crypto/weakcrypto/test/tpkcs5kdf/scripts/tpkcs12kdftests.txt
changeset 72 de46a57f75fb
equal deleted inserted replaced
65:970c0057d9bc 72:de46a57f75fb
       
     1 // Copyright (c) Symbian Software Ltd 2006 - 2007. All rights reserved.
       
     2 
       
     3 <action>
       
     4 	<actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
       
     5 	<actiontype>DeriveKey</actiontype>
       
     6 	<actionbody>
       
     7 		<derivekey>
       
     8 			<passwd>password</passwd>
       
     9 			<salt>1234567878563412</salt>
       
    10 			<iterations>5</iterations>
       
    11 			<key>D1DAA78615F287E6</key>
       
    12 		</derivekey>
       
    13 	</actionbody>
       
    14 	<actionresult>
       
    15 		<return>KErrNone</return>
       
    16 	</actionresult>
       
    17 </action>
       
    18 <action>
       
    19 	<actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
       
    20 	<actiontype>DeriveKey</actiontype>
       
    21 	<actionbody>
       
    22 		<derivekey>
       
    23 			<passwd>password</passwd>
       
    24 			<salt>1234567878563412</salt>
       
    25 			<iterations>100</iterations>
       
    26 			<key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
       
    27 		</derivekey>
       
    28 	</actionbody>
       
    29 	<actionresult>
       
    30 		<return>KErrNone</return>
       
    31 	</actionresult>
       
    32 </action>
       
    33 <action>
       
    34 	<actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
       
    35 	<actiontype>DeriveKey</actiontype>
       
    36 	<actionbody>
       
    37 		<derivekey>
       
    38 			<passwd>password</passwd>
       
    39 			<salt>1234567878563412</salt>
       
    40 			<iterations>1000</iterations>
       
    41 			<key>142F8FAFCE633CCD9265D90FC8FE4252</key>
       
    42 		</derivekey>
       
    43 	</actionbody>
       
    44 	<actionresult>
       
    45 		<return>KErrNone</return>
       
    46 	</actionresult>
       
    47 </action>
       
    48 <action>
       
    49 	<actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
       
    50 	<actiontype>DeriveKey</actiontype>
       
    51 	<actionbody>
       
    52 		<derivekey>
       
    53 			<passwd>password</passwd>
       
    54 			<salt>1234567878563412</salt>
       
    55 			<iterations>10000</iterations>
       
    56 			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
       
    57 		</derivekey>
       
    58 	</actionbody>
       
    59 	<actionresult>
       
    60 		<return>KErrNone</return>
       
    61 	</actionresult>
       
    62 </action>
       
    63 <action>
       
    64 	<actionname>PKCS5 Key Derivation Test 5 -- 16 byte key, really long password vector generated from openssl</actionname>
       
    65 	<actiontype>DeriveKey</actiontype>
       
    66 	<actionbody>
       
    67 		<derivekey>
       
    68 			<passwd>This is an example of a really long really long password, I'm attempting to see how long we can make it and still see if our code will work. This really shouldn't be a problem</passwd>
       
    69 			<salt>1234567878563412</salt>
       
    70 			<iterations>1000</iterations>
       
    71 			<key>A39EDFA35086746DE5B4792035D9A070</key>
       
    72 		</derivekey>
       
    73 	</actionbody>
       
    74 	<actionresult>
       
    75 		<return>KErrNone</return>
       
    76 	</actionresult>
       
    77 </action>
       
    78 <action>
       
    79 	<actionname>PKCS5 Key Derivation Test 6 -- 16 byte key, medium size password vector generated from openssl</actionname>
       
    80 	<actiontype>DeriveKey</actiontype>
       
    81 	<actionbody>
       
    82 		<derivekey>
       
    83 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
    84 			<salt>1234567878563412</salt>
       
    85 			<iterations>1000</iterations>
       
    86 			<key>5F9219EED8BD0BCF5B3440B062305E05</key>
       
    87 		</derivekey>
       
    88 	</actionbody>
       
    89 	<actionresult>
       
    90 		<return>KErrNone</return>
       
    91 	</actionresult>
       
    92 </action>
       
    93 <action>
       
    94 	<actionname>PKCS5 Key Derivation Test 7 -- 32 byte key, long salt, short password vector generated from openssl</actionname>
       
    95 	<actiontype>DeriveKey</actiontype>
       
    96 	<actionbody>
       
    97 		<derivekey>
       
    98 			<passwd>password</passwd>
       
    99 			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
       
   100 			<iterations>1000</iterations>
       
   101 			<key>5648F3832B18C6A85165B093627F2268CCE1E79DC2F85D3909C36356789B349D</key>
       
   102 		</derivekey>
       
   103 	</actionbody>
       
   104 	<actionresult>
       
   105 		<return>KErrNone</return>
       
   106 	</actionresult>
       
   107 </action>
       
   108 <action>
       
   109 	<actionname>PKCS5 Key Derivation Test 8 -- 32 byte key, long salt, long password vector generated from openssl</actionname>
       
   110 	<actiontype>DeriveKey</actiontype>
       
   111 	<actionbody>
       
   112 		<derivekey>
       
   113 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
   114 			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
       
   115 			<iterations>1000</iterations>
       
   116 			<key>9F14D62760272D4388FA70E31C2B7940A083F0190C244F25F293D98D58766016</key>
       
   117 		</derivekey>
       
   118 	</actionbody>
       
   119 	<actionresult>
       
   120 		<return>KErrNone</return>
       
   121 	</actionresult>
       
   122 </action>
       
   123 <action>
       
   124 	<actionname>PKCS5 Key Derivation Test 9 -- 16 byte key, really long password vector generated from openssl</actionname>
       
   125 	<actiontype>DeriveKey</actiontype>
       
   126 	<actionbody>
       
   127 		<derivekey>
       
   128 			<passwd>Thisisanexampleofareallylongreallylongpassword,I'mattemptingtoseehowlongwecanmakeitandstillseeifourcodewillwork.Thisreallyshouldn'tbeaproblem</passwd>
       
   129 			<salt>1234567878563412</salt>
       
   130 			<iterations>1000</iterations>
       
   131 			<key>529C96D62F54418DD6AD33724F3014D6</key>
       
   132 		</derivekey>
       
   133 	</actionbody>
       
   134 	<actionresult>
       
   135 		<return>KErrNone</return>
       
   136 	</actionresult>
       
   137 </action>
       
   138 <action>
       
   139 	<actionname>PKCS5 Key Derivation Test 10 -- 16 byte key, really long password vector generated from openssl</actionname>
       
   140 	<actiontype>DeriveKey</actiontype>
       
   141 	<actionbody>
       
   142 		<derivekey>
       
   143 			<passwd>ThisisanexampleofareallylongreallylongpasswordImattemptingtoseehowlongwecanmakeitandstillseeifourcodewillworkThisreallyshouldntbeaproblem</passwd>
       
   144 			<salt>1234567878563412</salt>
       
   145 			<iterations>1000</iterations>
       
   146 			<key>E493D7C57BD77047C9D709DF99CBD3C7</key>
       
   147 		</derivekey>
       
   148 	</actionbody>
       
   149 	<actionresult>
       
   150 		<return>KErrNone</return>
       
   151 	</actionresult>
       
   152 </action>
       
   153 <action>
       
   154 	<actionname>PKCS5 Key Derivation Test 11 -- 16 byte key, really long password vector generated from openssl</actionname>
       
   155 	<actiontype>DeriveKey</actiontype>
       
   156 	<actionbody>
       
   157 		<derivekey>
       
   158 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
   159 			<salt>1234567878563412</salt>
       
   160 			<iterations>1000</iterations>
       
   161 			<key>EBD56BEE980D41A38AFA53642AAE4B25</key>
       
   162 		</derivekey>
       
   163 	</actionbody>
       
   164 	<actionresult>
       
   165 		<return>KErrNone</return>
       
   166 	</actionresult>
       
   167 </action>
       
   168 <action>
       
   169 	<actionname>PKCS5 Key Derivation Test 12 -- 32 byte key, really long password vector generated from openssl</actionname>
       
   170 	<actiontype>DeriveKey</actiontype>
       
   171 	<actionbody>
       
   172 		<derivekey>
       
   173 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
   174 			<salt>1234567878563412</salt>
       
   175 			<iterations>1000</iterations>
       
   176 			<key>EBD56BEE980D41A38AFA53642AAE4B251FF9C2A1503B2EF65F28E59DEF906A60</key>
       
   177 		</derivekey>
       
   178 	</actionbody>
       
   179 	<actionresult>
       
   180 		<return>KErrNone</return>
       
   181 	</actionresult>
       
   182 </action>
       
   183 <action>
       
   184 	<actionname>PKCS5 Key Derivation Test 13 -- 32 byte key, long password vector generated from openssl</actionname>
       
   185 	<actiontype>DeriveKey</actiontype>
       
   186 	<actionbody>
       
   187 		<derivekey>
       
   188 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
   189 			<salt>1234567878563412</salt>
       
   190 			<iterations>1000</iterations>
       
   191 			<key>1FFB655FEEC4202B0466BF24AA9800D0A96BFA7F904D655253CE2E32B0B7B795</key>
       
   192 		</derivekey>
       
   193 	</actionbody>
       
   194 	<actionresult>
       
   195 		<return>KErrNone</return>
       
   196 	</actionresult>
       
   197 </action>
       
   198 <action>
       
   199 	<actionname>PKCS5 Key Derivation Test 14 -- 32 byte key, long password vector generated from openssl</actionname>
       
   200 	<actiontype>DeriveKey</actiontype>
       
   201 	<actionbody>
       
   202 		<derivekey>
       
   203 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
   204 			<salt>1234567878563412</salt>
       
   205 			<iterations>1000</iterations>
       
   206 			<key>A544F0E2F88507E44F92CA2DCAC8B67C0E0D780182CF7DDC18AB1CA9BB3C2904</key>
       
   207 		</derivekey>
       
   208 	</actionbody>
       
   209 	<actionresult>
       
   210 		<return>KErrNone</return>
       
   211 	</actionresult>
       
   212 </action>
       
   213 <action>
       
   214 	<actionname>PKCS5 Key Derivation Test 15 -- 32 byte key, medium length password vector generated from openssl</actionname>
       
   215 	<actiontype>DeriveKey</actiontype>
       
   216 	<actionbody>
       
   217 		<derivekey>
       
   218 			<passwd>passwordpasswordpasswordpasswordpasswordpassword</passwd>
       
   219 			<salt>1234567878563412</salt>
       
   220 			<iterations>1000</iterations>
       
   221 			<key>F1DC1A4224F0C9A4655FFDB7D5BE75060BFFD0B682293A5D2E61BD5A773B81BC</key>
       
   222 		</derivekey>
       
   223 	</actionbody>
       
   224 	<actionresult>
       
   225 		<return>KErrNone</return>
       
   226 	</actionresult>
       
   227 </action>
       
   228 <action>
       
   229 	<actionname>PKCS5 Key Derivation Test 16 -- 32 byte key, long password vector generated from openssl</actionname>
       
   230 	<actiontype>DeriveKey</actiontype>
       
   231 	<actionbody>
       
   232 		<derivekey>
       
   233 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
   234 			<salt>1234567878563412</salt>
       
   235 			<iterations>1000</iterations>
       
   236 			<key>798B6F4DA56ECDA25C82A63F3577C3FF97A3A2A92BE3DD810C47704916890615</key>
       
   237 		</derivekey>
       
   238 	</actionbody>
       
   239 	<actionresult>
       
   240 		<return>KErrNone</return>
       
   241 	</actionresult>
       
   242 </action>
       
   243 <action>
       
   244 	<actionname>PKCS5 Key Derivation Test 17 -- 32 byte key, long password vector generated from openssl</actionname>
       
   245 	<actiontype>DeriveKey</actiontype>
       
   246 	<actionbody>
       
   247 		<derivekey>
       
   248 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
   249 			<salt>1234567878563412</salt>
       
   250 			<iterations>1000</iterations>
       
   251 			<key>5F9219EED8BD0BCF5B3440B062305E052CE70AEBC9A43CE9F4F39E3D0E56603D</key>
       
   252 		</derivekey>
       
   253 	</actionbody>
       
   254 	<actionresult>
       
   255 		<return>KErrNone</return>
       
   256 	</actionresult>
       
   257 </action>
       
   258 <action>
       
   259 	<actionname>PKCS5 Key Derivation Test 18 -- 32 byte key, long password vector generated from openssl</actionname>
       
   260 	<actiontype>DeriveKey</actiontype>
       
   261 	<actionbody>
       
   262 		<derivekey>
       
   263 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordpassword</passwd>
       
   264 			<salt>1234567878563412</salt>
       
   265 			<iterations>1000</iterations>
       
   266 			<key>421B82FF5825F9BE0E580C4D07BFF0CF54FFFD1BAD7763BF483A8291359F60E6</key>
       
   267 		</derivekey>
       
   268 	</actionbody>
       
   269 	<actionresult>
       
   270 		<return>KErrNone</return>
       
   271 	</actionresult>
       
   272 </action>
       
   273 <action>
       
   274 	<actionname>PKCS5 Key Derivation Test 19 -- 32 byte key, 65 byte password to test the fix in the CHMAC::Init code vector generated from openssl</actionname>
       
   275 	<actiontype>DeriveKey</actiontype>
       
   276 	<actionbody>
       
   277 		<derivekey>
       
   278 			<passwd>passwordpasswordpasswordpasswordpasswordpasswordpasswordpasswordp</passwd>
       
   279 			<salt>1234567878563412</salt>
       
   280 			<iterations>1000</iterations>
       
   281 			<key>5D0AAB5A6A7BCD6F5376DF142E7FEAC98728F4F1322091138300A95DB5EBDE72</key>
       
   282 		</derivekey>
       
   283 	</actionbody>
       
   284 	<actionresult>
       
   285 		<return>KErrNone</return>
       
   286 	</actionresult>
       
   287 </action>
       
   288 <action>
       
   289 	<actionname>PKCS5 Key Derivation Test 20 -- 32 byte key, password with spaces vector generated from openssl</actionname>
       
   290 	<actiontype>DeriveKey</actiontype>
       
   291 	<actionbody>
       
   292 		<derivekey>
       
   293 			<passwd>password password password password password password password passwordp</passwd>
       
   294 			<salt>1234567878563412</salt>
       
   295 			<iterations>1000</iterations>
       
   296 			<key>EE99202289798A02DC6EAEB81A501C43AE3F8513B8F9ECC62FFBF3D0F70EF444</key>
       
   297 		</derivekey>
       
   298 	</actionbody>
       
   299 	<actionresult>
       
   300 		<return>KErrNone</return>
       
   301 	</actionresult>
       
   302 </action>
       
   303 <action>
       
   304 	<actionname>PKCS5 Key Derivation Test 21 -- 1 byte key vector generated from openssl</actionname>
       
   305 	<actiontype>DeriveKey</actiontype>
       
   306 	<actionbody>
       
   307 		<derivekey>
       
   308 			<passwd>password</passwd>
       
   309 			<salt>1234567878563412</salt>
       
   310 			<iterations>10000</iterations>
       
   311 			<key>66</key>
       
   312 		</derivekey>
       
   313 	</actionbody>
       
   314 	<actionresult>
       
   315 		<return>KErrNone</return>
       
   316 	</actionresult>
       
   317 </action>
       
   318 <action>
       
   319 	<actionname>PKCS5 Key Derivation Test 22 -- 128 byte key vector generated from openssl</actionname>
       
   320 	<actiontype>DeriveKey</actiontype>
       
   321 	<actionbody>
       
   322 		<derivekey>
       
   323 			<passwd>password</passwd>
       
   324 			<salt>1234567878563412</salt>
       
   325 			<iterations>10000</iterations>
       
   326 			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584E6FCB5C7636C3A04DA7F38778BE00C842A5A202578408C27FA08A3A7AACDF7A7B3F9763A33DDDCD09B3E07FA95106B07892F6981AA450447E106BCA8252B1532</key>
       
   327 		</derivekey>
       
   328 	</actionbody>
       
   329 	<actionresult>
       
   330 		<return>KErrNone</return>
       
   331 	</actionresult>
       
   332 </action>
       
   333 <action>
       
   334 	<actionname>PKCS5 Key Derivation Test 23 -- 160 (multiple of hash size) byte key vector generated from openssl</actionname>
       
   335 	<actiontype>DeriveKey</actiontype>
       
   336 	<actionbody>
       
   337 		<derivekey>
       
   338 			<passwd>alkiasdk29s.382{</passwd>
       
   339 			<salt>1234567878563412</salt>
       
   340 			<iterations>30000</iterations>
       
   341 			<key>62E18995350965CF1E02F111ADBEE270FBBAE6A2D8C6B94D24F1E4E41B04FE40C1C7CE7E768092362A75F220601AAF3FBBE339F33D97CA0443D8DD795B88BF97F9A41561A80D20659486459995CA559D5C37792C608CF279E880142319D333D17C62C35C65E9D2A50E0F4010E2D475ECB179A41366D62617BB48B13FA3A98E3FA0F76236442E324B39EDD1B9AB253A1D6A6A6462E3330B548BC4DAE4CD060FC6</key>
       
   342 		</derivekey>
       
   343 	</actionbody>
       
   344 	<actionresult>
       
   345 		<return>KErrNone</return>
       
   346 	</actionresult>
       
   347 </action>
       
   348 <action>
       
   349 	<actionname>PKCS5 Key Derivation Test 24 -- 8 byte key vector generated from openssl</actionname>
       
   350 	<actiontype>DeriveKey</actiontype>
       
   351 	<actionbody>
       
   352 		<derivekey>
       
   353 			<passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
       
   354 			<salt>1234567878563412</salt>
       
   355 			<iterations>1000</iterations>
       
   356 			<key>F104F4B53A4A160F</key>
       
   357 		</derivekey>
       
   358 	</actionbody>
       
   359 	<actionresult>
       
   360 		<return>KErrNone</return>
       
   361 	</actionresult>
       
   362 </action>
       
   363 <action>
       
   364 	<actionname>PKCS5 Key Derivation Test 25 -- 256 byte key vector generated from openssl</actionname>
       
   365 	<actiontype>DeriveKey</actiontype>
       
   366 	<actionbody>
       
   367 		<derivekey>
       
   368 			<passwd>`1234567890-=¬!"£$%^&*()_+qwertyuiop[]asdfghjkl;'#\zxcvbnm,./QWERTYUIOP{}ASDFGHJKL:@~|ZXCVBNM<>?</passwd>
       
   369 			<salt>1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890</salt>
       
   370 			<iterations>10000</iterations>
       
   371 			<key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key>
       
   372 		</derivekey>
       
   373 	</actionbody>
       
   374 	<actionresult>
       
   375 		<return>KErrNone</return>
       
   376 	</actionresult>
       
   377 </action>
       
   378 // Out of Memory tests follow
       
   379 <action>
       
   380     <actionname>OOM Start</actionname>
       
   381     <actiontype>startmemfailure</actiontype>
       
   382     <actionbody></actionbody>
       
   383     <actionresult>
       
   384         <return>KErrNone</return>
       
   385     </actionresult>
       
   386 </action>
       
   387 <action>
       
   388 	<actionname>PKCS5 Key Derivation Test 1 -- vector from peter gutmann</actionname>
       
   389 	<actiontype>DeriveKey</actiontype>
       
   390 	<actionbody>
       
   391 		<derivekey>
       
   392 			<passwd>password</passwd>
       
   393 			<salt>1234567878563412</salt>
       
   394 			<iterations>5</iterations>
       
   395 			<key>D1DAA78615F287E6</key>
       
   396 		</derivekey>
       
   397 	</actionbody>
       
   398 	<actionresult>
       
   399 		<return>KErrNone</return>
       
   400 	</actionresult>
       
   401 </action>
       
   402 <action>
       
   403 	<actionname>PKCS5 Key Derivation Test 2 -- 100 iterations vector from generated openssl</actionname>
       
   404 	<actiontype>DeriveKey</actiontype>
       
   405 	<actionbody>
       
   406 		<derivekey>
       
   407 			<passwd>password</passwd>
       
   408 			<salt>1234567878563412</salt>
       
   409 			<iterations>100</iterations>
       
   410 			<key>68551A5F09AC24F41152059F3A0A2EE8EE6048C9D600BE023C2D85B4BE27BAE6</key>
       
   411 		</derivekey>
       
   412 	</actionbody>
       
   413 	<actionresult>
       
   414 		<return>KErrNone</return>
       
   415 	</actionresult>
       
   416 </action>
       
   417 <action>
       
   418 	<actionname>PKCS5 Key Derivation Test 3 -- 1000 iterations 16 byte key, vector generated from openssl</actionname>
       
   419 	<actiontype>DeriveKey</actiontype>
       
   420 	<actionbody>
       
   421 		<derivekey>
       
   422 			<passwd>password</passwd>
       
   423 			<salt>1234567878563412</salt>
       
   424 			<iterations>1000</iterations>
       
   425 			<key>142F8FAFCE633CCD9265D90FC8FE4252</key>
       
   426 		</derivekey>
       
   427 	</actionbody>
       
   428 	<actionresult>
       
   429 		<return>KErrNone</return>
       
   430 	</actionresult>
       
   431 </action>
       
   432 <action>
       
   433 	<actionname>PKCS5 Key Derivation Test 4 -- 10000 iteration 64 byte key -- vector from generated openssl</actionname>
       
   434 	<actiontype>DeriveKey</actiontype>
       
   435 	<actionbody>
       
   436 		<derivekey>
       
   437 			<passwd>password</passwd>
       
   438 			<salt>1234567878563412</salt>
       
   439 			<iterations>10000</iterations>
       
   440 			<key>6628B0927CCC52BF3E78EEAB8CC3074E5159878E7BD21717653F3F7A9BD136CFF4BD0327399AEFF176AD45A71B5BE3985B7EEC5008CED8484B69726B2A813584</key>
       
   441 		</derivekey>
       
   442 	</actionbody>
       
   443 	<actionresult>
       
   444 		<return>KErrNone</return>
       
   445 	</actionresult>
       
   446 </action>
       
   447 <action>
       
   448 	<actionname>PKCS5 Key Derivation Test 5 -- leave from performAction other than KErrNoMemory</actionname>
       
   449 	<actiontype>DeriveKey</actiontype>
       
   450 	<actionbody>
       
   451 		<derivekey>
       
   452 			<passwd>password</passwd>
       
   453 			<salt>1234567878563412</salt>
       
   454 			<iterations>10000</iterations>
       
   455 			<key>66</key>
       
   456 			<leaveinperformaction>1</leaveinperformaction>
       
   457 		</derivekey>
       
   458 		<knowndefect>ETrue</knowndefect>
       
   459 	</actionbody>
       
   460 	<actionresult>
       
   461 		<return>KErrNone</return>
       
   462 	</actionresult>
       
   463 </action>
       
   464 <action>
       
   465     <actionname>OOM End</actionname>
       
   466     <actiontype>stopmemfailure</actiontype>
       
   467     <actionbody></actionbody>
       
   468     <actionresult>
       
   469         <return>KErrNone</return>
       
   470     </actionresult>
       
   471 </action>
       
   472 //End of out of memory tests
       
   473 
       
   474 // =====================================================================
       
   475 // PKCS#12 tests
       
   476 
       
   477 <action>
       
   478     <actionname>OOM Start</actionname>
       
   479     <actiontype>startmemfailure</actiontype>
       
   480     <actionbody></actionbody>
       
   481     <actionresult>
       
   482         <return>KErrNone</return>
       
   483     </actionresult>
       
   484 </action>
       
   485 
       
   486 //! @SYMTestCaseID CIT_PREQ1054_01
       
   487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   488 //! @SYMREQ CIT_PREQ1054
       
   489 //! @SYMTestPriority medium
       
   490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   492 <action>
       
   493 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   494 	<actiontype>DeriveKey</actiontype>
       
   495 	<actionbody>
       
   496 		<derivekey>
       
   497 			<kdf>pkcs#12</kdf>
       
   498 			<passwd>0000</passwd>
       
   499 			<salt>53414C54</salt>
       
   500 			<iterations>1</iterations>
       
   501 			<key>3037AFC8EA</key>
       
   502 		</derivekey>
       
   503 	</actionbody>
       
   504 </action>
       
   505 
       
   506 //! @SYMTestCaseID CIT_PREQ1054_01
       
   507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   508 //! @SYMREQ CIT_PREQ1054
       
   509 //! @SYMTestPriority medium
       
   510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   512 <action>
       
   513 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   514 	<actiontype>DeriveKey</actiontype>
       
   515 	<actionbody>
       
   516 		<derivekey>
       
   517 			<kdf>pkcs#12</kdf>
       
   518 			<passwd>0001</passwd>
       
   519 			<salt>53414C54</salt>
       
   520 			<iterations>1</iterations>
       
   521 			<key>37F44080CB</key>
       
   522 		</derivekey>
       
   523 	</actionbody>
       
   524 </action>
       
   525 
       
   526 //! @SYMTestCaseID CIT_PREQ1054_01
       
   527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   528 //! @SYMREQ CIT_PREQ1054
       
   529 //! @SYMTestPriority medium
       
   530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   532 <action>
       
   533 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   534 	<actiontype>DeriveKey</actiontype>
       
   535 	<actionbody>
       
   536 		<derivekey>
       
   537 			<kdf>pkcs#12</kdf>
       
   538 			<passwd>PSWD</passwd>
       
   539 			<salt>53414C54</salt>
       
   540 			<iterations>1</iterations>
       
   541 			<key>8A18939ACF</key>
       
   542 		</derivekey>
       
   543 	</actionbody>
       
   544 </action>
       
   545 
       
   546 //! @SYMTestCaseID CIT_PREQ1054_01
       
   547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   548 //! @SYMREQ CIT_PREQ1054
       
   549 //! @SYMTestPriority medium
       
   550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   552 <action>
       
   553 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   554 	<actiontype>DeriveKey</actiontype>
       
   555 	<actionbody>
       
   556 		<derivekey>
       
   557 			<kdf>pkcs#12</kdf>
       
   558 			<passwd>password</passwd>
       
   559 			<salt>53414C54</salt>
       
   560 			<iterations>1</iterations>
       
   561 			<key>AFF6C5EDE0</key>
       
   562 		</derivekey>
       
   563 	</actionbody>
       
   564 </action>
       
   565 
       
   566 //! @SYMTestCaseID CIT_PREQ1054_01
       
   567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   568 //! @SYMREQ CIT_PREQ1054
       
   569 //! @SYMTestPriority medium
       
   570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   572 <action>
       
   573 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   574 	<actiontype>DeriveKey</actiontype>
       
   575 	<actionbody>
       
   576 		<derivekey>
       
   577 			<kdf>pkcs#12</kdf>
       
   578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
   579 			<salt>53414C54</salt>
       
   580 			<iterations>1</iterations>
       
   581 			<key>2ED53BB2CE</key>
       
   582 		</derivekey>
       
   583 	</actionbody>
       
   584 </action>
       
   585 
       
   586 //! @SYMTestCaseID CIT_PREQ1054_01
       
   587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   588 //! @SYMREQ CIT_PREQ1054
       
   589 //! @SYMTestPriority medium
       
   590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   592 <action>
       
   593 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   594 	<actiontype>DeriveKey</actiontype>
       
   595 	<actionbody>
       
   596 		<derivekey>
       
   597 			<kdf>pkcs#12</kdf>
       
   598 			<passwd>0000</passwd>
       
   599 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   600 			<iterations>1</iterations>
       
   601 			<key>49CABE7B67</key>
       
   602 		</derivekey>
       
   603 	</actionbody>
       
   604 </action>
       
   605 
       
   606 //! @SYMTestCaseID CIT_PREQ1054_01
       
   607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   608 //! @SYMREQ CIT_PREQ1054
       
   609 //! @SYMTestPriority medium
       
   610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   612 <action>
       
   613 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   614 	<actiontype>DeriveKey</actiontype>
       
   615 	<actionbody>
       
   616 		<derivekey>
       
   617 			<kdf>pkcs#12</kdf>
       
   618 			<passwd>0001</passwd>
       
   619 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   620 			<iterations>1</iterations>
       
   621 			<key>F994B990D3</key>
       
   622 		</derivekey>
       
   623 	</actionbody>
       
   624 </action>
       
   625 
       
   626 //! @SYMTestCaseID CIT_PREQ1054_01
       
   627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   628 //! @SYMREQ CIT_PREQ1054
       
   629 //! @SYMTestPriority medium
       
   630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   632 <action>
       
   633 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   634 	<actiontype>DeriveKey</actiontype>
       
   635 	<actionbody>
       
   636 		<derivekey>
       
   637 			<kdf>pkcs#12</kdf>
       
   638 			<passwd>PSWD</passwd>
       
   639 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   640 			<iterations>1</iterations>
       
   641 			<key>1AFAAD7E51</key>
       
   642 		</derivekey>
       
   643 	</actionbody>
       
   644 </action>
       
   645 
       
   646 //! @SYMTestCaseID CIT_PREQ1054_01
       
   647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   648 //! @SYMREQ CIT_PREQ1054
       
   649 //! @SYMTestPriority medium
       
   650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   652 <action>
       
   653 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   654 	<actiontype>DeriveKey</actiontype>
       
   655 	<actionbody>
       
   656 		<derivekey>
       
   657 			<kdf>pkcs#12</kdf>
       
   658 			<passwd>password</passwd>
       
   659 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   660 			<iterations>1</iterations>
       
   661 			<key>878C91098D</key>
       
   662 		</derivekey>
       
   663 	</actionbody>
       
   664 </action>
       
   665 
       
   666 //! @SYMTestCaseID CIT_PREQ1054_01
       
   667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   668 //! @SYMREQ CIT_PREQ1054
       
   669 //! @SYMTestPriority medium
       
   670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   672 <action>
       
   673 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   674 	<actiontype>DeriveKey</actiontype>
       
   675 	<actionbody>
       
   676 		<derivekey>
       
   677 			<kdf>pkcs#12</kdf>
       
   678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
   679 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   680 			<iterations>1</iterations>
       
   681 			<key>0DE3F08CAF</key>
       
   682 		</derivekey>
       
   683 	</actionbody>
       
   684 </action>
       
   685 
       
   686 //! @SYMTestCaseID CIT_PREQ1054_01
       
   687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   688 //! @SYMREQ CIT_PREQ1054
       
   689 //! @SYMTestPriority medium
       
   690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   692 <action>
       
   693 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
   694 	<actiontype>DeriveKey</actiontype>
       
   695 	<actionbody>
       
   696 		<derivekey>
       
   697 			<kdf>pkcs#12</kdf>
       
   698 			<passwd>0000</passwd>
       
   699 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
   700 			<iterations>1</iterations>
       
   701 			<key>90253A49C0</key>
       
   702 		</derivekey>
       
   703 	</actionbody>
       
   704 </action>
       
   705 
       
   706 //! @SYMTestCaseID CIT_PREQ1054_01
       
   707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   708 //! @SYMREQ CIT_PREQ1054
       
   709 //! @SYMTestPriority medium
       
   710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   712 <action>
       
   713 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
   714 	<actiontype>DeriveKey</actiontype>
       
   715 	<actionbody>
       
   716 		<derivekey>
       
   717 			<kdf>pkcs#12</kdf>
       
   718 			<passwd>0001</passwd>
       
   719 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
   720 			<iterations>1</iterations>
       
   721 			<key>40BE97AB93</key>
       
   722 		</derivekey>
       
   723 	</actionbody>
       
   724 </action>
       
   725 
       
   726 //! @SYMTestCaseID CIT_PREQ1054_01
       
   727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   728 //! @SYMREQ CIT_PREQ1054
       
   729 //! @SYMTestPriority medium
       
   730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   732 <action>
       
   733 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
   734 	<actiontype>DeriveKey</actiontype>
       
   735 	<actionbody>
       
   736 		<derivekey>
       
   737 			<kdf>pkcs#12</kdf>
       
   738 			<passwd>PSWD</passwd>
       
   739 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
   740 			<iterations>1</iterations>
       
   741 			<key>A64B43E14E</key>
       
   742 		</derivekey>
       
   743 	</actionbody>
       
   744 </action>
       
   745 
       
   746 //! @SYMTestCaseID CIT_PREQ1054_01
       
   747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   748 //! @SYMREQ CIT_PREQ1054
       
   749 //! @SYMTestPriority medium
       
   750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   752 <action>
       
   753 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
   754 	<actiontype>DeriveKey</actiontype>
       
   755 	<actionbody>
       
   756 		<derivekey>
       
   757 			<kdf>pkcs#12</kdf>
       
   758 			<passwd>password</passwd>
       
   759 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
   760 			<iterations>1</iterations>
       
   761 			<key>E323D5F588</key>
       
   762 		</derivekey>
       
   763 	</actionbody>
       
   764 </action>
       
   765 
       
   766 //! @SYMTestCaseID CIT_PREQ1054_01
       
   767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   768 //! @SYMREQ CIT_PREQ1054
       
   769 //! @SYMTestPriority medium
       
   770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   772 <action>
       
   773 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
   774 	<actiontype>DeriveKey</actiontype>
       
   775 	<actionbody>
       
   776 		<derivekey>
       
   777 			<kdf>pkcs#12</kdf>
       
   778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
   779 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
   780 			<iterations>1</iterations>
       
   781 			<key>27476572AF</key>
       
   782 		</derivekey>
       
   783 	</actionbody>
       
   784 </action>
       
   785 
       
   786 //! @SYMTestCaseID CIT_PREQ1054_01
       
   787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   788 //! @SYMREQ CIT_PREQ1054
       
   789 //! @SYMTestPriority medium
       
   790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   792 <action>
       
   793 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   794 	<actiontype>DeriveKey</actiontype>
       
   795 	<actionbody>
       
   796 		<derivekey>
       
   797 			<kdf>pkcs#12</kdf>
       
   798 			<passwd>0000</passwd>
       
   799 			<salt>53414C54</salt>
       
   800 			<iterations>2</iterations>
       
   801 			<key>A1D9010A67</key>
       
   802 		</derivekey>
       
   803 	</actionbody>
       
   804 </action>
       
   805 
       
   806 //! @SYMTestCaseID CIT_PREQ1054_01
       
   807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   808 //! @SYMREQ CIT_PREQ1054
       
   809 //! @SYMTestPriority medium
       
   810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   812 <action>
       
   813 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   814 	<actiontype>DeriveKey</actiontype>
       
   815 	<actionbody>
       
   816 		<derivekey>
       
   817 			<kdf>pkcs#12</kdf>
       
   818 			<passwd>0001</passwd>
       
   819 			<salt>53414C54</salt>
       
   820 			<iterations>2</iterations>
       
   821 			<key>17E4E1F15B</key>
       
   822 		</derivekey>
       
   823 	</actionbody>
       
   824 </action>
       
   825 
       
   826 //! @SYMTestCaseID CIT_PREQ1054_01
       
   827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   828 //! @SYMREQ CIT_PREQ1054
       
   829 //! @SYMTestPriority medium
       
   830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   832 <action>
       
   833 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   834 	<actiontype>DeriveKey</actiontype>
       
   835 	<actionbody>
       
   836 		<derivekey>
       
   837 			<kdf>pkcs#12</kdf>
       
   838 			<passwd>PSWD</passwd>
       
   839 			<salt>53414C54</salt>
       
   840 			<iterations>2</iterations>
       
   841 			<key>D1B71808FC</key>
       
   842 		</derivekey>
       
   843 	</actionbody>
       
   844 </action>
       
   845 
       
   846 //! @SYMTestCaseID CIT_PREQ1054_01
       
   847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   848 //! @SYMREQ CIT_PREQ1054
       
   849 //! @SYMTestPriority medium
       
   850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   852 <action>
       
   853 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   854 	<actiontype>DeriveKey</actiontype>
       
   855 	<actionbody>
       
   856 		<derivekey>
       
   857 			<kdf>pkcs#12</kdf>
       
   858 			<passwd>password</passwd>
       
   859 			<salt>53414C54</salt>
       
   860 			<iterations>2</iterations>
       
   861 			<key>EE7E4073F2</key>
       
   862 		</derivekey>
       
   863 	</actionbody>
       
   864 </action>
       
   865 
       
   866 //! @SYMTestCaseID CIT_PREQ1054_01
       
   867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   868 //! @SYMREQ CIT_PREQ1054
       
   869 //! @SYMTestPriority medium
       
   870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   872 <action>
       
   873 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
   874 	<actiontype>DeriveKey</actiontype>
       
   875 	<actionbody>
       
   876 		<derivekey>
       
   877 			<kdf>pkcs#12</kdf>
       
   878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
   879 			<salt>53414C54</salt>
       
   880 			<iterations>2</iterations>
       
   881 			<key>5BF185C726</key>
       
   882 		</derivekey>
       
   883 	</actionbody>
       
   884 </action>
       
   885 
       
   886 //! @SYMTestCaseID CIT_PREQ1054_01
       
   887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   888 //! @SYMREQ CIT_PREQ1054
       
   889 //! @SYMTestPriority medium
       
   890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   892 <action>
       
   893 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   894 	<actiontype>DeriveKey</actiontype>
       
   895 	<actionbody>
       
   896 		<derivekey>
       
   897 			<kdf>pkcs#12</kdf>
       
   898 			<passwd>0000</passwd>
       
   899 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   900 			<iterations>2</iterations>
       
   901 			<key>72ADF5E041</key>
       
   902 		</derivekey>
       
   903 	</actionbody>
       
   904 </action>
       
   905 
       
   906 //! @SYMTestCaseID CIT_PREQ1054_01
       
   907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   908 //! @SYMREQ CIT_PREQ1054
       
   909 //! @SYMTestPriority medium
       
   910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   912 <action>
       
   913 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   914 	<actiontype>DeriveKey</actiontype>
       
   915 	<actionbody>
       
   916 		<derivekey>
       
   917 			<kdf>pkcs#12</kdf>
       
   918 			<passwd>0001</passwd>
       
   919 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   920 			<iterations>2</iterations>
       
   921 			<key>63E6DF459C</key>
       
   922 		</derivekey>
       
   923 	</actionbody>
       
   924 </action>
       
   925 
       
   926 //! @SYMTestCaseID CIT_PREQ1054_01
       
   927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   928 //! @SYMREQ CIT_PREQ1054
       
   929 //! @SYMTestPriority medium
       
   930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   932 <action>
       
   933 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   934 	<actiontype>DeriveKey</actiontype>
       
   935 	<actionbody>
       
   936 		<derivekey>
       
   937 			<kdf>pkcs#12</kdf>
       
   938 			<passwd>PSWD</passwd>
       
   939 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   940 			<iterations>2</iterations>
       
   941 			<key>C2099204AB</key>
       
   942 		</derivekey>
       
   943 	</actionbody>
       
   944 </action>
       
   945 
       
   946 //! @SYMTestCaseID CIT_PREQ1054_01
       
   947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   948 //! @SYMREQ CIT_PREQ1054
       
   949 //! @SYMTestPriority medium
       
   950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   952 <action>
       
   953 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   954 	<actiontype>DeriveKey</actiontype>
       
   955 	<actionbody>
       
   956 		<derivekey>
       
   957 			<kdf>pkcs#12</kdf>
       
   958 			<passwd>password</passwd>
       
   959 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   960 			<iterations>2</iterations>
       
   961 			<key>3204D28A32</key>
       
   962 		</derivekey>
       
   963 	</actionbody>
       
   964 </action>
       
   965 
       
   966 //! @SYMTestCaseID CIT_PREQ1054_01
       
   967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   968 //! @SYMREQ CIT_PREQ1054
       
   969 //! @SYMTestPriority medium
       
   970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   972 <action>
       
   973 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
   974 	<actiontype>DeriveKey</actiontype>
       
   975 	<actionbody>
       
   976 		<derivekey>
       
   977 			<kdf>pkcs#12</kdf>
       
   978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
   979 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
   980 			<iterations>2</iterations>
       
   981 			<key>FB845F70A4</key>
       
   982 		</derivekey>
       
   983 	</actionbody>
       
   984 </action>
       
   985 
       
   986 //! @SYMTestCaseID CIT_PREQ1054_01
       
   987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
   988 //! @SYMREQ CIT_PREQ1054
       
   989 //! @SYMTestPriority medium
       
   990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
   991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
   992 <action>
       
   993 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
   994 	<actiontype>DeriveKey</actiontype>
       
   995 	<actionbody>
       
   996 		<derivekey>
       
   997 			<kdf>pkcs#12</kdf>
       
   998 			<passwd>0000</passwd>
       
   999 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1000 			<iterations>2</iterations>
       
  1001 			<key>B9230EEC1D</key>
       
  1002 		</derivekey>
       
  1003 	</actionbody>
       
  1004 </action>
       
  1005 
       
  1006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1008 //! @SYMREQ CIT_PREQ1054
       
  1009 //! @SYMTestPriority medium
       
  1010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1012 <action>
       
  1013 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1014 	<actiontype>DeriveKey</actiontype>
       
  1015 	<actionbody>
       
  1016 		<derivekey>
       
  1017 			<kdf>pkcs#12</kdf>
       
  1018 			<passwd>0001</passwd>
       
  1019 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1020 			<iterations>2</iterations>
       
  1021 			<key>462B0F2D1B</key>
       
  1022 		</derivekey>
       
  1023 	</actionbody>
       
  1024 </action>
       
  1025 
       
  1026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1028 //! @SYMREQ CIT_PREQ1054
       
  1029 //! @SYMTestPriority medium
       
  1030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1032 <action>
       
  1033 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1034 	<actiontype>DeriveKey</actiontype>
       
  1035 	<actionbody>
       
  1036 		<derivekey>
       
  1037 			<kdf>pkcs#12</kdf>
       
  1038 			<passwd>PSWD</passwd>
       
  1039 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1040 			<iterations>2</iterations>
       
  1041 			<key>05B66EF1BB</key>
       
  1042 		</derivekey>
       
  1043 	</actionbody>
       
  1044 </action>
       
  1045 
       
  1046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1048 //! @SYMREQ CIT_PREQ1054
       
  1049 //! @SYMTestPriority medium
       
  1050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1052 <action>
       
  1053 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1054 	<actiontype>DeriveKey</actiontype>
       
  1055 	<actionbody>
       
  1056 		<derivekey>
       
  1057 			<kdf>pkcs#12</kdf>
       
  1058 			<passwd>password</passwd>
       
  1059 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1060 			<iterations>2</iterations>
       
  1061 			<key>C1B7E77C96</key>
       
  1062 		</derivekey>
       
  1063 	</actionbody>
       
  1064 </action>
       
  1065 
       
  1066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1068 //! @SYMREQ CIT_PREQ1054
       
  1069 //! @SYMTestPriority medium
       
  1070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1072 <action>
       
  1073 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1074 	<actiontype>DeriveKey</actiontype>
       
  1075 	<actionbody>
       
  1076 		<derivekey>
       
  1077 			<kdf>pkcs#12</kdf>
       
  1078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1079 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1080 			<iterations>2</iterations>
       
  1081 			<key>3DE08CDACF</key>
       
  1082 		</derivekey>
       
  1083 	</actionbody>
       
  1084 </action>
       
  1085 
       
  1086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1088 //! @SYMREQ CIT_PREQ1054
       
  1089 //! @SYMTestPriority medium
       
  1090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1092 <action>
       
  1093 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1094 	<actiontype>DeriveKey</actiontype>
       
  1095 	<actionbody>
       
  1096 		<derivekey>
       
  1097 			<kdf>pkcs#12</kdf>
       
  1098 			<passwd>0000</passwd>
       
  1099 			<salt>53414C54</salt>
       
  1100 			<iterations>4</iterations>
       
  1101 			<key>D0158BFC57</key>
       
  1102 		</derivekey>
       
  1103 	</actionbody>
       
  1104 </action>
       
  1105 
       
  1106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1108 //! @SYMREQ CIT_PREQ1054
       
  1109 //! @SYMTestPriority medium
       
  1110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1112 <action>
       
  1113 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1114 	<actiontype>DeriveKey</actiontype>
       
  1115 	<actionbody>
       
  1116 		<derivekey>
       
  1117 			<kdf>pkcs#12</kdf>
       
  1118 			<passwd>0001</passwd>
       
  1119 			<salt>53414C54</salt>
       
  1120 			<iterations>4</iterations>
       
  1121 			<key>AEB6CD53F0</key>
       
  1122 		</derivekey>
       
  1123 	</actionbody>
       
  1124 </action>
       
  1125 
       
  1126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1128 //! @SYMREQ CIT_PREQ1054
       
  1129 //! @SYMTestPriority medium
       
  1130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1132 <action>
       
  1133 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1134 	<actiontype>DeriveKey</actiontype>
       
  1135 	<actionbody>
       
  1136 		<derivekey>
       
  1137 			<kdf>pkcs#12</kdf>
       
  1138 			<passwd>PSWD</passwd>
       
  1139 			<salt>53414C54</salt>
       
  1140 			<iterations>4</iterations>
       
  1141 			<key>80010C12B6</key>
       
  1142 		</derivekey>
       
  1143 	</actionbody>
       
  1144 </action>
       
  1145 
       
  1146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1148 //! @SYMREQ CIT_PREQ1054
       
  1149 //! @SYMTestPriority medium
       
  1150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1152 <action>
       
  1153 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1154 	<actiontype>DeriveKey</actiontype>
       
  1155 	<actionbody>
       
  1156 		<derivekey>
       
  1157 			<kdf>pkcs#12</kdf>
       
  1158 			<passwd>password</passwd>
       
  1159 			<salt>53414C54</salt>
       
  1160 			<iterations>4</iterations>
       
  1161 			<key>497DE34C4C</key>
       
  1162 		</derivekey>
       
  1163 	</actionbody>
       
  1164 </action>
       
  1165 
       
  1166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1168 //! @SYMREQ CIT_PREQ1054
       
  1169 //! @SYMTestPriority medium
       
  1170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1172 <action>
       
  1173 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1174 	<actiontype>DeriveKey</actiontype>
       
  1175 	<actionbody>
       
  1176 		<derivekey>
       
  1177 			<kdf>pkcs#12</kdf>
       
  1178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1179 			<salt>53414C54</salt>
       
  1180 			<iterations>4</iterations>
       
  1181 			<key>146C6A5B58</key>
       
  1182 		</derivekey>
       
  1183 	</actionbody>
       
  1184 </action>
       
  1185 
       
  1186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1188 //! @SYMREQ CIT_PREQ1054
       
  1189 //! @SYMTestPriority medium
       
  1190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1192 <action>
       
  1193 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1194 	<actiontype>DeriveKey</actiontype>
       
  1195 	<actionbody>
       
  1196 		<derivekey>
       
  1197 			<kdf>pkcs#12</kdf>
       
  1198 			<passwd>0000</passwd>
       
  1199 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1200 			<iterations>4</iterations>
       
  1201 			<key>E89772E7A5</key>
       
  1202 		</derivekey>
       
  1203 	</actionbody>
       
  1204 </action>
       
  1205 
       
  1206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1208 //! @SYMREQ CIT_PREQ1054
       
  1209 //! @SYMTestPriority medium
       
  1210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1212 <action>
       
  1213 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1214 	<actiontype>DeriveKey</actiontype>
       
  1215 	<actionbody>
       
  1216 		<derivekey>
       
  1217 			<kdf>pkcs#12</kdf>
       
  1218 			<passwd>0001</passwd>
       
  1219 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1220 			<iterations>4</iterations>
       
  1221 			<key>2393071377</key>
       
  1222 		</derivekey>
       
  1223 	</actionbody>
       
  1224 </action>
       
  1225 
       
  1226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1228 //! @SYMREQ CIT_PREQ1054
       
  1229 //! @SYMTestPriority medium
       
  1230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1232 <action>
       
  1233 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1234 	<actiontype>DeriveKey</actiontype>
       
  1235 	<actionbody>
       
  1236 		<derivekey>
       
  1237 			<kdf>pkcs#12</kdf>
       
  1238 			<passwd>PSWD</passwd>
       
  1239 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1240 			<iterations>4</iterations>
       
  1241 			<key>DF2D961FE3</key>
       
  1242 		</derivekey>
       
  1243 	</actionbody>
       
  1244 </action>
       
  1245 
       
  1246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1248 //! @SYMREQ CIT_PREQ1054
       
  1249 //! @SYMTestPriority medium
       
  1250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1252 <action>
       
  1253 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1254 	<actiontype>DeriveKey</actiontype>
       
  1255 	<actionbody>
       
  1256 		<derivekey>
       
  1257 			<kdf>pkcs#12</kdf>
       
  1258 			<passwd>password</passwd>
       
  1259 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1260 			<iterations>4</iterations>
       
  1261 			<key>363619530B</key>
       
  1262 		</derivekey>
       
  1263 	</actionbody>
       
  1264 </action>
       
  1265 
       
  1266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1268 //! @SYMREQ CIT_PREQ1054
       
  1269 //! @SYMTestPriority medium
       
  1270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1272 <action>
       
  1273 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1274 	<actiontype>DeriveKey</actiontype>
       
  1275 	<actionbody>
       
  1276 		<derivekey>
       
  1277 			<kdf>pkcs#12</kdf>
       
  1278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1279 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1280 			<iterations>4</iterations>
       
  1281 			<key>B43FA2D22B</key>
       
  1282 		</derivekey>
       
  1283 	</actionbody>
       
  1284 </action>
       
  1285 
       
  1286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1288 //! @SYMREQ CIT_PREQ1054
       
  1289 //! @SYMTestPriority medium
       
  1290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1292 <action>
       
  1293 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1294 	<actiontype>DeriveKey</actiontype>
       
  1295 	<actionbody>
       
  1296 		<derivekey>
       
  1297 			<kdf>pkcs#12</kdf>
       
  1298 			<passwd>0000</passwd>
       
  1299 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1300 			<iterations>4</iterations>
       
  1301 			<key>EF50923D65</key>
       
  1302 		</derivekey>
       
  1303 	</actionbody>
       
  1304 </action>
       
  1305 
       
  1306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1308 //! @SYMREQ CIT_PREQ1054
       
  1309 //! @SYMTestPriority medium
       
  1310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1312 <action>
       
  1313 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1314 	<actiontype>DeriveKey</actiontype>
       
  1315 	<actionbody>
       
  1316 		<derivekey>
       
  1317 			<kdf>pkcs#12</kdf>
       
  1318 			<passwd>0001</passwd>
       
  1319 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1320 			<iterations>4</iterations>
       
  1321 			<key>9A618595C7</key>
       
  1322 		</derivekey>
       
  1323 	</actionbody>
       
  1324 </action>
       
  1325 
       
  1326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1328 //! @SYMREQ CIT_PREQ1054
       
  1329 //! @SYMTestPriority medium
       
  1330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1332 <action>
       
  1333 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1334 	<actiontype>DeriveKey</actiontype>
       
  1335 	<actionbody>
       
  1336 		<derivekey>
       
  1337 			<kdf>pkcs#12</kdf>
       
  1338 			<passwd>PSWD</passwd>
       
  1339 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1340 			<iterations>4</iterations>
       
  1341 			<key>B3B33AA8A6</key>
       
  1342 		</derivekey>
       
  1343 	</actionbody>
       
  1344 </action>
       
  1345 
       
  1346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1348 //! @SYMREQ CIT_PREQ1054
       
  1349 //! @SYMTestPriority medium
       
  1350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1352 <action>
       
  1353 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1354 	<actiontype>DeriveKey</actiontype>
       
  1355 	<actionbody>
       
  1356 		<derivekey>
       
  1357 			<kdf>pkcs#12</kdf>
       
  1358 			<passwd>password</passwd>
       
  1359 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1360 			<iterations>4</iterations>
       
  1361 			<key>C007DC1ADA</key>
       
  1362 		</derivekey>
       
  1363 	</actionbody>
       
  1364 </action>
       
  1365 
       
  1366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1368 //! @SYMREQ CIT_PREQ1054
       
  1369 //! @SYMTestPriority medium
       
  1370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1372 <action>
       
  1373 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1374 	<actiontype>DeriveKey</actiontype>
       
  1375 	<actionbody>
       
  1376 		<derivekey>
       
  1377 			<kdf>pkcs#12</kdf>
       
  1378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1379 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1380 			<iterations>4</iterations>
       
  1381 			<key>91DF366136</key>
       
  1382 		</derivekey>
       
  1383 	</actionbody>
       
  1384 </action>
       
  1385 
       
  1386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1388 //! @SYMREQ CIT_PREQ1054
       
  1389 //! @SYMTestPriority medium
       
  1390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1392 <action>
       
  1393 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1394 	<actiontype>DeriveKey</actiontype>
       
  1395 	<actionbody>
       
  1396 		<derivekey>
       
  1397 			<kdf>pkcs#12</kdf>
       
  1398 			<passwd>0000</passwd>
       
  1399 			<salt>53414C54</salt>
       
  1400 			<iterations>8</iterations>
       
  1401 			<key>9A08D3C4F5</key>
       
  1402 		</derivekey>
       
  1403 	</actionbody>
       
  1404 </action>
       
  1405 
       
  1406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1408 //! @SYMREQ CIT_PREQ1054
       
  1409 //! @SYMTestPriority medium
       
  1410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1412 <action>
       
  1413 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1414 	<actiontype>DeriveKey</actiontype>
       
  1415 	<actionbody>
       
  1416 		<derivekey>
       
  1417 			<kdf>pkcs#12</kdf>
       
  1418 			<passwd>0001</passwd>
       
  1419 			<salt>53414C54</salt>
       
  1420 			<iterations>8</iterations>
       
  1421 			<key>33002FA0B6</key>
       
  1422 		</derivekey>
       
  1423 	</actionbody>
       
  1424 </action>
       
  1425 
       
  1426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1428 //! @SYMREQ CIT_PREQ1054
       
  1429 //! @SYMTestPriority medium
       
  1430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1432 <action>
       
  1433 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1434 	<actiontype>DeriveKey</actiontype>
       
  1435 	<actionbody>
       
  1436 		<derivekey>
       
  1437 			<kdf>pkcs#12</kdf>
       
  1438 			<passwd>PSWD</passwd>
       
  1439 			<salt>53414C54</salt>
       
  1440 			<iterations>8</iterations>
       
  1441 			<key>22001FA269</key>
       
  1442 		</derivekey>
       
  1443 	</actionbody>
       
  1444 </action>
       
  1445 
       
  1446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1448 //! @SYMREQ CIT_PREQ1054
       
  1449 //! @SYMTestPriority medium
       
  1450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1452 <action>
       
  1453 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1454 	<actiontype>DeriveKey</actiontype>
       
  1455 	<actionbody>
       
  1456 		<derivekey>
       
  1457 			<kdf>pkcs#12</kdf>
       
  1458 			<passwd>password</passwd>
       
  1459 			<salt>53414C54</salt>
       
  1460 			<iterations>8</iterations>
       
  1461 			<key>B0935F1122</key>
       
  1462 		</derivekey>
       
  1463 	</actionbody>
       
  1464 </action>
       
  1465 
       
  1466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1468 //! @SYMREQ CIT_PREQ1054
       
  1469 //! @SYMTestPriority medium
       
  1470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1472 <action>
       
  1473 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1474 	<actiontype>DeriveKey</actiontype>
       
  1475 	<actionbody>
       
  1476 		<derivekey>
       
  1477 			<kdf>pkcs#12</kdf>
       
  1478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1479 			<salt>53414C54</salt>
       
  1480 			<iterations>8</iterations>
       
  1481 			<key>6602B1B4BB</key>
       
  1482 		</derivekey>
       
  1483 	</actionbody>
       
  1484 </action>
       
  1485 
       
  1486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1488 //! @SYMREQ CIT_PREQ1054
       
  1489 //! @SYMTestPriority medium
       
  1490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1492 <action>
       
  1493 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1494 	<actiontype>DeriveKey</actiontype>
       
  1495 	<actionbody>
       
  1496 		<derivekey>
       
  1497 			<kdf>pkcs#12</kdf>
       
  1498 			<passwd>0000</passwd>
       
  1499 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1500 			<iterations>8</iterations>
       
  1501 			<key>3A478368DD</key>
       
  1502 		</derivekey>
       
  1503 	</actionbody>
       
  1504 </action>
       
  1505 
       
  1506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1508 //! @SYMREQ CIT_PREQ1054
       
  1509 //! @SYMTestPriority medium
       
  1510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1512 <action>
       
  1513 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1514 	<actiontype>DeriveKey</actiontype>
       
  1515 	<actionbody>
       
  1516 		<derivekey>
       
  1517 			<kdf>pkcs#12</kdf>
       
  1518 			<passwd>0001</passwd>
       
  1519 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1520 			<iterations>8</iterations>
       
  1521 			<key>6473EB1244</key>
       
  1522 		</derivekey>
       
  1523 	</actionbody>
       
  1524 </action>
       
  1525 
       
  1526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1528 //! @SYMREQ CIT_PREQ1054
       
  1529 //! @SYMTestPriority medium
       
  1530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1532 <action>
       
  1533 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1534 	<actiontype>DeriveKey</actiontype>
       
  1535 	<actionbody>
       
  1536 		<derivekey>
       
  1537 			<kdf>pkcs#12</kdf>
       
  1538 			<passwd>PSWD</passwd>
       
  1539 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1540 			<iterations>8</iterations>
       
  1541 			<key>AA762B8736</key>
       
  1542 		</derivekey>
       
  1543 	</actionbody>
       
  1544 </action>
       
  1545 
       
  1546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1548 //! @SYMREQ CIT_PREQ1054
       
  1549 //! @SYMTestPriority medium
       
  1550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1552 <action>
       
  1553 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1554 	<actiontype>DeriveKey</actiontype>
       
  1555 	<actionbody>
       
  1556 		<derivekey>
       
  1557 			<kdf>pkcs#12</kdf>
       
  1558 			<passwd>password</passwd>
       
  1559 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1560 			<iterations>8</iterations>
       
  1561 			<key>F00C5240B0</key>
       
  1562 		</derivekey>
       
  1563 	</actionbody>
       
  1564 </action>
       
  1565 
       
  1566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1568 //! @SYMREQ CIT_PREQ1054
       
  1569 //! @SYMTestPriority medium
       
  1570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1572 <action>
       
  1573 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1574 	<actiontype>DeriveKey</actiontype>
       
  1575 	<actionbody>
       
  1576 		<derivekey>
       
  1577 			<kdf>pkcs#12</kdf>
       
  1578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1579 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1580 			<iterations>8</iterations>
       
  1581 			<key>935593CA37</key>
       
  1582 		</derivekey>
       
  1583 	</actionbody>
       
  1584 </action>
       
  1585 
       
  1586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1588 //! @SYMREQ CIT_PREQ1054
       
  1589 //! @SYMTestPriority medium
       
  1590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1592 <action>
       
  1593 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1594 	<actiontype>DeriveKey</actiontype>
       
  1595 	<actionbody>
       
  1596 		<derivekey>
       
  1597 			<kdf>pkcs#12</kdf>
       
  1598 			<passwd>0000</passwd>
       
  1599 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1600 			<iterations>8</iterations>
       
  1601 			<key>FCE1F429AE</key>
       
  1602 		</derivekey>
       
  1603 	</actionbody>
       
  1604 </action>
       
  1605 
       
  1606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1608 //! @SYMREQ CIT_PREQ1054
       
  1609 //! @SYMTestPriority medium
       
  1610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1612 <action>
       
  1613 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1614 	<actiontype>DeriveKey</actiontype>
       
  1615 	<actionbody>
       
  1616 		<derivekey>
       
  1617 			<kdf>pkcs#12</kdf>
       
  1618 			<passwd>0001</passwd>
       
  1619 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1620 			<iterations>8</iterations>
       
  1621 			<key>82B4A13659</key>
       
  1622 		</derivekey>
       
  1623 	</actionbody>
       
  1624 </action>
       
  1625 
       
  1626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1628 //! @SYMREQ CIT_PREQ1054
       
  1629 //! @SYMTestPriority medium
       
  1630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1632 <action>
       
  1633 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1634 	<actiontype>DeriveKey</actiontype>
       
  1635 	<actionbody>
       
  1636 		<derivekey>
       
  1637 			<kdf>pkcs#12</kdf>
       
  1638 			<passwd>PSWD</passwd>
       
  1639 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1640 			<iterations>8</iterations>
       
  1641 			<key>45FE091D4D</key>
       
  1642 		</derivekey>
       
  1643 	</actionbody>
       
  1644 </action>
       
  1645 
       
  1646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1648 //! @SYMREQ CIT_PREQ1054
       
  1649 //! @SYMTestPriority medium
       
  1650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1652 <action>
       
  1653 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1654 	<actiontype>DeriveKey</actiontype>
       
  1655 	<actionbody>
       
  1656 		<derivekey>
       
  1657 			<kdf>pkcs#12</kdf>
       
  1658 			<passwd>password</passwd>
       
  1659 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1660 			<iterations>8</iterations>
       
  1661 			<key>5670457314</key>
       
  1662 		</derivekey>
       
  1663 	</actionbody>
       
  1664 </action>
       
  1665 
       
  1666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1668 //! @SYMREQ CIT_PREQ1054
       
  1669 //! @SYMTestPriority medium
       
  1670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1672 <action>
       
  1673 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1674 	<actiontype>DeriveKey</actiontype>
       
  1675 	<actionbody>
       
  1676 		<derivekey>
       
  1677 			<kdf>pkcs#12</kdf>
       
  1678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1679 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1680 			<iterations>8</iterations>
       
  1681 			<key>1C4CAE2514</key>
       
  1682 		</derivekey>
       
  1683 	</actionbody>
       
  1684 </action>
       
  1685 
       
  1686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1688 //! @SYMREQ CIT_PREQ1054
       
  1689 //! @SYMTestPriority medium
       
  1690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1692 <action>
       
  1693 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1694 	<actiontype>DeriveKey</actiontype>
       
  1695 	<actionbody>
       
  1696 		<derivekey>
       
  1697 			<kdf>pkcs#12</kdf>
       
  1698 			<passwd>0000</passwd>
       
  1699 			<salt>53414C54</salt>
       
  1700 			<iterations>128</iterations>
       
  1701 			<key>8B4B3CBFB0</key>
       
  1702 		</derivekey>
       
  1703 	</actionbody>
       
  1704 </action>
       
  1705 
       
  1706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1708 //! @SYMREQ CIT_PREQ1054
       
  1709 //! @SYMTestPriority medium
       
  1710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1712 <action>
       
  1713 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1714 	<actiontype>DeriveKey</actiontype>
       
  1715 	<actionbody>
       
  1716 		<derivekey>
       
  1717 			<kdf>pkcs#12</kdf>
       
  1718 			<passwd>0001</passwd>
       
  1719 			<salt>53414C54</salt>
       
  1720 			<iterations>128</iterations>
       
  1721 			<key>C89C3A2C9C</key>
       
  1722 		</derivekey>
       
  1723 	</actionbody>
       
  1724 </action>
       
  1725 
       
  1726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1728 //! @SYMREQ CIT_PREQ1054
       
  1729 //! @SYMTestPriority medium
       
  1730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1732 <action>
       
  1733 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1734 	<actiontype>DeriveKey</actiontype>
       
  1735 	<actionbody>
       
  1736 		<derivekey>
       
  1737 			<kdf>pkcs#12</kdf>
       
  1738 			<passwd>PSWD</passwd>
       
  1739 			<salt>53414C54</salt>
       
  1740 			<iterations>128</iterations>
       
  1741 			<key>8109F97073</key>
       
  1742 		</derivekey>
       
  1743 	</actionbody>
       
  1744 </action>
       
  1745 
       
  1746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1748 //! @SYMREQ CIT_PREQ1054
       
  1749 //! @SYMTestPriority medium
       
  1750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1752 <action>
       
  1753 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1754 	<actiontype>DeriveKey</actiontype>
       
  1755 	<actionbody>
       
  1756 		<derivekey>
       
  1757 			<kdf>pkcs#12</kdf>
       
  1758 			<passwd>password</passwd>
       
  1759 			<salt>53414C54</salt>
       
  1760 			<iterations>128</iterations>
       
  1761 			<key>55E985CC15</key>
       
  1762 		</derivekey>
       
  1763 	</actionbody>
       
  1764 </action>
       
  1765 
       
  1766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1768 //! @SYMREQ CIT_PREQ1054
       
  1769 //! @SYMTestPriority medium
       
  1770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1772 <action>
       
  1773 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1774 	<actiontype>DeriveKey</actiontype>
       
  1775 	<actionbody>
       
  1776 		<derivekey>
       
  1777 			<kdf>pkcs#12</kdf>
       
  1778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1779 			<salt>53414C54</salt>
       
  1780 			<iterations>128</iterations>
       
  1781 			<key>2802AA97D4</key>
       
  1782 		</derivekey>
       
  1783 	</actionbody>
       
  1784 </action>
       
  1785 
       
  1786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1788 //! @SYMREQ CIT_PREQ1054
       
  1789 //! @SYMTestPriority medium
       
  1790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1792 <action>
       
  1793 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1794 	<actiontype>DeriveKey</actiontype>
       
  1795 	<actionbody>
       
  1796 		<derivekey>
       
  1797 			<kdf>pkcs#12</kdf>
       
  1798 			<passwd>0000</passwd>
       
  1799 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1800 			<iterations>128</iterations>
       
  1801 			<key>881509A34D</key>
       
  1802 		</derivekey>
       
  1803 	</actionbody>
       
  1804 </action>
       
  1805 
       
  1806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1808 //! @SYMREQ CIT_PREQ1054
       
  1809 //! @SYMTestPriority medium
       
  1810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1812 <action>
       
  1813 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1814 	<actiontype>DeriveKey</actiontype>
       
  1815 	<actionbody>
       
  1816 		<derivekey>
       
  1817 			<kdf>pkcs#12</kdf>
       
  1818 			<passwd>0001</passwd>
       
  1819 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1820 			<iterations>128</iterations>
       
  1821 			<key>B2918BC593</key>
       
  1822 		</derivekey>
       
  1823 	</actionbody>
       
  1824 </action>
       
  1825 
       
  1826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1828 //! @SYMREQ CIT_PREQ1054
       
  1829 //! @SYMTestPriority medium
       
  1830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1832 <action>
       
  1833 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1834 	<actiontype>DeriveKey</actiontype>
       
  1835 	<actionbody>
       
  1836 		<derivekey>
       
  1837 			<kdf>pkcs#12</kdf>
       
  1838 			<passwd>PSWD</passwd>
       
  1839 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1840 			<iterations>128</iterations>
       
  1841 			<key>0FE0529B45</key>
       
  1842 		</derivekey>
       
  1843 	</actionbody>
       
  1844 </action>
       
  1845 
       
  1846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1848 //! @SYMREQ CIT_PREQ1054
       
  1849 //! @SYMTestPriority medium
       
  1850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1852 <action>
       
  1853 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1854 	<actiontype>DeriveKey</actiontype>
       
  1855 	<actionbody>
       
  1856 		<derivekey>
       
  1857 			<kdf>pkcs#12</kdf>
       
  1858 			<passwd>password</passwd>
       
  1859 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1860 			<iterations>128</iterations>
       
  1861 			<key>1FF923C4B1</key>
       
  1862 		</derivekey>
       
  1863 	</actionbody>
       
  1864 </action>
       
  1865 
       
  1866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1868 //! @SYMREQ CIT_PREQ1054
       
  1869 //! @SYMTestPriority medium
       
  1870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1872 <action>
       
  1873 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  1874 	<actiontype>DeriveKey</actiontype>
       
  1875 	<actionbody>
       
  1876 		<derivekey>
       
  1877 			<kdf>pkcs#12</kdf>
       
  1878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1879 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  1880 			<iterations>128</iterations>
       
  1881 			<key>05D1E56D04</key>
       
  1882 		</derivekey>
       
  1883 	</actionbody>
       
  1884 </action>
       
  1885 
       
  1886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1888 //! @SYMREQ CIT_PREQ1054
       
  1889 //! @SYMTestPriority medium
       
  1890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1892 <action>
       
  1893 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1894 	<actiontype>DeriveKey</actiontype>
       
  1895 	<actionbody>
       
  1896 		<derivekey>
       
  1897 			<kdf>pkcs#12</kdf>
       
  1898 			<passwd>0000</passwd>
       
  1899 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1900 			<iterations>128</iterations>
       
  1901 			<key>99FE149183</key>
       
  1902 		</derivekey>
       
  1903 	</actionbody>
       
  1904 </action>
       
  1905 
       
  1906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1908 //! @SYMREQ CIT_PREQ1054
       
  1909 //! @SYMTestPriority medium
       
  1910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1912 <action>
       
  1913 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1914 	<actiontype>DeriveKey</actiontype>
       
  1915 	<actionbody>
       
  1916 		<derivekey>
       
  1917 			<kdf>pkcs#12</kdf>
       
  1918 			<passwd>0001</passwd>
       
  1919 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1920 			<iterations>128</iterations>
       
  1921 			<key>79E29F3FCB</key>
       
  1922 		</derivekey>
       
  1923 	</actionbody>
       
  1924 </action>
       
  1925 
       
  1926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1928 //! @SYMREQ CIT_PREQ1054
       
  1929 //! @SYMTestPriority medium
       
  1930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1932 <action>
       
  1933 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1934 	<actiontype>DeriveKey</actiontype>
       
  1935 	<actionbody>
       
  1936 		<derivekey>
       
  1937 			<kdf>pkcs#12</kdf>
       
  1938 			<passwd>PSWD</passwd>
       
  1939 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1940 			<iterations>128</iterations>
       
  1941 			<key>22A70A8657</key>
       
  1942 		</derivekey>
       
  1943 	</actionbody>
       
  1944 </action>
       
  1945 
       
  1946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1948 //! @SYMREQ CIT_PREQ1054
       
  1949 //! @SYMTestPriority medium
       
  1950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1952 <action>
       
  1953 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1954 	<actiontype>DeriveKey</actiontype>
       
  1955 	<actionbody>
       
  1956 		<derivekey>
       
  1957 			<kdf>pkcs#12</kdf>
       
  1958 			<passwd>password</passwd>
       
  1959 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1960 			<iterations>128</iterations>
       
  1961 			<key>9CBA922190</key>
       
  1962 		</derivekey>
       
  1963 	</actionbody>
       
  1964 </action>
       
  1965 
       
  1966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1968 //! @SYMREQ CIT_PREQ1054
       
  1969 //! @SYMTestPriority medium
       
  1970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1972 <action>
       
  1973 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  1974 	<actiontype>DeriveKey</actiontype>
       
  1975 	<actionbody>
       
  1976 		<derivekey>
       
  1977 			<kdf>pkcs#12</kdf>
       
  1978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  1979 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  1980 			<iterations>128</iterations>
       
  1981 			<key>A037A8B1C2</key>
       
  1982 		</derivekey>
       
  1983 	</actionbody>
       
  1984 </action>
       
  1985 
       
  1986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  1987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  1988 //! @SYMREQ CIT_PREQ1054
       
  1989 //! @SYMTestPriority medium
       
  1990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  1991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  1992 <action>
       
  1993 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  1994 	<actiontype>DeriveKey</actiontype>
       
  1995 	<actionbody>
       
  1996 		<derivekey>
       
  1997 			<kdf>pkcs#12</kdf>
       
  1998 			<passwd>0000</passwd>
       
  1999 			<salt>53414C54</salt>
       
  2000 			<iterations>1024</iterations>
       
  2001 			<key>82824BE51C</key>
       
  2002 		</derivekey>
       
  2003 	</actionbody>
       
  2004 </action>
       
  2005 
       
  2006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2008 //! @SYMREQ CIT_PREQ1054
       
  2009 //! @SYMTestPriority medium
       
  2010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2012 <action>
       
  2013 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2014 	<actiontype>DeriveKey</actiontype>
       
  2015 	<actionbody>
       
  2016 		<derivekey>
       
  2017 			<kdf>pkcs#12</kdf>
       
  2018 			<passwd>0001</passwd>
       
  2019 			<salt>53414C54</salt>
       
  2020 			<iterations>1024</iterations>
       
  2021 			<key>E166049AC4</key>
       
  2022 		</derivekey>
       
  2023 	</actionbody>
       
  2024 </action>
       
  2025 
       
  2026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2028 //! @SYMREQ CIT_PREQ1054
       
  2029 //! @SYMTestPriority medium
       
  2030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2032 <action>
       
  2033 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2034 	<actiontype>DeriveKey</actiontype>
       
  2035 	<actionbody>
       
  2036 		<derivekey>
       
  2037 			<kdf>pkcs#12</kdf>
       
  2038 			<passwd>PSWD</passwd>
       
  2039 			<salt>53414C54</salt>
       
  2040 			<iterations>1024</iterations>
       
  2041 			<key>90E975CC54</key>
       
  2042 		</derivekey>
       
  2043 	</actionbody>
       
  2044 </action>
       
  2045 
       
  2046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2048 //! @SYMREQ CIT_PREQ1054
       
  2049 //! @SYMTestPriority medium
       
  2050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2052 <action>
       
  2053 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2054 	<actiontype>DeriveKey</actiontype>
       
  2055 	<actionbody>
       
  2056 		<derivekey>
       
  2057 			<kdf>pkcs#12</kdf>
       
  2058 			<passwd>password</passwd>
       
  2059 			<salt>53414C54</salt>
       
  2060 			<iterations>1024</iterations>
       
  2061 			<key>1FFD40D7BB</key>
       
  2062 		</derivekey>
       
  2063 	</actionbody>
       
  2064 </action>
       
  2065 
       
  2066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2068 //! @SYMREQ CIT_PREQ1054
       
  2069 //! @SYMTestPriority medium
       
  2070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2072 <action>
       
  2073 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2074 	<actiontype>DeriveKey</actiontype>
       
  2075 	<actionbody>
       
  2076 		<derivekey>
       
  2077 			<kdf>pkcs#12</kdf>
       
  2078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2079 			<salt>53414C54</salt>
       
  2080 			<iterations>1024</iterations>
       
  2081 			<key>406C92305A</key>
       
  2082 		</derivekey>
       
  2083 	</actionbody>
       
  2084 </action>
       
  2085 
       
  2086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2088 //! @SYMREQ CIT_PREQ1054
       
  2089 //! @SYMTestPriority medium
       
  2090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2092 <action>
       
  2093 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2094 	<actiontype>DeriveKey</actiontype>
       
  2095 	<actionbody>
       
  2096 		<derivekey>
       
  2097 			<kdf>pkcs#12</kdf>
       
  2098 			<passwd>0000</passwd>
       
  2099 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2100 			<iterations>1024</iterations>
       
  2101 			<key>E82BD75AA9</key>
       
  2102 		</derivekey>
       
  2103 	</actionbody>
       
  2104 </action>
       
  2105 
       
  2106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2108 //! @SYMREQ CIT_PREQ1054
       
  2109 //! @SYMTestPriority medium
       
  2110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2112 <action>
       
  2113 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2114 	<actiontype>DeriveKey</actiontype>
       
  2115 	<actionbody>
       
  2116 		<derivekey>
       
  2117 			<kdf>pkcs#12</kdf>
       
  2118 			<passwd>0001</passwd>
       
  2119 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2120 			<iterations>1024</iterations>
       
  2121 			<key>0182E41FCA</key>
       
  2122 		</derivekey>
       
  2123 	</actionbody>
       
  2124 </action>
       
  2125 
       
  2126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2128 //! @SYMREQ CIT_PREQ1054
       
  2129 //! @SYMTestPriority medium
       
  2130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2132 <action>
       
  2133 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2134 	<actiontype>DeriveKey</actiontype>
       
  2135 	<actionbody>
       
  2136 		<derivekey>
       
  2137 			<kdf>pkcs#12</kdf>
       
  2138 			<passwd>PSWD</passwd>
       
  2139 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2140 			<iterations>1024</iterations>
       
  2141 			<key>101FB77598</key>
       
  2142 		</derivekey>
       
  2143 	</actionbody>
       
  2144 </action>
       
  2145 
       
  2146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2148 //! @SYMREQ CIT_PREQ1054
       
  2149 //! @SYMTestPriority medium
       
  2150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2152 <action>
       
  2153 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2154 	<actiontype>DeriveKey</actiontype>
       
  2155 	<actionbody>
       
  2156 		<derivekey>
       
  2157 			<kdf>pkcs#12</kdf>
       
  2158 			<passwd>password</passwd>
       
  2159 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2160 			<iterations>1024</iterations>
       
  2161 			<key>D7499C6A12</key>
       
  2162 		</derivekey>
       
  2163 	</actionbody>
       
  2164 </action>
       
  2165 
       
  2166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2168 //! @SYMREQ CIT_PREQ1054
       
  2169 //! @SYMTestPriority medium
       
  2170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2172 <action>
       
  2173 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2174 	<actiontype>DeriveKey</actiontype>
       
  2175 	<actionbody>
       
  2176 		<derivekey>
       
  2177 			<kdf>pkcs#12</kdf>
       
  2178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2179 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2180 			<iterations>1024</iterations>
       
  2181 			<key>2C6222B8E2</key>
       
  2182 		</derivekey>
       
  2183 	</actionbody>
       
  2184 </action>
       
  2185 
       
  2186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2188 //! @SYMREQ CIT_PREQ1054
       
  2189 //! @SYMTestPriority medium
       
  2190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2192 <action>
       
  2193 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2194 	<actiontype>DeriveKey</actiontype>
       
  2195 	<actionbody>
       
  2196 		<derivekey>
       
  2197 			<kdf>pkcs#12</kdf>
       
  2198 			<passwd>0000</passwd>
       
  2199 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2200 			<iterations>1024</iterations>
       
  2201 			<key>6789F0680A</key>
       
  2202 		</derivekey>
       
  2203 	</actionbody>
       
  2204 </action>
       
  2205 
       
  2206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2208 //! @SYMREQ CIT_PREQ1054
       
  2209 //! @SYMTestPriority medium
       
  2210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2212 <action>
       
  2213 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2214 	<actiontype>DeriveKey</actiontype>
       
  2215 	<actionbody>
       
  2216 		<derivekey>
       
  2217 			<kdf>pkcs#12</kdf>
       
  2218 			<passwd>0001</passwd>
       
  2219 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2220 			<iterations>1024</iterations>
       
  2221 			<key>43E6637258</key>
       
  2222 		</derivekey>
       
  2223 	</actionbody>
       
  2224 </action>
       
  2225 
       
  2226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2228 //! @SYMREQ CIT_PREQ1054
       
  2229 //! @SYMTestPriority medium
       
  2230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2232 <action>
       
  2233 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2234 	<actiontype>DeriveKey</actiontype>
       
  2235 	<actionbody>
       
  2236 		<derivekey>
       
  2237 			<kdf>pkcs#12</kdf>
       
  2238 			<passwd>PSWD</passwd>
       
  2239 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2240 			<iterations>1024</iterations>
       
  2241 			<key>8B3308BDD5</key>
       
  2242 		</derivekey>
       
  2243 	</actionbody>
       
  2244 </action>
       
  2245 
       
  2246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2248 //! @SYMREQ CIT_PREQ1054
       
  2249 //! @SYMTestPriority medium
       
  2250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2252 <action>
       
  2253 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2254 	<actiontype>DeriveKey</actiontype>
       
  2255 	<actionbody>
       
  2256 		<derivekey>
       
  2257 			<kdf>pkcs#12</kdf>
       
  2258 			<passwd>password</passwd>
       
  2259 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2260 			<iterations>1024</iterations>
       
  2261 			<key>CA202602C9</key>
       
  2262 		</derivekey>
       
  2263 	</actionbody>
       
  2264 </action>
       
  2265 
       
  2266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2268 //! @SYMREQ CIT_PREQ1054
       
  2269 //! @SYMTestPriority medium
       
  2270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2272 <action>
       
  2273 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2274 	<actiontype>DeriveKey</actiontype>
       
  2275 	<actionbody>
       
  2276 		<derivekey>
       
  2277 			<kdf>pkcs#12</kdf>
       
  2278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2279 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2280 			<iterations>1024</iterations>
       
  2281 			<key>F6A33ADA6A</key>
       
  2282 		</derivekey>
       
  2283 	</actionbody>
       
  2284 </action>
       
  2285 
       
  2286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2288 //! @SYMREQ CIT_PREQ1054
       
  2289 //! @SYMTestPriority medium
       
  2290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2292 <action>
       
  2293 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2294 	<actiontype>DeriveKey</actiontype>
       
  2295 	<actionbody>
       
  2296 		<derivekey>
       
  2297 			<kdf>pkcs#12</kdf>
       
  2298 			<passwd>0000</passwd>
       
  2299 			<salt>53414C54</salt>
       
  2300 			<iterations>1536</iterations>
       
  2301 			<key>79A4E1398F</key>
       
  2302 		</derivekey>
       
  2303 	</actionbody>
       
  2304 </action>
       
  2305 
       
  2306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2308 //! @SYMREQ CIT_PREQ1054
       
  2309 //! @SYMTestPriority medium
       
  2310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2312 <action>
       
  2313 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2314 	<actiontype>DeriveKey</actiontype>
       
  2315 	<actionbody>
       
  2316 		<derivekey>
       
  2317 			<kdf>pkcs#12</kdf>
       
  2318 			<passwd>0001</passwd>
       
  2319 			<salt>53414C54</salt>
       
  2320 			<iterations>1536</iterations>
       
  2321 			<key>6F2402CCE4</key>
       
  2322 		</derivekey>
       
  2323 	</actionbody>
       
  2324 </action>
       
  2325 
       
  2326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2328 //! @SYMREQ CIT_PREQ1054
       
  2329 //! @SYMTestPriority medium
       
  2330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2332 <action>
       
  2333 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2334 	<actiontype>DeriveKey</actiontype>
       
  2335 	<actionbody>
       
  2336 		<derivekey>
       
  2337 			<kdf>pkcs#12</kdf>
       
  2338 			<passwd>PSWD</passwd>
       
  2339 			<salt>53414C54</salt>
       
  2340 			<iterations>1536</iterations>
       
  2341 			<key>B9ED7B3135</key>
       
  2342 		</derivekey>
       
  2343 	</actionbody>
       
  2344 </action>
       
  2345 
       
  2346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2348 //! @SYMREQ CIT_PREQ1054
       
  2349 //! @SYMTestPriority medium
       
  2350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2352 <action>
       
  2353 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2354 	<actiontype>DeriveKey</actiontype>
       
  2355 	<actionbody>
       
  2356 		<derivekey>
       
  2357 			<kdf>pkcs#12</kdf>
       
  2358 			<passwd>password</passwd>
       
  2359 			<salt>53414C54</salt>
       
  2360 			<iterations>1536</iterations>
       
  2361 			<key>65B27A78C7</key>
       
  2362 		</derivekey>
       
  2363 	</actionbody>
       
  2364 </action>
       
  2365 
       
  2366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2368 //! @SYMREQ CIT_PREQ1054
       
  2369 //! @SYMTestPriority medium
       
  2370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2372 <action>
       
  2373 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2374 	<actiontype>DeriveKey</actiontype>
       
  2375 	<actionbody>
       
  2376 		<derivekey>
       
  2377 			<kdf>pkcs#12</kdf>
       
  2378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2379 			<salt>53414C54</salt>
       
  2380 			<iterations>1536</iterations>
       
  2381 			<key>8F8FC96A3D</key>
       
  2382 		</derivekey>
       
  2383 	</actionbody>
       
  2384 </action>
       
  2385 
       
  2386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2388 //! @SYMREQ CIT_PREQ1054
       
  2389 //! @SYMTestPriority medium
       
  2390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2392 <action>
       
  2393 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2394 	<actiontype>DeriveKey</actiontype>
       
  2395 	<actionbody>
       
  2396 		<derivekey>
       
  2397 			<kdf>pkcs#12</kdf>
       
  2398 			<passwd>0000</passwd>
       
  2399 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2400 			<iterations>1536</iterations>
       
  2401 			<key>642DDC3F4E</key>
       
  2402 		</derivekey>
       
  2403 	</actionbody>
       
  2404 </action>
       
  2405 
       
  2406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2408 //! @SYMREQ CIT_PREQ1054
       
  2409 //! @SYMTestPriority medium
       
  2410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2412 <action>
       
  2413 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2414 	<actiontype>DeriveKey</actiontype>
       
  2415 	<actionbody>
       
  2416 		<derivekey>
       
  2417 			<kdf>pkcs#12</kdf>
       
  2418 			<passwd>0001</passwd>
       
  2419 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2420 			<iterations>1536</iterations>
       
  2421 			<key>0FE4BDC100</key>
       
  2422 		</derivekey>
       
  2423 	</actionbody>
       
  2424 </action>
       
  2425 
       
  2426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2428 //! @SYMREQ CIT_PREQ1054
       
  2429 //! @SYMTestPriority medium
       
  2430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2432 <action>
       
  2433 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2434 	<actiontype>DeriveKey</actiontype>
       
  2435 	<actionbody>
       
  2436 		<derivekey>
       
  2437 			<kdf>pkcs#12</kdf>
       
  2438 			<passwd>PSWD</passwd>
       
  2439 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2440 			<iterations>1536</iterations>
       
  2441 			<key>32D7F10C5E</key>
       
  2442 		</derivekey>
       
  2443 	</actionbody>
       
  2444 </action>
       
  2445 
       
  2446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2448 //! @SYMREQ CIT_PREQ1054
       
  2449 //! @SYMTestPriority medium
       
  2450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2452 <action>
       
  2453 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2454 	<actiontype>DeriveKey</actiontype>
       
  2455 	<actionbody>
       
  2456 		<derivekey>
       
  2457 			<kdf>pkcs#12</kdf>
       
  2458 			<passwd>password</passwd>
       
  2459 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2460 			<iterations>1536</iterations>
       
  2461 			<key>C05FE26245</key>
       
  2462 		</derivekey>
       
  2463 	</actionbody>
       
  2464 </action>
       
  2465 
       
  2466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2468 //! @SYMREQ CIT_PREQ1054
       
  2469 //! @SYMTestPriority medium
       
  2470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2472 <action>
       
  2473 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2474 	<actiontype>DeriveKey</actiontype>
       
  2475 	<actionbody>
       
  2476 		<derivekey>
       
  2477 			<kdf>pkcs#12</kdf>
       
  2478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2479 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2480 			<iterations>1536</iterations>
       
  2481 			<key>818C967A8F</key>
       
  2482 		</derivekey>
       
  2483 	</actionbody>
       
  2484 </action>
       
  2485 
       
  2486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2488 //! @SYMREQ CIT_PREQ1054
       
  2489 //! @SYMTestPriority medium
       
  2490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2492 <action>
       
  2493 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2494 	<actiontype>DeriveKey</actiontype>
       
  2495 	<actionbody>
       
  2496 		<derivekey>
       
  2497 			<kdf>pkcs#12</kdf>
       
  2498 			<passwd>0000</passwd>
       
  2499 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2500 			<iterations>1536</iterations>
       
  2501 			<key>5301B5B2A1</key>
       
  2502 		</derivekey>
       
  2503 	</actionbody>
       
  2504 </action>
       
  2505 
       
  2506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2508 //! @SYMREQ CIT_PREQ1054
       
  2509 //! @SYMTestPriority medium
       
  2510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2512 <action>
       
  2513 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2514 	<actiontype>DeriveKey</actiontype>
       
  2515 	<actionbody>
       
  2516 		<derivekey>
       
  2517 			<kdf>pkcs#12</kdf>
       
  2518 			<passwd>0001</passwd>
       
  2519 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2520 			<iterations>1536</iterations>
       
  2521 			<key>9CB5BD2394</key>
       
  2522 		</derivekey>
       
  2523 	</actionbody>
       
  2524 </action>
       
  2525 
       
  2526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2528 //! @SYMREQ CIT_PREQ1054
       
  2529 //! @SYMTestPriority medium
       
  2530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2532 <action>
       
  2533 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2534 	<actiontype>DeriveKey</actiontype>
       
  2535 	<actionbody>
       
  2536 		<derivekey>
       
  2537 			<kdf>pkcs#12</kdf>
       
  2538 			<passwd>PSWD</passwd>
       
  2539 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2540 			<iterations>1536</iterations>
       
  2541 			<key>EB90D956B3</key>
       
  2542 		</derivekey>
       
  2543 	</actionbody>
       
  2544 </action>
       
  2545 
       
  2546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2548 //! @SYMREQ CIT_PREQ1054
       
  2549 //! @SYMTestPriority medium
       
  2550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2552 <action>
       
  2553 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2554 	<actiontype>DeriveKey</actiontype>
       
  2555 	<actionbody>
       
  2556 		<derivekey>
       
  2557 			<kdf>pkcs#12</kdf>
       
  2558 			<passwd>password</passwd>
       
  2559 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2560 			<iterations>1536</iterations>
       
  2561 			<key>ACAFB5EB24</key>
       
  2562 		</derivekey>
       
  2563 	</actionbody>
       
  2564 </action>
       
  2565 
       
  2566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2568 //! @SYMREQ CIT_PREQ1054
       
  2569 //! @SYMTestPriority medium
       
  2570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2572 <action>
       
  2573 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2574 	<actiontype>DeriveKey</actiontype>
       
  2575 	<actionbody>
       
  2576 		<derivekey>
       
  2577 			<kdf>pkcs#12</kdf>
       
  2578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2579 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2580 			<iterations>1536</iterations>
       
  2581 			<key>A7B0859D9D</key>
       
  2582 		</derivekey>
       
  2583 	</actionbody>
       
  2584 </action>
       
  2585 
       
  2586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2588 //! @SYMREQ CIT_PREQ1054
       
  2589 //! @SYMTestPriority medium
       
  2590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2592 <action>
       
  2593 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2594 	<actiontype>DeriveKey</actiontype>
       
  2595 	<actionbody>
       
  2596 		<derivekey>
       
  2597 			<kdf>pkcs#12</kdf>
       
  2598 			<passwd>0000</passwd>
       
  2599 			<salt>53414C54</salt>
       
  2600 			<iterations>2048</iterations>
       
  2601 			<key>B0F0F2EB44</key>
       
  2602 		</derivekey>
       
  2603 	</actionbody>
       
  2604 </action>
       
  2605 
       
  2606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2608 //! @SYMREQ CIT_PREQ1054
       
  2609 //! @SYMTestPriority medium
       
  2610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2612 <action>
       
  2613 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2614 	<actiontype>DeriveKey</actiontype>
       
  2615 	<actionbody>
       
  2616 		<derivekey>
       
  2617 			<kdf>pkcs#12</kdf>
       
  2618 			<passwd>0001</passwd>
       
  2619 			<salt>53414C54</salt>
       
  2620 			<iterations>2048</iterations>
       
  2621 			<key>C11C0499CC</key>
       
  2622 		</derivekey>
       
  2623 	</actionbody>
       
  2624 </action>
       
  2625 
       
  2626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2628 //! @SYMREQ CIT_PREQ1054
       
  2629 //! @SYMTestPriority medium
       
  2630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2632 <action>
       
  2633 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2634 	<actiontype>DeriveKey</actiontype>
       
  2635 	<actionbody>
       
  2636 		<derivekey>
       
  2637 			<kdf>pkcs#12</kdf>
       
  2638 			<passwd>PSWD</passwd>
       
  2639 			<salt>53414C54</salt>
       
  2640 			<iterations>2048</iterations>
       
  2641 			<key>3F63500AC4</key>
       
  2642 		</derivekey>
       
  2643 	</actionbody>
       
  2644 </action>
       
  2645 
       
  2646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2648 //! @SYMREQ CIT_PREQ1054
       
  2649 //! @SYMTestPriority medium
       
  2650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2652 <action>
       
  2653 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2654 	<actiontype>DeriveKey</actiontype>
       
  2655 	<actionbody>
       
  2656 		<derivekey>
       
  2657 			<kdf>pkcs#12</kdf>
       
  2658 			<passwd>password</passwd>
       
  2659 			<salt>53414C54</salt>
       
  2660 			<iterations>2048</iterations>
       
  2661 			<key>B47F802F12</key>
       
  2662 		</derivekey>
       
  2663 	</actionbody>
       
  2664 </action>
       
  2665 
       
  2666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2668 //! @SYMREQ CIT_PREQ1054
       
  2669 //! @SYMTestPriority medium
       
  2670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2672 <action>
       
  2673 	<actionname>PKCS#12 KDF, key len = 40, salt len = 4</actionname>
       
  2674 	<actiontype>DeriveKey</actiontype>
       
  2675 	<actionbody>
       
  2676 		<derivekey>
       
  2677 			<kdf>pkcs#12</kdf>
       
  2678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2679 			<salt>53414C54</salt>
       
  2680 			<iterations>2048</iterations>
       
  2681 			<key>3099237692</key>
       
  2682 		</derivekey>
       
  2683 	</actionbody>
       
  2684 </action>
       
  2685 
       
  2686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2688 //! @SYMREQ CIT_PREQ1054
       
  2689 //! @SYMTestPriority medium
       
  2690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2692 <action>
       
  2693 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2694 	<actiontype>DeriveKey</actiontype>
       
  2695 	<actionbody>
       
  2696 		<derivekey>
       
  2697 			<kdf>pkcs#12</kdf>
       
  2698 			<passwd>0000</passwd>
       
  2699 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2700 			<iterations>2048</iterations>
       
  2701 			<key>CD04522946</key>
       
  2702 		</derivekey>
       
  2703 	</actionbody>
       
  2704 </action>
       
  2705 
       
  2706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2708 //! @SYMREQ CIT_PREQ1054
       
  2709 //! @SYMTestPriority medium
       
  2710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2712 <action>
       
  2713 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2714 	<actiontype>DeriveKey</actiontype>
       
  2715 	<actionbody>
       
  2716 		<derivekey>
       
  2717 			<kdf>pkcs#12</kdf>
       
  2718 			<passwd>0001</passwd>
       
  2719 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2720 			<iterations>2048</iterations>
       
  2721 			<key>D85432F8AC</key>
       
  2722 		</derivekey>
       
  2723 	</actionbody>
       
  2724 </action>
       
  2725 
       
  2726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2728 //! @SYMREQ CIT_PREQ1054
       
  2729 //! @SYMTestPriority medium
       
  2730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2732 <action>
       
  2733 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2734 	<actiontype>DeriveKey</actiontype>
       
  2735 	<actionbody>
       
  2736 		<derivekey>
       
  2737 			<kdf>pkcs#12</kdf>
       
  2738 			<passwd>PSWD</passwd>
       
  2739 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2740 			<iterations>2048</iterations>
       
  2741 			<key>C77FDE2E52</key>
       
  2742 		</derivekey>
       
  2743 	</actionbody>
       
  2744 </action>
       
  2745 
       
  2746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2748 //! @SYMREQ CIT_PREQ1054
       
  2749 //! @SYMTestPriority medium
       
  2750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2752 <action>
       
  2753 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2754 	<actiontype>DeriveKey</actiontype>
       
  2755 	<actionbody>
       
  2756 		<derivekey>
       
  2757 			<kdf>pkcs#12</kdf>
       
  2758 			<passwd>password</passwd>
       
  2759 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2760 			<iterations>2048</iterations>
       
  2761 			<key>62E06B8A26</key>
       
  2762 		</derivekey>
       
  2763 	</actionbody>
       
  2764 </action>
       
  2765 
       
  2766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2768 //! @SYMREQ CIT_PREQ1054
       
  2769 //! @SYMTestPriority medium
       
  2770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2772 <action>
       
  2773 	<actionname>PKCS#12 KDF, key len = 40, salt len = 20</actionname>
       
  2774 	<actiontype>DeriveKey</actiontype>
       
  2775 	<actionbody>
       
  2776 		<derivekey>
       
  2777 			<kdf>pkcs#12</kdf>
       
  2778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2779 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  2780 			<iterations>2048</iterations>
       
  2781 			<key>A5B348EB49</key>
       
  2782 		</derivekey>
       
  2783 	</actionbody>
       
  2784 </action>
       
  2785 
       
  2786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2788 //! @SYMREQ CIT_PREQ1054
       
  2789 //! @SYMTestPriority medium
       
  2790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2792 <action>
       
  2793 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2794 	<actiontype>DeriveKey</actiontype>
       
  2795 	<actionbody>
       
  2796 		<derivekey>
       
  2797 			<kdf>pkcs#12</kdf>
       
  2798 			<passwd>0000</passwd>
       
  2799 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2800 			<iterations>2048</iterations>
       
  2801 			<key>2A824C1B6B</key>
       
  2802 		</derivekey>
       
  2803 	</actionbody>
       
  2804 </action>
       
  2805 
       
  2806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2808 //! @SYMREQ CIT_PREQ1054
       
  2809 //! @SYMTestPriority medium
       
  2810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2812 <action>
       
  2813 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2814 	<actiontype>DeriveKey</actiontype>
       
  2815 	<actionbody>
       
  2816 		<derivekey>
       
  2817 			<kdf>pkcs#12</kdf>
       
  2818 			<passwd>0001</passwd>
       
  2819 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2820 			<iterations>2048</iterations>
       
  2821 			<key>4B8D18B96E</key>
       
  2822 		</derivekey>
       
  2823 	</actionbody>
       
  2824 </action>
       
  2825 
       
  2826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2828 //! @SYMREQ CIT_PREQ1054
       
  2829 //! @SYMTestPriority medium
       
  2830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2832 <action>
       
  2833 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2834 	<actiontype>DeriveKey</actiontype>
       
  2835 	<actionbody>
       
  2836 		<derivekey>
       
  2837 			<kdf>pkcs#12</kdf>
       
  2838 			<passwd>PSWD</passwd>
       
  2839 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2840 			<iterations>2048</iterations>
       
  2841 			<key>9DABF586AD</key>
       
  2842 		</derivekey>
       
  2843 	</actionbody>
       
  2844 </action>
       
  2845 
       
  2846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2848 //! @SYMREQ CIT_PREQ1054
       
  2849 //! @SYMTestPriority medium
       
  2850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2852 <action>
       
  2853 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2854 	<actiontype>DeriveKey</actiontype>
       
  2855 	<actionbody>
       
  2856 		<derivekey>
       
  2857 			<kdf>pkcs#12</kdf>
       
  2858 			<passwd>password</passwd>
       
  2859 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2860 			<iterations>2048</iterations>
       
  2861 			<key>F734BE1BF9</key>
       
  2862 		</derivekey>
       
  2863 	</actionbody>
       
  2864 </action>
       
  2865 
       
  2866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2868 //! @SYMREQ CIT_PREQ1054
       
  2869 //! @SYMTestPriority medium
       
  2870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2872 <action>
       
  2873 	<actionname>PKCS#12 KDF, key len = 40, salt len = 25</actionname>
       
  2874 	<actiontype>DeriveKey</actiontype>
       
  2875 	<actionbody>
       
  2876 		<derivekey>
       
  2877 			<kdf>pkcs#12</kdf>
       
  2878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2879 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  2880 			<iterations>2048</iterations>
       
  2881 			<key>47C18634A0</key>
       
  2882 		</derivekey>
       
  2883 	</actionbody>
       
  2884 </action>
       
  2885 
       
  2886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2888 //! @SYMREQ CIT_PREQ1054
       
  2889 //! @SYMTestPriority medium
       
  2890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2892 <action>
       
  2893 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  2894 	<actiontype>DeriveKey</actiontype>
       
  2895 	<actionbody>
       
  2896 		<derivekey>
       
  2897 			<kdf>pkcs#12</kdf>
       
  2898 			<passwd>0000</passwd>
       
  2899 			<salt>53414C54</salt>
       
  2900 			<iterations>1</iterations>
       
  2901 			<key>3037AFC8EACD4E2AEAB3C1E343B81DE8</key>
       
  2902 		</derivekey>
       
  2903 	</actionbody>
       
  2904 </action>
       
  2905 
       
  2906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2908 //! @SYMREQ CIT_PREQ1054
       
  2909 //! @SYMTestPriority medium
       
  2910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2912 <action>
       
  2913 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  2914 	<actiontype>DeriveKey</actiontype>
       
  2915 	<actionbody>
       
  2916 		<derivekey>
       
  2917 			<kdf>pkcs#12</kdf>
       
  2918 			<passwd>0001</passwd>
       
  2919 			<salt>53414C54</salt>
       
  2920 			<iterations>1</iterations>
       
  2921 			<key>37F44080CB10A6F7E2719CC979FE0F2E</key>
       
  2922 		</derivekey>
       
  2923 	</actionbody>
       
  2924 </action>
       
  2925 
       
  2926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2928 //! @SYMREQ CIT_PREQ1054
       
  2929 //! @SYMTestPriority medium
       
  2930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2932 <action>
       
  2933 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  2934 	<actiontype>DeriveKey</actiontype>
       
  2935 	<actionbody>
       
  2936 		<derivekey>
       
  2937 			<kdf>pkcs#12</kdf>
       
  2938 			<passwd>PSWD</passwd>
       
  2939 			<salt>53414C54</salt>
       
  2940 			<iterations>1</iterations>
       
  2941 			<key>8A18939ACF4A00A900FE2351DCBAFD0C</key>
       
  2942 		</derivekey>
       
  2943 	</actionbody>
       
  2944 </action>
       
  2945 
       
  2946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2948 //! @SYMREQ CIT_PREQ1054
       
  2949 //! @SYMTestPriority medium
       
  2950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2952 <action>
       
  2953 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  2954 	<actiontype>DeriveKey</actiontype>
       
  2955 	<actionbody>
       
  2956 		<derivekey>
       
  2957 			<kdf>pkcs#12</kdf>
       
  2958 			<passwd>password</passwd>
       
  2959 			<salt>53414C54</salt>
       
  2960 			<iterations>1</iterations>
       
  2961 			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0</key>
       
  2962 		</derivekey>
       
  2963 	</actionbody>
       
  2964 </action>
       
  2965 
       
  2966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2968 //! @SYMREQ CIT_PREQ1054
       
  2969 //! @SYMTestPriority medium
       
  2970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2972 <action>
       
  2973 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  2974 	<actiontype>DeriveKey</actiontype>
       
  2975 	<actionbody>
       
  2976 		<derivekey>
       
  2977 			<kdf>pkcs#12</kdf>
       
  2978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  2979 			<salt>53414C54</salt>
       
  2980 			<iterations>1</iterations>
       
  2981 			<key>2ED53BB2CE3C39A2F4039B734F9D94C5</key>
       
  2982 		</derivekey>
       
  2983 	</actionbody>
       
  2984 </action>
       
  2985 
       
  2986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  2987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  2988 //! @SYMREQ CIT_PREQ1054
       
  2989 //! @SYMTestPriority medium
       
  2990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  2991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  2992 <action>
       
  2993 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  2994 	<actiontype>DeriveKey</actiontype>
       
  2995 	<actionbody>
       
  2996 		<derivekey>
       
  2997 			<kdf>pkcs#12</kdf>
       
  2998 			<passwd>0000</passwd>
       
  2999 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3000 			<iterations>1</iterations>
       
  3001 			<key>49CABE7B67736931126499722509C03D</key>
       
  3002 		</derivekey>
       
  3003 	</actionbody>
       
  3004 </action>
       
  3005 
       
  3006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3008 //! @SYMREQ CIT_PREQ1054
       
  3009 //! @SYMTestPriority medium
       
  3010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3012 <action>
       
  3013 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3014 	<actiontype>DeriveKey</actiontype>
       
  3015 	<actionbody>
       
  3016 		<derivekey>
       
  3017 			<kdf>pkcs#12</kdf>
       
  3018 			<passwd>0001</passwd>
       
  3019 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3020 			<iterations>1</iterations>
       
  3021 			<key>F994B990D3554AFB778C729E9BAA0CC6</key>
       
  3022 		</derivekey>
       
  3023 	</actionbody>
       
  3024 </action>
       
  3025 
       
  3026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3028 //! @SYMREQ CIT_PREQ1054
       
  3029 //! @SYMTestPriority medium
       
  3030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3032 <action>
       
  3033 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3034 	<actiontype>DeriveKey</actiontype>
       
  3035 	<actionbody>
       
  3036 		<derivekey>
       
  3037 			<kdf>pkcs#12</kdf>
       
  3038 			<passwd>PSWD</passwd>
       
  3039 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3040 			<iterations>1</iterations>
       
  3041 			<key>1AFAAD7E51964CCD2760CCE134E1F2B8</key>
       
  3042 		</derivekey>
       
  3043 	</actionbody>
       
  3044 </action>
       
  3045 
       
  3046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3048 //! @SYMREQ CIT_PREQ1054
       
  3049 //! @SYMTestPriority medium
       
  3050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3052 <action>
       
  3053 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3054 	<actiontype>DeriveKey</actiontype>
       
  3055 	<actionbody>
       
  3056 		<derivekey>
       
  3057 			<kdf>pkcs#12</kdf>
       
  3058 			<passwd>password</passwd>
       
  3059 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3060 			<iterations>1</iterations>
       
  3061 			<key>878C91098D1F4FD0DD8CBC3A8149DF5F</key>
       
  3062 		</derivekey>
       
  3063 	</actionbody>
       
  3064 </action>
       
  3065 
       
  3066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3068 //! @SYMREQ CIT_PREQ1054
       
  3069 //! @SYMTestPriority medium
       
  3070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3072 <action>
       
  3073 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3074 	<actiontype>DeriveKey</actiontype>
       
  3075 	<actionbody>
       
  3076 		<derivekey>
       
  3077 			<kdf>pkcs#12</kdf>
       
  3078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3079 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3080 			<iterations>1</iterations>
       
  3081 			<key>0DE3F08CAF4FF556C956527AD47C3497</key>
       
  3082 		</derivekey>
       
  3083 	</actionbody>
       
  3084 </action>
       
  3085 
       
  3086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3088 //! @SYMREQ CIT_PREQ1054
       
  3089 //! @SYMTestPriority medium
       
  3090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3092 <action>
       
  3093 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3094 	<actiontype>DeriveKey</actiontype>
       
  3095 	<actionbody>
       
  3096 		<derivekey>
       
  3097 			<kdf>pkcs#12</kdf>
       
  3098 			<passwd>0000</passwd>
       
  3099 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3100 			<iterations>1</iterations>
       
  3101 			<key>90253A49C069E7FF35281461A4DDBE0B</key>
       
  3102 		</derivekey>
       
  3103 	</actionbody>
       
  3104 </action>
       
  3105 
       
  3106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3108 //! @SYMREQ CIT_PREQ1054
       
  3109 //! @SYMTestPriority medium
       
  3110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3112 <action>
       
  3113 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3114 	<actiontype>DeriveKey</actiontype>
       
  3115 	<actionbody>
       
  3116 		<derivekey>
       
  3117 			<kdf>pkcs#12</kdf>
       
  3118 			<passwd>0001</passwd>
       
  3119 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3120 			<iterations>1</iterations>
       
  3121 			<key>40BE97AB930A7E8B6DB634C93B94E699</key>
       
  3122 		</derivekey>
       
  3123 	</actionbody>
       
  3124 </action>
       
  3125 
       
  3126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3128 //! @SYMREQ CIT_PREQ1054
       
  3129 //! @SYMTestPriority medium
       
  3130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3132 <action>
       
  3133 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3134 	<actiontype>DeriveKey</actiontype>
       
  3135 	<actionbody>
       
  3136 		<derivekey>
       
  3137 			<kdf>pkcs#12</kdf>
       
  3138 			<passwd>PSWD</passwd>
       
  3139 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3140 			<iterations>1</iterations>
       
  3141 			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6</key>
       
  3142 		</derivekey>
       
  3143 	</actionbody>
       
  3144 </action>
       
  3145 
       
  3146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3148 //! @SYMREQ CIT_PREQ1054
       
  3149 //! @SYMTestPriority medium
       
  3150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3152 <action>
       
  3153 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3154 	<actiontype>DeriveKey</actiontype>
       
  3155 	<actionbody>
       
  3156 		<derivekey>
       
  3157 			<kdf>pkcs#12</kdf>
       
  3158 			<passwd>password</passwd>
       
  3159 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3160 			<iterations>1</iterations>
       
  3161 			<key>E323D5F588414AE68EF8FCA46879C1C7</key>
       
  3162 		</derivekey>
       
  3163 	</actionbody>
       
  3164 </action>
       
  3165 
       
  3166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3168 //! @SYMREQ CIT_PREQ1054
       
  3169 //! @SYMTestPriority medium
       
  3170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3172 <action>
       
  3173 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3174 	<actiontype>DeriveKey</actiontype>
       
  3175 	<actionbody>
       
  3176 		<derivekey>
       
  3177 			<kdf>pkcs#12</kdf>
       
  3178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3179 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3180 			<iterations>1</iterations>
       
  3181 			<key>27476572AF26E99AB85CD350DC802ABA</key>
       
  3182 		</derivekey>
       
  3183 	</actionbody>
       
  3184 </action>
       
  3185 
       
  3186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3188 //! @SYMREQ CIT_PREQ1054
       
  3189 //! @SYMTestPriority medium
       
  3190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3192 <action>
       
  3193 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3194 	<actiontype>DeriveKey</actiontype>
       
  3195 	<actionbody>
       
  3196 		<derivekey>
       
  3197 			<kdf>pkcs#12</kdf>
       
  3198 			<passwd>0000</passwd>
       
  3199 			<salt>53414C54</salt>
       
  3200 			<iterations>2</iterations>
       
  3201 			<key>A1D9010A6761CB2675F1C33BB3C52158</key>
       
  3202 		</derivekey>
       
  3203 	</actionbody>
       
  3204 </action>
       
  3205 
       
  3206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3208 //! @SYMREQ CIT_PREQ1054
       
  3209 //! @SYMTestPriority medium
       
  3210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3212 <action>
       
  3213 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3214 	<actiontype>DeriveKey</actiontype>
       
  3215 	<actionbody>
       
  3216 		<derivekey>
       
  3217 			<kdf>pkcs#12</kdf>
       
  3218 			<passwd>0001</passwd>
       
  3219 			<salt>53414C54</salt>
       
  3220 			<iterations>2</iterations>
       
  3221 			<key>17E4E1F15BC31052E563BFF7B5D11D15</key>
       
  3222 		</derivekey>
       
  3223 	</actionbody>
       
  3224 </action>
       
  3225 
       
  3226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3228 //! @SYMREQ CIT_PREQ1054
       
  3229 //! @SYMTestPriority medium
       
  3230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3232 <action>
       
  3233 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3234 	<actiontype>DeriveKey</actiontype>
       
  3235 	<actionbody>
       
  3236 		<derivekey>
       
  3237 			<kdf>pkcs#12</kdf>
       
  3238 			<passwd>PSWD</passwd>
       
  3239 			<salt>53414C54</salt>
       
  3240 			<iterations>2</iterations>
       
  3241 			<key>D1B71808FCCA5C97E8E52CF5E23C633C</key>
       
  3242 		</derivekey>
       
  3243 	</actionbody>
       
  3244 </action>
       
  3245 
       
  3246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3248 //! @SYMREQ CIT_PREQ1054
       
  3249 //! @SYMTestPriority medium
       
  3250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3252 <action>
       
  3253 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3254 	<actiontype>DeriveKey</actiontype>
       
  3255 	<actionbody>
       
  3256 		<derivekey>
       
  3257 			<kdf>pkcs#12</kdf>
       
  3258 			<passwd>password</passwd>
       
  3259 			<salt>53414C54</salt>
       
  3260 			<iterations>2</iterations>
       
  3261 			<key>EE7E4073F2E6008722BB9842540998C2</key>
       
  3262 		</derivekey>
       
  3263 	</actionbody>
       
  3264 </action>
       
  3265 
       
  3266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3268 //! @SYMREQ CIT_PREQ1054
       
  3269 //! @SYMTestPriority medium
       
  3270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3272 <action>
       
  3273 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3274 	<actiontype>DeriveKey</actiontype>
       
  3275 	<actionbody>
       
  3276 		<derivekey>
       
  3277 			<kdf>pkcs#12</kdf>
       
  3278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3279 			<salt>53414C54</salt>
       
  3280 			<iterations>2</iterations>
       
  3281 			<key>5BF185C726EE2182888A834066C30BA9</key>
       
  3282 		</derivekey>
       
  3283 	</actionbody>
       
  3284 </action>
       
  3285 
       
  3286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3288 //! @SYMREQ CIT_PREQ1054
       
  3289 //! @SYMTestPriority medium
       
  3290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3292 <action>
       
  3293 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3294 	<actiontype>DeriveKey</actiontype>
       
  3295 	<actionbody>
       
  3296 		<derivekey>
       
  3297 			<kdf>pkcs#12</kdf>
       
  3298 			<passwd>0000</passwd>
       
  3299 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3300 			<iterations>2</iterations>
       
  3301 			<key>72ADF5E0413FDBF6659A1E7D495BBE32</key>
       
  3302 		</derivekey>
       
  3303 	</actionbody>
       
  3304 </action>
       
  3305 
       
  3306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3308 //! @SYMREQ CIT_PREQ1054
       
  3309 //! @SYMTestPriority medium
       
  3310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3312 <action>
       
  3313 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3314 	<actiontype>DeriveKey</actiontype>
       
  3315 	<actionbody>
       
  3316 		<derivekey>
       
  3317 			<kdf>pkcs#12</kdf>
       
  3318 			<passwd>0001</passwd>
       
  3319 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3320 			<iterations>2</iterations>
       
  3321 			<key>63E6DF459C899D72577C20FFE4F27670</key>
       
  3322 		</derivekey>
       
  3323 	</actionbody>
       
  3324 </action>
       
  3325 
       
  3326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3328 //! @SYMREQ CIT_PREQ1054
       
  3329 //! @SYMTestPriority medium
       
  3330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3332 <action>
       
  3333 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3334 	<actiontype>DeriveKey</actiontype>
       
  3335 	<actionbody>
       
  3336 		<derivekey>
       
  3337 			<kdf>pkcs#12</kdf>
       
  3338 			<passwd>PSWD</passwd>
       
  3339 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3340 			<iterations>2</iterations>
       
  3341 			<key>C2099204ABFBB841875BD7595A89D31A</key>
       
  3342 		</derivekey>
       
  3343 	</actionbody>
       
  3344 </action>
       
  3345 
       
  3346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3348 //! @SYMREQ CIT_PREQ1054
       
  3349 //! @SYMTestPriority medium
       
  3350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3352 <action>
       
  3353 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3354 	<actiontype>DeriveKey</actiontype>
       
  3355 	<actionbody>
       
  3356 		<derivekey>
       
  3357 			<kdf>pkcs#12</kdf>
       
  3358 			<passwd>password</passwd>
       
  3359 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3360 			<iterations>2</iterations>
       
  3361 			<key>3204D28A32DF299B612958906C79154A</key>
       
  3362 		</derivekey>
       
  3363 	</actionbody>
       
  3364 </action>
       
  3365 
       
  3366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3368 //! @SYMREQ CIT_PREQ1054
       
  3369 //! @SYMTestPriority medium
       
  3370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3372 <action>
       
  3373 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3374 	<actiontype>DeriveKey</actiontype>
       
  3375 	<actionbody>
       
  3376 		<derivekey>
       
  3377 			<kdf>pkcs#12</kdf>
       
  3378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3379 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3380 			<iterations>2</iterations>
       
  3381 			<key>FB845F70A40E96C536641C3F797AAE39</key>
       
  3382 		</derivekey>
       
  3383 	</actionbody>
       
  3384 </action>
       
  3385 
       
  3386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3388 //! @SYMREQ CIT_PREQ1054
       
  3389 //! @SYMTestPriority medium
       
  3390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3392 <action>
       
  3393 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3394 	<actiontype>DeriveKey</actiontype>
       
  3395 	<actionbody>
       
  3396 		<derivekey>
       
  3397 			<kdf>pkcs#12</kdf>
       
  3398 			<passwd>0000</passwd>
       
  3399 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3400 			<iterations>2</iterations>
       
  3401 			<key>B9230EEC1D615A6DFEF5A8793CB06783</key>
       
  3402 		</derivekey>
       
  3403 	</actionbody>
       
  3404 </action>
       
  3405 
       
  3406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3408 //! @SYMREQ CIT_PREQ1054
       
  3409 //! @SYMTestPriority medium
       
  3410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3412 <action>
       
  3413 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3414 	<actiontype>DeriveKey</actiontype>
       
  3415 	<actionbody>
       
  3416 		<derivekey>
       
  3417 			<kdf>pkcs#12</kdf>
       
  3418 			<passwd>0001</passwd>
       
  3419 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3420 			<iterations>2</iterations>
       
  3421 			<key>462B0F2D1B18297A3F2C5E4058A0083E</key>
       
  3422 		</derivekey>
       
  3423 	</actionbody>
       
  3424 </action>
       
  3425 
       
  3426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3428 //! @SYMREQ CIT_PREQ1054
       
  3429 //! @SYMTestPriority medium
       
  3430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3432 <action>
       
  3433 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3434 	<actiontype>DeriveKey</actiontype>
       
  3435 	<actionbody>
       
  3436 		<derivekey>
       
  3437 			<kdf>pkcs#12</kdf>
       
  3438 			<passwd>PSWD</passwd>
       
  3439 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3440 			<iterations>2</iterations>
       
  3441 			<key>05B66EF1BB844470CBBB46D5F4C7DB29</key>
       
  3442 		</derivekey>
       
  3443 	</actionbody>
       
  3444 </action>
       
  3445 
       
  3446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3448 //! @SYMREQ CIT_PREQ1054
       
  3449 //! @SYMTestPriority medium
       
  3450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3452 <action>
       
  3453 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3454 	<actiontype>DeriveKey</actiontype>
       
  3455 	<actionbody>
       
  3456 		<derivekey>
       
  3457 			<kdf>pkcs#12</kdf>
       
  3458 			<passwd>password</passwd>
       
  3459 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3460 			<iterations>2</iterations>
       
  3461 			<key>C1B7E77C96BB5EE1386E8461A58F0D0C</key>
       
  3462 		</derivekey>
       
  3463 	</actionbody>
       
  3464 </action>
       
  3465 
       
  3466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3468 //! @SYMREQ CIT_PREQ1054
       
  3469 //! @SYMTestPriority medium
       
  3470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3472 <action>
       
  3473 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3474 	<actiontype>DeriveKey</actiontype>
       
  3475 	<actionbody>
       
  3476 		<derivekey>
       
  3477 			<kdf>pkcs#12</kdf>
       
  3478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3479 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3480 			<iterations>2</iterations>
       
  3481 			<key>3DE08CDACF489F30BBD75C0FF401EC02</key>
       
  3482 		</derivekey>
       
  3483 	</actionbody>
       
  3484 </action>
       
  3485 
       
  3486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3488 //! @SYMREQ CIT_PREQ1054
       
  3489 //! @SYMTestPriority medium
       
  3490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3492 <action>
       
  3493 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3494 	<actiontype>DeriveKey</actiontype>
       
  3495 	<actionbody>
       
  3496 		<derivekey>
       
  3497 			<kdf>pkcs#12</kdf>
       
  3498 			<passwd>0000</passwd>
       
  3499 			<salt>53414C54</salt>
       
  3500 			<iterations>4</iterations>
       
  3501 			<key>D0158BFC57E643965DC161741725CE94</key>
       
  3502 		</derivekey>
       
  3503 	</actionbody>
       
  3504 </action>
       
  3505 
       
  3506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3508 //! @SYMREQ CIT_PREQ1054
       
  3509 //! @SYMTestPriority medium
       
  3510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3512 <action>
       
  3513 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3514 	<actiontype>DeriveKey</actiontype>
       
  3515 	<actionbody>
       
  3516 		<derivekey>
       
  3517 			<kdf>pkcs#12</kdf>
       
  3518 			<passwd>0001</passwd>
       
  3519 			<salt>53414C54</salt>
       
  3520 			<iterations>4</iterations>
       
  3521 			<key>AEB6CD53F0D6830161100C4BFD439B34</key>
       
  3522 		</derivekey>
       
  3523 	</actionbody>
       
  3524 </action>
       
  3525 
       
  3526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3528 //! @SYMREQ CIT_PREQ1054
       
  3529 //! @SYMTestPriority medium
       
  3530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3532 <action>
       
  3533 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3534 	<actiontype>DeriveKey</actiontype>
       
  3535 	<actionbody>
       
  3536 		<derivekey>
       
  3537 			<kdf>pkcs#12</kdf>
       
  3538 			<passwd>PSWD</passwd>
       
  3539 			<salt>53414C54</salt>
       
  3540 			<iterations>4</iterations>
       
  3541 			<key>80010C12B66CC739F4ACF8BB15419770</key>
       
  3542 		</derivekey>
       
  3543 	</actionbody>
       
  3544 </action>
       
  3545 
       
  3546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3548 //! @SYMREQ CIT_PREQ1054
       
  3549 //! @SYMTestPriority medium
       
  3550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3552 <action>
       
  3553 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3554 	<actiontype>DeriveKey</actiontype>
       
  3555 	<actionbody>
       
  3556 		<derivekey>
       
  3557 			<kdf>pkcs#12</kdf>
       
  3558 			<passwd>password</passwd>
       
  3559 			<salt>53414C54</salt>
       
  3560 			<iterations>4</iterations>
       
  3561 			<key>497DE34C4C64E56AD53E5F8F6E16D1A3</key>
       
  3562 		</derivekey>
       
  3563 	</actionbody>
       
  3564 </action>
       
  3565 
       
  3566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3568 //! @SYMREQ CIT_PREQ1054
       
  3569 //! @SYMTestPriority medium
       
  3570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3572 <action>
       
  3573 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3574 	<actiontype>DeriveKey</actiontype>
       
  3575 	<actionbody>
       
  3576 		<derivekey>
       
  3577 			<kdf>pkcs#12</kdf>
       
  3578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3579 			<salt>53414C54</salt>
       
  3580 			<iterations>4</iterations>
       
  3581 			<key>146C6A5B58AF8561220DE4C13A133248</key>
       
  3582 		</derivekey>
       
  3583 	</actionbody>
       
  3584 </action>
       
  3585 
       
  3586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3588 //! @SYMREQ CIT_PREQ1054
       
  3589 //! @SYMTestPriority medium
       
  3590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3592 <action>
       
  3593 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3594 	<actiontype>DeriveKey</actiontype>
       
  3595 	<actionbody>
       
  3596 		<derivekey>
       
  3597 			<kdf>pkcs#12</kdf>
       
  3598 			<passwd>0000</passwd>
       
  3599 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3600 			<iterations>4</iterations>
       
  3601 			<key>E89772E7A52D6D8C65AAE01D0380ED59</key>
       
  3602 		</derivekey>
       
  3603 	</actionbody>
       
  3604 </action>
       
  3605 
       
  3606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3608 //! @SYMREQ CIT_PREQ1054
       
  3609 //! @SYMTestPriority medium
       
  3610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3612 <action>
       
  3613 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3614 	<actiontype>DeriveKey</actiontype>
       
  3615 	<actionbody>
       
  3616 		<derivekey>
       
  3617 			<kdf>pkcs#12</kdf>
       
  3618 			<passwd>0001</passwd>
       
  3619 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3620 			<iterations>4</iterations>
       
  3621 			<key>23930713772E26DBBABB53F3C5C77501</key>
       
  3622 		</derivekey>
       
  3623 	</actionbody>
       
  3624 </action>
       
  3625 
       
  3626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3628 //! @SYMREQ CIT_PREQ1054
       
  3629 //! @SYMTestPriority medium
       
  3630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3632 <action>
       
  3633 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3634 	<actiontype>DeriveKey</actiontype>
       
  3635 	<actionbody>
       
  3636 		<derivekey>
       
  3637 			<kdf>pkcs#12</kdf>
       
  3638 			<passwd>PSWD</passwd>
       
  3639 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3640 			<iterations>4</iterations>
       
  3641 			<key>DF2D961FE3929BBA41493EB5421FEF7C</key>
       
  3642 		</derivekey>
       
  3643 	</actionbody>
       
  3644 </action>
       
  3645 
       
  3646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3648 //! @SYMREQ CIT_PREQ1054
       
  3649 //! @SYMTestPriority medium
       
  3650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3652 <action>
       
  3653 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3654 	<actiontype>DeriveKey</actiontype>
       
  3655 	<actionbody>
       
  3656 		<derivekey>
       
  3657 			<kdf>pkcs#12</kdf>
       
  3658 			<passwd>password</passwd>
       
  3659 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3660 			<iterations>4</iterations>
       
  3661 			<key>363619530B170B7BAE1C046B29351C23</key>
       
  3662 		</derivekey>
       
  3663 	</actionbody>
       
  3664 </action>
       
  3665 
       
  3666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3668 //! @SYMREQ CIT_PREQ1054
       
  3669 //! @SYMTestPriority medium
       
  3670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3672 <action>
       
  3673 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3674 	<actiontype>DeriveKey</actiontype>
       
  3675 	<actionbody>
       
  3676 		<derivekey>
       
  3677 			<kdf>pkcs#12</kdf>
       
  3678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3679 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3680 			<iterations>4</iterations>
       
  3681 			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF</key>
       
  3682 		</derivekey>
       
  3683 	</actionbody>
       
  3684 </action>
       
  3685 
       
  3686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3688 //! @SYMREQ CIT_PREQ1054
       
  3689 //! @SYMTestPriority medium
       
  3690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3692 <action>
       
  3693 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3694 	<actiontype>DeriveKey</actiontype>
       
  3695 	<actionbody>
       
  3696 		<derivekey>
       
  3697 			<kdf>pkcs#12</kdf>
       
  3698 			<passwd>0000</passwd>
       
  3699 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3700 			<iterations>4</iterations>
       
  3701 			<key>EF50923D65A0610BDC51AD5DB1B4F4F9</key>
       
  3702 		</derivekey>
       
  3703 	</actionbody>
       
  3704 </action>
       
  3705 
       
  3706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3708 //! @SYMREQ CIT_PREQ1054
       
  3709 //! @SYMTestPriority medium
       
  3710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3712 <action>
       
  3713 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3714 	<actiontype>DeriveKey</actiontype>
       
  3715 	<actionbody>
       
  3716 		<derivekey>
       
  3717 			<kdf>pkcs#12</kdf>
       
  3718 			<passwd>0001</passwd>
       
  3719 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3720 			<iterations>4</iterations>
       
  3721 			<key>9A618595C714486B7D7E3120005C8BC1</key>
       
  3722 		</derivekey>
       
  3723 	</actionbody>
       
  3724 </action>
       
  3725 
       
  3726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3728 //! @SYMREQ CIT_PREQ1054
       
  3729 //! @SYMTestPriority medium
       
  3730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3732 <action>
       
  3733 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3734 	<actiontype>DeriveKey</actiontype>
       
  3735 	<actionbody>
       
  3736 		<derivekey>
       
  3737 			<kdf>pkcs#12</kdf>
       
  3738 			<passwd>PSWD</passwd>
       
  3739 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3740 			<iterations>4</iterations>
       
  3741 			<key>B3B33AA8A6777605E3029C0F8DC45290</key>
       
  3742 		</derivekey>
       
  3743 	</actionbody>
       
  3744 </action>
       
  3745 
       
  3746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3748 //! @SYMREQ CIT_PREQ1054
       
  3749 //! @SYMTestPriority medium
       
  3750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3752 <action>
       
  3753 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3754 	<actiontype>DeriveKey</actiontype>
       
  3755 	<actionbody>
       
  3756 		<derivekey>
       
  3757 			<kdf>pkcs#12</kdf>
       
  3758 			<passwd>password</passwd>
       
  3759 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3760 			<iterations>4</iterations>
       
  3761 			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD</key>
       
  3762 		</derivekey>
       
  3763 	</actionbody>
       
  3764 </action>
       
  3765 
       
  3766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3768 //! @SYMREQ CIT_PREQ1054
       
  3769 //! @SYMTestPriority medium
       
  3770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3772 <action>
       
  3773 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3774 	<actiontype>DeriveKey</actiontype>
       
  3775 	<actionbody>
       
  3776 		<derivekey>
       
  3777 			<kdf>pkcs#12</kdf>
       
  3778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3779 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  3780 			<iterations>4</iterations>
       
  3781 			<key>91DF3661364A0DAD28180A41ADCB5567</key>
       
  3782 		</derivekey>
       
  3783 	</actionbody>
       
  3784 </action>
       
  3785 
       
  3786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3788 //! @SYMREQ CIT_PREQ1054
       
  3789 //! @SYMTestPriority medium
       
  3790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3792 <action>
       
  3793 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3794 	<actiontype>DeriveKey</actiontype>
       
  3795 	<actionbody>
       
  3796 		<derivekey>
       
  3797 			<kdf>pkcs#12</kdf>
       
  3798 			<passwd>0000</passwd>
       
  3799 			<salt>53414C54</salt>
       
  3800 			<iterations>8</iterations>
       
  3801 			<key>9A08D3C4F584ECD1E538B7A46DCFDEA1</key>
       
  3802 		</derivekey>
       
  3803 	</actionbody>
       
  3804 </action>
       
  3805 
       
  3806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3808 //! @SYMREQ CIT_PREQ1054
       
  3809 //! @SYMTestPriority medium
       
  3810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3812 <action>
       
  3813 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3814 	<actiontype>DeriveKey</actiontype>
       
  3815 	<actionbody>
       
  3816 		<derivekey>
       
  3817 			<kdf>pkcs#12</kdf>
       
  3818 			<passwd>0001</passwd>
       
  3819 			<salt>53414C54</salt>
       
  3820 			<iterations>8</iterations>
       
  3821 			<key>33002FA0B6A5A27991A062FF6173E357</key>
       
  3822 		</derivekey>
       
  3823 	</actionbody>
       
  3824 </action>
       
  3825 
       
  3826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3828 //! @SYMREQ CIT_PREQ1054
       
  3829 //! @SYMTestPriority medium
       
  3830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3832 <action>
       
  3833 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3834 	<actiontype>DeriveKey</actiontype>
       
  3835 	<actionbody>
       
  3836 		<derivekey>
       
  3837 			<kdf>pkcs#12</kdf>
       
  3838 			<passwd>PSWD</passwd>
       
  3839 			<salt>53414C54</salt>
       
  3840 			<iterations>8</iterations>
       
  3841 			<key>22001FA26964DCD0BE3C58AB6E43557C</key>
       
  3842 		</derivekey>
       
  3843 	</actionbody>
       
  3844 </action>
       
  3845 
       
  3846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3848 //! @SYMREQ CIT_PREQ1054
       
  3849 //! @SYMTestPriority medium
       
  3850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3852 <action>
       
  3853 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3854 	<actiontype>DeriveKey</actiontype>
       
  3855 	<actionbody>
       
  3856 		<derivekey>
       
  3857 			<kdf>pkcs#12</kdf>
       
  3858 			<passwd>password</passwd>
       
  3859 			<salt>53414C54</salt>
       
  3860 			<iterations>8</iterations>
       
  3861 			<key>B0935F11227F5A473073DCD188886687</key>
       
  3862 		</derivekey>
       
  3863 	</actionbody>
       
  3864 </action>
       
  3865 
       
  3866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3868 //! @SYMREQ CIT_PREQ1054
       
  3869 //! @SYMTestPriority medium
       
  3870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3872 <action>
       
  3873 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  3874 	<actiontype>DeriveKey</actiontype>
       
  3875 	<actionbody>
       
  3876 		<derivekey>
       
  3877 			<kdf>pkcs#12</kdf>
       
  3878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3879 			<salt>53414C54</salt>
       
  3880 			<iterations>8</iterations>
       
  3881 			<key>6602B1B4BBB670208041ECD8E1634845</key>
       
  3882 		</derivekey>
       
  3883 	</actionbody>
       
  3884 </action>
       
  3885 
       
  3886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3888 //! @SYMREQ CIT_PREQ1054
       
  3889 //! @SYMTestPriority medium
       
  3890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3892 <action>
       
  3893 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3894 	<actiontype>DeriveKey</actiontype>
       
  3895 	<actionbody>
       
  3896 		<derivekey>
       
  3897 			<kdf>pkcs#12</kdf>
       
  3898 			<passwd>0000</passwd>
       
  3899 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3900 			<iterations>8</iterations>
       
  3901 			<key>3A478368DD5DC61BAA09325959A3F46C</key>
       
  3902 		</derivekey>
       
  3903 	</actionbody>
       
  3904 </action>
       
  3905 
       
  3906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3908 //! @SYMREQ CIT_PREQ1054
       
  3909 //! @SYMTestPriority medium
       
  3910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3912 <action>
       
  3913 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3914 	<actiontype>DeriveKey</actiontype>
       
  3915 	<actionbody>
       
  3916 		<derivekey>
       
  3917 			<kdf>pkcs#12</kdf>
       
  3918 			<passwd>0001</passwd>
       
  3919 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3920 			<iterations>8</iterations>
       
  3921 			<key>6473EB1244E055149E0858C49FAE7B8D</key>
       
  3922 		</derivekey>
       
  3923 	</actionbody>
       
  3924 </action>
       
  3925 
       
  3926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3928 //! @SYMREQ CIT_PREQ1054
       
  3929 //! @SYMTestPriority medium
       
  3930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3932 <action>
       
  3933 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3934 	<actiontype>DeriveKey</actiontype>
       
  3935 	<actionbody>
       
  3936 		<derivekey>
       
  3937 			<kdf>pkcs#12</kdf>
       
  3938 			<passwd>PSWD</passwd>
       
  3939 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3940 			<iterations>8</iterations>
       
  3941 			<key>AA762B8736D4C37BAD263103CA283E09</key>
       
  3942 		</derivekey>
       
  3943 	</actionbody>
       
  3944 </action>
       
  3945 
       
  3946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3948 //! @SYMREQ CIT_PREQ1054
       
  3949 //! @SYMTestPriority medium
       
  3950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3952 <action>
       
  3953 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3954 	<actiontype>DeriveKey</actiontype>
       
  3955 	<actionbody>
       
  3956 		<derivekey>
       
  3957 			<kdf>pkcs#12</kdf>
       
  3958 			<passwd>password</passwd>
       
  3959 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3960 			<iterations>8</iterations>
       
  3961 			<key>F00C5240B03C9A2324BD5FE0AEEE1B62</key>
       
  3962 		</derivekey>
       
  3963 	</actionbody>
       
  3964 </action>
       
  3965 
       
  3966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3968 //! @SYMREQ CIT_PREQ1054
       
  3969 //! @SYMTestPriority medium
       
  3970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3972 <action>
       
  3973 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  3974 	<actiontype>DeriveKey</actiontype>
       
  3975 	<actionbody>
       
  3976 		<derivekey>
       
  3977 			<kdf>pkcs#12</kdf>
       
  3978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  3979 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  3980 			<iterations>8</iterations>
       
  3981 			<key>935593CA370BB6988F2F41D2F4ABF56E</key>
       
  3982 		</derivekey>
       
  3983 	</actionbody>
       
  3984 </action>
       
  3985 
       
  3986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  3987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  3988 //! @SYMREQ CIT_PREQ1054
       
  3989 //! @SYMTestPriority medium
       
  3990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  3991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  3992 <action>
       
  3993 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  3994 	<actiontype>DeriveKey</actiontype>
       
  3995 	<actionbody>
       
  3996 		<derivekey>
       
  3997 			<kdf>pkcs#12</kdf>
       
  3998 			<passwd>0000</passwd>
       
  3999 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4000 			<iterations>8</iterations>
       
  4001 			<key>FCE1F429AEB3B9818D96B88DD25CDED9</key>
       
  4002 		</derivekey>
       
  4003 	</actionbody>
       
  4004 </action>
       
  4005 
       
  4006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4008 //! @SYMREQ CIT_PREQ1054
       
  4009 //! @SYMTestPriority medium
       
  4010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4012 <action>
       
  4013 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4014 	<actiontype>DeriveKey</actiontype>
       
  4015 	<actionbody>
       
  4016 		<derivekey>
       
  4017 			<kdf>pkcs#12</kdf>
       
  4018 			<passwd>0001</passwd>
       
  4019 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4020 			<iterations>8</iterations>
       
  4021 			<key>82B4A13659033EA4025DB51A6CB573F9</key>
       
  4022 		</derivekey>
       
  4023 	</actionbody>
       
  4024 </action>
       
  4025 
       
  4026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4028 //! @SYMREQ CIT_PREQ1054
       
  4029 //! @SYMTestPriority medium
       
  4030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4032 <action>
       
  4033 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4034 	<actiontype>DeriveKey</actiontype>
       
  4035 	<actionbody>
       
  4036 		<derivekey>
       
  4037 			<kdf>pkcs#12</kdf>
       
  4038 			<passwd>PSWD</passwd>
       
  4039 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4040 			<iterations>8</iterations>
       
  4041 			<key>45FE091D4DD2D50FA7D3340B1DB838F2</key>
       
  4042 		</derivekey>
       
  4043 	</actionbody>
       
  4044 </action>
       
  4045 
       
  4046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4048 //! @SYMREQ CIT_PREQ1054
       
  4049 //! @SYMTestPriority medium
       
  4050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4052 <action>
       
  4053 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4054 	<actiontype>DeriveKey</actiontype>
       
  4055 	<actionbody>
       
  4056 		<derivekey>
       
  4057 			<kdf>pkcs#12</kdf>
       
  4058 			<passwd>password</passwd>
       
  4059 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4060 			<iterations>8</iterations>
       
  4061 			<key>5670457314E405B0ED1583FC4B82FEAD</key>
       
  4062 		</derivekey>
       
  4063 	</actionbody>
       
  4064 </action>
       
  4065 
       
  4066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4068 //! @SYMREQ CIT_PREQ1054
       
  4069 //! @SYMTestPriority medium
       
  4070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4072 <action>
       
  4073 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4074 	<actiontype>DeriveKey</actiontype>
       
  4075 	<actionbody>
       
  4076 		<derivekey>
       
  4077 			<kdf>pkcs#12</kdf>
       
  4078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4079 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4080 			<iterations>8</iterations>
       
  4081 			<key>1C4CAE25146D74F3762B5C3FD3A91752</key>
       
  4082 		</derivekey>
       
  4083 	</actionbody>
       
  4084 </action>
       
  4085 
       
  4086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4088 //! @SYMREQ CIT_PREQ1054
       
  4089 //! @SYMTestPriority medium
       
  4090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4092 <action>
       
  4093 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4094 	<actiontype>DeriveKey</actiontype>
       
  4095 	<actionbody>
       
  4096 		<derivekey>
       
  4097 			<kdf>pkcs#12</kdf>
       
  4098 			<passwd>0000</passwd>
       
  4099 			<salt>53414C54</salt>
       
  4100 			<iterations>128</iterations>
       
  4101 			<key>8B4B3CBFB00466F63B30FEAD111E163D</key>
       
  4102 		</derivekey>
       
  4103 	</actionbody>
       
  4104 </action>
       
  4105 
       
  4106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4108 //! @SYMREQ CIT_PREQ1054
       
  4109 //! @SYMTestPriority medium
       
  4110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4112 <action>
       
  4113 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4114 	<actiontype>DeriveKey</actiontype>
       
  4115 	<actionbody>
       
  4116 		<derivekey>
       
  4117 			<kdf>pkcs#12</kdf>
       
  4118 			<passwd>0001</passwd>
       
  4119 			<salt>53414C54</salt>
       
  4120 			<iterations>128</iterations>
       
  4121 			<key>C89C3A2C9C06626EB831F4BB5262809B</key>
       
  4122 		</derivekey>
       
  4123 	</actionbody>
       
  4124 </action>
       
  4125 
       
  4126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4128 //! @SYMREQ CIT_PREQ1054
       
  4129 //! @SYMTestPriority medium
       
  4130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4132 <action>
       
  4133 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4134 	<actiontype>DeriveKey</actiontype>
       
  4135 	<actionbody>
       
  4136 		<derivekey>
       
  4137 			<kdf>pkcs#12</kdf>
       
  4138 			<passwd>PSWD</passwd>
       
  4139 			<salt>53414C54</salt>
       
  4140 			<iterations>128</iterations>
       
  4141 			<key>8109F97073FF3D286B21095E7AFBBAFA</key>
       
  4142 		</derivekey>
       
  4143 	</actionbody>
       
  4144 </action>
       
  4145 
       
  4146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4148 //! @SYMREQ CIT_PREQ1054
       
  4149 //! @SYMTestPriority medium
       
  4150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4152 <action>
       
  4153 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4154 	<actiontype>DeriveKey</actiontype>
       
  4155 	<actionbody>
       
  4156 		<derivekey>
       
  4157 			<kdf>pkcs#12</kdf>
       
  4158 			<passwd>password</passwd>
       
  4159 			<salt>53414C54</salt>
       
  4160 			<iterations>128</iterations>
       
  4161 			<key>55E985CC1581F3D0052F53DB469F6DC9</key>
       
  4162 		</derivekey>
       
  4163 	</actionbody>
       
  4164 </action>
       
  4165 
       
  4166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4168 //! @SYMREQ CIT_PREQ1054
       
  4169 //! @SYMTestPriority medium
       
  4170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4172 <action>
       
  4173 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4174 	<actiontype>DeriveKey</actiontype>
       
  4175 	<actionbody>
       
  4176 		<derivekey>
       
  4177 			<kdf>pkcs#12</kdf>
       
  4178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4179 			<salt>53414C54</salt>
       
  4180 			<iterations>128</iterations>
       
  4181 			<key>2802AA97D4C79B1813AB23F2DD710722</key>
       
  4182 		</derivekey>
       
  4183 	</actionbody>
       
  4184 </action>
       
  4185 
       
  4186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4188 //! @SYMREQ CIT_PREQ1054
       
  4189 //! @SYMTestPriority medium
       
  4190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4192 <action>
       
  4193 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4194 	<actiontype>DeriveKey</actiontype>
       
  4195 	<actionbody>
       
  4196 		<derivekey>
       
  4197 			<kdf>pkcs#12</kdf>
       
  4198 			<passwd>0000</passwd>
       
  4199 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4200 			<iterations>128</iterations>
       
  4201 			<key>881509A34D80B5AB5CEC65B859DF2D99</key>
       
  4202 		</derivekey>
       
  4203 	</actionbody>
       
  4204 </action>
       
  4205 
       
  4206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4208 //! @SYMREQ CIT_PREQ1054
       
  4209 //! @SYMTestPriority medium
       
  4210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4212 <action>
       
  4213 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4214 	<actiontype>DeriveKey</actiontype>
       
  4215 	<actionbody>
       
  4216 		<derivekey>
       
  4217 			<kdf>pkcs#12</kdf>
       
  4218 			<passwd>0001</passwd>
       
  4219 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4220 			<iterations>128</iterations>
       
  4221 			<key>B2918BC593DEC4559C279CFA050CB0F9</key>
       
  4222 		</derivekey>
       
  4223 	</actionbody>
       
  4224 </action>
       
  4225 
       
  4226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4228 //! @SYMREQ CIT_PREQ1054
       
  4229 //! @SYMTestPriority medium
       
  4230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4232 <action>
       
  4233 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4234 	<actiontype>DeriveKey</actiontype>
       
  4235 	<actionbody>
       
  4236 		<derivekey>
       
  4237 			<kdf>pkcs#12</kdf>
       
  4238 			<passwd>PSWD</passwd>
       
  4239 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4240 			<iterations>128</iterations>
       
  4241 			<key>0FE0529B45AFC9BB66323C2182DE414A</key>
       
  4242 		</derivekey>
       
  4243 	</actionbody>
       
  4244 </action>
       
  4245 
       
  4246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4248 //! @SYMREQ CIT_PREQ1054
       
  4249 //! @SYMTestPriority medium
       
  4250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4252 <action>
       
  4253 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4254 	<actiontype>DeriveKey</actiontype>
       
  4255 	<actionbody>
       
  4256 		<derivekey>
       
  4257 			<kdf>pkcs#12</kdf>
       
  4258 			<passwd>password</passwd>
       
  4259 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4260 			<iterations>128</iterations>
       
  4261 			<key>1FF923C4B1E1007EF168E4185280F818</key>
       
  4262 		</derivekey>
       
  4263 	</actionbody>
       
  4264 </action>
       
  4265 
       
  4266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4268 //! @SYMREQ CIT_PREQ1054
       
  4269 //! @SYMTestPriority medium
       
  4270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4272 <action>
       
  4273 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4274 	<actiontype>DeriveKey</actiontype>
       
  4275 	<actionbody>
       
  4276 		<derivekey>
       
  4277 			<kdf>pkcs#12</kdf>
       
  4278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4279 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4280 			<iterations>128</iterations>
       
  4281 			<key>05D1E56D04BC435A60BDE06C5AFAC9E3</key>
       
  4282 		</derivekey>
       
  4283 	</actionbody>
       
  4284 </action>
       
  4285 
       
  4286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4288 //! @SYMREQ CIT_PREQ1054
       
  4289 //! @SYMTestPriority medium
       
  4290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4292 <action>
       
  4293 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4294 	<actiontype>DeriveKey</actiontype>
       
  4295 	<actionbody>
       
  4296 		<derivekey>
       
  4297 			<kdf>pkcs#12</kdf>
       
  4298 			<passwd>0000</passwd>
       
  4299 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4300 			<iterations>128</iterations>
       
  4301 			<key>99FE149183022F9EB2EB815BCC9504E5</key>
       
  4302 		</derivekey>
       
  4303 	</actionbody>
       
  4304 </action>
       
  4305 
       
  4306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4308 //! @SYMREQ CIT_PREQ1054
       
  4309 //! @SYMTestPriority medium
       
  4310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4312 <action>
       
  4313 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4314 	<actiontype>DeriveKey</actiontype>
       
  4315 	<actionbody>
       
  4316 		<derivekey>
       
  4317 			<kdf>pkcs#12</kdf>
       
  4318 			<passwd>0001</passwd>
       
  4319 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4320 			<iterations>128</iterations>
       
  4321 			<key>79E29F3FCB3777460EC0F43D3D7048A7</key>
       
  4322 		</derivekey>
       
  4323 	</actionbody>
       
  4324 </action>
       
  4325 
       
  4326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4328 //! @SYMREQ CIT_PREQ1054
       
  4329 //! @SYMTestPriority medium
       
  4330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4332 <action>
       
  4333 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4334 	<actiontype>DeriveKey</actiontype>
       
  4335 	<actionbody>
       
  4336 		<derivekey>
       
  4337 			<kdf>pkcs#12</kdf>
       
  4338 			<passwd>PSWD</passwd>
       
  4339 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4340 			<iterations>128</iterations>
       
  4341 			<key>22A70A865774E55CF08A704356112522</key>
       
  4342 		</derivekey>
       
  4343 	</actionbody>
       
  4344 </action>
       
  4345 
       
  4346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4348 //! @SYMREQ CIT_PREQ1054
       
  4349 //! @SYMTestPriority medium
       
  4350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4352 <action>
       
  4353 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4354 	<actiontype>DeriveKey</actiontype>
       
  4355 	<actionbody>
       
  4356 		<derivekey>
       
  4357 			<kdf>pkcs#12</kdf>
       
  4358 			<passwd>password</passwd>
       
  4359 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4360 			<iterations>128</iterations>
       
  4361 			<key>9CBA922190F1659F6AA3B2B98347EEC2</key>
       
  4362 		</derivekey>
       
  4363 	</actionbody>
       
  4364 </action>
       
  4365 
       
  4366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4368 //! @SYMREQ CIT_PREQ1054
       
  4369 //! @SYMTestPriority medium
       
  4370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4372 <action>
       
  4373 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4374 	<actiontype>DeriveKey</actiontype>
       
  4375 	<actionbody>
       
  4376 		<derivekey>
       
  4377 			<kdf>pkcs#12</kdf>
       
  4378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4379 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4380 			<iterations>128</iterations>
       
  4381 			<key>A037A8B1C20DC883FAABF82D8A591B9E</key>
       
  4382 		</derivekey>
       
  4383 	</actionbody>
       
  4384 </action>
       
  4385 
       
  4386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4388 //! @SYMREQ CIT_PREQ1054
       
  4389 //! @SYMTestPriority medium
       
  4390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4392 <action>
       
  4393 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4394 	<actiontype>DeriveKey</actiontype>
       
  4395 	<actionbody>
       
  4396 		<derivekey>
       
  4397 			<kdf>pkcs#12</kdf>
       
  4398 			<passwd>0000</passwd>
       
  4399 			<salt>53414C54</salt>
       
  4400 			<iterations>1024</iterations>
       
  4401 			<key>82824BE51C81A5FF4C4268E256F6621B</key>
       
  4402 		</derivekey>
       
  4403 	</actionbody>
       
  4404 </action>
       
  4405 
       
  4406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4408 //! @SYMREQ CIT_PREQ1054
       
  4409 //! @SYMTestPriority medium
       
  4410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4412 <action>
       
  4413 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4414 	<actiontype>DeriveKey</actiontype>
       
  4415 	<actionbody>
       
  4416 		<derivekey>
       
  4417 			<kdf>pkcs#12</kdf>
       
  4418 			<passwd>0001</passwd>
       
  4419 			<salt>53414C54</salt>
       
  4420 			<iterations>1024</iterations>
       
  4421 			<key>E166049AC4E765E513AFA8A35DDBE756</key>
       
  4422 		</derivekey>
       
  4423 	</actionbody>
       
  4424 </action>
       
  4425 
       
  4426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4428 //! @SYMREQ CIT_PREQ1054
       
  4429 //! @SYMTestPriority medium
       
  4430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4432 <action>
       
  4433 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4434 	<actiontype>DeriveKey</actiontype>
       
  4435 	<actionbody>
       
  4436 		<derivekey>
       
  4437 			<kdf>pkcs#12</kdf>
       
  4438 			<passwd>PSWD</passwd>
       
  4439 			<salt>53414C54</salt>
       
  4440 			<iterations>1024</iterations>
       
  4441 			<key>90E975CC54F8BDA5A6CED39088716B27</key>
       
  4442 		</derivekey>
       
  4443 	</actionbody>
       
  4444 </action>
       
  4445 
       
  4446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4448 //! @SYMREQ CIT_PREQ1054
       
  4449 //! @SYMTestPriority medium
       
  4450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4452 <action>
       
  4453 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4454 	<actiontype>DeriveKey</actiontype>
       
  4455 	<actionbody>
       
  4456 		<derivekey>
       
  4457 			<kdf>pkcs#12</kdf>
       
  4458 			<passwd>password</passwd>
       
  4459 			<salt>53414C54</salt>
       
  4460 			<iterations>1024</iterations>
       
  4461 			<key>1FFD40D7BBA891A7E6C4DED39FB0740B</key>
       
  4462 		</derivekey>
       
  4463 	</actionbody>
       
  4464 </action>
       
  4465 
       
  4466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4468 //! @SYMREQ CIT_PREQ1054
       
  4469 //! @SYMTestPriority medium
       
  4470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4472 <action>
       
  4473 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4474 	<actiontype>DeriveKey</actiontype>
       
  4475 	<actionbody>
       
  4476 		<derivekey>
       
  4477 			<kdf>pkcs#12</kdf>
       
  4478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4479 			<salt>53414C54</salt>
       
  4480 			<iterations>1024</iterations>
       
  4481 			<key>406C92305ACD663AB0B9EB66DED79295</key>
       
  4482 		</derivekey>
       
  4483 	</actionbody>
       
  4484 </action>
       
  4485 
       
  4486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4488 //! @SYMREQ CIT_PREQ1054
       
  4489 //! @SYMTestPriority medium
       
  4490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4492 <action>
       
  4493 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4494 	<actiontype>DeriveKey</actiontype>
       
  4495 	<actionbody>
       
  4496 		<derivekey>
       
  4497 			<kdf>pkcs#12</kdf>
       
  4498 			<passwd>0000</passwd>
       
  4499 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4500 			<iterations>1024</iterations>
       
  4501 			<key>E82BD75AA9467E0B8D92362A56CB5D73</key>
       
  4502 		</derivekey>
       
  4503 	</actionbody>
       
  4504 </action>
       
  4505 
       
  4506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4508 //! @SYMREQ CIT_PREQ1054
       
  4509 //! @SYMTestPriority medium
       
  4510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4512 <action>
       
  4513 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4514 	<actiontype>DeriveKey</actiontype>
       
  4515 	<actionbody>
       
  4516 		<derivekey>
       
  4517 			<kdf>pkcs#12</kdf>
       
  4518 			<passwd>0001</passwd>
       
  4519 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4520 			<iterations>1024</iterations>
       
  4521 			<key>0182E41FCA166CEAED10972BDF5F57A8</key>
       
  4522 		</derivekey>
       
  4523 	</actionbody>
       
  4524 </action>
       
  4525 
       
  4526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4528 //! @SYMREQ CIT_PREQ1054
       
  4529 //! @SYMTestPriority medium
       
  4530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4532 <action>
       
  4533 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4534 	<actiontype>DeriveKey</actiontype>
       
  4535 	<actionbody>
       
  4536 		<derivekey>
       
  4537 			<kdf>pkcs#12</kdf>
       
  4538 			<passwd>PSWD</passwd>
       
  4539 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4540 			<iterations>1024</iterations>
       
  4541 			<key>101FB775982CA15E37A065F7CDC5593D</key>
       
  4542 		</derivekey>
       
  4543 	</actionbody>
       
  4544 </action>
       
  4545 
       
  4546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4548 //! @SYMREQ CIT_PREQ1054
       
  4549 //! @SYMTestPriority medium
       
  4550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4552 <action>
       
  4553 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4554 	<actiontype>DeriveKey</actiontype>
       
  4555 	<actionbody>
       
  4556 		<derivekey>
       
  4557 			<kdf>pkcs#12</kdf>
       
  4558 			<passwd>password</passwd>
       
  4559 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4560 			<iterations>1024</iterations>
       
  4561 			<key>D7499C6A1218C419A1F81AA5E3F41E88</key>
       
  4562 		</derivekey>
       
  4563 	</actionbody>
       
  4564 </action>
       
  4565 
       
  4566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4568 //! @SYMREQ CIT_PREQ1054
       
  4569 //! @SYMTestPriority medium
       
  4570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4572 <action>
       
  4573 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4574 	<actiontype>DeriveKey</actiontype>
       
  4575 	<actionbody>
       
  4576 		<derivekey>
       
  4577 			<kdf>pkcs#12</kdf>
       
  4578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4579 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4580 			<iterations>1024</iterations>
       
  4581 			<key>2C6222B8E2E97F63FFE9E2FC32D673FA</key>
       
  4582 		</derivekey>
       
  4583 	</actionbody>
       
  4584 </action>
       
  4585 
       
  4586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4588 //! @SYMREQ CIT_PREQ1054
       
  4589 //! @SYMTestPriority medium
       
  4590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4592 <action>
       
  4593 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4594 	<actiontype>DeriveKey</actiontype>
       
  4595 	<actionbody>
       
  4596 		<derivekey>
       
  4597 			<kdf>pkcs#12</kdf>
       
  4598 			<passwd>0000</passwd>
       
  4599 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4600 			<iterations>1024</iterations>
       
  4601 			<key>6789F0680A5C5840B8ED34B061494171</key>
       
  4602 		</derivekey>
       
  4603 	</actionbody>
       
  4604 </action>
       
  4605 
       
  4606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4608 //! @SYMREQ CIT_PREQ1054
       
  4609 //! @SYMTestPriority medium
       
  4610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4612 <action>
       
  4613 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4614 	<actiontype>DeriveKey</actiontype>
       
  4615 	<actionbody>
       
  4616 		<derivekey>
       
  4617 			<kdf>pkcs#12</kdf>
       
  4618 			<passwd>0001</passwd>
       
  4619 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4620 			<iterations>1024</iterations>
       
  4621 			<key>43E663725870C4801A917C41C9B58C41</key>
       
  4622 		</derivekey>
       
  4623 	</actionbody>
       
  4624 </action>
       
  4625 
       
  4626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4628 //! @SYMREQ CIT_PREQ1054
       
  4629 //! @SYMTestPriority medium
       
  4630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4632 <action>
       
  4633 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4634 	<actiontype>DeriveKey</actiontype>
       
  4635 	<actionbody>
       
  4636 		<derivekey>
       
  4637 			<kdf>pkcs#12</kdf>
       
  4638 			<passwd>PSWD</passwd>
       
  4639 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4640 			<iterations>1024</iterations>
       
  4641 			<key>8B3308BDD5A8AE507200EAA16FE19D42</key>
       
  4642 		</derivekey>
       
  4643 	</actionbody>
       
  4644 </action>
       
  4645 
       
  4646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4648 //! @SYMREQ CIT_PREQ1054
       
  4649 //! @SYMTestPriority medium
       
  4650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4652 <action>
       
  4653 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4654 	<actiontype>DeriveKey</actiontype>
       
  4655 	<actionbody>
       
  4656 		<derivekey>
       
  4657 			<kdf>pkcs#12</kdf>
       
  4658 			<passwd>password</passwd>
       
  4659 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4660 			<iterations>1024</iterations>
       
  4661 			<key>CA202602C9A265559B6B96729B574DAA</key>
       
  4662 		</derivekey>
       
  4663 	</actionbody>
       
  4664 </action>
       
  4665 
       
  4666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4668 //! @SYMREQ CIT_PREQ1054
       
  4669 //! @SYMTestPriority medium
       
  4670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4672 <action>
       
  4673 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4674 	<actiontype>DeriveKey</actiontype>
       
  4675 	<actionbody>
       
  4676 		<derivekey>
       
  4677 			<kdf>pkcs#12</kdf>
       
  4678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4679 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4680 			<iterations>1024</iterations>
       
  4681 			<key>F6A33ADA6A0F5990E9DA747550DE0941</key>
       
  4682 		</derivekey>
       
  4683 	</actionbody>
       
  4684 </action>
       
  4685 
       
  4686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4688 //! @SYMREQ CIT_PREQ1054
       
  4689 //! @SYMTestPriority medium
       
  4690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4692 <action>
       
  4693 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4694 	<actiontype>DeriveKey</actiontype>
       
  4695 	<actionbody>
       
  4696 		<derivekey>
       
  4697 			<kdf>pkcs#12</kdf>
       
  4698 			<passwd>0000</passwd>
       
  4699 			<salt>53414C54</salt>
       
  4700 			<iterations>1536</iterations>
       
  4701 			<key>79A4E1398F511B262E60DCFE9E838C93</key>
       
  4702 		</derivekey>
       
  4703 	</actionbody>
       
  4704 </action>
       
  4705 
       
  4706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4708 //! @SYMREQ CIT_PREQ1054
       
  4709 //! @SYMTestPriority medium
       
  4710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4712 <action>
       
  4713 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4714 	<actiontype>DeriveKey</actiontype>
       
  4715 	<actionbody>
       
  4716 		<derivekey>
       
  4717 			<kdf>pkcs#12</kdf>
       
  4718 			<passwd>0001</passwd>
       
  4719 			<salt>53414C54</salt>
       
  4720 			<iterations>1536</iterations>
       
  4721 			<key>6F2402CCE4A91C1B848CCABD915657A2</key>
       
  4722 		</derivekey>
       
  4723 	</actionbody>
       
  4724 </action>
       
  4725 
       
  4726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4728 //! @SYMREQ CIT_PREQ1054
       
  4729 //! @SYMTestPriority medium
       
  4730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4732 <action>
       
  4733 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4734 	<actiontype>DeriveKey</actiontype>
       
  4735 	<actionbody>
       
  4736 		<derivekey>
       
  4737 			<kdf>pkcs#12</kdf>
       
  4738 			<passwd>PSWD</passwd>
       
  4739 			<salt>53414C54</salt>
       
  4740 			<iterations>1536</iterations>
       
  4741 			<key>B9ED7B3135488439E78DF480AD845E7E</key>
       
  4742 		</derivekey>
       
  4743 	</actionbody>
       
  4744 </action>
       
  4745 
       
  4746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4748 //! @SYMREQ CIT_PREQ1054
       
  4749 //! @SYMTestPriority medium
       
  4750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4752 <action>
       
  4753 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4754 	<actiontype>DeriveKey</actiontype>
       
  4755 	<actionbody>
       
  4756 		<derivekey>
       
  4757 			<kdf>pkcs#12</kdf>
       
  4758 			<passwd>password</passwd>
       
  4759 			<salt>53414C54</salt>
       
  4760 			<iterations>1536</iterations>
       
  4761 			<key>65B27A78C72DFEEA6C92846330CE98C6</key>
       
  4762 		</derivekey>
       
  4763 	</actionbody>
       
  4764 </action>
       
  4765 
       
  4766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4768 //! @SYMREQ CIT_PREQ1054
       
  4769 //! @SYMTestPriority medium
       
  4770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4772 <action>
       
  4773 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4774 	<actiontype>DeriveKey</actiontype>
       
  4775 	<actionbody>
       
  4776 		<derivekey>
       
  4777 			<kdf>pkcs#12</kdf>
       
  4778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4779 			<salt>53414C54</salt>
       
  4780 			<iterations>1536</iterations>
       
  4781 			<key>8F8FC96A3D958731780B50E843D6BB65</key>
       
  4782 		</derivekey>
       
  4783 	</actionbody>
       
  4784 </action>
       
  4785 
       
  4786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4788 //! @SYMREQ CIT_PREQ1054
       
  4789 //! @SYMTestPriority medium
       
  4790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4792 <action>
       
  4793 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4794 	<actiontype>DeriveKey</actiontype>
       
  4795 	<actionbody>
       
  4796 		<derivekey>
       
  4797 			<kdf>pkcs#12</kdf>
       
  4798 			<passwd>0000</passwd>
       
  4799 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4800 			<iterations>1536</iterations>
       
  4801 			<key>642DDC3F4E11C3051D6CDED8DD898C4C</key>
       
  4802 		</derivekey>
       
  4803 	</actionbody>
       
  4804 </action>
       
  4805 
       
  4806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4808 //! @SYMREQ CIT_PREQ1054
       
  4809 //! @SYMTestPriority medium
       
  4810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4812 <action>
       
  4813 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4814 	<actiontype>DeriveKey</actiontype>
       
  4815 	<actionbody>
       
  4816 		<derivekey>
       
  4817 			<kdf>pkcs#12</kdf>
       
  4818 			<passwd>0001</passwd>
       
  4819 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4820 			<iterations>1536</iterations>
       
  4821 			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F1</key>
       
  4822 		</derivekey>
       
  4823 	</actionbody>
       
  4824 </action>
       
  4825 
       
  4826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4828 //! @SYMREQ CIT_PREQ1054
       
  4829 //! @SYMTestPriority medium
       
  4830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4832 <action>
       
  4833 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4834 	<actiontype>DeriveKey</actiontype>
       
  4835 	<actionbody>
       
  4836 		<derivekey>
       
  4837 			<kdf>pkcs#12</kdf>
       
  4838 			<passwd>PSWD</passwd>
       
  4839 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4840 			<iterations>1536</iterations>
       
  4841 			<key>32D7F10C5EAA9961B590E8FE4561B9D5</key>
       
  4842 		</derivekey>
       
  4843 	</actionbody>
       
  4844 </action>
       
  4845 
       
  4846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4848 //! @SYMREQ CIT_PREQ1054
       
  4849 //! @SYMTestPriority medium
       
  4850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4852 <action>
       
  4853 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4854 	<actiontype>DeriveKey</actiontype>
       
  4855 	<actionbody>
       
  4856 		<derivekey>
       
  4857 			<kdf>pkcs#12</kdf>
       
  4858 			<passwd>password</passwd>
       
  4859 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4860 			<iterations>1536</iterations>
       
  4861 			<key>C05FE26245C742CC01B23C655E5D934D</key>
       
  4862 		</derivekey>
       
  4863 	</actionbody>
       
  4864 </action>
       
  4865 
       
  4866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4868 //! @SYMREQ CIT_PREQ1054
       
  4869 //! @SYMTestPriority medium
       
  4870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4872 <action>
       
  4873 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  4874 	<actiontype>DeriveKey</actiontype>
       
  4875 	<actionbody>
       
  4876 		<derivekey>
       
  4877 			<kdf>pkcs#12</kdf>
       
  4878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4879 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  4880 			<iterations>1536</iterations>
       
  4881 			<key>818C967A8F742565CCA37CEA8C683FCC</key>
       
  4882 		</derivekey>
       
  4883 	</actionbody>
       
  4884 </action>
       
  4885 
       
  4886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4888 //! @SYMREQ CIT_PREQ1054
       
  4889 //! @SYMTestPriority medium
       
  4890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4892 <action>
       
  4893 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4894 	<actiontype>DeriveKey</actiontype>
       
  4895 	<actionbody>
       
  4896 		<derivekey>
       
  4897 			<kdf>pkcs#12</kdf>
       
  4898 			<passwd>0000</passwd>
       
  4899 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4900 			<iterations>1536</iterations>
       
  4901 			<key>5301B5B2A1A6EB6832DC47F3A0850B56</key>
       
  4902 		</derivekey>
       
  4903 	</actionbody>
       
  4904 </action>
       
  4905 
       
  4906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4908 //! @SYMREQ CIT_PREQ1054
       
  4909 //! @SYMTestPriority medium
       
  4910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4912 <action>
       
  4913 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4914 	<actiontype>DeriveKey</actiontype>
       
  4915 	<actionbody>
       
  4916 		<derivekey>
       
  4917 			<kdf>pkcs#12</kdf>
       
  4918 			<passwd>0001</passwd>
       
  4919 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4920 			<iterations>1536</iterations>
       
  4921 			<key>9CB5BD2394B268E13DCA91EE2BB0A39C</key>
       
  4922 		</derivekey>
       
  4923 	</actionbody>
       
  4924 </action>
       
  4925 
       
  4926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4928 //! @SYMREQ CIT_PREQ1054
       
  4929 //! @SYMTestPriority medium
       
  4930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4932 <action>
       
  4933 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4934 	<actiontype>DeriveKey</actiontype>
       
  4935 	<actionbody>
       
  4936 		<derivekey>
       
  4937 			<kdf>pkcs#12</kdf>
       
  4938 			<passwd>PSWD</passwd>
       
  4939 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4940 			<iterations>1536</iterations>
       
  4941 			<key>EB90D956B358B7C5E9FC4A4EFA02589B</key>
       
  4942 		</derivekey>
       
  4943 	</actionbody>
       
  4944 </action>
       
  4945 
       
  4946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4948 //! @SYMREQ CIT_PREQ1054
       
  4949 //! @SYMTestPriority medium
       
  4950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4952 <action>
       
  4953 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4954 	<actiontype>DeriveKey</actiontype>
       
  4955 	<actionbody>
       
  4956 		<derivekey>
       
  4957 			<kdf>pkcs#12</kdf>
       
  4958 			<passwd>password</passwd>
       
  4959 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4960 			<iterations>1536</iterations>
       
  4961 			<key>ACAFB5EB24FFB3B418587B832F52C226</key>
       
  4962 		</derivekey>
       
  4963 	</actionbody>
       
  4964 </action>
       
  4965 
       
  4966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4968 //! @SYMREQ CIT_PREQ1054
       
  4969 //! @SYMTestPriority medium
       
  4970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4972 <action>
       
  4973 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  4974 	<actiontype>DeriveKey</actiontype>
       
  4975 	<actionbody>
       
  4976 		<derivekey>
       
  4977 			<kdf>pkcs#12</kdf>
       
  4978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  4979 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  4980 			<iterations>1536</iterations>
       
  4981 			<key>A7B0859D9D1BF5E59047192BF2B8C7AC</key>
       
  4982 		</derivekey>
       
  4983 	</actionbody>
       
  4984 </action>
       
  4985 
       
  4986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  4987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  4988 //! @SYMREQ CIT_PREQ1054
       
  4989 //! @SYMTestPriority medium
       
  4990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  4991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  4992 <action>
       
  4993 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  4994 	<actiontype>DeriveKey</actiontype>
       
  4995 	<actionbody>
       
  4996 		<derivekey>
       
  4997 			<kdf>pkcs#12</kdf>
       
  4998 			<passwd>0000</passwd>
       
  4999 			<salt>53414C54</salt>
       
  5000 			<iterations>2048</iterations>
       
  5001 			<key>B0F0F2EB445AB4DBE901D3C248482259</key>
       
  5002 		</derivekey>
       
  5003 	</actionbody>
       
  5004 </action>
       
  5005 
       
  5006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5008 //! @SYMREQ CIT_PREQ1054
       
  5009 //! @SYMTestPriority medium
       
  5010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5012 <action>
       
  5013 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  5014 	<actiontype>DeriveKey</actiontype>
       
  5015 	<actionbody>
       
  5016 		<derivekey>
       
  5017 			<kdf>pkcs#12</kdf>
       
  5018 			<passwd>0001</passwd>
       
  5019 			<salt>53414C54</salt>
       
  5020 			<iterations>2048</iterations>
       
  5021 			<key>C11C0499CC9EC9FBB6ACA7BF4C0B5389</key>
       
  5022 		</derivekey>
       
  5023 	</actionbody>
       
  5024 </action>
       
  5025 
       
  5026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5028 //! @SYMREQ CIT_PREQ1054
       
  5029 //! @SYMTestPriority medium
       
  5030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5032 <action>
       
  5033 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  5034 	<actiontype>DeriveKey</actiontype>
       
  5035 	<actionbody>
       
  5036 		<derivekey>
       
  5037 			<kdf>pkcs#12</kdf>
       
  5038 			<passwd>PSWD</passwd>
       
  5039 			<salt>53414C54</salt>
       
  5040 			<iterations>2048</iterations>
       
  5041 			<key>3F63500AC41074B4D2C1A991CBBBB013</key>
       
  5042 		</derivekey>
       
  5043 	</actionbody>
       
  5044 </action>
       
  5045 
       
  5046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5048 //! @SYMREQ CIT_PREQ1054
       
  5049 //! @SYMTestPriority medium
       
  5050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5052 <action>
       
  5053 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  5054 	<actiontype>DeriveKey</actiontype>
       
  5055 	<actionbody>
       
  5056 		<derivekey>
       
  5057 			<kdf>pkcs#12</kdf>
       
  5058 			<passwd>password</passwd>
       
  5059 			<salt>53414C54</salt>
       
  5060 			<iterations>2048</iterations>
       
  5061 			<key>B47F802F1238A73054DEFD7D3AABFC81</key>
       
  5062 		</derivekey>
       
  5063 	</actionbody>
       
  5064 </action>
       
  5065 
       
  5066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5068 //! @SYMREQ CIT_PREQ1054
       
  5069 //! @SYMTestPriority medium
       
  5070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5072 <action>
       
  5073 	<actionname>PKCS#12 KDF, key len = 128, salt len = 4</actionname>
       
  5074 	<actiontype>DeriveKey</actiontype>
       
  5075 	<actionbody>
       
  5076 		<derivekey>
       
  5077 			<kdf>pkcs#12</kdf>
       
  5078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5079 			<salt>53414C54</salt>
       
  5080 			<iterations>2048</iterations>
       
  5081 			<key>3099237692953AB2017A1BF0B12DAFC8</key>
       
  5082 		</derivekey>
       
  5083 	</actionbody>
       
  5084 </action>
       
  5085 
       
  5086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5088 //! @SYMREQ CIT_PREQ1054
       
  5089 //! @SYMTestPriority medium
       
  5090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5092 <action>
       
  5093 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  5094 	<actiontype>DeriveKey</actiontype>
       
  5095 	<actionbody>
       
  5096 		<derivekey>
       
  5097 			<kdf>pkcs#12</kdf>
       
  5098 			<passwd>0000</passwd>
       
  5099 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5100 			<iterations>2048</iterations>
       
  5101 			<key>CD045229461658BC6C47C259F2D20433</key>
       
  5102 		</derivekey>
       
  5103 	</actionbody>
       
  5104 </action>
       
  5105 
       
  5106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5108 //! @SYMREQ CIT_PREQ1054
       
  5109 //! @SYMTestPriority medium
       
  5110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5112 <action>
       
  5113 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  5114 	<actiontype>DeriveKey</actiontype>
       
  5115 	<actionbody>
       
  5116 		<derivekey>
       
  5117 			<kdf>pkcs#12</kdf>
       
  5118 			<passwd>0001</passwd>
       
  5119 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5120 			<iterations>2048</iterations>
       
  5121 			<key>D85432F8ACAE9653D34A68D9329F347A</key>
       
  5122 		</derivekey>
       
  5123 	</actionbody>
       
  5124 </action>
       
  5125 
       
  5126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5128 //! @SYMREQ CIT_PREQ1054
       
  5129 //! @SYMTestPriority medium
       
  5130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5132 <action>
       
  5133 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  5134 	<actiontype>DeriveKey</actiontype>
       
  5135 	<actionbody>
       
  5136 		<derivekey>
       
  5137 			<kdf>pkcs#12</kdf>
       
  5138 			<passwd>PSWD</passwd>
       
  5139 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5140 			<iterations>2048</iterations>
       
  5141 			<key>C77FDE2E52892DF5613E6A3B8F1C80B9</key>
       
  5142 		</derivekey>
       
  5143 	</actionbody>
       
  5144 </action>
       
  5145 
       
  5146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5148 //! @SYMREQ CIT_PREQ1054
       
  5149 //! @SYMTestPriority medium
       
  5150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5152 <action>
       
  5153 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  5154 	<actiontype>DeriveKey</actiontype>
       
  5155 	<actionbody>
       
  5156 		<derivekey>
       
  5157 			<kdf>pkcs#12</kdf>
       
  5158 			<passwd>password</passwd>
       
  5159 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5160 			<iterations>2048</iterations>
       
  5161 			<key>62E06B8A2650199AE6E73AB3F503BF02</key>
       
  5162 		</derivekey>
       
  5163 	</actionbody>
       
  5164 </action>
       
  5165 
       
  5166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5168 //! @SYMREQ CIT_PREQ1054
       
  5169 //! @SYMTestPriority medium
       
  5170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5172 <action>
       
  5173 	<actionname>PKCS#12 KDF, key len = 128, salt len = 20</actionname>
       
  5174 	<actiontype>DeriveKey</actiontype>
       
  5175 	<actionbody>
       
  5176 		<derivekey>
       
  5177 			<kdf>pkcs#12</kdf>
       
  5178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5179 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5180 			<iterations>2048</iterations>
       
  5181 			<key>A5B348EB4926290B223724CC8E4ED67F</key>
       
  5182 		</derivekey>
       
  5183 	</actionbody>
       
  5184 </action>
       
  5185 
       
  5186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5188 //! @SYMREQ CIT_PREQ1054
       
  5189 //! @SYMTestPriority medium
       
  5190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5192 <action>
       
  5193 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  5194 	<actiontype>DeriveKey</actiontype>
       
  5195 	<actionbody>
       
  5196 		<derivekey>
       
  5197 			<kdf>pkcs#12</kdf>
       
  5198 			<passwd>0000</passwd>
       
  5199 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5200 			<iterations>2048</iterations>
       
  5201 			<key>2A824C1B6B36AD48D0A5AE94E27988D4</key>
       
  5202 		</derivekey>
       
  5203 	</actionbody>
       
  5204 </action>
       
  5205 
       
  5206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5208 //! @SYMREQ CIT_PREQ1054
       
  5209 //! @SYMTestPriority medium
       
  5210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5212 <action>
       
  5213 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  5214 	<actiontype>DeriveKey</actiontype>
       
  5215 	<actionbody>
       
  5216 		<derivekey>
       
  5217 			<kdf>pkcs#12</kdf>
       
  5218 			<passwd>0001</passwd>
       
  5219 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5220 			<iterations>2048</iterations>
       
  5221 			<key>4B8D18B96EB898D1BAA8BDD82BC443F0</key>
       
  5222 		</derivekey>
       
  5223 	</actionbody>
       
  5224 </action>
       
  5225 
       
  5226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5228 //! @SYMREQ CIT_PREQ1054
       
  5229 //! @SYMTestPriority medium
       
  5230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5232 <action>
       
  5233 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  5234 	<actiontype>DeriveKey</actiontype>
       
  5235 	<actionbody>
       
  5236 		<derivekey>
       
  5237 			<kdf>pkcs#12</kdf>
       
  5238 			<passwd>PSWD</passwd>
       
  5239 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5240 			<iterations>2048</iterations>
       
  5241 			<key>9DABF586AD2BCD603DC38C3987C98D73</key>
       
  5242 		</derivekey>
       
  5243 	</actionbody>
       
  5244 </action>
       
  5245 
       
  5246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5248 //! @SYMREQ CIT_PREQ1054
       
  5249 //! @SYMTestPriority medium
       
  5250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5252 <action>
       
  5253 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  5254 	<actiontype>DeriveKey</actiontype>
       
  5255 	<actionbody>
       
  5256 		<derivekey>
       
  5257 			<kdf>pkcs#12</kdf>
       
  5258 			<passwd>password</passwd>
       
  5259 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5260 			<iterations>2048</iterations>
       
  5261 			<key>F734BE1BF990A3A59CEA6C821492F0B6</key>
       
  5262 		</derivekey>
       
  5263 	</actionbody>
       
  5264 </action>
       
  5265 
       
  5266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5268 //! @SYMREQ CIT_PREQ1054
       
  5269 //! @SYMTestPriority medium
       
  5270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5272 <action>
       
  5273 	<actionname>PKCS#12 KDF, key len = 128, salt len = 25</actionname>
       
  5274 	<actiontype>DeriveKey</actiontype>
       
  5275 	<actionbody>
       
  5276 		<derivekey>
       
  5277 			<kdf>pkcs#12</kdf>
       
  5278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5279 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5280 			<iterations>2048</iterations>
       
  5281 			<key>47C18634A09AB37AB6EECBCD5C7E7F23</key>
       
  5282 		</derivekey>
       
  5283 	</actionbody>
       
  5284 </action>
       
  5285 
       
  5286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5288 //! @SYMREQ CIT_PREQ1054
       
  5289 //! @SYMTestPriority medium
       
  5290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5292 <action>
       
  5293 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5294 	<actiontype>DeriveKey</actiontype>
       
  5295 	<actionbody>
       
  5296 		<derivekey>
       
  5297 			<kdf>pkcs#12</kdf>
       
  5298 			<passwd>0000</passwd>
       
  5299 			<salt>53414C54</salt>
       
  5300 			<iterations>1</iterations>
       
  5301 			<key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7</key>
       
  5302 		</derivekey>
       
  5303 	</actionbody>
       
  5304 </action>
       
  5305 
       
  5306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5308 //! @SYMREQ CIT_PREQ1054
       
  5309 //! @SYMTestPriority medium
       
  5310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5312 <action>
       
  5313 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5314 	<actiontype>DeriveKey</actiontype>
       
  5315 	<actionbody>
       
  5316 		<derivekey>
       
  5317 			<kdf>pkcs#12</kdf>
       
  5318 			<passwd>0001</passwd>
       
  5319 			<salt>53414C54</salt>
       
  5320 			<iterations>1</iterations>
       
  5321 			<key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B</key>
       
  5322 		</derivekey>
       
  5323 	</actionbody>
       
  5324 </action>
       
  5325 
       
  5326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5328 //! @SYMREQ CIT_PREQ1054
       
  5329 //! @SYMTestPriority medium
       
  5330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5332 <action>
       
  5333 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5334 	<actiontype>DeriveKey</actiontype>
       
  5335 	<actionbody>
       
  5336 		<derivekey>
       
  5337 			<kdf>pkcs#12</kdf>
       
  5338 			<passwd>PSWD</passwd>
       
  5339 			<salt>53414C54</salt>
       
  5340 			<iterations>1</iterations>
       
  5341 			<key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB09599</key>
       
  5342 		</derivekey>
       
  5343 	</actionbody>
       
  5344 </action>
       
  5345 
       
  5346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5348 //! @SYMREQ CIT_PREQ1054
       
  5349 //! @SYMTestPriority medium
       
  5350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5352 <action>
       
  5353 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5354 	<actiontype>DeriveKey</actiontype>
       
  5355 	<actionbody>
       
  5356 		<derivekey>
       
  5357 			<kdf>pkcs#12</kdf>
       
  5358 			<passwd>password</passwd>
       
  5359 			<salt>53414C54</salt>
       
  5360 			<iterations>1</iterations>
       
  5361 			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C5</key>
       
  5362 		</derivekey>
       
  5363 	</actionbody>
       
  5364 </action>
       
  5365 
       
  5366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5368 //! @SYMREQ CIT_PREQ1054
       
  5369 //! @SYMTestPriority medium
       
  5370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5372 <action>
       
  5373 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5374 	<actiontype>DeriveKey</actiontype>
       
  5375 	<actionbody>
       
  5376 		<derivekey>
       
  5377 			<kdf>pkcs#12</kdf>
       
  5378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5379 			<salt>53414C54</salt>
       
  5380 			<iterations>1</iterations>
       
  5381 			<key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A</key>
       
  5382 		</derivekey>
       
  5383 	</actionbody>
       
  5384 </action>
       
  5385 
       
  5386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5388 //! @SYMREQ CIT_PREQ1054
       
  5389 //! @SYMTestPriority medium
       
  5390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5392 <action>
       
  5393 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5394 	<actiontype>DeriveKey</actiontype>
       
  5395 	<actionbody>
       
  5396 		<derivekey>
       
  5397 			<kdf>pkcs#12</kdf>
       
  5398 			<passwd>0000</passwd>
       
  5399 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5400 			<iterations>1</iterations>
       
  5401 			<key>49CABE7B67736931126499722509C03D4BBEF714A8</key>
       
  5402 		</derivekey>
       
  5403 	</actionbody>
       
  5404 </action>
       
  5405 
       
  5406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5408 //! @SYMREQ CIT_PREQ1054
       
  5409 //! @SYMTestPriority medium
       
  5410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5412 <action>
       
  5413 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5414 	<actiontype>DeriveKey</actiontype>
       
  5415 	<actionbody>
       
  5416 		<derivekey>
       
  5417 			<kdf>pkcs#12</kdf>
       
  5418 			<passwd>0001</passwd>
       
  5419 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5420 			<iterations>1</iterations>
       
  5421 			<key>F994B990D3554AFB778C729E9BAA0CC6EB5BA76534</key>
       
  5422 		</derivekey>
       
  5423 	</actionbody>
       
  5424 </action>
       
  5425 
       
  5426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5428 //! @SYMREQ CIT_PREQ1054
       
  5429 //! @SYMTestPriority medium
       
  5430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5432 <action>
       
  5433 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5434 	<actiontype>DeriveKey</actiontype>
       
  5435 	<actionbody>
       
  5436 		<derivekey>
       
  5437 			<kdf>pkcs#12</kdf>
       
  5438 			<passwd>PSWD</passwd>
       
  5439 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5440 			<iterations>1</iterations>
       
  5441 			<key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC024</key>
       
  5442 		</derivekey>
       
  5443 	</actionbody>
       
  5444 </action>
       
  5445 
       
  5446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5448 //! @SYMREQ CIT_PREQ1054
       
  5449 //! @SYMTestPriority medium
       
  5450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5452 <action>
       
  5453 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5454 	<actiontype>DeriveKey</actiontype>
       
  5455 	<actionbody>
       
  5456 		<derivekey>
       
  5457 			<kdf>pkcs#12</kdf>
       
  5458 			<passwd>password</passwd>
       
  5459 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5460 			<iterations>1</iterations>
       
  5461 			<key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888</key>
       
  5462 		</derivekey>
       
  5463 	</actionbody>
       
  5464 </action>
       
  5465 
       
  5466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5468 //! @SYMREQ CIT_PREQ1054
       
  5469 //! @SYMTestPriority medium
       
  5470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5472 <action>
       
  5473 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5474 	<actiontype>DeriveKey</actiontype>
       
  5475 	<actionbody>
       
  5476 		<derivekey>
       
  5477 			<kdf>pkcs#12</kdf>
       
  5478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5479 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5480 			<iterations>1</iterations>
       
  5481 			<key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B</key>
       
  5482 		</derivekey>
       
  5483 	</actionbody>
       
  5484 </action>
       
  5485 
       
  5486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5488 //! @SYMREQ CIT_PREQ1054
       
  5489 //! @SYMTestPriority medium
       
  5490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5492 <action>
       
  5493 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5494 	<actiontype>DeriveKey</actiontype>
       
  5495 	<actionbody>
       
  5496 		<derivekey>
       
  5497 			<kdf>pkcs#12</kdf>
       
  5498 			<passwd>0000</passwd>
       
  5499 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5500 			<iterations>1</iterations>
       
  5501 			<key>90253A49C069E7FF35281461A4DDBE0BB38F4041A0</key>
       
  5502 		</derivekey>
       
  5503 	</actionbody>
       
  5504 </action>
       
  5505 
       
  5506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5508 //! @SYMREQ CIT_PREQ1054
       
  5509 //! @SYMTestPriority medium
       
  5510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5512 <action>
       
  5513 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5514 	<actiontype>DeriveKey</actiontype>
       
  5515 	<actionbody>
       
  5516 		<derivekey>
       
  5517 			<kdf>pkcs#12</kdf>
       
  5518 			<passwd>0001</passwd>
       
  5519 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5520 			<iterations>1</iterations>
       
  5521 			<key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8</key>
       
  5522 		</derivekey>
       
  5523 	</actionbody>
       
  5524 </action>
       
  5525 
       
  5526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5528 //! @SYMREQ CIT_PREQ1054
       
  5529 //! @SYMTestPriority medium
       
  5530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5532 <action>
       
  5533 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5534 	<actiontype>DeriveKey</actiontype>
       
  5535 	<actionbody>
       
  5536 		<derivekey>
       
  5537 			<kdf>pkcs#12</kdf>
       
  5538 			<passwd>PSWD</passwd>
       
  5539 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5540 			<iterations>1</iterations>
       
  5541 			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC8</key>
       
  5542 		</derivekey>
       
  5543 	</actionbody>
       
  5544 </action>
       
  5545 
       
  5546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5548 //! @SYMREQ CIT_PREQ1054
       
  5549 //! @SYMTestPriority medium
       
  5550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5552 <action>
       
  5553 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5554 	<actiontype>DeriveKey</actiontype>
       
  5555 	<actionbody>
       
  5556 		<derivekey>
       
  5557 			<kdf>pkcs#12</kdf>
       
  5558 			<passwd>password</passwd>
       
  5559 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5560 			<iterations>1</iterations>
       
  5561 			<key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C1</key>
       
  5562 		</derivekey>
       
  5563 	</actionbody>
       
  5564 </action>
       
  5565 
       
  5566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5568 //! @SYMREQ CIT_PREQ1054
       
  5569 //! @SYMTestPriority medium
       
  5570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5572 <action>
       
  5573 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5574 	<actiontype>DeriveKey</actiontype>
       
  5575 	<actionbody>
       
  5576 		<derivekey>
       
  5577 			<kdf>pkcs#12</kdf>
       
  5578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5579 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5580 			<iterations>1</iterations>
       
  5581 			<key>27476572AF26E99AB85CD350DC802ABA3A831332A7</key>
       
  5582 		</derivekey>
       
  5583 	</actionbody>
       
  5584 </action>
       
  5585 
       
  5586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5588 //! @SYMREQ CIT_PREQ1054
       
  5589 //! @SYMTestPriority medium
       
  5590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5592 <action>
       
  5593 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5594 	<actiontype>DeriveKey</actiontype>
       
  5595 	<actionbody>
       
  5596 		<derivekey>
       
  5597 			<kdf>pkcs#12</kdf>
       
  5598 			<passwd>0000</passwd>
       
  5599 			<salt>53414C54</salt>
       
  5600 			<iterations>2</iterations>
       
  5601 			<key>A1D9010A6761CB2675F1C33BB3C5215851703D0D26</key>
       
  5602 		</derivekey>
       
  5603 	</actionbody>
       
  5604 </action>
       
  5605 
       
  5606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5608 //! @SYMREQ CIT_PREQ1054
       
  5609 //! @SYMTestPriority medium
       
  5610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5612 <action>
       
  5613 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5614 	<actiontype>DeriveKey</actiontype>
       
  5615 	<actionbody>
       
  5616 		<derivekey>
       
  5617 			<kdf>pkcs#12</kdf>
       
  5618 			<passwd>0001</passwd>
       
  5619 			<salt>53414C54</salt>
       
  5620 			<iterations>2</iterations>
       
  5621 			<key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47</key>
       
  5622 		</derivekey>
       
  5623 	</actionbody>
       
  5624 </action>
       
  5625 
       
  5626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5628 //! @SYMREQ CIT_PREQ1054
       
  5629 //! @SYMTestPriority medium
       
  5630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5632 <action>
       
  5633 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5634 	<actiontype>DeriveKey</actiontype>
       
  5635 	<actionbody>
       
  5636 		<derivekey>
       
  5637 			<kdf>pkcs#12</kdf>
       
  5638 			<passwd>PSWD</passwd>
       
  5639 			<salt>53414C54</salt>
       
  5640 			<iterations>2</iterations>
       
  5641 			<key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE3</key>
       
  5642 		</derivekey>
       
  5643 	</actionbody>
       
  5644 </action>
       
  5645 
       
  5646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5648 //! @SYMREQ CIT_PREQ1054
       
  5649 //! @SYMTestPriority medium
       
  5650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5652 <action>
       
  5653 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5654 	<actiontype>DeriveKey</actiontype>
       
  5655 	<actionbody>
       
  5656 		<derivekey>
       
  5657 			<kdf>pkcs#12</kdf>
       
  5658 			<passwd>password</passwd>
       
  5659 			<salt>53414C54</salt>
       
  5660 			<iterations>2</iterations>
       
  5661 			<key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A</key>
       
  5662 		</derivekey>
       
  5663 	</actionbody>
       
  5664 </action>
       
  5665 
       
  5666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5668 //! @SYMREQ CIT_PREQ1054
       
  5669 //! @SYMTestPriority medium
       
  5670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5672 <action>
       
  5673 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5674 	<actiontype>DeriveKey</actiontype>
       
  5675 	<actionbody>
       
  5676 		<derivekey>
       
  5677 			<kdf>pkcs#12</kdf>
       
  5678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5679 			<salt>53414C54</salt>
       
  5680 			<iterations>2</iterations>
       
  5681 			<key>5BF185C726EE2182888A834066C30BA92C0A6A140F</key>
       
  5682 		</derivekey>
       
  5683 	</actionbody>
       
  5684 </action>
       
  5685 
       
  5686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5688 //! @SYMREQ CIT_PREQ1054
       
  5689 //! @SYMTestPriority medium
       
  5690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5692 <action>
       
  5693 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5694 	<actiontype>DeriveKey</actiontype>
       
  5695 	<actionbody>
       
  5696 		<derivekey>
       
  5697 			<kdf>pkcs#12</kdf>
       
  5698 			<passwd>0000</passwd>
       
  5699 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5700 			<iterations>2</iterations>
       
  5701 			<key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734</key>
       
  5702 		</derivekey>
       
  5703 	</actionbody>
       
  5704 </action>
       
  5705 
       
  5706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5708 //! @SYMREQ CIT_PREQ1054
       
  5709 //! @SYMTestPriority medium
       
  5710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5712 <action>
       
  5713 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5714 	<actiontype>DeriveKey</actiontype>
       
  5715 	<actionbody>
       
  5716 		<derivekey>
       
  5717 			<kdf>pkcs#12</kdf>
       
  5718 			<passwd>0001</passwd>
       
  5719 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5720 			<iterations>2</iterations>
       
  5721 			<key>63E6DF459C899D72577C20FFE4F27670F3A85EA780</key>
       
  5722 		</derivekey>
       
  5723 	</actionbody>
       
  5724 </action>
       
  5725 
       
  5726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5728 //! @SYMREQ CIT_PREQ1054
       
  5729 //! @SYMTestPriority medium
       
  5730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5732 <action>
       
  5733 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5734 	<actiontype>DeriveKey</actiontype>
       
  5735 	<actionbody>
       
  5736 		<derivekey>
       
  5737 			<kdf>pkcs#12</kdf>
       
  5738 			<passwd>PSWD</passwd>
       
  5739 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5740 			<iterations>2</iterations>
       
  5741 			<key>C2099204ABFBB841875BD7595A89D31A9D03A34B94</key>
       
  5742 		</derivekey>
       
  5743 	</actionbody>
       
  5744 </action>
       
  5745 
       
  5746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5748 //! @SYMREQ CIT_PREQ1054
       
  5749 //! @SYMTestPriority medium
       
  5750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5752 <action>
       
  5753 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5754 	<actiontype>DeriveKey</actiontype>
       
  5755 	<actionbody>
       
  5756 		<derivekey>
       
  5757 			<kdf>pkcs#12</kdf>
       
  5758 			<passwd>password</passwd>
       
  5759 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5760 			<iterations>2</iterations>
       
  5761 			<key>3204D28A32DF299B612958906C79154AED69D3F1C0</key>
       
  5762 		</derivekey>
       
  5763 	</actionbody>
       
  5764 </action>
       
  5765 
       
  5766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5768 //! @SYMREQ CIT_PREQ1054
       
  5769 //! @SYMTestPriority medium
       
  5770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5772 <action>
       
  5773 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5774 	<actiontype>DeriveKey</actiontype>
       
  5775 	<actionbody>
       
  5776 		<derivekey>
       
  5777 			<kdf>pkcs#12</kdf>
       
  5778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5779 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  5780 			<iterations>2</iterations>
       
  5781 			<key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04</key>
       
  5782 		</derivekey>
       
  5783 	</actionbody>
       
  5784 </action>
       
  5785 
       
  5786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5788 //! @SYMREQ CIT_PREQ1054
       
  5789 //! @SYMTestPriority medium
       
  5790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5792 <action>
       
  5793 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5794 	<actiontype>DeriveKey</actiontype>
       
  5795 	<actionbody>
       
  5796 		<derivekey>
       
  5797 			<kdf>pkcs#12</kdf>
       
  5798 			<passwd>0000</passwd>
       
  5799 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5800 			<iterations>2</iterations>
       
  5801 			<key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11</key>
       
  5802 		</derivekey>
       
  5803 	</actionbody>
       
  5804 </action>
       
  5805 
       
  5806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5808 //! @SYMREQ CIT_PREQ1054
       
  5809 //! @SYMTestPriority medium
       
  5810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5812 <action>
       
  5813 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5814 	<actiontype>DeriveKey</actiontype>
       
  5815 	<actionbody>
       
  5816 		<derivekey>
       
  5817 			<kdf>pkcs#12</kdf>
       
  5818 			<passwd>0001</passwd>
       
  5819 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5820 			<iterations>2</iterations>
       
  5821 			<key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC</key>
       
  5822 		</derivekey>
       
  5823 	</actionbody>
       
  5824 </action>
       
  5825 
       
  5826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5828 //! @SYMREQ CIT_PREQ1054
       
  5829 //! @SYMTestPriority medium
       
  5830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5832 <action>
       
  5833 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5834 	<actiontype>DeriveKey</actiontype>
       
  5835 	<actionbody>
       
  5836 		<derivekey>
       
  5837 			<kdf>pkcs#12</kdf>
       
  5838 			<passwd>PSWD</passwd>
       
  5839 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5840 			<iterations>2</iterations>
       
  5841 			<key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F</key>
       
  5842 		</derivekey>
       
  5843 	</actionbody>
       
  5844 </action>
       
  5845 
       
  5846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5848 //! @SYMREQ CIT_PREQ1054
       
  5849 //! @SYMTestPriority medium
       
  5850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5852 <action>
       
  5853 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5854 	<actiontype>DeriveKey</actiontype>
       
  5855 	<actionbody>
       
  5856 		<derivekey>
       
  5857 			<kdf>pkcs#12</kdf>
       
  5858 			<passwd>password</passwd>
       
  5859 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5860 			<iterations>2</iterations>
       
  5861 			<key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDF</key>
       
  5862 		</derivekey>
       
  5863 	</actionbody>
       
  5864 </action>
       
  5865 
       
  5866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5868 //! @SYMREQ CIT_PREQ1054
       
  5869 //! @SYMTestPriority medium
       
  5870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5872 <action>
       
  5873 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  5874 	<actiontype>DeriveKey</actiontype>
       
  5875 	<actionbody>
       
  5876 		<derivekey>
       
  5877 			<kdf>pkcs#12</kdf>
       
  5878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5879 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  5880 			<iterations>2</iterations>
       
  5881 			<key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647</key>
       
  5882 		</derivekey>
       
  5883 	</actionbody>
       
  5884 </action>
       
  5885 
       
  5886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5888 //! @SYMREQ CIT_PREQ1054
       
  5889 //! @SYMTestPriority medium
       
  5890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5892 <action>
       
  5893 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5894 	<actiontype>DeriveKey</actiontype>
       
  5895 	<actionbody>
       
  5896 		<derivekey>
       
  5897 			<kdf>pkcs#12</kdf>
       
  5898 			<passwd>0000</passwd>
       
  5899 			<salt>53414C54</salt>
       
  5900 			<iterations>4</iterations>
       
  5901 			<key>D0158BFC57E643965DC161741725CE9478CDF2A0B5</key>
       
  5902 		</derivekey>
       
  5903 	</actionbody>
       
  5904 </action>
       
  5905 
       
  5906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5908 //! @SYMREQ CIT_PREQ1054
       
  5909 //! @SYMTestPriority medium
       
  5910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5912 <action>
       
  5913 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5914 	<actiontype>DeriveKey</actiontype>
       
  5915 	<actionbody>
       
  5916 		<derivekey>
       
  5917 			<kdf>pkcs#12</kdf>
       
  5918 			<passwd>0001</passwd>
       
  5919 			<salt>53414C54</salt>
       
  5920 			<iterations>4</iterations>
       
  5921 			<key>AEB6CD53F0D6830161100C4BFD439B341066339A00</key>
       
  5922 		</derivekey>
       
  5923 	</actionbody>
       
  5924 </action>
       
  5925 
       
  5926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5928 //! @SYMREQ CIT_PREQ1054
       
  5929 //! @SYMTestPriority medium
       
  5930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5932 <action>
       
  5933 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5934 	<actiontype>DeriveKey</actiontype>
       
  5935 	<actionbody>
       
  5936 		<derivekey>
       
  5937 			<kdf>pkcs#12</kdf>
       
  5938 			<passwd>PSWD</passwd>
       
  5939 			<salt>53414C54</salt>
       
  5940 			<iterations>4</iterations>
       
  5941 			<key>80010C12B66CC739F4ACF8BB154197709F78AAD39A</key>
       
  5942 		</derivekey>
       
  5943 	</actionbody>
       
  5944 </action>
       
  5945 
       
  5946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5948 //! @SYMREQ CIT_PREQ1054
       
  5949 //! @SYMTestPriority medium
       
  5950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5952 <action>
       
  5953 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5954 	<actiontype>DeriveKey</actiontype>
       
  5955 	<actionbody>
       
  5956 		<derivekey>
       
  5957 			<kdf>pkcs#12</kdf>
       
  5958 			<passwd>password</passwd>
       
  5959 			<salt>53414C54</salt>
       
  5960 			<iterations>4</iterations>
       
  5961 			<key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812</key>
       
  5962 		</derivekey>
       
  5963 	</actionbody>
       
  5964 </action>
       
  5965 
       
  5966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5968 //! @SYMREQ CIT_PREQ1054
       
  5969 //! @SYMTestPriority medium
       
  5970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5972 <action>
       
  5973 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  5974 	<actiontype>DeriveKey</actiontype>
       
  5975 	<actionbody>
       
  5976 		<derivekey>
       
  5977 			<kdf>pkcs#12</kdf>
       
  5978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  5979 			<salt>53414C54</salt>
       
  5980 			<iterations>4</iterations>
       
  5981 			<key>146C6A5B58AF8561220DE4C13A133248300D59D39E</key>
       
  5982 		</derivekey>
       
  5983 	</actionbody>
       
  5984 </action>
       
  5985 
       
  5986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  5987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  5988 //! @SYMREQ CIT_PREQ1054
       
  5989 //! @SYMTestPriority medium
       
  5990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  5991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  5992 <action>
       
  5993 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  5994 	<actiontype>DeriveKey</actiontype>
       
  5995 	<actionbody>
       
  5996 		<derivekey>
       
  5997 			<kdf>pkcs#12</kdf>
       
  5998 			<passwd>0000</passwd>
       
  5999 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6000 			<iterations>4</iterations>
       
  6001 			<key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE</key>
       
  6002 		</derivekey>
       
  6003 	</actionbody>
       
  6004 </action>
       
  6005 
       
  6006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6008 //! @SYMREQ CIT_PREQ1054
       
  6009 //! @SYMTestPriority medium
       
  6010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6012 <action>
       
  6013 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6014 	<actiontype>DeriveKey</actiontype>
       
  6015 	<actionbody>
       
  6016 		<derivekey>
       
  6017 			<kdf>pkcs#12</kdf>
       
  6018 			<passwd>0001</passwd>
       
  6019 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6020 			<iterations>4</iterations>
       
  6021 			<key>23930713772E26DBBABB53F3C5C775019B8048482B</key>
       
  6022 		</derivekey>
       
  6023 	</actionbody>
       
  6024 </action>
       
  6025 
       
  6026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6028 //! @SYMREQ CIT_PREQ1054
       
  6029 //! @SYMTestPriority medium
       
  6030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6032 <action>
       
  6033 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6034 	<actiontype>DeriveKey</actiontype>
       
  6035 	<actionbody>
       
  6036 		<derivekey>
       
  6037 			<kdf>pkcs#12</kdf>
       
  6038 			<passwd>PSWD</passwd>
       
  6039 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6040 			<iterations>4</iterations>
       
  6041 			<key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A</key>
       
  6042 		</derivekey>
       
  6043 	</actionbody>
       
  6044 </action>
       
  6045 
       
  6046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6048 //! @SYMREQ CIT_PREQ1054
       
  6049 //! @SYMTestPriority medium
       
  6050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6052 <action>
       
  6053 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6054 	<actiontype>DeriveKey</actiontype>
       
  6055 	<actionbody>
       
  6056 		<derivekey>
       
  6057 			<kdf>pkcs#12</kdf>
       
  6058 			<passwd>password</passwd>
       
  6059 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6060 			<iterations>4</iterations>
       
  6061 			<key>363619530B170B7BAE1C046B29351C235B8EFED588</key>
       
  6062 		</derivekey>
       
  6063 	</actionbody>
       
  6064 </action>
       
  6065 
       
  6066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6068 //! @SYMREQ CIT_PREQ1054
       
  6069 //! @SYMTestPriority medium
       
  6070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6072 <action>
       
  6073 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6074 	<actiontype>DeriveKey</actiontype>
       
  6075 	<actionbody>
       
  6076 		<derivekey>
       
  6077 			<kdf>pkcs#12</kdf>
       
  6078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6079 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6080 			<iterations>4</iterations>
       
  6081 			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4E</key>
       
  6082 		</derivekey>
       
  6083 	</actionbody>
       
  6084 </action>
       
  6085 
       
  6086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6088 //! @SYMREQ CIT_PREQ1054
       
  6089 //! @SYMTestPriority medium
       
  6090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6092 <action>
       
  6093 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6094 	<actiontype>DeriveKey</actiontype>
       
  6095 	<actionbody>
       
  6096 		<derivekey>
       
  6097 			<kdf>pkcs#12</kdf>
       
  6098 			<passwd>0000</passwd>
       
  6099 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6100 			<iterations>4</iterations>
       
  6101 			<key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0E</key>
       
  6102 		</derivekey>
       
  6103 	</actionbody>
       
  6104 </action>
       
  6105 
       
  6106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6108 //! @SYMREQ CIT_PREQ1054
       
  6109 //! @SYMTestPriority medium
       
  6110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6112 <action>
       
  6113 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6114 	<actiontype>DeriveKey</actiontype>
       
  6115 	<actionbody>
       
  6116 		<derivekey>
       
  6117 			<kdf>pkcs#12</kdf>
       
  6118 			<passwd>0001</passwd>
       
  6119 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6120 			<iterations>4</iterations>
       
  6121 			<key>9A618595C714486B7D7E3120005C8BC18D5D95D79B</key>
       
  6122 		</derivekey>
       
  6123 	</actionbody>
       
  6124 </action>
       
  6125 
       
  6126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6128 //! @SYMREQ CIT_PREQ1054
       
  6129 //! @SYMTestPriority medium
       
  6130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6132 <action>
       
  6133 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6134 	<actiontype>DeriveKey</actiontype>
       
  6135 	<actionbody>
       
  6136 		<derivekey>
       
  6137 			<kdf>pkcs#12</kdf>
       
  6138 			<passwd>PSWD</passwd>
       
  6139 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6140 			<iterations>4</iterations>
       
  6141 			<key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208</key>
       
  6142 		</derivekey>
       
  6143 	</actionbody>
       
  6144 </action>
       
  6145 
       
  6146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6148 //! @SYMREQ CIT_PREQ1054
       
  6149 //! @SYMTestPriority medium
       
  6150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6152 <action>
       
  6153 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6154 	<actiontype>DeriveKey</actiontype>
       
  6155 	<actionbody>
       
  6156 		<derivekey>
       
  6157 			<kdf>pkcs#12</kdf>
       
  6158 			<passwd>password</passwd>
       
  6159 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6160 			<iterations>4</iterations>
       
  6161 			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2</key>
       
  6162 		</derivekey>
       
  6163 	</actionbody>
       
  6164 </action>
       
  6165 
       
  6166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6168 //! @SYMREQ CIT_PREQ1054
       
  6169 //! @SYMTestPriority medium
       
  6170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6172 <action>
       
  6173 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6174 	<actiontype>DeriveKey</actiontype>
       
  6175 	<actionbody>
       
  6176 		<derivekey>
       
  6177 			<kdf>pkcs#12</kdf>
       
  6178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6179 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6180 			<iterations>4</iterations>
       
  6181 			<key>91DF3661364A0DAD28180A41ADCB55676E992986EF</key>
       
  6182 		</derivekey>
       
  6183 	</actionbody>
       
  6184 </action>
       
  6185 
       
  6186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6188 //! @SYMREQ CIT_PREQ1054
       
  6189 //! @SYMTestPriority medium
       
  6190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6192 <action>
       
  6193 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6194 	<actiontype>DeriveKey</actiontype>
       
  6195 	<actionbody>
       
  6196 		<derivekey>
       
  6197 			<kdf>pkcs#12</kdf>
       
  6198 			<passwd>0000</passwd>
       
  6199 			<salt>53414C54</salt>
       
  6200 			<iterations>8</iterations>
       
  6201 			<key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE461</key>
       
  6202 		</derivekey>
       
  6203 	</actionbody>
       
  6204 </action>
       
  6205 
       
  6206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6208 //! @SYMREQ CIT_PREQ1054
       
  6209 //! @SYMTestPriority medium
       
  6210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6212 <action>
       
  6213 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6214 	<actiontype>DeriveKey</actiontype>
       
  6215 	<actionbody>
       
  6216 		<derivekey>
       
  6217 			<kdf>pkcs#12</kdf>
       
  6218 			<passwd>0001</passwd>
       
  6219 			<salt>53414C54</salt>
       
  6220 			<iterations>8</iterations>
       
  6221 			<key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1</key>
       
  6222 		</derivekey>
       
  6223 	</actionbody>
       
  6224 </action>
       
  6225 
       
  6226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6228 //! @SYMREQ CIT_PREQ1054
       
  6229 //! @SYMTestPriority medium
       
  6230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6232 <action>
       
  6233 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6234 	<actiontype>DeriveKey</actiontype>
       
  6235 	<actionbody>
       
  6236 		<derivekey>
       
  6237 			<kdf>pkcs#12</kdf>
       
  6238 			<passwd>PSWD</passwd>
       
  6239 			<salt>53414C54</salt>
       
  6240 			<iterations>8</iterations>
       
  6241 			<key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466</key>
       
  6242 		</derivekey>
       
  6243 	</actionbody>
       
  6244 </action>
       
  6245 
       
  6246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6248 //! @SYMREQ CIT_PREQ1054
       
  6249 //! @SYMTestPriority medium
       
  6250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6252 <action>
       
  6253 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6254 	<actiontype>DeriveKey</actiontype>
       
  6255 	<actionbody>
       
  6256 		<derivekey>
       
  6257 			<kdf>pkcs#12</kdf>
       
  6258 			<passwd>password</passwd>
       
  6259 			<salt>53414C54</salt>
       
  6260 			<iterations>8</iterations>
       
  6261 			<key>B0935F11227F5A473073DCD188886687D2A1811953</key>
       
  6262 		</derivekey>
       
  6263 	</actionbody>
       
  6264 </action>
       
  6265 
       
  6266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6268 //! @SYMREQ CIT_PREQ1054
       
  6269 //! @SYMTestPriority medium
       
  6270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6272 <action>
       
  6273 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6274 	<actiontype>DeriveKey</actiontype>
       
  6275 	<actionbody>
       
  6276 		<derivekey>
       
  6277 			<kdf>pkcs#12</kdf>
       
  6278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6279 			<salt>53414C54</salt>
       
  6280 			<iterations>8</iterations>
       
  6281 			<key>6602B1B4BBB670208041ECD8E1634845FC0DC28532</key>
       
  6282 		</derivekey>
       
  6283 	</actionbody>
       
  6284 </action>
       
  6285 
       
  6286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6288 //! @SYMREQ CIT_PREQ1054
       
  6289 //! @SYMTestPriority medium
       
  6290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6292 <action>
       
  6293 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6294 	<actiontype>DeriveKey</actiontype>
       
  6295 	<actionbody>
       
  6296 		<derivekey>
       
  6297 			<kdf>pkcs#12</kdf>
       
  6298 			<passwd>0000</passwd>
       
  6299 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6300 			<iterations>8</iterations>
       
  6301 			<key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E44</key>
       
  6302 		</derivekey>
       
  6303 	</actionbody>
       
  6304 </action>
       
  6305 
       
  6306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6308 //! @SYMREQ CIT_PREQ1054
       
  6309 //! @SYMTestPriority medium
       
  6310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6312 <action>
       
  6313 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6314 	<actiontype>DeriveKey</actiontype>
       
  6315 	<actionbody>
       
  6316 		<derivekey>
       
  6317 			<kdf>pkcs#12</kdf>
       
  6318 			<passwd>0001</passwd>
       
  6319 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6320 			<iterations>8</iterations>
       
  6321 			<key>6473EB1244E055149E0858C49FAE7B8DC951E7E32A</key>
       
  6322 		</derivekey>
       
  6323 	</actionbody>
       
  6324 </action>
       
  6325 
       
  6326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6328 //! @SYMREQ CIT_PREQ1054
       
  6329 //! @SYMTestPriority medium
       
  6330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6332 <action>
       
  6333 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6334 	<actiontype>DeriveKey</actiontype>
       
  6335 	<actionbody>
       
  6336 		<derivekey>
       
  6337 			<kdf>pkcs#12</kdf>
       
  6338 			<passwd>PSWD</passwd>
       
  6339 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6340 			<iterations>8</iterations>
       
  6341 			<key>AA762B8736D4C37BAD263103CA283E09010B7EFC53</key>
       
  6342 		</derivekey>
       
  6343 	</actionbody>
       
  6344 </action>
       
  6345 
       
  6346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6348 //! @SYMREQ CIT_PREQ1054
       
  6349 //! @SYMTestPriority medium
       
  6350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6352 <action>
       
  6353 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6354 	<actiontype>DeriveKey</actiontype>
       
  6355 	<actionbody>
       
  6356 		<derivekey>
       
  6357 			<kdf>pkcs#12</kdf>
       
  6358 			<passwd>password</passwd>
       
  6359 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6360 			<iterations>8</iterations>
       
  6361 			<key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D8</key>
       
  6362 		</derivekey>
       
  6363 	</actionbody>
       
  6364 </action>
       
  6365 
       
  6366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6368 //! @SYMREQ CIT_PREQ1054
       
  6369 //! @SYMTestPriority medium
       
  6370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6372 <action>
       
  6373 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6374 	<actiontype>DeriveKey</actiontype>
       
  6375 	<actionbody>
       
  6376 		<derivekey>
       
  6377 			<kdf>pkcs#12</kdf>
       
  6378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6379 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6380 			<iterations>8</iterations>
       
  6381 			<key>935593CA370BB6988F2F41D2F4ABF56E433064D83E</key>
       
  6382 		</derivekey>
       
  6383 	</actionbody>
       
  6384 </action>
       
  6385 
       
  6386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6388 //! @SYMREQ CIT_PREQ1054
       
  6389 //! @SYMTestPriority medium
       
  6390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6392 <action>
       
  6393 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6394 	<actiontype>DeriveKey</actiontype>
       
  6395 	<actionbody>
       
  6396 		<derivekey>
       
  6397 			<kdf>pkcs#12</kdf>
       
  6398 			<passwd>0000</passwd>
       
  6399 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6400 			<iterations>8</iterations>
       
  6401 			<key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BF</key>
       
  6402 		</derivekey>
       
  6403 	</actionbody>
       
  6404 </action>
       
  6405 
       
  6406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6408 //! @SYMREQ CIT_PREQ1054
       
  6409 //! @SYMTestPriority medium
       
  6410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6412 <action>
       
  6413 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6414 	<actiontype>DeriveKey</actiontype>
       
  6415 	<actionbody>
       
  6416 		<derivekey>
       
  6417 			<kdf>pkcs#12</kdf>
       
  6418 			<passwd>0001</passwd>
       
  6419 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6420 			<iterations>8</iterations>
       
  6421 			<key>82B4A13659033EA4025DB51A6CB573F93B03A69634</key>
       
  6422 		</derivekey>
       
  6423 	</actionbody>
       
  6424 </action>
       
  6425 
       
  6426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6428 //! @SYMREQ CIT_PREQ1054
       
  6429 //! @SYMTestPriority medium
       
  6430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6432 <action>
       
  6433 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6434 	<actiontype>DeriveKey</actiontype>
       
  6435 	<actionbody>
       
  6436 		<derivekey>
       
  6437 			<kdf>pkcs#12</kdf>
       
  6438 			<passwd>PSWD</passwd>
       
  6439 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6440 			<iterations>8</iterations>
       
  6441 			<key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94</key>
       
  6442 		</derivekey>
       
  6443 	</actionbody>
       
  6444 </action>
       
  6445 
       
  6446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6448 //! @SYMREQ CIT_PREQ1054
       
  6449 //! @SYMTestPriority medium
       
  6450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6452 <action>
       
  6453 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6454 	<actiontype>DeriveKey</actiontype>
       
  6455 	<actionbody>
       
  6456 		<derivekey>
       
  6457 			<kdf>pkcs#12</kdf>
       
  6458 			<passwd>password</passwd>
       
  6459 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6460 			<iterations>8</iterations>
       
  6461 			<key>5670457314E405B0ED1583FC4B82FEAD94B434EBED</key>
       
  6462 		</derivekey>
       
  6463 	</actionbody>
       
  6464 </action>
       
  6465 
       
  6466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6468 //! @SYMREQ CIT_PREQ1054
       
  6469 //! @SYMTestPriority medium
       
  6470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6472 <action>
       
  6473 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6474 	<actiontype>DeriveKey</actiontype>
       
  6475 	<actionbody>
       
  6476 		<derivekey>
       
  6477 			<kdf>pkcs#12</kdf>
       
  6478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6479 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6480 			<iterations>8</iterations>
       
  6481 			<key>1C4CAE25146D74F3762B5C3FD3A917522564855675</key>
       
  6482 		</derivekey>
       
  6483 	</actionbody>
       
  6484 </action>
       
  6485 
       
  6486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6488 //! @SYMREQ CIT_PREQ1054
       
  6489 //! @SYMTestPriority medium
       
  6490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6492 <action>
       
  6493 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6494 	<actiontype>DeriveKey</actiontype>
       
  6495 	<actionbody>
       
  6496 		<derivekey>
       
  6497 			<kdf>pkcs#12</kdf>
       
  6498 			<passwd>0000</passwd>
       
  6499 			<salt>53414C54</salt>
       
  6500 			<iterations>128</iterations>
       
  6501 			<key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93</key>
       
  6502 		</derivekey>
       
  6503 	</actionbody>
       
  6504 </action>
       
  6505 
       
  6506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6508 //! @SYMREQ CIT_PREQ1054
       
  6509 //! @SYMTestPriority medium
       
  6510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6512 <action>
       
  6513 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6514 	<actiontype>DeriveKey</actiontype>
       
  6515 	<actionbody>
       
  6516 		<derivekey>
       
  6517 			<kdf>pkcs#12</kdf>
       
  6518 			<passwd>0001</passwd>
       
  6519 			<salt>53414C54</salt>
       
  6520 			<iterations>128</iterations>
       
  6521 			<key>C89C3A2C9C06626EB831F4BB5262809B9C138181C4</key>
       
  6522 		</derivekey>
       
  6523 	</actionbody>
       
  6524 </action>
       
  6525 
       
  6526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6528 //! @SYMREQ CIT_PREQ1054
       
  6529 //! @SYMTestPriority medium
       
  6530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6532 <action>
       
  6533 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6534 	<actiontype>DeriveKey</actiontype>
       
  6535 	<actionbody>
       
  6536 		<derivekey>
       
  6537 			<kdf>pkcs#12</kdf>
       
  6538 			<passwd>PSWD</passwd>
       
  6539 			<salt>53414C54</salt>
       
  6540 			<iterations>128</iterations>
       
  6541 			<key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EE</key>
       
  6542 		</derivekey>
       
  6543 	</actionbody>
       
  6544 </action>
       
  6545 
       
  6546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6548 //! @SYMREQ CIT_PREQ1054
       
  6549 //! @SYMTestPriority medium
       
  6550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6552 <action>
       
  6553 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6554 	<actiontype>DeriveKey</actiontype>
       
  6555 	<actionbody>
       
  6556 		<derivekey>
       
  6557 			<kdf>pkcs#12</kdf>
       
  6558 			<passwd>password</passwd>
       
  6559 			<salt>53414C54</salt>
       
  6560 			<iterations>128</iterations>
       
  6561 			<key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C</key>
       
  6562 		</derivekey>
       
  6563 	</actionbody>
       
  6564 </action>
       
  6565 
       
  6566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6568 //! @SYMREQ CIT_PREQ1054
       
  6569 //! @SYMTestPriority medium
       
  6570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6572 <action>
       
  6573 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6574 	<actiontype>DeriveKey</actiontype>
       
  6575 	<actionbody>
       
  6576 		<derivekey>
       
  6577 			<kdf>pkcs#12</kdf>
       
  6578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6579 			<salt>53414C54</salt>
       
  6580 			<iterations>128</iterations>
       
  6581 			<key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F</key>
       
  6582 		</derivekey>
       
  6583 	</actionbody>
       
  6584 </action>
       
  6585 
       
  6586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6588 //! @SYMREQ CIT_PREQ1054
       
  6589 //! @SYMTestPriority medium
       
  6590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6592 <action>
       
  6593 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6594 	<actiontype>DeriveKey</actiontype>
       
  6595 	<actionbody>
       
  6596 		<derivekey>
       
  6597 			<kdf>pkcs#12</kdf>
       
  6598 			<passwd>0000</passwd>
       
  6599 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6600 			<iterations>128</iterations>
       
  6601 			<key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD</key>
       
  6602 		</derivekey>
       
  6603 	</actionbody>
       
  6604 </action>
       
  6605 
       
  6606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6608 //! @SYMREQ CIT_PREQ1054
       
  6609 //! @SYMTestPriority medium
       
  6610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6612 <action>
       
  6613 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6614 	<actiontype>DeriveKey</actiontype>
       
  6615 	<actionbody>
       
  6616 		<derivekey>
       
  6617 			<kdf>pkcs#12</kdf>
       
  6618 			<passwd>0001</passwd>
       
  6619 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6620 			<iterations>128</iterations>
       
  6621 			<key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3</key>
       
  6622 		</derivekey>
       
  6623 	</actionbody>
       
  6624 </action>
       
  6625 
       
  6626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6628 //! @SYMREQ CIT_PREQ1054
       
  6629 //! @SYMTestPriority medium
       
  6630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6632 <action>
       
  6633 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6634 	<actiontype>DeriveKey</actiontype>
       
  6635 	<actionbody>
       
  6636 		<derivekey>
       
  6637 			<kdf>pkcs#12</kdf>
       
  6638 			<passwd>PSWD</passwd>
       
  6639 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6640 			<iterations>128</iterations>
       
  6641 			<key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF</key>
       
  6642 		</derivekey>
       
  6643 	</actionbody>
       
  6644 </action>
       
  6645 
       
  6646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6648 //! @SYMREQ CIT_PREQ1054
       
  6649 //! @SYMTestPriority medium
       
  6650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6652 <action>
       
  6653 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6654 	<actiontype>DeriveKey</actiontype>
       
  6655 	<actionbody>
       
  6656 		<derivekey>
       
  6657 			<kdf>pkcs#12</kdf>
       
  6658 			<passwd>password</passwd>
       
  6659 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6660 			<iterations>128</iterations>
       
  6661 			<key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3</key>
       
  6662 		</derivekey>
       
  6663 	</actionbody>
       
  6664 </action>
       
  6665 
       
  6666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6668 //! @SYMREQ CIT_PREQ1054
       
  6669 //! @SYMTestPriority medium
       
  6670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6672 <action>
       
  6673 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6674 	<actiontype>DeriveKey</actiontype>
       
  6675 	<actionbody>
       
  6676 		<derivekey>
       
  6677 			<kdf>pkcs#12</kdf>
       
  6678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6679 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6680 			<iterations>128</iterations>
       
  6681 			<key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16</key>
       
  6682 		</derivekey>
       
  6683 	</actionbody>
       
  6684 </action>
       
  6685 
       
  6686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6688 //! @SYMREQ CIT_PREQ1054
       
  6689 //! @SYMTestPriority medium
       
  6690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6692 <action>
       
  6693 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6694 	<actiontype>DeriveKey</actiontype>
       
  6695 	<actionbody>
       
  6696 		<derivekey>
       
  6697 			<kdf>pkcs#12</kdf>
       
  6698 			<passwd>0000</passwd>
       
  6699 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6700 			<iterations>128</iterations>
       
  6701 			<key>99FE149183022F9EB2EB815BCC9504E59C524A1497</key>
       
  6702 		</derivekey>
       
  6703 	</actionbody>
       
  6704 </action>
       
  6705 
       
  6706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6708 //! @SYMREQ CIT_PREQ1054
       
  6709 //! @SYMTestPriority medium
       
  6710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6712 <action>
       
  6713 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6714 	<actiontype>DeriveKey</actiontype>
       
  6715 	<actionbody>
       
  6716 		<derivekey>
       
  6717 			<kdf>pkcs#12</kdf>
       
  6718 			<passwd>0001</passwd>
       
  6719 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6720 			<iterations>128</iterations>
       
  6721 			<key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FE</key>
       
  6722 		</derivekey>
       
  6723 	</actionbody>
       
  6724 </action>
       
  6725 
       
  6726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6728 //! @SYMREQ CIT_PREQ1054
       
  6729 //! @SYMTestPriority medium
       
  6730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6732 <action>
       
  6733 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6734 	<actiontype>DeriveKey</actiontype>
       
  6735 	<actionbody>
       
  6736 		<derivekey>
       
  6737 			<kdf>pkcs#12</kdf>
       
  6738 			<passwd>PSWD</passwd>
       
  6739 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6740 			<iterations>128</iterations>
       
  6741 			<key>22A70A865774E55CF08A70435611252278DCE76AED</key>
       
  6742 		</derivekey>
       
  6743 	</actionbody>
       
  6744 </action>
       
  6745 
       
  6746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6748 //! @SYMREQ CIT_PREQ1054
       
  6749 //! @SYMTestPriority medium
       
  6750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6752 <action>
       
  6753 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6754 	<actiontype>DeriveKey</actiontype>
       
  6755 	<actionbody>
       
  6756 		<derivekey>
       
  6757 			<kdf>pkcs#12</kdf>
       
  6758 			<passwd>password</passwd>
       
  6759 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6760 			<iterations>128</iterations>
       
  6761 			<key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C67</key>
       
  6762 		</derivekey>
       
  6763 	</actionbody>
       
  6764 </action>
       
  6765 
       
  6766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6768 //! @SYMREQ CIT_PREQ1054
       
  6769 //! @SYMTestPriority medium
       
  6770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6772 <action>
       
  6773 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6774 	<actiontype>DeriveKey</actiontype>
       
  6775 	<actionbody>
       
  6776 		<derivekey>
       
  6777 			<kdf>pkcs#12</kdf>
       
  6778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6779 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  6780 			<iterations>128</iterations>
       
  6781 			<key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CE</key>
       
  6782 		</derivekey>
       
  6783 	</actionbody>
       
  6784 </action>
       
  6785 
       
  6786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6788 //! @SYMREQ CIT_PREQ1054
       
  6789 //! @SYMTestPriority medium
       
  6790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6792 <action>
       
  6793 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6794 	<actiontype>DeriveKey</actiontype>
       
  6795 	<actionbody>
       
  6796 		<derivekey>
       
  6797 			<kdf>pkcs#12</kdf>
       
  6798 			<passwd>0000</passwd>
       
  6799 			<salt>53414C54</salt>
       
  6800 			<iterations>1024</iterations>
       
  6801 			<key>82824BE51C81A5FF4C4268E256F6621B9656325BEF</key>
       
  6802 		</derivekey>
       
  6803 	</actionbody>
       
  6804 </action>
       
  6805 
       
  6806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6808 //! @SYMREQ CIT_PREQ1054
       
  6809 //! @SYMTestPriority medium
       
  6810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6812 <action>
       
  6813 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6814 	<actiontype>DeriveKey</actiontype>
       
  6815 	<actionbody>
       
  6816 		<derivekey>
       
  6817 			<kdf>pkcs#12</kdf>
       
  6818 			<passwd>0001</passwd>
       
  6819 			<salt>53414C54</salt>
       
  6820 			<iterations>1024</iterations>
       
  6821 			<key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2</key>
       
  6822 		</derivekey>
       
  6823 	</actionbody>
       
  6824 </action>
       
  6825 
       
  6826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6828 //! @SYMREQ CIT_PREQ1054
       
  6829 //! @SYMTestPriority medium
       
  6830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6832 <action>
       
  6833 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6834 	<actiontype>DeriveKey</actiontype>
       
  6835 	<actionbody>
       
  6836 		<derivekey>
       
  6837 			<kdf>pkcs#12</kdf>
       
  6838 			<passwd>PSWD</passwd>
       
  6839 			<salt>53414C54</salt>
       
  6840 			<iterations>1024</iterations>
       
  6841 			<key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE</key>
       
  6842 		</derivekey>
       
  6843 	</actionbody>
       
  6844 </action>
       
  6845 
       
  6846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6848 //! @SYMREQ CIT_PREQ1054
       
  6849 //! @SYMTestPriority medium
       
  6850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6852 <action>
       
  6853 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6854 	<actiontype>DeriveKey</actiontype>
       
  6855 	<actionbody>
       
  6856 		<derivekey>
       
  6857 			<kdf>pkcs#12</kdf>
       
  6858 			<passwd>password</passwd>
       
  6859 			<salt>53414C54</salt>
       
  6860 			<iterations>1024</iterations>
       
  6861 			<key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E84</key>
       
  6862 		</derivekey>
       
  6863 	</actionbody>
       
  6864 </action>
       
  6865 
       
  6866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6868 //! @SYMREQ CIT_PREQ1054
       
  6869 //! @SYMTestPriority medium
       
  6870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6872 <action>
       
  6873 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  6874 	<actiontype>DeriveKey</actiontype>
       
  6875 	<actionbody>
       
  6876 		<derivekey>
       
  6877 			<kdf>pkcs#12</kdf>
       
  6878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6879 			<salt>53414C54</salt>
       
  6880 			<iterations>1024</iterations>
       
  6881 			<key>406C92305ACD663AB0B9EB66DED7929547C692FE11</key>
       
  6882 		</derivekey>
       
  6883 	</actionbody>
       
  6884 </action>
       
  6885 
       
  6886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6888 //! @SYMREQ CIT_PREQ1054
       
  6889 //! @SYMTestPriority medium
       
  6890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6892 <action>
       
  6893 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6894 	<actiontype>DeriveKey</actiontype>
       
  6895 	<actionbody>
       
  6896 		<derivekey>
       
  6897 			<kdf>pkcs#12</kdf>
       
  6898 			<passwd>0000</passwd>
       
  6899 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6900 			<iterations>1024</iterations>
       
  6901 			<key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355</key>
       
  6902 		</derivekey>
       
  6903 	</actionbody>
       
  6904 </action>
       
  6905 
       
  6906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6908 //! @SYMREQ CIT_PREQ1054
       
  6909 //! @SYMTestPriority medium
       
  6910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6912 <action>
       
  6913 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6914 	<actiontype>DeriveKey</actiontype>
       
  6915 	<actionbody>
       
  6916 		<derivekey>
       
  6917 			<kdf>pkcs#12</kdf>
       
  6918 			<passwd>0001</passwd>
       
  6919 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6920 			<iterations>1024</iterations>
       
  6921 			<key>0182E41FCA166CEAED10972BDF5F57A8F851200E37</key>
       
  6922 		</derivekey>
       
  6923 	</actionbody>
       
  6924 </action>
       
  6925 
       
  6926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6928 //! @SYMREQ CIT_PREQ1054
       
  6929 //! @SYMTestPriority medium
       
  6930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6932 <action>
       
  6933 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6934 	<actiontype>DeriveKey</actiontype>
       
  6935 	<actionbody>
       
  6936 		<derivekey>
       
  6937 			<kdf>pkcs#12</kdf>
       
  6938 			<passwd>PSWD</passwd>
       
  6939 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6940 			<iterations>1024</iterations>
       
  6941 			<key>101FB775982CA15E37A065F7CDC5593DE385BDF504</key>
       
  6942 		</derivekey>
       
  6943 	</actionbody>
       
  6944 </action>
       
  6945 
       
  6946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6948 //! @SYMREQ CIT_PREQ1054
       
  6949 //! @SYMTestPriority medium
       
  6950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6952 <action>
       
  6953 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6954 	<actiontype>DeriveKey</actiontype>
       
  6955 	<actionbody>
       
  6956 		<derivekey>
       
  6957 			<kdf>pkcs#12</kdf>
       
  6958 			<passwd>password</passwd>
       
  6959 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6960 			<iterations>1024</iterations>
       
  6961 			<key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B614</key>
       
  6962 		</derivekey>
       
  6963 	</actionbody>
       
  6964 </action>
       
  6965 
       
  6966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6968 //! @SYMREQ CIT_PREQ1054
       
  6969 //! @SYMTestPriority medium
       
  6970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6972 <action>
       
  6973 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  6974 	<actiontype>DeriveKey</actiontype>
       
  6975 	<actionbody>
       
  6976 		<derivekey>
       
  6977 			<kdf>pkcs#12</kdf>
       
  6978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  6979 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  6980 			<iterations>1024</iterations>
       
  6981 			<key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95</key>
       
  6982 		</derivekey>
       
  6983 	</actionbody>
       
  6984 </action>
       
  6985 
       
  6986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  6987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  6988 //! @SYMREQ CIT_PREQ1054
       
  6989 //! @SYMTestPriority medium
       
  6990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  6991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  6992 <action>
       
  6993 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  6994 	<actiontype>DeriveKey</actiontype>
       
  6995 	<actionbody>
       
  6996 		<derivekey>
       
  6997 			<kdf>pkcs#12</kdf>
       
  6998 			<passwd>0000</passwd>
       
  6999 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7000 			<iterations>1024</iterations>
       
  7001 			<key>6789F0680A5C5840B8ED34B061494171E6407643F9</key>
       
  7002 		</derivekey>
       
  7003 	</actionbody>
       
  7004 </action>
       
  7005 
       
  7006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7008 //! @SYMREQ CIT_PREQ1054
       
  7009 //! @SYMTestPriority medium
       
  7010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7012 <action>
       
  7013 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7014 	<actiontype>DeriveKey</actiontype>
       
  7015 	<actionbody>
       
  7016 		<derivekey>
       
  7017 			<kdf>pkcs#12</kdf>
       
  7018 			<passwd>0001</passwd>
       
  7019 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7020 			<iterations>1024</iterations>
       
  7021 			<key>43E663725870C4801A917C41C9B58C419933A93475</key>
       
  7022 		</derivekey>
       
  7023 	</actionbody>
       
  7024 </action>
       
  7025 
       
  7026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7028 //! @SYMREQ CIT_PREQ1054
       
  7029 //! @SYMTestPriority medium
       
  7030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7032 <action>
       
  7033 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7034 	<actiontype>DeriveKey</actiontype>
       
  7035 	<actionbody>
       
  7036 		<derivekey>
       
  7037 			<kdf>pkcs#12</kdf>
       
  7038 			<passwd>PSWD</passwd>
       
  7039 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7040 			<iterations>1024</iterations>
       
  7041 			<key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5</key>
       
  7042 		</derivekey>
       
  7043 	</actionbody>
       
  7044 </action>
       
  7045 
       
  7046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7048 //! @SYMREQ CIT_PREQ1054
       
  7049 //! @SYMTestPriority medium
       
  7050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7052 <action>
       
  7053 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7054 	<actiontype>DeriveKey</actiontype>
       
  7055 	<actionbody>
       
  7056 		<derivekey>
       
  7057 			<kdf>pkcs#12</kdf>
       
  7058 			<passwd>password</passwd>
       
  7059 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7060 			<iterations>1024</iterations>
       
  7061 			<key>CA202602C9A265559B6B96729B574DAA9B6D67036F</key>
       
  7062 		</derivekey>
       
  7063 	</actionbody>
       
  7064 </action>
       
  7065 
       
  7066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7068 //! @SYMREQ CIT_PREQ1054
       
  7069 //! @SYMTestPriority medium
       
  7070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7072 <action>
       
  7073 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7074 	<actiontype>DeriveKey</actiontype>
       
  7075 	<actionbody>
       
  7076 		<derivekey>
       
  7077 			<kdf>pkcs#12</kdf>
       
  7078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7079 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7080 			<iterations>1024</iterations>
       
  7081 			<key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D468</key>
       
  7082 		</derivekey>
       
  7083 	</actionbody>
       
  7084 </action>
       
  7085 
       
  7086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7088 //! @SYMREQ CIT_PREQ1054
       
  7089 //! @SYMTestPriority medium
       
  7090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7092 <action>
       
  7093 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7094 	<actiontype>DeriveKey</actiontype>
       
  7095 	<actionbody>
       
  7096 		<derivekey>
       
  7097 			<kdf>pkcs#12</kdf>
       
  7098 			<passwd>0000</passwd>
       
  7099 			<salt>53414C54</salt>
       
  7100 			<iterations>1536</iterations>
       
  7101 			<key>79A4E1398F511B262E60DCFE9E838C938B806716A9</key>
       
  7102 		</derivekey>
       
  7103 	</actionbody>
       
  7104 </action>
       
  7105 
       
  7106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7108 //! @SYMREQ CIT_PREQ1054
       
  7109 //! @SYMTestPriority medium
       
  7110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7112 <action>
       
  7113 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7114 	<actiontype>DeriveKey</actiontype>
       
  7115 	<actionbody>
       
  7116 		<derivekey>
       
  7117 			<kdf>pkcs#12</kdf>
       
  7118 			<passwd>0001</passwd>
       
  7119 			<salt>53414C54</salt>
       
  7120 			<iterations>1536</iterations>
       
  7121 			<key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D2</key>
       
  7122 		</derivekey>
       
  7123 	</actionbody>
       
  7124 </action>
       
  7125 
       
  7126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7128 //! @SYMREQ CIT_PREQ1054
       
  7129 //! @SYMTestPriority medium
       
  7130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7132 <action>
       
  7133 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7134 	<actiontype>DeriveKey</actiontype>
       
  7135 	<actionbody>
       
  7136 		<derivekey>
       
  7137 			<kdf>pkcs#12</kdf>
       
  7138 			<passwd>PSWD</passwd>
       
  7139 			<salt>53414C54</salt>
       
  7140 			<iterations>1536</iterations>
       
  7141 			<key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E6</key>
       
  7142 		</derivekey>
       
  7143 	</actionbody>
       
  7144 </action>
       
  7145 
       
  7146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7148 //! @SYMREQ CIT_PREQ1054
       
  7149 //! @SYMTestPriority medium
       
  7150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7152 <action>
       
  7153 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7154 	<actiontype>DeriveKey</actiontype>
       
  7155 	<actionbody>
       
  7156 		<derivekey>
       
  7157 			<kdf>pkcs#12</kdf>
       
  7158 			<passwd>password</passwd>
       
  7159 			<salt>53414C54</salt>
       
  7160 			<iterations>1536</iterations>
       
  7161 			<key>65B27A78C72DFEEA6C92846330CE98C6721909E89B</key>
       
  7162 		</derivekey>
       
  7163 	</actionbody>
       
  7164 </action>
       
  7165 
       
  7166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7168 //! @SYMREQ CIT_PREQ1054
       
  7169 //! @SYMTestPriority medium
       
  7170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7172 <action>
       
  7173 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7174 	<actiontype>DeriveKey</actiontype>
       
  7175 	<actionbody>
       
  7176 		<derivekey>
       
  7177 			<kdf>pkcs#12</kdf>
       
  7178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7179 			<salt>53414C54</salt>
       
  7180 			<iterations>1536</iterations>
       
  7181 			<key>8F8FC96A3D958731780B50E843D6BB65137A0728C3</key>
       
  7182 		</derivekey>
       
  7183 	</actionbody>
       
  7184 </action>
       
  7185 
       
  7186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7188 //! @SYMREQ CIT_PREQ1054
       
  7189 //! @SYMTestPriority medium
       
  7190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7192 <action>
       
  7193 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7194 	<actiontype>DeriveKey</actiontype>
       
  7195 	<actionbody>
       
  7196 		<derivekey>
       
  7197 			<kdf>pkcs#12</kdf>
       
  7198 			<passwd>0000</passwd>
       
  7199 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7200 			<iterations>1536</iterations>
       
  7201 			<key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25</key>
       
  7202 		</derivekey>
       
  7203 	</actionbody>
       
  7204 </action>
       
  7205 
       
  7206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7208 //! @SYMREQ CIT_PREQ1054
       
  7209 //! @SYMTestPriority medium
       
  7210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7212 <action>
       
  7213 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7214 	<actiontype>DeriveKey</actiontype>
       
  7215 	<actionbody>
       
  7216 		<derivekey>
       
  7217 			<kdf>pkcs#12</kdf>
       
  7218 			<passwd>0001</passwd>
       
  7219 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7220 			<iterations>1536</iterations>
       
  7221 			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB4</key>
       
  7222 		</derivekey>
       
  7223 	</actionbody>
       
  7224 </action>
       
  7225 
       
  7226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7228 //! @SYMREQ CIT_PREQ1054
       
  7229 //! @SYMTestPriority medium
       
  7230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7232 <action>
       
  7233 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7234 	<actiontype>DeriveKey</actiontype>
       
  7235 	<actionbody>
       
  7236 		<derivekey>
       
  7237 			<kdf>pkcs#12</kdf>
       
  7238 			<passwd>PSWD</passwd>
       
  7239 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7240 			<iterations>1536</iterations>
       
  7241 			<key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0C</key>
       
  7242 		</derivekey>
       
  7243 	</actionbody>
       
  7244 </action>
       
  7245 
       
  7246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7248 //! @SYMREQ CIT_PREQ1054
       
  7249 //! @SYMTestPriority medium
       
  7250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7252 <action>
       
  7253 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7254 	<actiontype>DeriveKey</actiontype>
       
  7255 	<actionbody>
       
  7256 		<derivekey>
       
  7257 			<kdf>pkcs#12</kdf>
       
  7258 			<passwd>password</passwd>
       
  7259 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7260 			<iterations>1536</iterations>
       
  7261 			<key>C05FE26245C742CC01B23C655E5D934D734610DE01</key>
       
  7262 		</derivekey>
       
  7263 	</actionbody>
       
  7264 </action>
       
  7265 
       
  7266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7268 //! @SYMREQ CIT_PREQ1054
       
  7269 //! @SYMTestPriority medium
       
  7270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7272 <action>
       
  7273 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7274 	<actiontype>DeriveKey</actiontype>
       
  7275 	<actionbody>
       
  7276 		<derivekey>
       
  7277 			<kdf>pkcs#12</kdf>
       
  7278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7279 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7280 			<iterations>1536</iterations>
       
  7281 			<key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0</key>
       
  7282 		</derivekey>
       
  7283 	</actionbody>
       
  7284 </action>
       
  7285 
       
  7286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7288 //! @SYMREQ CIT_PREQ1054
       
  7289 //! @SYMTestPriority medium
       
  7290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7292 <action>
       
  7293 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7294 	<actiontype>DeriveKey</actiontype>
       
  7295 	<actionbody>
       
  7296 		<derivekey>
       
  7297 			<kdf>pkcs#12</kdf>
       
  7298 			<passwd>0000</passwd>
       
  7299 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7300 			<iterations>1536</iterations>
       
  7301 			<key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3</key>
       
  7302 		</derivekey>
       
  7303 	</actionbody>
       
  7304 </action>
       
  7305 
       
  7306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7308 //! @SYMREQ CIT_PREQ1054
       
  7309 //! @SYMTestPriority medium
       
  7310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7312 <action>
       
  7313 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7314 	<actiontype>DeriveKey</actiontype>
       
  7315 	<actionbody>
       
  7316 		<derivekey>
       
  7317 			<kdf>pkcs#12</kdf>
       
  7318 			<passwd>0001</passwd>
       
  7319 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7320 			<iterations>1536</iterations>
       
  7321 			<key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA</key>
       
  7322 		</derivekey>
       
  7323 	</actionbody>
       
  7324 </action>
       
  7325 
       
  7326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7328 //! @SYMREQ CIT_PREQ1054
       
  7329 //! @SYMTestPriority medium
       
  7330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7332 <action>
       
  7333 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7334 	<actiontype>DeriveKey</actiontype>
       
  7335 	<actionbody>
       
  7336 		<derivekey>
       
  7337 			<kdf>pkcs#12</kdf>
       
  7338 			<passwd>PSWD</passwd>
       
  7339 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7340 			<iterations>1536</iterations>
       
  7341 			<key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA</key>
       
  7342 		</derivekey>
       
  7343 	</actionbody>
       
  7344 </action>
       
  7345 
       
  7346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7348 //! @SYMREQ CIT_PREQ1054
       
  7349 //! @SYMTestPriority medium
       
  7350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7352 <action>
       
  7353 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7354 	<actiontype>DeriveKey</actiontype>
       
  7355 	<actionbody>
       
  7356 		<derivekey>
       
  7357 			<kdf>pkcs#12</kdf>
       
  7358 			<passwd>password</passwd>
       
  7359 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7360 			<iterations>1536</iterations>
       
  7361 			<key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD4</key>
       
  7362 		</derivekey>
       
  7363 	</actionbody>
       
  7364 </action>
       
  7365 
       
  7366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7368 //! @SYMREQ CIT_PREQ1054
       
  7369 //! @SYMTestPriority medium
       
  7370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7372 <action>
       
  7373 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7374 	<actiontype>DeriveKey</actiontype>
       
  7375 	<actionbody>
       
  7376 		<derivekey>
       
  7377 			<kdf>pkcs#12</kdf>
       
  7378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7379 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7380 			<iterations>1536</iterations>
       
  7381 			<key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B2</key>
       
  7382 		</derivekey>
       
  7383 	</actionbody>
       
  7384 </action>
       
  7385 
       
  7386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7388 //! @SYMREQ CIT_PREQ1054
       
  7389 //! @SYMTestPriority medium
       
  7390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7392 <action>
       
  7393 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7394 	<actiontype>DeriveKey</actiontype>
       
  7395 	<actionbody>
       
  7396 		<derivekey>
       
  7397 			<kdf>pkcs#12</kdf>
       
  7398 			<passwd>0000</passwd>
       
  7399 			<salt>53414C54</salt>
       
  7400 			<iterations>2048</iterations>
       
  7401 			<key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCD</key>
       
  7402 		</derivekey>
       
  7403 	</actionbody>
       
  7404 </action>
       
  7405 
       
  7406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7408 //! @SYMREQ CIT_PREQ1054
       
  7409 //! @SYMTestPriority medium
       
  7410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7412 <action>
       
  7413 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7414 	<actiontype>DeriveKey</actiontype>
       
  7415 	<actionbody>
       
  7416 		<derivekey>
       
  7417 			<kdf>pkcs#12</kdf>
       
  7418 			<passwd>0001</passwd>
       
  7419 			<salt>53414C54</salt>
       
  7420 			<iterations>2048</iterations>
       
  7421 			<key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2</key>
       
  7422 		</derivekey>
       
  7423 	</actionbody>
       
  7424 </action>
       
  7425 
       
  7426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7428 //! @SYMREQ CIT_PREQ1054
       
  7429 //! @SYMTestPriority medium
       
  7430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7432 <action>
       
  7433 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7434 	<actiontype>DeriveKey</actiontype>
       
  7435 	<actionbody>
       
  7436 		<derivekey>
       
  7437 			<kdf>pkcs#12</kdf>
       
  7438 			<passwd>PSWD</passwd>
       
  7439 			<salt>53414C54</salt>
       
  7440 			<iterations>2048</iterations>
       
  7441 			<key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2</key>
       
  7442 		</derivekey>
       
  7443 	</actionbody>
       
  7444 </action>
       
  7445 
       
  7446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7448 //! @SYMREQ CIT_PREQ1054
       
  7449 //! @SYMTestPriority medium
       
  7450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7452 <action>
       
  7453 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7454 	<actiontype>DeriveKey</actiontype>
       
  7455 	<actionbody>
       
  7456 		<derivekey>
       
  7457 			<kdf>pkcs#12</kdf>
       
  7458 			<passwd>password</passwd>
       
  7459 			<salt>53414C54</salt>
       
  7460 			<iterations>2048</iterations>
       
  7461 			<key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D9</key>
       
  7462 		</derivekey>
       
  7463 	</actionbody>
       
  7464 </action>
       
  7465 
       
  7466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7468 //! @SYMREQ CIT_PREQ1054
       
  7469 //! @SYMTestPriority medium
       
  7470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7472 <action>
       
  7473 	<actionname>PKCS#12 KDF, key len = 168, salt len = 4</actionname>
       
  7474 	<actiontype>DeriveKey</actiontype>
       
  7475 	<actionbody>
       
  7476 		<derivekey>
       
  7477 			<kdf>pkcs#12</kdf>
       
  7478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7479 			<salt>53414C54</salt>
       
  7480 			<iterations>2048</iterations>
       
  7481 			<key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45</key>
       
  7482 		</derivekey>
       
  7483 	</actionbody>
       
  7484 </action>
       
  7485 
       
  7486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7488 //! @SYMREQ CIT_PREQ1054
       
  7489 //! @SYMTestPriority medium
       
  7490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7492 <action>
       
  7493 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7494 	<actiontype>DeriveKey</actiontype>
       
  7495 	<actionbody>
       
  7496 		<derivekey>
       
  7497 			<kdf>pkcs#12</kdf>
       
  7498 			<passwd>0000</passwd>
       
  7499 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7500 			<iterations>2048</iterations>
       
  7501 			<key>CD045229461658BC6C47C259F2D20433173DE4D31E</key>
       
  7502 		</derivekey>
       
  7503 	</actionbody>
       
  7504 </action>
       
  7505 
       
  7506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7508 //! @SYMREQ CIT_PREQ1054
       
  7509 //! @SYMTestPriority medium
       
  7510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7512 <action>
       
  7513 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7514 	<actiontype>DeriveKey</actiontype>
       
  7515 	<actionbody>
       
  7516 		<derivekey>
       
  7517 			<kdf>pkcs#12</kdf>
       
  7518 			<passwd>0001</passwd>
       
  7519 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7520 			<iterations>2048</iterations>
       
  7521 			<key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6D</key>
       
  7522 		</derivekey>
       
  7523 	</actionbody>
       
  7524 </action>
       
  7525 
       
  7526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7528 //! @SYMREQ CIT_PREQ1054
       
  7529 //! @SYMTestPriority medium
       
  7530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7532 <action>
       
  7533 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7534 	<actiontype>DeriveKey</actiontype>
       
  7535 	<actionbody>
       
  7536 		<derivekey>
       
  7537 			<kdf>pkcs#12</kdf>
       
  7538 			<passwd>PSWD</passwd>
       
  7539 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7540 			<iterations>2048</iterations>
       
  7541 			<key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC</key>
       
  7542 		</derivekey>
       
  7543 	</actionbody>
       
  7544 </action>
       
  7545 
       
  7546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7548 //! @SYMREQ CIT_PREQ1054
       
  7549 //! @SYMTestPriority medium
       
  7550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7552 <action>
       
  7553 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7554 	<actiontype>DeriveKey</actiontype>
       
  7555 	<actionbody>
       
  7556 		<derivekey>
       
  7557 			<kdf>pkcs#12</kdf>
       
  7558 			<passwd>password</passwd>
       
  7559 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7560 			<iterations>2048</iterations>
       
  7561 			<key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B</key>
       
  7562 		</derivekey>
       
  7563 	</actionbody>
       
  7564 </action>
       
  7565 
       
  7566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7568 //! @SYMREQ CIT_PREQ1054
       
  7569 //! @SYMTestPriority medium
       
  7570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7572 <action>
       
  7573 	<actionname>PKCS#12 KDF, key len = 168, salt len = 20</actionname>
       
  7574 	<actiontype>DeriveKey</actiontype>
       
  7575 	<actionbody>
       
  7576 		<derivekey>
       
  7577 			<kdf>pkcs#12</kdf>
       
  7578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7579 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7580 			<iterations>2048</iterations>
       
  7581 			<key>A5B348EB4926290B223724CC8E4ED67FF458F23622</key>
       
  7582 		</derivekey>
       
  7583 	</actionbody>
       
  7584 </action>
       
  7585 
       
  7586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7588 //! @SYMREQ CIT_PREQ1054
       
  7589 //! @SYMTestPriority medium
       
  7590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7592 <action>
       
  7593 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7594 	<actiontype>DeriveKey</actiontype>
       
  7595 	<actionbody>
       
  7596 		<derivekey>
       
  7597 			<kdf>pkcs#12</kdf>
       
  7598 			<passwd>0000</passwd>
       
  7599 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7600 			<iterations>2048</iterations>
       
  7601 			<key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A25</key>
       
  7602 		</derivekey>
       
  7603 	</actionbody>
       
  7604 </action>
       
  7605 
       
  7606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7608 //! @SYMREQ CIT_PREQ1054
       
  7609 //! @SYMTestPriority medium
       
  7610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7612 <action>
       
  7613 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7614 	<actiontype>DeriveKey</actiontype>
       
  7615 	<actionbody>
       
  7616 		<derivekey>
       
  7617 			<kdf>pkcs#12</kdf>
       
  7618 			<passwd>0001</passwd>
       
  7619 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7620 			<iterations>2048</iterations>
       
  7621 			<key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE1360</key>
       
  7622 		</derivekey>
       
  7623 	</actionbody>
       
  7624 </action>
       
  7625 
       
  7626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7628 //! @SYMREQ CIT_PREQ1054
       
  7629 //! @SYMTestPriority medium
       
  7630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7632 <action>
       
  7633 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7634 	<actiontype>DeriveKey</actiontype>
       
  7635 	<actionbody>
       
  7636 		<derivekey>
       
  7637 			<kdf>pkcs#12</kdf>
       
  7638 			<passwd>PSWD</passwd>
       
  7639 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7640 			<iterations>2048</iterations>
       
  7641 			<key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2</key>
       
  7642 		</derivekey>
       
  7643 	</actionbody>
       
  7644 </action>
       
  7645 
       
  7646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7648 //! @SYMREQ CIT_PREQ1054
       
  7649 //! @SYMTestPriority medium
       
  7650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7652 <action>
       
  7653 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7654 	<actiontype>DeriveKey</actiontype>
       
  7655 	<actionbody>
       
  7656 		<derivekey>
       
  7657 			<kdf>pkcs#12</kdf>
       
  7658 			<passwd>password</passwd>
       
  7659 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7660 			<iterations>2048</iterations>
       
  7661 			<key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF0</key>
       
  7662 		</derivekey>
       
  7663 	</actionbody>
       
  7664 </action>
       
  7665 
       
  7666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7668 //! @SYMREQ CIT_PREQ1054
       
  7669 //! @SYMTestPriority medium
       
  7670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7672 <action>
       
  7673 	<actionname>PKCS#12 KDF, key len = 168, salt len = 25</actionname>
       
  7674 	<actiontype>DeriveKey</actiontype>
       
  7675 	<actionbody>
       
  7676 		<derivekey>
       
  7677 			<kdf>pkcs#12</kdf>
       
  7678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7679 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7680 			<iterations>2048</iterations>
       
  7681 			<key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1</key>
       
  7682 		</derivekey>
       
  7683 	</actionbody>
       
  7684 </action>
       
  7685 
       
  7686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7688 //! @SYMREQ CIT_PREQ1054
       
  7689 //! @SYMTestPriority medium
       
  7690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7692 <action>
       
  7693 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  7694 	<actiontype>DeriveKey</actiontype>
       
  7695 	<actionbody>
       
  7696 		<derivekey>
       
  7697 			<kdf>pkcs#12</kdf>
       
  7698 			<passwd>0000</passwd>
       
  7699 			<salt>53414C54</salt>
       
  7700 			<iterations>1</iterations>
       
  7701 			<key>3037AFC8EACD4E2AEAB3C1E343B81DE84ACF7E50A7FB67481AA26FAE2392310DEEF5BA9CB27DCE2D3FB11C95109E</key>
       
  7702 		</derivekey>
       
  7703 	</actionbody>
       
  7704 </action>
       
  7705 
       
  7706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7708 //! @SYMREQ CIT_PREQ1054
       
  7709 //! @SYMTestPriority medium
       
  7710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7712 <action>
       
  7713 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  7714 	<actiontype>DeriveKey</actiontype>
       
  7715 	<actionbody>
       
  7716 		<derivekey>
       
  7717 			<kdf>pkcs#12</kdf>
       
  7718 			<passwd>0001</passwd>
       
  7719 			<salt>53414C54</salt>
       
  7720 			<iterations>1</iterations>
       
  7721 			<key>37F44080CB10A6F7E2719CC979FE0F2E37D0A2CD9B5FC87F188064903840A07BEA1540D4397A8C3BF85454D5EAEF</key>
       
  7722 		</derivekey>
       
  7723 	</actionbody>
       
  7724 </action>
       
  7725 
       
  7726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7728 //! @SYMREQ CIT_PREQ1054
       
  7729 //! @SYMTestPriority medium
       
  7730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7732 <action>
       
  7733 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  7734 	<actiontype>DeriveKey</actiontype>
       
  7735 	<actionbody>
       
  7736 		<derivekey>
       
  7737 			<kdf>pkcs#12</kdf>
       
  7738 			<passwd>PSWD</passwd>
       
  7739 			<salt>53414C54</salt>
       
  7740 			<iterations>1</iterations>
       
  7741 			<key>8A18939ACF4A00A900FE2351DCBAFD0C19FCB0959936E4C6D9ED338B321B97C02E22A12E67A249DF5FFBB5F09E01</key>
       
  7742 		</derivekey>
       
  7743 	</actionbody>
       
  7744 </action>
       
  7745 
       
  7746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7748 //! @SYMREQ CIT_PREQ1054
       
  7749 //! @SYMTestPriority medium
       
  7750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7752 <action>
       
  7753 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  7754 	<actiontype>DeriveKey</actiontype>
       
  7755 	<actionbody>
       
  7756 		<derivekey>
       
  7757 			<kdf>pkcs#12</kdf>
       
  7758 			<passwd>password</passwd>
       
  7759 			<salt>53414C54</salt>
       
  7760 			<iterations>1</iterations>
       
  7761 			<key>AFF6C5EDE0A50855FE56FDEDB6031BD0BDEFCB74C596AEC2CBF2648BC315B5422D9071708C31F2FCC6D7AC48ED63</key>
       
  7762 		</derivekey>
       
  7763 	</actionbody>
       
  7764 </action>
       
  7765 
       
  7766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7768 //! @SYMREQ CIT_PREQ1054
       
  7769 //! @SYMTestPriority medium
       
  7770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7772 <action>
       
  7773 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  7774 	<actiontype>DeriveKey</actiontype>
       
  7775 	<actionbody>
       
  7776 		<derivekey>
       
  7777 			<kdf>pkcs#12</kdf>
       
  7778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7779 			<salt>53414C54</salt>
       
  7780 			<iterations>1</iterations>
       
  7781 			<key>2ED53BB2CE3C39A2F4039B734F9D94C5075116B05A655F8AB429B72644AA7EE4C3FA31141DACFEB8D89E1825091F</key>
       
  7782 		</derivekey>
       
  7783 	</actionbody>
       
  7784 </action>
       
  7785 
       
  7786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7788 //! @SYMREQ CIT_PREQ1054
       
  7789 //! @SYMTestPriority medium
       
  7790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7792 <action>
       
  7793 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  7794 	<actiontype>DeriveKey</actiontype>
       
  7795 	<actionbody>
       
  7796 		<derivekey>
       
  7797 			<kdf>pkcs#12</kdf>
       
  7798 			<passwd>0000</passwd>
       
  7799 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7800 			<iterations>1</iterations>
       
  7801 			<key>49CABE7B67736931126499722509C03D4BBEF714A80CCCCF475F4CA3FCBC217CAFA6AFF894CEA28E0DCD7B5A0D0D</key>
       
  7802 		</derivekey>
       
  7803 	</actionbody>
       
  7804 </action>
       
  7805 
       
  7806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7808 //! @SYMREQ CIT_PREQ1054
       
  7809 //! @SYMTestPriority medium
       
  7810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7812 <action>
       
  7813 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  7814 	<actiontype>DeriveKey</actiontype>
       
  7815 	<actionbody>
       
  7816 		<derivekey>
       
  7817 			<kdf>pkcs#12</kdf>
       
  7818 			<passwd>0001</passwd>
       
  7819 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7820 			<iterations>1</iterations>
       
  7821 			<key>F994B990D3554AFB778C729E9BAA0CC6EB5BA765340999DE8474B918B754A380F8141A055CD68B85B4CDCC592ED9</key>
       
  7822 		</derivekey>
       
  7823 	</actionbody>
       
  7824 </action>
       
  7825 
       
  7826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7828 //! @SYMREQ CIT_PREQ1054
       
  7829 //! @SYMTestPriority medium
       
  7830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7832 <action>
       
  7833 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  7834 	<actiontype>DeriveKey</actiontype>
       
  7835 	<actionbody>
       
  7836 		<derivekey>
       
  7837 			<kdf>pkcs#12</kdf>
       
  7838 			<passwd>PSWD</passwd>
       
  7839 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7840 			<iterations>1</iterations>
       
  7841 			<key>1AFAAD7E51964CCD2760CCE134E1F2B87B314CC0246300C1BDD916C1EF496E57D589FB2C357D7EF9142AB64B2E02</key>
       
  7842 		</derivekey>
       
  7843 	</actionbody>
       
  7844 </action>
       
  7845 
       
  7846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7848 //! @SYMREQ CIT_PREQ1054
       
  7849 //! @SYMTestPriority medium
       
  7850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7852 <action>
       
  7853 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  7854 	<actiontype>DeriveKey</actiontype>
       
  7855 	<actionbody>
       
  7856 		<derivekey>
       
  7857 			<kdf>pkcs#12</kdf>
       
  7858 			<passwd>password</passwd>
       
  7859 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7860 			<iterations>1</iterations>
       
  7861 			<key>878C91098D1F4FD0DD8CBC3A8149DF5FDE18B82888F04507B6810813D6DDAF8E0257911B49AB5250127C50809B33</key>
       
  7862 		</derivekey>
       
  7863 	</actionbody>
       
  7864 </action>
       
  7865 
       
  7866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7868 //! @SYMREQ CIT_PREQ1054
       
  7869 //! @SYMTestPriority medium
       
  7870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7872 <action>
       
  7873 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  7874 	<actiontype>DeriveKey</actiontype>
       
  7875 	<actionbody>
       
  7876 		<derivekey>
       
  7877 			<kdf>pkcs#12</kdf>
       
  7878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7879 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  7880 			<iterations>1</iterations>
       
  7881 			<key>0DE3F08CAF4FF556C956527AD47C3497C24281A32B7984CFB3D568FE48E9F78B99EB8561E2F627E46D0EEECF491C</key>
       
  7882 		</derivekey>
       
  7883 	</actionbody>
       
  7884 </action>
       
  7885 
       
  7886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7888 //! @SYMREQ CIT_PREQ1054
       
  7889 //! @SYMTestPriority medium
       
  7890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7892 <action>
       
  7893 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  7894 	<actiontype>DeriveKey</actiontype>
       
  7895 	<actionbody>
       
  7896 		<derivekey>
       
  7897 			<kdf>pkcs#12</kdf>
       
  7898 			<passwd>0000</passwd>
       
  7899 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7900 			<iterations>1</iterations>
       
  7901 			<key>90253A49C069E7FF35281461A4DDBE0BB38F4041A04FF42A617251CC66ED7314BFAF4CB2F47A98E42B8AA3BE142A</key>
       
  7902 		</derivekey>
       
  7903 	</actionbody>
       
  7904 </action>
       
  7905 
       
  7906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7908 //! @SYMREQ CIT_PREQ1054
       
  7909 //! @SYMTestPriority medium
       
  7910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7912 <action>
       
  7913 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  7914 	<actiontype>DeriveKey</actiontype>
       
  7915 	<actionbody>
       
  7916 		<derivekey>
       
  7917 			<kdf>pkcs#12</kdf>
       
  7918 			<passwd>0001</passwd>
       
  7919 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7920 			<iterations>1</iterations>
       
  7921 			<key>40BE97AB930A7E8B6DB634C93B94E699D1AD5125B8FA3F056762C96D7E119F68827FBFCC07B2A9E98238B52AA02B</key>
       
  7922 		</derivekey>
       
  7923 	</actionbody>
       
  7924 </action>
       
  7925 
       
  7926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7928 //! @SYMREQ CIT_PREQ1054
       
  7929 //! @SYMTestPriority medium
       
  7930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7932 <action>
       
  7933 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  7934 	<actiontype>DeriveKey</actiontype>
       
  7935 	<actionbody>
       
  7936 		<derivekey>
       
  7937 			<kdf>pkcs#12</kdf>
       
  7938 			<passwd>PSWD</passwd>
       
  7939 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7940 			<iterations>1</iterations>
       
  7941 			<key>A64B43E14E9F71F9EC9A3E6B73FA35E6F7058A9FC812A4EEE1F3DE7E52EA6A981DB02085FC4AB4860E438EA50BC5</key>
       
  7942 		</derivekey>
       
  7943 	</actionbody>
       
  7944 </action>
       
  7945 
       
  7946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7948 //! @SYMREQ CIT_PREQ1054
       
  7949 //! @SYMTestPriority medium
       
  7950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7952 <action>
       
  7953 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  7954 	<actiontype>DeriveKey</actiontype>
       
  7955 	<actionbody>
       
  7956 		<derivekey>
       
  7957 			<kdf>pkcs#12</kdf>
       
  7958 			<passwd>password</passwd>
       
  7959 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7960 			<iterations>1</iterations>
       
  7961 			<key>E323D5F588414AE68EF8FCA46879C1C7317B8FA9C19C126E28BC5C05064D38F67EF7A72A28795F0CFBA8574DA174</key>
       
  7962 		</derivekey>
       
  7963 	</actionbody>
       
  7964 </action>
       
  7965 
       
  7966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7968 //! @SYMREQ CIT_PREQ1054
       
  7969 //! @SYMTestPriority medium
       
  7970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7972 <action>
       
  7973 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  7974 	<actiontype>DeriveKey</actiontype>
       
  7975 	<actionbody>
       
  7976 		<derivekey>
       
  7977 			<kdf>pkcs#12</kdf>
       
  7978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  7979 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  7980 			<iterations>1</iterations>
       
  7981 			<key>27476572AF26E99AB85CD350DC802ABA3A831332A7E037629B764434E2E02B5AB8E8A3DC181BBA3AD9AF9D7E8F08</key>
       
  7982 		</derivekey>
       
  7983 	</actionbody>
       
  7984 </action>
       
  7985 
       
  7986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  7987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  7988 //! @SYMREQ CIT_PREQ1054
       
  7989 //! @SYMTestPriority medium
       
  7990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  7991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  7992 <action>
       
  7993 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  7994 	<actiontype>DeriveKey</actiontype>
       
  7995 	<actionbody>
       
  7996 		<derivekey>
       
  7997 			<kdf>pkcs#12</kdf>
       
  7998 			<passwd>0000</passwd>
       
  7999 			<salt>53414C54</salt>
       
  8000 			<iterations>2</iterations>
       
  8001 			<key>A1D9010A6761CB2675F1C33BB3C5215851703D0D2657B057B9372B986ABA327B6C8B8D4372656C74E9756C7C0C2C</key>
       
  8002 		</derivekey>
       
  8003 	</actionbody>
       
  8004 </action>
       
  8005 
       
  8006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8008 //! @SYMREQ CIT_PREQ1054
       
  8009 //! @SYMTestPriority medium
       
  8010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8012 <action>
       
  8013 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8014 	<actiontype>DeriveKey</actiontype>
       
  8015 	<actionbody>
       
  8016 		<derivekey>
       
  8017 			<kdf>pkcs#12</kdf>
       
  8018 			<passwd>0001</passwd>
       
  8019 			<salt>53414C54</salt>
       
  8020 			<iterations>2</iterations>
       
  8021 			<key>17E4E1F15BC31052E563BFF7B5D11D1545835E9B47AC57D1E3FE07F2C194037B1CE0E18DE0CB8C335975EA51B037</key>
       
  8022 		</derivekey>
       
  8023 	</actionbody>
       
  8024 </action>
       
  8025 
       
  8026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8028 //! @SYMREQ CIT_PREQ1054
       
  8029 //! @SYMTestPriority medium
       
  8030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8032 <action>
       
  8033 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8034 	<actiontype>DeriveKey</actiontype>
       
  8035 	<actionbody>
       
  8036 		<derivekey>
       
  8037 			<kdf>pkcs#12</kdf>
       
  8038 			<passwd>PSWD</passwd>
       
  8039 			<salt>53414C54</salt>
       
  8040 			<iterations>2</iterations>
       
  8041 			<key>D1B71808FCCA5C97E8E52CF5E23C633C5B9D4A5BE332D3AB8A36EE0DC8F1B7E691D2FA8BCCC2C7C371639EBA5CC6</key>
       
  8042 		</derivekey>
       
  8043 	</actionbody>
       
  8044 </action>
       
  8045 
       
  8046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8048 //! @SYMREQ CIT_PREQ1054
       
  8049 //! @SYMTestPriority medium
       
  8050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8052 <action>
       
  8053 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8054 	<actiontype>DeriveKey</actiontype>
       
  8055 	<actionbody>
       
  8056 		<derivekey>
       
  8057 			<kdf>pkcs#12</kdf>
       
  8058 			<passwd>password</passwd>
       
  8059 			<salt>53414C54</salt>
       
  8060 			<iterations>2</iterations>
       
  8061 			<key>EE7E4073F2E6008722BB9842540998C2C4F7A87C3A0EC11A60E916ADAD62C57711E88134D3451CEE8640938390E9</key>
       
  8062 		</derivekey>
       
  8063 	</actionbody>
       
  8064 </action>
       
  8065 
       
  8066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8068 //! @SYMREQ CIT_PREQ1054
       
  8069 //! @SYMTestPriority medium
       
  8070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8072 <action>
       
  8073 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8074 	<actiontype>DeriveKey</actiontype>
       
  8075 	<actionbody>
       
  8076 		<derivekey>
       
  8077 			<kdf>pkcs#12</kdf>
       
  8078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8079 			<salt>53414C54</salt>
       
  8080 			<iterations>2</iterations>
       
  8081 			<key>5BF185C726EE2182888A834066C30BA92C0A6A140FD09995773E708440FF38F65CBF71E7449EF43ADDDDCCEE7B63</key>
       
  8082 		</derivekey>
       
  8083 	</actionbody>
       
  8084 </action>
       
  8085 
       
  8086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8088 //! @SYMREQ CIT_PREQ1054
       
  8089 //! @SYMTestPriority medium
       
  8090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8092 <action>
       
  8093 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8094 	<actiontype>DeriveKey</actiontype>
       
  8095 	<actionbody>
       
  8096 		<derivekey>
       
  8097 			<kdf>pkcs#12</kdf>
       
  8098 			<passwd>0000</passwd>
       
  8099 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8100 			<iterations>2</iterations>
       
  8101 			<key>72ADF5E0413FDBF6659A1E7D495BBE32915F295734423A7247E5DFD46D2CE07E64F4F881362C98992B188EDE499D</key>
       
  8102 		</derivekey>
       
  8103 	</actionbody>
       
  8104 </action>
       
  8105 
       
  8106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8108 //! @SYMREQ CIT_PREQ1054
       
  8109 //! @SYMTestPriority medium
       
  8110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8112 <action>
       
  8113 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8114 	<actiontype>DeriveKey</actiontype>
       
  8115 	<actionbody>
       
  8116 		<derivekey>
       
  8117 			<kdf>pkcs#12</kdf>
       
  8118 			<passwd>0001</passwd>
       
  8119 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8120 			<iterations>2</iterations>
       
  8121 			<key>63E6DF459C899D72577C20FFE4F27670F3A85EA780B450C711D83FB12C0B0A0539209B1B06AF82EE392AB3FD6A6B</key>
       
  8122 		</derivekey>
       
  8123 	</actionbody>
       
  8124 </action>
       
  8125 
       
  8126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8128 //! @SYMREQ CIT_PREQ1054
       
  8129 //! @SYMTestPriority medium
       
  8130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8132 <action>
       
  8133 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8134 	<actiontype>DeriveKey</actiontype>
       
  8135 	<actionbody>
       
  8136 		<derivekey>
       
  8137 			<kdf>pkcs#12</kdf>
       
  8138 			<passwd>PSWD</passwd>
       
  8139 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8140 			<iterations>2</iterations>
       
  8141 			<key>C2099204ABFBB841875BD7595A89D31A9D03A34B94D3ED582C55B0787E2FB841ADE1E6171D6FE2BDDB19A658F552</key>
       
  8142 		</derivekey>
       
  8143 	</actionbody>
       
  8144 </action>
       
  8145 
       
  8146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8148 //! @SYMREQ CIT_PREQ1054
       
  8149 //! @SYMTestPriority medium
       
  8150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8152 <action>
       
  8153 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8154 	<actiontype>DeriveKey</actiontype>
       
  8155 	<actionbody>
       
  8156 		<derivekey>
       
  8157 			<kdf>pkcs#12</kdf>
       
  8158 			<passwd>password</passwd>
       
  8159 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8160 			<iterations>2</iterations>
       
  8161 			<key>3204D28A32DF299B612958906C79154AED69D3F1C0351B1A4B4E2DCA7E93F3CAD92714CC9E13CCD0E95A305EBB13</key>
       
  8162 		</derivekey>
       
  8163 	</actionbody>
       
  8164 </action>
       
  8165 
       
  8166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8168 //! @SYMREQ CIT_PREQ1054
       
  8169 //! @SYMTestPriority medium
       
  8170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8172 <action>
       
  8173 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8174 	<actiontype>DeriveKey</actiontype>
       
  8175 	<actionbody>
       
  8176 		<derivekey>
       
  8177 			<kdf>pkcs#12</kdf>
       
  8178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8179 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8180 			<iterations>2</iterations>
       
  8181 			<key>FB845F70A40E96C536641C3F797AAE39BE8A81CD04873EC243829CE9F83DE277AEC92B18D43211D6DAC966AFFFE8</key>
       
  8182 		</derivekey>
       
  8183 	</actionbody>
       
  8184 </action>
       
  8185 
       
  8186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8188 //! @SYMREQ CIT_PREQ1054
       
  8189 //! @SYMTestPriority medium
       
  8190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8192 <action>
       
  8193 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8194 	<actiontype>DeriveKey</actiontype>
       
  8195 	<actionbody>
       
  8196 		<derivekey>
       
  8197 			<kdf>pkcs#12</kdf>
       
  8198 			<passwd>0000</passwd>
       
  8199 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8200 			<iterations>2</iterations>
       
  8201 			<key>B9230EEC1D615A6DFEF5A8793CB067834B66B77A11162299D91EC09517DEACB6C8992D8D1952B9410AED287F9387</key>
       
  8202 		</derivekey>
       
  8203 	</actionbody>
       
  8204 </action>
       
  8205 
       
  8206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8208 //! @SYMREQ CIT_PREQ1054
       
  8209 //! @SYMTestPriority medium
       
  8210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8212 <action>
       
  8213 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8214 	<actiontype>DeriveKey</actiontype>
       
  8215 	<actionbody>
       
  8216 		<derivekey>
       
  8217 			<kdf>pkcs#12</kdf>
       
  8218 			<passwd>0001</passwd>
       
  8219 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8220 			<iterations>2</iterations>
       
  8221 			<key>462B0F2D1B18297A3F2C5E4058A0083E1FF74BE8CC49A6C7BD0A735DBA22FCBC56A6AACAA2ECE7F146A54C7442A7</key>
       
  8222 		</derivekey>
       
  8223 	</actionbody>
       
  8224 </action>
       
  8225 
       
  8226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8228 //! @SYMREQ CIT_PREQ1054
       
  8229 //! @SYMTestPriority medium
       
  8230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8232 <action>
       
  8233 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8234 	<actiontype>DeriveKey</actiontype>
       
  8235 	<actionbody>
       
  8236 		<derivekey>
       
  8237 			<kdf>pkcs#12</kdf>
       
  8238 			<passwd>PSWD</passwd>
       
  8239 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8240 			<iterations>2</iterations>
       
  8241 			<key>05B66EF1BB844470CBBB46D5F4C7DB291B21A4623F41D1179DBADD72CF7CC8A3F03118C5EF87C588C6665E942158</key>
       
  8242 		</derivekey>
       
  8243 	</actionbody>
       
  8244 </action>
       
  8245 
       
  8246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8248 //! @SYMREQ CIT_PREQ1054
       
  8249 //! @SYMTestPriority medium
       
  8250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8252 <action>
       
  8253 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8254 	<actiontype>DeriveKey</actiontype>
       
  8255 	<actionbody>
       
  8256 		<derivekey>
       
  8257 			<kdf>pkcs#12</kdf>
       
  8258 			<passwd>password</passwd>
       
  8259 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8260 			<iterations>2</iterations>
       
  8261 			<key>C1B7E77C96BB5EE1386E8461A58F0D0CB544944CDFE51188263603019F80688985DB1EF389A8F2CADA47463756C7</key>
       
  8262 		</derivekey>
       
  8263 	</actionbody>
       
  8264 </action>
       
  8265 
       
  8266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8268 //! @SYMREQ CIT_PREQ1054
       
  8269 //! @SYMTestPriority medium
       
  8270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8272 <action>
       
  8273 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8274 	<actiontype>DeriveKey</actiontype>
       
  8275 	<actionbody>
       
  8276 		<derivekey>
       
  8277 			<kdf>pkcs#12</kdf>
       
  8278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8279 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8280 			<iterations>2</iterations>
       
  8281 			<key>3DE08CDACF489F30BBD75C0FF401EC02E87ECD4647451A53DE6218B8B2F860931DE8975712EAC7CAF34347828525</key>
       
  8282 		</derivekey>
       
  8283 	</actionbody>
       
  8284 </action>
       
  8285 
       
  8286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8288 //! @SYMREQ CIT_PREQ1054
       
  8289 //! @SYMTestPriority medium
       
  8290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8292 <action>
       
  8293 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8294 	<actiontype>DeriveKey</actiontype>
       
  8295 	<actionbody>
       
  8296 		<derivekey>
       
  8297 			<kdf>pkcs#12</kdf>
       
  8298 			<passwd>0000</passwd>
       
  8299 			<salt>53414C54</salt>
       
  8300 			<iterations>4</iterations>
       
  8301 			<key>D0158BFC57E643965DC161741725CE9478CDF2A0B52A78253F32B2DFCC2228C929F19663EC3AF4B6B3B4A514D2AE</key>
       
  8302 		</derivekey>
       
  8303 	</actionbody>
       
  8304 </action>
       
  8305 
       
  8306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8308 //! @SYMREQ CIT_PREQ1054
       
  8309 //! @SYMTestPriority medium
       
  8310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8312 <action>
       
  8313 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8314 	<actiontype>DeriveKey</actiontype>
       
  8315 	<actionbody>
       
  8316 		<derivekey>
       
  8317 			<kdf>pkcs#12</kdf>
       
  8318 			<passwd>0001</passwd>
       
  8319 			<salt>53414C54</salt>
       
  8320 			<iterations>4</iterations>
       
  8321 			<key>AEB6CD53F0D6830161100C4BFD439B341066339A0025D3CF7DC68CEE4D9AC92B10B29EB19973637D27DC2C9BF911</key>
       
  8322 		</derivekey>
       
  8323 	</actionbody>
       
  8324 </action>
       
  8325 
       
  8326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8328 //! @SYMREQ CIT_PREQ1054
       
  8329 //! @SYMTestPriority medium
       
  8330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8332 <action>
       
  8333 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8334 	<actiontype>DeriveKey</actiontype>
       
  8335 	<actionbody>
       
  8336 		<derivekey>
       
  8337 			<kdf>pkcs#12</kdf>
       
  8338 			<passwd>PSWD</passwd>
       
  8339 			<salt>53414C54</salt>
       
  8340 			<iterations>4</iterations>
       
  8341 			<key>80010C12B66CC739F4ACF8BB154197709F78AAD39ABC8EEC11F7C88CD138DE85A21B5D5DCB9C8E50E0AFABE82149</key>
       
  8342 		</derivekey>
       
  8343 	</actionbody>
       
  8344 </action>
       
  8345 
       
  8346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8348 //! @SYMREQ CIT_PREQ1054
       
  8349 //! @SYMTestPriority medium
       
  8350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8352 <action>
       
  8353 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8354 	<actiontype>DeriveKey</actiontype>
       
  8355 	<actionbody>
       
  8356 		<derivekey>
       
  8357 			<kdf>pkcs#12</kdf>
       
  8358 			<passwd>password</passwd>
       
  8359 			<salt>53414C54</salt>
       
  8360 			<iterations>4</iterations>
       
  8361 			<key>497DE34C4C64E56AD53E5F8F6E16D1A3220BC95812046A01A53F6FB1C9051ED917D0B3C08A82CADA712730DD2410</key>
       
  8362 		</derivekey>
       
  8363 	</actionbody>
       
  8364 </action>
       
  8365 
       
  8366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8368 //! @SYMREQ CIT_PREQ1054
       
  8369 //! @SYMTestPriority medium
       
  8370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8372 <action>
       
  8373 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8374 	<actiontype>DeriveKey</actiontype>
       
  8375 	<actionbody>
       
  8376 		<derivekey>
       
  8377 			<kdf>pkcs#12</kdf>
       
  8378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8379 			<salt>53414C54</salt>
       
  8380 			<iterations>4</iterations>
       
  8381 			<key>146C6A5B58AF8561220DE4C13A133248300D59D39E22569CC568CB98585324F9287A672ABFCDF360A26B8B83D1AE</key>
       
  8382 		</derivekey>
       
  8383 	</actionbody>
       
  8384 </action>
       
  8385 
       
  8386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8388 //! @SYMREQ CIT_PREQ1054
       
  8389 //! @SYMTestPriority medium
       
  8390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8392 <action>
       
  8393 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8394 	<actiontype>DeriveKey</actiontype>
       
  8395 	<actionbody>
       
  8396 		<derivekey>
       
  8397 			<kdf>pkcs#12</kdf>
       
  8398 			<passwd>0000</passwd>
       
  8399 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8400 			<iterations>4</iterations>
       
  8401 			<key>E89772E7A52D6D8C65AAE01D0380ED59927CD0C2BE22F0030D6D6FBF85D6A56D7D55A3002233181BCC2A0C4108C8</key>
       
  8402 		</derivekey>
       
  8403 	</actionbody>
       
  8404 </action>
       
  8405 
       
  8406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8408 //! @SYMREQ CIT_PREQ1054
       
  8409 //! @SYMTestPriority medium
       
  8410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8412 <action>
       
  8413 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8414 	<actiontype>DeriveKey</actiontype>
       
  8415 	<actionbody>
       
  8416 		<derivekey>
       
  8417 			<kdf>pkcs#12</kdf>
       
  8418 			<passwd>0001</passwd>
       
  8419 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8420 			<iterations>4</iterations>
       
  8421 			<key>23930713772E26DBBABB53F3C5C775019B8048482B6FECC40729F2D5023D6F3C27092166E11A435738C3E0DBF7B0</key>
       
  8422 		</derivekey>
       
  8423 	</actionbody>
       
  8424 </action>
       
  8425 
       
  8426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8428 //! @SYMREQ CIT_PREQ1054
       
  8429 //! @SYMTestPriority medium
       
  8430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8432 <action>
       
  8433 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8434 	<actiontype>DeriveKey</actiontype>
       
  8435 	<actionbody>
       
  8436 		<derivekey>
       
  8437 			<kdf>pkcs#12</kdf>
       
  8438 			<passwd>PSWD</passwd>
       
  8439 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8440 			<iterations>4</iterations>
       
  8441 			<key>DF2D961FE3929BBA41493EB5421FEF7C2F6C31FE0A93D6A3DD0A61826365407B4C1CBB589C0BC10EC8B510A83771</key>
       
  8442 		</derivekey>
       
  8443 	</actionbody>
       
  8444 </action>
       
  8445 
       
  8446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8448 //! @SYMREQ CIT_PREQ1054
       
  8449 //! @SYMTestPriority medium
       
  8450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8452 <action>
       
  8453 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8454 	<actiontype>DeriveKey</actiontype>
       
  8455 	<actionbody>
       
  8456 		<derivekey>
       
  8457 			<kdf>pkcs#12</kdf>
       
  8458 			<passwd>password</passwd>
       
  8459 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8460 			<iterations>4</iterations>
       
  8461 			<key>363619530B170B7BAE1C046B29351C235B8EFED58879EAB2DAF93502D254C5569C2667F16B2AA036619AAF4D8E33</key>
       
  8462 		</derivekey>
       
  8463 	</actionbody>
       
  8464 </action>
       
  8465 
       
  8466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8468 //! @SYMREQ CIT_PREQ1054
       
  8469 //! @SYMTestPriority medium
       
  8470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8472 <action>
       
  8473 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8474 	<actiontype>DeriveKey</actiontype>
       
  8475 	<actionbody>
       
  8476 		<derivekey>
       
  8477 			<kdf>pkcs#12</kdf>
       
  8478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8479 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8480 			<iterations>4</iterations>
       
  8481 			<key>B43FA2D22B6912F6FEDF1CF3FAD123AF6FC587CA4EFF6FE83AD6ED83E4F217EF7E0C6727BEF0614398026907E7E6</key>
       
  8482 		</derivekey>
       
  8483 	</actionbody>
       
  8484 </action>
       
  8485 
       
  8486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8488 //! @SYMREQ CIT_PREQ1054
       
  8489 //! @SYMTestPriority medium
       
  8490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8492 <action>
       
  8493 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8494 	<actiontype>DeriveKey</actiontype>
       
  8495 	<actionbody>
       
  8496 		<derivekey>
       
  8497 			<kdf>pkcs#12</kdf>
       
  8498 			<passwd>0000</passwd>
       
  8499 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8500 			<iterations>4</iterations>
       
  8501 			<key>EF50923D65A0610BDC51AD5DB1B4F4F98FD4D15B0EA1D3AB1983B1E0496EB6FD7259774354267B1976BE459A1D23</key>
       
  8502 		</derivekey>
       
  8503 	</actionbody>
       
  8504 </action>
       
  8505 
       
  8506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8508 //! @SYMREQ CIT_PREQ1054
       
  8509 //! @SYMTestPriority medium
       
  8510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8512 <action>
       
  8513 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8514 	<actiontype>DeriveKey</actiontype>
       
  8515 	<actionbody>
       
  8516 		<derivekey>
       
  8517 			<kdf>pkcs#12</kdf>
       
  8518 			<passwd>0001</passwd>
       
  8519 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8520 			<iterations>4</iterations>
       
  8521 			<key>9A618595C714486B7D7E3120005C8BC18D5D95D79B54DE1063C64DBE97C41BFC6A4A5239B77F2F603C7AFE06247C</key>
       
  8522 		</derivekey>
       
  8523 	</actionbody>
       
  8524 </action>
       
  8525 
       
  8526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8528 //! @SYMREQ CIT_PREQ1054
       
  8529 //! @SYMTestPriority medium
       
  8530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8532 <action>
       
  8533 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8534 	<actiontype>DeriveKey</actiontype>
       
  8535 	<actionbody>
       
  8536 		<derivekey>
       
  8537 			<kdf>pkcs#12</kdf>
       
  8538 			<passwd>PSWD</passwd>
       
  8539 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8540 			<iterations>4</iterations>
       
  8541 			<key>B3B33AA8A6777605E3029C0F8DC45290E3C4167208FA46F3C504ABA355D99FE3A4291DBAB83CB6980CD28C153D24</key>
       
  8542 		</derivekey>
       
  8543 	</actionbody>
       
  8544 </action>
       
  8545 
       
  8546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8548 //! @SYMREQ CIT_PREQ1054
       
  8549 //! @SYMTestPriority medium
       
  8550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8552 <action>
       
  8553 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8554 	<actiontype>DeriveKey</actiontype>
       
  8555 	<actionbody>
       
  8556 		<derivekey>
       
  8557 			<kdf>pkcs#12</kdf>
       
  8558 			<passwd>password</passwd>
       
  8559 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8560 			<iterations>4</iterations>
       
  8561 			<key>C007DC1ADA9475C5DB2F9B5D18A2DEFD93A30AE3B2F2B76DBC180C689C88147F5366D48C10086AD45B445F818F22</key>
       
  8562 		</derivekey>
       
  8563 	</actionbody>
       
  8564 </action>
       
  8565 
       
  8566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8568 //! @SYMREQ CIT_PREQ1054
       
  8569 //! @SYMTestPriority medium
       
  8570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8572 <action>
       
  8573 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8574 	<actiontype>DeriveKey</actiontype>
       
  8575 	<actionbody>
       
  8576 		<derivekey>
       
  8577 			<kdf>pkcs#12</kdf>
       
  8578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8579 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8580 			<iterations>4</iterations>
       
  8581 			<key>91DF3661364A0DAD28180A41ADCB55676E992986EFCD5481A7EBCCA45806E087BB95BAEFD24685A7D9B08426EFCF</key>
       
  8582 		</derivekey>
       
  8583 	</actionbody>
       
  8584 </action>
       
  8585 
       
  8586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8588 //! @SYMREQ CIT_PREQ1054
       
  8589 //! @SYMTestPriority medium
       
  8590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8592 <action>
       
  8593 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8594 	<actiontype>DeriveKey</actiontype>
       
  8595 	<actionbody>
       
  8596 		<derivekey>
       
  8597 			<kdf>pkcs#12</kdf>
       
  8598 			<passwd>0000</passwd>
       
  8599 			<salt>53414C54</salt>
       
  8600 			<iterations>8</iterations>
       
  8601 			<key>9A08D3C4F584ECD1E538B7A46DCFDEA18A8F8BE4612564ECF299468389BF3597B38FF0ADB79AE9A718D7FC5E0D7E</key>
       
  8602 		</derivekey>
       
  8603 	</actionbody>
       
  8604 </action>
       
  8605 
       
  8606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8608 //! @SYMREQ CIT_PREQ1054
       
  8609 //! @SYMTestPriority medium
       
  8610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8612 <action>
       
  8613 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8614 	<actiontype>DeriveKey</actiontype>
       
  8615 	<actionbody>
       
  8616 		<derivekey>
       
  8617 			<kdf>pkcs#12</kdf>
       
  8618 			<passwd>0001</passwd>
       
  8619 			<salt>53414C54</salt>
       
  8620 			<iterations>8</iterations>
       
  8621 			<key>33002FA0B6A5A27991A062FF6173E357D9496E6ED1CD2460647D83960A81A688C1E7C3CB1745C640F96CA26BAB55</key>
       
  8622 		</derivekey>
       
  8623 	</actionbody>
       
  8624 </action>
       
  8625 
       
  8626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8628 //! @SYMREQ CIT_PREQ1054
       
  8629 //! @SYMTestPriority medium
       
  8630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8632 <action>
       
  8633 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8634 	<actiontype>DeriveKey</actiontype>
       
  8635 	<actionbody>
       
  8636 		<derivekey>
       
  8637 			<kdf>pkcs#12</kdf>
       
  8638 			<passwd>PSWD</passwd>
       
  8639 			<salt>53414C54</salt>
       
  8640 			<iterations>8</iterations>
       
  8641 			<key>22001FA26964DCD0BE3C58AB6E43557CE7B006E466B5176BC31A916229C8DC27918BEAC1912CCD1BEDD4D9AC6F7F</key>
       
  8642 		</derivekey>
       
  8643 	</actionbody>
       
  8644 </action>
       
  8645 
       
  8646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8648 //! @SYMREQ CIT_PREQ1054
       
  8649 //! @SYMTestPriority medium
       
  8650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8652 <action>
       
  8653 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8654 	<actiontype>DeriveKey</actiontype>
       
  8655 	<actionbody>
       
  8656 		<derivekey>
       
  8657 			<kdf>pkcs#12</kdf>
       
  8658 			<passwd>password</passwd>
       
  8659 			<salt>53414C54</salt>
       
  8660 			<iterations>8</iterations>
       
  8661 			<key>B0935F11227F5A473073DCD188886687D2A18119532A1D5D0A8631441599FF319BD921404D04DA973217A199F621</key>
       
  8662 		</derivekey>
       
  8663 	</actionbody>
       
  8664 </action>
       
  8665 
       
  8666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8668 //! @SYMREQ CIT_PREQ1054
       
  8669 //! @SYMTestPriority medium
       
  8670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8672 <action>
       
  8673 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8674 	<actiontype>DeriveKey</actiontype>
       
  8675 	<actionbody>
       
  8676 		<derivekey>
       
  8677 			<kdf>pkcs#12</kdf>
       
  8678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8679 			<salt>53414C54</salt>
       
  8680 			<iterations>8</iterations>
       
  8681 			<key>6602B1B4BBB670208041ECD8E1634845FC0DC28532AF24AA6CB93368E87126BC821DB7B3F4301455B454E9715981</key>
       
  8682 		</derivekey>
       
  8683 	</actionbody>
       
  8684 </action>
       
  8685 
       
  8686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8688 //! @SYMREQ CIT_PREQ1054
       
  8689 //! @SYMTestPriority medium
       
  8690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8692 <action>
       
  8693 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8694 	<actiontype>DeriveKey</actiontype>
       
  8695 	<actionbody>
       
  8696 		<derivekey>
       
  8697 			<kdf>pkcs#12</kdf>
       
  8698 			<passwd>0000</passwd>
       
  8699 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8700 			<iterations>8</iterations>
       
  8701 			<key>3A478368DD5DC61BAA09325959A3F46C7F46AD9E449B3AFB8236BFFDF548BA07B6269CB5C0D0E0E00AABB5E872F7</key>
       
  8702 		</derivekey>
       
  8703 	</actionbody>
       
  8704 </action>
       
  8705 
       
  8706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8708 //! @SYMREQ CIT_PREQ1054
       
  8709 //! @SYMTestPriority medium
       
  8710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8712 <action>
       
  8713 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8714 	<actiontype>DeriveKey</actiontype>
       
  8715 	<actionbody>
       
  8716 		<derivekey>
       
  8717 			<kdf>pkcs#12</kdf>
       
  8718 			<passwd>0001</passwd>
       
  8719 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8720 			<iterations>8</iterations>
       
  8721 			<key>6473EB1244E055149E0858C49FAE7B8DC951E7E32AC2AA2146482717104D3E93074D41BCA226B3212A41E4EC0F00</key>
       
  8722 		</derivekey>
       
  8723 	</actionbody>
       
  8724 </action>
       
  8725 
       
  8726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8728 //! @SYMREQ CIT_PREQ1054
       
  8729 //! @SYMTestPriority medium
       
  8730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8732 <action>
       
  8733 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8734 	<actiontype>DeriveKey</actiontype>
       
  8735 	<actionbody>
       
  8736 		<derivekey>
       
  8737 			<kdf>pkcs#12</kdf>
       
  8738 			<passwd>PSWD</passwd>
       
  8739 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8740 			<iterations>8</iterations>
       
  8741 			<key>AA762B8736D4C37BAD263103CA283E09010B7EFC538B44C6C3CB724C8CEC28C91F57A2778A8C74CBBF00A63D6875</key>
       
  8742 		</derivekey>
       
  8743 	</actionbody>
       
  8744 </action>
       
  8745 
       
  8746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8748 //! @SYMREQ CIT_PREQ1054
       
  8749 //! @SYMTestPriority medium
       
  8750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8752 <action>
       
  8753 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8754 	<actiontype>DeriveKey</actiontype>
       
  8755 	<actionbody>
       
  8756 		<derivekey>
       
  8757 			<kdf>pkcs#12</kdf>
       
  8758 			<passwd>password</passwd>
       
  8759 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8760 			<iterations>8</iterations>
       
  8761 			<key>F00C5240B03C9A2324BD5FE0AEEE1B6237EB9421D88232044436DA8D74F09E19B578C65F8629D022FD8D529F11E2</key>
       
  8762 		</derivekey>
       
  8763 	</actionbody>
       
  8764 </action>
       
  8765 
       
  8766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8768 //! @SYMREQ CIT_PREQ1054
       
  8769 //! @SYMTestPriority medium
       
  8770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8772 <action>
       
  8773 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8774 	<actiontype>DeriveKey</actiontype>
       
  8775 	<actionbody>
       
  8776 		<derivekey>
       
  8777 			<kdf>pkcs#12</kdf>
       
  8778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8779 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  8780 			<iterations>8</iterations>
       
  8781 			<key>935593CA370BB6988F2F41D2F4ABF56E433064D83E5C5C9892BDB854C8219FFBC1404D590450B1613EB0D2CC0447</key>
       
  8782 		</derivekey>
       
  8783 	</actionbody>
       
  8784 </action>
       
  8785 
       
  8786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8788 //! @SYMREQ CIT_PREQ1054
       
  8789 //! @SYMTestPriority medium
       
  8790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8792 <action>
       
  8793 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8794 	<actiontype>DeriveKey</actiontype>
       
  8795 	<actionbody>
       
  8796 		<derivekey>
       
  8797 			<kdf>pkcs#12</kdf>
       
  8798 			<passwd>0000</passwd>
       
  8799 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8800 			<iterations>8</iterations>
       
  8801 			<key>FCE1F429AEB3B9818D96B88DD25CDED9F01233C0BFCE80BAAFDC06F9C1D1A2862C10203D891E0B2C23F5394ED271</key>
       
  8802 		</derivekey>
       
  8803 	</actionbody>
       
  8804 </action>
       
  8805 
       
  8806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8808 //! @SYMREQ CIT_PREQ1054
       
  8809 //! @SYMTestPriority medium
       
  8810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8812 <action>
       
  8813 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8814 	<actiontype>DeriveKey</actiontype>
       
  8815 	<actionbody>
       
  8816 		<derivekey>
       
  8817 			<kdf>pkcs#12</kdf>
       
  8818 			<passwd>0001</passwd>
       
  8819 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8820 			<iterations>8</iterations>
       
  8821 			<key>82B4A13659033EA4025DB51A6CB573F93B03A69634D71DFB7E270A406AF705382CCA3BB17F29C88ED81EA583AFF5</key>
       
  8822 		</derivekey>
       
  8823 	</actionbody>
       
  8824 </action>
       
  8825 
       
  8826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8828 //! @SYMREQ CIT_PREQ1054
       
  8829 //! @SYMTestPriority medium
       
  8830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8832 <action>
       
  8833 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8834 	<actiontype>DeriveKey</actiontype>
       
  8835 	<actionbody>
       
  8836 		<derivekey>
       
  8837 			<kdf>pkcs#12</kdf>
       
  8838 			<passwd>PSWD</passwd>
       
  8839 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8840 			<iterations>8</iterations>
       
  8841 			<key>45FE091D4DD2D50FA7D3340B1DB838F22161FBEE94047C10AE3CA2853B57E8E59A819DE9BB2D4F3BFBD302F978C7</key>
       
  8842 		</derivekey>
       
  8843 	</actionbody>
       
  8844 </action>
       
  8845 
       
  8846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8848 //! @SYMREQ CIT_PREQ1054
       
  8849 //! @SYMTestPriority medium
       
  8850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8852 <action>
       
  8853 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8854 	<actiontype>DeriveKey</actiontype>
       
  8855 	<actionbody>
       
  8856 		<derivekey>
       
  8857 			<kdf>pkcs#12</kdf>
       
  8858 			<passwd>password</passwd>
       
  8859 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8860 			<iterations>8</iterations>
       
  8861 			<key>5670457314E405B0ED1583FC4B82FEAD94B434EBEDD86DFBC39161A8A7E48CAD3591C2C9A14FAA242D860ED55163</key>
       
  8862 		</derivekey>
       
  8863 	</actionbody>
       
  8864 </action>
       
  8865 
       
  8866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8868 //! @SYMREQ CIT_PREQ1054
       
  8869 //! @SYMTestPriority medium
       
  8870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8872 <action>
       
  8873 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  8874 	<actiontype>DeriveKey</actiontype>
       
  8875 	<actionbody>
       
  8876 		<derivekey>
       
  8877 			<kdf>pkcs#12</kdf>
       
  8878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8879 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  8880 			<iterations>8</iterations>
       
  8881 			<key>1C4CAE25146D74F3762B5C3FD3A917522564855675801D9D7D946C11B6F57C42C2E7447F8CACF4178D8F7A001A18</key>
       
  8882 		</derivekey>
       
  8883 	</actionbody>
       
  8884 </action>
       
  8885 
       
  8886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8888 //! @SYMREQ CIT_PREQ1054
       
  8889 //! @SYMTestPriority medium
       
  8890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8892 <action>
       
  8893 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8894 	<actiontype>DeriveKey</actiontype>
       
  8895 	<actionbody>
       
  8896 		<derivekey>
       
  8897 			<kdf>pkcs#12</kdf>
       
  8898 			<passwd>0000</passwd>
       
  8899 			<salt>53414C54</salt>
       
  8900 			<iterations>128</iterations>
       
  8901 			<key>8B4B3CBFB00466F63B30FEAD111E163D56118A7D93AF1D5E01AB3B9973959193DE7A2433CB46A8A15F2D84D97DBC</key>
       
  8902 		</derivekey>
       
  8903 	</actionbody>
       
  8904 </action>
       
  8905 
       
  8906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8908 //! @SYMREQ CIT_PREQ1054
       
  8909 //! @SYMTestPriority medium
       
  8910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8912 <action>
       
  8913 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8914 	<actiontype>DeriveKey</actiontype>
       
  8915 	<actionbody>
       
  8916 		<derivekey>
       
  8917 			<kdf>pkcs#12</kdf>
       
  8918 			<passwd>0001</passwd>
       
  8919 			<salt>53414C54</salt>
       
  8920 			<iterations>128</iterations>
       
  8921 			<key>C89C3A2C9C06626EB831F4BB5262809B9C138181C44B6D521245B6BBDBE2271369C6B77EC12626368DFCEB358BB8</key>
       
  8922 		</derivekey>
       
  8923 	</actionbody>
       
  8924 </action>
       
  8925 
       
  8926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8928 //! @SYMREQ CIT_PREQ1054
       
  8929 //! @SYMTestPriority medium
       
  8930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8932 <action>
       
  8933 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8934 	<actiontype>DeriveKey</actiontype>
       
  8935 	<actionbody>
       
  8936 		<derivekey>
       
  8937 			<kdf>pkcs#12</kdf>
       
  8938 			<passwd>PSWD</passwd>
       
  8939 			<salt>53414C54</salt>
       
  8940 			<iterations>128</iterations>
       
  8941 			<key>8109F97073FF3D286B21095E7AFBBAFAA62B1313EEE6D0B4E9C0A5EBBFF08FC23CB11E1DB17EBAE6A93C2DA749A6</key>
       
  8942 		</derivekey>
       
  8943 	</actionbody>
       
  8944 </action>
       
  8945 
       
  8946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8948 //! @SYMREQ CIT_PREQ1054
       
  8949 //! @SYMTestPriority medium
       
  8950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8952 <action>
       
  8953 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8954 	<actiontype>DeriveKey</actiontype>
       
  8955 	<actionbody>
       
  8956 		<derivekey>
       
  8957 			<kdf>pkcs#12</kdf>
       
  8958 			<passwd>password</passwd>
       
  8959 			<salt>53414C54</salt>
       
  8960 			<iterations>128</iterations>
       
  8961 			<key>55E985CC1581F3D0052F53DB469F6DC9B72C8F0F5C2011A3B26BD1C95A8797741938D8E3F2057F76B04310B3D922</key>
       
  8962 		</derivekey>
       
  8963 	</actionbody>
       
  8964 </action>
       
  8965 
       
  8966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8968 //! @SYMREQ CIT_PREQ1054
       
  8969 //! @SYMTestPriority medium
       
  8970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8972 <action>
       
  8973 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  8974 	<actiontype>DeriveKey</actiontype>
       
  8975 	<actionbody>
       
  8976 		<derivekey>
       
  8977 			<kdf>pkcs#12</kdf>
       
  8978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  8979 			<salt>53414C54</salt>
       
  8980 			<iterations>128</iterations>
       
  8981 			<key>2802AA97D4C79B1813AB23F2DD71072209BCFF9D4F97A6D3BDA02B3173244164AAE9123987A00699B74F042C35DC</key>
       
  8982 		</derivekey>
       
  8983 	</actionbody>
       
  8984 </action>
       
  8985 
       
  8986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  8987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  8988 //! @SYMREQ CIT_PREQ1054
       
  8989 //! @SYMTestPriority medium
       
  8990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  8991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  8992 <action>
       
  8993 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  8994 	<actiontype>DeriveKey</actiontype>
       
  8995 	<actionbody>
       
  8996 		<derivekey>
       
  8997 			<kdf>pkcs#12</kdf>
       
  8998 			<passwd>0000</passwd>
       
  8999 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9000 			<iterations>128</iterations>
       
  9001 			<key>881509A34D80B5AB5CEC65B859DF2D998F1A98B2DD8D380FA3C08389E335A71B575F3D48228119EA2E34351C7E51</key>
       
  9002 		</derivekey>
       
  9003 	</actionbody>
       
  9004 </action>
       
  9005 
       
  9006 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9008 //! @SYMREQ CIT_PREQ1054
       
  9009 //! @SYMTestPriority medium
       
  9010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9012 <action>
       
  9013 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9014 	<actiontype>DeriveKey</actiontype>
       
  9015 	<actionbody>
       
  9016 		<derivekey>
       
  9017 			<kdf>pkcs#12</kdf>
       
  9018 			<passwd>0001</passwd>
       
  9019 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9020 			<iterations>128</iterations>
       
  9021 			<key>B2918BC593DEC4559C279CFA050CB0F917D8ED7FF3FD6375B5D9AB89DDA3B28526392E1BED3594C3A22594137133</key>
       
  9022 		</derivekey>
       
  9023 	</actionbody>
       
  9024 </action>
       
  9025 
       
  9026 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9028 //! @SYMREQ CIT_PREQ1054
       
  9029 //! @SYMTestPriority medium
       
  9030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9032 <action>
       
  9033 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9034 	<actiontype>DeriveKey</actiontype>
       
  9035 	<actionbody>
       
  9036 		<derivekey>
       
  9037 			<kdf>pkcs#12</kdf>
       
  9038 			<passwd>PSWD</passwd>
       
  9039 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9040 			<iterations>128</iterations>
       
  9041 			<key>0FE0529B45AFC9BB66323C2182DE414A3D24275EEF6F15DAE903AEAA4C8A9A23B8DA9E91293F5ED1904E6D8F8ED5</key>
       
  9042 		</derivekey>
       
  9043 	</actionbody>
       
  9044 </action>
       
  9045 
       
  9046 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9048 //! @SYMREQ CIT_PREQ1054
       
  9049 //! @SYMTestPriority medium
       
  9050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9052 <action>
       
  9053 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9054 	<actiontype>DeriveKey</actiontype>
       
  9055 	<actionbody>
       
  9056 		<derivekey>
       
  9057 			<kdf>pkcs#12</kdf>
       
  9058 			<passwd>password</passwd>
       
  9059 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9060 			<iterations>128</iterations>
       
  9061 			<key>1FF923C4B1E1007EF168E4185280F8184B14D41DC3483C97430FABCCAB60A1F471741095AEB2B22B00951CEFB816</key>
       
  9062 		</derivekey>
       
  9063 	</actionbody>
       
  9064 </action>
       
  9065 
       
  9066 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9068 //! @SYMREQ CIT_PREQ1054
       
  9069 //! @SYMTestPriority medium
       
  9070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9072 <action>
       
  9073 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9074 	<actiontype>DeriveKey</actiontype>
       
  9075 	<actionbody>
       
  9076 		<derivekey>
       
  9077 			<kdf>pkcs#12</kdf>
       
  9078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9079 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9080 			<iterations>128</iterations>
       
  9081 			<key>05D1E56D04BC435A60BDE06C5AFAC9E3CB282C7B16C2FF4007B705AC86ACDBE7C08A599E170F42573671CAAC9978</key>
       
  9082 		</derivekey>
       
  9083 	</actionbody>
       
  9084 </action>
       
  9085 
       
  9086 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9087 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9088 //! @SYMREQ CIT_PREQ1054
       
  9089 //! @SYMTestPriority medium
       
  9090 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9091 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9092 <action>
       
  9093 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9094 	<actiontype>DeriveKey</actiontype>
       
  9095 	<actionbody>
       
  9096 		<derivekey>
       
  9097 			<kdf>pkcs#12</kdf>
       
  9098 			<passwd>0000</passwd>
       
  9099 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9100 			<iterations>128</iterations>
       
  9101 			<key>99FE149183022F9EB2EB815BCC9504E59C524A1497922B0A2AAB43D17ACD0C3C782048DA1AD2BA09B56143681975</key>
       
  9102 		</derivekey>
       
  9103 	</actionbody>
       
  9104 </action>
       
  9105 
       
  9106 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9107 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9108 //! @SYMREQ CIT_PREQ1054
       
  9109 //! @SYMTestPriority medium
       
  9110 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9111 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9112 <action>
       
  9113 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9114 	<actiontype>DeriveKey</actiontype>
       
  9115 	<actionbody>
       
  9116 		<derivekey>
       
  9117 			<kdf>pkcs#12</kdf>
       
  9118 			<passwd>0001</passwd>
       
  9119 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9120 			<iterations>128</iterations>
       
  9121 			<key>79E29F3FCB3777460EC0F43D3D7048A7F4919120FEB822868DC3090EEB79DED23D3E5F8FADAF47EB100E36B393BF</key>
       
  9122 		</derivekey>
       
  9123 	</actionbody>
       
  9124 </action>
       
  9125 
       
  9126 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9127 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9128 //! @SYMREQ CIT_PREQ1054
       
  9129 //! @SYMTestPriority medium
       
  9130 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9131 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9132 <action>
       
  9133 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9134 	<actiontype>DeriveKey</actiontype>
       
  9135 	<actionbody>
       
  9136 		<derivekey>
       
  9137 			<kdf>pkcs#12</kdf>
       
  9138 			<passwd>PSWD</passwd>
       
  9139 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9140 			<iterations>128</iterations>
       
  9141 			<key>22A70A865774E55CF08A70435611252278DCE76AED5C8A686073CBBEFEA2A3498BF5505B3E9CC6A1BE108737874F</key>
       
  9142 		</derivekey>
       
  9143 	</actionbody>
       
  9144 </action>
       
  9145 
       
  9146 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9147 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9148 //! @SYMREQ CIT_PREQ1054
       
  9149 //! @SYMTestPriority medium
       
  9150 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9151 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9152 <action>
       
  9153 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9154 	<actiontype>DeriveKey</actiontype>
       
  9155 	<actionbody>
       
  9156 		<derivekey>
       
  9157 			<kdf>pkcs#12</kdf>
       
  9158 			<passwd>password</passwd>
       
  9159 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9160 			<iterations>128</iterations>
       
  9161 			<key>9CBA922190F1659F6AA3B2B98347EEC28DCD740C672CFA941C4ECCF5F173B42AABBBE23AEF7593C67EF5B183C3C8</key>
       
  9162 		</derivekey>
       
  9163 	</actionbody>
       
  9164 </action>
       
  9165 
       
  9166 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9167 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9168 //! @SYMREQ CIT_PREQ1054
       
  9169 //! @SYMTestPriority medium
       
  9170 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9171 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9172 <action>
       
  9173 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9174 	<actiontype>DeriveKey</actiontype>
       
  9175 	<actionbody>
       
  9176 		<derivekey>
       
  9177 			<kdf>pkcs#12</kdf>
       
  9178 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9179 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9180 			<iterations>128</iterations>
       
  9181 			<key>A037A8B1C20DC883FAABF82D8A591B9E2BE41C79CED20B6799ADA986C06DDF299F615C6B222A9C12CB65CD078D9A</key>
       
  9182 		</derivekey>
       
  9183 	</actionbody>
       
  9184 </action>
       
  9185 
       
  9186 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9187 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9188 //! @SYMREQ CIT_PREQ1054
       
  9189 //! @SYMTestPriority medium
       
  9190 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9191 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9192 <action>
       
  9193 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9194 	<actiontype>DeriveKey</actiontype>
       
  9195 	<actionbody>
       
  9196 		<derivekey>
       
  9197 			<kdf>pkcs#12</kdf>
       
  9198 			<passwd>0000</passwd>
       
  9199 			<salt>53414C54</salt>
       
  9200 			<iterations>1024</iterations>
       
  9201 			<key>82824BE51C81A5FF4C4268E256F6621B9656325BEFB8E936331AB1AB8BDE634EA6298D7B8EB79832AAF01CF1F49A</key>
       
  9202 		</derivekey>
       
  9203 	</actionbody>
       
  9204 </action>
       
  9205 
       
  9206 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9207 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9208 //! @SYMREQ CIT_PREQ1054
       
  9209 //! @SYMTestPriority medium
       
  9210 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9211 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9212 <action>
       
  9213 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9214 	<actiontype>DeriveKey</actiontype>
       
  9215 	<actionbody>
       
  9216 		<derivekey>
       
  9217 			<kdf>pkcs#12</kdf>
       
  9218 			<passwd>0001</passwd>
       
  9219 			<salt>53414C54</salt>
       
  9220 			<iterations>1024</iterations>
       
  9221 			<key>E166049AC4E765E513AFA8A35DDBE7562E01B79FC2680CD8CEAEF02609895F3CAC00A837D49674737EEC85151786</key>
       
  9222 		</derivekey>
       
  9223 	</actionbody>
       
  9224 </action>
       
  9225 
       
  9226 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9227 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9228 //! @SYMREQ CIT_PREQ1054
       
  9229 //! @SYMTestPriority medium
       
  9230 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9231 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9232 <action>
       
  9233 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9234 	<actiontype>DeriveKey</actiontype>
       
  9235 	<actionbody>
       
  9236 		<derivekey>
       
  9237 			<kdf>pkcs#12</kdf>
       
  9238 			<passwd>PSWD</passwd>
       
  9239 			<salt>53414C54</salt>
       
  9240 			<iterations>1024</iterations>
       
  9241 			<key>90E975CC54F8BDA5A6CED39088716B272C4B5887CE53571C9CE41B5FB82532D38F0DB4489BC642605ACF4FDCAEF5</key>
       
  9242 		</derivekey>
       
  9243 	</actionbody>
       
  9244 </action>
       
  9245 
       
  9246 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9247 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9248 //! @SYMREQ CIT_PREQ1054
       
  9249 //! @SYMTestPriority medium
       
  9250 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9251 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9252 <action>
       
  9253 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9254 	<actiontype>DeriveKey</actiontype>
       
  9255 	<actionbody>
       
  9256 		<derivekey>
       
  9257 			<kdf>pkcs#12</kdf>
       
  9258 			<passwd>password</passwd>
       
  9259 			<salt>53414C54</salt>
       
  9260 			<iterations>1024</iterations>
       
  9261 			<key>1FFD40D7BBA891A7E6C4DED39FB0740B6A5AD39E848576D39CDFA77EFE9969986D072D8C44B9147961EC0A3BC5AC</key>
       
  9262 		</derivekey>
       
  9263 	</actionbody>
       
  9264 </action>
       
  9265 
       
  9266 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9267 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9268 //! @SYMREQ CIT_PREQ1054
       
  9269 //! @SYMTestPriority medium
       
  9270 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9271 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9272 <action>
       
  9273 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9274 	<actiontype>DeriveKey</actiontype>
       
  9275 	<actionbody>
       
  9276 		<derivekey>
       
  9277 			<kdf>pkcs#12</kdf>
       
  9278 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9279 			<salt>53414C54</salt>
       
  9280 			<iterations>1024</iterations>
       
  9281 			<key>406C92305ACD663AB0B9EB66DED7929547C692FE118E8D16D80EDCE4FAFBB47960F4B4AB7272496528D235E45B5A</key>
       
  9282 		</derivekey>
       
  9283 	</actionbody>
       
  9284 </action>
       
  9285 
       
  9286 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9287 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9288 //! @SYMREQ CIT_PREQ1054
       
  9289 //! @SYMTestPriority medium
       
  9290 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9291 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9292 <action>
       
  9293 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9294 	<actiontype>DeriveKey</actiontype>
       
  9295 	<actionbody>
       
  9296 		<derivekey>
       
  9297 			<kdf>pkcs#12</kdf>
       
  9298 			<passwd>0000</passwd>
       
  9299 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9300 			<iterations>1024</iterations>
       
  9301 			<key>E82BD75AA9467E0B8D92362A56CB5D7353508CC355C1E6AFFDE182AC0F49BF46F175F79F51352196D93EA67E17DF</key>
       
  9302 		</derivekey>
       
  9303 	</actionbody>
       
  9304 </action>
       
  9305 
       
  9306 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9307 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9308 //! @SYMREQ CIT_PREQ1054
       
  9309 //! @SYMTestPriority medium
       
  9310 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9311 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9312 <action>
       
  9313 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9314 	<actiontype>DeriveKey</actiontype>
       
  9315 	<actionbody>
       
  9316 		<derivekey>
       
  9317 			<kdf>pkcs#12</kdf>
       
  9318 			<passwd>0001</passwd>
       
  9319 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9320 			<iterations>1024</iterations>
       
  9321 			<key>0182E41FCA166CEAED10972BDF5F57A8F851200E371EC06DC900E66ACAEA25B12EFE28E7571395A1B57ABB8E9DAC</key>
       
  9322 		</derivekey>
       
  9323 	</actionbody>
       
  9324 </action>
       
  9325 
       
  9326 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9327 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9328 //! @SYMREQ CIT_PREQ1054
       
  9329 //! @SYMTestPriority medium
       
  9330 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9331 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9332 <action>
       
  9333 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9334 	<actiontype>DeriveKey</actiontype>
       
  9335 	<actionbody>
       
  9336 		<derivekey>
       
  9337 			<kdf>pkcs#12</kdf>
       
  9338 			<passwd>PSWD</passwd>
       
  9339 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9340 			<iterations>1024</iterations>
       
  9341 			<key>101FB775982CA15E37A065F7CDC5593DE385BDF504433650CC572F880CE0F525E77551ACFFCF92F66C9D407BFABF</key>
       
  9342 		</derivekey>
       
  9343 	</actionbody>
       
  9344 </action>
       
  9345 
       
  9346 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9347 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9348 //! @SYMREQ CIT_PREQ1054
       
  9349 //! @SYMTestPriority medium
       
  9350 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9351 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9352 <action>
       
  9353 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9354 	<actiontype>DeriveKey</actiontype>
       
  9355 	<actionbody>
       
  9356 		<derivekey>
       
  9357 			<kdf>pkcs#12</kdf>
       
  9358 			<passwd>password</passwd>
       
  9359 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9360 			<iterations>1024</iterations>
       
  9361 			<key>D7499C6A1218C419A1F81AA5E3F41E88AF0704B61492CF0D98500BD3842C77C2D639589A83E60B22BE53751156F1</key>
       
  9362 		</derivekey>
       
  9363 	</actionbody>
       
  9364 </action>
       
  9365 
       
  9366 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9367 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9368 //! @SYMREQ CIT_PREQ1054
       
  9369 //! @SYMTestPriority medium
       
  9370 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9371 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9372 <action>
       
  9373 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9374 	<actiontype>DeriveKey</actiontype>
       
  9375 	<actionbody>
       
  9376 		<derivekey>
       
  9377 			<kdf>pkcs#12</kdf>
       
  9378 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9379 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9380 			<iterations>1024</iterations>
       
  9381 			<key>2C6222B8E2E97F63FFE9E2FC32D673FAAEC7201B95969233AAFAC6ABB4C369DDD9394FBCE2C4D86670BAA2AD6355</key>
       
  9382 		</derivekey>
       
  9383 	</actionbody>
       
  9384 </action>
       
  9385 
       
  9386 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9387 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9388 //! @SYMREQ CIT_PREQ1054
       
  9389 //! @SYMTestPriority medium
       
  9390 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9391 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9392 <action>
       
  9393 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9394 	<actiontype>DeriveKey</actiontype>
       
  9395 	<actionbody>
       
  9396 		<derivekey>
       
  9397 			<kdf>pkcs#12</kdf>
       
  9398 			<passwd>0000</passwd>
       
  9399 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9400 			<iterations>1024</iterations>
       
  9401 			<key>6789F0680A5C5840B8ED34B061494171E6407643F9400545C62690ED570B3AAD96654D5DE15C7CA6AE242E6123E9</key>
       
  9402 		</derivekey>
       
  9403 	</actionbody>
       
  9404 </action>
       
  9405 
       
  9406 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9407 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9408 //! @SYMREQ CIT_PREQ1054
       
  9409 //! @SYMTestPriority medium
       
  9410 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9411 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9412 <action>
       
  9413 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9414 	<actiontype>DeriveKey</actiontype>
       
  9415 	<actionbody>
       
  9416 		<derivekey>
       
  9417 			<kdf>pkcs#12</kdf>
       
  9418 			<passwd>0001</passwd>
       
  9419 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9420 			<iterations>1024</iterations>
       
  9421 			<key>43E663725870C4801A917C41C9B58C419933A93475CEA2FBB864F29E6D949DF2AAA8ADAB91C8A32B68062F12EE61</key>
       
  9422 		</derivekey>
       
  9423 	</actionbody>
       
  9424 </action>
       
  9425 
       
  9426 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9427 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9428 //! @SYMREQ CIT_PREQ1054
       
  9429 //! @SYMTestPriority medium
       
  9430 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9431 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9432 <action>
       
  9433 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9434 	<actiontype>DeriveKey</actiontype>
       
  9435 	<actionbody>
       
  9436 		<derivekey>
       
  9437 			<kdf>pkcs#12</kdf>
       
  9438 			<passwd>PSWD</passwd>
       
  9439 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9440 			<iterations>1024</iterations>
       
  9441 			<key>8B3308BDD5A8AE507200EAA16FE19D42F3736716A5C24BF367B0C63BE89EA9EB57615C0ABFAFC3FB8DFDEA3907AA</key>
       
  9442 		</derivekey>
       
  9443 	</actionbody>
       
  9444 </action>
       
  9445 
       
  9446 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9447 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9448 //! @SYMREQ CIT_PREQ1054
       
  9449 //! @SYMTestPriority medium
       
  9450 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9451 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9452 <action>
       
  9453 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9454 	<actiontype>DeriveKey</actiontype>
       
  9455 	<actionbody>
       
  9456 		<derivekey>
       
  9457 			<kdf>pkcs#12</kdf>
       
  9458 			<passwd>password</passwd>
       
  9459 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9460 			<iterations>1024</iterations>
       
  9461 			<key>CA202602C9A265559B6B96729B574DAA9B6D67036F69D903784374671E9B7E087ADE4AB9C5AE6BB62530C90F4E9C</key>
       
  9462 		</derivekey>
       
  9463 	</actionbody>
       
  9464 </action>
       
  9465 
       
  9466 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9467 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9468 //! @SYMREQ CIT_PREQ1054
       
  9469 //! @SYMTestPriority medium
       
  9470 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9471 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9472 <action>
       
  9473 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9474 	<actiontype>DeriveKey</actiontype>
       
  9475 	<actionbody>
       
  9476 		<derivekey>
       
  9477 			<kdf>pkcs#12</kdf>
       
  9478 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9479 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9480 			<iterations>1024</iterations>
       
  9481 			<key>F6A33ADA6A0F5990E9DA747550DE0941AE4263D4689DBDFBE81CF5F337376B8EEC58ADFD518A26768ABEB20131B9</key>
       
  9482 		</derivekey>
       
  9483 	</actionbody>
       
  9484 </action>
       
  9485 
       
  9486 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9487 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9488 //! @SYMREQ CIT_PREQ1054
       
  9489 //! @SYMTestPriority medium
       
  9490 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9491 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9492 <action>
       
  9493 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9494 	<actiontype>DeriveKey</actiontype>
       
  9495 	<actionbody>
       
  9496 		<derivekey>
       
  9497 			<kdf>pkcs#12</kdf>
       
  9498 			<passwd>0000</passwd>
       
  9499 			<salt>53414C54</salt>
       
  9500 			<iterations>1536</iterations>
       
  9501 			<key>79A4E1398F511B262E60DCFE9E838C938B806716A9831A1BF6FFE616ADE12860428079E9CD2165E9194346EB6677</key>
       
  9502 		</derivekey>
       
  9503 	</actionbody>
       
  9504 </action>
       
  9505 
       
  9506 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9507 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9508 //! @SYMREQ CIT_PREQ1054
       
  9509 //! @SYMTestPriority medium
       
  9510 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9511 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9512 <action>
       
  9513 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9514 	<actiontype>DeriveKey</actiontype>
       
  9515 	<actionbody>
       
  9516 		<derivekey>
       
  9517 			<kdf>pkcs#12</kdf>
       
  9518 			<passwd>0001</passwd>
       
  9519 			<salt>53414C54</salt>
       
  9520 			<iterations>1536</iterations>
       
  9521 			<key>6F2402CCE4A91C1B848CCABD915657A242EA1FC6D25BFDD890E8B903E66B306ED5C9F5C7B53BEA11BD495C328951</key>
       
  9522 		</derivekey>
       
  9523 	</actionbody>
       
  9524 </action>
       
  9525 
       
  9526 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9527 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9528 //! @SYMREQ CIT_PREQ1054
       
  9529 //! @SYMTestPriority medium
       
  9530 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9531 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9532 <action>
       
  9533 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9534 	<actiontype>DeriveKey</actiontype>
       
  9535 	<actionbody>
       
  9536 		<derivekey>
       
  9537 			<kdf>pkcs#12</kdf>
       
  9538 			<passwd>PSWD</passwd>
       
  9539 			<salt>53414C54</salt>
       
  9540 			<iterations>1536</iterations>
       
  9541 			<key>B9ED7B3135488439E78DF480AD845E7EFEE3EF39E64B6690AE6ED16C5A82A0F7E7D9578BA7F62A7427260733165A</key>
       
  9542 		</derivekey>
       
  9543 	</actionbody>
       
  9544 </action>
       
  9545 
       
  9546 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9547 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9548 //! @SYMREQ CIT_PREQ1054
       
  9549 //! @SYMTestPriority medium
       
  9550 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9551 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9552 <action>
       
  9553 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9554 	<actiontype>DeriveKey</actiontype>
       
  9555 	<actionbody>
       
  9556 		<derivekey>
       
  9557 			<kdf>pkcs#12</kdf>
       
  9558 			<passwd>password</passwd>
       
  9559 			<salt>53414C54</salt>
       
  9560 			<iterations>1536</iterations>
       
  9561 			<key>65B27A78C72DFEEA6C92846330CE98C6721909E89B014925B22427256BC6A4EFEB7A83A2244E59A25E7DE2F01FA6</key>
       
  9562 		</derivekey>
       
  9563 	</actionbody>
       
  9564 </action>
       
  9565 
       
  9566 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9567 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9568 //! @SYMREQ CIT_PREQ1054
       
  9569 //! @SYMTestPriority medium
       
  9570 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9571 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9572 <action>
       
  9573 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9574 	<actiontype>DeriveKey</actiontype>
       
  9575 	<actionbody>
       
  9576 		<derivekey>
       
  9577 			<kdf>pkcs#12</kdf>
       
  9578 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9579 			<salt>53414C54</salt>
       
  9580 			<iterations>1536</iterations>
       
  9581 			<key>8F8FC96A3D958731780B50E843D6BB65137A0728C3A4C55D23D4A0E99EBA71F56EC19356B50B987F486F3FF74A9C</key>
       
  9582 		</derivekey>
       
  9583 	</actionbody>
       
  9584 </action>
       
  9585 
       
  9586 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9587 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9588 //! @SYMREQ CIT_PREQ1054
       
  9589 //! @SYMTestPriority medium
       
  9590 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9591 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9592 <action>
       
  9593 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9594 	<actiontype>DeriveKey</actiontype>
       
  9595 	<actionbody>
       
  9596 		<derivekey>
       
  9597 			<kdf>pkcs#12</kdf>
       
  9598 			<passwd>0000</passwd>
       
  9599 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9600 			<iterations>1536</iterations>
       
  9601 			<key>642DDC3F4E11C3051D6CDED8DD898C4CAEB2463E25C6120B9099920440D11725F1D4F7CABFB8A170BF9744B74461</key>
       
  9602 		</derivekey>
       
  9603 	</actionbody>
       
  9604 </action>
       
  9605 
       
  9606 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9607 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9608 //! @SYMREQ CIT_PREQ1054
       
  9609 //! @SYMTestPriority medium
       
  9610 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9611 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9612 <action>
       
  9613 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9614 	<actiontype>DeriveKey</actiontype>
       
  9615 	<actionbody>
       
  9616 		<derivekey>
       
  9617 			<kdf>pkcs#12</kdf>
       
  9618 			<passwd>0001</passwd>
       
  9619 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9620 			<iterations>1536</iterations>
       
  9621 			<key>0FE4BDC1000D1AC2F5E83A938A2BE2F14C62609AB413E8EAC164C3BA1FAD7ABC1CADB1BF7458010BF7814262F563</key>
       
  9622 		</derivekey>
       
  9623 	</actionbody>
       
  9624 </action>
       
  9625 
       
  9626 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9627 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9628 //! @SYMREQ CIT_PREQ1054
       
  9629 //! @SYMTestPriority medium
       
  9630 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9631 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9632 <action>
       
  9633 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9634 	<actiontype>DeriveKey</actiontype>
       
  9635 	<actionbody>
       
  9636 		<derivekey>
       
  9637 			<kdf>pkcs#12</kdf>
       
  9638 			<passwd>PSWD</passwd>
       
  9639 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9640 			<iterations>1536</iterations>
       
  9641 			<key>32D7F10C5EAA9961B590E8FE4561B9D571AD446F0CC173973E296F655BAB0BFEA7E51BACD8FC73AB278469439B58</key>
       
  9642 		</derivekey>
       
  9643 	</actionbody>
       
  9644 </action>
       
  9645 
       
  9646 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9647 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9648 //! @SYMREQ CIT_PREQ1054
       
  9649 //! @SYMTestPriority medium
       
  9650 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9651 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9652 <action>
       
  9653 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9654 	<actiontype>DeriveKey</actiontype>
       
  9655 	<actionbody>
       
  9656 		<derivekey>
       
  9657 			<kdf>pkcs#12</kdf>
       
  9658 			<passwd>password</passwd>
       
  9659 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9660 			<iterations>1536</iterations>
       
  9661 			<key>C05FE26245C742CC01B23C655E5D934D734610DE015AEFA126CC8A53FBD91EC774AE631F57444E206494BE6EB304</key>
       
  9662 		</derivekey>
       
  9663 	</actionbody>
       
  9664 </action>
       
  9665 
       
  9666 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9667 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9668 //! @SYMREQ CIT_PREQ1054
       
  9669 //! @SYMTestPriority medium
       
  9670 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9671 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9672 <action>
       
  9673 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9674 	<actiontype>DeriveKey</actiontype>
       
  9675 	<actionbody>
       
  9676 		<derivekey>
       
  9677 			<kdf>pkcs#12</kdf>
       
  9678 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9679 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9680 			<iterations>1536</iterations>
       
  9681 			<key>818C967A8F742565CCA37CEA8C683FCC5BEE9DA7B0E036709FBD02F0FA15B7497042FF3E0B56ED26ACC058F1D00B</key>
       
  9682 		</derivekey>
       
  9683 	</actionbody>
       
  9684 </action>
       
  9685 
       
  9686 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9687 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9688 //! @SYMREQ CIT_PREQ1054
       
  9689 //! @SYMTestPriority medium
       
  9690 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9691 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9692 <action>
       
  9693 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9694 	<actiontype>DeriveKey</actiontype>
       
  9695 	<actionbody>
       
  9696 		<derivekey>
       
  9697 			<kdf>pkcs#12</kdf>
       
  9698 			<passwd>0000</passwd>
       
  9699 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9700 			<iterations>1536</iterations>
       
  9701 			<key>5301B5B2A1A6EB6832DC47F3A0850B5680178499B3E8CDC6C4D8D7D7226769FADE4650767B4472BBD418B2D969EB</key>
       
  9702 		</derivekey>
       
  9703 	</actionbody>
       
  9704 </action>
       
  9705 
       
  9706 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9707 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9708 //! @SYMREQ CIT_PREQ1054
       
  9709 //! @SYMTestPriority medium
       
  9710 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9711 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9712 <action>
       
  9713 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9714 	<actiontype>DeriveKey</actiontype>
       
  9715 	<actionbody>
       
  9716 		<derivekey>
       
  9717 			<kdf>pkcs#12</kdf>
       
  9718 			<passwd>0001</passwd>
       
  9719 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9720 			<iterations>1536</iterations>
       
  9721 			<key>9CB5BD2394B268E13DCA91EE2BB0A39C101A5534AA3932F031B4FB2D6F799C857B7B821D5CB05419EE6DF2D10BBD</key>
       
  9722 		</derivekey>
       
  9723 	</actionbody>
       
  9724 </action>
       
  9725 
       
  9726 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9727 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9728 //! @SYMREQ CIT_PREQ1054
       
  9729 //! @SYMTestPriority medium
       
  9730 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9731 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9732 <action>
       
  9733 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9734 	<actiontype>DeriveKey</actiontype>
       
  9735 	<actionbody>
       
  9736 		<derivekey>
       
  9737 			<kdf>pkcs#12</kdf>
       
  9738 			<passwd>PSWD</passwd>
       
  9739 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9740 			<iterations>1536</iterations>
       
  9741 			<key>EB90D956B358B7C5E9FC4A4EFA02589B2357EA87EA949B44DA6EAFD9D83FCD9365C617C137F7EC9C3EF036BD592C</key>
       
  9742 		</derivekey>
       
  9743 	</actionbody>
       
  9744 </action>
       
  9745 
       
  9746 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9747 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9748 //! @SYMREQ CIT_PREQ1054
       
  9749 //! @SYMTestPriority medium
       
  9750 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9751 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9752 <action>
       
  9753 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9754 	<actiontype>DeriveKey</actiontype>
       
  9755 	<actionbody>
       
  9756 		<derivekey>
       
  9757 			<kdf>pkcs#12</kdf>
       
  9758 			<passwd>password</passwd>
       
  9759 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9760 			<iterations>1536</iterations>
       
  9761 			<key>ACAFB5EB24FFB3B418587B832F52C2260339CD1DD458CDBB895741595BD6F879B9134D56F8695A654407E4809C56</key>
       
  9762 		</derivekey>
       
  9763 	</actionbody>
       
  9764 </action>
       
  9765 
       
  9766 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9767 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9768 //! @SYMREQ CIT_PREQ1054
       
  9769 //! @SYMTestPriority medium
       
  9770 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9771 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9772 <action>
       
  9773 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9774 	<actiontype>DeriveKey</actiontype>
       
  9775 	<actionbody>
       
  9776 		<derivekey>
       
  9777 			<kdf>pkcs#12</kdf>
       
  9778 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9779 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
  9780 			<iterations>1536</iterations>
       
  9781 			<key>A7B0859D9D1BF5E59047192BF2B8C7ACC676E0C4B272CB0DD4D76CAE04D831A4C12BC353F7C60F50ED67DF548599</key>
       
  9782 		</derivekey>
       
  9783 	</actionbody>
       
  9784 </action>
       
  9785 
       
  9786 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9787 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9788 //! @SYMREQ CIT_PREQ1054
       
  9789 //! @SYMTestPriority medium
       
  9790 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9791 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9792 <action>
       
  9793 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9794 	<actiontype>DeriveKey</actiontype>
       
  9795 	<actionbody>
       
  9796 		<derivekey>
       
  9797 			<kdf>pkcs#12</kdf>
       
  9798 			<passwd>0000</passwd>
       
  9799 			<salt>53414C54</salt>
       
  9800 			<iterations>2048</iterations>
       
  9801 			<key>B0F0F2EB445AB4DBE901D3C2484822595F58B91CCDD858068993D4F95777E800B47B0A091487E50D888139BBAA95</key>
       
  9802 		</derivekey>
       
  9803 	</actionbody>
       
  9804 </action>
       
  9805 
       
  9806 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9807 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9808 //! @SYMREQ CIT_PREQ1054
       
  9809 //! @SYMTestPriority medium
       
  9810 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9811 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9812 <action>
       
  9813 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9814 	<actiontype>DeriveKey</actiontype>
       
  9815 	<actionbody>
       
  9816 		<derivekey>
       
  9817 			<kdf>pkcs#12</kdf>
       
  9818 			<passwd>0001</passwd>
       
  9819 			<salt>53414C54</salt>
       
  9820 			<iterations>2048</iterations>
       
  9821 			<key>C11C0499CC9EC9FBB6ACA7BF4C0B538991A350E7A2275085600120C9642E197813F99DBE317142466C44961771AF</key>
       
  9822 		</derivekey>
       
  9823 	</actionbody>
       
  9824 </action>
       
  9825 
       
  9826 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9827 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9828 //! @SYMREQ CIT_PREQ1054
       
  9829 //! @SYMTestPriority medium
       
  9830 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9831 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9832 <action>
       
  9833 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9834 	<actiontype>DeriveKey</actiontype>
       
  9835 	<actionbody>
       
  9836 		<derivekey>
       
  9837 			<kdf>pkcs#12</kdf>
       
  9838 			<passwd>PSWD</passwd>
       
  9839 			<salt>53414C54</salt>
       
  9840 			<iterations>2048</iterations>
       
  9841 			<key>3F63500AC41074B4D2C1A991CBBBB013D8416F66C2D6DD3D0577A59043B25D770FAC6CFF48666D15795B61297255</key>
       
  9842 		</derivekey>
       
  9843 	</actionbody>
       
  9844 </action>
       
  9845 
       
  9846 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9847 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9848 //! @SYMREQ CIT_PREQ1054
       
  9849 //! @SYMTestPriority medium
       
  9850 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9851 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9852 <action>
       
  9853 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9854 	<actiontype>DeriveKey</actiontype>
       
  9855 	<actionbody>
       
  9856 		<derivekey>
       
  9857 			<kdf>pkcs#12</kdf>
       
  9858 			<passwd>password</passwd>
       
  9859 			<salt>53414C54</salt>
       
  9860 			<iterations>2048</iterations>
       
  9861 			<key>B47F802F1238A73054DEFD7D3AABFC819FC75A29D97444114C46756D3F2FD1DF12182CF6C83CF32E72D1A70DF206</key>
       
  9862 		</derivekey>
       
  9863 	</actionbody>
       
  9864 </action>
       
  9865 
       
  9866 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9867 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9868 //! @SYMREQ CIT_PREQ1054
       
  9869 //! @SYMTestPriority medium
       
  9870 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9871 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9872 <action>
       
  9873 	<actionname>PKCS#12 KDF, key len = 368, salt len = 4</actionname>
       
  9874 	<actiontype>DeriveKey</actiontype>
       
  9875 	<actionbody>
       
  9876 		<derivekey>
       
  9877 			<kdf>pkcs#12</kdf>
       
  9878 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9879 			<salt>53414C54</salt>
       
  9880 			<iterations>2048</iterations>
       
  9881 			<key>3099237692953AB2017A1BF0B12DAFC8F3A797AA45F218B705E54071E5BE4AB622F2E9B45FCA663D8B30ADCC0073</key>
       
  9882 		</derivekey>
       
  9883 	</actionbody>
       
  9884 </action>
       
  9885 
       
  9886 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9887 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9888 //! @SYMREQ CIT_PREQ1054
       
  9889 //! @SYMTestPriority medium
       
  9890 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9891 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9892 <action>
       
  9893 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9894 	<actiontype>DeriveKey</actiontype>
       
  9895 	<actionbody>
       
  9896 		<derivekey>
       
  9897 			<kdf>pkcs#12</kdf>
       
  9898 			<passwd>0000</passwd>
       
  9899 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9900 			<iterations>2048</iterations>
       
  9901 			<key>CD045229461658BC6C47C259F2D20433173DE4D31E54B1D693738FBA6D643ECB095761373FB0E49F9C478BA11755</key>
       
  9902 		</derivekey>
       
  9903 	</actionbody>
       
  9904 </action>
       
  9905 
       
  9906 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9907 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9908 //! @SYMREQ CIT_PREQ1054
       
  9909 //! @SYMTestPriority medium
       
  9910 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9911 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9912 <action>
       
  9913 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9914 	<actiontype>DeriveKey</actiontype>
       
  9915 	<actionbody>
       
  9916 		<derivekey>
       
  9917 			<kdf>pkcs#12</kdf>
       
  9918 			<passwd>0001</passwd>
       
  9919 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9920 			<iterations>2048</iterations>
       
  9921 			<key>D85432F8ACAE9653D34A68D9329F347AA10E53DB6DC8B942CA4D9447EDFC29A5BDC1D450A73B298C6A9A8ED7D2F4</key>
       
  9922 		</derivekey>
       
  9923 	</actionbody>
       
  9924 </action>
       
  9925 
       
  9926 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9927 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9928 //! @SYMREQ CIT_PREQ1054
       
  9929 //! @SYMTestPriority medium
       
  9930 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9931 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9932 <action>
       
  9933 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9934 	<actiontype>DeriveKey</actiontype>
       
  9935 	<actionbody>
       
  9936 		<derivekey>
       
  9937 			<kdf>pkcs#12</kdf>
       
  9938 			<passwd>PSWD</passwd>
       
  9939 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9940 			<iterations>2048</iterations>
       
  9941 			<key>C77FDE2E52892DF5613E6A3B8F1C80B92E9E2AB0BC37C801DE5E02A6DD1A193970B4505A403005B378BE47D61FEB</key>
       
  9942 		</derivekey>
       
  9943 	</actionbody>
       
  9944 </action>
       
  9945 
       
  9946 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9947 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9948 //! @SYMREQ CIT_PREQ1054
       
  9949 //! @SYMTestPriority medium
       
  9950 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9951 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9952 <action>
       
  9953 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9954 	<actiontype>DeriveKey</actiontype>
       
  9955 	<actionbody>
       
  9956 		<derivekey>
       
  9957 			<kdf>pkcs#12</kdf>
       
  9958 			<passwd>password</passwd>
       
  9959 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9960 			<iterations>2048</iterations>
       
  9961 			<key>62E06B8A2650199AE6E73AB3F503BF027DCEC0A49B2F0294723113F25347AEAF0109E270C77A2524CAC118D164B8</key>
       
  9962 		</derivekey>
       
  9963 	</actionbody>
       
  9964 </action>
       
  9965 
       
  9966 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9967 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9968 //! @SYMREQ CIT_PREQ1054
       
  9969 //! @SYMTestPriority medium
       
  9970 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9971 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9972 <action>
       
  9973 	<actionname>PKCS#12 KDF, key len = 368, salt len = 20</actionname>
       
  9974 	<actiontype>DeriveKey</actiontype>
       
  9975 	<actionbody>
       
  9976 		<derivekey>
       
  9977 			<kdf>pkcs#12</kdf>
       
  9978 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
  9979 			<salt>1D565078C3506F89BDA73BB6E3E5B8A3683DD362</salt>
       
  9980 			<iterations>2048</iterations>
       
  9981 			<key>A5B348EB4926290B223724CC8E4ED67FF458F2362279F0DF9F3A92AFF0473030D0EBA6E4173AF91E7AE535D3E988</key>
       
  9982 		</derivekey>
       
  9983 	</actionbody>
       
  9984 </action>
       
  9985 
       
  9986 //! @SYMTestCaseID CIT_PREQ1054_01
       
  9987 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
  9988 //! @SYMREQ CIT_PREQ1054
       
  9989 //! @SYMTestPriority medium
       
  9990 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
  9991 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
  9992 <action>
       
  9993 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
  9994 	<actiontype>DeriveKey</actiontype>
       
  9995 	<actionbody>
       
  9996 		<derivekey>
       
  9997 			<kdf>pkcs#12</kdf>
       
  9998 			<passwd>0000</passwd>
       
  9999 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
 10000 			<iterations>2048</iterations>
       
 10001 			<key>2A824C1B6B36AD48D0A5AE94E27988D4F6BDCB2A259262CE1B3E626454FF2A5B69A372FE3894C48E574F70F191F4</key>
       
 10002 		</derivekey>
       
 10003 	</actionbody>
       
 10004 </action>
       
 10005 
       
 10006 //! @SYMTestCaseID CIT_PREQ1054_01
       
 10007 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
 10008 //! @SYMREQ CIT_PREQ1054
       
 10009 //! @SYMTestPriority medium
       
 10010 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
 10011 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
 10012 <action>
       
 10013 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
 10014 	<actiontype>DeriveKey</actiontype>
       
 10015 	<actionbody>
       
 10016 		<derivekey>
       
 10017 			<kdf>pkcs#12</kdf>
       
 10018 			<passwd>0001</passwd>
       
 10019 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
 10020 			<iterations>2048</iterations>
       
 10021 			<key>4B8D18B96EB898D1BAA8BDD82BC443F0FF00CE13602A15DF682A601681221A748627D1C585C079F8DCBD5ABE9763</key>
       
 10022 		</derivekey>
       
 10023 	</actionbody>
       
 10024 </action>
       
 10025 
       
 10026 //! @SYMTestCaseID CIT_PREQ1054_01
       
 10027 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
 10028 //! @SYMREQ CIT_PREQ1054
       
 10029 //! @SYMTestPriority medium
       
 10030 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
 10031 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
 10032 <action>
       
 10033 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
 10034 	<actiontype>DeriveKey</actiontype>
       
 10035 	<actionbody>
       
 10036 		<derivekey>
       
 10037 			<kdf>pkcs#12</kdf>
       
 10038 			<passwd>PSWD</passwd>
       
 10039 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
 10040 			<iterations>2048</iterations>
       
 10041 			<key>9DABF586AD2BCD603DC38C3987C98D73A5A9F4B3B2A148121AE3E9E23B3891882F575F204CB0639FC9FDB9D5B0BD</key>
       
 10042 		</derivekey>
       
 10043 	</actionbody>
       
 10044 </action>
       
 10045 
       
 10046 //! @SYMTestCaseID CIT_PREQ1054_01
       
 10047 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
 10048 //! @SYMREQ CIT_PREQ1054
       
 10049 //! @SYMTestPriority medium
       
 10050 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
 10051 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
 10052 <action>
       
 10053 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
 10054 	<actiontype>DeriveKey</actiontype>
       
 10055 	<actionbody>
       
 10056 		<derivekey>
       
 10057 			<kdf>pkcs#12</kdf>
       
 10058 			<passwd>password</passwd>
       
 10059 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
 10060 			<iterations>2048</iterations>
       
 10061 			<key>F734BE1BF990A3A59CEA6C821492F0B660C6488EF08E3059843173C72CD79EFEADE34A6DA91F6AB8E92383F1BDFA</key>
       
 10062 		</derivekey>
       
 10063 	</actionbody>
       
 10064 </action>
       
 10065 
       
 10066 //! @SYMTestCaseID CIT_PREQ1054_01
       
 10067 //! @SYMTestCaseDesc Correctly generate key for given KDF mode, password, key length and salt length.
       
 10068 //! @SYMREQ CIT_PREQ1054
       
 10069 //! @SYMTestPriority medium
       
 10070 //! @SYMTestActions Generates a PKCS#12-format key from the supplied parameters.
       
 10071 //! @SYMTestExpectedResults The generated key matches the expected byte stream.
       
 10072 <action>
       
 10073 	<actionname>PKCS#12 KDF, key len = 368, salt len = 25</actionname>
       
 10074 	<actiontype>DeriveKey</actiontype>
       
 10075 	<actionbody>
       
 10076 		<derivekey>
       
 10077 			<kdf>pkcs#12</kdf>
       
 10078 			<passwd>abcdefghijklmnopqrstuvwxyz</passwd>
       
 10079 			<salt>E22C7B03163AE547F8239DA40D6F46D79EA3C6FFB3F04EBE61</salt>
       
 10080 			<iterations>2048</iterations>
       
 10081 			<key>47C18634A09AB37AB6EECBCD5C7E7F234F02E574A1167ED13693E8373DFB92EC6F000DBADB9363CA12E9E16ED019</key>
       
 10082 		</derivekey>
       
 10083 	</actionbody>
       
 10084 </action>
       
 10085 
       
 10086 <action>
       
 10087     <actionname>OOM End</actionname>
       
 10088     <actiontype>stopmemfailure</actiontype>
       
 10089     <actionbody></actionbody>
       
 10090     <actionresult>
       
 10091         <return>KErrNone</return>
       
 10092     </actionresult>
       
 10093 </action>
       
 10094