</passwd> |
|
2719 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2720 <iterations>2048</iterations> |
|
2721 <key>D85432F8AC</key> |
|
2722 </derivekey> |
|
2723 </actionbody> |
|
2724 </action> |
|
2725 |
|
2726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2728 //! @SYMREQ CIT_PREQ1054 |
|
2729 //! @SYMTestPriority medium |
|
2730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2732 <action> |
|
2733 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2734 <actiontype>DeriveKey</actiontype> |
|
2735 <actionbody> |
|
2736 <derivekey> |
|
2737 <kdf>pkcs#12</kdf> |
|
2738 <passwd>PSWD</passwd> |
|
2739 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2740 <iterations>2048</iterations> |
|
2741 <key>C77FDE2E52</key> |
|
2742 </derivekey> |
|
2743 </actionbody> |
|
2744 </action> |
|
2745 |
|
2746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2748 //! @SYMREQ CIT_PREQ1054 |
|
2749 //! @SYMTestPriority medium |
|
2750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2752 <action> |
|
2753 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2754 <actiontype>DeriveKey</actiontype> |
|
2755 <actionbody> |
|
2756 <derivekey> |
|
2757 <kdf>pkcs#12</kdf> |
|
2758 <passwd>password</passwd> |
|
2759 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2760 <iterations>2048</iterations> |
|
2761 <key>62E06B8A26</key> |
|
2762 </derivekey> |
|
2763 </actionbody> |
|
2764 </action> |
|
2765 |
|
2766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2768 //! @SYMREQ CIT_PREQ1054 |
|
2769 //! @SYMTestPriority medium |
|
2770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2772 <action> |
|
2773 <actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname> |
|
2774 <actiontype>DeriveKey</actiontype> |
|
2775 <actionbody> |
|
2776 <derivekey> |
|
2777 <kdf>pkcs#12</kdf> |
|
2778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2779 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
2780 <iterations>2048</iterations> |
|
2781 <key>A5B348EB49</key> |
|
2782 </derivekey> |
|
2783 </actionbody> |
|
2784 </action> |
|
2785 |
|
2786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2788 //! @SYMREQ CIT_PREQ1054 |
|
2789 //! @SYMTestPriority medium |
|
2790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2792 <action> |
|
2793 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2794 <actiontype>DeriveKey</actiontype> |
|
2795 <actionbody> |
|
2796 <derivekey> |
|
2797 <kdf>pkcs#12</kdf> |
|
2798 <passwd>0000</passwd> |
|
2799 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2800 <iterations>2048</iterations> |
|
2801 <key>2A824C1B6B</key> |
|
2802 </derivekey> |
|
2803 </actionbody> |
|
2804 </action> |
|
2805 |
|
2806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2808 //! @SYMREQ CIT_PREQ1054 |
|
2809 //! @SYMTestPriority medium |
|
2810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2812 <action> |
|
2813 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2814 <actiontype>DeriveKey</actiontype> |
|
2815 <actionbody> |
|
2816 <derivekey> |
|
2817 <kdf>pkcs#12</kdf> |
|
2818 <passwd>0001</passwd> |
|
2819 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2820 <iterations>2048</iterations> |
|
2821 <key>4B8D18B96E</key> |
|
2822 </derivekey> |
|
2823 </actionbody> |
|
2824 </action> |
|
2825 |
|
2826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2828 //! @SYMREQ CIT_PREQ1054 |
|
2829 //! @SYMTestPriority medium |
|
2830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2832 <action> |
|
2833 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2834 <actiontype>DeriveKey</actiontype> |
|
2835 <actionbody> |
|
2836 <derivekey> |
|
2837 <kdf>pkcs#12</kdf> |
|
2838 <passwd>PSWD</passwd> |
|
2839 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2840 <iterations>2048</iterations> |
|
2841 <key>9DABF586AD</key> |
|
2842 </derivekey> |
|
2843 </actionbody> |
|
2844 </action> |
|
2845 |
|
2846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2848 //! @SYMREQ CIT_PREQ1054 |
|
2849 //! @SYMTestPriority medium |
|
2850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2852 <action> |
|
2853 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2854 <actiontype>DeriveKey</actiontype> |
|
2855 <actionbody> |
|
2856 <derivekey> |
|
2857 <kdf>pkcs#12</kdf> |
|
2858 <passwd>password</passwd> |
|
2859 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2860 <iterations>2048</iterations> |
|
2861 <key>F734BE1BF9</key> |
|
2862 </derivekey> |
|
2863 </actionbody> |
|
2864 </action> |
|
2865 |
|
2866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2868 //! @SYMREQ CIT_PREQ1054 |
|
2869 //! @SYMTestPriority medium |
|
2870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2872 <action> |
|
2873 <actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname> |
|
2874 <actiontype>DeriveKey</actiontype> |
|
2875 <actionbody> |
|
2876 <derivekey> |
|
2877 <kdf>pkcs#12</kdf> |
|
2878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2879 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
2880 <iterations>2048</iterations> |
|
2881 <key>47C18634A0</key> |
|
2882 </derivekey> |
|
2883 </actionbody> |
|
2884 </action> |
|
2885 |
|
2886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2888 //! @SYMREQ CIT_PREQ1054 |
|
2889 //! @SYMTestPriority medium |
|
2890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2892 <action> |
|
2893 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
2894 <actiontype>DeriveKey</actiontype> |
|
2895 <actionbody> |
|
2896 <derivekey> |
|
2897 <kdf>pkcs#12</kdf> |
|
2898 <passwd>0000</passwd> |
|
2899 <salt>53414C54</salt> |
|
2900 <iterations>1</iterations> |
|
2901 <key>3037AFC8EACD4E2AEAB3C1E343B81DE8</key> |
|
2902 </derivekey> |
|
2903 </actionbody> |
|
2904 </action> |
|
2905 |
|
2906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2908 //! @SYMREQ CIT_PREQ1054 |
|
2909 //! @SYMTestPriority medium |
|
2910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2912 <action> |
|
2913 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
2914 <actiontype>DeriveKey</actiontype> |
|
2915 <actionbody> |
|
2916 <derivekey> |
|
2917 <kdf>pkcs#12</kdf> |
|
2918 <passwd>0001</passwd> |
|
2919 <salt>53414C54</salt> |
|
2920 <iterations>1</iterations> |
|
2921 <key>37F44080CB10A6F7E2719CC979FE0F2E</key> |
|
2922 </derivekey> |
|
2923 </actionbody> |
|
2924 </action> |
|
2925 |
|
2926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2928 //! @SYMREQ CIT_PREQ1054 |
|
2929 //! @SYMTestPriority medium |
|
2930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2932 <action> |
|
2933 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
2934 <actiontype>DeriveKey</actiontype> |
|
2935 <actionbody> |
|
2936 <derivekey> |
|
2937 <kdf>pkcs#12</kdf> |
|
2938 <passwd>PSWD</passwd> |
|
2939 <salt>53414C54</salt> |
|
2940 <iterations>1</iterations> |
|
2941 <key>8A18939ACF4A00A900FE2351DCBAFD0C</key> |
|
2942 </derivekey> |
|
2943 </actionbody> |
|
2944 </action> |
|
2945 |
|
2946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2948 //! @SYMREQ CIT_PREQ1054 |
|
2949 //! @SYMTestPriority medium |
|
2950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2952 <action> |
|
2953 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
2954 <actiontype>DeriveKey</actiontype> |
|
2955 <actionbody> |
|
2956 <derivekey> |
|
2957 <kdf>pkcs#12</kdf> |
|
2958 <passwd>password</passwd> |
|
2959 <salt>53414C54</salt> |
|
2960 <iterations>1</iterations> |
|
2961 <key>AFF6C5EDE0A50855FE56FDEDB6031BD0</key> |
|
2962 </derivekey> |
|
2963 </actionbody> |
|
2964 </action> |
|
2965 |
|
2966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2968 //! @SYMREQ CIT_PREQ1054 |
|
2969 //! @SYMTestPriority medium |
|
2970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2972 <action> |
|
2973 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
2974 <actiontype>DeriveKey</actiontype> |
|
2975 <actionbody> |
|
2976 <derivekey> |
|
2977 <kdf>pkcs#12</kdf> |
|
2978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
2979 <salt>53414C54</salt> |
|
2980 <iterations>1</iterations> |
|
2981 <key>2ED53BB2CE3C39A2F4039B734F9D94C5</key> |
|
2982 </derivekey> |
|
2983 </actionbody> |
|
2984 </action> |
|
2985 |
|
2986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
2987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
2988 //! @SYMREQ CIT_PREQ1054 |
|
2989 //! @SYMTestPriority medium |
|
2990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
2991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
2992 <action> |
|
2993 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
2994 <actiontype>DeriveKey</actiontype> |
|
2995 <actionbody> |
|
2996 <derivekey> |
|
2997 <kdf>pkcs#12</kdf> |
|
2998 <passwd>0000</passwd> |
|
2999 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3000 <iterations>1</iterations> |
|
3001 <key>49CABE7B67736931126499722509C03D</key> |
|
3002 </derivekey> |
|
3003 </actionbody> |
|
3004 </action> |
|
3005 |
|
3006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3008 //! @SYMREQ CIT_PREQ1054 |
|
3009 //! @SYMTestPriority medium |
|
3010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3012 <action> |
|
3013 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3014 <actiontype>DeriveKey</actiontype> |
|
3015 <actionbody> |
|
3016 <derivekey> |
|
3017 <kdf>pkcs#12</kdf> |
|
3018 <passwd>0001</passwd> |
|
3019 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3020 <iterations>1</iterations> |
|
3021 <key>F994B990D3554AFB778C729E9BAA0CC6</key> |
|
3022 </derivekey> |
|
3023 </actionbody> |
|
3024 </action> |
|
3025 |
|
3026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3028 //! @SYMREQ CIT_PREQ1054 |
|
3029 //! @SYMTestPriority medium |
|
3030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3032 <action> |
|
3033 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3034 <actiontype>DeriveKey</actiontype> |
|
3035 <actionbody> |
|
3036 <derivekey> |
|
3037 <kdf>pkcs#12</kdf> |
|
3038 <passwd>PSWD</passwd> |
|
3039 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3040 <iterations>1</iterations> |
|
3041 <key>1AFAAD7E51964CCD2760CCE134E1F2B8</key> |
|
3042 </derivekey> |
|
3043 </actionbody> |
|
3044 </action> |
|
3045 |
|
3046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3048 //! @SYMREQ CIT_PREQ1054 |
|
3049 //! @SYMTestPriority medium |
|
3050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3052 <action> |
|
3053 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3054 <actiontype>DeriveKey</actiontype> |
|
3055 <actionbody> |
|
3056 <derivekey> |
|
3057 <kdf>pkcs#12</kdf> |
|
3058 <passwd>password</passwd> |
|
3059 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3060 <iterations>1</iterations> |
|
3061 <key>878C91098D1F4FD0DD8CBC3A8149DF5F</key> |
|
3062 </derivekey> |
|
3063 </actionbody> |
|
3064 </action> |
|
3065 |
|
3066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3068 //! @SYMREQ CIT_PREQ1054 |
|
3069 //! @SYMTestPriority medium |
|
3070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3072 <action> |
|
3073 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3074 <actiontype>DeriveKey</actiontype> |
|
3075 <actionbody> |
|
3076 <derivekey> |
|
3077 <kdf>pkcs#12</kdf> |
|
3078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3079 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3080 <iterations>1</iterations> |
|
3081 <key>0DE3F08CAF4FF556C956527AD47C3497</key> |
|
3082 </derivekey> |
|
3083 </actionbody> |
|
3084 </action> |
|
3085 |
|
3086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3088 //! @SYMREQ CIT_PREQ1054 |
|
3089 //! @SYMTestPriority medium |
|
3090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3092 <action> |
|
3093 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3094 <actiontype>DeriveKey</actiontype> |
|
3095 <actionbody> |
|
3096 <derivekey> |
|
3097 <kdf>pkcs#12</kdf> |
|
3098 <passwd>0000</passwd> |
|
3099 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3100 <iterations>1</iterations> |
|
3101 <key>90253A49C069E7FF35281461A4DDBE0B</key> |
|
3102 </derivekey> |
|
3103 </actionbody> |
|
3104 </action> |
|
3105 |
|
3106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3108 //! @SYMREQ CIT_PREQ1054 |
|
3109 //! @SYMTestPriority medium |
|
3110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3112 <action> |
|
3113 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3114 <actiontype>DeriveKey</actiontype> |
|
3115 <actionbody> |
|
3116 <derivekey> |
|
3117 <kdf>pkcs#12</kdf> |
|
3118 <passwd>0001</passwd> |
|
3119 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3120 <iterations>1</iterations> |
|
3121 <key>40BE97AB930A7E8B6DB634C93B94E699</key> |
|
3122 </derivekey> |
|
3123 </actionbody> |
|
3124 </action> |
|
3125 |
|
3126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3128 //! @SYMREQ CIT_PREQ1054 |
|
3129 //! @SYMTestPriority medium |
|
3130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3132 <action> |
|
3133 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3134 <actiontype>DeriveKey</actiontype> |
|
3135 <actionbody> |
|
3136 <derivekey> |
|
3137 <kdf>pkcs#12</kdf> |
|
3138 <passwd>PSWD</passwd> |
|
3139 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3140 <iterations>1</iterations> |
|
3141 <key>A64B43E14E9F71F9EC9A3E6B73FA35E6</key> |
|
3142 </derivekey> |
|
3143 </actionbody> |
|
3144 </action> |
|
3145 |
|
3146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3148 //! @SYMREQ CIT_PREQ1054 |
|
3149 //! @SYMTestPriority medium |
|
3150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3152 <action> |
|
3153 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3154 <actiontype>DeriveKey</actiontype> |
|
3155 <actionbody> |
|
3156 <derivekey> |
|
3157 <kdf>pkcs#12</kdf> |
|
3158 <passwd>password</passwd> |
|
3159 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3160 <iterations>1</iterations> |
|
3161 <key>E323D5F588414AE68EF8FCA46879C1C7</key> |
|
3162 </derivekey> |
|
3163 </actionbody> |
|
3164 </action> |
|
3165 |
|
3166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3168 //! @SYMREQ CIT_PREQ1054 |
|
3169 //! @SYMTestPriority medium |
|
3170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3172 <action> |
|
3173 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3174 <actiontype>DeriveKey</actiontype> |
|
3175 <actionbody> |
|
3176 <derivekey> |
|
3177 <kdf>pkcs#12</kdf> |
|
3178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3179 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3180 <iterations>1</iterations> |
|
3181 <key>27476572AF26E99AB85CD350DC802ABA</key> |
|
3182 </derivekey> |
|
3183 </actionbody> |
|
3184 </action> |
|
3185 |
|
3186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3188 //! @SYMREQ CIT_PREQ1054 |
|
3189 //! @SYMTestPriority medium |
|
3190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3192 <action> |
|
3193 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3194 <actiontype>DeriveKey</actiontype> |
|
3195 <actionbody> |
|
3196 <derivekey> |
|
3197 <kdf>pkcs#12</kdf> |
|
3198 <passwd>0000</passwd> |
|
3199 <salt>53414C54</salt> |
|
3200 <iterations>2</iterations> |
|
3201 <key>A1D9010A6761CB2675F1C33BB3C52158</key> |
|
3202 </derivekey> |
|
3203 </actionbody> |
|
3204 </action> |
|
3205 |
|
3206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3208 //! @SYMREQ CIT_PREQ1054 |
|
3209 //! @SYMTestPriority medium |
|
3210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3212 <action> |
|
3213 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3214 <actiontype>DeriveKey</actiontype> |
|
3215 <actionbody> |
|
3216 <derivekey> |
|
3217 <kdf>pkcs#12</kdf> |
|
3218 <passwd>0001</passwd> |
|
3219 <salt>53414C54</salt> |
|
3220 <iterations>2</iterations> |
|
3221 <key>17E4E1F15BC31052E563BFF7B5D11D15</key> |
|
3222 </derivekey> |
|
3223 </actionbody> |
|
3224 </action> |
|
3225 |
|
3226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3228 //! @SYMREQ CIT_PREQ1054 |
|
3229 //! @SYMTestPriority medium |
|
3230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3232 <action> |
|
3233 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3234 <actiontype>DeriveKey</actiontype> |
|
3235 <actionbody> |
|
3236 <derivekey> |
|
3237 <kdf>pkcs#12</kdf> |
|
3238 <passwd>PSWD</passwd> |
|
3239 <salt>53414C54</salt> |
|
3240 <iterations>2</iterations> |
|
3241 <key>D1B71808FCCA5C97E8E52CF5E23C633C</key> |
|
3242 </derivekey> |
|
3243 </actionbody> |
|
3244 </action> |
|
3245 |
|
3246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3248 //! @SYMREQ CIT_PREQ1054 |
|
3249 //! @SYMTestPriority medium |
|
3250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3252 <action> |
|
3253 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3254 <actiontype>DeriveKey</actiontype> |
|
3255 <actionbody> |
|
3256 <derivekey> |
|
3257 <kdf>pkcs#12</kdf> |
|
3258 <passwd>password</passwd> |
|
3259 <salt>53414C54</salt> |
|
3260 <iterations>2</iterations> |
|
3261 <key>EE7E4073F2E6008722BB9842540998C2</key> |
|
3262 </derivekey> |
|
3263 </actionbody> |
|
3264 </action> |
|
3265 |
|
3266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3268 //! @SYMREQ CIT_PREQ1054 |
|
3269 //! @SYMTestPriority medium |
|
3270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3272 <action> |
|
3273 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3274 <actiontype>DeriveKey</actiontype> |
|
3275 <actionbody> |
|
3276 <derivekey> |
|
3277 <kdf>pkcs#12</kdf> |
|
3278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3279 <salt>53414C54</salt> |
|
3280 <iterations>2</iterations> |
|
3281 <key>5BF185C726EE2182888A834066C30BA9</key> |
|
3282 </derivekey> |
|
3283 </actionbody> |
|
3284 </action> |
|
3285 |
|
3286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3288 //! @SYMREQ CIT_PREQ1054 |
|
3289 //! @SYMTestPriority medium |
|
3290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3292 <action> |
|
3293 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3294 <actiontype>DeriveKey</actiontype> |
|
3295 <actionbody> |
|
3296 <derivekey> |
|
3297 <kdf>pkcs#12</kdf> |
|
3298 <passwd>0000</passwd> |
|
3299 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3300 <iterations>2</iterations> |
|
3301 <key>72ADF5E0413FDBF6659A1E7D495BBE32</key> |
|
3302 </derivekey> |
|
3303 </actionbody> |
|
3304 </action> |
|
3305 |
|
3306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3308 //! @SYMREQ CIT_PREQ1054 |
|
3309 //! @SYMTestPriority medium |
|
3310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3312 <action> |
|
3313 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3314 <actiontype>DeriveKey</actiontype> |
|
3315 <actionbody> |
|
3316 <derivekey> |
|
3317 <kdf>pkcs#12</kdf> |
|
3318 <passwd>0001</passwd> |
|
3319 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3320 <iterations>2</iterations> |
|
3321 <key>63E6DF459C899D72577C20FFE4F27670</key> |
|
3322 </derivekey> |
|
3323 </actionbody> |
|
3324 </action> |
|
3325 |
|
3326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3328 //! @SYMREQ CIT_PREQ1054 |
|
3329 //! @SYMTestPriority medium |
|
3330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3332 <action> |
|
3333 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3334 <actiontype>DeriveKey</actiontype> |
|
3335 <actionbody> |
|
3336 <derivekey> |
|
3337 <kdf>pkcs#12</kdf> |
|
3338 <passwd>PSWD</passwd> |
|
3339 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3340 <iterations>2</iterations> |
|
3341 <key>C2099204ABFBB841875BD7595A89D31A</key> |
|
3342 </derivekey> |
|
3343 </actionbody> |
|
3344 </action> |
|
3345 |
|
3346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3348 //! @SYMREQ CIT_PREQ1054 |
|
3349 //! @SYMTestPriority medium |
|
3350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3352 <action> |
|
3353 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3354 <actiontype>DeriveKey</actiontype> |
|
3355 <actionbody> |
|
3356 <derivekey> |
|
3357 <kdf>pkcs#12</kdf> |
|
3358 <passwd>password</passwd> |
|
3359 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3360 <iterations>2</iterations> |
|
3361 <key>3204D28A32DF299B612958906C79154A</key> |
|
3362 </derivekey> |
|
3363 </actionbody> |
|
3364 </action> |
|
3365 |
|
3366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3368 //! @SYMREQ CIT_PREQ1054 |
|
3369 //! @SYMTestPriority medium |
|
3370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3372 <action> |
|
3373 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3374 <actiontype>DeriveKey</actiontype> |
|
3375 <actionbody> |
|
3376 <derivekey> |
|
3377 <kdf>pkcs#12</kdf> |
|
3378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3379 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3380 <iterations>2</iterations> |
|
3381 <key>FB845F70A40E96C536641C3F797AAE39</key> |
|
3382 </derivekey> |
|
3383 </actionbody> |
|
3384 </action> |
|
3385 |
|
3386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3388 //! @SYMREQ CIT_PREQ1054 |
|
3389 //! @SYMTestPriority medium |
|
3390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3392 <action> |
|
3393 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3394 <actiontype>DeriveKey</actiontype> |
|
3395 <actionbody> |
|
3396 <derivekey> |
|
3397 <kdf>pkcs#12</kdf> |
|
3398 <passwd>0000</passwd> |
|
3399 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3400 <iterations>2</iterations> |
|
3401 <key>B9230EEC1D615A6DFEF5A8793CB06783</key> |
|
3402 </derivekey> |
|
3403 </actionbody> |
|
3404 </action> |
|
3405 |
|
3406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3408 //! @SYMREQ CIT_PREQ1054 |
|
3409 //! @SYMTestPriority medium |
|
3410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3412 <action> |
|
3413 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3414 <actiontype>DeriveKey</actiontype> |
|
3415 <actionbody> |
|
3416 <derivekey> |
|
3417 <kdf>pkcs#12</kdf> |
|
3418 <passwd>0001</passwd> |
|
3419 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3420 <iterations>2</iterations> |
|
3421 <key>462B0F2D1B18297A3F2C5E4058A0083E</key> |
|
3422 </derivekey> |
|
3423 </actionbody> |
|
3424 </action> |
|
3425 |
|
3426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3428 //! @SYMREQ CIT_PREQ1054 |
|
3429 //! @SYMTestPriority medium |
|
3430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3432 <action> |
|
3433 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3434 <actiontype>DeriveKey</actiontype> |
|
3435 <actionbody> |
|
3436 <derivekey> |
|
3437 <kdf>pkcs#12</kdf> |
|
3438 <passwd>PSWD</passwd> |
|
3439 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3440 <iterations>2</iterations> |
|
3441 <key>05B66EF1BB844470CBBB46D5F4C7DB29</key> |
|
3442 </derivekey> |
|
3443 </actionbody> |
|
3444 </action> |
|
3445 |
|
3446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3448 //! @SYMREQ CIT_PREQ1054 |
|
3449 //! @SYMTestPriority medium |
|
3450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3452 <action> |
|
3453 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3454 <actiontype>DeriveKey</actiontype> |
|
3455 <actionbody> |
|
3456 <derivekey> |
|
3457 <kdf>pkcs#12</kdf> |
|
3458 <passwd>password</passwd> |
|
3459 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3460 <iterations>2</iterations> |
|
3461 <key>C1B7E77C96BB5EE1386E8461A58F0D0C</key> |
|
3462 </derivekey> |
|
3463 </actionbody> |
|
3464 </action> |
|
3465 |
|
3466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3468 //! @SYMREQ CIT_PREQ1054 |
|
3469 //! @SYMTestPriority medium |
|
3470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3472 <action> |
|
3473 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3474 <actiontype>DeriveKey</actiontype> |
|
3475 <actionbody> |
|
3476 <derivekey> |
|
3477 <kdf>pkcs#12</kdf> |
|
3478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3479 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3480 <iterations>2</iterations> |
|
3481 <key>3DE08CDACF489F30BBD75C0FF401EC02</key> |
|
3482 </derivekey> |
|
3483 </actionbody> |
|
3484 </action> |
|
3485 |
|
3486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3488 //! @SYMREQ CIT_PREQ1054 |
|
3489 //! @SYMTestPriority medium |
|
3490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3492 <action> |
|
3493 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3494 <actiontype>DeriveKey</actiontype> |
|
3495 <actionbody> |
|
3496 <derivekey> |
|
3497 <kdf>pkcs#12</kdf> |
|
3498 <passwd>0000</passwd> |
|
3499 <salt>53414C54</salt> |
|
3500 <iterations>4</iterations> |
|
3501 <key>D0158BFC57E643965DC161741725CE94</key> |
|
3502 </derivekey> |
|
3503 </actionbody> |
|
3504 </action> |
|
3505 |
|
3506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3508 //! @SYMREQ CIT_PREQ1054 |
|
3509 //! @SYMTestPriority medium |
|
3510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3512 <action> |
|
3513 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3514 <actiontype>DeriveKey</actiontype> |
|
3515 <actionbody> |
|
3516 <derivekey> |
|
3517 <kdf>pkcs#12</kdf> |
|
3518 <passwd>0001</passwd> |
|
3519 <salt>53414C54</salt> |
|
3520 <iterations>4</iterations> |
|
3521 <key>AEB6CD53F0D6830161100C4BFD439B34</key> |
|
3522 </derivekey> |
|
3523 </actionbody> |
|
3524 </action> |
|
3525 |
|
3526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3528 //! @SYMREQ CIT_PREQ1054 |
|
3529 //! @SYMTestPriority medium |
|
3530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3532 <action> |
|
3533 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3534 <actiontype>DeriveKey</actiontype> |
|
3535 <actionbody> |
|
3536 <derivekey> |
|
3537 <kdf>pkcs#12</kdf> |
|
3538 <passwd>PSWD</passwd> |
|
3539 <salt>53414C54</salt> |
|
3540 <iterations>4</iterations> |
|
3541 <key>80010C12B66CC739F4ACF8BB15419770</key> |
|
3542 </derivekey> |
|
3543 </actionbody> |
|
3544 </action> |
|
3545 |
|
3546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3548 //! @SYMREQ CIT_PREQ1054 |
|
3549 //! @SYMTestPriority medium |
|
3550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3552 <action> |
|
3553 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3554 <actiontype>DeriveKey</actiontype> |
|
3555 <actionbody> |
|
3556 <derivekey> |
|
3557 <kdf>pkcs#12</kdf> |
|
3558 <passwd>password</passwd> |
|
3559 <salt>53414C54</salt> |
|
3560 <iterations>4</iterations> |
|
3561 <key>497DE34C4C64E56AD53E5F8F6E16D1A3</key> |
|
3562 </derivekey> |
|
3563 </actionbody> |
|
3564 </action> |
|
3565 |
|
3566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3568 //! @SYMREQ CIT_PREQ1054 |
|
3569 //! @SYMTestPriority medium |
|
3570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3572 <action> |
|
3573 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3574 <actiontype>DeriveKey</actiontype> |
|
3575 <actionbody> |
|
3576 <derivekey> |
|
3577 <kdf>pkcs#12</kdf> |
|
3578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3579 <salt>53414C54</salt> |
|
3580 <iterations>4</iterations> |
|
3581 <key>146C6A5B58AF8561220DE4C13A133248</key> |
|
3582 </derivekey> |
|
3583 </actionbody> |
|
3584 </action> |
|
3585 |
|
3586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3588 //! @SYMREQ CIT_PREQ1054 |
|
3589 //! @SYMTestPriority medium |
|
3590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3592 <action> |
|
3593 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3594 <actiontype>DeriveKey</actiontype> |
|
3595 <actionbody> |
|
3596 <derivekey> |
|
3597 <kdf>pkcs#12</kdf> |
|
3598 <passwd>0000</passwd> |
|
3599 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3600 <iterations>4</iterations> |
|
3601 <key>E89772E7A52D6D8C65AAE01D0380ED59</key> |
|
3602 </derivekey> |
|
3603 </actionbody> |
|
3604 </action> |
|
3605 |
|
3606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3608 //! @SYMREQ CIT_PREQ1054 |
|
3609 //! @SYMTestPriority medium |
|
3610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3612 <action> |
|
3613 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3614 <actiontype>DeriveKey</actiontype> |
|
3615 <actionbody> |
|
3616 <derivekey> |
|
3617 <kdf>pkcs#12</kdf> |
|
3618 <passwd>0001</passwd> |
|
3619 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3620 <iterations>4</iterations> |
|
3621 <key>23930713772E26DBBABB53F3C5C77501</key> |
|
3622 </derivekey> |
|
3623 </actionbody> |
|
3624 </action> |
|
3625 |
|
3626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3628 //! @SYMREQ CIT_PREQ1054 |
|
3629 //! @SYMTestPriority medium |
|
3630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3632 <action> |
|
3633 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3634 <actiontype>DeriveKey</actiontype> |
|
3635 <actionbody> |
|
3636 <derivekey> |
|
3637 <kdf>pkcs#12</kdf> |
|
3638 <passwd>PSWD</passwd> |
|
3639 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3640 <iterations>4</iterations> |
|
3641 <key>DF2D961FE3929BBA41493EB5421FEF7C</key> |
|
3642 </derivekey> |
|
3643 </actionbody> |
|
3644 </action> |
|
3645 |
|
3646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3648 //! @SYMREQ CIT_PREQ1054 |
|
3649 //! @SYMTestPriority medium |
|
3650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3652 <action> |
|
3653 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3654 <actiontype>DeriveKey</actiontype> |
|
3655 <actionbody> |
|
3656 <derivekey> |
|
3657 <kdf>pkcs#12</kdf> |
|
3658 <passwd>password</passwd> |
|
3659 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3660 <iterations>4</iterations> |
|
3661 <key>363619530B170B7BAE1C046B29351C23</key> |
|
3662 </derivekey> |
|
3663 </actionbody> |
|
3664 </action> |
|
3665 |
|
3666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3668 //! @SYMREQ CIT_PREQ1054 |
|
3669 //! @SYMTestPriority medium |
|
3670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3672 <action> |
|
3673 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3674 <actiontype>DeriveKey</actiontype> |
|
3675 <actionbody> |
|
3676 <derivekey> |
|
3677 <kdf>pkcs#12</kdf> |
|
3678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3679 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3680 <iterations>4</iterations> |
|
3681 <key>B43FA2D22B6912F6FEDF1CF3FAD123AF</key> |
|
3682 </derivekey> |
|
3683 </actionbody> |
|
3684 </action> |
|
3685 |
|
3686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3688 //! @SYMREQ CIT_PREQ1054 |
|
3689 //! @SYMTestPriority medium |
|
3690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3692 <action> |
|
3693 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3694 <actiontype>DeriveKey</actiontype> |
|
3695 <actionbody> |
|
3696 <derivekey> |
|
3697 <kdf>pkcs#12</kdf> |
|
3698 <passwd>0000</passwd> |
|
3699 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3700 <iterations>4</iterations> |
|
3701 <key>EF50923D65A0610BDC51AD5DB1B4F4F9</key> |
|
3702 </derivekey> |
|
3703 </actionbody> |
|
3704 </action> |
|
3705 |
|
3706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3708 //! @SYMREQ CIT_PREQ1054 |
|
3709 //! @SYMTestPriority medium |
|
3710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3712 <action> |
|
3713 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3714 <actiontype>DeriveKey</actiontype> |
|
3715 <actionbody> |
|
3716 <derivekey> |
|
3717 <kdf>pkcs#12</kdf> |
|
3718 <passwd>0001</passwd> |
|
3719 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3720 <iterations>4</iterations> |
|
3721 <key>9A618595C714486B7D7E3120005C8BC1</key> |
|
3722 </derivekey> |
|
3723 </actionbody> |
|
3724 </action> |
|
3725 |
|
3726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3728 //! @SYMREQ CIT_PREQ1054 |
|
3729 //! @SYMTestPriority medium |
|
3730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3732 <action> |
|
3733 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3734 <actiontype>DeriveKey</actiontype> |
|
3735 <actionbody> |
|
3736 <derivekey> |
|
3737 <kdf>pkcs#12</kdf> |
|
3738 <passwd>PSWD</passwd> |
|
3739 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3740 <iterations>4</iterations> |
|
3741 <key>B3B33AA8A6777605E3029C0F8DC45290</key> |
|
3742 </derivekey> |
|
3743 </actionbody> |
|
3744 </action> |
|
3745 |
|
3746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3748 //! @SYMREQ CIT_PREQ1054 |
|
3749 //! @SYMTestPriority medium |
|
3750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3752 <action> |
|
3753 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3754 <actiontype>DeriveKey</actiontype> |
|
3755 <actionbody> |
|
3756 <derivekey> |
|
3757 <kdf>pkcs#12</kdf> |
|
3758 <passwd>password</passwd> |
|
3759 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3760 <iterations>4</iterations> |
|
3761 <key>C007DC1ADA9475C5DB2F9B5D18A2DEFD</key> |
|
3762 </derivekey> |
|
3763 </actionbody> |
|
3764 </action> |
|
3765 |
|
3766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3768 //! @SYMREQ CIT_PREQ1054 |
|
3769 //! @SYMTestPriority medium |
|
3770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3772 <action> |
|
3773 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3774 <actiontype>DeriveKey</actiontype> |
|
3775 <actionbody> |
|
3776 <derivekey> |
|
3777 <kdf>pkcs#12</kdf> |
|
3778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3779 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
3780 <iterations>4</iterations> |
|
3781 <key>91DF3661364A0DAD28180A41ADCB5567</key> |
|
3782 </derivekey> |
|
3783 </actionbody> |
|
3784 </action> |
|
3785 |
|
3786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3788 //! @SYMREQ CIT_PREQ1054 |
|
3789 //! @SYMTestPriority medium |
|
3790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3792 <action> |
|
3793 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3794 <actiontype>DeriveKey</actiontype> |
|
3795 <actionbody> |
|
3796 <derivekey> |
|
3797 <kdf>pkcs#12</kdf> |
|
3798 <passwd>0000</passwd> |
|
3799 <salt>53414C54</salt> |
|
3800 <iterations>8</iterations> |
|
3801 <key>9A08D3C4F584ECD1E538B7A46DCFDEA1</key> |
|
3802 </derivekey> |
|
3803 </actionbody> |
|
3804 </action> |
|
3805 |
|
3806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3808 //! @SYMREQ CIT_PREQ1054 |
|
3809 //! @SYMTestPriority medium |
|
3810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3812 <action> |
|
3813 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3814 <actiontype>DeriveKey</actiontype> |
|
3815 <actionbody> |
|
3816 <derivekey> |
|
3817 <kdf>pkcs#12</kdf> |
|
3818 <passwd>0001</passwd> |
|
3819 <salt>53414C54</salt> |
|
3820 <iterations>8</iterations> |
|
3821 <key>33002FA0B6A5A27991A062FF6173E357</key> |
|
3822 </derivekey> |
|
3823 </actionbody> |
|
3824 </action> |
|
3825 |
|
3826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3828 //! @SYMREQ CIT_PREQ1054 |
|
3829 //! @SYMTestPriority medium |
|
3830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3832 <action> |
|
3833 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3834 <actiontype>DeriveKey</actiontype> |
|
3835 <actionbody> |
|
3836 <derivekey> |
|
3837 <kdf>pkcs#12</kdf> |
|
3838 <passwd>PSWD</passwd> |
|
3839 <salt>53414C54</salt> |
|
3840 <iterations>8</iterations> |
|
3841 <key>22001FA26964DCD0BE3C58AB6E43557C</key> |
|
3842 </derivekey> |
|
3843 </actionbody> |
|
3844 </action> |
|
3845 |
|
3846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3848 //! @SYMREQ CIT_PREQ1054 |
|
3849 //! @SYMTestPriority medium |
|
3850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3852 <action> |
|
3853 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3854 <actiontype>DeriveKey</actiontype> |
|
3855 <actionbody> |
|
3856 <derivekey> |
|
3857 <kdf>pkcs#12</kdf> |
|
3858 <passwd>password</passwd> |
|
3859 <salt>53414C54</salt> |
|
3860 <iterations>8</iterations> |
|
3861 <key>B0935F11227F5A473073DCD188886687</key> |
|
3862 </derivekey> |
|
3863 </actionbody> |
|
3864 </action> |
|
3865 |
|
3866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3868 //! @SYMREQ CIT_PREQ1054 |
|
3869 //! @SYMTestPriority medium |
|
3870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3872 <action> |
|
3873 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
3874 <actiontype>DeriveKey</actiontype> |
|
3875 <actionbody> |
|
3876 <derivekey> |
|
3877 <kdf>pkcs#12</kdf> |
|
3878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3879 <salt>53414C54</salt> |
|
3880 <iterations>8</iterations> |
|
3881 <key>6602B1B4BBB670208041ECD8E1634845</key> |
|
3882 </derivekey> |
|
3883 </actionbody> |
|
3884 </action> |
|
3885 |
|
3886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3888 //! @SYMREQ CIT_PREQ1054 |
|
3889 //! @SYMTestPriority medium |
|
3890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3892 <action> |
|
3893 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3894 <actiontype>DeriveKey</actiontype> |
|
3895 <actionbody> |
|
3896 <derivekey> |
|
3897 <kdf>pkcs#12</kdf> |
|
3898 <passwd>0000</passwd> |
|
3899 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3900 <iterations>8</iterations> |
|
3901 <key>3A478368DD5DC61BAA09325959A3F46C</key> |
|
3902 </derivekey> |
|
3903 </actionbody> |
|
3904 </action> |
|
3905 |
|
3906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3908 //! @SYMREQ CIT_PREQ1054 |
|
3909 //! @SYMTestPriority medium |
|
3910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3912 <action> |
|
3913 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3914 <actiontype>DeriveKey</actiontype> |
|
3915 <actionbody> |
|
3916 <derivekey> |
|
3917 <kdf>pkcs#12</kdf> |
|
3918 <passwd>0001</passwd> |
|
3919 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3920 <iterations>8</iterations> |
|
3921 <key>6473EB1244E055149E0858C49FAE7B8D</key> |
|
3922 </derivekey> |
|
3923 </actionbody> |
|
3924 </action> |
|
3925 |
|
3926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3928 //! @SYMREQ CIT_PREQ1054 |
|
3929 //! @SYMTestPriority medium |
|
3930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3932 <action> |
|
3933 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3934 <actiontype>DeriveKey</actiontype> |
|
3935 <actionbody> |
|
3936 <derivekey> |
|
3937 <kdf>pkcs#12</kdf> |
|
3938 <passwd>PSWD</passwd> |
|
3939 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3940 <iterations>8</iterations> |
|
3941 <key>AA762B8736D4C37BAD263103CA283E09</key> |
|
3942 </derivekey> |
|
3943 </actionbody> |
|
3944 </action> |
|
3945 |
|
3946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3948 //! @SYMREQ CIT_PREQ1054 |
|
3949 //! @SYMTestPriority medium |
|
3950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3952 <action> |
|
3953 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3954 <actiontype>DeriveKey</actiontype> |
|
3955 <actionbody> |
|
3956 <derivekey> |
|
3957 <kdf>pkcs#12</kdf> |
|
3958 <passwd>password</passwd> |
|
3959 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3960 <iterations>8</iterations> |
|
3961 <key>F00C5240B03C9A2324BD5FE0AEEE1B62</key> |
|
3962 </derivekey> |
|
3963 </actionbody> |
|
3964 </action> |
|
3965 |
|
3966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3968 //! @SYMREQ CIT_PREQ1054 |
|
3969 //! @SYMTestPriority medium |
|
3970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3972 <action> |
|
3973 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
3974 <actiontype>DeriveKey</actiontype> |
|
3975 <actionbody> |
|
3976 <derivekey> |
|
3977 <kdf>pkcs#12</kdf> |
|
3978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
3979 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
3980 <iterations>8</iterations> |
|
3981 <key>935593CA370BB6988F2F41D2F4ABF56E</key> |
|
3982 </derivekey> |
|
3983 </actionbody> |
|
3984 </action> |
|
3985 |
|
3986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
3987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
3988 //! @SYMREQ CIT_PREQ1054 |
|
3989 //! @SYMTestPriority medium |
|
3990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
3991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
3992 <action> |
|
3993 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
3994 <actiontype>DeriveKey</actiontype> |
|
3995 <actionbody> |
|
3996 <derivekey> |
|
3997 <kdf>pkcs#12</kdf> |
|
3998 <passwd>0000</passwd> |
|
3999 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4000 <iterations>8</iterations> |
|
4001 <key>FCE1F429AEB3B9818D96B88DD25CDED9</key> |
|
4002 </derivekey> |
|
4003 </actionbody> |
|
4004 </action> |
|
4005 |
|
4006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4008 //! @SYMREQ CIT_PREQ1054 |
|
4009 //! @SYMTestPriority medium |
|
4010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4012 <action> |
|
4013 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4014 <actiontype>DeriveKey</actiontype> |
|
4015 <actionbody> |
|
4016 <derivekey> |
|
4017 <kdf>pkcs#12</kdf> |
|
4018 <passwd>0001</passwd> |
|
4019 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4020 <iterations>8</iterations> |
|
4021 <key>82B4A13659033EA4025DB51A6CB573F9</key> |
|
4022 </derivekey> |
|
4023 </actionbody> |
|
4024 </action> |
|
4025 |
|
4026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4028 //! @SYMREQ CIT_PREQ1054 |
|
4029 //! @SYMTestPriority medium |
|
4030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4032 <action> |
|
4033 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4034 <actiontype>DeriveKey</actiontype> |
|
4035 <actionbody> |
|
4036 <derivekey> |
|
4037 <kdf>pkcs#12</kdf> |
|
4038 <passwd>PSWD</passwd> |
|
4039 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4040 <iterations>8</iterations> |
|
4041 <key>45FE091D4DD2D50FA7D3340B1DB838F2</key> |
|
4042 </derivekey> |
|
4043 </actionbody> |
|
4044 </action> |
|
4045 |
|
4046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4048 //! @SYMREQ CIT_PREQ1054 |
|
4049 //! @SYMTestPriority medium |
|
4050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4052 <action> |
|
4053 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4054 <actiontype>DeriveKey</actiontype> |
|
4055 <actionbody> |
|
4056 <derivekey> |
|
4057 <kdf>pkcs#12</kdf> |
|
4058 <passwd>password</passwd> |
|
4059 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4060 <iterations>8</iterations> |
|
4061 <key>5670457314E405B0ED1583FC4B82FEAD</key> |
|
4062 </derivekey> |
|
4063 </actionbody> |
|
4064 </action> |
|
4065 |
|
4066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4068 //! @SYMREQ CIT_PREQ1054 |
|
4069 //! @SYMTestPriority medium |
|
4070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4072 <action> |
|
4073 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4074 <actiontype>DeriveKey</actiontype> |
|
4075 <actionbody> |
|
4076 <derivekey> |
|
4077 <kdf>pkcs#12</kdf> |
|
4078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4079 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4080 <iterations>8</iterations> |
|
4081 <key>1C4CAE25146D74F3762B5C3FD3A91752</key> |
|
4082 </derivekey> |
|
4083 </actionbody> |
|
4084 </action> |
|
4085 |
|
4086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4088 //! @SYMREQ CIT_PREQ1054 |
|
4089 //! @SYMTestPriority medium |
|
4090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4092 <action> |
|
4093 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4094 <actiontype>DeriveKey</actiontype> |
|
4095 <actionbody> |
|
4096 <derivekey> |
|
4097 <kdf>pkcs#12</kdf> |
|
4098 <passwd>0000</passwd> |
|
4099 <salt>53414C54</salt> |
|
4100 <iterations>128</iterations> |
|
4101 <key>8B4B3CBFB00466F63B30FEAD111E163D</key> |
|
4102 </derivekey> |
|
4103 </actionbody> |
|
4104 </action> |
|
4105 |
|
4106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4108 //! @SYMREQ CIT_PREQ1054 |
|
4109 //! @SYMTestPriority medium |
|
4110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4112 <action> |
|
4113 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4114 <actiontype>DeriveKey</actiontype> |
|
4115 <actionbody> |
|
4116 <derivekey> |
|
4117 <kdf>pkcs#12</kdf> |
|
4118 <passwd>0001</passwd> |
|
4119 <salt>53414C54</salt> |
|
4120 <iterations>128</iterations> |
|
4121 <key>C89C3A2C9C06626EB831F4BB5262809B</key> |
|
4122 </derivekey> |
|
4123 </actionbody> |
|
4124 </action> |
|
4125 |
|
4126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4128 //! @SYMREQ CIT_PREQ1054 |
|
4129 //! @SYMTestPriority medium |
|
4130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4132 <action> |
|
4133 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4134 <actiontype>DeriveKey</actiontype> |
|
4135 <actionbody> |
|
4136 <derivekey> |
|
4137 <kdf>pkcs#12</kdf> |
|
4138 <passwd>PSWD</passwd> |
|
4139 <salt>53414C54</salt> |
|
4140 <iterations>128</iterations> |
|
4141 <key>8109F97073FF3D286B21095E7AFBBAFA</key> |
|
4142 </derivekey> |
|
4143 </actionbody> |
|
4144 </action> |
|
4145 |
|
4146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4148 //! @SYMREQ CIT_PREQ1054 |
|
4149 //! @SYMTestPriority medium |
|
4150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4152 <action> |
|
4153 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4154 <actiontype>DeriveKey</actiontype> |
|
4155 <actionbody> |
|
4156 <derivekey> |
|
4157 <kdf>pkcs#12</kdf> |
|
4158 <passwd>password</passwd> |
|
4159 <salt>53414C54</salt> |
|
4160 <iterations>128</iterations> |
|
4161 <key>55E985CC1581F3D0052F53DB469F6DC9</key> |
|
4162 </derivekey> |
|
4163 </actionbody> |
|
4164 </action> |
|
4165 |
|
4166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4168 //! @SYMREQ CIT_PREQ1054 |
|
4169 //! @SYMTestPriority medium |
|
4170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4172 <action> |
|
4173 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4174 <actiontype>DeriveKey</actiontype> |
|
4175 <actionbody> |
|
4176 <derivekey> |
|
4177 <kdf>pkcs#12</kdf> |
|
4178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4179 <salt>53414C54</salt> |
|
4180 <iterations>128</iterations> |
|
4181 <key>2802AA97D4C79B1813AB23F2DD710722</key> |
|
4182 </derivekey> |
|
4183 </actionbody> |
|
4184 </action> |
|
4185 |
|
4186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4188 //! @SYMREQ CIT_PREQ1054 |
|
4189 //! @SYMTestPriority medium |
|
4190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4192 <action> |
|
4193 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4194 <actiontype>DeriveKey</actiontype> |
|
4195 <actionbody> |
|
4196 <derivekey> |
|
4197 <kdf>pkcs#12</kdf> |
|
4198 <passwd>0000</passwd> |
|
4199 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4200 <iterations>128</iterations> |
|
4201 <key>881509A34D80B5AB5CEC65B859DF2D99</key> |
|
4202 </derivekey> |
|
4203 </actionbody> |
|
4204 </action> |
|
4205 |
|
4206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4208 //! @SYMREQ CIT_PREQ1054 |
|
4209 //! @SYMTestPriority medium |
|
4210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4212 <action> |
|
4213 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4214 <actiontype>DeriveKey</actiontype> |
|
4215 <actionbody> |
|
4216 <derivekey> |
|
4217 <kdf>pkcs#12</kdf> |
|
4218 <passwd>0001</passwd> |
|
4219 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4220 <iterations>128</iterations> |
|
4221 <key>B2918BC593DEC4559C279CFA050CB0F9</key> |
|
4222 </derivekey> |
|
4223 </actionbody> |
|
4224 </action> |
|
4225 |
|
4226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4228 //! @SYMREQ CIT_PREQ1054 |
|
4229 //! @SYMTestPriority medium |
|
4230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4232 <action> |
|
4233 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4234 <actiontype>DeriveKey</actiontype> |
|
4235 <actionbody> |
|
4236 <derivekey> |
|
4237 <kdf>pkcs#12</kdf> |
|
4238 <passwd>PSWD</passwd> |
|
4239 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4240 <iterations>128</iterations> |
|
4241 <key>0FE0529B45AFC9BB66323C2182DE414A</key> |
|
4242 </derivekey> |
|
4243 </actionbody> |
|
4244 </action> |
|
4245 |
|
4246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4248 //! @SYMREQ CIT_PREQ1054 |
|
4249 //! @SYMTestPriority medium |
|
4250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4252 <action> |
|
4253 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4254 <actiontype>DeriveKey</actiontype> |
|
4255 <actionbody> |
|
4256 <derivekey> |
|
4257 <kdf>pkcs#12</kdf> |
|
4258 <passwd>password</passwd> |
|
4259 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4260 <iterations>128</iterations> |
|
4261 <key>1FF923C4B1E1007EF168E4185280F818</key> |
|
4262 </derivekey> |
|
4263 </actionbody> |
|
4264 </action> |
|
4265 |
|
4266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4268 //! @SYMREQ CIT_PREQ1054 |
|
4269 //! @SYMTestPriority medium |
|
4270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4272 <action> |
|
4273 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4274 <actiontype>DeriveKey</actiontype> |
|
4275 <actionbody> |
|
4276 <derivekey> |
|
4277 <kdf>pkcs#12</kdf> |
|
4278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4279 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4280 <iterations>128</iterations> |
|
4281 <key>05D1E56D04BC435A60BDE06C5AFAC9E3</key> |
|
4282 </derivekey> |
|
4283 </actionbody> |
|
4284 </action> |
|
4285 |
|
4286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4288 //! @SYMREQ CIT_PREQ1054 |
|
4289 //! @SYMTestPriority medium |
|
4290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4292 <action> |
|
4293 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4294 <actiontype>DeriveKey</actiontype> |
|
4295 <actionbody> |
|
4296 <derivekey> |
|
4297 <kdf>pkcs#12</kdf> |
|
4298 <passwd>0000</passwd> |
|
4299 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4300 <iterations>128</iterations> |
|
4301 <key>99FE149183022F9EB2EB815BCC9504E5</key> |
|
4302 </derivekey> |
|
4303 </actionbody> |
|
4304 </action> |
|
4305 |
|
4306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4308 //! @SYMREQ CIT_PREQ1054 |
|
4309 //! @SYMTestPriority medium |
|
4310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4312 <action> |
|
4313 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4314 <actiontype>DeriveKey</actiontype> |
|
4315 <actionbody> |
|
4316 <derivekey> |
|
4317 <kdf>pkcs#12</kdf> |
|
4318 <passwd>0001</passwd> |
|
4319 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4320 <iterations>128</iterations> |
|
4321 <key>79E29F3FCB3777460EC0F43D3D7048A7</key> |
|
4322 </derivekey> |
|
4323 </actionbody> |
|
4324 </action> |
|
4325 |
|
4326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4328 //! @SYMREQ CIT_PREQ1054 |
|
4329 //! @SYMTestPriority medium |
|
4330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4332 <action> |
|
4333 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4334 <actiontype>DeriveKey</actiontype> |
|
4335 <actionbody> |
|
4336 <derivekey> |
|
4337 <kdf>pkcs#12</kdf> |
|
4338 <passwd>PSWD</passwd> |
|
4339 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4340 <iterations>128</iterations> |
|
4341 <key>22A70A865774E55CF08A704356112522</key> |
|
4342 </derivekey> |
|
4343 </actionbody> |
|
4344 </action> |
|
4345 |
|
4346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4348 //! @SYMREQ CIT_PREQ1054 |
|
4349 //! @SYMTestPriority medium |
|
4350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4352 <action> |
|
4353 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4354 <actiontype>DeriveKey</actiontype> |
|
4355 <actionbody> |
|
4356 <derivekey> |
|
4357 <kdf>pkcs#12</kdf> |
|
4358 <passwd>password</passwd> |
|
4359 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4360 <iterations>128</iterations> |
|
4361 <key>9CBA922190F1659F6AA3B2B98347EEC2</key> |
|
4362 </derivekey> |
|
4363 </actionbody> |
|
4364 </action> |
|
4365 |
|
4366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4368 //! @SYMREQ CIT_PREQ1054 |
|
4369 //! @SYMTestPriority medium |
|
4370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4372 <action> |
|
4373 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4374 <actiontype>DeriveKey</actiontype> |
|
4375 <actionbody> |
|
4376 <derivekey> |
|
4377 <kdf>pkcs#12</kdf> |
|
4378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4379 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4380 <iterations>128</iterations> |
|
4381 <key>A037A8B1C20DC883FAABF82D8A591B9E</key> |
|
4382 </derivekey> |
|
4383 </actionbody> |
|
4384 </action> |
|
4385 |
|
4386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4388 //! @SYMREQ CIT_PREQ1054 |
|
4389 //! @SYMTestPriority medium |
|
4390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4392 <action> |
|
4393 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4394 <actiontype>DeriveKey</actiontype> |
|
4395 <actionbody> |
|
4396 <derivekey> |
|
4397 <kdf>pkcs#12</kdf> |
|
4398 <passwd>0000</passwd> |
|
4399 <salt>53414C54</salt> |
|
4400 <iterations>1024</iterations> |
|
4401 <key>82824BE51C81A5FF4C4268E256F6621B</key> |
|
4402 </derivekey> |
|
4403 </actionbody> |
|
4404 </action> |
|
4405 |
|
4406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4408 //! @SYMREQ CIT_PREQ1054 |
|
4409 //! @SYMTestPriority medium |
|
4410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4412 <action> |
|
4413 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4414 <actiontype>DeriveKey</actiontype> |
|
4415 <actionbody> |
|
4416 <derivekey> |
|
4417 <kdf>pkcs#12</kdf> |
|
4418 <passwd>0001</passwd> |
|
4419 <salt>53414C54</salt> |
|
4420 <iterations>1024</iterations> |
|
4421 <key>E166049AC4E765E513AFA8A35DDBE756</key> |
|
4422 </derivekey> |
|
4423 </actionbody> |
|
4424 </action> |
|
4425 |
|
4426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4428 //! @SYMREQ CIT_PREQ1054 |
|
4429 //! @SYMTestPriority medium |
|
4430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4432 <action> |
|
4433 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4434 <actiontype>DeriveKey</actiontype> |
|
4435 <actionbody> |
|
4436 <derivekey> |
|
4437 <kdf>pkcs#12</kdf> |
|
4438 <passwd>PSWD</passwd> |
|
4439 <salt>53414C54</salt> |
|
4440 <iterations>1024</iterations> |
|
4441 <key>90E975CC54F8BDA5A6CED39088716B27</key> |
|
4442 </derivekey> |
|
4443 </actionbody> |
|
4444 </action> |
|
4445 |
|
4446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4448 //! @SYMREQ CIT_PREQ1054 |
|
4449 //! @SYMTestPriority medium |
|
4450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4452 <action> |
|
4453 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4454 <actiontype>DeriveKey</actiontype> |
|
4455 <actionbody> |
|
4456 <derivekey> |
|
4457 <kdf>pkcs#12</kdf> |
|
4458 <passwd>password</passwd> |
|
4459 <salt>53414C54</salt> |
|
4460 <iterations>1024</iterations> |
|
4461 <key>1FFD40D7BBA891A7E6C4DED39FB0740B</key> |
|
4462 </derivekey> |
|
4463 </actionbody> |
|
4464 </action> |
|
4465 |
|
4466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4468 //! @SYMREQ CIT_PREQ1054 |
|
4469 //! @SYMTestPriority medium |
|
4470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4472 <action> |
|
4473 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4474 <actiontype>DeriveKey</actiontype> |
|
4475 <actionbody> |
|
4476 <derivekey> |
|
4477 <kdf>pkcs#12</kdf> |
|
4478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4479 <salt>53414C54</salt> |
|
4480 <iterations>1024</iterations> |
|
4481 <key>406C92305ACD663AB0B9EB66DED79295</key> |
|
4482 </derivekey> |
|
4483 </actionbody> |
|
4484 </action> |
|
4485 |
|
4486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4488 //! @SYMREQ CIT_PREQ1054 |
|
4489 //! @SYMTestPriority medium |
|
4490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4492 <action> |
|
4493 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4494 <actiontype>DeriveKey</actiontype> |
|
4495 <actionbody> |
|
4496 <derivekey> |
|
4497 <kdf>pkcs#12</kdf> |
|
4498 <passwd>0000</passwd> |
|
4499 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4500 <iterations>1024</iterations> |
|
4501 <key>E82BD75AA9467E0B8D92362A56CB5D73</key> |
|
4502 </derivekey> |
|
4503 </actionbody> |
|
4504 </action> |
|
4505 |
|
4506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4508 //! @SYMREQ CIT_PREQ1054 |
|
4509 //! @SYMTestPriority medium |
|
4510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4512 <action> |
|
4513 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4514 <actiontype>DeriveKey</actiontype> |
|
4515 <actionbody> |
|
4516 <derivekey> |
|
4517 <kdf>pkcs#12</kdf> |
|
4518 <passwd>0001</passwd> |
|
4519 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4520 <iterations>1024</iterations> |
|
4521 <key>0182E41FCA166CEAED10972BDF5F57A8</key> |
|
4522 </derivekey> |
|
4523 </actionbody> |
|
4524 </action> |
|
4525 |
|
4526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4528 //! @SYMREQ CIT_PREQ1054 |
|
4529 //! @SYMTestPriority medium |
|
4530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4532 <action> |
|
4533 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4534 <actiontype>DeriveKey</actiontype> |
|
4535 <actionbody> |
|
4536 <derivekey> |
|
4537 <kdf>pkcs#12</kdf> |
|
4538 <passwd>PSWD</passwd> |
|
4539 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4540 <iterations>1024</iterations> |
|
4541 <key>101FB775982CA15E37A065F7CDC5593D</key> |
|
4542 </derivekey> |
|
4543 </actionbody> |
|
4544 </action> |
|
4545 |
|
4546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4548 //! @SYMREQ CIT_PREQ1054 |
|
4549 //! @SYMTestPriority medium |
|
4550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4552 <action> |
|
4553 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4554 <actiontype>DeriveKey</actiontype> |
|
4555 <actionbody> |
|
4556 <derivekey> |
|
4557 <kdf>pkcs#12</kdf> |
|
4558 <passwd>password</passwd> |
|
4559 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4560 <iterations>1024</iterations> |
|
4561 <key>D7499C6A1218C419A1F81AA5E3F41E88</key> |
|
4562 </derivekey> |
|
4563 </actionbody> |
|
4564 </action> |
|
4565 |
|
4566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4568 //! @SYMREQ CIT_PREQ1054 |
|
4569 //! @SYMTestPriority medium |
|
4570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4572 <action> |
|
4573 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4574 <actiontype>DeriveKey</actiontype> |
|
4575 <actionbody> |
|
4576 <derivekey> |
|
4577 <kdf>pkcs#12</kdf> |
|
4578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4579 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4580 <iterations>1024</iterations> |
|
4581 <key>2C6222B8E2E97F63FFE9E2FC32D673FA</key> |
|
4582 </derivekey> |
|
4583 </actionbody> |
|
4584 </action> |
|
4585 |
|
4586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4588 //! @SYMREQ CIT_PREQ1054 |
|
4589 //! @SYMTestPriority medium |
|
4590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4592 <action> |
|
4593 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4594 <actiontype>DeriveKey</actiontype> |
|
4595 <actionbody> |
|
4596 <derivekey> |
|
4597 <kdf>pkcs#12</kdf> |
|
4598 <passwd>0000</passwd> |
|
4599 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4600 <iterations>1024</iterations> |
|
4601 <key>6789F0680A5C5840B8ED34B061494171</key> |
|
4602 </derivekey> |
|
4603 </actionbody> |
|
4604 </action> |
|
4605 |
|
4606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4608 //! @SYMREQ CIT_PREQ1054 |
|
4609 //! @SYMTestPriority medium |
|
4610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4612 <action> |
|
4613 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4614 <actiontype>DeriveKey</actiontype> |
|
4615 <actionbody> |
|
4616 <derivekey> |
|
4617 <kdf>pkcs#12</kdf> |
|
4618 <passwd>0001</passwd> |
|
4619 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4620 <iterations>1024</iterations> |
|
4621 <key>43E663725870C4801A917C41C9B58C41</key> |
|
4622 </derivekey> |
|
4623 </actionbody> |
|
4624 </action> |
|
4625 |
|
4626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4628 //! @SYMREQ CIT_PREQ1054 |
|
4629 //! @SYMTestPriority medium |
|
4630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4632 <action> |
|
4633 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4634 <actiontype>DeriveKey</actiontype> |
|
4635 <actionbody> |
|
4636 <derivekey> |
|
4637 <kdf>pkcs#12</kdf> |
|
4638 <passwd>PSWD</passwd> |
|
4639 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4640 <iterations>1024</iterations> |
|
4641 <key>8B3308BDD5A8AE507200EAA16FE19D42</key> |
|
4642 </derivekey> |
|
4643 </actionbody> |
|
4644 </action> |
|
4645 |
|
4646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4648 //! @SYMREQ CIT_PREQ1054 |
|
4649 //! @SYMTestPriority medium |
|
4650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4652 <action> |
|
4653 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4654 <actiontype>DeriveKey</actiontype> |
|
4655 <actionbody> |
|
4656 <derivekey> |
|
4657 <kdf>pkcs#12</kdf> |
|
4658 <passwd>password</passwd> |
|
4659 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4660 <iterations>1024</iterations> |
|
4661 <key>CA202602C9A265559B6B96729B574DAA</key> |
|
4662 </derivekey> |
|
4663 </actionbody> |
|
4664 </action> |
|
4665 |
|
4666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4668 //! @SYMREQ CIT_PREQ1054 |
|
4669 //! @SYMTestPriority medium |
|
4670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4672 <action> |
|
4673 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4674 <actiontype>DeriveKey</actiontype> |
|
4675 <actionbody> |
|
4676 <derivekey> |
|
4677 <kdf>pkcs#12</kdf> |
|
4678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4679 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4680 <iterations>1024</iterations> |
|
4681 <key>F6A33ADA6A0F5990E9DA747550DE0941</key> |
|
4682 </derivekey> |
|
4683 </actionbody> |
|
4684 </action> |
|
4685 |
|
4686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4688 //! @SYMREQ CIT_PREQ1054 |
|
4689 //! @SYMTestPriority medium |
|
4690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4692 <action> |
|
4693 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4694 <actiontype>DeriveKey</actiontype> |
|
4695 <actionbody> |
|
4696 <derivekey> |
|
4697 <kdf>pkcs#12</kdf> |
|
4698 <passwd>0000</passwd> |
|
4699 <salt>53414C54</salt> |
|
4700 <iterations>1536</iterations> |
|
4701 <key>79A4E1398F511B262E60DCFE9E838C93</key> |
|
4702 </derivekey> |
|
4703 </actionbody> |
|
4704 </action> |
|
4705 |
|
4706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4708 //! @SYMREQ CIT_PREQ1054 |
|
4709 //! @SYMTestPriority medium |
|
4710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4712 <action> |
|
4713 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4714 <actiontype>DeriveKey</actiontype> |
|
4715 <actionbody> |
|
4716 <derivekey> |
|
4717 <kdf>pkcs#12</kdf> |
|
4718 <passwd>0001</passwd> |
|
4719 <salt>53414C54</salt> |
|
4720 <iterations>1536</iterations> |
|
4721 <key>6F2402CCE4A91C1B848CCABD915657A2</key> |
|
4722 </derivekey> |
|
4723 </actionbody> |
|
4724 </action> |
|
4725 |
|
4726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4728 //! @SYMREQ CIT_PREQ1054 |
|
4729 //! @SYMTestPriority medium |
|
4730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4732 <action> |
|
4733 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4734 <actiontype>DeriveKey</actiontype> |
|
4735 <actionbody> |
|
4736 <derivekey> |
|
4737 <kdf>pkcs#12</kdf> |
|
4738 <passwd>PSWD</passwd> |
|
4739 <salt>53414C54</salt> |
|
4740 <iterations>1536</iterations> |
|
4741 <key>B9ED7B3135488439E78DF480AD845E7E</key> |
|
4742 </derivekey> |
|
4743 </actionbody> |
|
4744 </action> |
|
4745 |
|
4746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4748 //! @SYMREQ CIT_PREQ1054 |
|
4749 //! @SYMTestPriority medium |
|
4750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4752 <action> |
|
4753 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4754 <actiontype>DeriveKey</actiontype> |
|
4755 <actionbody> |
|
4756 <derivekey> |
|
4757 <kdf>pkcs#12</kdf> |
|
4758 <passwd>password</passwd> |
|
4759 <salt>53414C54</salt> |
|
4760 <iterations>1536</iterations> |
|
4761 <key>65B27A78C72DFEEA6C92846330CE98C6</key> |
|
4762 </derivekey> |
|
4763 </actionbody> |
|
4764 </action> |
|
4765 |
|
4766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4768 //! @SYMREQ CIT_PREQ1054 |
|
4769 //! @SYMTestPriority medium |
|
4770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4772 <action> |
|
4773 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4774 <actiontype>DeriveKey</actiontype> |
|
4775 <actionbody> |
|
4776 <derivekey> |
|
4777 <kdf>pkcs#12</kdf> |
|
4778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4779 <salt>53414C54</salt> |
|
4780 <iterations>1536</iterations> |
|
4781 <key>8F8FC96A3D958731780B50E843D6BB65</key> |
|
4782 </derivekey> |
|
4783 </actionbody> |
|
4784 </action> |
|
4785 |
|
4786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4788 //! @SYMREQ CIT_PREQ1054 |
|
4789 //! @SYMTestPriority medium |
|
4790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4792 <action> |
|
4793 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4794 <actiontype>DeriveKey</actiontype> |
|
4795 <actionbody> |
|
4796 <derivekey> |
|
4797 <kdf>pkcs#12</kdf> |
|
4798 <passwd>0000</passwd> |
|
4799 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4800 <iterations>1536</iterations> |
|
4801 <key>642DDC3F4E11C3051D6CDED8DD898C4C</key> |
|
4802 </derivekey> |
|
4803 </actionbody> |
|
4804 </action> |
|
4805 |
|
4806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4808 //! @SYMREQ CIT_PREQ1054 |
|
4809 //! @SYMTestPriority medium |
|
4810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4812 <action> |
|
4813 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4814 <actiontype>DeriveKey</actiontype> |
|
4815 <actionbody> |
|
4816 <derivekey> |
|
4817 <kdf>pkcs#12</kdf> |
|
4818 <passwd>0001</passwd> |
|
4819 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4820 <iterations>1536</iterations> |
|
4821 <key>0FE4BDC1000D1AC2F5E83A938A2BE2F1</key> |
|
4822 </derivekey> |
|
4823 </actionbody> |
|
4824 </action> |
|
4825 |
|
4826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4828 //! @SYMREQ CIT_PREQ1054 |
|
4829 //! @SYMTestPriority medium |
|
4830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4832 <action> |
|
4833 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4834 <actiontype>DeriveKey</actiontype> |
|
4835 <actionbody> |
|
4836 <derivekey> |
|
4837 <kdf>pkcs#12</kdf> |
|
4838 <passwd>PSWD</passwd> |
|
4839 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4840 <iterations>1536</iterations> |
|
4841 <key>32D7F10C5EAA9961B590E8FE4561B9D5</key> |
|
4842 </derivekey> |
|
4843 </actionbody> |
|
4844 </action> |
|
4845 |
|
4846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4848 //! @SYMREQ CIT_PREQ1054 |
|
4849 //! @SYMTestPriority medium |
|
4850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4852 <action> |
|
4853 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4854 <actiontype>DeriveKey</actiontype> |
|
4855 <actionbody> |
|
4856 <derivekey> |
|
4857 <kdf>pkcs#12</kdf> |
|
4858 <passwd>password</passwd> |
|
4859 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4860 <iterations>1536</iterations> |
|
4861 <key>C05FE26245C742CC01B23C655E5D934D</key> |
|
4862 </derivekey> |
|
4863 </actionbody> |
|
4864 </action> |
|
4865 |
|
4866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4868 //! @SYMREQ CIT_PREQ1054 |
|
4869 //! @SYMTestPriority medium |
|
4870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4872 <action> |
|
4873 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
4874 <actiontype>DeriveKey</actiontype> |
|
4875 <actionbody> |
|
4876 <derivekey> |
|
4877 <kdf>pkcs#12</kdf> |
|
4878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4879 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
4880 <iterations>1536</iterations> |
|
4881 <key>818C967A8F742565CCA37CEA8C683FCC</key> |
|
4882 </derivekey> |
|
4883 </actionbody> |
|
4884 </action> |
|
4885 |
|
4886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4888 //! @SYMREQ CIT_PREQ1054 |
|
4889 //! @SYMTestPriority medium |
|
4890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4892 <action> |
|
4893 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4894 <actiontype>DeriveKey</actiontype> |
|
4895 <actionbody> |
|
4896 <derivekey> |
|
4897 <kdf>pkcs#12</kdf> |
|
4898 <passwd>0000</passwd> |
|
4899 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4900 <iterations>1536</iterations> |
|
4901 <key>5301B5B2A1A6EB6832DC47F3A0850B56</key> |
|
4902 </derivekey> |
|
4903 </actionbody> |
|
4904 </action> |
|
4905 |
|
4906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4908 //! @SYMREQ CIT_PREQ1054 |
|
4909 //! @SYMTestPriority medium |
|
4910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4912 <action> |
|
4913 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4914 <actiontype>DeriveKey</actiontype> |
|
4915 <actionbody> |
|
4916 <derivekey> |
|
4917 <kdf>pkcs#12</kdf> |
|
4918 <passwd>0001</passwd> |
|
4919 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4920 <iterations>1536</iterations> |
|
4921 <key>9CB5BD2394B268E13DCA91EE2BB0A39C</key> |
|
4922 </derivekey> |
|
4923 </actionbody> |
|
4924 </action> |
|
4925 |
|
4926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4928 //! @SYMREQ CIT_PREQ1054 |
|
4929 //! @SYMTestPriority medium |
|
4930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4932 <action> |
|
4933 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4934 <actiontype>DeriveKey</actiontype> |
|
4935 <actionbody> |
|
4936 <derivekey> |
|
4937 <kdf>pkcs#12</kdf> |
|
4938 <passwd>PSWD</passwd> |
|
4939 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4940 <iterations>1536</iterations> |
|
4941 <key>EB90D956B358B7C5E9FC4A4EFA02589B</key> |
|
4942 </derivekey> |
|
4943 </actionbody> |
|
4944 </action> |
|
4945 |
|
4946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4948 //! @SYMREQ CIT_PREQ1054 |
|
4949 //! @SYMTestPriority medium |
|
4950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4952 <action> |
|
4953 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4954 <actiontype>DeriveKey</actiontype> |
|
4955 <actionbody> |
|
4956 <derivekey> |
|
4957 <kdf>pkcs#12</kdf> |
|
4958 <passwd>password</passwd> |
|
4959 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4960 <iterations>1536</iterations> |
|
4961 <key>ACAFB5EB24FFB3B418587B832F52C226</key> |
|
4962 </derivekey> |
|
4963 </actionbody> |
|
4964 </action> |
|
4965 |
|
4966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4968 //! @SYMREQ CIT_PREQ1054 |
|
4969 //! @SYMTestPriority medium |
|
4970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4972 <action> |
|
4973 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
4974 <actiontype>DeriveKey</actiontype> |
|
4975 <actionbody> |
|
4976 <derivekey> |
|
4977 <kdf>pkcs#12</kdf> |
|
4978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
4979 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
4980 <iterations>1536</iterations> |
|
4981 <key>A7B0859D9D1BF5E59047192BF2B8C7AC</key> |
|
4982 </derivekey> |
|
4983 </actionbody> |
|
4984 </action> |
|
4985 |
|
4986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
4987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
4988 //! @SYMREQ CIT_PREQ1054 |
|
4989 //! @SYMTestPriority medium |
|
4990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
4991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
4992 <action> |
|
4993 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
4994 <actiontype>DeriveKey</actiontype> |
|
4995 <actionbody> |
|
4996 <derivekey> |
|
4997 <kdf>pkcs#12</kdf> |
|
4998 <passwd>0000</passwd> |
|
4999 <salt>53414C54</salt> |
|
5000 <iterations>2048</iterations> |
|
5001 <key>B0F0F2EB445AB4DBE901D3C248482259</key> |
|
5002 </derivekey> |
|
5003 </actionbody> |
|
5004 </action> |
|
5005 |
|
5006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5008 //! @SYMREQ CIT_PREQ1054 |
|
5009 //! @SYMTestPriority medium |
|
5010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5012 <action> |
|
5013 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
5014 <actiontype>DeriveKey</actiontype> |
|
5015 <actionbody> |
|
5016 <derivekey> |
|
5017 <kdf>pkcs#12</kdf> |
|
5018 <passwd>0001</passwd> |
|
5019 <salt>53414C54</salt> |
|
5020 <iterations>2048</iterations> |
|
5021 <key>C11C0499CC9EC9FBB6ACA7BF4C0B5389</key> |
|
5022 </derivekey> |
|
5023 </actionbody> |
|
5024 </action> |
|
5025 |
|
5026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5028 //! @SYMREQ CIT_PREQ1054 |
|
5029 //! @SYMTestPriority medium |
|
5030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5032 <action> |
|
5033 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
5034 <actiontype>DeriveKey</actiontype> |
|
5035 <actionbody> |
|
5036 <derivekey> |
|
5037 <kdf>pkcs#12</kdf> |
|
5038 <passwd>PSWD</passwd> |
|
5039 <salt>53414C54</salt> |
|
5040 <iterations>2048</iterations> |
|
5041 <key>3F63500AC41074B4D2C1A991CBBBB013</key> |
|
5042 </derivekey> |
|
5043 </actionbody> |
|
5044 </action> |
|
5045 |
|
5046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5048 //! @SYMREQ CIT_PREQ1054 |
|
5049 //! @SYMTestPriority medium |
|
5050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5052 <action> |
|
5053 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
5054 <actiontype>DeriveKey</actiontype> |
|
5055 <actionbody> |
|
5056 <derivekey> |
|
5057 <kdf>pkcs#12</kdf> |
|
5058 <passwd>password</passwd> |
|
5059 <salt>53414C54</salt> |
|
5060 <iterations>2048</iterations> |
|
5061 <key>B47F802F1238A73054DEFD7D3AABFC81</key> |
|
5062 </derivekey> |
|
5063 </actionbody> |
|
5064 </action> |
|
5065 |
|
5066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5068 //! @SYMREQ CIT_PREQ1054 |
|
5069 //! @SYMTestPriority medium |
|
5070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5072 <action> |
|
5073 <actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname> |
|
5074 <actiontype>DeriveKey</actiontype> |
|
5075 <actionbody> |
|
5076 <derivekey> |
|
5077 <kdf>pkcs#12</kdf> |
|
5078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5079 <salt>53414C54</salt> |
|
5080 <iterations>2048</iterations> |
|
5081 <key>3099237692953AB2017A1BF0B12DAFC8</key> |
|
5082 </derivekey> |
|
5083 </actionbody> |
|
5084 </action> |
|
5085 |
|
5086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5088 //! @SYMREQ CIT_PREQ1054 |
|
5089 //! @SYMTestPriority medium |
|
5090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5092 <action> |
|
5093 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
5094 <actiontype>DeriveKey</actiontype> |
|
5095 <actionbody> |
|
5096 <derivekey> |
|
5097 <kdf>pkcs#12</kdf> |
|
5098 <passwd>0000</passwd> |
|
5099 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5100 <iterations>2048</iterations> |
|
5101 <key>CD045229461658BC6C47C259F2D20433</key> |
|
5102 </derivekey> |
|
5103 </actionbody> |
|
5104 </action> |
|
5105 |
|
5106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5108 //! @SYMREQ CIT_PREQ1054 |
|
5109 //! @SYMTestPriority medium |
|
5110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5112 <action> |
|
5113 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
5114 <actiontype>DeriveKey</actiontype> |
|
5115 <actionbody> |
|
5116 <derivekey> |
|
5117 <kdf>pkcs#12</kdf> |
|
5118 <passwd>0001</passwd> |
|
5119 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5120 <iterations>2048</iterations> |
|
5121 <key>D85432F8ACAE9653D34A68D9329F347A</key> |
|
5122 </derivekey> |
|
5123 </actionbody> |
|
5124 </action> |
|
5125 |
|
5126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5128 //! @SYMREQ CIT_PREQ1054 |
|
5129 //! @SYMTestPriority medium |
|
5130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5132 <action> |
|
5133 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
5134 <actiontype>DeriveKey</actiontype> |
|
5135 <actionbody> |
|
5136 <derivekey> |
|
5137 <kdf>pkcs#12</kdf> |
|
5138 <passwd>PSWD</passwd> |
|
5139 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5140 <iterations>2048</iterations> |
|
5141 <key>C77FDE2E52892DF5613E6A3B8F1C80B9</key> |
|
5142 </derivekey> |
|
5143 </actionbody> |
|
5144 </action> |
|
5145 |
|
5146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5148 //! @SYMREQ CIT_PREQ1054 |
|
5149 //! @SYMTestPriority medium |
|
5150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5152 <action> |
|
5153 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
5154 <actiontype>DeriveKey</actiontype> |
|
5155 <actionbody> |
|
5156 <derivekey> |
|
5157 <kdf>pkcs#12</kdf> |
|
5158 <passwd>password</passwd> |
|
5159 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5160 <iterations>2048</iterations> |
|
5161 <key>62E06B8A2650199AE6E73AB3F503BF02</key> |
|
5162 </derivekey> |
|
5163 </actionbody> |
|
5164 </action> |
|
5165 |
|
5166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5168 //! @SYMREQ CIT_PREQ1054 |
|
5169 //! @SYMTestPriority medium |
|
5170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5172 <action> |
|
5173 <actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname> |
|
5174 <actiontype>DeriveKey</actiontype> |
|
5175 <actionbody> |
|
5176 <derivekey> |
|
5177 <kdf>pkcs#12</kdf> |
|
5178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5179 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5180 <iterations>2048</iterations> |
|
5181 <key>A5B348EB4926290B223724CC8E4ED67F</key> |
|
5182 </derivekey> |
|
5183 </actionbody> |
|
5184 </action> |
|
5185 |
|
5186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5188 //! @SYMREQ CIT_PREQ1054 |
|
5189 //! @SYMTestPriority medium |
|
5190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5192 <action> |
|
5193 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
5194 <actiontype>DeriveKey</actiontype> |
|
5195 <actionbody> |
|
5196 <derivekey> |
|
5197 <kdf>pkcs#12</kdf> |
|
5198 <passwd>0000</passwd> |
|
5199 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5200 <iterations>2048</iterations> |
|
5201 <key>2A824C1B6B36AD48D0A5AE94E27988D4</key> |
|
5202 </derivekey> |
|
5203 </actionbody> |
|
5204 </action> |
|
5205 |
|
5206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5208 //! @SYMREQ CIT_PREQ1054 |
|
5209 //! @SYMTestPriority medium |
|
5210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5212 <action> |
|
5213 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
5214 <actiontype>DeriveKey</actiontype> |
|
5215 <actionbody> |
|
5216 <derivekey> |
|
5217 <kdf>pkcs#12</kdf> |
|
5218 <passwd>0001</passwd> |
|
5219 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5220 <iterations>2048</iterations> |
|
5221 <key>4B8D18B96EB898D1BAA8BDD82BC443F0</key> |
|
5222 </derivekey> |
|
5223 </actionbody> |
|
5224 </action> |
|
5225 |
|
5226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5228 //! @SYMREQ CIT_PREQ1054 |
|
5229 //! @SYMTestPriority medium |
|
5230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5232 <action> |
|
5233 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
5234 <actiontype>DeriveKey</actiontype> |
|
5235 <actionbody> |
|
5236 <derivekey> |
|
5237 <kdf>pkcs#12</kdf> |
|
5238 <passwd>PSWD</passwd> |
|
5239 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5240 <iterations>2048</iterations> |
|
5241 <key>9DABF586AD2BCD603DC38C3987C98D73</key> |
|
5242 </derivekey> |
|
5243 </actionbody> |
|
5244 </action> |
|
5245 |
|
5246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5248 //! @SYMREQ CIT_PREQ1054 |
|
5249 //! @SYMTestPriority medium |
|
5250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5252 <action> |
|
5253 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
5254 <actiontype>DeriveKey</actiontype> |
|
5255 <actionbody> |
|
5256 <derivekey> |
|
5257 <kdf>pkcs#12</kdf> |
|
5258 <passwd>password</passwd> |
|
5259 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5260 <iterations>2048</iterations> |
|
5261 <key>F734BE1BF990A3A59CEA6C821492F0B6</key> |
|
5262 </derivekey> |
|
5263 </actionbody> |
|
5264 </action> |
|
5265 |
|
5266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5268 //! @SYMREQ CIT_PREQ1054 |
|
5269 //! @SYMTestPriority medium |
|
5270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5272 <action> |
|
5273 <actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname> |
|
5274 <actiontype>DeriveKey</actiontype> |
|
5275 <actionbody> |
|
5276 <derivekey> |
|
5277 <kdf>pkcs#12</kdf> |
|
5278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5279 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5280 <iterations>2048</iterations> |
|
5281 <key>47C18634A09AB37AB6EECBCD5C7E7F23</key> |
|
5282 </derivekey> |
|
5283 </actionbody> |
|
5284 </action> |
|
5285 |
|
5286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5288 //! @SYMREQ CIT_PREQ1054 |
|
5289 //! @SYMTestPriority medium |
|
5290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5292 <action> |
|
5293 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5294 <actiontype>DeriveKey</actiontype> |
|
5295 <actionbody> |
|
5296 <derivekey> |
|
5297 <kdf>pkcs#12</kdf> |
|
5298 <passwd>0000</passwd> |
|
5299 <salt>53414C54</salt> |
|
5300 <iterations>1</iterations> |
|
5301 <key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7</key> |
|
5302 </derivekey> |
|
5303 </actionbody> |
|
5304 </action> |
|
5305 |
|
5306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5308 //! @SYMREQ CIT_PREQ1054 |
|
5309 //! @SYMTestPriority medium |
|
5310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5312 <action> |
|
5313 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5314 <actiontype>DeriveKey</actiontype> |
|
5315 <actionbody> |
|
5316 <derivekey> |
|
5317 <kdf>pkcs#12</kdf> |
|
5318 <passwd>0001</passwd> |
|
5319 <salt>53414C54</salt> |
|
5320 <iterations>1</iterations> |
|
5321 <key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B</key> |
|
5322 </derivekey> |
|
5323 </actionbody> |
|
5324 </action> |
|
5325 |
|
5326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5328 //! @SYMREQ CIT_PREQ1054 |
|
5329 //! @SYMTestPriority medium |
|
5330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5332 <action> |
|
5333 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5334 <actiontype>DeriveKey</actiontype> |
|
5335 <actionbody> |
|
5336 <derivekey> |
|
5337 <kdf>pkcs#12</kdf> |
|
5338 <passwd>PSWD</passwd> |
|
5339 <salt>53414C54</salt> |
|
5340 <iterations>1</iterations> |
|
5341 <key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB09599</key> |
|
5342 </derivekey> |
|
5343 </actionbody> |
|
5344 </action> |
|
5345 |
|
5346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5348 //! @SYMREQ CIT_PREQ1054 |
|
5349 //! @SYMTestPriority medium |
|
5350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5352 <action> |
|
5353 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5354 <actiontype>DeriveKey</actiontype> |
|
5355 <actionbody> |
|
5356 <derivekey> |
|
5357 <kdf>pkcs#12</kdf> |
|
5358 <passwd>password</passwd> |
|
5359 <salt>53414C54</salt> |
|
5360 <iterations>1</iterations> |
|
5361 <key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C5</key> |
|
5362 </derivekey> |
|
5363 </actionbody> |
|
5364 </action> |
|
5365 |
|
5366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5368 //! @SYMREQ CIT_PREQ1054 |
|
5369 //! @SYMTestPriority medium |
|
5370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5372 <action> |
|
5373 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5374 <actiontype>DeriveKey</actiontype> |
|
5375 <actionbody> |
|
5376 <derivekey> |
|
5377 <kdf>pkcs#12</kdf> |
|
5378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5379 <salt>53414C54</salt> |
|
5380 <iterations>1</iterations> |
|
5381 <key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A</key> |
|
5382 </derivekey> |
|
5383 </actionbody> |
|
5384 </action> |
|
5385 |
|
5386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5388 //! @SYMREQ CIT_PREQ1054 |
|
5389 //! @SYMTestPriority medium |
|
5390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5392 <action> |
|
5393 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5394 <actiontype>DeriveKey</actiontype> |
|
5395 <actionbody> |
|
5396 <derivekey> |
|
5397 <kdf>pkcs#12</kdf> |
|
5398 <passwd>0000</passwd> |
|
5399 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5400 <iterations>1</iterations> |
|
5401 <key>49CABE7B67736931126499722509C03D4BBEF714A8</key> |
|
5402 </derivekey> |
|
5403 </actionbody> |
|
5404 </action> |
|
5405 |
|
5406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5408 //! @SYMREQ CIT_PREQ1054 |
|
5409 //! @SYMTestPriority medium |
|
5410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5412 <action> |
|
5413 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5414 <actiontype>DeriveKey</actiontype> |
|
5415 <actionbody> |
|
5416 <derivekey> |
|
5417 <kdf>pkcs#12</kdf> |
|
5418 <passwd>0001</passwd> |
|
5419 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5420 <iterations>1</iterations> |
|
5421 <key>F994B990D3554AFB778C729E9BAA0CC6EB5BA76534</key> |
|
5422 </derivekey> |
|
5423 </actionbody> |
|
5424 </action> |
|
5425 |
|
5426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5428 //! @SYMREQ CIT_PREQ1054 |
|
5429 //! @SYMTestPriority medium |
|
5430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5432 <action> |
|
5433 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5434 <actiontype>DeriveKey</actiontype> |
|
5435 <actionbody> |
|
5436 <derivekey> |
|
5437 <kdf>pkcs#12</kdf> |
|
5438 <passwd>PSWD</passwd> |
|
5439 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5440 <iterations>1</iterations> |
|
5441 <key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC024</key> |
|
5442 </derivekey> |
|
5443 </actionbody> |
|
5444 </action> |
|
5445 |
|
5446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5448 //! @SYMREQ CIT_PREQ1054 |
|
5449 //! @SYMTestPriority medium |
|
5450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5452 <action> |
|
5453 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5454 <actiontype>DeriveKey</actiontype> |
|
5455 <actionbody> |
|
5456 <derivekey> |
|
5457 <kdf>pkcs#12</kdf> |
|
5458 <passwd>password</passwd> |
|
5459 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5460 <iterations>1</iterations> |
|
5461 <key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888</key> |
|
5462 </derivekey> |
|
5463 </actionbody> |
|
5464 </action> |
|
5465 |
|
5466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5468 //! @SYMREQ CIT_PREQ1054 |
|
5469 //! @SYMTestPriority medium |
|
5470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5472 <action> |
|
5473 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5474 <actiontype>DeriveKey</actiontype> |
|
5475 <actionbody> |
|
5476 <derivekey> |
|
5477 <kdf>pkcs#12</kdf> |
|
5478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5479 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5480 <iterations>1</iterations> |
|
5481 <key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B</key> |
|
5482 </derivekey> |
|
5483 </actionbody> |
|
5484 </action> |
|
5485 |
|
5486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5488 //! @SYMREQ CIT_PREQ1054 |
|
5489 //! @SYMTestPriority medium |
|
5490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5492 <action> |
|
5493 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5494 <actiontype>DeriveKey</actiontype> |
|
5495 <actionbody> |
|
5496 <derivekey> |
|
5497 <kdf>pkcs#12</kdf> |
|
5498 <passwd>0000</passwd> |
|
5499 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5500 <iterations>1</iterations> |
|
5501 <key>90253A49C069E7FF35281461A4DDBE0BB38F4041A0</key> |
|
5502 </derivekey> |
|
5503 </actionbody> |
|
5504 </action> |
|
5505 |
|
5506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5508 //! @SYMREQ CIT_PREQ1054 |
|
5509 //! @SYMTestPriority medium |
|
5510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5512 <action> |
|
5513 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5514 <actiontype>DeriveKey</actiontype> |
|
5515 <actionbody> |
|
5516 <derivekey> |
|
5517 <kdf>pkcs#12</kdf> |
|
5518 <passwd>0001</passwd> |
|
5519 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5520 <iterations>1</iterations> |
|
5521 <key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8</key> |
|
5522 </derivekey> |
|
5523 </actionbody> |
|
5524 </action> |
|
5525 |
|
5526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5528 //! @SYMREQ CIT_PREQ1054 |
|
5529 //! @SYMTestPriority medium |
|
5530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5532 <action> |
|
5533 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5534 <actiontype>DeriveKey</actiontype> |
|
5535 <actionbody> |
|
5536 <derivekey> |
|
5537 <kdf>pkcs#12</kdf> |
|
5538 <passwd>PSWD</passwd> |
|
5539 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5540 <iterations>1</iterations> |
|
5541 <key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC8</key> |
|
5542 </derivekey> |
|
5543 </actionbody> |
|
5544 </action> |
|
5545 |
|
5546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5548 //! @SYMREQ CIT_PREQ1054 |
|
5549 //! @SYMTestPriority medium |
|
5550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5552 <action> |
|
5553 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5554 <actiontype>DeriveKey</actiontype> |
|
5555 <actionbody> |
|
5556 <derivekey> |
|
5557 <kdf>pkcs#12</kdf> |
|
5558 <passwd>password</passwd> |
|
5559 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5560 <iterations>1</iterations> |
|
5561 <key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C1</key> |
|
5562 </derivekey> |
|
5563 </actionbody> |
|
5564 </action> |
|
5565 |
|
5566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5568 //! @SYMREQ CIT_PREQ1054 |
|
5569 //! @SYMTestPriority medium |
|
5570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5572 <action> |
|
5573 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5574 <actiontype>DeriveKey</actiontype> |
|
5575 <actionbody> |
|
5576 <derivekey> |
|
5577 <kdf>pkcs#12</kdf> |
|
5578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5579 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5580 <iterations>1</iterations> |
|
5581 <key>27476572AF26E99AB85CD350DC802ABA3A831332A7</key> |
|
5582 </derivekey> |
|
5583 </actionbody> |
|
5584 </action> |
|
5585 |
|
5586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5588 //! @SYMREQ CIT_PREQ1054 |
|
5589 //! @SYMTestPriority medium |
|
5590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5592 <action> |
|
5593 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5594 <actiontype>DeriveKey</actiontype> |
|
5595 <actionbody> |
|
5596 <derivekey> |
|
5597 <kdf>pkcs#12</kdf> |
|
5598 <passwd>0000</passwd> |
|
5599 <salt>53414C54</salt> |
|
5600 <iterations>2</iterations> |
|
5601 <key>A1D9010A6761CB2675F1C33BB3C5215851703D0D26</key> |
|
5602 </derivekey> |
|
5603 </actionbody> |
|
5604 </action> |
|
5605 |
|
5606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5608 //! @SYMREQ CIT_PREQ1054 |
|
5609 //! @SYMTestPriority medium |
|
5610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5612 <action> |
|
5613 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5614 <actiontype>DeriveKey</actiontype> |
|
5615 <actionbody> |
|
5616 <derivekey> |
|
5617 <kdf>pkcs#12</kdf> |
|
5618 <passwd>0001</passwd> |
|
5619 <salt>53414C54</salt> |
|
5620 <iterations>2</iterations> |
|
5621 <key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47</key> |
|
5622 </derivekey> |
|
5623 </actionbody> |
|
5624 </action> |
|
5625 |
|
5626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5628 //! @SYMREQ CIT_PREQ1054 |
|
5629 //! @SYMTestPriority medium |
|
5630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5632 <action> |
|
5633 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5634 <actiontype>DeriveKey</actiontype> |
|
5635 <actionbody> |
|
5636 <derivekey> |
|
5637 <kdf>pkcs#12</kdf> |
|
5638 <passwd>PSWD</passwd> |
|
5639 <salt>53414C54</salt> |
|
5640 <iterations>2</iterations> |
|
5641 <key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE3</key> |
|
5642 </derivekey> |
|
5643 </actionbody> |
|
5644 </action> |
|
5645 |
|
5646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5648 //! @SYMREQ CIT_PREQ1054 |
|
5649 //! @SYMTestPriority medium |
|
5650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5652 <action> |
|
5653 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5654 <actiontype>DeriveKey</actiontype> |
|
5655 <actionbody> |
|
5656 <derivekey> |
|
5657 <kdf>pkcs#12</kdf> |
|
5658 <passwd>password</passwd> |
|
5659 <salt>53414C54</salt> |
|
5660 <iterations>2</iterations> |
|
5661 <key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A</key> |
|
5662 </derivekey> |
|
5663 </actionbody> |
|
5664 </action> |
|
5665 |
|
5666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5668 //! @SYMREQ CIT_PREQ1054 |
|
5669 //! @SYMTestPriority medium |
|
5670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5672 <action> |
|
5673 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5674 <actiontype>DeriveKey</actiontype> |
|
5675 <actionbody> |
|
5676 <derivekey> |
|
5677 <kdf>pkcs#12</kdf> |
|
5678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5679 <salt>53414C54</salt> |
|
5680 <iterations>2</iterations> |
|
5681 <key>5BF185C726EE2182888A834066C30BA92C0A6A140F</key> |
|
5682 </derivekey> |
|
5683 </actionbody> |
|
5684 </action> |
|
5685 |
|
5686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5688 //! @SYMREQ CIT_PREQ1054 |
|
5689 //! @SYMTestPriority medium |
|
5690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5692 <action> |
|
5693 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5694 <actiontype>DeriveKey</actiontype> |
|
5695 <actionbody> |
|
5696 <derivekey> |
|
5697 <kdf>pkcs#12</kdf> |
|
5698 <passwd>0000</passwd> |
|
5699 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5700 <iterations>2</iterations> |
|
5701 <key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734</key> |
|
5702 </derivekey> |
|
5703 </actionbody> |
|
5704 </action> |
|
5705 |
|
5706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5708 //! @SYMREQ CIT_PREQ1054 |
|
5709 //! @SYMTestPriority medium |
|
5710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5712 <action> |
|
5713 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5714 <actiontype>DeriveKey</actiontype> |
|
5715 <actionbody> |
|
5716 <derivekey> |
|
5717 <kdf>pkcs#12</kdf> |
|
5718 <passwd>0001</passwd> |
|
5719 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5720 <iterations>2</iterations> |
|
5721 <key>63E6DF459C899D72577C20FFE4F27670F3A85EA780</key> |
|
5722 </derivekey> |
|
5723 </actionbody> |
|
5724 </action> |
|
5725 |
|
5726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5728 //! @SYMREQ CIT_PREQ1054 |
|
5729 //! @SYMTestPriority medium |
|
5730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5732 <action> |
|
5733 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5734 <actiontype>DeriveKey</actiontype> |
|
5735 <actionbody> |
|
5736 <derivekey> |
|
5737 <kdf>pkcs#12</kdf> |
|
5738 <passwd>PSWD</passwd> |
|
5739 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5740 <iterations>2</iterations> |
|
5741 <key>C2099204ABFBB841875BD7595A89D31A9D03A34B94</key> |
|
5742 </derivekey> |
|
5743 </actionbody> |
|
5744 </action> |
|
5745 |
|
5746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5748 //! @SYMREQ CIT_PREQ1054 |
|
5749 //! @SYMTestPriority medium |
|
5750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5752 <action> |
|
5753 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5754 <actiontype>DeriveKey</actiontype> |
|
5755 <actionbody> |
|
5756 <derivekey> |
|
5757 <kdf>pkcs#12</kdf> |
|
5758 <passwd>password</passwd> |
|
5759 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5760 <iterations>2</iterations> |
|
5761 <key>3204D28A32DF299B612958906C79154AED69D3F1C0</key> |
|
5762 </derivekey> |
|
5763 </actionbody> |
|
5764 </action> |
|
5765 |
|
5766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5768 //! @SYMREQ CIT_PREQ1054 |
|
5769 //! @SYMTestPriority medium |
|
5770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5772 <action> |
|
5773 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5774 <actiontype>DeriveKey</actiontype> |
|
5775 <actionbody> |
|
5776 <derivekey> |
|
5777 <kdf>pkcs#12</kdf> |
|
5778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5779 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
5780 <iterations>2</iterations> |
|
5781 <key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04</key> |
|
5782 </derivekey> |
|
5783 </actionbody> |
|
5784 </action> |
|
5785 |
|
5786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5788 //! @SYMREQ CIT_PREQ1054 |
|
5789 //! @SYMTestPriority medium |
|
5790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5792 <action> |
|
5793 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5794 <actiontype>DeriveKey</actiontype> |
|
5795 <actionbody> |
|
5796 <derivekey> |
|
5797 <kdf>pkcs#12</kdf> |
|
5798 <passwd>0000</passwd> |
|
5799 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5800 <iterations>2</iterations> |
|
5801 <key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11</key> |
|
5802 </derivekey> |
|
5803 </actionbody> |
|
5804 </action> |
|
5805 |
|
5806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5808 //! @SYMREQ CIT_PREQ1054 |
|
5809 //! @SYMTestPriority medium |
|
5810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5812 <action> |
|
5813 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5814 <actiontype>DeriveKey</actiontype> |
|
5815 <actionbody> |
|
5816 <derivekey> |
|
5817 <kdf>pkcs#12</kdf> |
|
5818 <passwd>0001</passwd> |
|
5819 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5820 <iterations>2</iterations> |
|
5821 <key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC</key> |
|
5822 </derivekey> |
|
5823 </actionbody> |
|
5824 </action> |
|
5825 |
|
5826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5828 //! @SYMREQ CIT_PREQ1054 |
|
5829 //! @SYMTestPriority medium |
|
5830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5832 <action> |
|
5833 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5834 <actiontype>DeriveKey</actiontype> |
|
5835 <actionbody> |
|
5836 <derivekey> |
|
5837 <kdf>pkcs#12</kdf> |
|
5838 <passwd>PSWD</passwd> |
|
5839 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5840 <iterations>2</iterations> |
|
5841 <key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F</key> |
|
5842 </derivekey> |
|
5843 </actionbody> |
|
5844 </action> |
|
5845 |
|
5846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5848 //! @SYMREQ CIT_PREQ1054 |
|
5849 //! @SYMTestPriority medium |
|
5850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5852 <action> |
|
5853 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5854 <actiontype>DeriveKey</actiontype> |
|
5855 <actionbody> |
|
5856 <derivekey> |
|
5857 <kdf>pkcs#12</kdf> |
|
5858 <passwd>password</passwd> |
|
5859 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5860 <iterations>2</iterations> |
|
5861 <key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDF</key> |
|
5862 </derivekey> |
|
5863 </actionbody> |
|
5864 </action> |
|
5865 |
|
5866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5868 //! @SYMREQ CIT_PREQ1054 |
|
5869 //! @SYMTestPriority medium |
|
5870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5872 <action> |
|
5873 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
5874 <actiontype>DeriveKey</actiontype> |
|
5875 <actionbody> |
|
5876 <derivekey> |
|
5877 <kdf>pkcs#12</kdf> |
|
5878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5879 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
5880 <iterations>2</iterations> |
|
5881 <key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647</key> |
|
5882 </derivekey> |
|
5883 </actionbody> |
|
5884 </action> |
|
5885 |
|
5886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5888 //! @SYMREQ CIT_PREQ1054 |
|
5889 //! @SYMTestPriority medium |
|
5890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5892 <action> |
|
5893 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5894 <actiontype>DeriveKey</actiontype> |
|
5895 <actionbody> |
|
5896 <derivekey> |
|
5897 <kdf>pkcs#12</kdf> |
|
5898 <passwd>0000</passwd> |
|
5899 <salt>53414C54</salt> |
|
5900 <iterations>4</iterations> |
|
5901 <key>D0158BFC57E643965DC161741725CE9478CDF2A0B5</key> |
|
5902 </derivekey> |
|
5903 </actionbody> |
|
5904 </action> |
|
5905 |
|
5906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5908 //! @SYMREQ CIT_PREQ1054 |
|
5909 //! @SYMTestPriority medium |
|
5910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5912 <action> |
|
5913 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5914 <actiontype>DeriveKey</actiontype> |
|
5915 <actionbody> |
|
5916 <derivekey> |
|
5917 <kdf>pkcs#12</kdf> |
|
5918 <passwd>0001</passwd> |
|
5919 <salt>53414C54</salt> |
|
5920 <iterations>4</iterations> |
|
5921 <key>AEB6CD53F0D6830161100C4BFD439B341066339A00</key> |
|
5922 </derivekey> |
|
5923 </actionbody> |
|
5924 </action> |
|
5925 |
|
5926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5928 //! @SYMREQ CIT_PREQ1054 |
|
5929 //! @SYMTestPriority medium |
|
5930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5932 <action> |
|
5933 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5934 <actiontype>DeriveKey</actiontype> |
|
5935 <actionbody> |
|
5936 <derivekey> |
|
5937 <kdf>pkcs#12</kdf> |
|
5938 <passwd>PSWD</passwd> |
|
5939 <salt>53414C54</salt> |
|
5940 <iterations>4</iterations> |
|
5941 <key>80010C12B66CC739F4ACF8BB154197709F78AAD39A</key> |
|
5942 </derivekey> |
|
5943 </actionbody> |
|
5944 </action> |
|
5945 |
|
5946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5948 //! @SYMREQ CIT_PREQ1054 |
|
5949 //! @SYMTestPriority medium |
|
5950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5952 <action> |
|
5953 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5954 <actiontype>DeriveKey</actiontype> |
|
5955 <actionbody> |
|
5956 <derivekey> |
|
5957 <kdf>pkcs#12</kdf> |
|
5958 <passwd>password</passwd> |
|
5959 <salt>53414C54</salt> |
|
5960 <iterations>4</iterations> |
|
5961 <key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812</key> |
|
5962 </derivekey> |
|
5963 </actionbody> |
|
5964 </action> |
|
5965 |
|
5966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5968 //! @SYMREQ CIT_PREQ1054 |
|
5969 //! @SYMTestPriority medium |
|
5970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5972 <action> |
|
5973 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
5974 <actiontype>DeriveKey</actiontype> |
|
5975 <actionbody> |
|
5976 <derivekey> |
|
5977 <kdf>pkcs#12</kdf> |
|
5978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
5979 <salt>53414C54</salt> |
|
5980 <iterations>4</iterations> |
|
5981 <key>146C6A5B58AF8561220DE4C13A133248300D59D39E</key> |
|
5982 </derivekey> |
|
5983 </actionbody> |
|
5984 </action> |
|
5985 |
|
5986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
5987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
5988 //! @SYMREQ CIT_PREQ1054 |
|
5989 //! @SYMTestPriority medium |
|
5990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
5991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
5992 <action> |
|
5993 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
5994 <actiontype>DeriveKey</actiontype> |
|
5995 <actionbody> |
|
5996 <derivekey> |
|
5997 <kdf>pkcs#12</kdf> |
|
5998 <passwd>0000</passwd> |
|
5999 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6000 <iterations>4</iterations> |
|
6001 <key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE</key> |
|
6002 </derivekey> |
|
6003 </actionbody> |
|
6004 </action> |
|
6005 |
|
6006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6008 //! @SYMREQ CIT_PREQ1054 |
|
6009 //! @SYMTestPriority medium |
|
6010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6012 <action> |
|
6013 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6014 <actiontype>DeriveKey</actiontype> |
|
6015 <actionbody> |
|
6016 <derivekey> |
|
6017 <kdf>pkcs#12</kdf> |
|
6018 <passwd>0001</passwd> |
|
6019 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6020 <iterations>4</iterations> |
|
6021 <key>23930713772E26DBBABB53F3C5C775019B8048482B</key> |
|
6022 </derivekey> |
|
6023 </actionbody> |
|
6024 </action> |
|
6025 |
|
6026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6028 //! @SYMREQ CIT_PREQ1054 |
|
6029 //! @SYMTestPriority medium |
|
6030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6032 <action> |
|
6033 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6034 <actiontype>DeriveKey</actiontype> |
|
6035 <actionbody> |
|
6036 <derivekey> |
|
6037 <kdf>pkcs#12</kdf> |
|
6038 <passwd>PSWD</passwd> |
|
6039 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6040 <iterations>4</iterations> |
|
6041 <key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A</key> |
|
6042 </derivekey> |
|
6043 </actionbody> |
|
6044 </action> |
|
6045 |
|
6046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6048 //! @SYMREQ CIT_PREQ1054 |
|
6049 //! @SYMTestPriority medium |
|
6050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6052 <action> |
|
6053 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6054 <actiontype>DeriveKey</actiontype> |
|
6055 <actionbody> |
|
6056 <derivekey> |
|
6057 <kdf>pkcs#12</kdf> |
|
6058 <passwd>password</passwd> |
|
6059 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6060 <iterations>4</iterations> |
|
6061 <key>363619530B170B7BAE1C046B29351C235B8EFED588</key> |
|
6062 </derivekey> |
|
6063 </actionbody> |
|
6064 </action> |
|
6065 |
|
6066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6068 //! @SYMREQ CIT_PREQ1054 |
|
6069 //! @SYMTestPriority medium |
|
6070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6072 <action> |
|
6073 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6074 <actiontype>DeriveKey</actiontype> |
|
6075 <actionbody> |
|
6076 <derivekey> |
|
6077 <kdf>pkcs#12</kdf> |
|
6078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6079 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6080 <iterations>4</iterations> |
|
6081 <key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4E</key> |
|
6082 </derivekey> |
|
6083 </actionbody> |
|
6084 </action> |
|
6085 |
|
6086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6088 //! @SYMREQ CIT_PREQ1054 |
|
6089 //! @SYMTestPriority medium |
|
6090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6092 <action> |
|
6093 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6094 <actiontype>DeriveKey</actiontype> |
|
6095 <actionbody> |
|
6096 <derivekey> |
|
6097 <kdf>pkcs#12</kdf> |
|
6098 <passwd>0000</passwd> |
|
6099 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6100 <iterations>4</iterations> |
|
6101 <key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0E</key> |
|
6102 </derivekey> |
|
6103 </actionbody> |
|
6104 </action> |
|
6105 |
|
6106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6108 //! @SYMREQ CIT_PREQ1054 |
|
6109 //! @SYMTestPriority medium |
|
6110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6112 <action> |
|
6113 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6114 <actiontype>DeriveKey</actiontype> |
|
6115 <actionbody> |
|
6116 <derivekey> |
|
6117 <kdf>pkcs#12</kdf> |
|
6118 <passwd>0001</passwd> |
|
6119 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6120 <iterations>4</iterations> |
|
6121 <key>9A618595C714486B7D7E3120005C8BC18D5D95D79B</key> |
|
6122 </derivekey> |
|
6123 </actionbody> |
|
6124 </action> |
|
6125 |
|
6126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6128 //! @SYMREQ CIT_PREQ1054 |
|
6129 //! @SYMTestPriority medium |
|
6130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6132 <action> |
|
6133 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6134 <actiontype>DeriveKey</actiontype> |
|
6135 <actionbody> |
|
6136 <derivekey> |
|
6137 <kdf>pkcs#12</kdf> |
|
6138 <passwd>PSWD</passwd> |
|
6139 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6140 <iterations>4</iterations> |
|
6141 <key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208</key> |
|
6142 </derivekey> |
|
6143 </actionbody> |
|
6144 </action> |
|
6145 |
|
6146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6148 //! @SYMREQ CIT_PREQ1054 |
|
6149 //! @SYMTestPriority medium |
|
6150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6152 <action> |
|
6153 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6154 <actiontype>DeriveKey</actiontype> |
|
6155 <actionbody> |
|
6156 <derivekey> |
|
6157 <kdf>pkcs#12</kdf> |
|
6158 <passwd>password</passwd> |
|
6159 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6160 <iterations>4</iterations> |
|
6161 <key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2</key> |
|
6162 </derivekey> |
|
6163 </actionbody> |
|
6164 </action> |
|
6165 |
|
6166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6168 //! @SYMREQ CIT_PREQ1054 |
|
6169 //! @SYMTestPriority medium |
|
6170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6172 <action> |
|
6173 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6174 <actiontype>DeriveKey</actiontype> |
|
6175 <actionbody> |
|
6176 <derivekey> |
|
6177 <kdf>pkcs#12</kdf> |
|
6178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6179 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6180 <iterations>4</iterations> |
|
6181 <key>91DF3661364A0DAD28180A41ADCB55676E992986EF</key> |
|
6182 </derivekey> |
|
6183 </actionbody> |
|
6184 </action> |
|
6185 |
|
6186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6188 //! @SYMREQ CIT_PREQ1054 |
|
6189 //! @SYMTestPriority medium |
|
6190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6192 <action> |
|
6193 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6194 <actiontype>DeriveKey</actiontype> |
|
6195 <actionbody> |
|
6196 <derivekey> |
|
6197 <kdf>pkcs#12</kdf> |
|
6198 <passwd>0000</passwd> |
|
6199 <salt>53414C54</salt> |
|
6200 <iterations>8</iterations> |
|
6201 <key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE461</key> |
|
6202 </derivekey> |
|
6203 </actionbody> |
|
6204 </action> |
|
6205 |
|
6206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6208 //! @SYMREQ CIT_PREQ1054 |
|
6209 //! @SYMTestPriority medium |
|
6210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6212 <action> |
|
6213 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6214 <actiontype>DeriveKey</actiontype> |
|
6215 <actionbody> |
|
6216 <derivekey> |
|
6217 <kdf>pkcs#12</kdf> |
|
6218 <passwd>0001</passwd> |
|
6219 <salt>53414C54</salt> |
|
6220 <iterations>8</iterations> |
|
6221 <key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1</key> |
|
6222 </derivekey> |
|
6223 </actionbody> |
|
6224 </action> |
|
6225 |
|
6226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6228 //! @SYMREQ CIT_PREQ1054 |
|
6229 //! @SYMTestPriority medium |
|
6230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6232 <action> |
|
6233 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6234 <actiontype>DeriveKey</actiontype> |
|
6235 <actionbody> |
|
6236 <derivekey> |
|
6237 <kdf>pkcs#12</kdf> |
|
6238 <passwd>PSWD</passwd> |
|
6239 <salt>53414C54</salt> |
|
6240 <iterations>8</iterations> |
|
6241 <key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466</key> |
|
6242 </derivekey> |
|
6243 </actionbody> |
|
6244 </action> |
|
6245 |
|
6246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6248 //! @SYMREQ CIT_PREQ1054 |
|
6249 //! @SYMTestPriority medium |
|
6250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6252 <action> |
|
6253 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6254 <actiontype>DeriveKey</actiontype> |
|
6255 <actionbody> |
|
6256 <derivekey> |
|
6257 <kdf>pkcs#12</kdf> |
|
6258 <passwd>password</passwd> |
|
6259 <salt>53414C54</salt> |
|
6260 <iterations>8</iterations> |
|
6261 <key>B0935F11227F5A473073DCD188886687D2A1811953</key> |
|
6262 </derivekey> |
|
6263 </actionbody> |
|
6264 </action> |
|
6265 |
|
6266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6268 //! @SYMREQ CIT_PREQ1054 |
|
6269 //! @SYMTestPriority medium |
|
6270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6272 <action> |
|
6273 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6274 <actiontype>DeriveKey</actiontype> |
|
6275 <actionbody> |
|
6276 <derivekey> |
|
6277 <kdf>pkcs#12</kdf> |
|
6278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6279 <salt>53414C54</salt> |
|
6280 <iterations>8</iterations> |
|
6281 <key>6602B1B4BBB670208041ECD8E1634845FC0DC28532</key> |
|
6282 </derivekey> |
|
6283 </actionbody> |
|
6284 </action> |
|
6285 |
|
6286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6288 //! @SYMREQ CIT_PREQ1054 |
|
6289 //! @SYMTestPriority medium |
|
6290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6292 <action> |
|
6293 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6294 <actiontype>DeriveKey</actiontype> |
|
6295 <actionbody> |
|
6296 <derivekey> |
|
6297 <kdf>pkcs#12</kdf> |
|
6298 <passwd>0000</passwd> |
|
6299 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6300 <iterations>8</iterations> |
|
6301 <key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E44</key> |
|
6302 </derivekey> |
|
6303 </actionbody> |
|
6304 </action> |
|
6305 |
|
6306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6308 //! @SYMREQ CIT_PREQ1054 |
|
6309 //! @SYMTestPriority medium |
|
6310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6312 <action> |
|
6313 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6314 <actiontype>DeriveKey</actiontype> |
|
6315 <actionbody> |
|
6316 <derivekey> |
|
6317 <kdf>pkcs#12</kdf> |
|
6318 <passwd>0001</passwd> |
|
6319 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6320 <iterations>8</iterations> |
|
6321 <key>6473EB1244E055149E0858C49FAE7B8DC951E7E32A</key> |
|
6322 </derivekey> |
|
6323 </actionbody> |
|
6324 </action> |
|
6325 |
|
6326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6328 //! @SYMREQ CIT_PREQ1054 |
|
6329 //! @SYMTestPriority medium |
|
6330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6332 <action> |
|
6333 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6334 <actiontype>DeriveKey</actiontype> |
|
6335 <actionbody> |
|
6336 <derivekey> |
|
6337 <kdf>pkcs#12</kdf> |
|
6338 <passwd>PSWD</passwd> |
|
6339 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6340 <iterations>8</iterations> |
|
6341 <key>AA762B8736D4C37BAD263103CA283E09010B7EFC53</key> |
|
6342 </derivekey> |
|
6343 </actionbody> |
|
6344 </action> |
|
6345 |
|
6346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6348 //! @SYMREQ CIT_PREQ1054 |
|
6349 //! @SYMTestPriority medium |
|
6350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6352 <action> |
|
6353 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6354 <actiontype>DeriveKey</actiontype> |
|
6355 <actionbody> |
|
6356 <derivekey> |
|
6357 <kdf>pkcs#12</kdf> |
|
6358 <passwd>password</passwd> |
|
6359 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6360 <iterations>8</iterations> |
|
6361 <key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D8</key> |
|
6362 </derivekey> |
|
6363 </actionbody> |
|
6364 </action> |
|
6365 |
|
6366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6368 //! @SYMREQ CIT_PREQ1054 |
|
6369 //! @SYMTestPriority medium |
|
6370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6372 <action> |
|
6373 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6374 <actiontype>DeriveKey</actiontype> |
|
6375 <actionbody> |
|
6376 <derivekey> |
|
6377 <kdf>pkcs#12</kdf> |
|
6378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6379 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6380 <iterations>8</iterations> |
|
6381 <key>935593CA370BB6988F2F41D2F4ABF56E433064D83E</key> |
|
6382 </derivekey> |
|
6383 </actionbody> |
|
6384 </action> |
|
6385 |
|
6386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6388 //! @SYMREQ CIT_PREQ1054 |
|
6389 //! @SYMTestPriority medium |
|
6390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6392 <action> |
|
6393 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6394 <actiontype>DeriveKey</actiontype> |
|
6395 <actionbody> |
|
6396 <derivekey> |
|
6397 <kdf>pkcs#12</kdf> |
|
6398 <passwd>0000</passwd> |
|
6399 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6400 <iterations>8</iterations> |
|
6401 <key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BF</key> |
|
6402 </derivekey> |
|
6403 </actionbody> |
|
6404 </action> |
|
6405 |
|
6406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6408 //! @SYMREQ CIT_PREQ1054 |
|
6409 //! @SYMTestPriority medium |
|
6410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6412 <action> |
|
6413 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6414 <actiontype>DeriveKey</actiontype> |
|
6415 <actionbody> |
|
6416 <derivekey> |
|
6417 <kdf>pkcs#12</kdf> |
|
6418 <passwd>0001</passwd> |
|
6419 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6420 <iterations>8</iterations> |
|
6421 <key>82B4A13659033EA4025DB51A6CB573F93B03A69634</key> |
|
6422 </derivekey> |
|
6423 </actionbody> |
|
6424 </action> |
|
6425 |
|
6426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6428 //! @SYMREQ CIT_PREQ1054 |
|
6429 //! @SYMTestPriority medium |
|
6430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6432 <action> |
|
6433 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6434 <actiontype>DeriveKey</actiontype> |
|
6435 <actionbody> |
|
6436 <derivekey> |
|
6437 <kdf>pkcs#12</kdf> |
|
6438 <passwd>PSWD</passwd> |
|
6439 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6440 <iterations>8</iterations> |
|
6441 <key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94</key> |
|
6442 </derivekey> |
|
6443 </actionbody> |
|
6444 </action> |
|
6445 |
|
6446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6448 //! @SYMREQ CIT_PREQ1054 |
|
6449 //! @SYMTestPriority medium |
|
6450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6452 <action> |
|
6453 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6454 <actiontype>DeriveKey</actiontype> |
|
6455 <actionbody> |
|
6456 <derivekey> |
|
6457 <kdf>pkcs#12</kdf> |
|
6458 <passwd>password</passwd> |
|
6459 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6460 <iterations>8</iterations> |
|
6461 <key>5670457314E405B0ED1583FC4B82FEAD94B434EBED</key> |
|
6462 </derivekey> |
|
6463 </actionbody> |
|
6464 </action> |
|
6465 |
|
6466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6468 //! @SYMREQ CIT_PREQ1054 |
|
6469 //! @SYMTestPriority medium |
|
6470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6472 <action> |
|
6473 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6474 <actiontype>DeriveKey</actiontype> |
|
6475 <actionbody> |
|
6476 <derivekey> |
|
6477 <kdf>pkcs#12</kdf> |
|
6478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6479 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6480 <iterations>8</iterations> |
|
6481 <key>1C4CAE25146D74F3762B5C3FD3A917522564855675</key> |
|
6482 </derivekey> |
|
6483 </actionbody> |
|
6484 </action> |
|
6485 |
|
6486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6488 //! @SYMREQ CIT_PREQ1054 |
|
6489 //! @SYMTestPriority medium |
|
6490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6492 <action> |
|
6493 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6494 <actiontype>DeriveKey</actiontype> |
|
6495 <actionbody> |
|
6496 <derivekey> |
|
6497 <kdf>pkcs#12</kdf> |
|
6498 <passwd>0000</passwd> |
|
6499 <salt>53414C54</salt> |
|
6500 <iterations>128</iterations> |
|
6501 <key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93</key> |
|
6502 </derivekey> |
|
6503 </actionbody> |
|
6504 </action> |
|
6505 |
|
6506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6508 //! @SYMREQ CIT_PREQ1054 |
|
6509 //! @SYMTestPriority medium |
|
6510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6512 <action> |
|
6513 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6514 <actiontype>DeriveKey</actiontype> |
|
6515 <actionbody> |
|
6516 <derivekey> |
|
6517 <kdf>pkcs#12</kdf> |
|
6518 <passwd>0001</passwd> |
|
6519 <salt>53414C54</salt> |
|
6520 <iterations>128</iterations> |
|
6521 <key>C89C3A2C9C06626EB831F4BB5262809B9C138181C4</key> |
|
6522 </derivekey> |
|
6523 </actionbody> |
|
6524 </action> |
|
6525 |
|
6526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6528 //! @SYMREQ CIT_PREQ1054 |
|
6529 //! @SYMTestPriority medium |
|
6530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6532 <action> |
|
6533 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6534 <actiontype>DeriveKey</actiontype> |
|
6535 <actionbody> |
|
6536 <derivekey> |
|
6537 <kdf>pkcs#12</kdf> |
|
6538 <passwd>PSWD</passwd> |
|
6539 <salt>53414C54</salt> |
|
6540 <iterations>128</iterations> |
|
6541 <key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EE</key> |
|
6542 </derivekey> |
|
6543 </actionbody> |
|
6544 </action> |
|
6545 |
|
6546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6548 //! @SYMREQ CIT_PREQ1054 |
|
6549 //! @SYMTestPriority medium |
|
6550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6552 <action> |
|
6553 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6554 <actiontype>DeriveKey</actiontype> |
|
6555 <actionbody> |
|
6556 <derivekey> |
|
6557 <kdf>pkcs#12</kdf> |
|
6558 <passwd>password</passwd> |
|
6559 <salt>53414C54</salt> |
|
6560 <iterations>128</iterations> |
|
6561 <key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C</key> |
|
6562 </derivekey> |
|
6563 </actionbody> |
|
6564 </action> |
|
6565 |
|
6566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6568 //! @SYMREQ CIT_PREQ1054 |
|
6569 //! @SYMTestPriority medium |
|
6570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6572 <action> |
|
6573 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6574 <actiontype>DeriveKey</actiontype> |
|
6575 <actionbody> |
|
6576 <derivekey> |
|
6577 <kdf>pkcs#12</kdf> |
|
6578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6579 <salt>53414C54</salt> |
|
6580 <iterations>128</iterations> |
|
6581 <key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F</key> |
|
6582 </derivekey> |
|
6583 </actionbody> |
|
6584 </action> |
|
6585 |
|
6586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6588 //! @SYMREQ CIT_PREQ1054 |
|
6589 //! @SYMTestPriority medium |
|
6590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6592 <action> |
|
6593 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6594 <actiontype>DeriveKey</actiontype> |
|
6595 <actionbody> |
|
6596 <derivekey> |
|
6597 <kdf>pkcs#12</kdf> |
|
6598 <passwd>0000</passwd> |
|
6599 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6600 <iterations>128</iterations> |
|
6601 <key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD</key> |
|
6602 </derivekey> |
|
6603 </actionbody> |
|
6604 </action> |
|
6605 |
|
6606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6608 //! @SYMREQ CIT_PREQ1054 |
|
6609 //! @SYMTestPriority medium |
|
6610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6612 <action> |
|
6613 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6614 <actiontype>DeriveKey</actiontype> |
|
6615 <actionbody> |
|
6616 <derivekey> |
|
6617 <kdf>pkcs#12</kdf> |
|
6618 <passwd>0001</passwd> |
|
6619 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6620 <iterations>128</iterations> |
|
6621 <key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3</key> |
|
6622 </derivekey> |
|
6623 </actionbody> |
|
6624 </action> |
|
6625 |
|
6626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6628 //! @SYMREQ CIT_PREQ1054 |
|
6629 //! @SYMTestPriority medium |
|
6630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6632 <action> |
|
6633 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6634 <actiontype>DeriveKey</actiontype> |
|
6635 <actionbody> |
|
6636 <derivekey> |
|
6637 <kdf>pkcs#12</kdf> |
|
6638 <passwd>PSWD</passwd> |
|
6639 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6640 <iterations>128</iterations> |
|
6641 <key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF</key> |
|
6642 </derivekey> |
|
6643 </actionbody> |
|
6644 </action> |
|
6645 |
|
6646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6648 //! @SYMREQ CIT_PREQ1054 |
|
6649 //! @SYMTestPriority medium |
|
6650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6652 <action> |
|
6653 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6654 <actiontype>DeriveKey</actiontype> |
|
6655 <actionbody> |
|
6656 <derivekey> |
|
6657 <kdf>pkcs#12</kdf> |
|
6658 <passwd>password</passwd> |
|
6659 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6660 <iterations>128</iterations> |
|
6661 <key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3</key> |
|
6662 </derivekey> |
|
6663 </actionbody> |
|
6664 </action> |
|
6665 |
|
6666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6668 //! @SYMREQ CIT_PREQ1054 |
|
6669 //! @SYMTestPriority medium |
|
6670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6672 <action> |
|
6673 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6674 <actiontype>DeriveKey</actiontype> |
|
6675 <actionbody> |
|
6676 <derivekey> |
|
6677 <kdf>pkcs#12</kdf> |
|
6678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6679 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6680 <iterations>128</iterations> |
|
6681 <key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16</key> |
|
6682 </derivekey> |
|
6683 </actionbody> |
|
6684 </action> |
|
6685 |
|
6686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6688 //! @SYMREQ CIT_PREQ1054 |
|
6689 //! @SYMTestPriority medium |
|
6690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6692 <action> |
|
6693 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6694 <actiontype>DeriveKey</actiontype> |
|
6695 <actionbody> |
|
6696 <derivekey> |
|
6697 <kdf>pkcs#12</kdf> |
|
6698 <passwd>0000</passwd> |
|
6699 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6700 <iterations>128</iterations> |
|
6701 <key>99FE149183022F9EB2EB815BCC9504E59C524A1497</key> |
|
6702 </derivekey> |
|
6703 </actionbody> |
|
6704 </action> |
|
6705 |
|
6706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6708 //! @SYMREQ CIT_PREQ1054 |
|
6709 //! @SYMTestPriority medium |
|
6710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6712 <action> |
|
6713 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6714 <actiontype>DeriveKey</actiontype> |
|
6715 <actionbody> |
|
6716 <derivekey> |
|
6717 <kdf>pkcs#12</kdf> |
|
6718 <passwd>0001</passwd> |
|
6719 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6720 <iterations>128</iterations> |
|
6721 <key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FE</key> |
|
6722 </derivekey> |
|
6723 </actionbody> |
|
6724 </action> |
|
6725 |
|
6726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6728 //! @SYMREQ CIT_PREQ1054 |
|
6729 //! @SYMTestPriority medium |
|
6730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6732 <action> |
|
6733 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6734 <actiontype>DeriveKey</actiontype> |
|
6735 <actionbody> |
|
6736 <derivekey> |
|
6737 <kdf>pkcs#12</kdf> |
|
6738 <passwd>PSWD</passwd> |
|
6739 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6740 <iterations>128</iterations> |
|
6741 <key>22A70A865774E55CF08A70435611252278DCE76AED</key> |
|
6742 </derivekey> |
|
6743 </actionbody> |
|
6744 </action> |
|
6745 |
|
6746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6748 //! @SYMREQ CIT_PREQ1054 |
|
6749 //! @SYMTestPriority medium |
|
6750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6752 <action> |
|
6753 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6754 <actiontype>DeriveKey</actiontype> |
|
6755 <actionbody> |
|
6756 <derivekey> |
|
6757 <kdf>pkcs#12</kdf> |
|
6758 <passwd>password</passwd> |
|
6759 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6760 <iterations>128</iterations> |
|
6761 <key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C67</key> |
|
6762 </derivekey> |
|
6763 </actionbody> |
|
6764 </action> |
|
6765 |
|
6766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6768 //! @SYMREQ CIT_PREQ1054 |
|
6769 //! @SYMTestPriority medium |
|
6770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6772 <action> |
|
6773 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6774 <actiontype>DeriveKey</actiontype> |
|
6775 <actionbody> |
|
6776 <derivekey> |
|
6777 <kdf>pkcs#12</kdf> |
|
6778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6779 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
6780 <iterations>128</iterations> |
|
6781 <key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CE</key> |
|
6782 </derivekey> |
|
6783 </actionbody> |
|
6784 </action> |
|
6785 |
|
6786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6788 //! @SYMREQ CIT_PREQ1054 |
|
6789 //! @SYMTestPriority medium |
|
6790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6792 <action> |
|
6793 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6794 <actiontype>DeriveKey</actiontype> |
|
6795 <actionbody> |
|
6796 <derivekey> |
|
6797 <kdf>pkcs#12</kdf> |
|
6798 <passwd>0000</passwd> |
|
6799 <salt>53414C54</salt> |
|
6800 <iterations>1024</iterations> |
|
6801 <key>82824BE51C81A5FF4C4268E256F6621B9656325BEF</key> |
|
6802 </derivekey> |
|
6803 </actionbody> |
|
6804 </action> |
|
6805 |
|
6806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6808 //! @SYMREQ CIT_PREQ1054 |
|
6809 //! @SYMTestPriority medium |
|
6810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6812 <action> |
|
6813 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6814 <actiontype>DeriveKey</actiontype> |
|
6815 <actionbody> |
|
6816 <derivekey> |
|
6817 <kdf>pkcs#12</kdf> |
|
6818 <passwd>0001</passwd> |
|
6819 <salt>53414C54</salt> |
|
6820 <iterations>1024</iterations> |
|
6821 <key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2</key> |
|
6822 </derivekey> |
|
6823 </actionbody> |
|
6824 </action> |
|
6825 |
|
6826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6828 //! @SYMREQ CIT_PREQ1054 |
|
6829 //! @SYMTestPriority medium |
|
6830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6832 <action> |
|
6833 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6834 <actiontype>DeriveKey</actiontype> |
|
6835 <actionbody> |
|
6836 <derivekey> |
|
6837 <kdf>pkcs#12</kdf> |
|
6838 <passwd>PSWD</passwd> |
|
6839 <salt>53414C54</salt> |
|
6840 <iterations>1024</iterations> |
|
6841 <key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE</key> |
|
6842 </derivekey> |
|
6843 </actionbody> |
|
6844 </action> |
|
6845 |
|
6846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6848 //! @SYMREQ CIT_PREQ1054 |
|
6849 //! @SYMTestPriority medium |
|
6850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6852 <action> |
|
6853 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6854 <actiontype>DeriveKey</actiontype> |
|
6855 <actionbody> |
|
6856 <derivekey> |
|
6857 <kdf>pkcs#12</kdf> |
|
6858 <passwd>password</passwd> |
|
6859 <salt>53414C54</salt> |
|
6860 <iterations>1024</iterations> |
|
6861 <key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E84</key> |
|
6862 </derivekey> |
|
6863 </actionbody> |
|
6864 </action> |
|
6865 |
|
6866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6868 //! @SYMREQ CIT_PREQ1054 |
|
6869 //! @SYMTestPriority medium |
|
6870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6872 <action> |
|
6873 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
6874 <actiontype>DeriveKey</actiontype> |
|
6875 <actionbody> |
|
6876 <derivekey> |
|
6877 <kdf>pkcs#12</kdf> |
|
6878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6879 <salt>53414C54</salt> |
|
6880 <iterations>1024</iterations> |
|
6881 <key>406C92305ACD663AB0B9EB66DED7929547C692FE11</key> |
|
6882 </derivekey> |
|
6883 </actionbody> |
|
6884 </action> |
|
6885 |
|
6886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6888 //! @SYMREQ CIT_PREQ1054 |
|
6889 //! @SYMTestPriority medium |
|
6890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6892 <action> |
|
6893 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6894 <actiontype>DeriveKey</actiontype> |
|
6895 <actionbody> |
|
6896 <derivekey> |
|
6897 <kdf>pkcs#12</kdf> |
|
6898 <passwd>0000</passwd> |
|
6899 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6900 <iterations>1024</iterations> |
|
6901 <key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355</key> |
|
6902 </derivekey> |
|
6903 </actionbody> |
|
6904 </action> |
|
6905 |
|
6906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6908 //! @SYMREQ CIT_PREQ1054 |
|
6909 //! @SYMTestPriority medium |
|
6910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6912 <action> |
|
6913 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6914 <actiontype>DeriveKey</actiontype> |
|
6915 <actionbody> |
|
6916 <derivekey> |
|
6917 <kdf>pkcs#12</kdf> |
|
6918 <passwd>0001</passwd> |
|
6919 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6920 <iterations>1024</iterations> |
|
6921 <key>0182E41FCA166CEAED10972BDF5F57A8F851200E37</key> |
|
6922 </derivekey> |
|
6923 </actionbody> |
|
6924 </action> |
|
6925 |
|
6926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6928 //! @SYMREQ CIT_PREQ1054 |
|
6929 //! @SYMTestPriority medium |
|
6930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6932 <action> |
|
6933 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6934 <actiontype>DeriveKey</actiontype> |
|
6935 <actionbody> |
|
6936 <derivekey> |
|
6937 <kdf>pkcs#12</kdf> |
|
6938 <passwd>PSWD</passwd> |
|
6939 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6940 <iterations>1024</iterations> |
|
6941 <key>101FB775982CA15E37A065F7CDC5593DE385BDF504</key> |
|
6942 </derivekey> |
|
6943 </actionbody> |
|
6944 </action> |
|
6945 |
|
6946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6948 //! @SYMREQ CIT_PREQ1054 |
|
6949 //! @SYMTestPriority medium |
|
6950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6952 <action> |
|
6953 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6954 <actiontype>DeriveKey</actiontype> |
|
6955 <actionbody> |
|
6956 <derivekey> |
|
6957 <kdf>pkcs#12</kdf> |
|
6958 <passwd>password</passwd> |
|
6959 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6960 <iterations>1024</iterations> |
|
6961 <key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B614</key> |
|
6962 </derivekey> |
|
6963 </actionbody> |
|
6964 </action> |
|
6965 |
|
6966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6968 //! @SYMREQ CIT_PREQ1054 |
|
6969 //! @SYMTestPriority medium |
|
6970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6972 <action> |
|
6973 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
6974 <actiontype>DeriveKey</actiontype> |
|
6975 <actionbody> |
|
6976 <derivekey> |
|
6977 <kdf>pkcs#12</kdf> |
|
6978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
6979 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
6980 <iterations>1024</iterations> |
|
6981 <key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95</key> |
|
6982 </derivekey> |
|
6983 </actionbody> |
|
6984 </action> |
|
6985 |
|
6986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
6987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
6988 //! @SYMREQ CIT_PREQ1054 |
|
6989 //! @SYMTestPriority medium |
|
6990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
6991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
6992 <action> |
|
6993 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
6994 <actiontype>DeriveKey</actiontype> |
|
6995 <actionbody> |
|
6996 <derivekey> |
|
6997 <kdf>pkcs#12</kdf> |
|
6998 <passwd>0000</passwd> |
|
6999 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7000 <iterations>1024</iterations> |
|
7001 <key>6789F0680A5C5840B8ED34B061494171E6407643F9</key> |
|
7002 </derivekey> |
|
7003 </actionbody> |
|
7004 </action> |
|
7005 |
|
7006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7008 //! @SYMREQ CIT_PREQ1054 |
|
7009 //! @SYMTestPriority medium |
|
7010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7012 <action> |
|
7013 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7014 <actiontype>DeriveKey</actiontype> |
|
7015 <actionbody> |
|
7016 <derivekey> |
|
7017 <kdf>pkcs#12</kdf> |
|
7018 <passwd>0001</passwd> |
|
7019 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7020 <iterations>1024</iterations> |
|
7021 <key>43E663725870C4801A917C41C9B58C419933A93475</key> |
|
7022 </derivekey> |
|
7023 </actionbody> |
|
7024 </action> |
|
7025 |
|
7026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7028 //! @SYMREQ CIT_PREQ1054 |
|
7029 //! @SYMTestPriority medium |
|
7030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7032 <action> |
|
7033 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7034 <actiontype>DeriveKey</actiontype> |
|
7035 <actionbody> |
|
7036 <derivekey> |
|
7037 <kdf>pkcs#12</kdf> |
|
7038 <passwd>PSWD</passwd> |
|
7039 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7040 <iterations>1024</iterations> |
|
7041 <key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5</key> |
|
7042 </derivekey> |
|
7043 </actionbody> |
|
7044 </action> |
|
7045 |
|
7046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7048 //! @SYMREQ CIT_PREQ1054 |
|
7049 //! @SYMTestPriority medium |
|
7050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7052 <action> |
|
7053 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7054 <actiontype>DeriveKey</actiontype> |
|
7055 <actionbody> |
|
7056 <derivekey> |
|
7057 <kdf>pkcs#12</kdf> |
|
7058 <passwd>password</passwd> |
|
7059 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7060 <iterations>1024</iterations> |
|
7061 <key>CA202602C9A265559B6B96729B574DAA9B6D67036F</key> |
|
7062 </derivekey> |
|
7063 </actionbody> |
|
7064 </action> |
|
7065 |
|
7066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7068 //! @SYMREQ CIT_PREQ1054 |
|
7069 //! @SYMTestPriority medium |
|
7070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7072 <action> |
|
7073 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7074 <actiontype>DeriveKey</actiontype> |
|
7075 <actionbody> |
|
7076 <derivekey> |
|
7077 <kdf>pkcs#12</kdf> |
|
7078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7079 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7080 <iterations>1024</iterations> |
|
7081 <key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D468</key> |
|
7082 </derivekey> |
|
7083 </actionbody> |
|
7084 </action> |
|
7085 |
|
7086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7088 //! @SYMREQ CIT_PREQ1054 |
|
7089 //! @SYMTestPriority medium |
|
7090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7092 <action> |
|
7093 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7094 <actiontype>DeriveKey</actiontype> |
|
7095 <actionbody> |
|
7096 <derivekey> |
|
7097 <kdf>pkcs#12</kdf> |
|
7098 <passwd>0000</passwd> |
|
7099 <salt>53414C54</salt> |
|
7100 <iterations>1536</iterations> |
|
7101 <key>79A4E1398F511B262E60DCFE9E838C938B806716A9</key> |
|
7102 </derivekey> |
|
7103 </actionbody> |
|
7104 </action> |
|
7105 |
|
7106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7108 //! @SYMREQ CIT_PREQ1054 |
|
7109 //! @SYMTestPriority medium |
|
7110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7112 <action> |
|
7113 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7114 <actiontype>DeriveKey</actiontype> |
|
7115 <actionbody> |
|
7116 <derivekey> |
|
7117 <kdf>pkcs#12</kdf> |
|
7118 <passwd>0001</passwd> |
|
7119 <salt>53414C54</salt> |
|
7120 <iterations>1536</iterations> |
|
7121 <key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D2</key> |
|
7122 </derivekey> |
|
7123 </actionbody> |
|
7124 </action> |
|
7125 |
|
7126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7128 //! @SYMREQ CIT_PREQ1054 |
|
7129 //! @SYMTestPriority medium |
|
7130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7132 <action> |
|
7133 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7134 <actiontype>DeriveKey</actiontype> |
|
7135 <actionbody> |
|
7136 <derivekey> |
|
7137 <kdf>pkcs#12</kdf> |
|
7138 <passwd>PSWD</passwd> |
|
7139 <salt>53414C54</salt> |
|
7140 <iterations>1536</iterations> |
|
7141 <key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E6</key> |
|
7142 </derivekey> |
|
7143 </actionbody> |
|
7144 </action> |
|
7145 |
|
7146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7148 //! @SYMREQ CIT_PREQ1054 |
|
7149 //! @SYMTestPriority medium |
|
7150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7152 <action> |
|
7153 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7154 <actiontype>DeriveKey</actiontype> |
|
7155 <actionbody> |
|
7156 <derivekey> |
|
7157 <kdf>pkcs#12</kdf> |
|
7158 <passwd>password</passwd> |
|
7159 <salt>53414C54</salt> |
|
7160 <iterations>1536</iterations> |
|
7161 <key>65B27A78C72DFEEA6C92846330CE98C6721909E89B</key> |
|
7162 </derivekey> |
|
7163 </actionbody> |
|
7164 </action> |
|
7165 |
|
7166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7168 //! @SYMREQ CIT_PREQ1054 |
|
7169 //! @SYMTestPriority medium |
|
7170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7172 <action> |
|
7173 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7174 <actiontype>DeriveKey</actiontype> |
|
7175 <actionbody> |
|
7176 <derivekey> |
|
7177 <kdf>pkcs#12</kdf> |
|
7178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7179 <salt>53414C54</salt> |
|
7180 <iterations>1536</iterations> |
|
7181 <key>8F8FC96A3D958731780B50E843D6BB65137A0728C3</key> |
|
7182 </derivekey> |
|
7183 </actionbody> |
|
7184 </action> |
|
7185 |
|
7186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7188 //! @SYMREQ CIT_PREQ1054 |
|
7189 //! @SYMTestPriority medium |
|
7190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7192 <action> |
|
7193 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7194 <actiontype>DeriveKey</actiontype> |
|
7195 <actionbody> |
|
7196 <derivekey> |
|
7197 <kdf>pkcs#12</kdf> |
|
7198 <passwd>0000</passwd> |
|
7199 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7200 <iterations>1536</iterations> |
|
7201 <key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25</key> |
|
7202 </derivekey> |
|
7203 </actionbody> |
|
7204 </action> |
|
7205 |
|
7206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7208 //! @SYMREQ CIT_PREQ1054 |
|
7209 //! @SYMTestPriority medium |
|
7210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7212 <action> |
|
7213 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7214 <actiontype>DeriveKey</actiontype> |
|
7215 <actionbody> |
|
7216 <derivekey> |
|
7217 <kdf>pkcs#12</kdf> |
|
7218 <passwd>0001</passwd> |
|
7219 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7220 <iterations>1536</iterations> |
|
7221 <key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB4</key> |
|
7222 </derivekey> |
|
7223 </actionbody> |
|
7224 </action> |
|
7225 |
|
7226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7228 //! @SYMREQ CIT_PREQ1054 |
|
7229 //! @SYMTestPriority medium |
|
7230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7232 <action> |
|
7233 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7234 <actiontype>DeriveKey</actiontype> |
|
7235 <actionbody> |
|
7236 <derivekey> |
|
7237 <kdf>pkcs#12</kdf> |
|
7238 <passwd>PSWD</passwd> |
|
7239 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7240 <iterations>1536</iterations> |
|
7241 <key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0C</key> |
|
7242 </derivekey> |
|
7243 </actionbody> |
|
7244 </action> |
|
7245 |
|
7246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7248 //! @SYMREQ CIT_PREQ1054 |
|
7249 //! @SYMTestPriority medium |
|
7250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7252 <action> |
|
7253 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7254 <actiontype>DeriveKey</actiontype> |
|
7255 <actionbody> |
|
7256 <derivekey> |
|
7257 <kdf>pkcs#12</kdf> |
|
7258 <passwd>password</passwd> |
|
7259 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7260 <iterations>1536</iterations> |
|
7261 <key>C05FE26245C742CC01B23C655E5D934D734610DE01</key> |
|
7262 </derivekey> |
|
7263 </actionbody> |
|
7264 </action> |
|
7265 |
|
7266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7268 //! @SYMREQ CIT_PREQ1054 |
|
7269 //! @SYMTestPriority medium |
|
7270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7272 <action> |
|
7273 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7274 <actiontype>DeriveKey</actiontype> |
|
7275 <actionbody> |
|
7276 <derivekey> |
|
7277 <kdf>pkcs#12</kdf> |
|
7278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7279 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7280 <iterations>1536</iterations> |
|
7281 <key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0</key> |
|
7282 </derivekey> |
|
7283 </actionbody> |
|
7284 </action> |
|
7285 |
|
7286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7288 //! @SYMREQ CIT_PREQ1054 |
|
7289 //! @SYMTestPriority medium |
|
7290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7292 <action> |
|
7293 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7294 <actiontype>DeriveKey</actiontype> |
|
7295 <actionbody> |
|
7296 <derivekey> |
|
7297 <kdf>pkcs#12</kdf> |
|
7298 <passwd>0000</passwd> |
|
7299 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7300 <iterations>1536</iterations> |
|
7301 <key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3</key> |
|
7302 </derivekey> |
|
7303 </actionbody> |
|
7304 </action> |
|
7305 |
|
7306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7308 //! @SYMREQ CIT_PREQ1054 |
|
7309 //! @SYMTestPriority medium |
|
7310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7312 <action> |
|
7313 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7314 <actiontype>DeriveKey</actiontype> |
|
7315 <actionbody> |
|
7316 <derivekey> |
|
7317 <kdf>pkcs#12</kdf> |
|
7318 <passwd>0001</passwd> |
|
7319 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7320 <iterations>1536</iterations> |
|
7321 <key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA</key> |
|
7322 </derivekey> |
|
7323 </actionbody> |
|
7324 </action> |
|
7325 |
|
7326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7328 //! @SYMREQ CIT_PREQ1054 |
|
7329 //! @SYMTestPriority medium |
|
7330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7332 <action> |
|
7333 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7334 <actiontype>DeriveKey</actiontype> |
|
7335 <actionbody> |
|
7336 <derivekey> |
|
7337 <kdf>pkcs#12</kdf> |
|
7338 <passwd>PSWD</passwd> |
|
7339 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7340 <iterations>1536</iterations> |
|
7341 <key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA</key> |
|
7342 </derivekey> |
|
7343 </actionbody> |
|
7344 </action> |
|
7345 |
|
7346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7348 //! @SYMREQ CIT_PREQ1054 |
|
7349 //! @SYMTestPriority medium |
|
7350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7352 <action> |
|
7353 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7354 <actiontype>DeriveKey</actiontype> |
|
7355 <actionbody> |
|
7356 <derivekey> |
|
7357 <kdf>pkcs#12</kdf> |
|
7358 <passwd>password</passwd> |
|
7359 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7360 <iterations>1536</iterations> |
|
7361 <key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD4</key> |
|
7362 </derivekey> |
|
7363 </actionbody> |
|
7364 </action> |
|
7365 |
|
7366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7368 //! @SYMREQ CIT_PREQ1054 |
|
7369 //! @SYMTestPriority medium |
|
7370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7372 <action> |
|
7373 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7374 <actiontype>DeriveKey</actiontype> |
|
7375 <actionbody> |
|
7376 <derivekey> |
|
7377 <kdf>pkcs#12</kdf> |
|
7378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7379 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7380 <iterations>1536</iterations> |
|
7381 <key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B2</key> |
|
7382 </derivekey> |
|
7383 </actionbody> |
|
7384 </action> |
|
7385 |
|
7386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7388 //! @SYMREQ CIT_PREQ1054 |
|
7389 //! @SYMTestPriority medium |
|
7390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7392 <action> |
|
7393 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7394 <actiontype>DeriveKey</actiontype> |
|
7395 <actionbody> |
|
7396 <derivekey> |
|
7397 <kdf>pkcs#12</kdf> |
|
7398 <passwd>0000</passwd> |
|
7399 <salt>53414C54</salt> |
|
7400 <iterations>2048</iterations> |
|
7401 <key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCD</key> |
|
7402 </derivekey> |
|
7403 </actionbody> |
|
7404 </action> |
|
7405 |
|
7406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7408 //! @SYMREQ CIT_PREQ1054 |
|
7409 //! @SYMTestPriority medium |
|
7410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7412 <action> |
|
7413 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7414 <actiontype>DeriveKey</actiontype> |
|
7415 <actionbody> |
|
7416 <derivekey> |
|
7417 <kdf>pkcs#12</kdf> |
|
7418 <passwd>0001</passwd> |
|
7419 <salt>53414C54</salt> |
|
7420 <iterations>2048</iterations> |
|
7421 <key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2</key> |
|
7422 </derivekey> |
|
7423 </actionbody> |
|
7424 </action> |
|
7425 |
|
7426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7428 //! @SYMREQ CIT_PREQ1054 |
|
7429 //! @SYMTestPriority medium |
|
7430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7432 <action> |
|
7433 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7434 <actiontype>DeriveKey</actiontype> |
|
7435 <actionbody> |
|
7436 <derivekey> |
|
7437 <kdf>pkcs#12</kdf> |
|
7438 <passwd>PSWD</passwd> |
|
7439 <salt>53414C54</salt> |
|
7440 <iterations>2048</iterations> |
|
7441 <key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2</key> |
|
7442 </derivekey> |
|
7443 </actionbody> |
|
7444 </action> |
|
7445 |
|
7446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7448 //! @SYMREQ CIT_PREQ1054 |
|
7449 //! @SYMTestPriority medium |
|
7450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7452 <action> |
|
7453 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7454 <actiontype>DeriveKey</actiontype> |
|
7455 <actionbody> |
|
7456 <derivekey> |
|
7457 <kdf>pkcs#12</kdf> |
|
7458 <passwd>password</passwd> |
|
7459 <salt>53414C54</salt> |
|
7460 <iterations>2048</iterations> |
|
7461 <key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D9</key> |
|
7462 </derivekey> |
|
7463 </actionbody> |
|
7464 </action> |
|
7465 |
|
7466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7468 //! @SYMREQ CIT_PREQ1054 |
|
7469 //! @SYMTestPriority medium |
|
7470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7472 <action> |
|
7473 <actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname> |
|
7474 <actiontype>DeriveKey</actiontype> |
|
7475 <actionbody> |
|
7476 <derivekey> |
|
7477 <kdf>pkcs#12</kdf> |
|
7478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7479 <salt>53414C54</salt> |
|
7480 <iterations>2048</iterations> |
|
7481 <key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45</key> |
|
7482 </derivekey> |
|
7483 </actionbody> |
|
7484 </action> |
|
7485 |
|
7486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7488 //! @SYMREQ CIT_PREQ1054 |
|
7489 //! @SYMTestPriority medium |
|
7490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7492 <action> |
|
7493 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7494 <actiontype>DeriveKey</actiontype> |
|
7495 <actionbody> |
|
7496 <derivekey> |
|
7497 <kdf>pkcs#12</kdf> |
|
7498 <passwd>0000</passwd> |
|
7499 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7500 <iterations>2048</iterations> |
|
7501 <key>CD045229461658BC6C47C259F2D20433173DE4D31E</key> |
|
7502 </derivekey> |
|
7503 </actionbody> |
|
7504 </action> |
|
7505 |
|
7506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7508 //! @SYMREQ CIT_PREQ1054 |
|
7509 //! @SYMTestPriority medium |
|
7510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7512 <action> |
|
7513 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7514 <actiontype>DeriveKey</actiontype> |
|
7515 <actionbody> |
|
7516 <derivekey> |
|
7517 <kdf>pkcs#12</kdf> |
|
7518 <passwd>0001</passwd> |
|
7519 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7520 <iterations>2048</iterations> |
|
7521 <key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6D</key> |
|
7522 </derivekey> |
|
7523 </actionbody> |
|
7524 </action> |
|
7525 |
|
7526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7528 //! @SYMREQ CIT_PREQ1054 |
|
7529 //! @SYMTestPriority medium |
|
7530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7532 <action> |
|
7533 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7534 <actiontype>DeriveKey</actiontype> |
|
7535 <actionbody> |
|
7536 <derivekey> |
|
7537 <kdf>pkcs#12</kdf> |
|
7538 <passwd>PSWD</passwd> |
|
7539 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7540 <iterations>2048</iterations> |
|
7541 <key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC</key> |
|
7542 </derivekey> |
|
7543 </actionbody> |
|
7544 </action> |
|
7545 |
|
7546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7548 //! @SYMREQ CIT_PREQ1054 |
|
7549 //! @SYMTestPriority medium |
|
7550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7552 <action> |
|
7553 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7554 <actiontype>DeriveKey</actiontype> |
|
7555 <actionbody> |
|
7556 <derivekey> |
|
7557 <kdf>pkcs#12</kdf> |
|
7558 <passwd>password</passwd> |
|
7559 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7560 <iterations>2048</iterations> |
|
7561 <key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B</key> |
|
7562 </derivekey> |
|
7563 </actionbody> |
|
7564 </action> |
|
7565 |
|
7566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7568 //! @SYMREQ CIT_PREQ1054 |
|
7569 //! @SYMTestPriority medium |
|
7570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7572 <action> |
|
7573 <actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname> |
|
7574 <actiontype>DeriveKey</actiontype> |
|
7575 <actionbody> |
|
7576 <derivekey> |
|
7577 <kdf>pkcs#12</kdf> |
|
7578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7579 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7580 <iterations>2048</iterations> |
|
7581 <key>A5B348EB4926290B223724CC8E4ED67FF458F23622</key> |
|
7582 </derivekey> |
|
7583 </actionbody> |
|
7584 </action> |
|
7585 |
|
7586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7588 //! @SYMREQ CIT_PREQ1054 |
|
7589 //! @SYMTestPriority medium |
|
7590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7592 <action> |
|
7593 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7594 <actiontype>DeriveKey</actiontype> |
|
7595 <actionbody> |
|
7596 <derivekey> |
|
7597 <kdf>pkcs#12</kdf> |
|
7598 <passwd>0000</passwd> |
|
7599 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7600 <iterations>2048</iterations> |
|
7601 <key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A25</key> |
|
7602 </derivekey> |
|
7603 </actionbody> |
|
7604 </action> |
|
7605 |
|
7606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7608 //! @SYMREQ CIT_PREQ1054 |
|
7609 //! @SYMTestPriority medium |
|
7610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7612 <action> |
|
7613 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7614 <actiontype>DeriveKey</actiontype> |
|
7615 <actionbody> |
|
7616 <derivekey> |
|
7617 <kdf>pkcs#12</kdf> |
|
7618 <passwd>0001</passwd> |
|
7619 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7620 <iterations>2048</iterations> |
|
7621 <key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE1360</key> |
|
7622 </derivekey> |
|
7623 </actionbody> |
|
7624 </action> |
|
7625 |
|
7626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7628 //! @SYMREQ CIT_PREQ1054 |
|
7629 //! @SYMTestPriority medium |
|
7630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7632 <action> |
|
7633 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7634 <actiontype>DeriveKey</actiontype> |
|
7635 <actionbody> |
|
7636 <derivekey> |
|
7637 <kdf>pkcs#12</kdf> |
|
7638 <passwd>PSWD</passwd> |
|
7639 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7640 <iterations>2048</iterations> |
|
7641 <key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2</key> |
|
7642 </derivekey> |
|
7643 </actionbody> |
|
7644 </action> |
|
7645 |
|
7646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7648 //! @SYMREQ CIT_PREQ1054 |
|
7649 //! @SYMTestPriority medium |
|
7650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7652 <action> |
|
7653 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7654 <actiontype>DeriveKey</actiontype> |
|
7655 <actionbody> |
|
7656 <derivekey> |
|
7657 <kdf>pkcs#12</kdf> |
|
7658 <passwd>password</passwd> |
|
7659 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7660 <iterations>2048</iterations> |
|
7661 <key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF0</key> |
|
7662 </derivekey> |
|
7663 </actionbody> |
|
7664 </action> |
|
7665 |
|
7666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7668 //! @SYMREQ CIT_PREQ1054 |
|
7669 //! @SYMTestPriority medium |
|
7670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7672 <action> |
|
7673 <actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname> |
|
7674 <actiontype>DeriveKey</actiontype> |
|
7675 <actionbody> |
|
7676 <derivekey> |
|
7677 <kdf>pkcs#12</kdf> |
|
7678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7679 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7680 <iterations>2048</iterations> |
|
7681 <key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1</key> |
|
7682 </derivekey> |
|
7683 </actionbody> |
|
7684 </action> |
|
7685 |
|
7686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7688 //! @SYMREQ CIT_PREQ1054 |
|
7689 //! @SYMTestPriority medium |
|
7690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7692 <action> |
|
7693 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
7694 <actiontype>DeriveKey</actiontype> |
|
7695 <actionbody> |
|
7696 <derivekey> |
|
7697 <kdf>pkcs#12</kdf> |
|
7698 <passwd>0000</passwd> |
|
7699 <salt>53414C54</salt> |
|
7700 <iterations>1</iterations> |
|
7701 <key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7FB67481AA26FAE2392310DEEF5BA9CB27DCE2D3FB11C95109E</key> |
|
7702 </derivekey> |
|
7703 </actionbody> |
|
7704 </action> |
|
7705 |
|
7706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7708 //! @SYMREQ CIT_PREQ1054 |
|
7709 //! @SYMTestPriority medium |
|
7710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7712 <action> |
|
7713 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
7714 <actiontype>DeriveKey</actiontype> |
|
7715 <actionbody> |
|
7716 <derivekey> |
|
7717 <kdf>pkcs#12</kdf> |
|
7718 <passwd>0001</passwd> |
|
7719 <salt>53414C54</salt> |
|
7720 <iterations>1</iterations> |
|
7721 <key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B5FC87F188064903840A07BEA1540D4397A8C3BF85454D5EAEF</key> |
|
7722 </derivekey> |
|
7723 </actionbody> |
|
7724 </action> |
|
7725 |
|
7726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7728 //! @SYMREQ CIT_PREQ1054 |
|
7729 //! @SYMTestPriority medium |
|
7730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7732 <action> |
|
7733 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
7734 <actiontype>DeriveKey</actiontype> |
|
7735 <actionbody> |
|
7736 <derivekey> |
|
7737 <kdf>pkcs#12</kdf> |
|
7738 <passwd>PSWD</passwd> |
|
7739 <salt>53414C54</salt> |
|
7740 <iterations>1</iterations> |
|
7741 <key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB0959936E4C6D9ED338B321B97C02E22A12E67A249DF5FFBB5F09E01</key> |
|
7742 </derivekey> |
|
7743 </actionbody> |
|
7744 </action> |
|
7745 |
|
7746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7748 //! @SYMREQ CIT_PREQ1054 |
|
7749 //! @SYMTestPriority medium |
|
7750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7752 <action> |
|
7753 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
7754 <actiontype>DeriveKey</actiontype> |
|
7755 <actionbody> |
|
7756 <derivekey> |
|
7757 <kdf>pkcs#12</kdf> |
|
7758 <passwd>password</passwd> |
|
7759 <salt>53414C54</salt> |
|
7760 <iterations>1</iterations> |
|
7761 <key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C596AEC2CBF2648BC315B5422D9071708C31F2FCC6D7AC48ED63</key> |
|
7762 </derivekey> |
|
7763 </actionbody> |
|
7764 </action> |
|
7765 |
|
7766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7768 //! @SYMREQ CIT_PREQ1054 |
|
7769 //! @SYMTestPriority medium |
|
7770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7772 <action> |
|
7773 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
7774 <actiontype>DeriveKey</actiontype> |
|
7775 <actionbody> |
|
7776 <derivekey> |
|
7777 <kdf>pkcs#12</kdf> |
|
7778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7779 <salt>53414C54</salt> |
|
7780 <iterations>1</iterations> |
|
7781 <key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A655F8AB429B72644AA7EE4C3FA31141DACFEB8D89E1825091F</key> |
|
7782 </derivekey> |
|
7783 </actionbody> |
|
7784 </action> |
|
7785 |
|
7786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7788 //! @SYMREQ CIT_PREQ1054 |
|
7789 //! @SYMTestPriority medium |
|
7790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7792 <action> |
|
7793 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
7794 <actiontype>DeriveKey</actiontype> |
|
7795 <actionbody> |
|
7796 <derivekey> |
|
7797 <kdf>pkcs#12</kdf> |
|
7798 <passwd>0000</passwd> |
|
7799 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7800 <iterations>1</iterations> |
|
7801 <key>49CABE7B67736931126499722509C03D4BBEF714A80CCCCF475F4CA3FCBC217CAFA6AFF894CEA28E0DCD7B5A0D0D</key> |
|
7802 </derivekey> |
|
7803 </actionbody> |
|
7804 </action> |
|
7805 |
|
7806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7808 //! @SYMREQ CIT_PREQ1054 |
|
7809 //! @SYMTestPriority medium |
|
7810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7812 <action> |
|
7813 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
7814 <actiontype>DeriveKey</actiontype> |
|
7815 <actionbody> |
|
7816 <derivekey> |
|
7817 <kdf>pkcs#12</kdf> |
|
7818 <passwd>0001</passwd> |
|
7819 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7820 <iterations>1</iterations> |
|
7821 <key>F994B990D3554AFB778C729E9BAA0CC6EB5BA765340999DE8474B918B754A380F8141A055CD68B85B4CDCC592ED9</key> |
|
7822 </derivekey> |
|
7823 </actionbody> |
|
7824 </action> |
|
7825 |
|
7826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7828 //! @SYMREQ CIT_PREQ1054 |
|
7829 //! @SYMTestPriority medium |
|
7830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7832 <action> |
|
7833 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
7834 <actiontype>DeriveKey</actiontype> |
|
7835 <actionbody> |
|
7836 <derivekey> |
|
7837 <kdf>pkcs#12</kdf> |
|
7838 <passwd>PSWD</passwd> |
|
7839 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7840 <iterations>1</iterations> |
|
7841 <key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC0246300C1BDD916C1EF496E57D589FB2C357D7EF9142AB64B2E02</key> |
|
7842 </derivekey> |
|
7843 </actionbody> |
|
7844 </action> |
|
7845 |
|
7846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7848 //! @SYMREQ CIT_PREQ1054 |
|
7849 //! @SYMTestPriority medium |
|
7850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7852 <action> |
|
7853 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
7854 <actiontype>DeriveKey</actiontype> |
|
7855 <actionbody> |
|
7856 <derivekey> |
|
7857 <kdf>pkcs#12</kdf> |
|
7858 <passwd>password</passwd> |
|
7859 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7860 <iterations>1</iterations> |
|
7861 <key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888F04507B6810813D6DDAF8E0257911B49AB5250127C50809B33</key> |
|
7862 </derivekey> |
|
7863 </actionbody> |
|
7864 </action> |
|
7865 |
|
7866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7868 //! @SYMREQ CIT_PREQ1054 |
|
7869 //! @SYMTestPriority medium |
|
7870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7872 <action> |
|
7873 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
7874 <actiontype>DeriveKey</actiontype> |
|
7875 <actionbody> |
|
7876 <derivekey> |
|
7877 <kdf>pkcs#12</kdf> |
|
7878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7879 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
7880 <iterations>1</iterations> |
|
7881 <key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B7984CFB3D568FE48E9F78B99EB8561E2F627E46D0EEECF491C</key> |
|
7882 </derivekey> |
|
7883 </actionbody> |
|
7884 </action> |
|
7885 |
|
7886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7888 //! @SYMREQ CIT_PREQ1054 |
|
7889 //! @SYMTestPriority medium |
|
7890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7892 <action> |
|
7893 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
7894 <actiontype>DeriveKey</actiontype> |
|
7895 <actionbody> |
|
7896 <derivekey> |
|
7897 <kdf>pkcs#12</kdf> |
|
7898 <passwd>0000</passwd> |
|
7899 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7900 <iterations>1</iterations> |
|
7901 <key>90253A49C069E7FF35281461A4DDBE0BB38F4041A04FF42A617251CC66ED7314BFAF4CB2F47A98E42B8AA3BE142A</key> |
|
7902 </derivekey> |
|
7903 </actionbody> |
|
7904 </action> |
|
7905 |
|
7906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7908 //! @SYMREQ CIT_PREQ1054 |
|
7909 //! @SYMTestPriority medium |
|
7910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7912 <action> |
|
7913 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
7914 <actiontype>DeriveKey</actiontype> |
|
7915 <actionbody> |
|
7916 <derivekey> |
|
7917 <kdf>pkcs#12</kdf> |
|
7918 <passwd>0001</passwd> |
|
7919 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7920 <iterations>1</iterations> |
|
7921 <key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8FA3F056762C96D7E119F68827FBFCC07B2A9E98238B52AA02B</key> |
|
7922 </derivekey> |
|
7923 </actionbody> |
|
7924 </action> |
|
7925 |
|
7926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7928 //! @SYMREQ CIT_PREQ1054 |
|
7929 //! @SYMTestPriority medium |
|
7930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7932 <action> |
|
7933 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
7934 <actiontype>DeriveKey</actiontype> |
|
7935 <actionbody> |
|
7936 <derivekey> |
|
7937 <kdf>pkcs#12</kdf> |
|
7938 <passwd>PSWD</passwd> |
|
7939 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7940 <iterations>1</iterations> |
|
7941 <key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC812A4EEE1F3DE7E52EA6A981DB02085FC4AB4860E438EA50BC5</key> |
|
7942 </derivekey> |
|
7943 </actionbody> |
|
7944 </action> |
|
7945 |
|
7946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7948 //! @SYMREQ CIT_PREQ1054 |
|
7949 //! @SYMTestPriority medium |
|
7950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7952 <action> |
|
7953 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
7954 <actiontype>DeriveKey</actiontype> |
|
7955 <actionbody> |
|
7956 <derivekey> |
|
7957 <kdf>pkcs#12</kdf> |
|
7958 <passwd>password</passwd> |
|
7959 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7960 <iterations>1</iterations> |
|
7961 <key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C19C126E28BC5C05064D38F67EF7A72A28795F0CFBA8574DA174</key> |
|
7962 </derivekey> |
|
7963 </actionbody> |
|
7964 </action> |
|
7965 |
|
7966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7968 //! @SYMREQ CIT_PREQ1054 |
|
7969 //! @SYMTestPriority medium |
|
7970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7972 <action> |
|
7973 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
7974 <actiontype>DeriveKey</actiontype> |
|
7975 <actionbody> |
|
7976 <derivekey> |
|
7977 <kdf>pkcs#12</kdf> |
|
7978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
7979 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
7980 <iterations>1</iterations> |
|
7981 <key>27476572AF26E99AB85CD350DC802ABA3A831332A7E037629B764434E2E02B5AB8E8A3DC181BBA3AD9AF9D7E8F08</key> |
|
7982 </derivekey> |
|
7983 </actionbody> |
|
7984 </action> |
|
7985 |
|
7986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
7987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
7988 //! @SYMREQ CIT_PREQ1054 |
|
7989 //! @SYMTestPriority medium |
|
7990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
7991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
7992 <action> |
|
7993 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
7994 <actiontype>DeriveKey</actiontype> |
|
7995 <actionbody> |
|
7996 <derivekey> |
|
7997 <kdf>pkcs#12</kdf> |
|
7998 <passwd>0000</passwd> |
|
7999 <salt>53414C54</salt> |
|
8000 <iterations>2</iterations> |
|
8001 <key>A1D9010A6761CB2675F1C33BB3C5215851703D0D2657B057B9372B986ABA327B6C8B8D4372656C74E9756C7C0C2C</key> |
|
8002 </derivekey> |
|
8003 </actionbody> |
|
8004 </action> |
|
8005 |
|
8006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8008 //! @SYMREQ CIT_PREQ1054 |
|
8009 //! @SYMTestPriority medium |
|
8010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8012 <action> |
|
8013 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8014 <actiontype>DeriveKey</actiontype> |
|
8015 <actionbody> |
|
8016 <derivekey> |
|
8017 <kdf>pkcs#12</kdf> |
|
8018 <passwd>0001</passwd> |
|
8019 <salt>53414C54</salt> |
|
8020 <iterations>2</iterations> |
|
8021 <key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47AC57D1E3FE07F2C194037B1CE0E18DE0CB8C335975EA51B037</key> |
|
8022 </derivekey> |
|
8023 </actionbody> |
|
8024 </action> |
|
8025 |
|
8026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8028 //! @SYMREQ CIT_PREQ1054 |
|
8029 //! @SYMTestPriority medium |
|
8030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8032 <action> |
|
8033 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8034 <actiontype>DeriveKey</actiontype> |
|
8035 <actionbody> |
|
8036 <derivekey> |
|
8037 <kdf>pkcs#12</kdf> |
|
8038 <passwd>PSWD</passwd> |
|
8039 <salt>53414C54</salt> |
|
8040 <iterations>2</iterations> |
|
8041 <key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE332D3AB8A36EE0DC8F1B7E691D2FA8BCCC2C7C371639EBA5CC6</key> |
|
8042 </derivekey> |
|
8043 </actionbody> |
|
8044 </action> |
|
8045 |
|
8046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8048 //! @SYMREQ CIT_PREQ1054 |
|
8049 //! @SYMTestPriority medium |
|
8050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8052 <action> |
|
8053 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8054 <actiontype>DeriveKey</actiontype> |
|
8055 <actionbody> |
|
8056 <derivekey> |
|
8057 <kdf>pkcs#12</kdf> |
|
8058 <passwd>password</passwd> |
|
8059 <salt>53414C54</salt> |
|
8060 <iterations>2</iterations> |
|
8061 <key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A0EC11A60E916ADAD62C57711E88134D3451CEE8640938390E9</key> |
|
8062 </derivekey> |
|
8063 </actionbody> |
|
8064 </action> |
|
8065 |
|
8066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8068 //! @SYMREQ CIT_PREQ1054 |
|
8069 //! @SYMTestPriority medium |
|
8070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8072 <action> |
|
8073 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8074 <actiontype>DeriveKey</actiontype> |
|
8075 <actionbody> |
|
8076 <derivekey> |
|
8077 <kdf>pkcs#12</kdf> |
|
8078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8079 <salt>53414C54</salt> |
|
8080 <iterations>2</iterations> |
|
8081 <key>5BF185C726EE2182888A834066C30BA92C0A6A140FD09995773E708440FF38F65CBF71E7449EF43ADDDDCCEE7B63</key> |
|
8082 </derivekey> |
|
8083 </actionbody> |
|
8084 </action> |
|
8085 |
|
8086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8088 //! @SYMREQ CIT_PREQ1054 |
|
8089 //! @SYMTestPriority medium |
|
8090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8092 <action> |
|
8093 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8094 <actiontype>DeriveKey</actiontype> |
|
8095 <actionbody> |
|
8096 <derivekey> |
|
8097 <kdf>pkcs#12</kdf> |
|
8098 <passwd>0000</passwd> |
|
8099 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8100 <iterations>2</iterations> |
|
8101 <key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734423A7247E5DFD46D2CE07E64F4F881362C98992B188EDE499D</key> |
|
8102 </derivekey> |
|
8103 </actionbody> |
|
8104 </action> |
|
8105 |
|
8106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8108 //! @SYMREQ CIT_PREQ1054 |
|
8109 //! @SYMTestPriority medium |
|
8110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8112 <action> |
|
8113 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8114 <actiontype>DeriveKey</actiontype> |
|
8115 <actionbody> |
|
8116 <derivekey> |
|
8117 <kdf>pkcs#12</kdf> |
|
8118 <passwd>0001</passwd> |
|
8119 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8120 <iterations>2</iterations> |
|
8121 <key>63E6DF459C899D72577C20FFE4F27670F3A85EA780B450C711D83FB12C0B0A0539209B1B06AF82EE392AB3FD6A6B</key> |
|
8122 </derivekey> |
|
8123 </actionbody> |
|
8124 </action> |
|
8125 |
|
8126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8128 //! @SYMREQ CIT_PREQ1054 |
|
8129 //! @SYMTestPriority medium |
|
8130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8132 <action> |
|
8133 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8134 <actiontype>DeriveKey</actiontype> |
|
8135 <actionbody> |
|
8136 <derivekey> |
|
8137 <kdf>pkcs#12</kdf> |
|
8138 <passwd>PSWD</passwd> |
|
8139 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8140 <iterations>2</iterations> |
|
8141 <key>C2099204ABFBB841875BD7595A89D31A9D03A34B94D3ED582C55B0787E2FB841ADE1E6171D6FE2BDDB19A658F552</key> |
|
8142 </derivekey> |
|
8143 </actionbody> |
|
8144 </action> |
|
8145 |
|
8146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8148 //! @SYMREQ CIT_PREQ1054 |
|
8149 //! @SYMTestPriority medium |
|
8150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8152 <action> |
|
8153 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8154 <actiontype>DeriveKey</actiontype> |
|
8155 <actionbody> |
|
8156 <derivekey> |
|
8157 <kdf>pkcs#12</kdf> |
|
8158 <passwd>password</passwd> |
|
8159 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8160 <iterations>2</iterations> |
|
8161 <key>3204D28A32DF299B612958906C79154AED69D3F1C0351B1A4B4E2DCA7E93F3CAD92714CC9E13CCD0E95A305EBB13</key> |
|
8162 </derivekey> |
|
8163 </actionbody> |
|
8164 </action> |
|
8165 |
|
8166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8168 //! @SYMREQ CIT_PREQ1054 |
|
8169 //! @SYMTestPriority medium |
|
8170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8172 <action> |
|
8173 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8174 <actiontype>DeriveKey</actiontype> |
|
8175 <actionbody> |
|
8176 <derivekey> |
|
8177 <kdf>pkcs#12</kdf> |
|
8178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8179 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8180 <iterations>2</iterations> |
|
8181 <key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04873EC243829CE9F83DE277AEC92B18D43211D6DAC966AFFFE8</key> |
|
8182 </derivekey> |
|
8183 </actionbody> |
|
8184 </action> |
|
8185 |
|
8186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8188 //! @SYMREQ CIT_PREQ1054 |
|
8189 //! @SYMTestPriority medium |
|
8190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8192 <action> |
|
8193 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8194 <actiontype>DeriveKey</actiontype> |
|
8195 <actionbody> |
|
8196 <derivekey> |
|
8197 <kdf>pkcs#12</kdf> |
|
8198 <passwd>0000</passwd> |
|
8199 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8200 <iterations>2</iterations> |
|
8201 <key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11162299D91EC09517DEACB6C8992D8D1952B9410AED287F9387</key> |
|
8202 </derivekey> |
|
8203 </actionbody> |
|
8204 </action> |
|
8205 |
|
8206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8208 //! @SYMREQ CIT_PREQ1054 |
|
8209 //! @SYMTestPriority medium |
|
8210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8212 <action> |
|
8213 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8214 <actiontype>DeriveKey</actiontype> |
|
8215 <actionbody> |
|
8216 <derivekey> |
|
8217 <kdf>pkcs#12</kdf> |
|
8218 <passwd>0001</passwd> |
|
8219 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8220 <iterations>2</iterations> |
|
8221 <key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC49A6C7BD0A735DBA22FCBC56A6AACAA2ECE7F146A54C7442A7</key> |
|
8222 </derivekey> |
|
8223 </actionbody> |
|
8224 </action> |
|
8225 |
|
8226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8228 //! @SYMREQ CIT_PREQ1054 |
|
8229 //! @SYMTestPriority medium |
|
8230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8232 <action> |
|
8233 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8234 <actiontype>DeriveKey</actiontype> |
|
8235 <actionbody> |
|
8236 <derivekey> |
|
8237 <kdf>pkcs#12</kdf> |
|
8238 <passwd>PSWD</passwd> |
|
8239 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8240 <iterations>2</iterations> |
|
8241 <key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F41D1179DBADD72CF7CC8A3F03118C5EF87C588C6665E942158</key> |
|
8242 </derivekey> |
|
8243 </actionbody> |
|
8244 </action> |
|
8245 |
|
8246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8248 //! @SYMREQ CIT_PREQ1054 |
|
8249 //! @SYMTestPriority medium |
|
8250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8252 <action> |
|
8253 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8254 <actiontype>DeriveKey</actiontype> |
|
8255 <actionbody> |
|
8256 <derivekey> |
|
8257 <kdf>pkcs#12</kdf> |
|
8258 <passwd>password</passwd> |
|
8259 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8260 <iterations>2</iterations> |
|
8261 <key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDFE51188263603019F80688985DB1EF389A8F2CADA47463756C7</key> |
|
8262 </derivekey> |
|
8263 </actionbody> |
|
8264 </action> |
|
8265 |
|
8266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8268 //! @SYMREQ CIT_PREQ1054 |
|
8269 //! @SYMTestPriority medium |
|
8270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8272 <action> |
|
8273 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8274 <actiontype>DeriveKey</actiontype> |
|
8275 <actionbody> |
|
8276 <derivekey> |
|
8277 <kdf>pkcs#12</kdf> |
|
8278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8279 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8280 <iterations>2</iterations> |
|
8281 <key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647451A53DE6218B8B2F860931DE8975712EAC7CAF34347828525</key> |
|
8282 </derivekey> |
|
8283 </actionbody> |
|
8284 </action> |
|
8285 |
|
8286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8288 //! @SYMREQ CIT_PREQ1054 |
|
8289 //! @SYMTestPriority medium |
|
8290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8292 <action> |
|
8293 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8294 <actiontype>DeriveKey</actiontype> |
|
8295 <actionbody> |
|
8296 <derivekey> |
|
8297 <kdf>pkcs#12</kdf> |
|
8298 <passwd>0000</passwd> |
|
8299 <salt>53414C54</salt> |
|
8300 <iterations>4</iterations> |
|
8301 <key>D0158BFC57E643965DC161741725CE9478CDF2A0B52A78253F32B2DFCC2228C929F19663EC3AF4B6B3B4A514D2AE</key> |
|
8302 </derivekey> |
|
8303 </actionbody> |
|
8304 </action> |
|
8305 |
|
8306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8308 //! @SYMREQ CIT_PREQ1054 |
|
8309 //! @SYMTestPriority medium |
|
8310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8312 <action> |
|
8313 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8314 <actiontype>DeriveKey</actiontype> |
|
8315 <actionbody> |
|
8316 <derivekey> |
|
8317 <kdf>pkcs#12</kdf> |
|
8318 <passwd>0001</passwd> |
|
8319 <salt>53414C54</salt> |
|
8320 <iterations>4</iterations> |
|
8321 <key>AEB6CD53F0D6830161100C4BFD439B341066339A0025D3CF7DC68CEE4D9AC92B10B29EB19973637D27DC2C9BF911</key> |
|
8322 </derivekey> |
|
8323 </actionbody> |
|
8324 </action> |
|
8325 |
|
8326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8328 //! @SYMREQ CIT_PREQ1054 |
|
8329 //! @SYMTestPriority medium |
|
8330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8332 <action> |
|
8333 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8334 <actiontype>DeriveKey</actiontype> |
|
8335 <actionbody> |
|
8336 <derivekey> |
|
8337 <kdf>pkcs#12</kdf> |
|
8338 <passwd>PSWD</passwd> |
|
8339 <salt>53414C54</salt> |
|
8340 <iterations>4</iterations> |
|
8341 <key>80010C12B66CC739F4ACF8BB154197709F78AAD39ABC8EEC11F7C88CD138DE85A21B5D5DCB9C8E50E0AFABE82149</key> |
|
8342 </derivekey> |
|
8343 </actionbody> |
|
8344 </action> |
|
8345 |
|
8346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8348 //! @SYMREQ CIT_PREQ1054 |
|
8349 //! @SYMTestPriority medium |
|
8350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8352 <action> |
|
8353 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8354 <actiontype>DeriveKey</actiontype> |
|
8355 <actionbody> |
|
8356 <derivekey> |
|
8357 <kdf>pkcs#12</kdf> |
|
8358 <passwd>password</passwd> |
|
8359 <salt>53414C54</salt> |
|
8360 <iterations>4</iterations> |
|
8361 <key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812046A01A53F6FB1C9051ED917D0B3C08A82CADA712730DD2410</key> |
|
8362 </derivekey> |
|
8363 </actionbody> |
|
8364 </action> |
|
8365 |
|
8366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8368 //! @SYMREQ CIT_PREQ1054 |
|
8369 //! @SYMTestPriority medium |
|
8370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8372 <action> |
|
8373 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8374 <actiontype>DeriveKey</actiontype> |
|
8375 <actionbody> |
|
8376 <derivekey> |
|
8377 <kdf>pkcs#12</kdf> |
|
8378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8379 <salt>53414C54</salt> |
|
8380 <iterations>4</iterations> |
|
8381 <key>146C6A5B58AF8561220DE4C13A133248300D59D39E22569CC568CB98585324F9287A672ABFCDF360A26B8B83D1AE</key> |
|
8382 </derivekey> |
|
8383 </actionbody> |
|
8384 </action> |
|
8385 |
|
8386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8388 //! @SYMREQ CIT_PREQ1054 |
|
8389 //! @SYMTestPriority medium |
|
8390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8392 <action> |
|
8393 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8394 <actiontype>DeriveKey</actiontype> |
|
8395 <actionbody> |
|
8396 <derivekey> |
|
8397 <kdf>pkcs#12</kdf> |
|
8398 <passwd>0000</passwd> |
|
8399 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8400 <iterations>4</iterations> |
|
8401 <key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE22F0030D6D6FBF85D6A56D7D55A3002233181BCC2A0C4108C8</key> |
|
8402 </derivekey> |
|
8403 </actionbody> |
|
8404 </action> |
|
8405 |
|
8406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8408 //! @SYMREQ CIT_PREQ1054 |
|
8409 //! @SYMTestPriority medium |
|
8410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8412 <action> |
|
8413 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8414 <actiontype>DeriveKey</actiontype> |
|
8415 <actionbody> |
|
8416 <derivekey> |
|
8417 <kdf>pkcs#12</kdf> |
|
8418 <passwd>0001</passwd> |
|
8419 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8420 <iterations>4</iterations> |
|
8421 <key>23930713772E26DBBABB53F3C5C775019B8048482B6FECC40729F2D5023D6F3C27092166E11A435738C3E0DBF7B0</key> |
|
8422 </derivekey> |
|
8423 </actionbody> |
|
8424 </action> |
|
8425 |
|
8426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8428 //! @SYMREQ CIT_PREQ1054 |
|
8429 //! @SYMTestPriority medium |
|
8430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8432 <action> |
|
8433 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8434 <actiontype>DeriveKey</actiontype> |
|
8435 <actionbody> |
|
8436 <derivekey> |
|
8437 <kdf>pkcs#12</kdf> |
|
8438 <passwd>PSWD</passwd> |
|
8439 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8440 <iterations>4</iterations> |
|
8441 <key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A93D6A3DD0A61826365407B4C1CBB589C0BC10EC8B510A83771</key> |
|
8442 </derivekey> |
|
8443 </actionbody> |
|
8444 </action> |
|
8445 |
|
8446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8448 //! @SYMREQ CIT_PREQ1054 |
|
8449 //! @SYMTestPriority medium |
|
8450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8452 <action> |
|
8453 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8454 <actiontype>DeriveKey</actiontype> |
|
8455 <actionbody> |
|
8456 <derivekey> |
|
8457 <kdf>pkcs#12</kdf> |
|
8458 <passwd>password</passwd> |
|
8459 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8460 <iterations>4</iterations> |
|
8461 <key>363619530B170B7BAE1C046B29351C235B8EFED58879EAB2DAF93502D254C5569C2667F16B2AA036619AAF4D8E33</key> |
|
8462 </derivekey> |
|
8463 </actionbody> |
|
8464 </action> |
|
8465 |
|
8466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8468 //! @SYMREQ CIT_PREQ1054 |
|
8469 //! @SYMTestPriority medium |
|
8470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8472 <action> |
|
8473 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8474 <actiontype>DeriveKey</actiontype> |
|
8475 <actionbody> |
|
8476 <derivekey> |
|
8477 <kdf>pkcs#12</kdf> |
|
8478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8479 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8480 <iterations>4</iterations> |
|
8481 <key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4EFF6FE83AD6ED83E4F217EF7E0C6727BEF0614398026907E7E6</key> |
|
8482 </derivekey> |
|
8483 </actionbody> |
|
8484 </action> |
|
8485 |
|
8486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8488 //! @SYMREQ CIT_PREQ1054 |
|
8489 //! @SYMTestPriority medium |
|
8490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8492 <action> |
|
8493 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8494 <actiontype>DeriveKey</actiontype> |
|
8495 <actionbody> |
|
8496 <derivekey> |
|
8497 <kdf>pkcs#12</kdf> |
|
8498 <passwd>0000</passwd> |
|
8499 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8500 <iterations>4</iterations> |
|
8501 <key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0EA1D3AB1983B1E0496EB6FD7259774354267B1976BE459A1D23</key> |
|
8502 </derivekey> |
|
8503 </actionbody> |
|
8504 </action> |
|
8505 |
|
8506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8508 //! @SYMREQ CIT_PREQ1054 |
|
8509 //! @SYMTestPriority medium |
|
8510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8512 <action> |
|
8513 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8514 <actiontype>DeriveKey</actiontype> |
|
8515 <actionbody> |
|
8516 <derivekey> |
|
8517 <kdf>pkcs#12</kdf> |
|
8518 <passwd>0001</passwd> |
|
8519 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8520 <iterations>4</iterations> |
|
8521 <key>9A618595C714486B7D7E3120005C8BC18D5D95D79B54DE1063C64DBE97C41BFC6A4A5239B77F2F603C7AFE06247C</key> |
|
8522 </derivekey> |
|
8523 </actionbody> |
|
8524 </action> |
|
8525 |
|
8526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8528 //! @SYMREQ CIT_PREQ1054 |
|
8529 //! @SYMTestPriority medium |
|
8530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8532 <action> |
|
8533 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8534 <actiontype>DeriveKey</actiontype> |
|
8535 <actionbody> |
|
8536 <derivekey> |
|
8537 <kdf>pkcs#12</kdf> |
|
8538 <passwd>PSWD</passwd> |
|
8539 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8540 <iterations>4</iterations> |
|
8541 <key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208FA46F3C504ABA355D99FE3A4291DBAB83CB6980CD28C153D24</key> |
|
8542 </derivekey> |
|
8543 </actionbody> |
|
8544 </action> |
|
8545 |
|
8546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8548 //! @SYMREQ CIT_PREQ1054 |
|
8549 //! @SYMTestPriority medium |
|
8550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8552 <action> |
|
8553 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8554 <actiontype>DeriveKey</actiontype> |
|
8555 <actionbody> |
|
8556 <derivekey> |
|
8557 <kdf>pkcs#12</kdf> |
|
8558 <passwd>password</passwd> |
|
8559 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8560 <iterations>4</iterations> |
|
8561 <key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2F2B76DBC180C689C88147F5366D48C10086AD45B445F818F22</key> |
|
8562 </derivekey> |
|
8563 </actionbody> |
|
8564 </action> |
|
8565 |
|
8566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8568 //! @SYMREQ CIT_PREQ1054 |
|
8569 //! @SYMTestPriority medium |
|
8570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8572 <action> |
|
8573 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8574 <actiontype>DeriveKey</actiontype> |
|
8575 <actionbody> |
|
8576 <derivekey> |
|
8577 <kdf>pkcs#12</kdf> |
|
8578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8579 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8580 <iterations>4</iterations> |
|
8581 <key>91DF3661364A0DAD28180A41ADCB55676E992986EFCD5481A7EBCCA45806E087BB95BAEFD24685A7D9B08426EFCF</key> |
|
8582 </derivekey> |
|
8583 </actionbody> |
|
8584 </action> |
|
8585 |
|
8586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8588 //! @SYMREQ CIT_PREQ1054 |
|
8589 //! @SYMTestPriority medium |
|
8590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8592 <action> |
|
8593 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8594 <actiontype>DeriveKey</actiontype> |
|
8595 <actionbody> |
|
8596 <derivekey> |
|
8597 <kdf>pkcs#12</kdf> |
|
8598 <passwd>0000</passwd> |
|
8599 <salt>53414C54</salt> |
|
8600 <iterations>8</iterations> |
|
8601 <key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE4612564ECF299468389BF3597B38FF0ADB79AE9A718D7FC5E0D7E</key> |
|
8602 </derivekey> |
|
8603 </actionbody> |
|
8604 </action> |
|
8605 |
|
8606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8608 //! @SYMREQ CIT_PREQ1054 |
|
8609 //! @SYMTestPriority medium |
|
8610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8612 <action> |
|
8613 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8614 <actiontype>DeriveKey</actiontype> |
|
8615 <actionbody> |
|
8616 <derivekey> |
|
8617 <kdf>pkcs#12</kdf> |
|
8618 <passwd>0001</passwd> |
|
8619 <salt>53414C54</salt> |
|
8620 <iterations>8</iterations> |
|
8621 <key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1CD2460647D83960A81A688C1E7C3CB1745C640F96CA26BAB55</key> |
|
8622 </derivekey> |
|
8623 </actionbody> |
|
8624 </action> |
|
8625 |
|
8626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8628 //! @SYMREQ CIT_PREQ1054 |
|
8629 //! @SYMTestPriority medium |
|
8630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8632 <action> |
|
8633 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8634 <actiontype>DeriveKey</actiontype> |
|
8635 <actionbody> |
|
8636 <derivekey> |
|
8637 <kdf>pkcs#12</kdf> |
|
8638 <passwd>PSWD</passwd> |
|
8639 <salt>53414C54</salt> |
|
8640 <iterations>8</iterations> |
|
8641 <key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466B5176BC31A916229C8DC27918BEAC1912CCD1BEDD4D9AC6F7F</key> |
|
8642 </derivekey> |
|
8643 </actionbody> |
|
8644 </action> |
|
8645 |
|
8646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8648 //! @SYMREQ CIT_PREQ1054 |
|
8649 //! @SYMTestPriority medium |
|
8650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8652 <action> |
|
8653 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8654 <actiontype>DeriveKey</actiontype> |
|
8655 <actionbody> |
|
8656 <derivekey> |
|
8657 <kdf>pkcs#12</kdf> |
|
8658 <passwd>password</passwd> |
|
8659 <salt>53414C54</salt> |
|
8660 <iterations>8</iterations> |
|
8661 <key>B0935F11227F5A473073DCD188886687D2A18119532A1D5D0A8631441599FF319BD921404D04DA973217A199F621</key> |
|
8662 </derivekey> |
|
8663 </actionbody> |
|
8664 </action> |
|
8665 |
|
8666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8668 //! @SYMREQ CIT_PREQ1054 |
|
8669 //! @SYMTestPriority medium |
|
8670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8672 <action> |
|
8673 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8674 <actiontype>DeriveKey</actiontype> |
|
8675 <actionbody> |
|
8676 <derivekey> |
|
8677 <kdf>pkcs#12</kdf> |
|
8678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8679 <salt>53414C54</salt> |
|
8680 <iterations>8</iterations> |
|
8681 <key>6602B1B4BBB670208041ECD8E1634845FC0DC28532AF24AA6CB93368E87126BC821DB7B3F4301455B454E9715981</key> |
|
8682 </derivekey> |
|
8683 </actionbody> |
|
8684 </action> |
|
8685 |
|
8686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8688 //! @SYMREQ CIT_PREQ1054 |
|
8689 //! @SYMTestPriority medium |
|
8690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8692 <action> |
|
8693 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8694 <actiontype>DeriveKey</actiontype> |
|
8695 <actionbody> |
|
8696 <derivekey> |
|
8697 <kdf>pkcs#12</kdf> |
|
8698 <passwd>0000</passwd> |
|
8699 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8700 <iterations>8</iterations> |
|
8701 <key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E449B3AFB8236BFFDF548BA07B6269CB5C0D0E0E00AABB5E872F7</key> |
|
8702 </derivekey> |
|
8703 </actionbody> |
|
8704 </action> |
|
8705 |
|
8706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8708 //! @SYMREQ CIT_PREQ1054 |
|
8709 //! @SYMTestPriority medium |
|
8710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8712 <action> |
|
8713 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8714 <actiontype>DeriveKey</actiontype> |
|
8715 <actionbody> |
|
8716 <derivekey> |
|
8717 <kdf>pkcs#12</kdf> |
|
8718 <passwd>0001</passwd> |
|
8719 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8720 <iterations>8</iterations> |
|
8721 <key>6473EB1244E055149E0858C49FAE7B8DC951E7E32AC2AA2146482717104D3E93074D41BCA226B3212A41E4EC0F00</key> |
|
8722 </derivekey> |
|
8723 </actionbody> |
|
8724 </action> |
|
8725 |
|
8726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8728 //! @SYMREQ CIT_PREQ1054 |
|
8729 //! @SYMTestPriority medium |
|
8730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8732 <action> |
|
8733 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8734 <actiontype>DeriveKey</actiontype> |
|
8735 <actionbody> |
|
8736 <derivekey> |
|
8737 <kdf>pkcs#12</kdf> |
|
8738 <passwd>PSWD</passwd> |
|
8739 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8740 <iterations>8</iterations> |
|
8741 <key>AA762B8736D4C37BAD263103CA283E09010B7EFC538B44C6C3CB724C8CEC28C91F57A2778A8C74CBBF00A63D6875</key> |
|
8742 </derivekey> |
|
8743 </actionbody> |
|
8744 </action> |
|
8745 |
|
8746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8748 //! @SYMREQ CIT_PREQ1054 |
|
8749 //! @SYMTestPriority medium |
|
8750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8752 <action> |
|
8753 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8754 <actiontype>DeriveKey</actiontype> |
|
8755 <actionbody> |
|
8756 <derivekey> |
|
8757 <kdf>pkcs#12</kdf> |
|
8758 <passwd>password</passwd> |
|
8759 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8760 <iterations>8</iterations> |
|
8761 <key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D88232044436DA8D74F09E19B578C65F8629D022FD8D529F11E2</key> |
|
8762 </derivekey> |
|
8763 </actionbody> |
|
8764 </action> |
|
8765 |
|
8766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8768 //! @SYMREQ CIT_PREQ1054 |
|
8769 //! @SYMTestPriority medium |
|
8770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8772 <action> |
|
8773 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8774 <actiontype>DeriveKey</actiontype> |
|
8775 <actionbody> |
|
8776 <derivekey> |
|
8777 <kdf>pkcs#12</kdf> |
|
8778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8779 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
8780 <iterations>8</iterations> |
|
8781 <key>935593CA370BB6988F2F41D2F4ABF56E433064D83E5C5C9892BDB854C8219FFBC1404D590450B1613EB0D2CC0447</key> |
|
8782 </derivekey> |
|
8783 </actionbody> |
|
8784 </action> |
|
8785 |
|
8786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8788 //! @SYMREQ CIT_PREQ1054 |
|
8789 //! @SYMTestPriority medium |
|
8790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8792 <action> |
|
8793 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8794 <actiontype>DeriveKey</actiontype> |
|
8795 <actionbody> |
|
8796 <derivekey> |
|
8797 <kdf>pkcs#12</kdf> |
|
8798 <passwd>0000</passwd> |
|
8799 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8800 <iterations>8</iterations> |
|
8801 <key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BFCE80BAAFDC06F9C1D1A2862C10203D891E0B2C23F5394ED271</key> |
|
8802 </derivekey> |
|
8803 </actionbody> |
|
8804 </action> |
|
8805 |
|
8806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8808 //! @SYMREQ CIT_PREQ1054 |
|
8809 //! @SYMTestPriority medium |
|
8810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8812 <action> |
|
8813 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8814 <actiontype>DeriveKey</actiontype> |
|
8815 <actionbody> |
|
8816 <derivekey> |
|
8817 <kdf>pkcs#12</kdf> |
|
8818 <passwd>0001</passwd> |
|
8819 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8820 <iterations>8</iterations> |
|
8821 <key>82B4A13659033EA4025DB51A6CB573F93B03A69634D71DFB7E270A406AF705382CCA3BB17F29C88ED81EA583AFF5</key> |
|
8822 </derivekey> |
|
8823 </actionbody> |
|
8824 </action> |
|
8825 |
|
8826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8828 //! @SYMREQ CIT_PREQ1054 |
|
8829 //! @SYMTestPriority medium |
|
8830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8832 <action> |
|
8833 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8834 <actiontype>DeriveKey</actiontype> |
|
8835 <actionbody> |
|
8836 <derivekey> |
|
8837 <kdf>pkcs#12</kdf> |
|
8838 <passwd>PSWD</passwd> |
|
8839 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8840 <iterations>8</iterations> |
|
8841 <key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94047C10AE3CA2853B57E8E59A819DE9BB2D4F3BFBD302F978C7</key> |
|
8842 </derivekey> |
|
8843 </actionbody> |
|
8844 </action> |
|
8845 |
|
8846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8848 //! @SYMREQ CIT_PREQ1054 |
|
8849 //! @SYMTestPriority medium |
|
8850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8852 <action> |
|
8853 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8854 <actiontype>DeriveKey</actiontype> |
|
8855 <actionbody> |
|
8856 <derivekey> |
|
8857 <kdf>pkcs#12</kdf> |
|
8858 <passwd>password</passwd> |
|
8859 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8860 <iterations>8</iterations> |
|
8861 <key>5670457314E405B0ED1583FC4B82FEAD94B434EBEDD86DFBC39161A8A7E48CAD3591C2C9A14FAA242D860ED55163</key> |
|
8862 </derivekey> |
|
8863 </actionbody> |
|
8864 </action> |
|
8865 |
|
8866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8868 //! @SYMREQ CIT_PREQ1054 |
|
8869 //! @SYMTestPriority medium |
|
8870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8872 <action> |
|
8873 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
8874 <actiontype>DeriveKey</actiontype> |
|
8875 <actionbody> |
|
8876 <derivekey> |
|
8877 <kdf>pkcs#12</kdf> |
|
8878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8879 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
8880 <iterations>8</iterations> |
|
8881 <key>1C4CAE25146D74F3762B5C3FD3A917522564855675801D9D7D946C11B6F57C42C2E7447F8CACF4178D8F7A001A18</key> |
|
8882 </derivekey> |
|
8883 </actionbody> |
|
8884 </action> |
|
8885 |
|
8886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8888 //! @SYMREQ CIT_PREQ1054 |
|
8889 //! @SYMTestPriority medium |
|
8890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8892 <action> |
|
8893 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8894 <actiontype>DeriveKey</actiontype> |
|
8895 <actionbody> |
|
8896 <derivekey> |
|
8897 <kdf>pkcs#12</kdf> |
|
8898 <passwd>0000</passwd> |
|
8899 <salt>53414C54</salt> |
|
8900 <iterations>128</iterations> |
|
8901 <key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93AF1D5E01AB3B9973959193DE7A2433CB46A8A15F2D84D97DBC</key> |
|
8902 </derivekey> |
|
8903 </actionbody> |
|
8904 </action> |
|
8905 |
|
8906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8908 //! @SYMREQ CIT_PREQ1054 |
|
8909 //! @SYMTestPriority medium |
|
8910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8912 <action> |
|
8913 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8914 <actiontype>DeriveKey</actiontype> |
|
8915 <actionbody> |
|
8916 <derivekey> |
|
8917 <kdf>pkcs#12</kdf> |
|
8918 <passwd>0001</passwd> |
|
8919 <salt>53414C54</salt> |
|
8920 <iterations>128</iterations> |
|
8921 <key>C89C3A2C9C06626EB831F4BB5262809B9C138181C44B6D521245B6BBDBE2271369C6B77EC12626368DFCEB358BB8</key> |
|
8922 </derivekey> |
|
8923 </actionbody> |
|
8924 </action> |
|
8925 |
|
8926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8928 //! @SYMREQ CIT_PREQ1054 |
|
8929 //! @SYMTestPriority medium |
|
8930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8932 <action> |
|
8933 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8934 <actiontype>DeriveKey</actiontype> |
|
8935 <actionbody> |
|
8936 <derivekey> |
|
8937 <kdf>pkcs#12</kdf> |
|
8938 <passwd>PSWD</passwd> |
|
8939 <salt>53414C54</salt> |
|
8940 <iterations>128</iterations> |
|
8941 <key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EEE6D0B4E9C0A5EBBFF08FC23CB11E1DB17EBAE6A93C2DA749A6</key> |
|
8942 </derivekey> |
|
8943 </actionbody> |
|
8944 </action> |
|
8945 |
|
8946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8948 //! @SYMREQ CIT_PREQ1054 |
|
8949 //! @SYMTestPriority medium |
|
8950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8952 <action> |
|
8953 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8954 <actiontype>DeriveKey</actiontype> |
|
8955 <actionbody> |
|
8956 <derivekey> |
|
8957 <kdf>pkcs#12</kdf> |
|
8958 <passwd>password</passwd> |
|
8959 <salt>53414C54</salt> |
|
8960 <iterations>128</iterations> |
|
8961 <key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C2011A3B26BD1C95A8797741938D8E3F2057F76B04310B3D922</key> |
|
8962 </derivekey> |
|
8963 </actionbody> |
|
8964 </action> |
|
8965 |
|
8966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8968 //! @SYMREQ CIT_PREQ1054 |
|
8969 //! @SYMTestPriority medium |
|
8970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8972 <action> |
|
8973 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
8974 <actiontype>DeriveKey</actiontype> |
|
8975 <actionbody> |
|
8976 <derivekey> |
|
8977 <kdf>pkcs#12</kdf> |
|
8978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
8979 <salt>53414C54</salt> |
|
8980 <iterations>128</iterations> |
|
8981 <key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F97A6D3BDA02B3173244164AAE9123987A00699B74F042C35DC</key> |
|
8982 </derivekey> |
|
8983 </actionbody> |
|
8984 </action> |
|
8985 |
|
8986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
8987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
8988 //! @SYMREQ CIT_PREQ1054 |
|
8989 //! @SYMTestPriority medium |
|
8990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
8991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
8992 <action> |
|
8993 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
8994 <actiontype>DeriveKey</actiontype> |
|
8995 <actionbody> |
|
8996 <derivekey> |
|
8997 <kdf>pkcs#12</kdf> |
|
8998 <passwd>0000</passwd> |
|
8999 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9000 <iterations>128</iterations> |
|
9001 <key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD8D380FA3C08389E335A71B575F3D48228119EA2E34351C7E51</key> |
|
9002 </derivekey> |
|
9003 </actionbody> |
|
9004 </action> |
|
9005 |
|
9006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9008 //! @SYMREQ CIT_PREQ1054 |
|
9009 //! @SYMTestPriority medium |
|
9010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9012 <action> |
|
9013 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9014 <actiontype>DeriveKey</actiontype> |
|
9015 <actionbody> |
|
9016 <derivekey> |
|
9017 <kdf>pkcs#12</kdf> |
|
9018 <passwd>0001</passwd> |
|
9019 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9020 <iterations>128</iterations> |
|
9021 <key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3FD6375B5D9AB89DDA3B28526392E1BED3594C3A22594137133</key> |
|
9022 </derivekey> |
|
9023 </actionbody> |
|
9024 </action> |
|
9025 |
|
9026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9028 //! @SYMREQ CIT_PREQ1054 |
|
9029 //! @SYMTestPriority medium |
|
9030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9032 <action> |
|
9033 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9034 <actiontype>DeriveKey</actiontype> |
|
9035 <actionbody> |
|
9036 <derivekey> |
|
9037 <kdf>pkcs#12</kdf> |
|
9038 <passwd>PSWD</passwd> |
|
9039 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9040 <iterations>128</iterations> |
|
9041 <key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF6F15DAE903AEAA4C8A9A23B8DA9E91293F5ED1904E6D8F8ED5</key> |
|
9042 </derivekey> |
|
9043 </actionbody> |
|
9044 </action> |
|
9045 |
|
9046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9048 //! @SYMREQ CIT_PREQ1054 |
|
9049 //! @SYMTestPriority medium |
|
9050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9052 <action> |
|
9053 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9054 <actiontype>DeriveKey</actiontype> |
|
9055 <actionbody> |
|
9056 <derivekey> |
|
9057 <kdf>pkcs#12</kdf> |
|
9058 <passwd>password</passwd> |
|
9059 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9060 <iterations>128</iterations> |
|
9061 <key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3483C97430FABCCAB60A1F471741095AEB2B22B00951CEFB816</key> |
|
9062 </derivekey> |
|
9063 </actionbody> |
|
9064 </action> |
|
9065 |
|
9066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9068 //! @SYMREQ CIT_PREQ1054 |
|
9069 //! @SYMTestPriority medium |
|
9070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9072 <action> |
|
9073 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9074 <actiontype>DeriveKey</actiontype> |
|
9075 <actionbody> |
|
9076 <derivekey> |
|
9077 <kdf>pkcs#12</kdf> |
|
9078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9079 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9080 <iterations>128</iterations> |
|
9081 <key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16C2FF4007B705AC86ACDBE7C08A599E170F42573671CAAC9978</key> |
|
9082 </derivekey> |
|
9083 </actionbody> |
|
9084 </action> |
|
9085 |
|
9086 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9088 //! @SYMREQ CIT_PREQ1054 |
|
9089 //! @SYMTestPriority medium |
|
9090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9091 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9092 <action> |
|
9093 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9094 <actiontype>DeriveKey</actiontype> |
|
9095 <actionbody> |
|
9096 <derivekey> |
|
9097 <kdf>pkcs#12</kdf> |
|
9098 <passwd>0000</passwd> |
|
9099 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9100 <iterations>128</iterations> |
|
9101 <key>99FE149183022F9EB2EB815BCC9504E59C524A1497922B0A2AAB43D17ACD0C3C782048DA1AD2BA09B56143681975</key> |
|
9102 </derivekey> |
|
9103 </actionbody> |
|
9104 </action> |
|
9105 |
|
9106 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9108 //! @SYMREQ CIT_PREQ1054 |
|
9109 //! @SYMTestPriority medium |
|
9110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9111 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9112 <action> |
|
9113 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9114 <actiontype>DeriveKey</actiontype> |
|
9115 <actionbody> |
|
9116 <derivekey> |
|
9117 <kdf>pkcs#12</kdf> |
|
9118 <passwd>0001</passwd> |
|
9119 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9120 <iterations>128</iterations> |
|
9121 <key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FEB822868DC3090EEB79DED23D3E5F8FADAF47EB100E36B393BF</key> |
|
9122 </derivekey> |
|
9123 </actionbody> |
|
9124 </action> |
|
9125 |
|
9126 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9128 //! @SYMREQ CIT_PREQ1054 |
|
9129 //! @SYMTestPriority medium |
|
9130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9131 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9132 <action> |
|
9133 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9134 <actiontype>DeriveKey</actiontype> |
|
9135 <actionbody> |
|
9136 <derivekey> |
|
9137 <kdf>pkcs#12</kdf> |
|
9138 <passwd>PSWD</passwd> |
|
9139 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9140 <iterations>128</iterations> |
|
9141 <key>22A70A865774E55CF08A70435611252278DCE76AED5C8A686073CBBEFEA2A3498BF5505B3E9CC6A1BE108737874F</key> |
|
9142 </derivekey> |
|
9143 </actionbody> |
|
9144 </action> |
|
9145 |
|
9146 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9148 //! @SYMREQ CIT_PREQ1054 |
|
9149 //! @SYMTestPriority medium |
|
9150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9151 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9152 <action> |
|
9153 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9154 <actiontype>DeriveKey</actiontype> |
|
9155 <actionbody> |
|
9156 <derivekey> |
|
9157 <kdf>pkcs#12</kdf> |
|
9158 <passwd>password</passwd> |
|
9159 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9160 <iterations>128</iterations> |
|
9161 <key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C672CFA941C4ECCF5F173B42AABBBE23AEF7593C67EF5B183C3C8</key> |
|
9162 </derivekey> |
|
9163 </actionbody> |
|
9164 </action> |
|
9165 |
|
9166 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9168 //! @SYMREQ CIT_PREQ1054 |
|
9169 //! @SYMTestPriority medium |
|
9170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9171 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9172 <action> |
|
9173 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9174 <actiontype>DeriveKey</actiontype> |
|
9175 <actionbody> |
|
9176 <derivekey> |
|
9177 <kdf>pkcs#12</kdf> |
|
9178 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9179 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9180 <iterations>128</iterations> |
|
9181 <key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CED20B6799ADA986C06DDF299F615C6B222A9C12CB65CD078D9A</key> |
|
9182 </derivekey> |
|
9183 </actionbody> |
|
9184 </action> |
|
9185 |
|
9186 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9188 //! @SYMREQ CIT_PREQ1054 |
|
9189 //! @SYMTestPriority medium |
|
9190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9191 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9192 <action> |
|
9193 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9194 <actiontype>DeriveKey</actiontype> |
|
9195 <actionbody> |
|
9196 <derivekey> |
|
9197 <kdf>pkcs#12</kdf> |
|
9198 <passwd>0000</passwd> |
|
9199 <salt>53414C54</salt> |
|
9200 <iterations>1024</iterations> |
|
9201 <key>82824BE51C81A5FF4C4268E256F6621B9656325BEFB8E936331AB1AB8BDE634EA6298D7B8EB79832AAF01CF1F49A</key> |
|
9202 </derivekey> |
|
9203 </actionbody> |
|
9204 </action> |
|
9205 |
|
9206 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9208 //! @SYMREQ CIT_PREQ1054 |
|
9209 //! @SYMTestPriority medium |
|
9210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9211 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9212 <action> |
|
9213 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9214 <actiontype>DeriveKey</actiontype> |
|
9215 <actionbody> |
|
9216 <derivekey> |
|
9217 <kdf>pkcs#12</kdf> |
|
9218 <passwd>0001</passwd> |
|
9219 <salt>53414C54</salt> |
|
9220 <iterations>1024</iterations> |
|
9221 <key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2680CD8CEAEF02609895F3CAC00A837D49674737EEC85151786</key> |
|
9222 </derivekey> |
|
9223 </actionbody> |
|
9224 </action> |
|
9225 |
|
9226 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9228 //! @SYMREQ CIT_PREQ1054 |
|
9229 //! @SYMTestPriority medium |
|
9230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9231 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9232 <action> |
|
9233 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9234 <actiontype>DeriveKey</actiontype> |
|
9235 <actionbody> |
|
9236 <derivekey> |
|
9237 <kdf>pkcs#12</kdf> |
|
9238 <passwd>PSWD</passwd> |
|
9239 <salt>53414C54</salt> |
|
9240 <iterations>1024</iterations> |
|
9241 <key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE53571C9CE41B5FB82532D38F0DB4489BC642605ACF4FDCAEF5</key> |
|
9242 </derivekey> |
|
9243 </actionbody> |
|
9244 </action> |
|
9245 |
|
9246 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9248 //! @SYMREQ CIT_PREQ1054 |
|
9249 //! @SYMTestPriority medium |
|
9250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9251 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9252 <action> |
|
9253 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9254 <actiontype>DeriveKey</actiontype> |
|
9255 <actionbody> |
|
9256 <derivekey> |
|
9257 <kdf>pkcs#12</kdf> |
|
9258 <passwd>password</passwd> |
|
9259 <salt>53414C54</salt> |
|
9260 <iterations>1024</iterations> |
|
9261 <key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E848576D39CDFA77EFE9969986D072D8C44B9147961EC0A3BC5AC</key> |
|
9262 </derivekey> |
|
9263 </actionbody> |
|
9264 </action> |
|
9265 |
|
9266 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9268 //! @SYMREQ CIT_PREQ1054 |
|
9269 //! @SYMTestPriority medium |
|
9270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9271 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9272 <action> |
|
9273 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9274 <actiontype>DeriveKey</actiontype> |
|
9275 <actionbody> |
|
9276 <derivekey> |
|
9277 <kdf>pkcs#12</kdf> |
|
9278 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9279 <salt>53414C54</salt> |
|
9280 <iterations>1024</iterations> |
|
9281 <key>406C92305ACD663AB0B9EB66DED7929547C692FE118E8D16D80EDCE4FAFBB47960F4B4AB7272496528D235E45B5A</key> |
|
9282 </derivekey> |
|
9283 </actionbody> |
|
9284 </action> |
|
9285 |
|
9286 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9288 //! @SYMREQ CIT_PREQ1054 |
|
9289 //! @SYMTestPriority medium |
|
9290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9291 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9292 <action> |
|
9293 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9294 <actiontype>DeriveKey</actiontype> |
|
9295 <actionbody> |
|
9296 <derivekey> |
|
9297 <kdf>pkcs#12</kdf> |
|
9298 <passwd>0000</passwd> |
|
9299 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9300 <iterations>1024</iterations> |
|
9301 <key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355C1E6AFFDE182AC0F49BF46F175F79F51352196D93EA67E17DF</key> |
|
9302 </derivekey> |
|
9303 </actionbody> |
|
9304 </action> |
|
9305 |
|
9306 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9308 //! @SYMREQ CIT_PREQ1054 |
|
9309 //! @SYMTestPriority medium |
|
9310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9311 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9312 <action> |
|
9313 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9314 <actiontype>DeriveKey</actiontype> |
|
9315 <actionbody> |
|
9316 <derivekey> |
|
9317 <kdf>pkcs#12</kdf> |
|
9318 <passwd>0001</passwd> |
|
9319 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9320 <iterations>1024</iterations> |
|
9321 <key>0182E41FCA166CEAED10972BDF5F57A8F851200E371EC06DC900E66ACAEA25B12EFE28E7571395A1B57ABB8E9DAC</key> |
|
9322 </derivekey> |
|
9323 </actionbody> |
|
9324 </action> |
|
9325 |
|
9326 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9328 //! @SYMREQ CIT_PREQ1054 |
|
9329 //! @SYMTestPriority medium |
|
9330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9331 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9332 <action> |
|
9333 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9334 <actiontype>DeriveKey</actiontype> |
|
9335 <actionbody> |
|
9336 <derivekey> |
|
9337 <kdf>pkcs#12</kdf> |
|
9338 <passwd>PSWD</passwd> |
|
9339 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9340 <iterations>1024</iterations> |
|
9341 <key>101FB775982CA15E37A065F7CDC5593DE385BDF504433650CC572F880CE0F525E77551ACFFCF92F66C9D407BFABF</key> |
|
9342 </derivekey> |
|
9343 </actionbody> |
|
9344 </action> |
|
9345 |
|
9346 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9348 //! @SYMREQ CIT_PREQ1054 |
|
9349 //! @SYMTestPriority medium |
|
9350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9351 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9352 <action> |
|
9353 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9354 <actiontype>DeriveKey</actiontype> |
|
9355 <actionbody> |
|
9356 <derivekey> |
|
9357 <kdf>pkcs#12</kdf> |
|
9358 <passwd>password</passwd> |
|
9359 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9360 <iterations>1024</iterations> |
|
9361 <key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B61492CF0D98500BD3842C77C2D639589A83E60B22BE53751156F1</key> |
|
9362 </derivekey> |
|
9363 </actionbody> |
|
9364 </action> |
|
9365 |
|
9366 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9368 //! @SYMREQ CIT_PREQ1054 |
|
9369 //! @SYMTestPriority medium |
|
9370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9371 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9372 <action> |
|
9373 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9374 <actiontype>DeriveKey</actiontype> |
|
9375 <actionbody> |
|
9376 <derivekey> |
|
9377 <kdf>pkcs#12</kdf> |
|
9378 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9379 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9380 <iterations>1024</iterations> |
|
9381 <key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95969233AAFAC6ABB4C369DDD9394FBCE2C4D86670BAA2AD6355</key> |
|
9382 </derivekey> |
|
9383 </actionbody> |
|
9384 </action> |
|
9385 |
|
9386 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9388 //! @SYMREQ CIT_PREQ1054 |
|
9389 //! @SYMTestPriority medium |
|
9390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9391 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9392 <action> |
|
9393 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9394 <actiontype>DeriveKey</actiontype> |
|
9395 <actionbody> |
|
9396 <derivekey> |
|
9397 <kdf>pkcs#12</kdf> |
|
9398 <passwd>0000</passwd> |
|
9399 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9400 <iterations>1024</iterations> |
|
9401 <key>6789F0680A5C5840B8ED34B061494171E6407643F9400545C62690ED570B3AAD96654D5DE15C7CA6AE242E6123E9</key> |
|
9402 </derivekey> |
|
9403 </actionbody> |
|
9404 </action> |
|
9405 |
|
9406 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9408 //! @SYMREQ CIT_PREQ1054 |
|
9409 //! @SYMTestPriority medium |
|
9410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9411 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9412 <action> |
|
9413 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9414 <actiontype>DeriveKey</actiontype> |
|
9415 <actionbody> |
|
9416 <derivekey> |
|
9417 <kdf>pkcs#12</kdf> |
|
9418 <passwd>0001</passwd> |
|
9419 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9420 <iterations>1024</iterations> |
|
9421 <key>43E663725870C4801A917C41C9B58C419933A93475CEA2FBB864F29E6D949DF2AAA8ADAB91C8A32B68062F12EE61</key> |
|
9422 </derivekey> |
|
9423 </actionbody> |
|
9424 </action> |
|
9425 |
|
9426 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9428 //! @SYMREQ CIT_PREQ1054 |
|
9429 //! @SYMTestPriority medium |
|
9430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9431 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9432 <action> |
|
9433 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9434 <actiontype>DeriveKey</actiontype> |
|
9435 <actionbody> |
|
9436 <derivekey> |
|
9437 <kdf>pkcs#12</kdf> |
|
9438 <passwd>PSWD</passwd> |
|
9439 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9440 <iterations>1024</iterations> |
|
9441 <key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5C24BF367B0C63BE89EA9EB57615C0ABFAFC3FB8DFDEA3907AA</key> |
|
9442 </derivekey> |
|
9443 </actionbody> |
|
9444 </action> |
|
9445 |
|
9446 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9448 //! @SYMREQ CIT_PREQ1054 |
|
9449 //! @SYMTestPriority medium |
|
9450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9451 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9452 <action> |
|
9453 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9454 <actiontype>DeriveKey</actiontype> |
|
9455 <actionbody> |
|
9456 <derivekey> |
|
9457 <kdf>pkcs#12</kdf> |
|
9458 <passwd>password</passwd> |
|
9459 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9460 <iterations>1024</iterations> |
|
9461 <key>CA202602C9A265559B6B96729B574DAA9B6D67036F69D903784374671E9B7E087ADE4AB9C5AE6BB62530C90F4E9C</key> |
|
9462 </derivekey> |
|
9463 </actionbody> |
|
9464 </action> |
|
9465 |
|
9466 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9468 //! @SYMREQ CIT_PREQ1054 |
|
9469 //! @SYMTestPriority medium |
|
9470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9471 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9472 <action> |
|
9473 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9474 <actiontype>DeriveKey</actiontype> |
|
9475 <actionbody> |
|
9476 <derivekey> |
|
9477 <kdf>pkcs#12</kdf> |
|
9478 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9479 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9480 <iterations>1024</iterations> |
|
9481 <key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D4689DBDFBE81CF5F337376B8EEC58ADFD518A26768ABEB20131B9</key> |
|
9482 </derivekey> |
|
9483 </actionbody> |
|
9484 </action> |
|
9485 |
|
9486 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9488 //! @SYMREQ CIT_PREQ1054 |
|
9489 //! @SYMTestPriority medium |
|
9490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9491 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9492 <action> |
|
9493 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9494 <actiontype>DeriveKey</actiontype> |
|
9495 <actionbody> |
|
9496 <derivekey> |
|
9497 <kdf>pkcs#12</kdf> |
|
9498 <passwd>0000</passwd> |
|
9499 <salt>53414C54</salt> |
|
9500 <iterations>1536</iterations> |
|
9501 <key>79A4E1398F511B262E60DCFE9E838C938B806716A9831A1BF6FFE616ADE12860428079E9CD2165E9194346EB6677</key> |
|
9502 </derivekey> |
|
9503 </actionbody> |
|
9504 </action> |
|
9505 |
|
9506 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9508 //! @SYMREQ CIT_PREQ1054 |
|
9509 //! @SYMTestPriority medium |
|
9510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9511 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9512 <action> |
|
9513 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9514 <actiontype>DeriveKey</actiontype> |
|
9515 <actionbody> |
|
9516 <derivekey> |
|
9517 <kdf>pkcs#12</kdf> |
|
9518 <passwd>0001</passwd> |
|
9519 <salt>53414C54</salt> |
|
9520 <iterations>1536</iterations> |
|
9521 <key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D25BFDD890E8B903E66B306ED5C9F5C7B53BEA11BD495C328951</key> |
|
9522 </derivekey> |
|
9523 </actionbody> |
|
9524 </action> |
|
9525 |
|
9526 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9528 //! @SYMREQ CIT_PREQ1054 |
|
9529 //! @SYMTestPriority medium |
|
9530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9531 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9532 <action> |
|
9533 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9534 <actiontype>DeriveKey</actiontype> |
|
9535 <actionbody> |
|
9536 <derivekey> |
|
9537 <kdf>pkcs#12</kdf> |
|
9538 <passwd>PSWD</passwd> |
|
9539 <salt>53414C54</salt> |
|
9540 <iterations>1536</iterations> |
|
9541 <key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E64B6690AE6ED16C5A82A0F7E7D9578BA7F62A7427260733165A</key> |
|
9542 </derivekey> |
|
9543 </actionbody> |
|
9544 </action> |
|
9545 |
|
9546 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9548 //! @SYMREQ CIT_PREQ1054 |
|
9549 //! @SYMTestPriority medium |
|
9550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9551 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9552 <action> |
|
9553 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9554 <actiontype>DeriveKey</actiontype> |
|
9555 <actionbody> |
|
9556 <derivekey> |
|
9557 <kdf>pkcs#12</kdf> |
|
9558 <passwd>password</passwd> |
|
9559 <salt>53414C54</salt> |
|
9560 <iterations>1536</iterations> |
|
9561 <key>65B27A78C72DFEEA6C92846330CE98C6721909E89B014925B22427256BC6A4EFEB7A83A2244E59A25E7DE2F01FA6</key> |
|
9562 </derivekey> |
|
9563 </actionbody> |
|
9564 </action> |
|
9565 |
|
9566 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9568 //! @SYMREQ CIT_PREQ1054 |
|
9569 //! @SYMTestPriority medium |
|
9570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9571 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9572 <action> |
|
9573 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9574 <actiontype>DeriveKey</actiontype> |
|
9575 <actionbody> |
|
9576 <derivekey> |
|
9577 <kdf>pkcs#12</kdf> |
|
9578 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9579 <salt>53414C54</salt> |
|
9580 <iterations>1536</iterations> |
|
9581 <key>8F8FC96A3D958731780B50E843D6BB65137A0728C3A4C55D23D4A0E99EBA71F56EC19356B50B987F486F3FF74A9C</key> |
|
9582 </derivekey> |
|
9583 </actionbody> |
|
9584 </action> |
|
9585 |
|
9586 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9588 //! @SYMREQ CIT_PREQ1054 |
|
9589 //! @SYMTestPriority medium |
|
9590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9591 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9592 <action> |
|
9593 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9594 <actiontype>DeriveKey</actiontype> |
|
9595 <actionbody> |
|
9596 <derivekey> |
|
9597 <kdf>pkcs#12</kdf> |
|
9598 <passwd>0000</passwd> |
|
9599 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9600 <iterations>1536</iterations> |
|
9601 <key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25C6120B9099920440D11725F1D4F7CABFB8A170BF9744B74461</key> |
|
9602 </derivekey> |
|
9603 </actionbody> |
|
9604 </action> |
|
9605 |
|
9606 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9608 //! @SYMREQ CIT_PREQ1054 |
|
9609 //! @SYMTestPriority medium |
|
9610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9611 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9612 <action> |
|
9613 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9614 <actiontype>DeriveKey</actiontype> |
|
9615 <actionbody> |
|
9616 <derivekey> |
|
9617 <kdf>pkcs#12</kdf> |
|
9618 <passwd>0001</passwd> |
|
9619 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9620 <iterations>1536</iterations> |
|
9621 <key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB413E8EAC164C3BA1FAD7ABC1CADB1BF7458010BF7814262F563</key> |
|
9622 </derivekey> |
|
9623 </actionbody> |
|
9624 </action> |
|
9625 |
|
9626 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9628 //! @SYMREQ CIT_PREQ1054 |
|
9629 //! @SYMTestPriority medium |
|
9630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9631 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9632 <action> |
|
9633 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9634 <actiontype>DeriveKey</actiontype> |
|
9635 <actionbody> |
|
9636 <derivekey> |
|
9637 <kdf>pkcs#12</kdf> |
|
9638 <passwd>PSWD</passwd> |
|
9639 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9640 <iterations>1536</iterations> |
|
9641 <key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0CC173973E296F655BAB0BFEA7E51BACD8FC73AB278469439B58</key> |
|
9642 </derivekey> |
|
9643 </actionbody> |
|
9644 </action> |
|
9645 |
|
9646 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9648 //! @SYMREQ CIT_PREQ1054 |
|
9649 //! @SYMTestPriority medium |
|
9650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9651 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9652 <action> |
|
9653 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9654 <actiontype>DeriveKey</actiontype> |
|
9655 <actionbody> |
|
9656 <derivekey> |
|
9657 <kdf>pkcs#12</kdf> |
|
9658 <passwd>password</passwd> |
|
9659 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9660 <iterations>1536</iterations> |
|
9661 <key>C05FE26245C742CC01B23C655E5D934D734610DE015AEFA126CC8A53FBD91EC774AE631F57444E206494BE6EB304</key> |
|
9662 </derivekey> |
|
9663 </actionbody> |
|
9664 </action> |
|
9665 |
|
9666 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9668 //! @SYMREQ CIT_PREQ1054 |
|
9669 //! @SYMTestPriority medium |
|
9670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9671 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9672 <action> |
|
9673 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9674 <actiontype>DeriveKey</actiontype> |
|
9675 <actionbody> |
|
9676 <derivekey> |
|
9677 <kdf>pkcs#12</kdf> |
|
9678 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9679 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9680 <iterations>1536</iterations> |
|
9681 <key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0E036709FBD02F0FA15B7497042FF3E0B56ED26ACC058F1D00B</key> |
|
9682 </derivekey> |
|
9683 </actionbody> |
|
9684 </action> |
|
9685 |
|
9686 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9688 //! @SYMREQ CIT_PREQ1054 |
|
9689 //! @SYMTestPriority medium |
|
9690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9691 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9692 <action> |
|
9693 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9694 <actiontype>DeriveKey</actiontype> |
|
9695 <actionbody> |
|
9696 <derivekey> |
|
9697 <kdf>pkcs#12</kdf> |
|
9698 <passwd>0000</passwd> |
|
9699 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9700 <iterations>1536</iterations> |
|
9701 <key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3E8CDC6C4D8D7D7226769FADE4650767B4472BBD418B2D969EB</key> |
|
9702 </derivekey> |
|
9703 </actionbody> |
|
9704 </action> |
|
9705 |
|
9706 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9708 //! @SYMREQ CIT_PREQ1054 |
|
9709 //! @SYMTestPriority medium |
|
9710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9711 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9712 <action> |
|
9713 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9714 <actiontype>DeriveKey</actiontype> |
|
9715 <actionbody> |
|
9716 <derivekey> |
|
9717 <kdf>pkcs#12</kdf> |
|
9718 <passwd>0001</passwd> |
|
9719 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9720 <iterations>1536</iterations> |
|
9721 <key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA3932F031B4FB2D6F799C857B7B821D5CB05419EE6DF2D10BBD</key> |
|
9722 </derivekey> |
|
9723 </actionbody> |
|
9724 </action> |
|
9725 |
|
9726 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9728 //! @SYMREQ CIT_PREQ1054 |
|
9729 //! @SYMTestPriority medium |
|
9730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9731 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9732 <action> |
|
9733 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9734 <actiontype>DeriveKey</actiontype> |
|
9735 <actionbody> |
|
9736 <derivekey> |
|
9737 <kdf>pkcs#12</kdf> |
|
9738 <passwd>PSWD</passwd> |
|
9739 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9740 <iterations>1536</iterations> |
|
9741 <key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA949B44DA6EAFD9D83FCD9365C617C137F7EC9C3EF036BD592C</key> |
|
9742 </derivekey> |
|
9743 </actionbody> |
|
9744 </action> |
|
9745 |
|
9746 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9748 //! @SYMREQ CIT_PREQ1054 |
|
9749 //! @SYMTestPriority medium |
|
9750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9751 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9752 <action> |
|
9753 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9754 <actiontype>DeriveKey</actiontype> |
|
9755 <actionbody> |
|
9756 <derivekey> |
|
9757 <kdf>pkcs#12</kdf> |
|
9758 <passwd>password</passwd> |
|
9759 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9760 <iterations>1536</iterations> |
|
9761 <key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD458CDBB895741595BD6F879B9134D56F8695A654407E4809C56</key> |
|
9762 </derivekey> |
|
9763 </actionbody> |
|
9764 </action> |
|
9765 |
|
9766 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9768 //! @SYMREQ CIT_PREQ1054 |
|
9769 //! @SYMTestPriority medium |
|
9770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9771 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9772 <action> |
|
9773 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9774 <actiontype>DeriveKey</actiontype> |
|
9775 <actionbody> |
|
9776 <derivekey> |
|
9777 <kdf>pkcs#12</kdf> |
|
9778 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9779 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
9780 <iterations>1536</iterations> |
|
9781 <key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B272CB0DD4D76CAE04D831A4C12BC353F7C60F50ED67DF548599</key> |
|
9782 </derivekey> |
|
9783 </actionbody> |
|
9784 </action> |
|
9785 |
|
9786 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9788 //! @SYMREQ CIT_PREQ1054 |
|
9789 //! @SYMTestPriority medium |
|
9790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9791 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9792 <action> |
|
9793 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9794 <actiontype>DeriveKey</actiontype> |
|
9795 <actionbody> |
|
9796 <derivekey> |
|
9797 <kdf>pkcs#12</kdf> |
|
9798 <passwd>0000</passwd> |
|
9799 <salt>53414C54</salt> |
|
9800 <iterations>2048</iterations> |
|
9801 <key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCDD858068993D4F95777E800B47B0A091487E50D888139BBAA95</key> |
|
9802 </derivekey> |
|
9803 </actionbody> |
|
9804 </action> |
|
9805 |
|
9806 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9808 //! @SYMREQ CIT_PREQ1054 |
|
9809 //! @SYMTestPriority medium |
|
9810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9811 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9812 <action> |
|
9813 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9814 <actiontype>DeriveKey</actiontype> |
|
9815 <actionbody> |
|
9816 <derivekey> |
|
9817 <kdf>pkcs#12</kdf> |
|
9818 <passwd>0001</passwd> |
|
9819 <salt>53414C54</salt> |
|
9820 <iterations>2048</iterations> |
|
9821 <key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2275085600120C9642E197813F99DBE317142466C44961771AF</key> |
|
9822 </derivekey> |
|
9823 </actionbody> |
|
9824 </action> |
|
9825 |
|
9826 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9828 //! @SYMREQ CIT_PREQ1054 |
|
9829 //! @SYMTestPriority medium |
|
9830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9831 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9832 <action> |
|
9833 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9834 <actiontype>DeriveKey</actiontype> |
|
9835 <actionbody> |
|
9836 <derivekey> |
|
9837 <kdf>pkcs#12</kdf> |
|
9838 <passwd>PSWD</passwd> |
|
9839 <salt>53414C54</salt> |
|
9840 <iterations>2048</iterations> |
|
9841 <key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2D6DD3D0577A59043B25D770FAC6CFF48666D15795B61297255</key> |
|
9842 </derivekey> |
|
9843 </actionbody> |
|
9844 </action> |
|
9845 |
|
9846 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9848 //! @SYMREQ CIT_PREQ1054 |
|
9849 //! @SYMTestPriority medium |
|
9850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9851 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9852 <action> |
|
9853 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9854 <actiontype>DeriveKey</actiontype> |
|
9855 <actionbody> |
|
9856 <derivekey> |
|
9857 <kdf>pkcs#12</kdf> |
|
9858 <passwd>password</passwd> |
|
9859 <salt>53414C54</salt> |
|
9860 <iterations>2048</iterations> |
|
9861 <key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D97444114C46756D3F2FD1DF12182CF6C83CF32E72D1A70DF206</key> |
|
9862 </derivekey> |
|
9863 </actionbody> |
|
9864 </action> |
|
9865 |
|
9866 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9868 //! @SYMREQ CIT_PREQ1054 |
|
9869 //! @SYMTestPriority medium |
|
9870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9871 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9872 <action> |
|
9873 <actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname> |
|
9874 <actiontype>DeriveKey</actiontype> |
|
9875 <actionbody> |
|
9876 <derivekey> |
|
9877 <kdf>pkcs#12</kdf> |
|
9878 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9879 <salt>53414C54</salt> |
|
9880 <iterations>2048</iterations> |
|
9881 <key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45F218B705E54071E5BE4AB622F2E9B45FCA663D8B30ADCC0073</key> |
|
9882 </derivekey> |
|
9883 </actionbody> |
|
9884 </action> |
|
9885 |
|
9886 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9888 //! @SYMREQ CIT_PREQ1054 |
|
9889 //! @SYMTestPriority medium |
|
9890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9891 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9892 <action> |
|
9893 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9894 <actiontype>DeriveKey</actiontype> |
|
9895 <actionbody> |
|
9896 <derivekey> |
|
9897 <kdf>pkcs#12</kdf> |
|
9898 <passwd>0000</passwd> |
|
9899 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9900 <iterations>2048</iterations> |
|
9901 <key>CD045229461658BC6C47C259F2D20433173DE4D31E54B1D693738FBA6D643ECB095761373FB0E49F9C478BA11755</key> |
|
9902 </derivekey> |
|
9903 </actionbody> |
|
9904 </action> |
|
9905 |
|
9906 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9908 //! @SYMREQ CIT_PREQ1054 |
|
9909 //! @SYMTestPriority medium |
|
9910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9911 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9912 <action> |
|
9913 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9914 <actiontype>DeriveKey</actiontype> |
|
9915 <actionbody> |
|
9916 <derivekey> |
|
9917 <kdf>pkcs#12</kdf> |
|
9918 <passwd>0001</passwd> |
|
9919 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9920 <iterations>2048</iterations> |
|
9921 <key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6DC8B942CA4D9447EDFC29A5BDC1D450A73B298C6A9A8ED7D2F4</key> |
|
9922 </derivekey> |
|
9923 </actionbody> |
|
9924 </action> |
|
9925 |
|
9926 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9928 //! @SYMREQ CIT_PREQ1054 |
|
9929 //! @SYMTestPriority medium |
|
9930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9931 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9932 <action> |
|
9933 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9934 <actiontype>DeriveKey</actiontype> |
|
9935 <actionbody> |
|
9936 <derivekey> |
|
9937 <kdf>pkcs#12</kdf> |
|
9938 <passwd>PSWD</passwd> |
|
9939 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9940 <iterations>2048</iterations> |
|
9941 <key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC37C801DE5E02A6DD1A193970B4505A403005B378BE47D61FEB</key> |
|
9942 </derivekey> |
|
9943 </actionbody> |
|
9944 </action> |
|
9945 |
|
9946 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9948 //! @SYMREQ CIT_PREQ1054 |
|
9949 //! @SYMTestPriority medium |
|
9950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9951 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9952 <action> |
|
9953 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9954 <actiontype>DeriveKey</actiontype> |
|
9955 <actionbody> |
|
9956 <derivekey> |
|
9957 <kdf>pkcs#12</kdf> |
|
9958 <passwd>password</passwd> |
|
9959 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9960 <iterations>2048</iterations> |
|
9961 <key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B2F0294723113F25347AEAF0109E270C77A2524CAC118D164B8</key> |
|
9962 </derivekey> |
|
9963 </actionbody> |
|
9964 </action> |
|
9965 |
|
9966 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9968 //! @SYMREQ CIT_PREQ1054 |
|
9969 //! @SYMTestPriority medium |
|
9970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9971 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9972 <action> |
|
9973 <actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname> |
|
9974 <actiontype>DeriveKey</actiontype> |
|
9975 <actionbody> |
|
9976 <derivekey> |
|
9977 <kdf>pkcs#12</kdf> |
|
9978 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
9979 <salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt> |
|
9980 <iterations>2048</iterations> |
|
9981 <key>A5B348EB4926290B223724CC8E4ED67FF458F2362279F0DF9F3A92AFF0473030D0EBA6E4173AF91E7AE535D3E988</key> |
|
9982 </derivekey> |
|
9983 </actionbody> |
|
9984 </action> |
|
9985 |
|
9986 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
9987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
9988 //! @SYMREQ CIT_PREQ1054 |
|
9989 //! @SYMTestPriority medium |
|
9990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
9991 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
9992 <action> |
|
9993 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
9994 <actiontype>DeriveKey</actiontype> |
|
9995 <actionbody> |
|
9996 <derivekey> |
|
9997 <kdf>pkcs#12</kdf> |
|
9998 <passwd>0000</passwd> |
|
9999 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
10000 <iterations>2048</iterations> |
|
10001 <key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A259262CE1B3E626454FF2A5B69A372FE3894C48E574F70F191F4</key> |
|
10002 </derivekey> |
|
10003 </actionbody> |
|
10004 </action> |
|
10005 |
|
10006 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
10007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
10008 //! @SYMREQ CIT_PREQ1054 |
|
10009 //! @SYMTestPriority medium |
|
10010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
10011 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
10012 <action> |
|
10013 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
10014 <actiontype>DeriveKey</actiontype> |
|
10015 <actionbody> |
|
10016 <derivekey> |
|
10017 <kdf>pkcs#12</kdf> |
|
10018 <passwd>0001</passwd> |
|
10019 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
10020 <iterations>2048</iterations> |
|
10021 <key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE13602A15DF682A601681221A748627D1C585C079F8DCBD5ABE9763</key> |
|
10022 </derivekey> |
|
10023 </actionbody> |
|
10024 </action> |
|
10025 |
|
10026 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
10027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
10028 //! @SYMREQ CIT_PREQ1054 |
|
10029 //! @SYMTestPriority medium |
|
10030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
10031 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
10032 <action> |
|
10033 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
10034 <actiontype>DeriveKey</actiontype> |
|
10035 <actionbody> |
|
10036 <derivekey> |
|
10037 <kdf>pkcs#12</kdf> |
|
10038 <passwd>PSWD</passwd> |
|
10039 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
10040 <iterations>2048</iterations> |
|
10041 <key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2A148121AE3E9E23B3891882F575F204CB0639FC9FDB9D5B0BD</key> |
|
10042 </derivekey> |
|
10043 </actionbody> |
|
10044 </action> |
|
10045 |
|
10046 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
10047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
10048 //! @SYMREQ CIT_PREQ1054 |
|
10049 //! @SYMTestPriority medium |
|
10050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
10051 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
10052 <action> |
|
10053 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
10054 <actiontype>DeriveKey</actiontype> |
|
10055 <actionbody> |
|
10056 <derivekey> |
|
10057 <kdf>pkcs#12</kdf> |
|
10058 <passwd>password</passwd> |
|
10059 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
10060 <iterations>2048</iterations> |
|
10061 <key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF08E3059843173C72CD79EFEADE34A6DA91F6AB8E92383F1BDFA</key> |
|
10062 </derivekey> |
|
10063 </actionbody> |
|
10064 </action> |
|
10065 |
|
10066 //! @SYMTestCaseID CIT_PREQ1054_01 |
|
10067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length. |
|
10068 //! @SYMREQ CIT_PREQ1054 |
|
10069 //! @SYMTestPriority medium |
|
10070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters. |
|
10071 //! @SYMTestExpectedResults The generated key matches the expected byte stream. |
|
10072 <action> |
|
10073 <actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname> |
|
10074 <actiontype>DeriveKey</actiontype> |
|
10075 <actionbody> |
|
10076 <derivekey> |
|
10077 <kdf>pkcs#12</kdf> |
|
10078 <passwd>abcdefghijklmnopqrstuvwxyz</passwd> |
|
10079 <salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt> |
|
10080 <iterations>2048</iterations> |
|
10081 <key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1167ED13693E8373DFB92EC6F000DBADB9363CA12E9E16ED019</key> |
|
10082 </derivekey> |
|
10083 </actionbody> |
|
10084 </action> |
|
10085 |
|
10086 <action> |
|
10087 <actionname>OOM End</actionname> |
|
10088 <actiontype>stopmemfailure</actiontype> |
|
10089 <actionbody></actionbody> |
|
10090 <actionresult> |
|
10091 <return>KErrNone</return> |
|
10092 </actionresult> |
|
10093 </action> |
|
10094 |