crypto/weakcrypto/test/tpbe/scripts/tpbetests_v2.txt
changeset 72 de46a57f75fb
equal deleted inserted replaced
65:970c0057d9bc 72:de46a57f75fb
       
     1 
       
     2 // Copyright (C) 2005 - 2006 Symbian Ltd. All Rights Reserved
       
     3 
       
     4 
       
     5 <action>
       
     6 	<actionname>Element test case 1 with explicit kdf, salt len and iterations, ECipherRC2_CBC_128_16</actionname>
       
     7 	<actiontype>Element</actiontype>
       
     8 	<actionbody>
       
     9 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
    10 		<kdf>PKCS#5</kdf>
       
    11 		<salt_len_bytes>16</salt_len_bytes>
       
    12 		<iter_count>1000</iter_count>
       
    13 		<element>
       
    14 			<passwd>password</passwd>
       
    15 			<input>This is what I want to encrypt</input>
       
    16 		</element>
       
    17 	</actionbody>
       
    18 	<actionresult>
       
    19 		<return>KErrNone</return>
       
    20 	</actionresult>
       
    21 </action>
       
    22 
       
    23 <action>
       
    24 	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
       
    25 	<actiontype>Element</actiontype>
       
    26 	<actionbody>
       
    27 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
    28 		<element>
       
    29 			<passwd>password</passwd>
       
    30 			<input>This is what I want to encrypt</input>
       
    31 		</element>
       
    32 	</actionbody>
       
    33 	<actionresult>
       
    34 		<return>KErrNone</return>
       
    35 	</actionresult>
       
    36 </action>
       
    37 
       
    38 <action>
       
    39 	<actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
       
    40 	<actiontype>Element</actiontype>
       
    41 	<actionbody>
       
    42 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
    43 		<element>
       
    44 			<passwd>password</passwd>
       
    45 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
    46 		</element>
       
    47 	</actionbody>
       
    48 	<actionresult>
       
    49 		<return>KErrNone</return>
       
    50 	</actionresult>
       
    51 </action>
       
    52 
       
    53 <action>
       
    54 	<actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
       
    55 	<actiontype>Element</actiontype>
       
    56 	<actionbody>
       
    57 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
    58 		<element>
       
    59 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
    60 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
    61 		</element>
       
    62 	</actionbody>
       
    63 	<actionresult>
       
    64 		<return>KErrNone</return>
       
    65 	</actionresult>
       
    66 </action>
       
    67 
       
    68 <action>
       
    69 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
       
    70 	<actiontype>Set</actiontype>
       
    71 	<actionbody>
       
    72 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
    73 		<set>
       
    74 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
    75 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
    76 		</set>
       
    77 	</actionbody>
       
    78 	<actionresult>
       
    79 		<return>KErrNone</return>
       
    80 	</actionresult>
       
    81 </action>
       
    82 
       
    83 <action>
       
    84 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
       
    85 	<actiontype>Set</actiontype>
       
    86 	<actionbody>
       
    87 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
    88 		<kdf>PKCS#5</kdf>
       
    89 		<salt_len_bytes>16</salt_len_bytes>
       
    90 		<iter_count>1000</iter_count>
       
    91 		<set>
       
    92 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
    93 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
    94 		</set>
       
    95 	</actionbody>
       
    96 	<actionresult>
       
    97 		<return>KErrNone</return>
       
    98 	</actionresult>
       
    99 </action>
       
   100 
       
   101 <action>
       
   102 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
       
   103 	<actiontype>Set</actiontype>
       
   104 	<actionbody>
       
   105 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
   106 		<set>
       
   107 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   108 			<input>B</input>
       
   109 		</set>
       
   110 	</actionbody>
       
   111 	<actionresult>
       
   112 		<return>KErrNone</return>
       
   113 	</actionresult>
       
   114 </action>
       
   115 
       
   116 <action>
       
   117 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
       
   118 	<actiontype>Set</actiontype>
       
   119 	<actionbody>
       
   120 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
   121 		<set>
       
   122 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   123 			<input>ZYXWUTSR</input>
       
   124 		</set>
       
   125 	</actionbody>
       
   126 	<actionresult>
       
   127 		<return>KErrNone</return>
       
   128 	</actionresult>
       
   129 </action>
       
   130 
       
   131 <action>
       
   132 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
       
   133 	<actiontype>Set</actiontype>
       
   134 	<actionbody>
       
   135 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
   136 		<set>
       
   137 			<passwd>m</passwd>
       
   138 			<input>ZYXWUTSR</input>
       
   139 		</set>
       
   140 	</actionbody>
       
   141 	<actionresult>
       
   142 		<return>KErrNone</return>
       
   143 	</actionresult>
       
   144 </action>
       
   145 
       
   146 <action>
       
   147 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
       
   148 	<actiontype>Set</actiontype>
       
   149 	<actionbody>
       
   150 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
   151 		<set>
       
   152 			<passwd></passwd>
       
   153 			<input>ZYXWUTSR</input>
       
   154 		</set>
       
   155 	</actionbody>
       
   156 	<actionresult>
       
   157 		<return>KErrNone</return>
       
   158 	</actionresult>
       
   159 </action>
       
   160 
       
   161 <action>
       
   162 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
       
   163 	<actiontype>Set</actiontype>
       
   164 	<actionbody>
       
   165 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
   166 		<set>
       
   167 			<passwd></passwd>
       
   168 			<input></input>
       
   169 		</set>
       
   170 	</actionbody>
       
   171 	<actionresult>
       
   172 		<return>KErrNone</return>
       
   173 	</actionresult>
       
   174 </action>
       
   175 
       
   176 ///////////////////////////////////////////////////////////////////////////////////
       
   177 ///////////////////////////////////////////////////////////////////////////////////
       
   178 ///////////////////////////////////////////////////////////////////////////////////
       
   179 
       
   180 <action>
       
   181 	<actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
       
   182 	<actiontype>Element</actiontype>
       
   183 	<actionbody>
       
   184 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   185 		<element>
       
   186 			<passwd>password</passwd>
       
   187 			<input>This is what I want to encrypt</input>
       
   188 		</element>
       
   189 	</actionbody>
       
   190 	<actionresult>
       
   191 		<return>KErrNone</return>
       
   192 	</actionresult>
       
   193 </action>
       
   194 
       
   195 <action>
       
   196 	<actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
       
   197 	<actiontype>Element</actiontype>
       
   198 	<actionbody>
       
   199 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   200 		<element>
       
   201 			<passwd>password</passwd>
       
   202 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   203 		</element>
       
   204 	</actionbody>
       
   205 	<actionresult>
       
   206 		<return>KErrNone</return>
       
   207 	</actionresult>
       
   208 </action>
       
   209 
       
   210 <action>
       
   211 	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
       
   212 	<actiontype>Element</actiontype>
       
   213 	<actionbody>
       
   214 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   215 		<element>
       
   216 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   217 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   218 		</element>
       
   219 	</actionbody>
       
   220 	<actionresult>
       
   221 		<return>KErrNone</return>
       
   222 	</actionresult>
       
   223 </action>
       
   224 
       
   225 <action>
       
   226 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
       
   227 	<actiontype>Set</actiontype>
       
   228 	<actionbody>
       
   229 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   230 		<set>
       
   231 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   232 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   233 		</set>
       
   234 	</actionbody>
       
   235 	<actionresult>
       
   236 		<return>KErrNone</return>
       
   237 	</actionresult>
       
   238 </action>
       
   239 
       
   240 <action>
       
   241 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
       
   242 	<actiontype>Set</actiontype>
       
   243 	<actionbody>
       
   244 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   245 		<set>
       
   246 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   247 			<input>B</input>
       
   248 		</set>
       
   249 	</actionbody>
       
   250 	<actionresult>
       
   251 		<return>KErrNone</return>
       
   252 	</actionresult>
       
   253 </action>
       
   254 
       
   255 <action>
       
   256 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
       
   257 	<actiontype>Set</actiontype>
       
   258 	<actionbody>
       
   259 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   260 		<set>
       
   261 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   262 			<input>ZYXWUTSR</input>
       
   263 		</set>
       
   264 	</actionbody>
       
   265 	<actionresult>
       
   266 		<return>KErrNone</return>
       
   267 	</actionresult>
       
   268 </action>
       
   269 
       
   270 <action>
       
   271 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
       
   272 	<actiontype>Set</actiontype>
       
   273 	<actionbody>
       
   274 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   275 		<set>
       
   276 			<passwd>m</passwd>
       
   277 			<input>ZYXWUTSR</input>
       
   278 		</set>
       
   279 	</actionbody>
       
   280 	<actionresult>
       
   281 		<return>KErrNone</return>
       
   282 	</actionresult>
       
   283 </action>
       
   284 
       
   285 <action>
       
   286 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
       
   287 	<actiontype>Set</actiontype>
       
   288 	<actionbody>
       
   289 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   290 		<set>
       
   291 			<passwd></passwd>
       
   292 			<input>ZYXWUTSR</input>
       
   293 		</set>
       
   294 	</actionbody>
       
   295 	<actionresult>
       
   296 		<return>KErrNone</return>
       
   297 	</actionresult>
       
   298 </action>
       
   299 
       
   300 <action>
       
   301 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
       
   302 	<actiontype>Set</actiontype>
       
   303 	<actionbody>
       
   304 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
   305 		<set>
       
   306 			<passwd></passwd>
       
   307 			<input></input>
       
   308 		</set>
       
   309 	</actionbody>
       
   310 	<actionresult>
       
   311 		<return>KErrNone</return>
       
   312 	</actionresult>
       
   313 </action>
       
   314 
       
   315 ///////////////////////////////////////////////////////////////////////////////////
       
   316 ///////////////////////////////////////////////////////////////////////////////////
       
   317 ///////////////////////////////////////////////////////////////////////////////////
       
   318 
       
   319 <action>
       
   320 	<actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
       
   321 	<actiontype>Element</actiontype>
       
   322 	<actionbody>
       
   323 		<cipher>ECipherRC2_CBC_128</cipher>
       
   324 		<element>
       
   325 			<passwd>password</passwd>
       
   326 			<input>This is what I want to encrypt</input>
       
   327 		</element>
       
   328 	</actionbody>
       
   329 	<actionresult>
       
   330 		<return>KErrNone</return>
       
   331 	</actionresult>
       
   332 </action>
       
   333 
       
   334 <action>
       
   335 	<actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
       
   336 	<actiontype>Element</actiontype>
       
   337 	<actionbody>
       
   338 		<cipher>ECipherRC2_CBC_128</cipher>
       
   339 		<element>
       
   340 			<passwd>password</passwd>
       
   341 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   342 		</element>
       
   343 	</actionbody>
       
   344 	<actionresult>
       
   345 		<return>KErrNone</return>
       
   346 	</actionresult>
       
   347 </action>
       
   348 
       
   349 <action>
       
   350 	<actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
       
   351 	<actiontype>Element</actiontype>
       
   352 	<actionbody>
       
   353 		<cipher>ECipherRC2_CBC_128</cipher>
       
   354 		<element>
       
   355 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   356 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   357 		</element>
       
   358 	</actionbody>
       
   359 	<actionresult>
       
   360 		<return>KErrNone</return>
       
   361 	</actionresult>
       
   362 </action>
       
   363 
       
   364 <action>
       
   365 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
       
   366 	<actiontype>Set</actiontype>
       
   367 	<actionbody>
       
   368 		<cipher>ECipherRC2_CBC_128</cipher>
       
   369 		<set>
       
   370 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   371 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   372 		</set>
       
   373 	</actionbody>
       
   374 	<actionresult>
       
   375 		<return>KErrNone</return>
       
   376 	</actionresult>
       
   377 </action>
       
   378 
       
   379 <action>
       
   380 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
       
   381 	<actiontype>Set</actiontype>
       
   382 	<actionbody>
       
   383 		<cipher>ECipherRC2_CBC_128</cipher>
       
   384 		<set>
       
   385 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   386 			<input>B</input>
       
   387 		</set>
       
   388 	</actionbody>
       
   389 	<actionresult>
       
   390 		<return>KErrNone</return>
       
   391 	</actionresult>
       
   392 </action>
       
   393 
       
   394 <action>
       
   395 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
       
   396 	<actiontype>Set</actiontype>
       
   397 	<actionbody>
       
   398 		<cipher>ECipherRC2_CBC_128</cipher>
       
   399 		<set>
       
   400 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   401 			<input>ZYXWUTSR</input>
       
   402 		</set>
       
   403 	</actionbody>
       
   404 	<actionresult>
       
   405 		<return>KErrNone</return>
       
   406 	</actionresult>
       
   407 </action>
       
   408 
       
   409 <action>
       
   410 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
       
   411 	<actiontype>Set</actiontype>
       
   412 	<actionbody>
       
   413 		<cipher>ECipherRC2_CBC_128</cipher>
       
   414 		<set>
       
   415 			<passwd>m</passwd>
       
   416 			<input>ZYXWUTSR</input>
       
   417 		</set>
       
   418 	</actionbody>
       
   419 	<actionresult>
       
   420 		<return>KErrNone</return>
       
   421 	</actionresult>
       
   422 </action>
       
   423 
       
   424 <action>
       
   425 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
       
   426 	<actiontype>Set</actiontype>
       
   427 	<actionbody>
       
   428 		<cipher>ECipherRC2_CBC_128</cipher>
       
   429 		<set>
       
   430 			<passwd></passwd>
       
   431 			<input>ZYXWUTSR</input>
       
   432 		</set>
       
   433 	</actionbody>
       
   434 	<actionresult>
       
   435 		<return>KErrNone</return>
       
   436 	</actionresult>
       
   437 </action>
       
   438 
       
   439 <action>
       
   440 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
       
   441 	<actiontype>Set</actiontype>
       
   442 	<actionbody>
       
   443 		<cipher>ECipherRC2_CBC_128</cipher>
       
   444 		<set>
       
   445 			<passwd></passwd>
       
   446 			<input></input>
       
   447 		</set>
       
   448 	</actionbody>
       
   449 	<actionresult>
       
   450 		<return>KErrNone</return>
       
   451 	</actionresult>
       
   452 </action>
       
   453 
       
   454 ///////////////////////////////////////////////////////////////////////////////////
       
   455 ///////////////////////////////////////////////////////////////////////////////////
       
   456 ///////////////////////////////////////////////////////////////////////////////////
       
   457 
       
   458 <action>
       
   459 	<actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
       
   460 	<actiontype>Element</actiontype>
       
   461 	<actionbody>
       
   462 		<cipher>ECipherRC2_CBC_40</cipher>
       
   463 		<element>
       
   464 			<passwd>password</passwd>
       
   465 			<input>This is what I want to encrypt</input>
       
   466 		</element>
       
   467 	</actionbody>
       
   468 	<actionresult>
       
   469 		<return>KErrNone</return>
       
   470 	</actionresult>
       
   471 </action>
       
   472 
       
   473 <action>
       
   474 	<actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
       
   475 	<actiontype>Element</actiontype>
       
   476 	<actionbody>
       
   477 		<cipher>ECipherRC2_CBC_40</cipher>
       
   478 		<element>
       
   479 			<passwd>password</passwd>
       
   480 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   481 		</element>
       
   482 	</actionbody>
       
   483 	<actionresult>
       
   484 		<return>KErrNone</return>
       
   485 	</actionresult>
       
   486 </action>
       
   487 
       
   488 <action>
       
   489 	<actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
       
   490 	<actiontype>Element</actiontype>
       
   491 	<actionbody>
       
   492 		<cipher>ECipherRC2_CBC_40</cipher>
       
   493 		<element>
       
   494 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   495 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   496 		</element>
       
   497 	</actionbody>
       
   498 	<actionresult>
       
   499 		<return>KErrNone</return>
       
   500 	</actionresult>
       
   501 </action>
       
   502 
       
   503 <action>
       
   504 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
       
   505 	<actiontype>Set</actiontype>
       
   506 	<actionbody>
       
   507 		<cipher>ECipherRC2_CBC_40</cipher>
       
   508 		<set>
       
   509 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   510 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   511 		</set>
       
   512 	</actionbody>
       
   513 	<actionresult>
       
   514 		<return>KErrNone</return>
       
   515 	</actionresult>
       
   516 </action>
       
   517 
       
   518 <action>
       
   519 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
       
   520 	<actiontype>Set</actiontype>
       
   521 	<actionbody>
       
   522 		<cipher>ECipherRC2_CBC_40</cipher>
       
   523 		<set>
       
   524 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   525 			<input>B</input>
       
   526 		</set>
       
   527 	</actionbody>
       
   528 	<actionresult>
       
   529 		<return>KErrNone</return>
       
   530 	</actionresult>
       
   531 </action>
       
   532 
       
   533 <action>
       
   534 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
       
   535 	<actiontype>Set</actiontype>
       
   536 	<actionbody>
       
   537 		<cipher>ECipherRC2_CBC_40</cipher>
       
   538 		<set>
       
   539 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   540 			<input>ZYXWUTSR</input>
       
   541 		</set>
       
   542 	</actionbody>
       
   543 	<actionresult>
       
   544 		<return>KErrNone</return>
       
   545 	</actionresult>
       
   546 </action>
       
   547 
       
   548 <action>
       
   549 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
       
   550 	<actiontype>Set</actiontype>
       
   551 	<actionbody>
       
   552 		<cipher>ECipherRC2_CBC_40</cipher>
       
   553 		<set>
       
   554 			<passwd>m</passwd>
       
   555 			<input>ZYXWUTSR</input>
       
   556 		</set>
       
   557 	</actionbody>
       
   558 	<actionresult>
       
   559 		<return>KErrNone</return>
       
   560 	</actionresult>
       
   561 </action>
       
   562 
       
   563 <action>
       
   564 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
       
   565 	<actiontype>Set</actiontype>
       
   566 	<actionbody>
       
   567 		<cipher>ECipherRC2_CBC_40</cipher>
       
   568 		<set>
       
   569 			<passwd></passwd>
       
   570 			<input>ZYXWUTSR</input>
       
   571 		</set>
       
   572 	</actionbody>
       
   573 	<actionresult>
       
   574 		<return>KErrNone</return>
       
   575 	</actionresult>
       
   576 </action>
       
   577 
       
   578 <action>
       
   579 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
       
   580 	<actiontype>Set</actiontype>
       
   581 	<actionbody>
       
   582 		<cipher>ECipherRC2_CBC_40</cipher>
       
   583 		<set>
       
   584 			<passwd></passwd>
       
   585 			<input></input>
       
   586 		</set>
       
   587 	</actionbody>
       
   588 	<actionresult>
       
   589 		<return>KErrNone</return>
       
   590 	</actionresult>
       
   591 </action>
       
   592 
       
   593 ///////////////////////////////////////////////////////////////////////////////////
       
   594 ///////////////////////////////////////////////////////////////////////////////////
       
   595 ///////////////////////////////////////////////////////////////////////////////////
       
   596 
       
   597 <action>
       
   598 	<actionname>Element test case 1, ECipher3DES_CBC</actionname>
       
   599 	<actiontype>Element</actiontype>
       
   600 	<actionbody>
       
   601 		<cipher>ECipher3DES_CBC</cipher>
       
   602 		<element>
       
   603 			<passwd>password</passwd>
       
   604 			<input>This is what I want to encrypt</input>
       
   605 		</element>
       
   606 	</actionbody>
       
   607 	<actionresult>
       
   608 		<return>KErrNone</return>
       
   609 	</actionresult>
       
   610 </action>
       
   611 
       
   612 <action>
       
   613 	<actionname>Element test case 2, ECipher3DES_CBC</actionname>
       
   614 	<actiontype>Element</actiontype>
       
   615 	<actionbody>
       
   616 		<cipher>ECipher3DES_CBC</cipher>
       
   617 		<element>
       
   618 			<passwd>password</passwd>
       
   619 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   620 		</element>
       
   621 	</actionbody>
       
   622 	<actionresult>
       
   623 		<return>KErrNone</return>
       
   624 	</actionresult>
       
   625 </action>
       
   626 
       
   627 <action>
       
   628 	<actionname>Element test case 3, ECipher3DES_CBC</actionname>
       
   629 	<actiontype>Element</actiontype>
       
   630 	<actionbody>
       
   631 		<cipher>ECipher3DES_CBC</cipher>
       
   632 		<element>
       
   633 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   634 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   635 		</element>
       
   636 	</actionbody>
       
   637 	<actionresult>
       
   638 		<return>KErrNone</return>
       
   639 	</actionresult>
       
   640 </action>
       
   641 
       
   642 <action>
       
   643 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
       
   644 	<actiontype>Set</actiontype>
       
   645 	<actionbody>
       
   646 		<cipher>ECipher3DES_CBC</cipher>
       
   647 		<set>
       
   648 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   649 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   650 		</set>
       
   651 	</actionbody>
       
   652 	<actionresult>
       
   653 		<return>KErrNone</return>
       
   654 	</actionresult>
       
   655 </action>
       
   656 
       
   657 <action>
       
   658 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
       
   659 	<actiontype>Set</actiontype>
       
   660 	<actionbody>
       
   661 		<cipher>ECipher3DES_CBC</cipher>
       
   662 		<set>
       
   663 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   664 			<input>B</input>
       
   665 		</set>
       
   666 	</actionbody>
       
   667 	<actionresult>
       
   668 		<return>KErrNone</return>
       
   669 	</actionresult>
       
   670 </action>
       
   671 
       
   672 <action>
       
   673 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
       
   674 	<actiontype>Set</actiontype>
       
   675 	<actionbody>
       
   676 		<cipher>ECipher3DES_CBC</cipher>
       
   677 		<set>
       
   678 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   679 			<input>ZYXWUTSR</input>
       
   680 		</set>
       
   681 	</actionbody>
       
   682 	<actionresult>
       
   683 		<return>KErrNone</return>
       
   684 	</actionresult>
       
   685 </action>
       
   686 
       
   687 <action>
       
   688 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
       
   689 	<actiontype>Set</actiontype>
       
   690 	<actionbody>
       
   691 		<cipher>ECipher3DES_CBC</cipher>
       
   692 		<set>
       
   693 			<passwd>m</passwd>
       
   694 			<input>ZYXWUTSR</input>
       
   695 		</set>
       
   696 	</actionbody>
       
   697 	<actionresult>
       
   698 		<return>KErrNone</return>
       
   699 	</actionresult>
       
   700 </action>
       
   701 
       
   702 <action>
       
   703 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
       
   704 	<actiontype>Set</actiontype>
       
   705 	<actionbody>
       
   706 		<cipher>ECipher3DES_CBC</cipher>
       
   707 		<set>
       
   708 			<passwd></passwd>
       
   709 			<input>ZYXWUTSR</input>
       
   710 		</set>
       
   711 	</actionbody>
       
   712 	<actionresult>
       
   713 		<return>KErrNone</return>
       
   714 	</actionresult>
       
   715 </action>
       
   716 
       
   717 <action>
       
   718 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
       
   719 	<actiontype>Set</actiontype>
       
   720 	<actionbody>
       
   721 		<cipher>ECipher3DES_CBC</cipher>
       
   722 		<set>
       
   723 			<passwd></passwd>
       
   724 			<input></input>
       
   725 		</set>
       
   726 	</actionbody>
       
   727 	<actionresult>
       
   728 		<return>KErrNone</return>
       
   729 	</actionresult>
       
   730 </action>
       
   731 
       
   732 ///////////////////////////////////////////////////////////////////////////////////
       
   733 ///////////////////////////////////////////////////////////////////////////////////
       
   734 ///////////////////////////////////////////////////////////////////////////////////
       
   735 
       
   736 <action>
       
   737 	<actionname>Element test case 1, ECipherAES_CBC_256</actionname>
       
   738 	<actiontype>Element</actiontype>
       
   739 	<actionbody>
       
   740 		<cipher>ECipherAES_CBC_256</cipher>
       
   741 		<element>
       
   742 			<passwd>password</passwd>
       
   743 			<input>This is what I want to encrypt</input>
       
   744 		</element>
       
   745 	</actionbody>
       
   746 	<actionresult>
       
   747 		<return>KErrNone</return>
       
   748 	</actionresult>
       
   749 </action>
       
   750 
       
   751 <action>
       
   752 	<actionname>Element test case 2, ECipherAES_CBC_256</actionname>
       
   753 	<actiontype>Element</actiontype>
       
   754 	<actionbody>
       
   755 		<cipher>ECipherAES_CBC_256</cipher>
       
   756 		<element>
       
   757 			<passwd>password</passwd>
       
   758 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   759 		</element>
       
   760 	</actionbody>
       
   761 	<actionresult>
       
   762 		<return>KErrNone</return>
       
   763 	</actionresult>
       
   764 </action>
       
   765 
       
   766 <action>
       
   767 	<actionname>Element test case 3, ECipherAES_CBC_256</actionname>
       
   768 	<actiontype>Element</actiontype>
       
   769 	<actionbody>
       
   770 		<cipher>ECipherAES_CBC_256</cipher>
       
   771 		<element>
       
   772 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   773 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   774 		</element>
       
   775 	</actionbody>
       
   776 	<actionresult>
       
   777 		<return>KErrNone</return>
       
   778 	</actionresult>
       
   779 </action>
       
   780 
       
   781 <action>
       
   782 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
       
   783 	<actiontype>Set</actiontype>
       
   784 	<actionbody>
       
   785 		<cipher>ECipherAES_CBC_256</cipher>
       
   786 		<set>
       
   787 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   788 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   789 		</set>
       
   790 	</actionbody>
       
   791 	<actionresult>
       
   792 		<return>KErrNone</return>
       
   793 	</actionresult>
       
   794 </action>
       
   795 
       
   796 <action>
       
   797 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
       
   798 	<actiontype>Set</actiontype>
       
   799 	<actionbody>
       
   800 		<cipher>ECipherAES_CBC_256</cipher>
       
   801 		<set>
       
   802 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   803 			<input>B</input>
       
   804 		</set>
       
   805 	</actionbody>
       
   806 	<actionresult>
       
   807 		<return>KErrNone</return>
       
   808 	</actionresult>
       
   809 </action>
       
   810 
       
   811 <action>
       
   812 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
       
   813 	<actiontype>Set</actiontype>
       
   814 	<actionbody>
       
   815 		<cipher>ECipherAES_CBC_256</cipher>
       
   816 		<set>
       
   817 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   818 			<input>ZYXWUTSR</input>
       
   819 		</set>
       
   820 	</actionbody>
       
   821 	<actionresult>
       
   822 		<return>KErrNone</return>
       
   823 	</actionresult>
       
   824 </action>
       
   825 
       
   826 <action>
       
   827 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
       
   828 	<actiontype>Set</actiontype>
       
   829 	<actionbody>
       
   830 		<cipher>ECipherAES_CBC_256</cipher>
       
   831 		<set>
       
   832 			<passwd>m</passwd>
       
   833 			<input>ZYXWUTSR</input>
       
   834 		</set>
       
   835 	</actionbody>
       
   836 	<actionresult>
       
   837 		<return>KErrNone</return>
       
   838 	</actionresult>
       
   839 </action>
       
   840 
       
   841 <action>
       
   842 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
       
   843 	<actiontype>Set</actiontype>
       
   844 	<actionbody>
       
   845 		<cipher>ECipherAES_CBC_256</cipher>
       
   846 		<set>
       
   847 			<passwd></passwd>
       
   848 			<input>ZYXWUTSR</input>
       
   849 		</set>
       
   850 	</actionbody>
       
   851 	<actionresult>
       
   852 		<return>KErrNone</return>
       
   853 	</actionresult>
       
   854 </action>
       
   855 
       
   856 <action>
       
   857 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
       
   858 	<actiontype>Set</actiontype>
       
   859 	<actionbody>
       
   860 		<cipher>ECipherAES_CBC_256</cipher>
       
   861 		<set>
       
   862 			<passwd></passwd>
       
   863 			<input></input>
       
   864 		</set>
       
   865 	</actionbody>
       
   866 	<actionresult>
       
   867 		<return>KErrNone</return>
       
   868 	</actionresult>
       
   869 </action>
       
   870 
       
   871 ///////////////////////////////////////////////////////////////////////////////////
       
   872 ///////////////////////////////////////////////////////////////////////////////////
       
   873 ///////////////////////////////////////////////////////////////////////////////////
       
   874 
       
   875 <action>
       
   876 	<actionname>Element test case 1, ECipherAES_CBC_192</actionname>
       
   877 	<actiontype>Element</actiontype>
       
   878 	<actionbody>
       
   879 		<cipher>ECipherAES_CBC_192</cipher>
       
   880 		<element>
       
   881 			<passwd>password</passwd>
       
   882 			<input>This is what I want to encrypt</input>
       
   883 		</element>
       
   884 	</actionbody>
       
   885 	<actionresult>
       
   886 		<return>KErrNone</return>
       
   887 	</actionresult>
       
   888 </action>
       
   889 
       
   890 <action>
       
   891 	<actionname>Element test case 2, ECipherAES_CBC_192</actionname>
       
   892 	<actiontype>Element</actiontype>
       
   893 	<actionbody>
       
   894 		<cipher>ECipherAES_CBC_192</cipher>
       
   895 		<element>
       
   896 			<passwd>password</passwd>
       
   897 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   898 		</element>
       
   899 	</actionbody>
       
   900 	<actionresult>
       
   901 		<return>KErrNone</return>
       
   902 	</actionresult>
       
   903 </action>
       
   904 
       
   905 <action>
       
   906 	<actionname>Element test case 3, ECipherAES_CBC_192</actionname>
       
   907 	<actiontype>Element</actiontype>
       
   908 	<actionbody>
       
   909 		<cipher>ECipherAES_CBC_192</cipher>
       
   910 		<element>
       
   911 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   912 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   913 		</element>
       
   914 	</actionbody>
       
   915 	<actionresult>
       
   916 		<return>KErrNone</return>
       
   917 	</actionresult>
       
   918 </action>
       
   919 
       
   920 <action>
       
   921 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
       
   922 	<actiontype>Set</actiontype>
       
   923 	<actionbody>
       
   924 		<cipher>ECipherAES_CBC_192</cipher>
       
   925 		<set>
       
   926 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   927 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
   928 		</set>
       
   929 	</actionbody>
       
   930 	<actionresult>
       
   931 		<return>KErrNone</return>
       
   932 	</actionresult>
       
   933 </action>
       
   934 
       
   935 <action>
       
   936 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
       
   937 	<actiontype>Set</actiontype>
       
   938 	<actionbody>
       
   939 		<cipher>ECipherAES_CBC_192</cipher>
       
   940 		<set>
       
   941 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   942 			<input>B</input>
       
   943 		</set>
       
   944 	</actionbody>
       
   945 	<actionresult>
       
   946 		<return>KErrNone</return>
       
   947 	</actionresult>
       
   948 </action>
       
   949 
       
   950 <action>
       
   951 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
       
   952 	<actiontype>Set</actiontype>
       
   953 	<actionbody>
       
   954 		<cipher>ECipherAES_CBC_192</cipher>
       
   955 		<set>
       
   956 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
   957 			<input>ZYXWUTSR</input>
       
   958 		</set>
       
   959 	</actionbody>
       
   960 	<actionresult>
       
   961 		<return>KErrNone</return>
       
   962 	</actionresult>
       
   963 </action>
       
   964 
       
   965 <action>
       
   966 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
       
   967 	<actiontype>Set</actiontype>
       
   968 	<actionbody>
       
   969 		<cipher>ECipherAES_CBC_192</cipher>
       
   970 		<set>
       
   971 			<passwd>m</passwd>
       
   972 			<input>ZYXWUTSR</input>
       
   973 		</set>
       
   974 	</actionbody>
       
   975 	<actionresult>
       
   976 		<return>KErrNone</return>
       
   977 	</actionresult>
       
   978 </action>
       
   979 
       
   980 <action>
       
   981 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
       
   982 	<actiontype>Set</actiontype>
       
   983 	<actionbody>
       
   984 		<cipher>ECipherAES_CBC_192</cipher>
       
   985 		<set>
       
   986 			<passwd></passwd>
       
   987 			<input>ZYXWUTSR</input>
       
   988 		</set>
       
   989 	</actionbody>
       
   990 	<actionresult>
       
   991 		<return>KErrNone</return>
       
   992 	</actionresult>
       
   993 </action>
       
   994 
       
   995 <action>
       
   996 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
       
   997 	<actiontype>Set</actiontype>
       
   998 	<actionbody>
       
   999 		<cipher>ECipherAES_CBC_192</cipher>
       
  1000 		<set>
       
  1001 			<passwd></passwd>
       
  1002 			<input></input>
       
  1003 		</set>
       
  1004 	</actionbody>
       
  1005 	<actionresult>
       
  1006 		<return>KErrNone</return>
       
  1007 	</actionresult>
       
  1008 </action>
       
  1009 
       
  1010 ///////////////////////////////////////////////////////////////////////////////////
       
  1011 ///////////////////////////////////////////////////////////////////////////////////
       
  1012 ///////////////////////////////////////////////////////////////////////////////////
       
  1013 
       
  1014 
       
  1015 <action>
       
  1016 	<actionname>Element test case 1, ECipherAES_CBC_128</actionname>
       
  1017 	<actiontype>Element</actiontype>
       
  1018 	<actionbody>
       
  1019 		<cipher>ECipherAES_CBC_128</cipher>
       
  1020 		<element>
       
  1021 			<passwd>password</passwd>
       
  1022 			<input>This is what I want to encrypt</input>
       
  1023 		</element>
       
  1024 	</actionbody>
       
  1025 	<actionresult>
       
  1026 		<return>KErrNone</return>
       
  1027 	</actionresult>
       
  1028 </action>
       
  1029 
       
  1030 <action>
       
  1031 	<actionname>Element test case 2, ECipherAES_CBC_128</actionname>
       
  1032 	<actiontype>Element</actiontype>
       
  1033 	<actionbody>
       
  1034 		<cipher>ECipherAES_CBC_128</cipher>
       
  1035 		<element>
       
  1036 			<passwd>password</passwd>
       
  1037 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1038 		</element>
       
  1039 	</actionbody>
       
  1040 	<actionresult>
       
  1041 		<return>KErrNone</return>
       
  1042 	</actionresult>
       
  1043 </action>
       
  1044 
       
  1045 <action>
       
  1046 	<actionname>Element test case 3, ECipherAES_CBC_128</actionname>
       
  1047 	<actiontype>Element</actiontype>
       
  1048 	<actionbody>
       
  1049 		<cipher>ECipherAES_CBC_128</cipher>
       
  1050 		<element>
       
  1051 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1052 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1053 		</element>
       
  1054 	</actionbody>
       
  1055 	<actionresult>
       
  1056 		<return>KErrNone</return>
       
  1057 	</actionresult>
       
  1058 </action>
       
  1059 
       
  1060 <action>
       
  1061 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
       
  1062 	<actiontype>Set</actiontype>
       
  1063 	<actionbody>
       
  1064 		<cipher>ECipherAES_CBC_128</cipher>
       
  1065 		<set>
       
  1066 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1067 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1068 		</set>
       
  1069 	</actionbody>
       
  1070 	<actionresult>
       
  1071 		<return>KErrNone</return>
       
  1072 	</actionresult>
       
  1073 </action>
       
  1074 
       
  1075 <action>
       
  1076 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
       
  1077 	<actiontype>Set</actiontype>
       
  1078 	<actionbody>
       
  1079 		<cipher>ECipherAES_CBC_128</cipher>
       
  1080 		<set>
       
  1081 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1082 			<input>B</input>
       
  1083 		</set>
       
  1084 	</actionbody>
       
  1085 	<actionresult>
       
  1086 		<return>KErrNone</return>
       
  1087 	</actionresult>
       
  1088 </action>
       
  1089 
       
  1090 <action>
       
  1091 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
       
  1092 	<actiontype>Set</actiontype>
       
  1093 	<actionbody>
       
  1094 		<cipher>ECipherAES_CBC_128</cipher>
       
  1095 		<set>
       
  1096 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1097 			<input>ZYXWUTSR</input>
       
  1098 		</set>
       
  1099 	</actionbody>
       
  1100 	<actionresult>
       
  1101 		<return>KErrNone</return>
       
  1102 	</actionresult>
       
  1103 </action>
       
  1104 
       
  1105 <action>
       
  1106 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
       
  1107 	<actiontype>Set</actiontype>
       
  1108 	<actionbody>
       
  1109 		<cipher>ECipherAES_CBC_128</cipher>
       
  1110 		<set>
       
  1111 			<passwd>m</passwd>
       
  1112 			<input>ZYXWUTSR</input>
       
  1113 		</set>
       
  1114 	</actionbody>
       
  1115 	<actionresult>
       
  1116 		<return>KErrNone</return>
       
  1117 	</actionresult>
       
  1118 </action>
       
  1119 
       
  1120 <action>
       
  1121 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
       
  1122 	<actiontype>Set</actiontype>
       
  1123 	<actionbody>
       
  1124 		<cipher>ECipherAES_CBC_128</cipher>
       
  1125 		<set>
       
  1126 			<passwd></passwd>
       
  1127 			<input>ZYXWUTSR</input>
       
  1128 		</set>
       
  1129 	</actionbody>
       
  1130 	<actionresult>
       
  1131 		<return>KErrNone</return>
       
  1132 	</actionresult>
       
  1133 </action>
       
  1134 
       
  1135 <action>
       
  1136 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
       
  1137 	<actiontype>Set</actiontype>
       
  1138 	<actionbody>
       
  1139 		<cipher>ECipherAES_CBC_128</cipher>
       
  1140 		<set>
       
  1141 			<passwd></passwd>
       
  1142 			<input></input>
       
  1143 		</set>
       
  1144 	</actionbody>
       
  1145 	<actionresult>
       
  1146 		<return>KErrNone</return>
       
  1147 	</actionresult>
       
  1148 </action>
       
  1149 
       
  1150 ///////////////////////////////////////////////////////////////////////////////////
       
  1151 ///////////////////////////////////////////////////////////////////////////////////
       
  1152 ///////////////////////////////////////////////////////////////////////////////////
       
  1153 
       
  1154 
       
  1155 // Start of Permanent File Store PBE testing between weak and strong crypto
       
  1156 <action>
       
  1157 	<actionname>Write encrypted data to a PFS named according to crypto strength</actionname>
       
  1158 	<actiontype>WritePFS</actiontype>
       
  1159 	<actionbody>
       
  1160 		<writepfs>
       
  1161 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1162 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1163 		</writepfs>
       
  1164 	</actionbody>
       
  1165 	<actionresult>
       
  1166 		<return>KErrNone</return>
       
  1167 	</actionresult>
       
  1168 </action>
       
  1169 <action>
       
  1170 	<actionname>Decrypting weak crypto file</actionname>
       
  1171 	<actiontype>ReadPFS</actiontype>
       
  1172 	<actionbody>
       
  1173 		<readpfs>
       
  1174 			<strength>weak</strength>
       
  1175 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1176 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1177 		</readpfs>
       
  1178 	</actionbody>
       
  1179 	<actionresult>
       
  1180 		<return>KErrNone</return>
       
  1181 	</actionresult>
       
  1182 </action>
       
  1183 <action>
       
  1184 	<actionname>Decrypting strong crypto file</actionname>
       
  1185 	<actiontype>ReadPFS</actiontype>
       
  1186 	<actionbody>
       
  1187 		<readpfs>
       
  1188 			<strength>strong</strength>
       
  1189 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1190 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1191 		</readpfs>
       
  1192 	</actionbody>
       
  1193 	<actionresult>
       
  1194 		<return>KErrNone</return>
       
  1195 	</actionresult>
       
  1196 </action>
       
  1197 
       
  1198 //Start of OOM testing
       
  1199 <action>
       
  1200     <actionname>OOM start</actionname>
       
  1201     <actiontype>startmemfailure</actiontype>
       
  1202     <actionbody></actionbody>
       
  1203     <actionresult>
       
  1204         <return>KErrNone</return>
       
  1205     </actionresult>
       
  1206 </action>
       
  1207 <action>
       
  1208 	<actionname>Element test case 2</actionname>
       
  1209 	<actiontype>Element</actiontype>
       
  1210 	<actionbody>
       
  1211 		<element>
       
  1212 			<passwd>password</passwd>
       
  1213 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1214 		</element>
       
  1215 	</actionbody>
       
  1216 	<actionresult>
       
  1217 		<return>KErrNone</return>
       
  1218 	</actionresult>
       
  1219 </action>
       
  1220 <action>
       
  1221 	<actionname>Test of Set encryption, password changing, exporting importing Test 1</actionname>
       
  1222 	<actiontype>Set</actiontype>
       
  1223 	<actionbody>
       
  1224 		<set>
       
  1225 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1226 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1227 		</set>
       
  1228 	</actionbody>
       
  1229 	<actionresult>
       
  1230 		<return>KErrNone</return>
       
  1231 	</actionresult>
       
  1232 </action>
       
  1233 <action>
       
  1234     <actionname>OOM end</actionname>
       
  1235     <actiontype>stopmemfailure</actiontype>
       
  1236     <actionbody></actionbody>
       
  1237     <actionresult>
       
  1238         <return>KErrNone</return>
       
  1239     </actionresult>
       
  1240 </action>
       
  1241 
       
  1242 
       
  1243 // =======================================================================
       
  1244 // PKCS#12 tests
       
  1245 
       
  1246 
       
  1247 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1248 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1249 //! @SYMREQ CIT_PREQ1054
       
  1250 //! @SYMTestPriority medium
       
  1251 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1252 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1253 <action>
       
  1254 	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
       
  1255 	<actiontype>Element</actiontype>
       
  1256 	<actionbody>
       
  1257 		<kdf>PKCS#12</kdf>
       
  1258 		<salt_len_bytes>20</salt_len_bytes>
       
  1259 		<iter_count>1024</iter_count>
       
  1260 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1261 		<element>
       
  1262 			<passwd>password</passwd>
       
  1263 			<input>This is what I want to encrypt</input>
       
  1264 		</element>
       
  1265 	</actionbody>
       
  1266 	<actionresult>
       
  1267 		<return>KErrNone</return>
       
  1268 	</actionresult>
       
  1269 </action>
       
  1270 
       
  1271 
       
  1272 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1273 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1274 //! @SYMREQ CIT_PREQ1054
       
  1275 //! @SYMTestPriority medium
       
  1276 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1277 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1278 <action>
       
  1279 	<actionname>Element test case 2, ECipherRC2_CBC_128_16</actionname>
       
  1280 	<actiontype>Element</actiontype>
       
  1281 	<actionbody>
       
  1282 		<kdf>PKCS#12</kdf>
       
  1283 		<salt_len_bytes>20</salt_len_bytes>
       
  1284 		<iter_count>1024</iter_count>
       
  1285 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1286 		<element>
       
  1287 			<passwd>password</passwd>
       
  1288 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1289 		</element>
       
  1290 	</actionbody>
       
  1291 	<actionresult>
       
  1292 		<return>KErrNone</return>
       
  1293 	</actionresult>
       
  1294 </action>
       
  1295 
       
  1296 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1297 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1298 //! @SYMREQ CIT_PREQ1054
       
  1299 //! @SYMTestPriority medium
       
  1300 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1301 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1302 <action>
       
  1303 	<actionname>Element test case 3, ECipherRC2_CBC_128_16</actionname>
       
  1304 	<actiontype>Element</actiontype>
       
  1305 	<actionbody>
       
  1306 		<kdf>PKCS#12</kdf>
       
  1307 		<salt_len_bytes>20</salt_len_bytes>
       
  1308 		<iter_count>1024</iter_count>
       
  1309 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1310 		<element>
       
  1311 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1312 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1313 		</element>
       
  1314 	</actionbody>
       
  1315 	<actionresult>
       
  1316 		<return>KErrNone</return>
       
  1317 	</actionresult>
       
  1318 </action>
       
  1319 
       
  1320 
       
  1321 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1322 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1323 //! @SYMREQ CIT_PREQ1054
       
  1324 //! @SYMTestPriority medium
       
  1325 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1326 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1327 <action>
       
  1328 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128_16</actionname>
       
  1329 	<actiontype>Set</actiontype>
       
  1330 	<actionbody>
       
  1331 		<kdf>PKCS#12</kdf>
       
  1332 		<salt_len_bytes>20</salt_len_bytes>
       
  1333 		<iter_count>1024</iter_count>
       
  1334 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1335 		<set>
       
  1336 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1337 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1338 		</set>
       
  1339 	</actionbody>
       
  1340 	<actionresult>
       
  1341 		<return>KErrNone</return>
       
  1342 	</actionresult>
       
  1343 </action>
       
  1344 
       
  1345 
       
  1346 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1347 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#5 KDF.
       
  1348 //! @SYMREQ CIT_PREQ1054
       
  1349 //! @SYMTestPriority medium
       
  1350 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1352 <action>
       
  1353 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, explicit kdf, salt len, iter count, ECipherRC2_CBC_128_16</actionname>
       
  1354 	<actiontype>Set</actiontype>
       
  1355 	<actionbody>
       
  1356 		<kdf>PKCS#12</kdf>
       
  1357 		<salt_len_bytes>20</salt_len_bytes>
       
  1358 		<iter_count>1024</iter_count>
       
  1359 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1360 		<kdf>PKCS#5</kdf>
       
  1361 		<salt_len_bytes>16</salt_len_bytes>
       
  1362 		<iter_count>1000</iter_count>
       
  1363 		<set>
       
  1364 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1365 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1366 		</set>
       
  1367 	</actionbody>
       
  1368 	<actionresult>
       
  1369 		<return>KErrNone</return>
       
  1370 	</actionresult>
       
  1371 </action>
       
  1372 
       
  1373 
       
  1374 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1375 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1376 //! @SYMREQ CIT_PREQ1054
       
  1377 //! @SYMTestPriority medium
       
  1378 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1379 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1380 <action>
       
  1381 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128_16</actionname>
       
  1382 	<actiontype>Set</actiontype>
       
  1383 	<actionbody>
       
  1384 		<kdf>PKCS#12</kdf>
       
  1385 		<salt_len_bytes>20</salt_len_bytes>
       
  1386 		<iter_count>1024</iter_count>
       
  1387 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1388 		<set>
       
  1389 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1390 			<input>B</input>
       
  1391 		</set>
       
  1392 	</actionbody>
       
  1393 	<actionresult>
       
  1394 		<return>KErrNone</return>
       
  1395 	</actionresult>
       
  1396 </action>
       
  1397 
       
  1398 
       
  1399 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1400 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1401 //! @SYMREQ CIT_PREQ1054
       
  1402 //! @SYMTestPriority medium
       
  1403 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1404 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1405 <action>
       
  1406 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128_16</actionname>
       
  1407 	<actiontype>Set</actiontype>
       
  1408 	<actionbody>
       
  1409 		<kdf>PKCS#12</kdf>
       
  1410 		<salt_len_bytes>20</salt_len_bytes>
       
  1411 		<iter_count>1024</iter_count>
       
  1412 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1413 		<set>
       
  1414 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1415 			<input>ZYXWUTSR</input>
       
  1416 		</set>
       
  1417 	</actionbody>
       
  1418 	<actionresult>
       
  1419 		<return>KErrNone</return>
       
  1420 	</actionresult>
       
  1421 </action>
       
  1422 
       
  1423 
       
  1424 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1425 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1426 //! @SYMREQ CIT_PREQ1054
       
  1427 //! @SYMTestPriority medium
       
  1428 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1429 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1430 <action>
       
  1431 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128_16</actionname>
       
  1432 	<actiontype>Set</actiontype>
       
  1433 	<actionbody>
       
  1434 		<kdf>PKCS#12</kdf>
       
  1435 		<salt_len_bytes>20</salt_len_bytes>
       
  1436 		<iter_count>1024</iter_count>
       
  1437 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1438 		<set>
       
  1439 			<passwd>m</passwd>
       
  1440 			<input>ZYXWUTSR</input>
       
  1441 		</set>
       
  1442 	</actionbody>
       
  1443 	<actionresult>
       
  1444 		<return>KErrNone</return>
       
  1445 	</actionresult>
       
  1446 </action>
       
  1447 
       
  1448 
       
  1449 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1450 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1451 //! @SYMREQ CIT_PREQ1054
       
  1452 //! @SYMTestPriority medium
       
  1453 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1454 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1455 <action>
       
  1456 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128_16</actionname>
       
  1457 	<actiontype>Set</actiontype>
       
  1458 	<actionbody>
       
  1459 		<kdf>PKCS#12</kdf>
       
  1460 		<salt_len_bytes>20</salt_len_bytes>
       
  1461 		<iter_count>1024</iter_count>
       
  1462 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1463 		<set>
       
  1464 			<passwd></passwd>
       
  1465 			<input>ZYXWUTSR</input>
       
  1466 		</set>
       
  1467 	</actionbody>
       
  1468 	<actionresult>
       
  1469 		<return>KErrNone</return>
       
  1470 	</actionresult>
       
  1471 </action>
       
  1472 
       
  1473 
       
  1474 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1475 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1476 //! @SYMREQ CIT_PREQ1054
       
  1477 //! @SYMTestPriority medium
       
  1478 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1479 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1480 <action>
       
  1481 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128_16</actionname>
       
  1482 	<actiontype>Set</actiontype>
       
  1483 	<actionbody>
       
  1484 		<kdf>PKCS#12</kdf>
       
  1485 		<salt_len_bytes>20</salt_len_bytes>
       
  1486 		<iter_count>1024</iter_count>
       
  1487 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  1488 		<set>
       
  1489 			<passwd></passwd>
       
  1490 			<input></input>
       
  1491 		</set>
       
  1492 	</actionbody>
       
  1493 	<actionresult>
       
  1494 		<return>KErrNone</return>
       
  1495 	</actionresult>
       
  1496 </action>
       
  1497 
       
  1498 ///////////////////////////////////////////////////////////////////////////////////
       
  1499 ///////////////////////////////////////////////////////////////////////////////////
       
  1500 ///////////////////////////////////////////////////////////////////////////////////
       
  1501 
       
  1502 
       
  1503 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1504 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1505 //! @SYMREQ CIT_PREQ1054
       
  1506 //! @SYMTestPriority medium
       
  1507 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1508 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1509 <action>
       
  1510 	<actionname>Element test case 1, ECipherRC2_CBC_40_16</actionname>
       
  1511 	<actiontype>Element</actiontype>
       
  1512 	<actionbody>
       
  1513 		<kdf>PKCS#12</kdf>
       
  1514 		<salt_len_bytes>20</salt_len_bytes>
       
  1515 		<iter_count>1024</iter_count>
       
  1516 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1517 		<element>
       
  1518 			<passwd>password</passwd>
       
  1519 			<input>This is what I want to encrypt</input>
       
  1520 		</element>
       
  1521 	</actionbody>
       
  1522 	<actionresult>
       
  1523 		<return>KErrNone</return>
       
  1524 	</actionresult>
       
  1525 </action>
       
  1526 
       
  1527 
       
  1528 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1529 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1530 //! @SYMREQ CIT_PREQ1054
       
  1531 //! @SYMTestPriority medium
       
  1532 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1533 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1534 <action>
       
  1535 	<actionname>Element test case 2, ECipherRC2_CBC_40_16</actionname>
       
  1536 	<actiontype>Element</actiontype>
       
  1537 	<actionbody>
       
  1538 		<kdf>PKCS#12</kdf>
       
  1539 		<salt_len_bytes>20</salt_len_bytes>
       
  1540 		<iter_count>1024</iter_count>
       
  1541 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1542 		<element>
       
  1543 			<passwd>password</passwd>
       
  1544 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1545 		</element>
       
  1546 	</actionbody>
       
  1547 	<actionresult>
       
  1548 		<return>KErrNone</return>
       
  1549 	</actionresult>
       
  1550 </action>
       
  1551 
       
  1552 
       
  1553 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1554 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1555 //! @SYMREQ CIT_PREQ1054
       
  1556 //! @SYMTestPriority medium
       
  1557 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1558 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1559 <action>
       
  1560 	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
       
  1561 	<actiontype>Element</actiontype>
       
  1562 	<actionbody>
       
  1563 		<kdf>PKCS#12</kdf>
       
  1564 		<salt_len_bytes>20</salt_len_bytes>
       
  1565 		<iter_count>1024</iter_count>
       
  1566 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1567 		<element>
       
  1568 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1569 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1570 		</element>
       
  1571 	</actionbody>
       
  1572 	<actionresult>
       
  1573 		<return>KErrNone</return>
       
  1574 	</actionresult>
       
  1575 </action>
       
  1576 
       
  1577 
       
  1578 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1579 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1580 //! @SYMREQ CIT_PREQ1054
       
  1581 //! @SYMTestPriority medium
       
  1582 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1583 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1584 <action>
       
  1585 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40_16</actionname>
       
  1586 	<actiontype>Set</actiontype>
       
  1587 	<actionbody>
       
  1588 		<kdf>PKCS#12</kdf>
       
  1589 		<salt_len_bytes>20</salt_len_bytes>
       
  1590 		<iter_count>1024</iter_count>
       
  1591 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1592 		<set>
       
  1593 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1594 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1595 		</set>
       
  1596 	</actionbody>
       
  1597 	<actionresult>
       
  1598 		<return>KErrNone</return>
       
  1599 	</actionresult>
       
  1600 </action>
       
  1601 
       
  1602 
       
  1603 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1604 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1605 //! @SYMREQ CIT_PREQ1054
       
  1606 //! @SYMTestPriority medium
       
  1607 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1608 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1609 <action>
       
  1610 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40_16</actionname>
       
  1611 	<actiontype>Set</actiontype>
       
  1612 	<actionbody>
       
  1613 		<kdf>PKCS#12</kdf>
       
  1614 		<salt_len_bytes>20</salt_len_bytes>
       
  1615 		<iter_count>1024</iter_count>
       
  1616 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1617 		<set>
       
  1618 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1619 			<input>B</input>
       
  1620 		</set>
       
  1621 	</actionbody>
       
  1622 	<actionresult>
       
  1623 		<return>KErrNone</return>
       
  1624 	</actionresult>
       
  1625 </action>
       
  1626 
       
  1627 
       
  1628 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1629 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1630 //! @SYMREQ CIT_PREQ1054
       
  1631 //! @SYMTestPriority medium
       
  1632 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1633 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1634 <action>
       
  1635 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40_16</actionname>
       
  1636 	<actiontype>Set</actiontype>
       
  1637 	<actionbody>
       
  1638 		<kdf>PKCS#12</kdf>
       
  1639 		<salt_len_bytes>20</salt_len_bytes>
       
  1640 		<iter_count>1024</iter_count>
       
  1641 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1642 		<set>
       
  1643 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1644 			<input>ZYXWUTSR</input>
       
  1645 		</set>
       
  1646 	</actionbody>
       
  1647 	<actionresult>
       
  1648 		<return>KErrNone</return>
       
  1649 	</actionresult>
       
  1650 </action>
       
  1651 
       
  1652 
       
  1653 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1654 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1655 //! @SYMREQ CIT_PREQ1054
       
  1656 //! @SYMTestPriority medium
       
  1657 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1658 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1659 <action>
       
  1660 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40_16</actionname>
       
  1661 	<actiontype>Set</actiontype>
       
  1662 	<actionbody>
       
  1663 		<kdf>PKCS#12</kdf>
       
  1664 		<salt_len_bytes>20</salt_len_bytes>
       
  1665 		<iter_count>1024</iter_count>
       
  1666 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1667 		<set>
       
  1668 			<passwd>m</passwd>
       
  1669 			<input>ZYXWUTSR</input>
       
  1670 		</set>
       
  1671 	</actionbody>
       
  1672 	<actionresult>
       
  1673 		<return>KErrNone</return>
       
  1674 	</actionresult>
       
  1675 </action>
       
  1676 
       
  1677 
       
  1678 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1679 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1680 //! @SYMREQ CIT_PREQ1054
       
  1681 //! @SYMTestPriority medium
       
  1682 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1683 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1684 <action>
       
  1685 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40_16</actionname>
       
  1686 	<actiontype>Set</actiontype>
       
  1687 	<actionbody>
       
  1688 		<kdf>PKCS#12</kdf>
       
  1689 		<salt_len_bytes>20</salt_len_bytes>
       
  1690 		<iter_count>1024</iter_count>
       
  1691 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1692 		<set>
       
  1693 			<passwd></passwd>
       
  1694 			<input>ZYXWUTSR</input>
       
  1695 		</set>
       
  1696 	</actionbody>
       
  1697 	<actionresult>
       
  1698 		<return>KErrNone</return>
       
  1699 	</actionresult>
       
  1700 </action>
       
  1701 
       
  1702 
       
  1703 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1704 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1705 //! @SYMREQ CIT_PREQ1054
       
  1706 //! @SYMTestPriority medium
       
  1707 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1708 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1709 <action>
       
  1710 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40_16</actionname>
       
  1711 	<actiontype>Set</actiontype>
       
  1712 	<actionbody>
       
  1713 		<kdf>PKCS#12</kdf>
       
  1714 		<salt_len_bytes>20</salt_len_bytes>
       
  1715 		<iter_count>1024</iter_count>
       
  1716 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  1717 		<set>
       
  1718 			<passwd></passwd>
       
  1719 			<input></input>
       
  1720 		</set>
       
  1721 	</actionbody>
       
  1722 	<actionresult>
       
  1723 		<return>KErrNone</return>
       
  1724 	</actionresult>
       
  1725 </action>
       
  1726 
       
  1727 ///////////////////////////////////////////////////////////////////////////////////
       
  1728 ///////////////////////////////////////////////////////////////////////////////////
       
  1729 ///////////////////////////////////////////////////////////////////////////////////
       
  1730 
       
  1731 
       
  1732 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1733 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1734 //! @SYMREQ CIT_PREQ1054
       
  1735 //! @SYMTestPriority medium
       
  1736 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1737 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1738 <action>
       
  1739 	<actionname>Element test case 1, ECipherRC2_CBC_128</actionname>
       
  1740 	<actiontype>Element</actiontype>
       
  1741 	<actionbody>
       
  1742 		<kdf>PKCS#12</kdf>
       
  1743 		<salt_len_bytes>20</salt_len_bytes>
       
  1744 		<iter_count>1024</iter_count>
       
  1745 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1746 		<element>
       
  1747 			<passwd>password</passwd>
       
  1748 			<input>This is what I want to encrypt</input>
       
  1749 		</element>
       
  1750 	</actionbody>
       
  1751 	<actionresult>
       
  1752 		<return>KErrNone</return>
       
  1753 	</actionresult>
       
  1754 </action>
       
  1755 
       
  1756 
       
  1757 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1758 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1759 //! @SYMREQ CIT_PREQ1054
       
  1760 //! @SYMTestPriority medium
       
  1761 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1762 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1763 <action>
       
  1764 	<actionname>Element test case 2, ECipherRC2_CBC_128</actionname>
       
  1765 	<actiontype>Element</actiontype>
       
  1766 	<actionbody>
       
  1767 		<kdf>PKCS#12</kdf>
       
  1768 		<salt_len_bytes>20</salt_len_bytes>
       
  1769 		<iter_count>1024</iter_count>
       
  1770 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1771 		<element>
       
  1772 			<passwd>password</passwd>
       
  1773 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1774 		</element>
       
  1775 	</actionbody>
       
  1776 	<actionresult>
       
  1777 		<return>KErrNone</return>
       
  1778 	</actionresult>
       
  1779 </action>
       
  1780 
       
  1781 
       
  1782 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1783 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1784 //! @SYMREQ CIT_PREQ1054
       
  1785 //! @SYMTestPriority medium
       
  1786 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1787 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1788 <action>
       
  1789 	<actionname>Element test case 3, ECipherRC2_CBC_128</actionname>
       
  1790 	<actiontype>Element</actiontype>
       
  1791 	<actionbody>
       
  1792 		<kdf>PKCS#12</kdf>
       
  1793 		<salt_len_bytes>20</salt_len_bytes>
       
  1794 		<iter_count>1024</iter_count>
       
  1795 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1796 		<element>
       
  1797 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1798 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1799 		</element>
       
  1800 	</actionbody>
       
  1801 	<actionresult>
       
  1802 		<return>KErrNone</return>
       
  1803 	</actionresult>
       
  1804 </action>
       
  1805 
       
  1806 
       
  1807 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1808 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1809 //! @SYMREQ CIT_PREQ1054
       
  1810 //! @SYMTestPriority medium
       
  1811 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1812 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1813 <action>
       
  1814 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_128</actionname>
       
  1815 	<actiontype>Set</actiontype>
       
  1816 	<actionbody>
       
  1817 		<kdf>PKCS#12</kdf>
       
  1818 		<salt_len_bytes>20</salt_len_bytes>
       
  1819 		<iter_count>1024</iter_count>
       
  1820 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1821 		<set>
       
  1822 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1823 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  1824 		</set>
       
  1825 	</actionbody>
       
  1826 	<actionresult>
       
  1827 		<return>KErrNone</return>
       
  1828 	</actionresult>
       
  1829 </action>
       
  1830 
       
  1831 
       
  1832 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1833 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1834 //! @SYMREQ CIT_PREQ1054
       
  1835 //! @SYMTestPriority medium
       
  1836 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1837 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1838 <action>
       
  1839 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_128</actionname>
       
  1840 	<actiontype>Set</actiontype>
       
  1841 	<actionbody>
       
  1842 		<kdf>PKCS#12</kdf>
       
  1843 		<salt_len_bytes>20</salt_len_bytes>
       
  1844 		<iter_count>1024</iter_count>
       
  1845 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1846 		<set>
       
  1847 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1848 			<input>B</input>
       
  1849 		</set>
       
  1850 	</actionbody>
       
  1851 	<actionresult>
       
  1852 		<return>KErrNone</return>
       
  1853 	</actionresult>
       
  1854 </action>
       
  1855 
       
  1856 
       
  1857 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1858 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1859 //! @SYMREQ CIT_PREQ1054
       
  1860 //! @SYMTestPriority medium
       
  1861 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1862 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1863 <action>
       
  1864 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_128</actionname>
       
  1865 	<actiontype>Set</actiontype>
       
  1866 	<actionbody>
       
  1867 		<kdf>PKCS#12</kdf>
       
  1868 		<salt_len_bytes>20</salt_len_bytes>
       
  1869 		<iter_count>1024</iter_count>
       
  1870 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1871 		<set>
       
  1872 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  1873 			<input>ZYXWUTSR</input>
       
  1874 		</set>
       
  1875 	</actionbody>
       
  1876 	<actionresult>
       
  1877 		<return>KErrNone</return>
       
  1878 	</actionresult>
       
  1879 </action>
       
  1880 
       
  1881 
       
  1882 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1883 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1884 //! @SYMREQ CIT_PREQ1054
       
  1885 //! @SYMTestPriority medium
       
  1886 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1887 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1888 <action>
       
  1889 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_128</actionname>
       
  1890 	<actiontype>Set</actiontype>
       
  1891 	<actionbody>
       
  1892 		<kdf>PKCS#12</kdf>
       
  1893 		<salt_len_bytes>20</salt_len_bytes>
       
  1894 		<iter_count>1024</iter_count>
       
  1895 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1896 		<set>
       
  1897 			<passwd>m</passwd>
       
  1898 			<input>ZYXWUTSR</input>
       
  1899 		</set>
       
  1900 	</actionbody>
       
  1901 	<actionresult>
       
  1902 		<return>KErrNone</return>
       
  1903 	</actionresult>
       
  1904 </action>
       
  1905 
       
  1906 
       
  1907 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1908 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1909 //! @SYMREQ CIT_PREQ1054
       
  1910 //! @SYMTestPriority medium
       
  1911 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1912 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1913 <action>
       
  1914 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_128</actionname>
       
  1915 	<actiontype>Set</actiontype>
       
  1916 	<actionbody>
       
  1917 		<kdf>PKCS#12</kdf>
       
  1918 		<salt_len_bytes>20</salt_len_bytes>
       
  1919 		<iter_count>1024</iter_count>
       
  1920 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1921 		<set>
       
  1922 			<passwd></passwd>
       
  1923 			<input>ZYXWUTSR</input>
       
  1924 		</set>
       
  1925 	</actionbody>
       
  1926 	<actionresult>
       
  1927 		<return>KErrNone</return>
       
  1928 	</actionresult>
       
  1929 </action>
       
  1930 
       
  1931 
       
  1932 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1933 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1934 //! @SYMREQ CIT_PREQ1054
       
  1935 //! @SYMTestPriority medium
       
  1936 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1937 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1938 <action>
       
  1939 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_128</actionname>
       
  1940 	<actiontype>Set</actiontype>
       
  1941 	<actionbody>
       
  1942 		<kdf>PKCS#12</kdf>
       
  1943 		<salt_len_bytes>20</salt_len_bytes>
       
  1944 		<iter_count>1024</iter_count>
       
  1945 		<cipher>ECipherRC2_CBC_128</cipher>
       
  1946 		<set>
       
  1947 			<passwd></passwd>
       
  1948 			<input></input>
       
  1949 		</set>
       
  1950 	</actionbody>
       
  1951 	<actionresult>
       
  1952 		<return>KErrNone</return>
       
  1953 	</actionresult>
       
  1954 </action>
       
  1955 
       
  1956 ///////////////////////////////////////////////////////////////////////////////////
       
  1957 ///////////////////////////////////////////////////////////////////////////////////
       
  1958 ///////////////////////////////////////////////////////////////////////////////////
       
  1959 
       
  1960 
       
  1961 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1962 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1963 //! @SYMREQ CIT_PREQ1054
       
  1964 //! @SYMTestPriority medium
       
  1965 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1966 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1967 <action>
       
  1968 	<actionname>Element test case 1, ECipherRC2_CBC_40</actionname>
       
  1969 	<actiontype>Element</actiontype>
       
  1970 	<actionbody>
       
  1971 		<kdf>PKCS#12</kdf>
       
  1972 		<salt_len_bytes>20</salt_len_bytes>
       
  1973 		<iter_count>1024</iter_count>
       
  1974 		<cipher>ECipherRC2_CBC_40</cipher>
       
  1975 		<element>
       
  1976 			<passwd>password</passwd>
       
  1977 			<input>This is what I want to encrypt</input>
       
  1978 		</element>
       
  1979 	</actionbody>
       
  1980 	<actionresult>
       
  1981 		<return>KErrNone</return>
       
  1982 	</actionresult>
       
  1983 </action>
       
  1984 
       
  1985 
       
  1986 //! @SYMTestCaseID CIT_PREQ1054_02
       
  1987 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  1988 //! @SYMREQ CIT_PREQ1054
       
  1989 //! @SYMTestPriority medium
       
  1990 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  1991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1992 <action>
       
  1993 	<actionname>Element test case 2, ECipherRC2_CBC_40</actionname>
       
  1994 	<actiontype>Element</actiontype>
       
  1995 	<actionbody>
       
  1996 		<kdf>PKCS#12</kdf>
       
  1997 		<salt_len_bytes>20</salt_len_bytes>
       
  1998 		<iter_count>1024</iter_count>
       
  1999 		<cipher>ECipherRC2_CBC_40</cipher>
       
  2000 		<element>
       
  2001 			<passwd>password</passwd>
       
  2002 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2003 		</element>
       
  2004 	</actionbody>
       
  2005 	<actionresult>
       
  2006 		<return>KErrNone</return>
       
  2007 	</actionresult>
       
  2008 </action>
       
  2009 
       
  2010 
       
  2011 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2012 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2013 //! @SYMREQ CIT_PREQ1054
       
  2014 //! @SYMTestPriority medium
       
  2015 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2016 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2017 <action>
       
  2018 	<actionname>Element test case 3, ECipherRC2_CBC_40</actionname>
       
  2019 	<actiontype>Element</actiontype>
       
  2020 	<actionbody>
       
  2021 		<kdf>PKCS#12</kdf>
       
  2022 		<salt_len_bytes>20</salt_len_bytes>
       
  2023 		<iter_count>1024</iter_count>
       
  2024 		<cipher>ECipherRC2_CBC_40</cipher>
       
  2025 		<element>
       
  2026 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2027 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2028 		</element>
       
  2029 	</actionbody>
       
  2030 	<actionresult>
       
  2031 		<return>KErrNone</return>
       
  2032 	</actionresult>
       
  2033 </action>
       
  2034 
       
  2035 
       
  2036 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2037 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2038 //! @SYMREQ CIT_PREQ1054
       
  2039 //! @SYMTestPriority medium
       
  2040 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2041 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2042 <action>
       
  2043 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherRC2_CBC_40</actionname>
       
  2044 	<actiontype>Set</actiontype>
       
  2045 	<actionbody>
       
  2046 		<kdf>PKCS#12</kdf>
       
  2047 		<salt_len_bytes>20</salt_len_bytes>
       
  2048 		<iter_count>1024</iter_count>
       
  2049 		<cipher>ECipherRC2_CBC_40</cipher>
       
  2050 		<set>
       
  2051 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2052 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2053 		</set>
       
  2054 	</actionbody>
       
  2055 	<actionresult>
       
  2056 		<return>KErrNone</return>
       
  2057 	</actionresult>
       
  2058 </action>
       
  2059 
       
  2060 
       
  2061 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2062 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2063 //! @SYMREQ CIT_PREQ1054
       
  2064 //! @SYMTestPriority medium
       
  2065 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2066 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2067 <action>
       
  2068 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherRC2_CBC_40</actionname>
       
  2069 	<actiontype>Set</actiontype>
       
  2070 	<actionbody>
       
  2071 		<kdf>PKCS#12</kdf>
       
  2072 		<salt_len_bytes>20</salt_len_bytes>
       
  2073 		<iter_count>1024</iter_count>
       
  2074 		<cipher>ECipherRC2_CBC_40</cipher>
       
  2075 		<set>
       
  2076 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2077 			<input>B</input>
       
  2078 		</set>
       
  2079 	</actionbody>
       
  2080 	<actionresult>
       
  2081 		<return>KErrNone</return>
       
  2082 	</actionresult>
       
  2083 </action>
       
  2084 
       
  2085 
       
  2086 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2087 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2088 //! @SYMREQ CIT_PREQ1054
       
  2089 //! @SYMTestPriority medium
       
  2090 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2092 <action>
       
  2093 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherRC2_CBC_40</actionname>
       
  2094 	<actiontype>Set</actiontype>
       
  2095 	<actionbody>
       
  2096 		<kdf>PKCS#12</kdf>
       
  2097 		<salt_len_bytes>20</salt_len_bytes>
       
  2098 		<iter_count>1024</iter_count>
       
  2099 		<cipher>ECipherRC2_CBC_40</cipher>
       
  2100 		<set>
       
  2101 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2102 			<input>ZYXWUTSR</input>
       
  2103 		</set>
       
  2104 	</actionbody>
       
  2105 	<actionresult>
       
  2106 		<return>KErrNone</return>
       
  2107 	</actionresult>
       
  2108 </action>
       
  2109 
       
  2110 
       
  2111 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2112 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2113 //! @SYMREQ CIT_PREQ1054
       
  2114 //! @SYMTestPriority medium
       
  2115 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2116 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2117 <action>
       
  2118 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherRC2_CBC_40</actionname>
       
  2119 	<actiontype>Set</actiontype>
       
  2120 	<actionbody>
       
  2121 		<kdf>PKCS#12</kdf>
       
  2122 		<salt_len_bytes>20</salt_len_bytes>
       
  2123 		<iter_count>1024</iter_count>
       
  2124 		<cipher>ECipherRC2_CBC_40</cipher>
       
  2125 		<set>
       
  2126 			<passwd>m</passwd>
       
  2127 			<input>ZYXWUTSR</input>
       
  2128 		</set>
       
  2129 	</actionbody>
       
  2130 	<actionresult>
       
  2131 		<return>KErrNone</return>
       
  2132 	</actionresult>
       
  2133 </action>
       
  2134 
       
  2135 
       
  2136 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2137 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2138 //! @SYMREQ CIT_PREQ1054
       
  2139 //! @SYMTestPriority medium
       
  2140 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2141 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2142 <action>
       
  2143 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherRC2_CBC_40</actionname>
       
  2144 	<actiontype>Set</actiontype>
       
  2145 	<actionbody>
       
  2146 		<kdf>PKCS#12</kdf>
       
  2147 		<salt_len_bytes>20</salt_len_bytes>
       
  2148 		<iter_count>1024</iter_count>
       
  2149 		<cipher>ECipherRC2_CBC_40</cipher>
       
  2150 		<set>
       
  2151 			<passwd></passwd>
       
  2152 			<input>ZYXWUTSR</input>
       
  2153 		</set>
       
  2154 	</actionbody>
       
  2155 	<actionresult>
       
  2156 		<return>KErrNone</return>
       
  2157 	</actionresult>
       
  2158 </action>
       
  2159 
       
  2160 
       
  2161 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2162 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2163 //! @SYMREQ CIT_PREQ1054
       
  2164 //! @SYMTestPriority medium
       
  2165 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2166 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2167 <action>
       
  2168 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherRC2_CBC_40</actionname>
       
  2169 	<actiontype>Set</actiontype>
       
  2170 	<actionbody>
       
  2171 		<kdf>PKCS#12</kdf>
       
  2172 		<salt_len_bytes>20</salt_len_bytes>
       
  2173 		<iter_count>1024</iter_count>
       
  2174 		<cipher>ECipherRC2_CBC_40</cipher>
       
  2175 		<set>
       
  2176 			<passwd></passwd>
       
  2177 			<input></input>
       
  2178 		</set>
       
  2179 	</actionbody>
       
  2180 	<actionresult>
       
  2181 		<return>KErrNone</return>
       
  2182 	</actionresult>
       
  2183 </action>
       
  2184 
       
  2185 ///////////////////////////////////////////////////////////////////////////////////
       
  2186 ///////////////////////////////////////////////////////////////////////////////////
       
  2187 ///////////////////////////////////////////////////////////////////////////////////
       
  2188 
       
  2189 
       
  2190 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2191 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2192 //! @SYMREQ CIT_PREQ1054
       
  2193 //! @SYMTestPriority medium
       
  2194 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2195 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2196 <action>
       
  2197 	<actionname>Element test case 1, ECipher3DES_CBC</actionname>
       
  2198 	<actiontype>Element</actiontype>
       
  2199 	<actionbody>
       
  2200 		<kdf>PKCS#12</kdf>
       
  2201 		<salt_len_bytes>20</salt_len_bytes>
       
  2202 		<iter_count>1024</iter_count>
       
  2203 		<cipher>ECipher3DES_CBC</cipher>
       
  2204 		<element>
       
  2205 			<passwd>password</passwd>
       
  2206 			<input>This is what I want to encrypt</input>
       
  2207 		</element>
       
  2208 	</actionbody>
       
  2209 	<actionresult>
       
  2210 		<return>KErrNone</return>
       
  2211 	</actionresult>
       
  2212 </action>
       
  2213 
       
  2214 
       
  2215 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2216 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2217 //! @SYMREQ CIT_PREQ1054
       
  2218 //! @SYMTestPriority medium
       
  2219 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2220 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2221 <action>
       
  2222 	<actionname>Element test case 2, ECipher3DES_CBC</actionname>
       
  2223 	<actiontype>Element</actiontype>
       
  2224 	<actionbody>
       
  2225 		<kdf>PKCS#12</kdf>
       
  2226 		<salt_len_bytes>20</salt_len_bytes>
       
  2227 		<iter_count>1024</iter_count>
       
  2228 		<cipher>ECipher3DES_CBC</cipher>
       
  2229 		<element>
       
  2230 			<passwd>password</passwd>
       
  2231 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2232 		</element>
       
  2233 	</actionbody>
       
  2234 	<actionresult>
       
  2235 		<return>KErrNone</return>
       
  2236 	</actionresult>
       
  2237 </action>
       
  2238 
       
  2239 
       
  2240 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2241 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2242 //! @SYMREQ CIT_PREQ1054
       
  2243 //! @SYMTestPriority medium
       
  2244 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2245 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2246 <action>
       
  2247 	<actionname>Element test case 3, ECipher3DES_CBC</actionname>
       
  2248 	<actiontype>Element</actiontype>
       
  2249 	<actionbody>
       
  2250 		<kdf>PKCS#12</kdf>
       
  2251 		<salt_len_bytes>20</salt_len_bytes>
       
  2252 		<iter_count>1024</iter_count>
       
  2253 		<cipher>ECipher3DES_CBC</cipher>
       
  2254 		<element>
       
  2255 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2256 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2257 		</element>
       
  2258 	</actionbody>
       
  2259 	<actionresult>
       
  2260 		<return>KErrNone</return>
       
  2261 	</actionresult>
       
  2262 </action>
       
  2263 
       
  2264 
       
  2265 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2266 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2267 //! @SYMREQ CIT_PREQ1054
       
  2268 //! @SYMTestPriority medium
       
  2269 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2270 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2271 <action>
       
  2272 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipher3DES_CBC</actionname>
       
  2273 	<actiontype>Set</actiontype>
       
  2274 	<actionbody>
       
  2275 		<kdf>PKCS#12</kdf>
       
  2276 		<salt_len_bytes>20</salt_len_bytes>
       
  2277 		<iter_count>1024</iter_count>
       
  2278 		<cipher>ECipher3DES_CBC</cipher>
       
  2279 		<set>
       
  2280 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2281 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2282 		</set>
       
  2283 	</actionbody>
       
  2284 	<actionresult>
       
  2285 		<return>KErrNone</return>
       
  2286 	</actionresult>
       
  2287 </action>
       
  2288 
       
  2289 
       
  2290 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2291 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2292 //! @SYMREQ CIT_PREQ1054
       
  2293 //! @SYMTestPriority medium
       
  2294 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2295 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2296 <action>
       
  2297 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipher3DES_CBC</actionname>
       
  2298 	<actiontype>Set</actiontype>
       
  2299 	<actionbody>
       
  2300 		<kdf>PKCS#12</kdf>
       
  2301 		<salt_len_bytes>20</salt_len_bytes>
       
  2302 		<iter_count>1024</iter_count>
       
  2303 		<cipher>ECipher3DES_CBC</cipher>
       
  2304 		<set>
       
  2305 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2306 			<input>B</input>
       
  2307 		</set>
       
  2308 	</actionbody>
       
  2309 	<actionresult>
       
  2310 		<return>KErrNone</return>
       
  2311 	</actionresult>
       
  2312 </action>
       
  2313 
       
  2314 
       
  2315 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2316 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2317 //! @SYMREQ CIT_PREQ1054
       
  2318 //! @SYMTestPriority medium
       
  2319 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2320 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2321 <action>
       
  2322 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipher3DES_CBC</actionname>
       
  2323 	<actiontype>Set</actiontype>
       
  2324 	<actionbody>
       
  2325 		<kdf>PKCS#12</kdf>
       
  2326 		<salt_len_bytes>20</salt_len_bytes>
       
  2327 		<iter_count>1024</iter_count>
       
  2328 		<cipher>ECipher3DES_CBC</cipher>
       
  2329 		<set>
       
  2330 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2331 			<input>ZYXWUTSR</input>
       
  2332 		</set>
       
  2333 	</actionbody>
       
  2334 	<actionresult>
       
  2335 		<return>KErrNone</return>
       
  2336 	</actionresult>
       
  2337 </action>
       
  2338 
       
  2339 
       
  2340 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2341 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2342 //! @SYMREQ CIT_PREQ1054
       
  2343 //! @SYMTestPriority medium
       
  2344 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2345 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2346 <action>
       
  2347 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipher3DES_CBC</actionname>
       
  2348 	<actiontype>Set</actiontype>
       
  2349 	<actionbody>
       
  2350 		<kdf>PKCS#12</kdf>
       
  2351 		<salt_len_bytes>20</salt_len_bytes>
       
  2352 		<iter_count>1024</iter_count>
       
  2353 		<cipher>ECipher3DES_CBC</cipher>
       
  2354 		<set>
       
  2355 			<passwd>m</passwd>
       
  2356 			<input>ZYXWUTSR</input>
       
  2357 		</set>
       
  2358 	</actionbody>
       
  2359 	<actionresult>
       
  2360 		<return>KErrNone</return>
       
  2361 	</actionresult>
       
  2362 </action>
       
  2363 
       
  2364 
       
  2365 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2366 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2367 //! @SYMREQ CIT_PREQ1054
       
  2368 //! @SYMTestPriority medium
       
  2369 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2370 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2371 <action>
       
  2372 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipher3DES_CBC</actionname>
       
  2373 	<actiontype>Set</actiontype>
       
  2374 	<actionbody>
       
  2375 		<kdf>PKCS#12</kdf>
       
  2376 		<salt_len_bytes>20</salt_len_bytes>
       
  2377 		<iter_count>1024</iter_count>
       
  2378 		<cipher>ECipher3DES_CBC</cipher>
       
  2379 		<set>
       
  2380 			<passwd></passwd>
       
  2381 			<input>ZYXWUTSR</input>
       
  2382 		</set>
       
  2383 	</actionbody>
       
  2384 	<actionresult>
       
  2385 		<return>KErrNone</return>
       
  2386 	</actionresult>
       
  2387 </action>
       
  2388 
       
  2389 
       
  2390 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2391 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2392 //! @SYMREQ CIT_PREQ1054
       
  2393 //! @SYMTestPriority medium
       
  2394 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2395 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2396 <action>
       
  2397 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipher3DES_CBC</actionname>
       
  2398 	<actiontype>Set</actiontype>
       
  2399 	<actionbody>
       
  2400 		<kdf>PKCS#12</kdf>
       
  2401 		<salt_len_bytes>20</salt_len_bytes>
       
  2402 		<iter_count>1024</iter_count>
       
  2403 		<cipher>ECipher3DES_CBC</cipher>
       
  2404 		<set>
       
  2405 			<passwd></passwd>
       
  2406 			<input></input>
       
  2407 		</set>
       
  2408 	</actionbody>
       
  2409 	<actionresult>
       
  2410 		<return>KErrNone</return>
       
  2411 	</actionresult>
       
  2412 </action>
       
  2413 
       
  2414 ///////////////////////////////////////////////////////////////////////////////////
       
  2415 ///////////////////////////////////////////////////////////////////////////////////
       
  2416 ///////////////////////////////////////////////////////////////////////////////////
       
  2417 
       
  2418 
       
  2419 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2420 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2421 //! @SYMREQ CIT_PREQ1054
       
  2422 //! @SYMTestPriority medium
       
  2423 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2424 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2425 <action>
       
  2426 	<actionname>Element test case 1, ECipherAES_CBC_256</actionname>
       
  2427 	<actiontype>Element</actiontype>
       
  2428 	<actionbody>
       
  2429 		<kdf>PKCS#12</kdf>
       
  2430 		<salt_len_bytes>20</salt_len_bytes>
       
  2431 		<iter_count>1024</iter_count>
       
  2432 		<cipher>ECipherAES_CBC_256</cipher>
       
  2433 		<element>
       
  2434 			<passwd>password</passwd>
       
  2435 			<input>This is what I want to encrypt</input>
       
  2436 		</element>
       
  2437 	</actionbody>
       
  2438 	<actionresult>
       
  2439 		<return>KErrNone</return>
       
  2440 	</actionresult>
       
  2441 </action>
       
  2442 
       
  2443 
       
  2444 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2445 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2446 //! @SYMREQ CIT_PREQ1054
       
  2447 //! @SYMTestPriority medium
       
  2448 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2449 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2450 <action>
       
  2451 	<actionname>Element test case 2, ECipherAES_CBC_256</actionname>
       
  2452 	<actiontype>Element</actiontype>
       
  2453 	<actionbody>
       
  2454 		<kdf>PKCS#12</kdf>
       
  2455 		<salt_len_bytes>20</salt_len_bytes>
       
  2456 		<iter_count>1024</iter_count>
       
  2457 		<cipher>ECipherAES_CBC_256</cipher>
       
  2458 		<element>
       
  2459 			<passwd>password</passwd>
       
  2460 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2461 		</element>
       
  2462 	</actionbody>
       
  2463 	<actionresult>
       
  2464 		<return>KErrNone</return>
       
  2465 	</actionresult>
       
  2466 </action>
       
  2467 
       
  2468 
       
  2469 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2470 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2471 //! @SYMREQ CIT_PREQ1054
       
  2472 //! @SYMTestPriority medium
       
  2473 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2474 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2475 <action>
       
  2476 	<actionname>Element test case 3, ECipherAES_CBC_256</actionname>
       
  2477 	<actiontype>Element</actiontype>
       
  2478 	<actionbody>
       
  2479 		<kdf>PKCS#12</kdf>
       
  2480 		<salt_len_bytes>20</salt_len_bytes>
       
  2481 		<iter_count>1024</iter_count>
       
  2482 		<cipher>ECipherAES_CBC_256</cipher>
       
  2483 		<element>
       
  2484 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2485 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2486 		</element>
       
  2487 	</actionbody>
       
  2488 	<actionresult>
       
  2489 		<return>KErrNone</return>
       
  2490 	</actionresult>
       
  2491 </action>
       
  2492 
       
  2493 
       
  2494 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2495 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2496 //! @SYMREQ CIT_PREQ1054
       
  2497 //! @SYMTestPriority medium
       
  2498 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2499 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2500 <action>
       
  2501 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_256</actionname>
       
  2502 	<actiontype>Set</actiontype>
       
  2503 	<actionbody>
       
  2504 		<kdf>PKCS#12</kdf>
       
  2505 		<salt_len_bytes>20</salt_len_bytes>
       
  2506 		<iter_count>1024</iter_count>
       
  2507 		<cipher>ECipherAES_CBC_256</cipher>
       
  2508 		<set>
       
  2509 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2510 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2511 		</set>
       
  2512 	</actionbody>
       
  2513 	<actionresult>
       
  2514 		<return>KErrNone</return>
       
  2515 	</actionresult>
       
  2516 </action>
       
  2517 
       
  2518 
       
  2519 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2520 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2521 //! @SYMREQ CIT_PREQ1054
       
  2522 //! @SYMTestPriority medium
       
  2523 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2524 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2525 <action>
       
  2526 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_256</actionname>
       
  2527 	<actiontype>Set</actiontype>
       
  2528 	<actionbody>
       
  2529 		<kdf>PKCS#12</kdf>
       
  2530 		<salt_len_bytes>20</salt_len_bytes>
       
  2531 		<iter_count>1024</iter_count>
       
  2532 		<cipher>ECipherAES_CBC_256</cipher>
       
  2533 		<set>
       
  2534 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2535 			<input>B</input>
       
  2536 		</set>
       
  2537 	</actionbody>
       
  2538 	<actionresult>
       
  2539 		<return>KErrNone</return>
       
  2540 	</actionresult>
       
  2541 </action>
       
  2542 
       
  2543 
       
  2544 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2545 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2546 //! @SYMREQ CIT_PREQ1054
       
  2547 //! @SYMTestPriority medium
       
  2548 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2549 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2550 <action>
       
  2551 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_256</actionname>
       
  2552 	<actiontype>Set</actiontype>
       
  2553 	<actionbody>
       
  2554 		<kdf>PKCS#12</kdf>
       
  2555 		<salt_len_bytes>20</salt_len_bytes>
       
  2556 		<iter_count>1024</iter_count>
       
  2557 		<cipher>ECipherAES_CBC_256</cipher>
       
  2558 		<set>
       
  2559 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2560 			<input>ZYXWUTSR</input>
       
  2561 		</set>
       
  2562 	</actionbody>
       
  2563 	<actionresult>
       
  2564 		<return>KErrNone</return>
       
  2565 	</actionresult>
       
  2566 </action>
       
  2567 
       
  2568 
       
  2569 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2570 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2571 //! @SYMREQ CIT_PREQ1054
       
  2572 //! @SYMTestPriority medium
       
  2573 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2574 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2575 <action>
       
  2576 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_256</actionname>
       
  2577 	<actiontype>Set</actiontype>
       
  2578 	<actionbody>
       
  2579 		<kdf>PKCS#12</kdf>
       
  2580 		<salt_len_bytes>20</salt_len_bytes>
       
  2581 		<iter_count>1024</iter_count>
       
  2582 		<cipher>ECipherAES_CBC_256</cipher>
       
  2583 		<set>
       
  2584 			<passwd>m</passwd>
       
  2585 			<input>ZYXWUTSR</input>
       
  2586 		</set>
       
  2587 	</actionbody>
       
  2588 	<actionresult>
       
  2589 		<return>KErrNone</return>
       
  2590 	</actionresult>
       
  2591 </action>
       
  2592 
       
  2593 
       
  2594 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2595 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2596 //! @SYMREQ CIT_PREQ1054
       
  2597 //! @SYMTestPriority medium
       
  2598 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2599 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2600 <action>
       
  2601 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_256</actionname>
       
  2602 	<actiontype>Set</actiontype>
       
  2603 	<actionbody>
       
  2604 		<kdf>PKCS#12</kdf>
       
  2605 		<salt_len_bytes>20</salt_len_bytes>
       
  2606 		<iter_count>1024</iter_count>
       
  2607 		<cipher>ECipherAES_CBC_256</cipher>
       
  2608 		<set>
       
  2609 			<passwd></passwd>
       
  2610 			<input>ZYXWUTSR</input>
       
  2611 		</set>
       
  2612 	</actionbody>
       
  2613 	<actionresult>
       
  2614 		<return>KErrNone</return>
       
  2615 	</actionresult>
       
  2616 </action>
       
  2617 
       
  2618 
       
  2619 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2620 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2621 //! @SYMREQ CIT_PREQ1054
       
  2622 //! @SYMTestPriority medium
       
  2623 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2624 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2625 <action>
       
  2626 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_256</actionname>
       
  2627 	<actiontype>Set</actiontype>
       
  2628 	<actionbody>
       
  2629 		<kdf>PKCS#12</kdf>
       
  2630 		<salt_len_bytes>20</salt_len_bytes>
       
  2631 		<iter_count>1024</iter_count>
       
  2632 		<cipher>ECipherAES_CBC_256</cipher>
       
  2633 		<set>
       
  2634 			<passwd></passwd>
       
  2635 			<input></input>
       
  2636 		</set>
       
  2637 	</actionbody>
       
  2638 	<actionresult>
       
  2639 		<return>KErrNone</return>
       
  2640 	</actionresult>
       
  2641 </action>
       
  2642 
       
  2643 ///////////////////////////////////////////////////////////////////////////////////
       
  2644 ///////////////////////////////////////////////////////////////////////////////////
       
  2645 ///////////////////////////////////////////////////////////////////////////////////
       
  2646 
       
  2647 
       
  2648 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2649 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2650 //! @SYMREQ CIT_PREQ1054
       
  2651 //! @SYMTestPriority medium
       
  2652 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2653 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2654 <action>
       
  2655 	<actionname>Element test case 1, ECipherAES_CBC_192</actionname>
       
  2656 	<actiontype>Element</actiontype>
       
  2657 	<actionbody>
       
  2658 		<kdf>PKCS#12</kdf>
       
  2659 		<salt_len_bytes>20</salt_len_bytes>
       
  2660 		<iter_count>1024</iter_count>
       
  2661 		<cipher>ECipherAES_CBC_192</cipher>
       
  2662 		<element>
       
  2663 			<passwd>password</passwd>
       
  2664 			<input>This is what I want to encrypt</input>
       
  2665 		</element>
       
  2666 	</actionbody>
       
  2667 	<actionresult>
       
  2668 		<return>KErrNone</return>
       
  2669 	</actionresult>
       
  2670 </action>
       
  2671 
       
  2672 
       
  2673 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2674 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2675 //! @SYMREQ CIT_PREQ1054
       
  2676 //! @SYMTestPriority medium
       
  2677 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2678 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2679 <action>
       
  2680 	<actionname>Element test case 2, ECipherAES_CBC_192</actionname>
       
  2681 	<actiontype>Element</actiontype>
       
  2682 	<actionbody>
       
  2683 		<kdf>PKCS#12</kdf>
       
  2684 		<salt_len_bytes>20</salt_len_bytes>
       
  2685 		<iter_count>1024</iter_count>
       
  2686 		<cipher>ECipherAES_CBC_192</cipher>
       
  2687 		<element>
       
  2688 			<passwd>password</passwd>
       
  2689 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2690 		</element>
       
  2691 	</actionbody>
       
  2692 	<actionresult>
       
  2693 		<return>KErrNone</return>
       
  2694 	</actionresult>
       
  2695 </action>
       
  2696 
       
  2697 
       
  2698 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2699 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2700 //! @SYMREQ CIT_PREQ1054
       
  2701 //! @SYMTestPriority medium
       
  2702 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2703 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2704 <action>
       
  2705 	<actionname>Element test case 3, ECipherAES_CBC_192</actionname>
       
  2706 	<actiontype>Element</actiontype>
       
  2707 	<actionbody>
       
  2708 		<kdf>PKCS#12</kdf>
       
  2709 		<salt_len_bytes>20</salt_len_bytes>
       
  2710 		<iter_count>1024</iter_count>
       
  2711 		<cipher>ECipherAES_CBC_192</cipher>
       
  2712 		<element>
       
  2713 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2714 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2715 		</element>
       
  2716 	</actionbody>
       
  2717 	<actionresult>
       
  2718 		<return>KErrNone</return>
       
  2719 	</actionresult>
       
  2720 </action>
       
  2721 
       
  2722 
       
  2723 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2724 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2725 //! @SYMREQ CIT_PREQ1054
       
  2726 //! @SYMTestPriority medium
       
  2727 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2728 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2729 <action>
       
  2730 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_192</actionname>
       
  2731 	<actiontype>Set</actiontype>
       
  2732 	<actionbody>
       
  2733 		<kdf>PKCS#12</kdf>
       
  2734 		<salt_len_bytes>20</salt_len_bytes>
       
  2735 		<iter_count>1024</iter_count>
       
  2736 		<cipher>ECipherAES_CBC_192</cipher>
       
  2737 		<set>
       
  2738 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2739 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2740 		</set>
       
  2741 	</actionbody>
       
  2742 	<actionresult>
       
  2743 		<return>KErrNone</return>
       
  2744 	</actionresult>
       
  2745 </action>
       
  2746 
       
  2747 
       
  2748 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2749 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2750 //! @SYMREQ CIT_PREQ1054
       
  2751 //! @SYMTestPriority medium
       
  2752 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2753 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2754 <action>
       
  2755 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_192</actionname>
       
  2756 	<actiontype>Set</actiontype>
       
  2757 	<actionbody>
       
  2758 		<kdf>PKCS#12</kdf>
       
  2759 		<salt_len_bytes>20</salt_len_bytes>
       
  2760 		<iter_count>1024</iter_count>
       
  2761 		<cipher>ECipherAES_CBC_192</cipher>
       
  2762 		<set>
       
  2763 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2764 			<input>B</input>
       
  2765 		</set>
       
  2766 	</actionbody>
       
  2767 	<actionresult>
       
  2768 		<return>KErrNone</return>
       
  2769 	</actionresult>
       
  2770 </action>
       
  2771 
       
  2772 
       
  2773 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2774 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2775 //! @SYMREQ CIT_PREQ1054
       
  2776 //! @SYMTestPriority medium
       
  2777 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2778 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2779 <action>
       
  2780 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_192</actionname>
       
  2781 	<actiontype>Set</actiontype>
       
  2782 	<actionbody>
       
  2783 		<kdf>PKCS#12</kdf>
       
  2784 		<salt_len_bytes>20</salt_len_bytes>
       
  2785 		<iter_count>1024</iter_count>
       
  2786 		<cipher>ECipherAES_CBC_192</cipher>
       
  2787 		<set>
       
  2788 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2789 			<input>ZYXWUTSR</input>
       
  2790 		</set>
       
  2791 	</actionbody>
       
  2792 	<actionresult>
       
  2793 		<return>KErrNone</return>
       
  2794 	</actionresult>
       
  2795 </action>
       
  2796 
       
  2797 
       
  2798 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2799 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2800 //! @SYMREQ CIT_PREQ1054
       
  2801 //! @SYMTestPriority medium
       
  2802 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2803 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2804 <action>
       
  2805 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_192</actionname>
       
  2806 	<actiontype>Set</actiontype>
       
  2807 	<actionbody>
       
  2808 		<kdf>PKCS#12</kdf>
       
  2809 		<salt_len_bytes>20</salt_len_bytes>
       
  2810 		<iter_count>1024</iter_count>
       
  2811 		<cipher>ECipherAES_CBC_192</cipher>
       
  2812 		<set>
       
  2813 			<passwd>m</passwd>
       
  2814 			<input>ZYXWUTSR</input>
       
  2815 		</set>
       
  2816 	</actionbody>
       
  2817 	<actionresult>
       
  2818 		<return>KErrNone</return>
       
  2819 	</actionresult>
       
  2820 </action>
       
  2821 
       
  2822 
       
  2823 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2824 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2825 //! @SYMREQ CIT_PREQ1054
       
  2826 //! @SYMTestPriority medium
       
  2827 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2828 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2829 <action>
       
  2830 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_192</actionname>
       
  2831 	<actiontype>Set</actiontype>
       
  2832 	<actionbody>
       
  2833 		<kdf>PKCS#12</kdf>
       
  2834 		<salt_len_bytes>20</salt_len_bytes>
       
  2835 		<iter_count>1024</iter_count>
       
  2836 		<cipher>ECipherAES_CBC_192</cipher>
       
  2837 		<set>
       
  2838 			<passwd></passwd>
       
  2839 			<input>ZYXWUTSR</input>
       
  2840 		</set>
       
  2841 	</actionbody>
       
  2842 	<actionresult>
       
  2843 		<return>KErrNone</return>
       
  2844 	</actionresult>
       
  2845 </action>
       
  2846 
       
  2847 
       
  2848 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2849 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2850 //! @SYMREQ CIT_PREQ1054
       
  2851 //! @SYMTestPriority medium
       
  2852 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2853 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2854 <action>
       
  2855 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_192</actionname>
       
  2856 	<actiontype>Set</actiontype>
       
  2857 	<actionbody>
       
  2858 		<kdf>PKCS#12</kdf>
       
  2859 		<salt_len_bytes>20</salt_len_bytes>
       
  2860 		<iter_count>1024</iter_count>
       
  2861 		<cipher>ECipherAES_CBC_192</cipher>
       
  2862 		<set>
       
  2863 			<passwd></passwd>
       
  2864 			<input></input>
       
  2865 		</set>
       
  2866 	</actionbody>
       
  2867 	<actionresult>
       
  2868 		<return>KErrNone</return>
       
  2869 	</actionresult>
       
  2870 </action>
       
  2871 
       
  2872 ///////////////////////////////////////////////////////////////////////////////////
       
  2873 ///////////////////////////////////////////////////////////////////////////////////
       
  2874 ///////////////////////////////////////////////////////////////////////////////////
       
  2875 
       
  2876 
       
  2877 
       
  2878 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2879 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2880 //! @SYMREQ CIT_PREQ1054
       
  2881 //! @SYMTestPriority medium
       
  2882 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2883 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2884 <action>
       
  2885 	<actionname>Element test case 1, ECipherAES_CBC_128</actionname>
       
  2886 	<actiontype>Element</actiontype>
       
  2887 	<actionbody>
       
  2888 		<kdf>PKCS#12</kdf>
       
  2889 		<salt_len_bytes>20</salt_len_bytes>
       
  2890 		<iter_count>1024</iter_count>
       
  2891 		<cipher>ECipherAES_CBC_128</cipher>
       
  2892 		<element>
       
  2893 			<passwd>password</passwd>
       
  2894 			<input>This is what I want to encrypt</input>
       
  2895 		</element>
       
  2896 	</actionbody>
       
  2897 	<actionresult>
       
  2898 		<return>KErrNone</return>
       
  2899 	</actionresult>
       
  2900 </action>
       
  2901 
       
  2902 
       
  2903 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2904 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2905 //! @SYMREQ CIT_PREQ1054
       
  2906 //! @SYMTestPriority medium
       
  2907 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2908 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2909 <action>
       
  2910 	<actionname>Element test case 2, ECipherAES_CBC_128</actionname>
       
  2911 	<actiontype>Element</actiontype>
       
  2912 	<actionbody>
       
  2913 		<kdf>PKCS#12</kdf>
       
  2914 		<salt_len_bytes>20</salt_len_bytes>
       
  2915 		<iter_count>1024</iter_count>
       
  2916 		<cipher>ECipherAES_CBC_128</cipher>
       
  2917 		<element>
       
  2918 			<passwd>password</passwd>
       
  2919 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2920 		</element>
       
  2921 	</actionbody>
       
  2922 	<actionresult>
       
  2923 		<return>KErrNone</return>
       
  2924 	</actionresult>
       
  2925 </action>
       
  2926 
       
  2927 
       
  2928 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2929 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2930 //! @SYMREQ CIT_PREQ1054
       
  2931 //! @SYMTestPriority medium
       
  2932 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2933 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2934 <action>
       
  2935 	<actionname>Element test case 3, ECipherAES_CBC_128</actionname>
       
  2936 	<actiontype>Element</actiontype>
       
  2937 	<actionbody>
       
  2938 		<kdf>PKCS#12</kdf>
       
  2939 		<salt_len_bytes>20</salt_len_bytes>
       
  2940 		<iter_count>1024</iter_count>
       
  2941 		<cipher>ECipherAES_CBC_128</cipher>
       
  2942 		<element>
       
  2943 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2944 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2945 		</element>
       
  2946 	</actionbody>
       
  2947 	<actionresult>
       
  2948 		<return>KErrNone</return>
       
  2949 	</actionresult>
       
  2950 </action>
       
  2951 
       
  2952 
       
  2953 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2954 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2955 //! @SYMREQ CIT_PREQ1054
       
  2956 //! @SYMTestPriority medium
       
  2957 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2958 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2959 <action>
       
  2960 	<actionname>Test of Set encryption, password changing, exporting importing Test 1, ECipherAES_CBC_128</actionname>
       
  2961 	<actiontype>Set</actiontype>
       
  2962 	<actionbody>
       
  2963 		<kdf>PKCS#12</kdf>
       
  2964 		<salt_len_bytes>20</salt_len_bytes>
       
  2965 		<iter_count>1024</iter_count>
       
  2966 		<cipher>ECipherAES_CBC_128</cipher>
       
  2967 		<set>
       
  2968 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2969 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  2970 		</set>
       
  2971 	</actionbody>
       
  2972 	<actionresult>
       
  2973 		<return>KErrNone</return>
       
  2974 	</actionresult>
       
  2975 </action>
       
  2976 
       
  2977 
       
  2978 //! @SYMTestCaseID CIT_PREQ1054_02
       
  2979 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  2980 //! @SYMREQ CIT_PREQ1054
       
  2981 //! @SYMTestPriority medium
       
  2982 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  2983 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2984 <action>
       
  2985 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
       
  2986 	<actiontype>Set</actiontype>
       
  2987 	<actionbody>
       
  2988 		<kdf>PKCS#12</kdf>
       
  2989 		<salt_len_bytes>20</salt_len_bytes>
       
  2990 		<iter_count>1024</iter_count>
       
  2991 		<cipher>ECipherAES_CBC_128</cipher>
       
  2992 		<set>
       
  2993 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  2994 			<input>B</input>
       
  2995 		</set>
       
  2996 	</actionbody>
       
  2997 	<actionresult>
       
  2998 		<return>KErrNone</return>
       
  2999 	</actionresult>
       
  3000 </action>
       
  3001 
       
  3002 
       
  3003 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3004 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3005 //! @SYMREQ CIT_PREQ1054
       
  3006 //! @SYMTestPriority medium
       
  3007 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3008 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3009 <action>
       
  3010 	<actionname>Test of Set encryption, password changing, exporting importing Test 3 -- 8 byte input, ECipherAES_CBC_128</actionname>
       
  3011 	<actiontype>Set</actiontype>
       
  3012 	<actionbody>
       
  3013 		<kdf>PKCS#12</kdf>
       
  3014 		<salt_len_bytes>20</salt_len_bytes>
       
  3015 		<iter_count>1024</iter_count>
       
  3016 		<cipher>ECipherAES_CBC_128</cipher>
       
  3017 		<set>
       
  3018 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3019 			<input>ZYXWUTSR</input>
       
  3020 		</set>
       
  3021 	</actionbody>
       
  3022 	<actionresult>
       
  3023 		<return>KErrNone</return>
       
  3024 	</actionresult>
       
  3025 </action>
       
  3026 
       
  3027 
       
  3028 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3029 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3030 //! @SYMREQ CIT_PREQ1054
       
  3031 //! @SYMTestPriority medium
       
  3032 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3033 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3034 <action>
       
  3035 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 1 byte password, ECipherAES_CBC_128</actionname>
       
  3036 	<actiontype>Set</actiontype>
       
  3037 	<actionbody>
       
  3038 		<kdf>PKCS#12</kdf>
       
  3039 		<salt_len_bytes>20</salt_len_bytes>
       
  3040 		<iter_count>1024</iter_count>
       
  3041 		<cipher>ECipherAES_CBC_128</cipher>
       
  3042 		<set>
       
  3043 			<passwd>m</passwd>
       
  3044 			<input>ZYXWUTSR</input>
       
  3045 		</set>
       
  3046 	</actionbody>
       
  3047 	<actionresult>
       
  3048 		<return>KErrNone</return>
       
  3049 	</actionresult>
       
  3050 </action>
       
  3051 
       
  3052 
       
  3053 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3054 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3055 //! @SYMREQ CIT_PREQ1054
       
  3056 //! @SYMTestPriority medium
       
  3057 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3058 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3059 <action>
       
  3060 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password, ECipherAES_CBC_128</actionname>
       
  3061 	<actiontype>Set</actiontype>
       
  3062 	<actionbody>
       
  3063 		<kdf>PKCS#12</kdf>
       
  3064 		<salt_len_bytes>20</salt_len_bytes>
       
  3065 		<iter_count>1024</iter_count>
       
  3066 		<cipher>ECipherAES_CBC_128</cipher>
       
  3067 		<set>
       
  3068 			<passwd></passwd>
       
  3069 			<input>ZYXWUTSR</input>
       
  3070 		</set>
       
  3071 	</actionbody>
       
  3072 	<actionresult>
       
  3073 		<return>KErrNone</return>
       
  3074 	</actionresult>
       
  3075 </action>
       
  3076 
       
  3077 
       
  3078 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3079 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3080 //! @SYMREQ CIT_PREQ1054
       
  3081 //! @SYMTestPriority medium
       
  3082 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3083 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3084 <action>
       
  3085 	<actionname>Test of Set encryption, password changing, exporting importing Test 4 -- 0 byte password 0 byte input, ECipherAES_CBC_128</actionname>
       
  3086 	<actiontype>Set</actiontype>
       
  3087 	<actionbody>
       
  3088 		<kdf>PKCS#12</kdf>
       
  3089 		<salt_len_bytes>20</salt_len_bytes>
       
  3090 		<iter_count>1024</iter_count>
       
  3091 		<cipher>ECipherAES_CBC_128</cipher>
       
  3092 		<set>
       
  3093 			<passwd></passwd>
       
  3094 			<input></input>
       
  3095 		</set>
       
  3096 	</actionbody>
       
  3097 	<actionresult>
       
  3098 		<return>KErrNone</return>
       
  3099 	</actionresult>
       
  3100 </action>
       
  3101 ////////////////////////////////////////////////////////////////////
       
  3102 // PKCS12 tests using PKCS#12 PBE algorithm with PKCS#12 KDF function. 
       
  3103 //  ECipherRC2_CBC_128_16, ECipher3DES_CBC tests defined above.
       
  3104 //  "Set" tests are not supported for stream cipher ECipherARC4_40,ECipherARC4_128
       
  3105 <action>
       
  3106 	<actionname>Element test case 1, ECipherRC2_CBC_40_5</actionname>
       
  3107 	<actiontype>Element</actiontype>
       
  3108 	<actionbody>
       
  3109 		<kdf>PKCS#12</kdf>
       
  3110 		<salt_len_bytes>20</salt_len_bytes>
       
  3111 		<iter_count>1024</iter_count>
       
  3112 		<cipher>ECipherRC2_CBC_40_5</cipher>
       
  3113 		<element>
       
  3114 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3115 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  3116 		</element>
       
  3117 	</actionbody>
       
  3118 	<actionresult>
       
  3119 		<return>KErrNone</return>
       
  3120 	</actionresult>
       
  3121 </action>
       
  3122 
       
  3123 <action>
       
  3124 	<actionname>Element test case 2, ECipherARC4_128</actionname>
       
  3125 	<actiontype>Element</actiontype>
       
  3126 	<actionbody>
       
  3127 		<kdf>PKCS#12</kdf>
       
  3128 		<salt_len_bytes>20</salt_len_bytes>
       
  3129 		<iter_count>1024</iter_count>
       
  3130 		<cipher>ECipherARC4_128</cipher>
       
  3131 		<element>
       
  3132 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3133 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  3134 		</element>
       
  3135 	</actionbody>
       
  3136 	<actionresult>
       
  3137 		<return>KErrNone</return>
       
  3138 	</actionresult>
       
  3139 </action>
       
  3140 
       
  3141 <action>
       
  3142 	<actionname>Element test case 3, ECipherARC4_40</actionname>
       
  3143 	<actiontype>Element</actiontype>
       
  3144 	<actionbody>
       
  3145 		<kdf>PKCS#12</kdf>
       
  3146 		<salt_len_bytes>20</salt_len_bytes>
       
  3147 		<iter_count>1024</iter_count>
       
  3148 		<cipher>ECipherARC4_40</cipher>
       
  3149 		<element>
       
  3150 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3151 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  3152 		</element>
       
  3153 	</actionbody>
       
  3154 	<actionresult>
       
  3155 		<return>KErrNone</return>
       
  3156 	</actionresult>
       
  3157 </action>
       
  3158 
       
  3159 <action>
       
  3160 	<actionname>Element test case 4, ECipher2Key3DES_CBC</actionname>
       
  3161 	<actiontype>Element</actiontype>
       
  3162 	<actionbody>
       
  3163 		<kdf>PKCS#12</kdf>
       
  3164 		<salt_len_bytes>20</salt_len_bytes>
       
  3165 		<iter_count>1024</iter_count>
       
  3166 		<cipher>ECipher2Key3DES_CBC</cipher>
       
  3167 		<element>
       
  3168 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3169 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  3170 		</element>
       
  3171 	</actionbody>
       
  3172 	<actionresult>
       
  3173 		<return>KErrNone</return>
       
  3174 	</actionresult>
       
  3175 </action>
       
  3176 
       
  3177 <action>
       
  3178 	<actionname>Test of Set encryption, password changing, exporting importing Test 5, ECipherRC2_CBC_40_5</actionname>
       
  3179 	<actiontype>Set</actiontype>
       
  3180 	<actionbody>
       
  3181 		<kdf>PKCS#12</kdf>
       
  3182 		<salt_len_bytes>20</salt_len_bytes>
       
  3183 		<iter_count>1024</iter_count>
       
  3184 		<cipher>ECipherRC2_CBC_40_5</cipher>
       
  3185 		<set>
       
  3186 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3187 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  3188 		</set>
       
  3189 	</actionbody>
       
  3190 	<actionresult>
       
  3191 		<return>KErrNone</return>
       
  3192 	</actionresult>
       
  3193 </action>
       
  3194 <action>
       
  3195 	<actionname>Test of Set encryption, password changing, exporting importing Test 9, ECipher2Key3DES_CBC</actionname>
       
  3196 	<actiontype>Set</actiontype>
       
  3197 	<actionbody>
       
  3198 		<kdf>PKCS#12</kdf>
       
  3199 		<salt_len_bytes>20</salt_len_bytes>
       
  3200 		<iter_count>1024</iter_count>
       
  3201 		<cipher>ECipher2Key3DES_CBC</cipher>
       
  3202 		<set>
       
  3203 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3204 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  3205 		</set>
       
  3206 	</actionbody>
       
  3207 	<actionresult>
       
  3208 		<return>KErrNone</return>
       
  3209 	</actionresult>
       
  3210 </action>
       
  3211 /////////////////////////////////////////
       
  3212 
       
  3213 // Run selected PKCS#12 tests in OOM
       
  3214 
       
  3215 
       
  3216 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3217 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3218 //! @SYMREQ CIT_PREQ1054
       
  3219 //! @SYMTestPriority medium
       
  3220 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3221 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3222 <action>
       
  3223     <actionname>OOM start</actionname>
       
  3224     <actiontype>startmemfailure</actiontype>
       
  3225     <actionbody></actionbody>
       
  3226     <actionresult>
       
  3227         <return>KErrNone</return>
       
  3228     </actionresult>
       
  3229 </action>
       
  3230 
       
  3231 
       
  3232 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3233 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3234 //! @SYMREQ CIT_PREQ1054
       
  3235 //! @SYMTestPriority medium
       
  3236 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3237 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3238 <action>
       
  3239 	<actionname>Element test case 1, ECipherRC2_CBC_128_16</actionname>
       
  3240 	<actiontype>Element</actiontype>
       
  3241 	<actionbody>
       
  3242 		<kdf>PKCS#12</kdf>
       
  3243 		<salt_len_bytes>20</salt_len_bytes>
       
  3244 		<iter_count>1024</iter_count>
       
  3245 		<cipher>ECipherRC2_CBC_128_16</cipher>
       
  3246 		<element>
       
  3247 			<passwd>password</passwd>
       
  3248 			<input>This is what I want to encrypt</input>
       
  3249 		</element>
       
  3250 	</actionbody>
       
  3251 	<actionresult>
       
  3252 		<return>KErrNone</return>
       
  3253 	</actionresult>
       
  3254 </action>
       
  3255 
       
  3256 
       
  3257 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3258 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3259 //! @SYMREQ CIT_PREQ1054
       
  3260 //! @SYMTestPriority medium
       
  3261 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3262 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3263 <action>
       
  3264 	<actionname>Element test case 3, ECipherRC2_CBC_40_16</actionname>
       
  3265 	<actiontype>Element</actiontype>
       
  3266 	<actionbody>
       
  3267 		<kdf>PKCS#12</kdf>
       
  3268 		<salt_len_bytes>20</salt_len_bytes>
       
  3269 		<iter_count>1024</iter_count>
       
  3270 		<cipher>ECipherRC2_CBC_40_16</cipher>
       
  3271 		<element>
       
  3272 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3273 			<input>This is what I want to encrypt but this time I'm going to make it as long is as reasonable for me to type such that it is still rather long and can test some of those types of features of the password based encryption system.  That was becoming a run-on sentence... phew.  I wonder how much it will matter to the program if I just carry on typing random spurious thoughts like this.  The plan is that it won't make a single iota of difference.  But we'll see!</input>
       
  3274 		</element>
       
  3275 	</actionbody>
       
  3276 	<actionresult>
       
  3277 		<return>KErrNone</return>
       
  3278 	</actionresult>
       
  3279 </action>
       
  3280 
       
  3281 
       
  3282 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3283 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3284 //! @SYMREQ CIT_PREQ1054
       
  3285 //! @SYMTestPriority medium
       
  3286 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3287 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3288 <action>
       
  3289 	<actionname>Test of Set encryption, password changing, exporting importing Test 2 -- 1 byte input, ECipherAES_CBC_128</actionname>
       
  3290 	<actiontype>Set</actiontype>
       
  3291 	<actionbody>
       
  3292 		<kdf>PKCS#12</kdf>
       
  3293 		<salt_len_bytes>20</salt_len_bytes>
       
  3294 		<iter_count>1024</iter_count>
       
  3295 		<cipher>ECipherAES_CBC_128</cipher>
       
  3296 		<set>
       
  3297 			<passwd>a90lkjasjk3lk32kdf89</passwd>
       
  3298 			<input>B</input>
       
  3299 		</set>
       
  3300 	</actionbody>
       
  3301 	<actionresult>
       
  3302 		<return>KErrNone</return>
       
  3303 	</actionresult>
       
  3304 </action>
       
  3305 
       
  3306 
       
  3307 //! @SYMTestCaseID CIT_PREQ1054_02
       
  3308 //! @SYMTestCaseDesc Correctly encrypt and decrypt data using key generated with PKCS#12 KDF.
       
  3309 //! @SYMREQ CIT_PREQ1054
       
  3310 //! @SYMTestPriority medium
       
  3311 //! @SYMTestActions Encrypts are decrypts the specified data using the PKCS#12-generated key.
       
  3312 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3313 <action>
       
  3314 	<actionname>OOM end</actionname>
       
  3315 	<actiontype>stopmemfailure</actiontype>
       
  3316 	<actionbody></actionbody>
       
  3317 	<actionresult>
       
  3318 		<return>KErrNone</return>
       
  3319 	</actionresult>
       
  3320 </action>
       
  3321 
       
  3322 
       
  3323 <action>
       
  3324 	<actionname>Compatibility old PKCS#5</actionname>
       
  3325 	<actiontype>ExternPbeParams</actiontype>
       
  3326 	<actionbody>
       
  3327 		<orig-filename>c:\tpbe\pkcs5-orig.dat</orig-filename>
       
  3328 		<expected-cipher>2</expected-cipher>
       
  3329 		<expected-salt>53414c5434353637</expected-salt>
       
  3330 		<expected-iv>49563233343536373839616263646566</expected-iv>
       
  3331 		<expected-iter-count>1234</expected-iter-count>
       
  3332 		<expected-kdf>0</expected-kdf>
       
  3333 	</actionbody>
       
  3334 	<actionresult>
       
  3335 		<return>KErrNone</return>
       
  3336 	</actionresult>
       
  3337 </action>
       
  3338 
       
  3339 <action>
       
  3340 	<actionname>Data compatibility orig PKCS#12</actionname>
       
  3341 	<actiontype>ExternPbeParams</actiontype>
       
  3342 	<actionbody>
       
  3343 		<orig-filename>c:\tpbe\pkcs12-first.dat</orig-filename>
       
  3344 		<expected-cipher>2</expected-cipher>
       
  3345 		<expected-salt>53414c5434353637</expected-salt>
       
  3346 		<expected-iv>49563233343536373839616263646566</expected-iv>
       
  3347 		<expected-iter-count>1234</expected-iter-count>
       
  3348 		<expected-kdf>1</expected-kdf>
       
  3349 	</actionbody>
       
  3350 	<actionresult>
       
  3351 		<return>KErrNone</return>
       
  3352 	</actionresult>
       
  3353 </action>
       
  3354